Sun Desktop Manager 1.0 Installation Guide

Configuration Agent

The Configuration Agent is part of a number of different packages, which are listed in the following table:

Solaris Package Name 

Description 

SUNWapbas 

Configuration Shared libraries 

SUNWapmsc 

Configuration Agent miscellaneous files 

SUNWapoc 

Configuration Agent 

SUNWapdc 

Configuration Agent wizard 

When you install these packages, the files that are required for this API are installed. You can install the packages manually or through the Java Desktop System installation. After installation, you must configure and enable the Configuration Agent on your system.


Note –

Configuration Agent packages are installed as part of the Solaris with Java Desktop System installation; however, the Desktop Manager patches these files during installation to provide the proper level of functionality.


To access the remote configuration data, the Configuration Agent requires some minimal bootstrap information, such as the host name and port of the LDAP server. This information is maintained in a set of properties files, such as policymgr.properties, apocd.properties, os.properties. These files are stored locally in the /etc/apoc directory. You can manually edit these properties files (see Appendix A, Configuration Parameters), or you can use the configuration wizard for the Configuration Agent.

The configuration wizard offers a graphical user interface that guides you through the necessary settings of the Configuration Agent. For each page of the wizard, a corresponding help screen is available. You can start the wizard as super user (root) by means of the /usr/bin/apoc-config script.


Note –

The wizard can also be started without launching the graphical interface. For example, execute /usr/bin/apoc-config -nodisplay to start the wizard in console mode.


Bootstrap Information

Figure 3–1 Configuration Agent, Configuration Repository

Configuration Repository and State


Note –

Associated property file keys are indicated in parentheses, where appropriate.


Figure 3–2 Configuration Agent, LDAP Hierarchy and File-Based Storage

LDAP Hierarch and File-Based storage


Note –

The screen in Figure 3–2 varies, depending on the Context Type chosen on the previous screen. Server Identifier, Server Port and Suffix are required if an LDAP or Hybrid context type is chosen. Configuration Settings URL is required if a File-based or Hybrid context type is chosen.


Figure 3–3 Configuration Agent, Authentication Mechanism

Authentication

Port Settings

The Configuration Agent uses two ports:

Figure 3–4 Configuration Agent, Port Settings

Configuration Agent, Port Settings

Change Detection Interval

The Configuration Agent periodically checks for any changes in the configuration data using the following two intervals:

You can use the general detection interval to tune the propagation of remote configuration data changes to client side applications. The value provided for this setting is the maximum length of time in minutes that elapses before remotely made changes are reflected in the client applications.

Smaller values result in increased Configuration Agent and LDAP server activity. As a result, use caution when you adjust the value of the settings. For example, in an initial deployment phase, you can set the value to one minute so that you can test the impact of remote configuration on client applications. After you complete the testing, return this setting to the initial value.

Operational Settings

Figure 3–5 Configuration Agent, Data Directory

Configuration Agent, Data Directory

The following settings can be configured:

Figure 3–6 Configuration Agent, Request Handling and Logging

Configuration Agent, Request Handling and Logging


Note –

Most of the operational settings, with the exception of the Data Directory and Connection Timeout settings, can also be maintained centrally through corresponding policies stored in the LDAP server. If you want to use this feature, do not adapt the corresponding settings by means of the wizard. Instead, use the Configuration Agent policies within the Desktop Manager to centrally specify operational settings.


Applying Agent Settings

With the exception of "Data Directory" and "Connection Timeout", operational settings that have been stored on the LDAP server by means of the Desktop Manager take effect automatically at the next change detection cycle for the agent configuration (see DaemonChangeDetectionInterval).

Figure 3–7 Configuration Agent, Summary Page

Summary page

All other settings changed locally require a reload or restart of the Configuration Agent. The reload or restart is performed automatically if you use the configuration wizard.


Note –

To manually restart the Configuration Agent, ensure that no related client applications are running, log in as root, and type the command /usr/lib/apoc/apocd restart.


Additional Agent Settings


Note –

The following settings are not available in the configuration wizard.


Using Local Policy

You may configure the Configuration Agent to apply configuration settings from locally deployed policy in addition to or as an alternative to any globally available policy. Use the following steps to deploy any such local policy:

ProcedureDeploying a Local Policy

Steps
  1. Using the Desktop Manager create a profile with the required policy settings.

  2. Using the Desktop Manager export the profile to a zip file.

  3. On your client host, create the directory ${DataDir}/Policies/profiles/PROFILE_REPOSITORY_default, if it does not already exist.

    ${DataDir} corresponds to the value of the Configuration Agent's Data Directory which is /var/opt/apoc by default.

  4. Copy the previously exported zip file to ${DataDir}/Policies/profiles/PROFILE_REPOSITORY_default.

  5. Ensure that the Configuration Agent is configured to apply available local policies (see Additional Agent Settings for more details ).


    Note –

    If you change the Configuration Agent's “ApplyLocalPolicy” setting, you should reload the Configuration Agent by logging in as root and typing the command /usr/lib/apoc/apocd reload.

    Any local policy deployed in this manner will be made available to clients during the next Configuration Agent change detection cycle.


Automatic Restart of the Configuration Agent

In the event of a failure, the Configuration Agent will be automatically restarted. The service management facility ( smf(5) ) is responsible for making this decision. If the service management facility decides that a restart is inappropriate (for example, if too many failures have already occurred), the Configuration Agent is placed in maintenance mode.

In the event that the Configuration Agent is not restarted, you should disable the Agent temporarily by logging in as root and executing the command /usr/lib/apoc/apocd disable, rectify any problems causing the Agent to fail and re-enable the Agent by executing the command /usr/lib/apoc/apocd enable.