ttInstanceModify
Use the ttInstanceModify utility to modify certain attributes of an instance.
The attributes that you can modify are:
-
The installation associated with this instance
-
The daemon and server port numbers
-
The
TNS_ADMINpath for the instance -
The configuration of TimesTen Replication with Oracle Clusterware for this instance
- TLS settings, if any
-
The system start up scripts
The instance that is modified is the one that $TIMESTEN_HOME references.
If you do not specify any options for this utility, ttInstanceModify displays the current value of each attribute and a prompt that allows you to keep the value or change it.
If you change any of the settings, the utility:
- Shuts down the TimesTen daemon for the instance.
- Edits the
timesten.conffile in thetimesten_home/confdirectory. - Starts the TimesTen main daemon for the instance.
Required Privilege
Run this utility as the instance administrator.
Syntax
% ttInstanceModify -h
ttInstanceModify - Modifies an existing instance
Usage:
ttInstanceModify { -help | -h }
ttInstanceModify [-install <path>] [-tnsadmin <path>] [-verbose | -v]
[-port <number>] [-serverport <number>] [-crs]
[-serverencryption <requirement>] [-serverciphersuites <suites>] [-serverwallet <path>]
Options:
-help, -h Displays this help message
-verbose, -v Displays extra information
-install Changes the installation the instance points to
-tnsadmin <path> Changes the path for the TNS_ADMIN environment variable
-port <number> Specifies a new daemon port number
-serverport <number> Specifies a new server port number
-[no]systemd Enables/disables systemd to manage TimesTen Daemon
-serverencryption <requirement> Whether client/server traffic is encrypted.
One of: accepted rejected requested required
-serverciphersuites <suites> Cipher suites used for TLS encryption.
One of, or a comma-separated list of:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
-serverwallet <path> Absolute path to the wallet directory
-crs Creates or modifies Clusterware configurationOptions
ttInstanceModify has the following options:
| Option | Description |
|---|---|
|
|
Displays help information. |
-verbose
|
Displays additional information during the operation of the utility. |
|
|
Changes the installation that the instance uses. You can use the This option is not used to upgrade to a new major release. |
|
|
Updates the instance's |
|
|
Specifies a new daemon port number. |
|
|
Specifies a new server port number. |
|
|
You can use this option to change whether systemd is used to manage the instance’s main daemon or not. This option cannot be used with Clusterware. |
|
|
Determines whether encryption is accepted, rejected, requested, or required for a client/server connection.
The See Transport Layer Security for
TimesTen Client/Server in Oracle TimesTen In-Memory Database Security
Guide regarding usage of the
|
|
|
Lists the cipher suite or cipher suites that can be used for Transport Layer Security, depending also on the client setting. There is no default setting. Specify one or more TLS version 1.3 or 1.2 cipher suites in a comma-separated list from strongest to weakest. To use TLS, the server and client settings must include at least one common suite. See Cipher Suites in TimesTen in Oracle TimesTen In-Memory Database Security Guide to learn more about the supported cipher suites and how TimesTen negotiates cipher suite selection. For more information on TLS for encrypted communication between clients and server, see Transport Layer Security for TimesTen Client/Server in Oracle TimesTen In-Memory Database Security Guide. |
-serverWallet new_wallet_dir |
If you move or copy the server wallet to a different location, you must specify this new location in the See Task 3: Configure the Server for TLS in the Oracle TimesTen In-Memory Database Security Guide for more information. |
|
|
Creates or modifies the instance's Oracle Clusterware configuration. |
Examples
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 and configures the instance
to accept the encrypted connections. It specifies a new server wallet location and
warns that you may need to manually re-create the certificates to match the updated
settings.% ttInstanceModify -serverEncryption accepted -serverciphersuites TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 -serverWallet /scratch/myinstance/conf/test INFO: Changing cipher suites. Make sure to manually re-create certificates if needed.
TLS_AES_128_CCM_SHA256 and
configures the instance to accept the encrypted
connections.% ttInstanceModify -serverEncryption accepted -serverciphersuites TLS_AES_128_CCM_SHA256 -serverWallet /scratch/myinstance/conf/test INFO: Changing cipher suites. Make sure to manually re-create certificates if needed.
TLS_AES_256_GCM_SHA384 cipher suite that does not require
re-creating the
certificates.% ttInstanceModify -serverciphersuites TLS_AES_256_GCM_SHA384 INFO: Changing cipher suites. Make sure to manually re-create certificates if needed.