Sun Java System Application Server Enterprise Edition 8.1 2005Q2 High Availability Administration Guide

Working with Node Agents

ProcedureTo View General Node Agent Information

  1. In the tree component, select the Node Agents node.

  2. Click the name of a node agent.

    If a node agent already exists but does not appear here, start the node agent on the node agent’s host machine using asadmin start-node-agent. See Starting a Node Agent

  3. Check the node agent’s host name.

    If the host name is Unknown Host, then the node agent has not made initial contact with the Domain Administration Server (DAS).

  4. Check the node agent status.

    The status can be:

    • Running: The node agent has been properly created and is currently running.

    • Not Running: Either the node agent has been created on the local machine, but never started or the node agent was started but has been stopped.

    • Waiting for Rendezvous: The node agent is a placeholder that has never been created on the local machine.

    See Creating a Node Agent and Starting a Node Agent

  5. Choose whether to start instances on start up.

    Select Yes to start server instances associated with the node agent automatically when the node agent is started. Select No to start the instances manually.

  6. Determine whether the node agent has made contact with the Domain Administration Server.

    If the node agent has never made contact with the Domain Administration Server, it has never been successfully started.

  7. Manage server instances associated with the node agent.

    If the node agent is running, start or stop an instance by clicking the checkbox next to the instance name and clicking Start or Stop.

See Also

ProcedureTo Create a Node Agent Placeholder

Because the node agent must be created locally on the machine hosting the node agent, through the Admin Console you can only create a placeholder for a node agent. This placeholder is a node agent configuration for which a node agent does not yet exist.

After creating a placeholder, use the asadmin command create-node-agent on the machine hosting the node agent to complete the creation. For more information, see Creating a Node Agent.

For a list of the steps involved in creating and using node agents, see Deploying Node Agents

  1. In the tree component, select the Node Agents node.

  2. On the Node Agents page, click New.

  3. On the Current Node Agent Placeholder page, enter a name for the new node agent.

    The name must be unique across all node agent names, server instance names, cluster names, and configuration names in the domain.

  4. Click OK.

    The placeholder for your new node agent is listed on the Node Agents page.

Equivalent asadmin command

create-node-agent-config

See Also

ProcedureTo Delete a Node Agent Configuration

Through the Admin Console you can only delete the node agent configuration from the domain. You cannot delete the actual node agent. To delete the node agent itself, run the asadmin command delete-node-agent on the node agent’s local machine. For more information, see Deleting a Node Agent.

Before deleting the node agent configuration, the node agent must be stopped and it must not have any associated instances. To stop a node agent, use the asadmin command stop-node-agent. See Stopping a Node Agent for more information.

  1. In the tree component, select the Node Agents node.

  2. On the Node Agents page, select the checkbox next to the node agent to be deleted.

  3. Click delete.

Equivalent asadmin command

delete-node-agent-config

See Also

ProcedureTo Edit a Node Agent Configuration

  1. In the tree component, expand the Node Agents node.

  2. Select the node agent configuration to edit.

  3. Check Start Instances on Startup to start the agent’s server instances when the agent is started.

    You can also manually start and stop instances from this page.

    If this configuration is for a placeholder node agent, when you create the actual node agent using asadmin create-node-agent , it picks up this configuration. For information on creating a node agent, see Creating a Node Agent.

    If this configuration is for an existing node agent, the node agent configuration information is synchronized automatically.

See Also

ProcedureTo Edit a Node Agent Realm

You must set an authentication realm for users connecting to the node agent. Only administration users should have access to the node agent.

  1. In the tree component, expand the Node Agents node.

  2. Select the node agent configuration to edit.

  3. Click the Auth Realm tab.

  4. On the Node Agents Edit Realm page, enter a realm.

    The default is admin-realm, created when you create the node agent. To use a different realm, replace the realms in all the components controlled by the domain or the components won’t communicate properly.

  5. In the Class Name field, specify the Java class that implements the realm.

  6. Add any required properties.

    Authentication realms require provider-specific properties, which vary depending on what a particular implementation needs.

See Also

ProcedureTo Edit the Node Agent’s Listener for JMX

The node agent uses JMX to communicate with the Domain Administration Server. Therefore it must have a port to listen on for JMX requests, and other listener information.

  1. In the tree component, expand the Node Agents node.

  2. Select the node agent configuration to edit.

  3. Click the JMX tab.

  4. In the Address field, enter an IP address or host name.

    Enter 0.0.0.0 if the listener listens on all IP addresses for the server using a unique port value. Otherwise, enter a valid IP address for the server.

  5. In the Port field, type the port on which the node agent’s JMX connector will listen.

    If the IP address is 0.0.0.0, the port number must be unique.

  6. In the JMX Protocol field, type the protocol that the JMX connector supports.

    The default is rmi_jrmp.

  7. Click the checkbox next to Accept All Addresses to allow a connection to all IP addresses.

    The node agent listens on a specific IP address associated to a network card or listens on all IP addresses. Accepting all addresses puts the value 0.0.0.0 in the “listening host address” property.

  8. In the Realm Name field, type the name of the realm that handles authentication for the listener.

    In the Security section of this page, configure the listener to use SSL, TLS, or both SSL and TLS security.

    To set up a secure listener, do the following:

  9. Check the Enabled box in the Security field.

    Security is enabled by default.

  10. Set client authentication.

    To require clients to authenticate themselves to the server when using this listener, check the Enabled box in the Client Authentication field.

  11. Enter a certificate nickname.

    Enter the name of an existing server keypair and certificate in the Certificate NickName field. For more information, see Working with Certificates and SSL in Sun Java System Application Server Enterprise Edition 8.1 2005Q2 Administration Guide.

  12. In the SSL3/TLS section:

    1. Check the security protocol(s) to enable on the listener.

      You must check either SSL3 or TLS, or both protocols.

    2. Check the cipher suite used by the protocol(s).

      To enable all cipher suites, check All Supported Cipher Suites.

  13. Click Save.

See Also