BEA Logo BEA WebLogic Enterprise Release 5.0

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

   WLE Doc Home   |   Administration & Related Topics   |   Previous   |   Next   |   Contents   |   Index

Symbols

/Q (Queued Message Facility) 13-2

A

access control in a configuration file

defining 3-14

access control lists (ACLs)

using 14-10

ACLs

administering 14-11

limitations 14-11

AdminAPI 21-1

administration

configuration tools 2-2

using AdminAPI 2-4

using BEA Administration Console 2-3

using command-line interface 2-3

differences between WLE and BEA TUXEDO 1-4

run-time tools 2-4

using AdminAPI 2-6

using BEA Administration Console 2-4

using command-line interface 2-6

tasks

configuration 2-1

run-time 2-1

tools 2-1-2-7

administration phases

groundwork 1-2

operational 1-3

APP_PW 11-5

APP_PW variable 11-6

application components

replacing 22-13

application failure 22-2

application type in a configuration file

setting 3-13

applications

starting 4-1

authentication server

configuring 14-8

using 14-7

AUTOTRAN timeout value

changing 19-5

B

bankapp application 15-23

BLOCKTIME parameter 3-21

buffer type and subtype limits in a configuration file

setting 3-19

buffer types allowed for a service

BUFTYPE parameter examples 3-66

specifying 3-66

BUFTYPE parameter 3-66

bulletin board 15-3

C

CLOPT parameter 12-8

command line options 11-8

format 11-7

configuration file

creating 3-1-3-81

GROUPS section

sample 3-32

identifying the location 3-28

MACHINES section

description of parameters in sample MACHINES section 3-26

identifying machines 3-25

sample 3-26

NETGROUPS section

configuring information 3-78

SERVERS section

identifying server process information 3-35

SERVICES section

sample 3-64, 3-65

setting domain-wide parameters 3-10

configuration file forms

TUXCONFIG file 3-3

configuration file parameters

APPDIR 3-29

AUTHSVC 3-23

AUTOTRAN 3-68

BLOCKTIME 3-21

BUFTYPE 3-66

CONV 3-54

ENVFILE 3-30

FACTORYROUTING 3-68

FASTPATH 3-25

GID 3-15, 3-31

GRACE 3-54

IPCKEY 3-13

LDBAL 3-64

LMID 3-27

LOAD 3-68

MASTER 3-13

MAX 3-47

MAXACCESSERS 3-18, 3-31

MAXBUFSTYPES 3-20

MAXBUFTYPE 3-20

MAXCONV 3-21

MAXGEN 3-54

MAXINTERFACES 3-18

MAXNETGROUPS 3-78, 3-79

MAXOBJECTS 3-18, 3-31

MAXPENDINGBYTES 3-78, 3-79

MAXSERVERS 3-18

MAXSERVICES 3-18

MIN 3-47

NETGROUP 3-78, 3-79

NETGRPNO 3-78

NETPRIO 3-78

NO_OVERRIDE 3-25

NOTIFY 3-24

PERM 3-15, 3-31

PRIO 3-65, 3-68, 3-71

PROTECTED 3-25

RCMD 3-54

REPLYQ 3-52, 3-53, 3-55

RESTART 3-54

RPPERM 3-52, 3-53

RQADDR 3-51, 3-52, 3-55

RQPERM 3-52, 3-55

SANITYSCAN 3-21

SCANUNIT 3-21

SECURITY 3-22

SEQUENCE 3-47

SRVGRP 3-38, 3-68

SRVID 3-38

SYSTEM_ACCESS 3-56

TIMEOUT 3-69

TRANTIME 3-69

TUXCONFIG 3-28

TUXDIR 3-29

UID 3-15, 3-31

ULOGPFX 3-29

USIGNAL 3-24

configuring a local and remote domain 10-5

configuring a networked application

assigning priorities to each network group 6-8

example 6-5

steps 6-2

UBBCONFIG file 6-7

NETGROUPS section 6-7

configuring groups 3-32

defining server groups in GROUPS section 3-32

configuring JDBC connection pools 3-56

configuring machines 3-25

identifying locations of WLE or BEA TUXEDO system software and application servers 3-28

identifying log file location 3-29

identifying machines in the MACHINES section 3-25

identifying the location of the configuration file 3-28

overriding system-wide parameters 3-31

reserving the physical address and machine ID 3-27

specifying environment variable settings for processes 3-30

configuring network information

network groups configuration 3-79

specifying information in NETGROUPS section 3-78

configuring routing

defining routing criteria in ROUTING section 3-72

specifying range criteria in sample ROUTING section 3-73

WLE factory-based routing example 3-74

configuring servers

command-line options 3-40

defining server access to shared memory 3-55

defining server name, group, ID 3-38

defining server restart information 3-53

identifying server environment file location 3-50

identifying server process information in SERVERS section 3-35

identifying server queues 3-50

setting order in which servers are booted 3-46

specifying a TUXEDO server as conversational 3-54

using server command-line options 3-39

configuring the UBBCONFIG with netgroups 3-81

configuring TUXEDO services

controlling data flow by service priority 3-65

enabling load balancing 3-64

identifying services in the SERVICES section 3-63

sample SERVICES section 3-64, 3-65

specifying a list of allowable buffer types for a service 3-66

specifying different service parameters for different server groups 3-65

configuring WLE interfaces

controlling data flow by interface priority 3-71

enabling load balancing 3-71

specifying CORBA interfaces in the INTERFACES section 3-67

specifying different service parameters for different server groups 3-71

specifying FACTORYROUTING criteria 3-69

configuring workstation listener (WSL) 11-7

using the CLOPT parameter 11-7

configuring your system

determining your server needs 1-7

planning the overall design 1-6

CORBA interfaces in a configuration file

specifying 3-67

crdl command

creating a TLOG device 4-6

D

data

dynamic 15-4

static 15-4

data flow in a configuration file

controlling by interface priority 3-71

controlling by service priority 3-65

device

reinitializing a 22-6

device list

creating 22-5

destroying 22-6

DLL 12-2

DLL (Dynamic Link Libraries) 11-2

DMCONFIG file 10-4

domain access control list, creating 10-15

domains

benefits of using BEA TUXEDO system 10-2

components of DMCONFIG file 10-4

configuring a local and remote domain 10-5

creating domain access control list (ACL) 10-15

defining addressing 10-10

defining exported services 10-13

defining imported and exported services 10-10

defining local and remote domains 10-10

defining remote domain environment 10-11

defining the local domain environment 10-8

domain gateway configuration file 10-3

ensuring security 10-14

example of /DOMAINS 10-7

illustration of /DOMAINS 10-7

local application configuration file example 10-9

local domain configuration file example 10-11

remote application configuration file example 10-12

remote domain gateway configuration file example 10-13

routing service requests to remote domains 10-15

working with multiple 10-1-10-17

E

encryption, link-level 6-15

environment variable settings in a configuration file

specifying 3-30

environment variables, setting

ROOTDIR 11-5

errors

identifying using log files 16-1

Event Broker/Monitor 21-1

F

factory-based WLE routing example 3-74

failback 6-12

failover 6-12

failure

determining cause of application 22-2

determining cause of system 22-3

failure types 22-2

figures

assigning network group priorities 6-9

bank application with remote clients 12-5

bank application with two workstation clients 11-4

BEA Administration Console screen 2-5

BEA TUXEDO /DOMAIN gateway 10-4

example of a network grouping 3-80, 6-6

flow of data over the BRIDGE 6-11

local and remote application (simpapp) 10-8

sample NETGROUPS and NETWORK sections 3-81

TUXEDO message queueing illustration 13-5

file system maintenance 22-5

G

GRACE parameter 3-54

I

IIOP (Internet Inter-ORB Protocol) 12-2

interface repositories

administering 8-2

creating and populating 8-4

deleting 8-4

displaying or extracting content 8-4

managing

prerequisites 8-3

using administrative commands 8-3

IPC limits in a configuration file

defining 3-16

IPCKEY parameter 3-13

ISH (IIOP Server Handler) 12-2

ISL (IIOP Server Listener) 12-2

J

Java Server options 3-46

JavaServer

additional services advertized by 3-17

configuration options 3-40

enabling multithreading 3-40

nonstandard Java options 3-44

standard Java options 3-43

WLE-noredirect option 3-44

JDBC connection pools

attributes of 3-56

configuring 3-56

encrypting passwords used with 3-61

L

listings

bbsread output 15-26

canceling a server group migration 18-10

configuration file for bankapp (MP version) 15-23

local application configuration file 10-9

local domain gateway configuration file 10-11

migrating a machine when an alternate machine is accessible 18-8

migrating a machine when an alternate machine is not accessible 18-9

migration when a master machine is accessible 18-3

migration when a master machine is not accessible 18-4

migration when an alternate machine is accessible 18-6

migration when an alternate machine is not accessible 18-6

remote application configuration file 10-12

remote domain gateway configuration file 10-13

TMADMIN default output 15-11

tmadmin session example 22-9

load balancing in a configuration file

enabling 3-19

load balancing TUXEDO services in a configuration file

enabling 3-64

load balancing WLE interfaces in a configuration file

enabling 3-71

locations of WLE or BEA TUXEDO system software and application servers

identifying 3-28

log file in a configuration file

identifying location 3-29

log files 15-3

using to detect failures 16-13-16-15

M

MANDATORY_ACL parameter

restriction for WLE systems 14-10

MAX parameter 3-47

MAXACCESSERS

threads 3-16

MAXENCRYPTBITS parameter 6-18

MAXGEN parameter 3-54

MAXWSCLIENTS parameter 11-6

migrating applications 18-1-18-11

examples of switching master and backup machines 18-3

when the master machine is accessible from the backup machine 18-3

when the master machine is not accessible from the backup machine 18-4

how to switch master and backup machines 18-3, 18-10

migration options 18-2

canceling a migration 18-9

example of canceling a migration

canceling a server group migration for a server group GROUP1 18-10

example of migrating a machine

when the alternate machine is accessible from the primary machine 18-8

when the alternate machine is not accessible from the primary machine 18-9

example of migrating a server group

when the alternate machine is accessible from the primary machine 18-6

when the alternate machine is not accessible from the primary machine 18-6

migrating a server group 18-4

how to migrate a server group when the alternate machine is accessible from the primary machine 18-5

how to migrate a server group when the alternate machine is not accessible from the primary machine 18-5

migrating machines 18-7

how to migrate machines when the alternate machine is accessible from the primary machine 18-7

how to migrate machines when the alternate machine is not accessible from the primary machine 18-8

migrating transaction logs to a backup site 18-10

switching master and backup machines 18-2

MIN parameter 3-47

MINENCRYPTBITS parameter 6-18

modifying systems, dynamically 19-1-19-5

procedures 19-2

advertising services 19-4

changing AUTOTRAN timeout value 19-5

changing service parameters 19-5

resuming BEA TUXEDO services 19-3

suspending BEA TUXEDO services 19-3

unadvertising services 19-4

monitoring a running system 15-1-15-27

bankapp configuration file 15-23

checking local IPC resources 15-25

checking system-wide parameters 15-27

data repositories

bulletin board 15-3

log files 15-3

UBBCONFIG file 15-2

methods 15-5

output from TMADMIN commands

PRINTCONN 15-19

PRINTJDBCCONNPOOL 15-22

PRINTNET 15-20

PRINTQUEUE 15-17

PRINTTRANS 15-21

running TMADMIN commands 15-12

sample bankapp application 15-23

sample bankapp application output 15-25-??

sample bankapp applicatiooutput 15-27

TMADMIN meta-commands 15-9

TMADMIN operating modes 15-8

types of administrative data 15-3

using AdminAPI 15-5

using statistics 15-3

monitoring log files 16-1-16-15

Multithreaded JavaServers

enabling 3-40

MAXACCESSERS parameter 3-16

N

NETGROUPS section 6-7

NETLOAD parameter 6-14

network data flow

advantages of data compression 6-13

failback 6-12

failover 6-12

using data compression

setting the compression level 6-12

network failures

recovering from severe 22-10

recovering from transient 22-10

network groups configuration

sample 3-79

networked application

balancing request loads 6-14

changing network configuration parameters 6-18

negotiating encryption key size 6-16

running a 6-10

scheduling network data over parallel circuits 6-10

specifying encryption key bits 6-18

using link-level encryption 6-15

networked applications 6-1-6-18

node

restoring a failed nonmaster 22-11

O

Outbound IIOP

bi-directional 12-12

outbound IIOP

asymetric 12-13

Asymmetric 12-11

Bi-directional 12-11

dual-paired 12-11, 12-14

overriding system-wide parameters 3-31

P

partitioned networks

detecting 22-8

repairing 22-7

passwords

encrypting 4-4

physical address and machine ID

reserving 3-27

PRINTCONN command 15-19

PRINTJDBCPOOL command 15-22

PRINTNET command 15-20

PRINTNETWORK command 22-9

PRINTQUEUE command 15-17

PRINTSERVER command 22-9

PRINTSERVICE command 22-9

PRINTTRANS command 15-21

Q

QMADMIN

using to create message queues 13-7

QMCONFIG 13-2

QMCONFIG environment variable

setting 13-7

queue 13-2

queue space 13-2

queued BEA TUXEDO messages

managing 13-1-13-11

queued messages

associating queue with group 13-10

creating application queue space and queues 13-8

listing /Q servers in SERVER section 13-11

modifying the configuration file 13-10

setting the QMCONFIG environment variable 13-7

using QMADMIN 13-7

R

range criteria in a configuration file

specifying 3-73

RCMD parameter 3-54

remote clients

configuring a listener for 12-8

using the CLOPT parameter 12-8

defined 12-4

how it connects to application 12-6

illustrated 12-5

managing 12-1-12-10

setting environment variables 12-6

setting maximum number of 12-7

remote domains

routing service requests 10-15

REPLYQ parameter 3-51

request queue 13-2

resources

cleaning up 22-14

cleaning up those associated with dead processes 22-14

RESTART parameter 3-54

RPPERM parameter 3-51

RQADDR parameter 3-51

RQPERM parameter 3-51

S

sanity checks and timeouts in a configuration file

BLOCKTIME parameter 3-21

example 3-20

SANITYSCAN parameter 3-21

SCANUNIT parameter 3-21

setting the number of 3-20

SANITYSCAN parameter 3-21

SCANUNIT parameter 3-21

scheduling network data 6-10

securing applications 14-1-14-11

ACL's limitations 14-11

adding, modifying, deleting user accounts 14-8

adding, modifying, deleting user groups 14-9

configuring authentication server 14-8

configuring SECURITY parameter 14-5

determining levels of security 14-1

implementing application password-level security 14-6

implementing operating system security 14-6

using an authentication server 14-7

using shell-level commands 14-8

security

implementing application password-level 14-6

implementing operating system 14-6

security level in a configuration file

setting 3-22

SECURITY parameter

configuring 14-5

SEQUENCE parameter 3-47

server access to shared memory

characteristics of SYSTEM_ACCESS parameter 3-55

server command-line options 3-40

server environment file

identifying location 3-50

server groups

defining 3-32

encrypting passwords for 3-34

sample GROUPS section 3-32

specifying group name, number, and LMID 3-32

server process information

identifying 3-35

server queue information

characteristics of RQADDR, RQPERM, REPLYQ, and RPPERM parameters 3-51

example 3-51

identifying 3-50

server restart information

characteristics of RESTART, RCMD, MAXGEN, and GRACE parameters 3-54

defining 3-53

servers boot order in a configuration file

characteristics of SEQUENCE, MIN, and MAX parameters 3-47

setting 3-46

service parameters

changing 19-5

service parameters specification in a configuration file

sample INTERFACES section 3-71

services

advertising 19-4

unadvertising 19-4

setting domain-wide parameters

buffer type and subtype limits 3-19

defining access control 3-14

defining IPC limits 3-16

enabling load balancing 3-19

enabling unsolicited notification 3-23

identifying the master machine 3-13

protecting shared memory 3-24

setting conversation limits 3-21

setting parameters of unsolicited notification 3-23

setting the address of shared memory 3-12

setting the application type 3-13

setting the number of sanity checks and timeouts 3-20

setting the security level 3-22

shared memory

defining server access to 3-55

protecting 3-24

setting the address of 3-12

simpapp application illustrated 10-8

Single-threaded JavaServers 3-40

SPINCOUNT parameter 6-14

standard Java options 3-43

starting applications 4-1

system components

replacing 22-12

system-wide parameters

overriding 3-31

T

tables

commands for monitoring TMADMIN tasks 15-14

TMADMIN meta-commands 15-9

TAGENT log

analyzing 16-13

threads 3-40

TLISTEN log

analyzing 16-14

TLOG 16-1

analyzing 16-15

creating 16-7-16-12

how to use 16-5

location 16-5

maintaining 16-12

purpose 16-5

TMADMIN command 15-6

TMADMIN meta-commands 15-9

tmloadcf

prompts for entering passwords 3-34

prompts for passwords 4-5

TMNETLOAD parameter 6-14

TMPDIR 11-5

TMPDIR variable 11-6

TMQFORWARD 13-2

TMQUEUE 13-2

TMS_QM 13-2

tmunloadcf

encrypting passwords with 3-34, 4-4

transactions

aborting 22-17

committing 22-18

recovering from failures when using 22-18

transactions, configuring 7-1-??

troubleshooting applications 22-1-22-19

aborting a transaction 22-17

application failure 22-2

broadcasting unsolicited messages 22-4

checking the ULOG 22-8

checking WLE hostname capitalization 22-15

cleaning up and restarting servers 22-13

cleaning up resources 22-14

cleaning up resources associated with dead processes 22-14

committing a transaction 22-18

detecting partitioned networks 22-8

gathering information about network, server, and service 22-9

maintaining system files 22-5

creating device list 22-5

destroying device list 22-6

printing the UDL 22-7

printing the VTOC 22-7

reinitializing a device 22-6

recovering from severe network failures 22-10

recovering from transient network failures 22-10

recovering when using transactions 22-18

repairing partitioned networks 22-7

replacing application components 22-13

restoring failed master node 22-11

restoring failed nonmaster node 22-11

restoring failed nonmaster node example 22-12

types of failures 22-2

WLE or BEA TUXEDO system failure 22-3

tuning applications 17-1-??

TUXCONFIG file 3-3

TUXDIR variable 11-5

TUXEDO and WLE

differences 1-4

TUXEDO conversation limits in a configuration file

setting 3-21

TUXEDO queued message facility

administrative tasks 13-3-13-7

overview 13-3-??

TUXEDO queued messages

associating queue with group 13-10

creating application queue space and queues 13-8

listing /Q servers in SERVER section 13-11

managing 13-1-13-11

modifying the configuration file 13-10

setting the QMCONFIG environment variable 13-7

using QMADMIN 13-7

TUXEDO services

resuming 19-3

suspending 19-3

TUXEDO services in a configuration file

identifying 3-63

sample SERVICES section 3-64

U

UBBCONFIG file 15-2

configuring with netgroups 3-81

UDL 13-7

printing 22-7

ULOG 16-1, 22-8

analyzing 16-13

assigning a location for 16-6

how to use 16-3

location 16-4

maintaining 16-6

message format 16-3

purpose 16-2

when created 16-2

unsolicited messages

broadcasting 22-4

unsolicited notification in a configuration file

setting parameters of 3-23

V

VTOC

printing 22-7

W

WLE and BEA TUXEDO

differences 1-4

WLE factory-based routing example 3-74

WLE hostname capitalization

checking 22-15

WLE interface repositories

managing 8-1

worker threads 3-16

workstation clients

defined 11-2

how to connect to an application 11-5

illustration of a 2-workstation client application 11-3

managing 11-1-11-9

modifying MACHINES section to support 11-9

sample UBBCONFIG file 11-9

setting environment variables 11-5

setting number of

MAXACCESSERS parameter 11-6

MAXWSCLIENTS parameter 11-6

workstation listener (WSL), configuring 11-7

WSC (workstation client) 11-2

WSDEVICE variable 11-5

WSENFILE 11-5

WSENFILE variable 11-5

WSH (workstation handler) 11-2

WSL (workstation listener) 11-2

WSNADDR

WSDEVICE 11-5

WSNADDR variable 11-5

WSREPLYMAX variable 11-6

WSRPLYMAX 11-5

WSTYPE 11-5

WSTYPE variable 11-5