Symbols
- /Q (Queued Message Facility) 13-2
A
- access control in a configuration file
- defining 3-14
- access control lists (ACLs)
- using 14-10
- ACLs
- administering 14-11
- limitations 14-11
- AdminAPI 21-1
- administration
- configuration tools 2-2
- using AdminAPI 2-4
- using BEA Administration Console 2-3
- using command-line interface 2-3
- differences between WLE and BEA TUXEDO 1-4
- run-time tools 2-4
- using AdminAPI 2-6
- using BEA Administration Console 2-4
- using command-line interface 2-6
- tasks
- configuration 2-1
- run-time 2-1
- tools 2-1-2-7
- administration phases
- groundwork 1-2
- operational 1-3
- APP_PW 11-5
- APP_PW variable 11-6
- application components
- replacing 22-13
- application failure 22-2
- application type in a configuration file
- setting 3-13
- applications
- starting 4-1
- authentication server
- configuring 14-8
- using 14-7
- AUTOTRAN timeout value
- changing 19-5
B
- bankapp application 15-23
- BLOCKTIME parameter 3-21
- buffer type and subtype limits in a configuration file
- setting 3-19
- buffer types allowed for a service
- BUFTYPE parameter examples 3-66
- specifying 3-66
- BUFTYPE parameter 3-66
- bulletin board 15-3
C
- CLOPT parameter 12-8
- command line options 11-8
- format 11-7
- configuration file
- creating 3-1-3-81
- GROUPS section
- sample 3-32
- identifying the location 3-28
- MACHINES section
- description of parameters in sample MACHINES section 3-26
- identifying machines 3-25
- sample 3-26
- NETGROUPS section
- configuring information 3-78
- SERVERS section
- identifying server process information 3-35
- SERVICES section
- sample 3-64, 3-65
- setting domain-wide parameters 3-10
- configuration file forms
- TUXCONFIG file 3-3
- configuration file parameters
- APPDIR 3-29
- AUTHSVC 3-23
- AUTOTRAN 3-68
- BLOCKTIME 3-21
- BUFTYPE 3-66
- CONV 3-54
- ENVFILE 3-30
- FACTORYROUTING 3-68
- FASTPATH 3-25
- GID 3-15, 3-31
- GRACE 3-54
- IPCKEY 3-13
- LDBAL 3-64
- LMID 3-27
- LOAD 3-68
- MASTER 3-13
- MAX 3-47
- MAXACCESSERS 3-18, 3-31
- MAXBUFSTYPES 3-20
- MAXBUFTYPE 3-20
- MAXCONV 3-21
- MAXGEN 3-54
- MAXINTERFACES 3-18
- MAXNETGROUPS 3-78, 3-79
- MAXOBJECTS 3-18, 3-31
- MAXPENDINGBYTES 3-78, 3-79
- MAXSERVERS 3-18
- MAXSERVICES 3-18
- MIN 3-47
- NETGROUP 3-78, 3-79
- NETGRPNO 3-78
- NETPRIO 3-78
- NO_OVERRIDE 3-25
- NOTIFY 3-24
- PERM 3-15, 3-31
- PRIO 3-65, 3-68, 3-71
- PROTECTED 3-25
- RCMD 3-54
- REPLYQ 3-52, 3-53, 3-55
- RESTART 3-54
- RPPERM 3-52, 3-53
- RQADDR 3-51, 3-52, 3-55
- RQPERM 3-52, 3-55
- SANITYSCAN 3-21
- SCANUNIT 3-21
- SECURITY 3-22
- SEQUENCE 3-47
- SRVGRP 3-38, 3-68
- SRVID 3-38
- SYSTEM_ACCESS 3-56
- TIMEOUT 3-69
- TRANTIME 3-69
- TUXCONFIG 3-28
- TUXDIR 3-29
- UID 3-15, 3-31
- ULOGPFX 3-29
- USIGNAL 3-24
- configuring a local and remote domain 10-5
- configuring a networked application
- assigning priorities to each network group 6-8
- example 6-5
- steps 6-2
- UBBCONFIG file 6-7
- NETGROUPS section 6-7
- configuring groups 3-32
- defining server groups in GROUPS section 3-32
- configuring JDBC connection pools 3-56
- configuring machines 3-25
- identifying locations of WLE or BEA TUXEDO system software and application servers 3-28
- identifying log file location 3-29
- identifying machines in the MACHINES section 3-25
- identifying the location of the configuration file 3-28
- overriding system-wide parameters 3-31
- reserving the physical address and machine ID 3-27
- specifying environment variable settings for processes 3-30
- configuring network information
- network groups configuration 3-79
- specifying information in NETGROUPS section 3-78
- configuring routing
- defining routing criteria in ROUTING section 3-72
- specifying range criteria in sample ROUTING section 3-73
- WLE factory-based routing example 3-74
- configuring servers
- command-line options 3-40
- defining server access to shared memory 3-55
- defining server name, group, ID 3-38
- defining server restart information 3-53
- identifying server environment file location 3-50
- identifying server process information in SERVERS section 3-35
- identifying server queues 3-50
- setting order in which servers are booted 3-46
- specifying a TUXEDO server as conversational 3-54
- using server command-line options 3-39
- configuring the UBBCONFIG with netgroups 3-81
- configuring TUXEDO services
- controlling data flow by service priority 3-65
- enabling load balancing 3-64
- identifying services in the SERVICES section 3-63
- sample SERVICES section 3-64, 3-65
- specifying a list of allowable buffer types for a service 3-66
- specifying different service parameters for different server groups 3-65
- configuring WLE interfaces
- controlling data flow by interface priority 3-71
- enabling load balancing 3-71
- specifying CORBA interfaces in the INTERFACES section 3-67
- specifying different service parameters for different server groups 3-71
- specifying FACTORYROUTING criteria 3-69
- configuring workstation listener (WSL) 11-7
- using the CLOPT parameter 11-7
- configuring your system
- determining your server needs 1-7
- planning the overall design 1-6
- CORBA interfaces in a configuration file
- specifying 3-67
- crdl command
- creating a TLOG device 4-6
D
- data
- dynamic 15-4
- static 15-4
- data flow in a configuration file
- controlling by interface priority 3-71
- controlling by service priority 3-65
- device
- reinitializing a 22-6
- device list
- creating 22-5
- destroying 22-6
- DLL 12-2
- DLL (Dynamic Link Libraries) 11-2
- DMCONFIG file 10-4
- domain access control list, creating 10-15
- domains
- benefits of using BEA TUXEDO system 10-2
- components of DMCONFIG file 10-4
- configuring a local and remote domain 10-5
- creating domain access control list (ACL) 10-15
- defining addressing 10-10
- defining exported services 10-13
- defining imported and exported services 10-10
- defining local and remote domains 10-10
- defining remote domain environment 10-11
- defining the local domain environment 10-8
- domain gateway configuration file 10-3
- ensuring security 10-14
- example of /DOMAINS 10-7
- illustration of /DOMAINS 10-7
- local application configuration file example 10-9
- local domain configuration file example 10-11
- remote application configuration file example 10-12
- remote domain gateway configuration file example 10-13
- routing service requests to remote domains 10-15
- working with multiple 10-1-10-17
E
- encryption, link-level 6-15
- environment variable settings in a configuration file
- specifying 3-30
- environment variables, setting
- ROOTDIR 11-5
- errors
- identifying using log files 16-1
- Event Broker/Monitor 21-1
F
- factory-based WLE routing example 3-74
- failback 6-12
- failover 6-12
- failure
- determining cause of application 22-2
- determining cause of system 22-3
- failure types 22-2
- figures
- assigning network group priorities 6-9
- bank application with remote clients 12-5
- bank application with two workstation clients 11-4
- BEA Administration Console screen 2-5
- BEA TUXEDO /DOMAIN gateway 10-4
- example of a network grouping 3-80, 6-6
- flow of data over the BRIDGE 6-11
- local and remote application (simpapp) 10-8
- sample NETGROUPS and NETWORK sections 3-81
- TUXEDO message queueing illustration 13-5
- file system maintenance 22-5
G
- GRACE parameter 3-54
I
- IIOP (Internet Inter-ORB Protocol) 12-2
- interface repositories
- administering 8-2
- creating and populating 8-4
- deleting 8-4
- displaying or extracting content 8-4
- managing
- prerequisites 8-3
- using administrative commands 8-3
- IPC limits in a configuration file
- defining 3-16
- IPCKEY parameter 3-13
- ISH (IIOP Server Handler) 12-2
- ISL (IIOP Server Listener) 12-2
J
- Java Server options 3-46
- JavaServer
- additional services advertized by 3-17
- configuration options 3-40
- enabling multithreading 3-40
- nonstandard Java options 3-44
- standard Java options 3-43
- WLE-noredirect option 3-44
- JDBC connection pools
- attributes of 3-56
- configuring 3-56
- encrypting passwords used with 3-61
L
- listings
- bbsread output 15-26
- canceling a server group migration 18-10
- configuration file for bankapp (MP version) 15-23
- local application configuration file 10-9
- local domain gateway configuration file 10-11
- migrating a machine when an alternate machine is accessible 18-8
- migrating a machine when an alternate machine is not accessible 18-9
- migration when a master machine is accessible 18-3
- migration when a master machine is not accessible 18-4
- migration when an alternate machine is accessible 18-6
- migration when an alternate machine is not accessible 18-6
- remote application configuration file 10-12
- remote domain gateway configuration file 10-13
- TMADMIN default output 15-11
- tmadmin session example 22-9
- load balancing in a configuration file
- enabling 3-19
- load balancing TUXEDO services in a configuration file
- enabling 3-64
- load balancing WLE interfaces in a configuration file
- enabling 3-71
- locations of WLE or BEA TUXEDO system software and application servers
- identifying 3-28
- log file in a configuration file
- identifying location 3-29
- log files 15-3
- using to detect failures 16-13-16-15
M
- MANDATORY_ACL parameter
- restriction for WLE systems 14-10
- MAX parameter 3-47
- MAXACCESSERS
- threads 3-16
- MAXENCRYPTBITS parameter 6-18
- MAXGEN parameter 3-54
- MAXWSCLIENTS parameter 11-6
- migrating applications 18-1-18-11
- examples of switching master and backup machines 18-3
- when the master machine is accessible from the backup machine 18-3
- when the master machine is not accessible from the backup machine 18-4
- how to switch master and backup machines 18-3, 18-10
- migration options 18-2
- canceling a migration 18-9
- example of canceling a migration
- canceling a server group migration for a server group GROUP1 18-10
- example of migrating a machine
- when the alternate machine is accessible from the primary machine 18-8
- when the alternate machine is not accessible from the primary machine 18-9
- example of migrating a server group
- when the alternate machine is accessible from the primary machine 18-6
- when the alternate machine is not accessible from the primary machine 18-6
- migrating a server group 18-4
- how to migrate a server group when the alternate machine is accessible from the primary machine 18-5
- how to migrate a server group when the alternate machine is not accessible from the primary machine 18-5
- migrating machines 18-7
- how to migrate machines when the alternate machine is accessible from the primary machine 18-7
- how to migrate machines when the alternate machine is not accessible from the primary machine 18-8
- migrating transaction logs to a backup site 18-10
- switching master and backup machines 18-2
- MIN parameter 3-47
- MINENCRYPTBITS parameter 6-18
- modifying systems, dynamically 19-1-19-5
- procedures 19-2
- advertising services 19-4
- changing AUTOTRAN timeout value 19-5
- changing service parameters 19-5
- resuming BEA TUXEDO services 19-3
- suspending BEA TUXEDO services 19-3
- unadvertising services 19-4
- monitoring a running system 15-1-15-27
- bankapp configuration file 15-23
- checking local IPC resources 15-25
- checking system-wide parameters 15-27
- data repositories
- bulletin board 15-3
- log files 15-3
- UBBCONFIG file 15-2
- methods 15-5
- output from TMADMIN commands
- PRINTCONN 15-19
- PRINTJDBCCONNPOOL 15-22
- PRINTNET 15-20
- PRINTQUEUE 15-17
- PRINTTRANS 15-21
- running TMADMIN commands 15-12
- sample bankapp application 15-23
- sample bankapp application output 15-25-??
- sample bankapp applicatiooutput 15-27
- TMADMIN meta-commands 15-9
- TMADMIN operating modes 15-8
- types of administrative data 15-3
- using AdminAPI 15-5
- using statistics 15-3
- monitoring log files 16-1-16-15
- Multithreaded JavaServers
- enabling 3-40
- MAXACCESSERS parameter 3-16
N
- NETGROUPS section 6-7
- NETLOAD parameter 6-14
- network data flow
- advantages of data compression 6-13
- failback 6-12
- failover 6-12
- using data compression
- setting the compression level 6-12
- network failures
- recovering from severe 22-10
- recovering from transient 22-10
- network groups configuration
- sample 3-79
- networked application
- balancing request loads 6-14
- changing network configuration parameters 6-18
- negotiating encryption key size 6-16
- running a 6-10
- scheduling network data over parallel circuits 6-10
- specifying encryption key bits 6-18
- using link-level encryption 6-15
- networked applications 6-1-6-18
- node
- restoring a failed nonmaster 22-11
O
- Outbound IIOP
- bi-directional 12-12
- outbound IIOP
- asymetric 12-13
- Asymmetric 12-11
- Bi-directional 12-11
- dual-paired 12-11, 12-14
- overriding system-wide parameters 3-31
P
- partitioned networks
- detecting 22-8
- repairing 22-7
- passwords
- encrypting 4-4
- physical address and machine ID
- reserving 3-27
- PRINTCONN command 15-19
- PRINTJDBCPOOL command 15-22
- PRINTNET command 15-20
- PRINTNETWORK command 22-9
- PRINTQUEUE command 15-17
- PRINTSERVER command 22-9
- PRINTSERVICE command 22-9
- PRINTTRANS command 15-21
Q
- QMADMIN
- using to create message queues 13-7
- QMCONFIG 13-2
- QMCONFIG environment variable
- setting 13-7
- queue 13-2
- queue space 13-2
- queued BEA TUXEDO messages
- managing 13-1-13-11
- queued messages
- associating queue with group 13-10
- creating application queue space and queues 13-8
- listing /Q servers in SERVER section 13-11
- modifying the configuration file 13-10
- setting the QMCONFIG environment variable 13-7
- using QMADMIN 13-7
R
- range criteria in a configuration file
- specifying 3-73
- RCMD parameter 3-54
- remote clients
- configuring a listener for 12-8
- using the CLOPT parameter 12-8
- defined 12-4
- how it connects to application 12-6
- illustrated 12-5
- managing 12-1-12-10
- setting environment variables 12-6
- setting maximum number of 12-7
- remote domains
- routing service requests 10-15
- REPLYQ parameter 3-51
- request queue 13-2
- resources
- cleaning up 22-14
- cleaning up those associated with dead processes 22-14
- RESTART parameter 3-54
- RPPERM parameter 3-51
- RQADDR parameter 3-51
- RQPERM parameter 3-51
S
- sanity checks and timeouts in a configuration file
- BLOCKTIME parameter 3-21
- example 3-20
- SANITYSCAN parameter 3-21
- SCANUNIT parameter 3-21
- setting the number of 3-20
- SANITYSCAN parameter 3-21
- SCANUNIT parameter 3-21
- scheduling network data 6-10
- securing applications 14-1-14-11
- ACL's limitations 14-11
- adding, modifying, deleting user accounts 14-8
- adding, modifying, deleting user groups 14-9
- configuring authentication server 14-8
- configuring SECURITY parameter 14-5
- determining levels of security 14-1
- implementing application password-level security 14-6
- implementing operating system security 14-6
- using an authentication server 14-7
- using shell-level commands 14-8
- security
- implementing application password-level 14-6
- implementing operating system 14-6
- security level in a configuration file
- setting 3-22
- SECURITY parameter
- configuring 14-5
- SEQUENCE parameter 3-47
- server access to shared memory
- characteristics of SYSTEM_ACCESS parameter 3-55
- server command-line options 3-40
- server environment file
- identifying location 3-50
- server groups
- defining 3-32
- encrypting passwords for 3-34
- sample GROUPS section 3-32
- specifying group name, number, and LMID 3-32
- server process information
- identifying 3-35
- server queue information
- characteristics of RQADDR, RQPERM, REPLYQ, and RPPERM parameters 3-51
- example 3-51
- identifying 3-50
- server restart information
- characteristics of RESTART, RCMD, MAXGEN, and GRACE parameters 3-54
- defining 3-53
- servers boot order in a configuration file
- characteristics of SEQUENCE, MIN, and MAX parameters 3-47
- setting 3-46
- service parameters
- changing 19-5
- service parameters specification in a configuration file
- sample INTERFACES section 3-71
- services
- advertising 19-4
- unadvertising 19-4
- setting domain-wide parameters
- buffer type and subtype limits 3-19
- defining access control 3-14
- defining IPC limits 3-16
- enabling load balancing 3-19
- enabling unsolicited notification 3-23
- identifying the master machine 3-13
- protecting shared memory 3-24
- setting conversation limits 3-21
- setting parameters of unsolicited notification 3-23
- setting the address of shared memory 3-12
- setting the application type 3-13
- setting the number of sanity checks and timeouts 3-20
- setting the security level 3-22
- shared memory
- defining server access to 3-55
- protecting 3-24
- setting the address of 3-12
- simpapp application illustrated 10-8
- Single-threaded JavaServers 3-40
- SPINCOUNT parameter 6-14
- standard Java options 3-43
- starting applications 4-1
- system components
- replacing 22-12
- system-wide parameters
- overriding 3-31
T
- tables
- commands for monitoring TMADMIN tasks 15-14
- TMADMIN meta-commands 15-9
- TAGENT log
- analyzing 16-13
- threads 3-40
- TLISTEN log
- analyzing 16-14
- TLOG 16-1
- analyzing 16-15
- creating 16-7-16-12
- how to use 16-5
- location 16-5
- maintaining 16-12
- purpose 16-5
- TMADMIN command 15-6
- TMADMIN meta-commands 15-9
- tmloadcf
- prompts for entering passwords 3-34
- prompts for passwords 4-5
- TMNETLOAD parameter 6-14
- TMPDIR 11-5
- TMPDIR variable 11-6
- TMQFORWARD 13-2
- TMQUEUE 13-2
- TMS_QM 13-2
- tmunloadcf
- encrypting passwords with 3-34, 4-4
- transactions
- aborting 22-17
- committing 22-18
- recovering from failures when using 22-18
- transactions, configuring 7-1-??
- troubleshooting applications 22-1-22-19
- aborting a transaction 22-17
- application failure 22-2
- broadcasting unsolicited messages 22-4
- checking the ULOG 22-8
- checking WLE hostname capitalization 22-15
- cleaning up and restarting servers 22-13
- cleaning up resources 22-14
- cleaning up resources associated with dead processes 22-14
- committing a transaction 22-18
- detecting partitioned networks 22-8
- gathering information about network, server, and service 22-9
- maintaining system files 22-5
- creating device list 22-5
- destroying device list 22-6
- printing the UDL 22-7
- printing the VTOC 22-7
- reinitializing a device 22-6
- recovering from severe network failures 22-10
- recovering from transient network failures 22-10
- recovering when using transactions 22-18
- repairing partitioned networks 22-7
- replacing application components 22-13
- restoring failed master node 22-11
- restoring failed nonmaster node 22-11
- restoring failed nonmaster node example 22-12
- types of failures 22-2
- WLE or BEA TUXEDO system failure 22-3
- tuning applications 17-1-??
- TUXCONFIG file 3-3
- TUXDIR variable 11-5
- TUXEDO and WLE
- differences 1-4
- TUXEDO conversation limits in a configuration file
- setting 3-21
- TUXEDO queued message facility
- administrative tasks 13-3-13-7
- overview 13-3-??
- TUXEDO queued messages
- associating queue with group 13-10
- creating application queue space and queues 13-8
- listing /Q servers in SERVER section 13-11
- managing 13-1-13-11
- modifying the configuration file 13-10
- setting the QMCONFIG environment variable 13-7
- using QMADMIN 13-7
- TUXEDO services
- resuming 19-3
- suspending 19-3
- TUXEDO services in a configuration file
- identifying 3-63
- sample SERVICES section 3-64
U
- UBBCONFIG file 15-2
- configuring with netgroups 3-81
- UDL 13-7
- printing 22-7
- ULOG 16-1, 22-8
- analyzing 16-13
- assigning a location for 16-6
- how to use 16-3
- location 16-4
- maintaining 16-6
- message format 16-3
- purpose 16-2
- when created 16-2
- unsolicited messages
- broadcasting 22-4
- unsolicited notification in a configuration file
- setting parameters of 3-23
V
- VTOC
- printing 22-7
W
- WLE and BEA TUXEDO
- differences 1-4
- WLE factory-based routing example 3-74
- WLE hostname capitalization
- checking 22-15
- WLE interface repositories
- managing 8-1
- worker threads 3-16
- workstation clients
- defined 11-2
- how to connect to an application 11-5
- illustration of a 2-workstation client application 11-3
- managing 11-1-11-9
- modifying MACHINES section to support 11-9
- sample UBBCONFIG file 11-9
- setting environment variables 11-5
- setting number of
- MAXACCESSERS parameter 11-6
- MAXWSCLIENTS parameter 11-6
- workstation listener (WSL), configuring 11-7
- WSC (workstation client) 11-2
- WSDEVICE variable 11-5
- WSENFILE 11-5
- WSENFILE variable 11-5
- WSH (workstation handler) 11-2
- WSL (workstation listener) 11-2
- WSNADDR
- WSDEVICE 11-5
- WSNADDR variable 11-5
- WSREPLYMAX variable 11-6
- WSRPLYMAX 11-5
- WSTYPE 11-5
- WSTYPE variable 11-5
|
Copyright © 1999 BEA Systems, Inc. All rights reserved.
Required browser: Netscape 4.0 or higher, or Microsoft Internet Explorer 4.0 or higher.
|