+ All Categories
Home > Documents > TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software...

TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software...

Date post: 17-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
346
TIBCO ActiveMatrix® Policy Director Administration Software Release 1.0 August 2012
Transcript
Page 1: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

TIBCO ActiveMatrix® Policy DirectorAdministrationSoftware Release 1.0August 2012

Page 2: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 3: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Important Information

SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDEDOR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITEDADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLEDSOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FORANY OTHER PURPOSE.

USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF ALICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT,OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENTWHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH ISDUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT ORCLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OFTHE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOURUSE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME.

This document contains confidential information that is subject to U.S. and international copyright laws and treaties.No part of this document may be reproduced in any form without the written authorization of TIBCO SoftwareInc.

TIBCO, The Power of Now, TIBCO ActiveMatrix, and TIBCO Enterprise Message Service are either registeredtrademarks or trademarks of TIBCO Software Inc. in the United States and/or other countries.

EJB, Java EE, J2EE, and all Java-based trademarks and logos are trademarks or registered trademarks of SunMicrosystems, Inc. in the U.S. and other countries.

All other product and company names and marks mentioned in this document are the property of their respectiveowners and are mentioned for identification purposes only.

THIS SOFTWARE MAY BE AVAILABLE ON MULTIPLE OPERATING SYSTEMS. HOWEVER, NOT ALLOPERATING SYSTEM PLATFORMS FOR A SPECIFIC SOFTWARE VERSION ARE RELEASED AT THE SAMETIME. SEE THE README FILE FOR THE AVAILABILITY OF THIS SOFTWARE VERSION ON A SPECIFICOPERATING SYSTEM PLATFORM.

THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS ORIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY,FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.

THIS DOCUMENT COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGESARE PERIODICALLYADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATEDIN NEW EDITIONS OF THIS DOCUMENT. TIBCO SOFTWARE INC. MAY MAKE IMPROVEMENTS AND/ORCHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS DOCUMENT AT ANYTIME.

THE CONTENTS OF THIS DOCUMENT MAY BE MODIFIED AND/OR QUALIFIED, DIRECTLY OR INDIRECTLY,BY OTHER DOCUMENTATION WHICH ACCOMPANIES THIS SOFTWARE, INCLUDING BUT NOT LIMITEDTO ANY RELEASE NOTES AND "READ ME" FILES.

Copyright (c) 2005-2012 TIBCO Software Inc. ALL RIGHTS RESERVED.

TIBCO Software Inc. Confidential Information

1.0 --- TIBCO ActiveMatrix Policy Director

Page 4: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 5: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Contents

Preface................................................................................................15TIBCO Product Documentation..............................................................................................16

Other TIBCO Product Documentation....................................................................................17

Typographical Conventions....................................................................................................18

Connecting with TIBCO Resources........................................................................................21

Chapter 1 Administrator Interfaces................................................23Web Interface.........................................................................................................................24

Logging in to the Web Interface...................................................................................24

List View......................................................................................................................25

Graphical View.............................................................................................................26

Command-Line Interface........................................................................................................30

Invoking the Command-Line Interface.........................................................................30

Build Files....................................................................................................................30

AMXAdminTask...........................................................................................................34

Actions.........................................................................................................................37

Data Files....................................................................................................................38

Objects........................................................................................................................38

Supported Objects.......................................................................................................39

Object Formats............................................................................................................40

Object Navigation........................................................................................................41

Inter-Object Relationships...........................................................................................42

Property File Reference...............................................................................................42

DDL Script Generator..................................................................................................43

Runtime State, Action History, and Synchronization Columns ..............................................46

Action History Reference.............................................................................................50

Chapter 2 Administrator Server Management..............................51Administrator Server...............................................................................................................53

Creating an Administrator Server................................................................................53

Starting and Stopping an Administrator Server...........................................................53

Administrator Configuration Reference........................................................................54

Plug-Ins.......................................................................................................................55

Notification Server..................................................................................................................57

Authentication Realms...........................................................................................................58

TIBCO Credential Service......................................................................................................59

Editing Server Configurations.................................................................................................60

Administrator Database ..............................................................................................60

1.0 --- TIBCO ActiveMatrix Policy Director

TOC | 5

Page 6: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Administrator Server IP Address.................................................................................61

Editing the Notification Server Configuration...............................................................61

HTTP Connectors........................................................................................................62

Monitoring and Common Logging...............................................................................63

Editing the LDAP Server Configuration.......................................................................63

Chapter 3 Enterprise.......................................................................65

Chapter 4 Environments.................................................................67Creating an Environment........................................................................................................69

Environment General Reference............................................................................................70

Environment Configuration Reference...................................................................................71

Messaging Bus.......................................................................................................................73

Configuring an Environment's Messaging Bus............................................................73

Messaging Bus Reference..........................................................................................73

Chapter 5 Hosts...............................................................................77Creating a TIBCO Host Instance............................................................................................79

Registering a TIBCO Host Instance as a Windows Service...................................................80

Starting a TIBCO Host Instance.............................................................................................81

Stopping a TIBCO Host Instance...........................................................................................82

Binding Hosts to an Administrator Server..............................................................................83

Discover Hosts Reference ..........................................................................................83

Register Host Reference.............................................................................................84

Enabling Secure Communication between a Host and an Administrator Server...................85

Unregistering Hosts................................................................................................................86

GUI..............................................................................................................................86

CLI...............................................................................................................................86

Hosts Reference.....................................................................................................................87

Host General Reference.........................................................................................................88

Host Configuration Reference................................................................................................89

Host Substitution Variables Reference...................................................................................90

Host Resource Instances Reference......................................................................................91

Chapter 6 Nodes..............................................................................93Navigating to a Nodes List.....................................................................................................96

Creating a Node.....................................................................................................................97

GUI..............................................................................................................................97

CLI...............................................................................................................................97

Creating a Proxy Node...........................................................................................................99

Editing a Node......................................................................................................................100

GUI............................................................................................................................100

TIBCO ActiveMatrix Policy Director --- 1.0

6 | TOC

Page 7: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

CLI.............................................................................................................................100

Installing or Syncing Nodes..................................................................................................101

GUI............................................................................................................................101

CLI.............................................................................................................................102

Uninstalling Nodes...............................................................................................................103

GUI............................................................................................................................103

CLI.............................................................................................................................103

Starting Nodes.....................................................................................................................104

GUI............................................................................................................................104

CLI.............................................................................................................................104

Stopping Nodes....................................................................................................................105

GUI............................................................................................................................105

CLI.............................................................................................................................105

Deleting Nodes.....................................................................................................................106

GUI............................................................................................................................106

CLI.............................................................................................................................106

Updating the Port Number for a Node..................................................................................107

GUI............................................................................................................................107

CLI.............................................................................................................................107

Updating the JVM Configuration for a Node.........................................................................108

Adding a Feature to a Node.................................................................................................109

GUI............................................................................................................................109

CLI.............................................................................................................................110

Enabling and Disabling Debuggers......................................................................................111

Disabling Debuggers.................................................................................................111

Disabling Debuggers.................................................................................................111

Enabling and Disabling the Java Security Manager.............................................................113

Nodes Reference.................................................................................................................114

Node General Reference......................................................................................................115

Node Configuration Reference.............................................................................................116

Node Substitution Variables Reference................................................................................119

Chapter 7 Applications..................................................................121Deploying Applications.........................................................................................................123

GUI............................................................................................................................123

CLI.............................................................................................................................124

Undeploying Applications.....................................................................................................125

GUI............................................................................................................................125

CLI.............................................................................................................................126

Starting Applications............................................................................................................127

GUI............................................................................................................................127

CLI.............................................................................................................................127

Stopping Applications...........................................................................................................128

GUI............................................................................................................................128

1.0 --- TIBCO ActiveMatrix Policy Director

TOC | 7

Page 8: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

CLI.............................................................................................................................128

Deleting Applications............................................................................................................129

GUI............................................................................................................................129

CLI.............................................................................................................................129

Applications Reference........................................................................................................130

Displaying an Application's Dependencies...........................................................................131

Displaying an Application's Components.............................................................................132

Displaying an Application's Bindings....................................................................................133

Application Configuration Reference....................................................................................134

Application General Reference.............................................................................................136

Application UDDI Publication Reference..............................................................................138

Proxy Service Management ................................................................................................139

Registering an External Service................................................................................139

Modifying an External Service...................................................................................140

Deleting an External Service.....................................................................................140

Creating a Proxy Application.....................................................................................140

Configuring a Proxy Application................................................................................141

Updating a Proxy Application....................................................................................142

Deploying a Proxy Application...................................................................................142

Starting a Proxy Application......................................................................................143

Stopping a Proxy Application.....................................................................................143

Undeploying a Proxy Application...............................................................................143

Deleting a Proxy Application......................................................................................143

Application Folders...............................................................................................................145

Creating a Folder.......................................................................................................145

Renaming a Folder....................................................................................................145

Deleting a Folder.......................................................................................................146

Moving an Application to a Folder.............................................................................147

Services and References.....................................................................................................148

Displaying the Bindings for a Service or a Reference ..............................................148

Publishing Services in a UDDI Server.......................................................................148

Reference Details Reference.....................................................................................149

Manual Binding Reference........................................................................................150

Wire to Binding Reference.........................................................................................151

Properties.............................................................................................................................152

Setting a Property Value............................................................................................152

Editable Properties Reference...................................................................................154

Non-Editable and Policy Set Properties Reference...................................................154

Chapter 8 Object Groups.............................................................155Creating an Object Group....................................................................................................157

Publishing an Object Group.................................................................................................158

Copying a Object Group.......................................................................................................159

Deleting an Object Group.....................................................................................................160

TIBCO ActiveMatrix Policy Director --- 1.0

8 | TOC

Page 9: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter 9 Governance Controls...................................................161Creating a Governance Control............................................................................................162

Deploying a Policy................................................................................................................163

Activating a Policy................................................................................................................164

Deactivating a Policy............................................................................................................165

Undeploying a Policy............................................................................................................166

Synchronizing a Policy.........................................................................................................167

Displaying a Policy...............................................................................................................168

Copying a Policy...................................................................................................................169

Deleting a Policy...................................................................................................................170

Policy Status List..................................................................................................................171

Governance Control Templates............................................................................................172

Authentication by Kerberos Reference......................................................................172

Authentication by SiteMinder Reference...................................................................173

Authorization by Role Reference...............................................................................174

Basic Authentication Reference.................................................................................174

Basic Credential Mapping..........................................................................................174

BusinessWorks to SAML Credential Mapping Reference.........................................175

SAML to BusinessWorks Credential Mapping Reference.........................................175

Logging Reference....................................................................................................175

SAML Authentication for SSO Reference..................................................................177

SAML Credential Mapping for SSO Reference.........................................................177

User Name Token Authentication..............................................................................177

WS Reliable Messaging............................................................................................178

WS-Addressing for Reference...................................................................................178

WS-Addressing for Service.......................................................................................178

WSS Consumer Reference.......................................................................................178

WSS Provider Reference...........................................................................................180

Chapter 10 Resource Templates...................................................183Creating a Resource Template.............................................................................................184

GUI............................................................................................................................184

CLI.............................................................................................................................185

Navigating to a Resource Templates List.............................................................................186

Editing a Resource Template................................................................................................187

Deleting Resource Templates...............................................................................................189

Creating an Obfuscated Password.......................................................................................190

Hibernate..............................................................................................................................191

HTTP Client..........................................................................................................................194

Configuring Mutual Authentication.............................................................................197

HTTP Connector..................................................................................................................198

JDBC....................................................................................................................................201

1.0 --- TIBCO ActiveMatrix Policy Director

TOC | 9

Page 10: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Configuring Third-Party JDBC Drivers.......................................................................205

JMS Resource Templates.....................................................................................................206

Configuring Third-Party JMS Drivers.........................................................................206

JMS Connection Factory...........................................................................................207

JMS Connection Factory Configuration.....................................................................208

JMS Destination........................................................................................................209

JMS Destination Configuration..................................................................................209

JNDI Connection Configuration.................................................................................210

LDAP Connection.................................................................................................................213

SMTP...................................................................................................................................216

Teneo....................................................................................................................................218

Thread Pool..........................................................................................................................221

Security Resource Templates...............................................................................................223

Identity Provider.........................................................................................................223

Kerberos Authentication............................................................................................224

Kerberos Identity Provider.........................................................................................228

Keystore Provider......................................................................................................229

LDAP Authentication..................................................................................................232

Mutual Identity Provider.............................................................................................236

SiteMinder Authentication..........................................................................................237

SSL Client Provider...................................................................................................240

SSL Server Provider..................................................................................................242

Trust Provider............................................................................................................245

WS-Security ASP......................................................................................................245

Chapter 11 Substitution Variables................................................247Creating a Substitution Variable...........................................................................................248

GUI............................................................................................................................248

CLI.............................................................................................................................248

How Substitution Variables Are Resolved............................................................................250

Chapter 12 Logging.......................................................................251Log Services........................................................................................................................253

Editing Log Service Properties..................................................................................253

Log Service Property Reference...............................................................................253

Logging Appenders..............................................................................................................255

Creating a Logging Appender....................................................................................255

Logging Appender Reference....................................................................................257

Log Entry Enrichment................................................................................................259

Logging Configurations........................................................................................................261

Navigating to a Logging Configurations List..............................................................261

Creating a Logging Configuration .............................................................................261

Applying a Logging Configuration..............................................................................262

TIBCO ActiveMatrix Policy Director --- 1.0

10 | TOC

Page 11: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Logging Configuration Reference..............................................................................263

Log Viewer............................................................................................................................265

Running Searches.....................................................................................................265

Search Builder...........................................................................................................266

Log Table...................................................................................................................272

Deleting Log Entries..................................................................................................273

Payload Services..................................................................................................................275

Payload Service Properties Reference......................................................................275

Creating Additional Log and Payload Services....................................................................276

Chapter 13 Resource Instances...................................................277Creating Resource Instances on Nodes...............................................................................278

GUI............................................................................................................................278

CLI.............................................................................................................................279

Installing Resource Instances on Nodes..............................................................................280

GUI............................................................................................................................280

CLI.............................................................................................................................282

Uninstalling Resource Instances from Nodes......................................................................284

GUI............................................................................................................................284

CLI.............................................................................................................................284

Deleting Resource Instances from Nodes............................................................................286

GUI............................................................................................................................286

CLI.............................................................................................................................286

Resource Instances Reference............................................................................................287

Chapter 14 Resource Adapters....................................................289Adding Resource Adapters to the Enterprise.......................................................................290

GUI............................................................................................................................290

CLI.............................................................................................................................290

Setting Host Resource Adapters..........................................................................................291

GUI............................................................................................................................291

CLI.............................................................................................................................291

Removing Resource Adapters from a Host..........................................................................292

GUI............................................................................................................................292

CLI.............................................................................................................................292

Chapter 15 Secure Communication Channels............................295Trust Stores..........................................................................................................................298

Creating a Trust Store Keystore.................................................................................298

Configuring a Trust Store...........................................................................................298

Enabling Secure Communication Channels Using Command-Line Scripts.........................300

HTTP Connector .......................................................................................................300

External Database ....................................................................................................300

1.0 --- TIBCO ActiveMatrix Policy Director

TOC | 11

Page 12: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Database Authentication Realm ...............................................................................301

LDAP Authentication Realm .....................................................................................301

Installing Unlimited Jurisdiction Files....................................................................................302

Chapter 16 Users, Groups, and Permissions..............................303Users....................................................................................................................................304

Creating a User.........................................................................................................304

Changing a User Password.......................................................................................304

Resetting a User Password.......................................................................................304

Superusers...........................................................................................................................306

Assigning Superuser Privileges.................................................................................306

Removing Superuser Privileges................................................................................307

Groups..................................................................................................................................308

Adding Users to Groups............................................................................................308

Deleting Users from Groups......................................................................................309

Creating a Root Group..............................................................................................310

Creating a Subgroup.................................................................................................310

Deleting a Group.......................................................................................................311

Permissions..........................................................................................................................312

Setting Object-Specific Permissions..........................................................................313

Setting Enterprise Permissions.................................................................................313

Permission Reference...............................................................................................314

Chapter 17 Monitoring...................................................................319Monitoring Service...............................................................................................................320

Disabling the Monitoring Service...............................................................................320

Enabling and Disabling Extended Monitoring............................................................321

Configuring a Fault Tolerant Monitoring Service........................................................321

Updating the Messaging Configuration ....................................................................322

Metrics Reference.....................................................................................................323

Dashboards..........................................................................................................................330

Displaying the Dashboards........................................................................................330

Filter Criteria Gadget.................................................................................................330

Setting Dashboard Preferences................................................................................331

Drilling Down into Objects.........................................................................................332

Dashboard Controls...................................................................................................332

Chapter 18 UDDI Servers..............................................................333Registering a UDDI Server...................................................................................................334

GUI............................................................................................................................334

Setting the Default UDDI Server..........................................................................................336

Configuring SSL Communication.........................................................................................337

UDDI Server Reference.......................................................................................................338

TIBCO ActiveMatrix Policy Director --- 1.0

12 | TOC

Page 13: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Appendix A Troubleshooting........................................................341

1.0 --- TIBCO ActiveMatrix Policy Director

TOC | 13

Page 14: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

TIBCO ActiveMatrix Policy Director --- 1.0

14 | TOC

Page 15: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Preface

TIBCO ActiveMatrix® Policy Director software is part of the TIBCO ActiveMatrix product family, which is aservice-oriented architecture (SOA) infrastructure. ActiveMatrix provides flexible control over security andother aspects of SOA enterprises.

TIBCO ActiveMatrix Policy Director enables policy-based SOA governance by allowing the managementand enforcement of cross-functional requirements independent of their implementation and deployment.

1.0 --- TIBCO ActiveMatrix Policy Director

Page 16: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

TIBCO Product Documentation

This section lists documentation resources you may find useful.

The following documents form the TIBCO ActiveMatrix Policy Director documentation set:• Concepts: Read this manual before reading any other manual in the documentation set. This manual

describes terminology and concepts of the TIBCO ActiveMatrix Policy Director platform. The other manualsin the documentation set assume you are familiar with the information in this manual.

• Development Tutorials: Read this manual for a step-by-step introduction to the process of creating, packaging,and running composites in TIBCO Business Studio.

• Composite Development: Read this manual to learn how to develop and package composites.• Java Component Development: Read this manual to learn how to configure and implement Java components.• Mediation Component Development: Read this manual to learn how to configure and implement Mediation

components.• Mediation API Reference: Read this manual to learn how to develop custom Mediation tasks.• Spring Component Development: Read this manual to learn how to configure and implement Spring

components.• WebApp Component Development: Read this manual to learn how to configure and implement Web

Application components.• Administration Tutorials: Read this manual for a step-by-step introduction to the process of creating and

starting the TIBCO ActiveMatrix runtime, starting TIBCO ActiveMatrix servers, and deploying applicationsto the runtime.

• Administration: Read this manual to learn how to manage the runtime and deploy and manage applications.• Installation and Configuration: Read this manual to learn how to install the TIBCO ActiveMatrix Policy

Directorsoftware and create and upgrade runtime objects.• Release Notes: Read this manual for a list of new and changed features, steps for migrating from a previous

release, and lists of known issues and closed issues for the release.

The documentation for the following features is installed separately:

TIBCO ActiveMatrix Implementation Type for Microsoft CLR

TIBCO ActiveMatrix Policy Director --- 1.0

16 | Preface

Page 17: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Other TIBCO Product Documentation

You may find it useful to read the documentation for the following TIBCO products:• TIBCO Enterprise Message Service™

1.0 --- TIBCO ActiveMatrix Policy Director

Preface | 17

Page 18: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Typographical Conventions

Table 1: General Typographical Conventions

UseConvention

TIBCO products are installed into an installation environment. A product installed intoan installation environment does not access components in other installation environments.

TIBCO_HOME

ENV_NAME Incompatible products and multiple instances of the same product must be installed intodifferent installation environments. An installation environment consists of the followingproperties:• Name - Identifies the installation environment. The name is appended to the name of

Windows services created by the installer and is a component of the path to the productshortcut in the Windows Start > All Programs menu. This name is referenced indocumentation as ENV_NAME.

• Path - The folder into which the product is installed. This folder is referenced indocumentation as TIBCO_HOME.

The folder that stores configuration data generated by TIBCO products. Configurationdata can include sample scripts, session data, configured binaries, logs, and so on. Thisfolder is referenced in documentation as CONFIG_HOME.

CONFIG_HOME

Code font identifies commands, code examples, filenames, pathnames, and outputdisplayed in a command window. For example:

code font

• Use MyCommand to start the foo process.• Code example:

public class HelloWorldImpl extends AbstractHelloWorldImpl {... public HelloResponseDocument sayHello(HelloRequestDocument firstName) { ... System.out.println("--> Generating Java Hello Component Response...");

String name = firstName.getHelloRequest()==null||firstName.getHelloRequest(). equals("")?"Friend":firstName.getHelloRequest(); HelloResponseDocument resp = HelloResponseDocument.Factory.newInstance(); resp.setHelloResponse("Hi " + name + "! " + "This is the Java component.\n");

System.out.println("--> Java Hello Component Response: \n\t\t" + resp.getHelloResponse()); ... }}

• CONFIG_HOME/admin/enterpriseName/samples/remote_props.properties

• Output example:C:\Program Files\tibco\amx-3\studio\3.5\eclipse>amx_eclipse_ant.exe -buildfile "C:/helloworld1/build.xml" -data "C:/hws"Buildfile: C:/helloworld1/build.xml

createApplicationDAA:[sds.createDAA] Waited for 47ms for workspace refreshes after building features.

all:BUILD SUCCESSFUL

BUILD SUCCESSFULTotal time: 2 minutes 18 seconds

TIBCO ActiveMatrix Policy Director --- 1.0

18 | Preface

Page 19: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

UseConvention

Bold code font is used in the following ways:bold code font

• In procedures, to indicate what a user types. For example: Type admin.• In large code samples, to indicate the parts of the sample that are of particular interest.• In command syntax, to indicate the default parameter for a command. For example,

if no parameter is specified, MyCommand is enabled:

MyCommand [enable | disable]

Italic font is used in the following ways:italic font

• To indicate a document title. For example: See TIBCO BusinessWorks Concepts.• To define new terms. For example: A keystore is a database of keys and certificates.• To indicate a variable in a command or code syntax that you must replace. For example:

MyCommand pathname.

Key name separated by a plus sign indicate keys pressed simultaneously. For example:Ctrl+C.

Key names separated by a comma and space indicate keys pressed one after the other.For example: Esc, Ctrl+Q.

Keycombinations

The note icon indicates information that is of special interest or importance, for example,an additional action required only in certain circumstances.

The tip icon indicates an idea that could be useful, for example, a way to apply theinformation provided in the current section to achieve a specific result.

The warning icon indicates the potential for a damaging situation, for example, data lossor corruption if certain steps are taken or not taken.

Table 2: Syntax Typographical Conventions

UseConvention

An optional item in command syntax.

For example:

[ ]

MyCommand [optional_parameter] required_parameter

A logical ’OR’ that separates multiple items of which only one may be chosen.

For example, you can select only one of the following parameters:

|

MyCommand param1 | param2 | param3

A logical group of items in a command. Other syntax notations may appear within eachlogical group.

For example, the following command requires two parameters, which can be either thepair param1 and param2, or the pair param3 and param4.

{ }

MyCommand {param1 param2} | {param3 param4}

In the next example, the command requires two parameters. The first parameter can beeither param1 or param2 and the second can be either param3 or param4:

MyCommand {param1 | param2} {param3 | param4}

1.0 --- TIBCO ActiveMatrix Policy Director

Preface | 19

Page 20: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

UseConvention

In the next example, the command can accept either two or three parameters. The firstparameter must be param1. You can optionally include param2 as the second parameter.And the last parameter is either param3 or param4.

MyCommand param1 [param2] {param3 | param4}

TIBCO ActiveMatrix Policy Director --- 1.0

20 | Preface

Page 21: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Connecting with TIBCO Resources

How to Join TIBCOmmunity

TIBCOmmunity is an online destination for TIBCO customers, partners, and resident experts. It is a place toshare and access the collective experience of the TIBCO community. TIBCOmmunity offers forums, blogs,and access to a variety of resources. To register, go to http://www.tibcommunity.com.

How to Access TIBCO Documentation

After you join TIBCOmmunity, you can access the documentation here: http://docs.tibco.com.

How to Contact TIBCO Support

For comments or problems with this manual or the software it addresses, contact TIBCO Support as follows:• For an overview of TIBCO Support, and information about getting started with TIBCO Support, visit this

site:

http://www.tibco.com/services/support

• If you already have a valid maintenance or support contract, visit this site:

https://support.tibco.com

Entry to this site requires a username and password. If you do not have a username, you can request one.

1.0 --- TIBCO ActiveMatrix Policy Director

Preface | 21

Page 22: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 23: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

1Administrator Interfaces

TIBCO SilverTIBCO ActiveMatrix Administrator provides two interfaces for interacting with Administrator: weband command-line.

Web Interface

The web interface provides access to all Administrator functionality through a browser.

Command-Line Interface

The command-line interface provides a set of Ant tasks to execute most Administrator functions. You use thecommand-line interface for repetitive application of standard actions on large numbers of objects.

Sample command-line scripts are provided in CONFIG_HOME/admin/enterpriseName/samples.

The web interface is asynchronous in nature and allows you to perform other actions while one is in progress.The command-line interface, on the other hand, is synchronous. Any action invoked by a command-linescript waits till the action is complete before proceeding to execute the next action.

Topics

• Web Interface• Command-Line Interface• Runtime State, Action History, and Synchronization Columns

1.0 --- TIBCO ActiveMatrix Policy Director

Page 24: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Web Interface

The Administrator web interface provides access to all TIBCO SilverTIBCO ActiveMatrix Administratorfunctions. The web interface displays TIBCO SilverTIBCO ActiveMatrix objects in two views: list and graphical.

Figure 1: TIBCO SilverTIBCO ActiveMatrixAdministrator

Logging in to the Web Interface

Procedure

1. Open a browser and navigate to the URL http://hostname:port/amxadministrator, where hostname and portare the connection properties you specified when you created the Administrator server. The default URLis http://localhost:8120/amxadministrator.The Administrator login page displays.

2. In TIBCO TIBCO Silver Center, click the Administrator button.The Administrator login page displays.

3. Enter the credentials you specified when you created the instance group Administrator server.The Administrator login page displays.

ResultsYou are logged into the web interface and can perform any operations for which you have permission forthe duration of a session. If you do not perform any actions for the session timeout value (default 30 minutes)set when you created the Administrator server, the session times out and you are automatically logged out.The session timeout value is set when creating the Administrator server using TIBCO Configuration Tool.

TIBCO ActiveMatrix Policy Director --- 1.0

24 | Administrator Interfaces

Page 25: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

After successfully logging into the web interface, the Welcome Page displays. You can use the task linksprovided on the Welcome Page or use the menu structure.

The Welcome Page can be accessed anytime by selecting Dashboards > Welcome Page.

List View

In the list view, collections of managed objects are displayed using a master-detail paradigm. The masterportion is a list that displays the collection. The master portion also offers action buttons that apply to theselected object in the list. The bottom pane displays the properties of a selected object.

Displaying the List View

•Click List View in the Enterprise Graphical View toolbar.

• Select a menu option in the Administratortoolbar.

Interacting with the List View

The commonly used patterns for displaying objects in the list view are described below.

Flat Lists

The following figure displays a typical flat list which is displayed as a table.

If there are no objects, the list is empty. If there are objects, an item is not selected when the page is opened:You must select an item in the list to display the details of the object. If an item is selected in a table, the detailsfor that item are displayed in the Details area.

A flat list has the following interactions:• Click on a row to select it.• Click the refresh icon to refresh the list. You may have to manually refresh the list periodically, especially

when invoking an action and are waiting to see the results of your action on the items in the list.• You can click column headings to sort by that column. Each click toggles between ascending and descending

sort.• Some columns appear as hyperlinks. Click the hyperlinks to view additional information.• Some a flat lists provide a filter. Select a value from the drop-down list to view items that match the chosen

type.

Tree Lists

A tree list displays a hierarchy of items, such as components of an application or appenders for a loggingconfiguration.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 25

Page 26: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

A tree list has the following interactions:• By default, each level is always in alphabetical order (ascending A-Z).• The top level entry is the first entry in the tree table.• Expand and collapse icons are displayed for all parent and child levels except the last level in the list.

Graphical View

The graphical view is an alternative to the list view. The graphical view displays Administrator objects in agraphical canvas. The graphical canvas can display a logical or physical view of the objects. The logical viewdisplays the enterprise from the perspective of the logical administrative entities maintained by Administrator:environments and applications.

Silverlight is required to view the graphical view and the monitoring dashboards. Refer to the readmefile for the supported versions.

At a higher level, the graphical view displays a wide view of your enterprise. You can zoom in on a particularobject to view more details. Using the graphical view, you can visualize associations between objects in yourenterprise.

The physical view displays the enterprise from the perspective of the physical processes managed byAdministrator: hosts and nodes.

TIBCO ActiveMatrix Policy Director --- 1.0

26 | Administrator Interfaces

Page 27: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Displaying the Graphical View

About this task

Choose one of the following options to display the graphical view:• Choose Infrastructure > Enterprise Graphical View•

Click in the toolbar of an object list.

Interacting with the Graphical View

The graphical view has the following interactions:• Choose between Logical and Physical View from the drop-down list located at the left hand side of the

display.• The slider located on the right side of the display is used to zoom in and out of the current view.• The Refresh button updates the data for the objects being displayed.• Breadcrumbs along the top center can be used to navigate from drilled into objects back up to a higher

level view.• The mouse wheel zooms in and out centered on the cursor's location.• The large black gray squares with arrows, located towards the bottom of the screen, scroll in the direction

of the arrow and appear when some object is out of view.•

Click the button to hide the browser controls and to display over the entire screen. Press the ESC keyto exit the full screen mode.

•Click to drill into the selected object.

• The indicators at the top of object boxes indicate the status of the object:– - running– - unknown– - stopped

• Re-size the boxes to display detailed information.• In the logical view, use the Application Template tab located at the bottom of the screen to drag applications

templates to environments to create applications.• In the physical view, use the Resource Templates tab located at the bottom of the screen to drag resource

templates to a node to create a resource instance or a host to create a resource instance on each node inthe host.

• The services (rendered in green) and references (rendered in pink) in the logical view can be used to wiretogether applications or environments.– The Wire option from the object menu allows you to pick targets from a list.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 27

Page 28: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

– The FreeWire option from the object menu allows you to drag and drop.

Menus

Selecting a single object adds a menu of the actions that can be performed on that object. The contents of themenu depend on the selected object.

Wiring Using the Graphical View

About this task

The services (rendered in green) and references (rendered in pink) in the logical view can be used to wiretogether applications or environments.

Procedure

1. Drill down into an application till the services and references are visible.2. Click the reference.

The object menu is enabled.3. Access the FreeWire option.

– If wiring a reference to a service, click the FreeWire option and hold down the mouse button for a fewseconds till the wire is visible.

– If wiring a service to a reference, double click the FreeWire option.

The wiring aid tool box appears. The following figure shows an example of a tool box displayed whenwiring a service to a reference.

4. Wire the components.DescriptionOption

When wiring a reference to a service, guide the wire across the screen. Onreaching a suitable target service, the color of the wire changes to blue andthe service is expanded to display its bindings. Choose a binding.

Wiring a reference to aservice

Wiring a service to areference

1. When wiring a service to a reference, the service expands to display itsbindings.

2. Choose a binding.

The wire is enabled.

3. Guide the wire across the screen. On reaching a suitable target reference,the color of the wire changes to blue. Release the mouse button whenover the desired reference.

The wire is created. The wiring aid tool box displays the updated information for a few seconds before itdisappears.

TIBCO ActiveMatrix Policy Director --- 1.0

28 | Administrator Interfaces

Page 29: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

What to do next

To delete a wiring, select the wire and press the delete button on your keyboard.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 29

Page 30: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Command-Line Interface

The Administrator command-line interface (CLI) provides access to most TIBCO SilverTIBCO ActiveMatrixAdministrator functions that change the state of Administrator objects. In particular, it supports adding,editing, and deleting, installing and uninstalling, and starting and stopping objects, setting properties andsubstitution variables, and distributing application components to nodes. You can use the CLI for repetitiveapplication of standard actions on large numbers of objects.

The CLI is based on the Ant open source build tool and is implemented in an Ant task named AMXAdminTask.You specify the Ant task in a build target within an Ant build file. Each instance of AMXAdminTask in thebuild file specifies an action to be performed on one or more objects specified in a data file.

The CLI invokes web services exposed by the Administrator server. You specify the Administrator serverlocation and user credentials in a property file.

Sample Build, Data, and Property FilesSample build and data files for many of the objects supported by the command-line interface are providedin CONFIG_HOME/admin/enterpriseName/samples. A sample property file is provided inCONFIG_HOME/admin/enterpriseName/samples/remote_props.properties, where enterpriseName is the namespecified for the Administrator enterprise when you created the Administrator server. Before using thissample file, replace the host portion of the adminURL property with the public DNS address of your TIBCOSilverTIBCO ActiveMatrix master instance, the port with 8120, Administrator server and the username andpassword properties with the credentials of a user that has been granted the permissions required to executethe actions in the script.

Invoking the Command-Line Interface

Before you begin1. Download Ant from http://ant.apache.org, install as directed in the Ant documentation.2. Increase the JVM permgen size:

– Windows - Add set ANT_OPTS=-Xmx1024m -XX:MaxPermSize=256m -XX:PermSize=128m to%USERPROFILE%\antrc_pre.bat

– UNIX - Add export ANT_OPTS="-Xmx1024m -XX:MaxPermSize=256m -XX:PermSize=128m to~/.antrc

3. Confirm the value of ANT_OPTS before executing CLI scripts from the command prompt.

About this task

To invoke the command-line interface:

Procedure

1. Add the Ant executable to your path.2. Run ant -f build.xml, where build is the name of the build configuration file.

ResultsThe output states the results of each action specified in the default target in the build file.

Build Files

The Ant build file for the command-line interface must contain the following elements: import, project,target, and AMXAdminTask.

TIBCO ActiveMatrix Policy Director --- 1.0

30 | Administrator Interfaces

Page 31: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

import Element

The import element identifies the task definition file, which defines the path to the libraries required byAMXAdminTask.

Set the file attribute to CONFIG_HOME/admin/amxadmin/samples/admin-scripts-base.xml. For example:<import file="C:/Documents and Settings/AMX-User/ApplicationData/amx-3/data/admin/amxadmin/samples/admin-scripts-base.xml"/>

project Element

The project element declares the default build target for the build.xml file. taskdef and target aresubelements of the project. The optional default attribute allows you to specify a default target. You canchoose any target from the build file to be the default target.<project default="target"> <taskdef ... /> <target name="target" ... /></project>

target Element

The target element specifies the actions performed for an execution of the command line interface via theAMXAdminTask subelement. In a target you can provide a depends attribute containing a list of targets.Each target will be run in order until one fails or the list completes.<target name="target"> <AMXAdminTask ... /></target>

Example Build File

The following build file defines targets to upload a distributed application archive, create an application,map an application to a node, create a resource template, create a resource instance and install it in a node,and deploy an application.<project default="all">

<!-- TIBCO ActiveMatrix installation location--> <property name="TIBCO-HOME" value="C:\bs"/> <property name="ADMIN-VERSION" value="3.1"/> <property name="remote-properties.file" value="${basedir}/Server.properties"/>

<!-- Import TIBCO Administrator CLI tasks and classes --> <import file="${TIBCO-HOME}/administrator/${ADMIN-VERSION}/scripts/basic_cli.xml" />

<!-- Default task for this build file --> <target name="all" depends="upload.daa, create.app, edit.properties, wire.application, distribute.app, deploy.app, start.app" description="Default target group, execute following targets: upload.daa, create.app,

edit.properties, wire.application, distribute.app, deploy.app, start.app"/>

<!-- Upload DAA specified in the data file --> <target name="upload.daa" description="Uploading Application"> <AMXAdminTask action="add" objectSelector="DAA" remote="true" propsFile="${remote-properties.file}" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="false" /> </target>

<!-- create the application --> <target name="create.app" description="Creating Application"> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="add" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment//Application" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" /> </target>

<!-- configure properties of the application, and create resource instances if needed

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 31

Page 32: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

--> <target name="edit.properties" description="Editing Properties">

<!-- create resource template --> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="add" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="ResourceTemplate" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" />

<!-- add all require resource instances --> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="add" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment/Node/ResourceInstance" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" />

<!-- install instances added above --> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="install" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment/Node/ResourceInstance" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" />

<!-- override values for properties --> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="edit" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment//Application/Property | Environment//Application//PromotedService//Binding/Property | Environment//Application//PromotedReference//Binding/Property" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" />

</target>

<!-- create wires to other applications --> <target name="wire.application" description="Wiring Application"> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="set" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="//PromotedReference/Wire" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" /> </target>

<target name="distribute.app" description="Distributing Application"> <AMXAdminTask action="set" objectSelector="Environment//Application//Component/Node | Environment//Application//PromotedService//Binding/Node | Environment//Application//PromotedReference//Binding/Node" remote="true" propsFile="${remote-properties.file}" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="false"/>

</target>

<!-- deploy the application --> <target name="deploy.app" description="Deploying Application"> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="deploy" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment//Application" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" /> </target>

<target name="start.app" description="Starting Application"> <AMXAdminTask remote="true" propsFile="${remote-properties.file}" action="start" dataFile="${basedir}/jv.phonebook.soa.deployment-config.xml" objectSelector="Environment//Application" overwrite="false" merge="true" createIfNotExists="true" force="false" failOnError="true" /> </target>

</project>

<project default="all"> <import file="C:/Documents and

TIBCO ActiveMatrix Policy Director --- 1.0

32 | Administrator Interfaces

Page 33: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Settings/AMX-User/ApplicationData/amx-3/data/admin/amxadmin/samples/admin-scripts-base.xml"/>

<target name="all" depends="upload.daa, create.app, map.app.to.node, create.rt, create.ri, install.ri, deploy.app"/>

<target name="upload.daa"> <AMXAdminTask propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="add" dataFile="dateMgr_data.xml" objectSelector="DAA" failOnError="true"/> </target>

<target name="create.app"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="add" dataFile="dateMgr_data.xml" objectSelector="Environment//Application" failOnError="true"/> </target>

<target name="map.app.to.node"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="set" dataFile="dateMgr_data.xml" objectSelector="Environment//Application/Node" failOnError="true"/> </target>

<target name="create.rt"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="add" dataFile="dateMgr_data.xml" objectSelector="ResourceTemplate" failOnError="true"/> </target>

<target name="create.ri"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="add" dataFile="dateMgr_data.xml" objectSelector="Environment/Node/ResourceInstance" failOnError="true"/> </target>

<target name="install.ri"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="install" dataFile="dateMgr_data.xml" objectSelector="Environment/Node/ResourceInstance" failOnError="true"/> </target>

<target name="deploy.app"> <AMXAdminTask remote="true" propsFile="C:/amx-3data/admin/amxadmin/samples/remote_props.properties" action="deploy" dataFile="dateMgr_data.xml" objectSelector="Environment//Application" failOnError="true"/> </target>

</project>

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 33

Page 34: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

AMXAdminTask

AMXAdminTask specifies an action, data and property files, the objects on which the action is performed,and various behavioral attributes.

<AMXAdminTask action="action" dataFile="path to data file" propsFile="path to properties file" [createIfNotExists = "{true|false}"] [failOnError="{true|false}"] [force="{true|false}"] [merge="{true|false}"] [objectSelector="XPath expression"] [options="nostart|immediate|terminate|resolve|auto-resolve|stable|handle-dependencies"]

[overwrite="{true|false}"] [timeout="timeout value"/>

Parameters

DescriptionReq?TypeAttribute

The action to be performed on the objects in the data file. The action iscase insensitive.

YesStringaction

• Unless objectSelector is specified, the action is applied to everyobject in the data file.

• The order in which the action is applied to the objects is either breadthfirst or depth first. The method used is determined by the action.– Breadth first - add, edit, install, start, stop– Depth first - delete, uninstall

• Some actions are not performed against certain object formats.– For the most part, add and edit are applied only to objects specified

in full format. Objects not in this format are skipped.

Applicable to the edit action.

If an object is to be edited but doesn’t yet exist and this flag is true, thenthe object is added.

NoBooleancreateIfNotExists

If this flag is false and the object to be edited doesn't exist, an error isreported.

Default: true.

The path to the XML file containing the object data.YesStringdataFile

Causes the Ant task to fail when an unrecoverable error is reported. Theoption stops processing of targets in the depends list or specified on thecommand line.

NoBooleanfailOnError

Forces an action even if the object has dependent objects or is not in theappropriate state. Applies to the following actions and objects:

NoBooleanforce

• delete - Node, Application, Environment, ResourceTemplate,ResourceInstance

• undeploy - Application• stop - Application, Component, Binding• uninstall - Node, ResourceInstance

For example:

TIBCO ActiveMatrix Policy Director --- 1.0

34 | Administrator Interfaces

Page 35: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionReq?TypeAttribute

• A node must be in the uninstalled state before it can be deleted and itmust be stopped before it can be uninstalled. If any problems occurmoving the node to one of these states, and force is true, the node isdeleted even if it is not in the uninstalled state or uninstalled even ifit is not stopped.

• An application must be in the undeployed state before it can be deletedand it must be stopped before it can be undeployed. If any problemsoccur moving the application to one of these states, and force is true,the application is deleted even if it is not in the undeployed state.

You should exercise extreme caution when using this option as itmay leave your system in a non-working state.

Default: false.

Applicable to the add action, and only if the overwrite flag was used andis true.

If an object to be added already exists and

NoBooleanmerge

• If merge is true and overwrite is true, then the existing object isoverwritten by merging with the new object. That is, the old object'sdata is updated with the new object's data.

• If merge is false but overwrite is true, then the existing object isdeleted and replaced by the new object. The old object's children andaccess control lists, if any, are lost in the process.

Default: true.

Specifies the set of objects to be processed by an XPath expression. Forinformation on the XPath language, see http://www.w3.org/TR/xpath.If this attribute is not specified:

NoStringobjectSelector

• All of the objects in the data file are processed.• The heuristic used to determine the order in which the objects are

processed depends on the action option.

The following actions have additional options:NoStringoptions

• deploy - nostart prevents applications from being started afterdeployment.

• stop - immediate allows applications, components, bindings, andnodes to perform a quick cleanup and then stop. terminate appliesonly to nodes and causes the node process to be killed without anycleanup.

• install, add, remove, deploy, undeploy - resolve causes nodes to berestarted when a node is installed, a feature is added or removed froma node, or an application is deployed or undeployed from a node.

auto-resolve applies to the resource instance. It causes the node tobe re-started only if needed.

stable is an option available when installing resource instances.

handle-dependenciesre-installs all dependant resource instancesand restart applications that use these resource instances.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 35

Page 36: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionReq?TypeAttribute

Applicable to the add action. If an object to be added already exists andthe overwrite is true, then the existing object is overwritten.

There are two ways in which an object can be overwritten: it can bemerged, or created from scratch. The strategy used is determined by themerge option.

No.Booleanoverwrite

Default: true.

The path to the properties file containing the Administrator server locationand user-specific information data.

YesStringpropsFile

Used when deleting an object.

When set to true, no attempt is made to delete the object if it does notexist.

NoBooleanskipIfNotExists

When set to false, an error is reported if the object to be deleted does notexist.

Default: false.

Length of time in seconds that a target will wait for an action to completebefore reporting an error. If a timeout occurs and failOnError is true,

NoIntegertimeout

the Ant task will fail. If a timeout occurs and failOnError is false, thescript will report an error but the script will continue to process targets.

This option applies only to the following asynchronous actions and objects:• deploy, undeploy - Application, Plug-in• install and uninstall - Node, ResourceInstance• start - Node

Default: 0, which means the task will never time out. You should notchange the default unless you are creating large amounts of data andleaving the script run unattended or have a requirement that node startupsatisfies a timing constraint.

create

Assume you have an environment env1 in the database. Your data file has environment env1 and a nodenode1. If you specify the edit action and• createIfNotExists = false. env1 already exists, so its data is edited to match env1 in the data file. node1

doesn’t exist, so is not updated.• createIfNotExists = true. env1 already exists, so its data is edited to match env1 in the data file. node1doesn’t

exist, so it is added to env1.

force

Assume you have an environment env1 and node node1 in both the database and the data file. node1 is inthe Started state. If you do a delete and• force = false. node1 is in the Started state. There are two possible outcomes:

– The stop and uninstall are successful. node1 and env1 are deleted.– The stop or uninstall fails. node1 is not in the uninstalled state so it cannot be deleted. The delete does

not complete.

• force = true. node1 is in the Started state. There are two possible outcomes:– The stop and uninstall are successful. node1 is deleted. env1 is deleted.– The stop or uninstall fails. node1 is not in the uninstalled state but is forcefully deleted. env1 is deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

36 | Administrator Interfaces

Page 37: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

objectSelector

• objectSelector="//*"

Process all objects.

• objectSelector="//Node"

Process all nodes.

• objectSelector=”/Environment[@name=’env1’]/Node[@name=’node1’]"

Process node1 in environment env1.

overwrite and merge

Assume you have environment env1 and node2 in the database. If you specify the add action with a data filethat contains env1 and node1:• overwrite = false (merge is then ignored). Nothing happens to env1. node1 is added.• overwrite = true and merge = false. env1 is deleted and replaced with the env1 in the data file and node2

is deleted. node1 doesn’t exist yet and is added.• overwrite = true and merge = true. The existing env1 is updated with data from the env1 in the data file.

Nothing happens to node2 and node1 is added.

Actions

The actions that can be performed with the command-line interface affect either the objects contained in thedatabase or the objects executing in the TIBCO SilverTIBCO ActiveMatrix runtime.

Database Actions

Database actions modify the objects contained in the Administrator database:• add - Add an object or an association between objects, such as between an application and a node.• edit - Edit an object.• delete - Delete an object or an association between objects. When you delete an object, the entire tree rooted

at the object is deleted starting at the leaves.• set - Set the value of a substitution variable, map an application, component or binding to a node, set a

property of a binding. This action deletes any existing entries that aren't present in the new set and addsany entries in the new set that weren't in the database.

• upgrade - Upgrade an existing application.• promote - Make a service or reference available at the environment level for cross-environmental wiring.• demote - Make a service or reference unavailable at the environment.• resetPassword - Reset a user password.

Runtime Actions

Runtime actions modify the state of the objects contained in the TIBCO SilverTIBCO ActiveMatrix runtime:• install - Install node on a host or a resource instance on a node.• uninstall - Uninstall a node from a host or a resource instance from a node.• deploy - Deploy a component or binding to a node, a logging configuration for a host, node, application,

or component, a plug-in to the Administrator server. Also undeploys components and bindings fromnodes they are no longer mapped to.

• undeploy - Undeploy an application or plug-in.• start - Start a node, application, component, or binding.• stop - Stop a node, application, component, or binding.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 37

Page 38: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Data Files

The data file is an XML file that specifies attributes of the objects that are operated on by AMXAdminTask.The structure of a data file is:<amxdata_base:Enterprisexmlns:amxdata="http://tibco.com/amxadministrator/command/line/types"xmlns:amxdata_base="http://tibco.com/amxadministrator/command/line/types_base"xmlns:amxdata_reference="http://tibco.com/amxadministrator/command/line/types_reference"xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:schemaLocation="http://tibco.com/amxadministrator/command/line/types ../schemas/amxdata.xsd http://tibco.com/amxadministrator/command/line/types_base ../schemas/amxdata_base.xsd http://tibco.com/amxadministrator/command/line/types_reference ../schemas/amxdata_reference.xsd">

Objects

</amxdata_base:Enterprise>

Example Data File

The following data file defines a node named admin01-node and an application named JavaDateManagerSoain an environment named hw, a resource instance named datemgrConnector on the node, a mapping of theapplication to the node, an application template named JavaDateManagerSoa, a resource template namedDateMgrConnectorTemplate, and a distributed application archive.

<amxdata_base:Enterprisexmlns:amxdata="http://tibco.com/amxadministrator/command/line/types"xmlns:amxdata_base="http://tibco.com/amxadministrator/command/line/types_base"xmlns:amxdata_reference="http://tibco.com/amxadministrator/command/line/types_reference"xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:schemaLocation="http://tibco.com/amxadministrator/command/line/types ../schemas/amxdata.xsd http://tibco.com/amxadministrator/command/line/types_base ../schemas/amxdata_base.xsd http://tibco.com/amxadministrator/command/line/types_reference ../schemas/amxdata_reference.xsd">

<Environment xsi:type="amxdata:Environment" name="hw" >

<Node xsi:type="amxdata_base:Node_base" name="admin01-node"> <ResourceInstance xsi:type="amxdata:ResourceInstance" name="datemgrConnector" resourceTemplateName="DateMgrConnectorTemplate"/> </Node>

<Application xsi:type="amxdata:Application" name="datemanager" importBindings="true"> <Node name="admin01-node" environmentName="hw"/> <ApplicationTemplate xsi:type="amxdata_reference:ApplicationTemplate_reference" name="JavaDateManagerSoa"/> </Application>

</Environment>

<ResourceTemplate xsi:type="amxdata:HttpConnectorResourceTemplate" name="DateMgrConnectorTemplate" host="localhost" port="9870"/>

<DAA xsi:type="amxdata:DAA" location="JavaDateManagerSoa.daa" importResourceTemplates="false"/DAA>

</amxdata_base:Enterprise>

Objects

You specify the objects on which the command-line interface operates in an XML data file. TIBCO SilverTIBCOActiveMatrix Administrator provides XSD schemas for the data files that capture all of the ID attributes,description attributes, parent-child relationships, and associative relationships of objects. Every object isdescribed in an XML element. The attributes of that object (both ID and descriptive) are attributes of the XMLelement, and the relationships this object has with other objects are subelements of the XML element. In theseschemas, every Administrator object can be specified in three types of formats: base, full, and reference.

TIBCO ActiveMatrix Policy Director --- 1.0

38 | Administrator Interfaces

Page 39: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Object Schemas

The object schemas are located in TIBCO_HOME/administrator/3.2/schemas and are named:

• amxdata.xsd Full format definitions.• amxdata_base.xsd Base format definitions.• amxdata_reference.xsd Reference format definitions.• amxdata_detailed.xsd Currently this schema is empty. It is reserved for use in the future.

Supported Objects

The objects supported by the command-line interface are: Appender, AppenderRef, Application, AppTemplate,Binding, Component, DAA, Enterprise, Environment, Feature, Host, LogAppender, Logger, LogicalNode,MessagingBus, Node, Plugin, PromotedReference, PromotedService, Property, Reference, ResourceInstance,YYYResourceTemplate (where YYY is Hibernate, Teneo, Smtp, Jdbc, HttpClient, LdapQuery, HttpConnector),Service, SVar, User, Wire).

Each object has a set of attributes that describe that object. Some of these attributes, such as the name of theobject, can be used to uniquely identify a particular object assuming the location of the object in the datahierarchy is known. Such identifying attributes are ID attributes. The rest of the attributes are descriptionattributes. The following table summarizes the actions and the objects that support those actions.

Certain objects do not explicitly support actions. Enterprise, the top-level container object, does notsupport any actions. Other objects, such as AppenderRef, LogicalNode, PromotedReference, andPromotedService are subelements of objects that support actions.

Table 3: Actions and Objects

DemotePromoteUndeployDeployInstallorUninstall

Startor Stop

SetDeleteEditAddObject

Appender

Application

AppTemplate

Binding

Component

DAA

Environment

Feature

Host

Logger

MessagingBus

Node

Plugin

Property

Reference

ResourceInstance

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 39

Page 40: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DemotePromoteUndeployDeployInstallorUninstall

Startor Stop

SetDeleteEditAddObject

ResourceTemplate

Service

SVar

User

Wire

Object Formats

Objects in the data XML file of a CLI script can be specified in three formats: base, full, and reference.

Base Format

Base format uniquely identifies the object. Base format is defined in the schema amxdata_base.xsd. The baseformat is a convenience so that you do not have to give all the descriptive attributes of an object to work withit. Base format:• Captures the ID attributes of an object as XML attributes• Captures the parent-child relationships of an object as XML elements• Doesn’t capture any parent information about the object as that information is derived from the XML

structure

You use the base format to:• Delete an object• Perform a runtime action on an object• Add a child to an object• Perform an action on a child of an object

Full Format

Full format is derived from the base format and includes all the base format information plus additionalattributes that describe the objects. Full format in defined in the schema amxdata.xsd. Full format:• Is derived from base format• Captures the ID and description attributes of an object as XML attributes• Captures the parent-child and associative relationships of an object as XML elements• Doesn’t capture any parent information about the object as that information is derived from the XML

structure

You use full format:• Whenever the base format can be used• To add or edit an object

Reference Format

Reference format is used for making associations between two objects. Reference format is defined in theschema amxdata_reference.xsd. Reference format:• Captures the ID attributes of an object as XML attributes• Objects not residing directly under the Enterprise object have parent information because it cannot be

derived from the XML structure

TIBCO ActiveMatrix Policy Director --- 1.0

40 | Administrator Interfaces

Page 41: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

You use reference format:• When associating that object to another object

Object Navigation

The following table enumerates the XPath navigation expressions you supply to the objectSelector optionof AMXAdminTask for each object type and action. You specify objects under Enterprise with the simpleXPath expression ObjectType, where ObjectType can be Environment, Host, Feature, ResourceTemplate, DAA,Plugin, User, Group, and LogAppender.

Table 4: Object Navigation

XPath ExpressionActionObject Type

add, edit, delete, deploy,undeploy, start, stop

Application • Environment/Application

add, delete, start, stopBinding • Environment/Application/PromotedService/Binding• Environment/Application/PromotedReference/Binding

add, edit, delete, deploy,start, stop

Component • Environment/Application/Component

set, add, delete, deploy,deployLog

Logger • Host/Logger• Node/Logger• Environment/Application/Logger• Environment/Application/Component/Logger

add, delete, install,uninstall, deploy

Node (life cycleoperations)

• Environment/Node

set, add, deleteNode (distributionoperations)

• Environment/Application/Component/Node• Environment/Application/PromotedService/Binding/Node• Environment/Application/PromotedReference/Binding/Node• Environment/Application/LogicalNode/Node

setProperty • Environment/Application/Property• Environment/Application/PromotedService/Binding/Property• Environment/Application/PromotedReference/Binding/Property

add, deleteResourceAdapter • Host/ResourceAdapter

add, delete, install,uninstall

ResourceInstance • Environment/Node/ResourceInstance

setSVar • Enterprise• Environment• Host• Environment/Node• Environment/Application/SVar• Environment/AppFragment/SVar

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 41

Page 42: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Inter-Object Relationships

Objects have parent-child or associative relationships with other objects.

In a parent-child relationship, such as that between an environment and a node or application, one object iscontained in its parent object. The relationship is expressed in the nested structure of the object definition.For example, the Enterprise object is the parent of Environment, Host, ResourceTemplate, DAA, andLogAppender. When a parent object is deleted, its children are deleted.

An associative relationship expresses an interaction between objects that does not involve ownership. Anexample is the relationship between an application and an application template. To express associativerelationships you use a reference type when you identify the reference to one object by another object. Forexample:

<Application xsi:type="amxdata:Application" name="datemanager" importBindings="true">

<ApplicationTemplate xsi:type="amxdata_reference:ApplicationTemplate_reference" name="JavaDateManagerSoa"/>

</Application>

Property File Reference

Property files contain Administrator server location and user-specific information used when running thecommand-line interface.

DescriptionTypeProperty

The URL of the Administrator server.URLadminURL

The name of the Administrator user executingthe task. The user must have the permissionsrequired to execute the actions in the script.

Stringusername

The password of the Administrator userexecuting the task.

Stringpassword

The length of time to wait for the connectionto the Administrator server to establish.

IntegerhttpConnectionTimeout (s)

The type of authentication to use to securecommunication between the AdministratorCLI and the remote Administrator server:

StringhttpAuthType

• basic - Use basic authentication. Theusername and password credentials aresent in each request. Before transmission,the user name is appended with a colonand concatenated with the password. Theresulting string is encoded withthe Base64 algorithm.

• form - Use form-based authentication.After the username and passwordcredentials are validated by theAdministrator server, the server creates asession identified by a unique key that ispassed between the client and server oneach subsequent HTTP request. Thisapproach is more secure because

TIBCO ActiveMatrix Policy Director --- 1.0

42 | Administrator Interfaces

Page 43: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionTypeProperty

authentication credentials are only sentduring the initial handshake and not withevery request.

Default: basic.

The trust store properties used by theAdministrator CLI to connect to the

Stringjavax.net.ssl.trustStore

Stringjavax.net.ssl.trustStoreType Administrator server when the external HTTPObfuscatedpassword

javax.net.ssl.trustStorePassword connector is enabled with SSL. The propertyvalues are used to create the trust store file inthe location specified by thejavax.net.ssl.trustStore property.

The keystore properties are used by theAdministrator CLI to connect to the TIBCO

Stringadmin.cli.ssl.keystorelocation

Obfuscatedpassword

admin.cli.ssl.keystorepassword Host instance when it is enabled with JMXover SSL. The property values are used to

Stringadmin.cli.ssl.keystoretype create the keystore file in the location specifiedby the admin.cli.ssl.keystorelocationproperty.Stringadmin.cli.ssl.keyalias

Obfuscatedpassword

admin.cli.ssl.keypassword

DDL Script Generator

The DDL Script Generator is used to generate database specific DDL scripts that are based on user commandsand configuration.

Generate DDL Scripts

About this task

The scripts are located in CONFIG_HOME

Procedure

1. Configure the third-party drivers using TIBCO Configuration Tool.2. Edit jdbcdrivers.xml and update the path to the drivers configured in 1 on page 43.3. Edit generate_ddl.xml. See GenerateDDLTask Reference on page 43 for more information.4. Execute ant -f generate_ddl.xml.

GenerateDDLTask Reference

GenerateDDLTask specifies an action, data and property files, the objects on which the action is performed,and various behavioral attributes.

<DDLGeneratorTask action="action" targetDirectory="path to the DDL samples directory" targetFilePrefix="prefix used for the target file name" modelProfiles="all|admin|governance|commonlogging|security" dbType="type of the database used"

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 43

Page 44: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

dialect="dialect of the database used" />

Parameters

DescriptionReq?TypeAttribute

Specifies the specific action for which you want to generate scripts. Thefollowing actions are available:

YesStringaction

• create - scripts required for creating tables and the related requireddatabase objects are created.

• drop - scripts required to cleanup tables and related required databaseobjects are created.

• update - scripts to update the database schema created by earlierversions of Administrator.

Specifies the location where the generated scripts will be stored.

The default location can be set in the/administrator/3.2/scripts/ddl/generate_ddl.xml file

YesStringtargetDirectory

Default: /administrator/3.2/scripts/ddl.

The prefix for the generated script files.

Default: the value used for the action attribute.

YesStringtargetFilePrefix

The type of the database for which the scripts are generated.NoStringdbType

The valid values are:• ms-sqlserver2005• ms-sqlserver2008• oracle9i• oracle10g• db2

Applicable to the add action, and only if the overwrite flag was used andis true.

NoStringdialect

• com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.SQLServerDialect• com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.Oracle9Dialect• com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.Oracle10gDialect• com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.DB2Dialect

Default: true.

Used to connect to the database.

Required only when using the update action.

NoStringusername

Used to connect to the database. Required only when using the updateaction.

The password can be either clear text or encrypted.

NoStringpassword

The location of the database.No.Stringdburl

Used to choose the model for which to generate the scripts. Multiplevalues can be used using a comma separator. A value of all indicatesthat scripts for all models should be generated.

NoStringmodelProfiles

TIBCO ActiveMatrix Policy Director --- 1.0

44 | Administrator Interfaces

Page 45: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionReq?TypeAttribute

Valid values are:• admin• governance• commonlogging• security• all

Default: all.

Example: Create action

<DDLGeneratorTask action="create" targetDirectory="${admin.ddl.samples.directory}" targetFilePrefix="create" modelProfiles="all" dbType="ms-sqlserver2008" dialect="com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.SQLServerDialect" />

Example: Update action

<DDLGeneratorTask action="update" targetDirectory="${admin.ddl.samples.directory}" targetFilePrefix="update" modelProfiles="all" dbType="ms-sqlserver2008" dialect="com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.SQLServerDialect" /> username="temp_non_dba_usr" password="non_dba_password" dbUrl="jdbc:sqlserver://qa_machine:1068;DatabaseName=demo_db"

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 45

Page 46: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Runtime State, Action History, and Synchronization Columns

The objects managed through Administrator fall into two groups. Hosts, nodes, resource instances, components,and bindings, represent physical entities in the runtime. Environments, applications, resource templates,users, groups, and permissions, are logical entities employed for various management functions.

All runtime objects except for hosts are created in Administrator, and then instantiated in the runtime. Hostsexist in the runtime first and their representation in Administrator is established through a registrationprocess.

In the Administrator web interface all runtime objects and applications have the following properties thatreflect their state: Synchronization, Runtime State, and Action History. Although applications do not existin the runtime, the application's components and bindings have a runtime manifestation. An application'sstate properties are a roll-up summary of the state of its components and bindings.

Runtime State

Hosts and Nodes are the runtime processes that Administrator interacts with. They have a state that isdisplayed in Administrator under the Runtime State column. The runtime state typically changes when youinvoke an action in Administrator. For example, a node goes into a Running state shortly after you executethe Start action on it.

The runtime state can also sometimes change due to events that occur outside of Administrator, for instance,if you power-down or boot up a machine, it will stop nodes or start them. Or if you kill the node process,then it goes to Not Running state.

As the runtime state changes dynamically, Administrator tracks such state changes in real-time, throughnotification messages that it receives through the Notification Server. The notification messages makes itpossible for Administrator to be informed, in real-time, about the state changes. The Administrator UI mustbe periodically refreshed to display the updated status of the objects.

Even applications have a runtime state. Administrator displays the state of your application by aggregatingand summarizing the state based on all its components (including the bindings) that might have beendistributed on multiple nodes. If your application failed to start, for example, the runtime state will showStart Failed. Or if some components are running and some are stopped, you will see Partially Running as theruntime state of your application. Whenever a runtime action has completed for some components, you willsee Partially runtime action. For example, when undeploying an application you could see Partially Undeployed.

The following table displays the valid states for runtime objects.

Table 5: Runtime States

Runtime StatesObject

Application • Not Deployed - before an application is deployed.• Deployed - after the first time the application is deployed.• Partially Undeployed - while an application is being undeployed.• Partially Running - the application is deployed to more than one node and not all the

nodes are running.• Starting• Start Failed - click the Action History link to get more information.• Running• Stopped - after the application has been started and stopped.• Stopping• Partially Stopped - the application's components and bindings are in different states.

TIBCO ActiveMatrix Policy Director --- 1.0

46 | Administrator Interfaces

Page 47: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Runtime StatesObject

• Uninstalling• Partially Uninstalled - not all the components and bindings of the application have been

uninstalled.• Waiting for Dependencies - Either a resource instance or application that this application

depends upon is not running. Once all dependencies are running, the components whichare waiting will automatically be started.

• Preparing for Undeploy - the process of undeploying the application has started.• Partially Ready for Undeploy - Some components have completed processing and have

been marked as ready for undeploy, but other components in the application have yetto complete processing.

• Unknown

The runtime state is a roll-up value for all the application's components and bindings.Partial states mean that some of an application's components and bindings are in adifferent state than others.

Feature • Marked for Install - after a feature has been added to a node and before the change hasbeen applied to runtime.

• Marked for Uninstall - after a feature is removed and before the change is applied toruntime.

• Installed - after a feature has been applied to runtime.

Host • Initializing• Initializing_Failed - click the Action History link to get more information.• Initialized• Lost_Contact - when the host has lost contact with the Administrator server.• Starting• Starting_Failed - click the Action History link to get more information.• Running• Stopping• Stopped - when the host is explicitly stopped and has completed the shutdown process.• Unknown

Node • Not Installed - after a node has been created and before is has been installed• Not Running - after a node has been installed or when it was detected that the node

ended without being stopped by the host. This applies when the process is detected asstopped.

• Stopping - Stopping a node is expected to be a quick activity. If the node is stuck atStopping for more than a few minutes, checking the logs may indicate the problem.

• Stopped - the node was explicitly stopped. This is a normal and expected condition.• Starting - Starting a node is expected to be a quick activity. If the node is stuck at Starting

for more than a few minutes, checking the logs may indicate the problem.• Start Failed - The host was not able to start the node process. Possible causes are that the

node_classpath.tra file contains errors, the JRE libraries are not found, or the OS isunable spawn additional processes. After this state ,the node is disabled and must bemanually enabled.

• Running

ResourceInstance

• Not Installed - after a resource instance has been added to a node and before it has beeninstalled

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 47

Page 48: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Runtime StatesObject

• Running - after a resource instance has been installed and the node on which it has beeninstalled is Running

• Uninstalled - either the resource instance is uninstalled or the node on which the resourceinstance is installed is Not Running

If the Runtime State column of applications is Lost Contact or Unknown, the connection to theEnterpriseMessage Service server acting as the notification server and Messaging Bus has been lost.

After you upgrade an Administrator server, the runtime state of applications running on a nodemanaged by a TIBCO Host instance that has not been upgraded is Partially Running.

Action History

The Action History property provides information about the outcome of the last explicitly performed actionperformed with the intent of affecting the runtime state. For example, Start, Stop, Install, Uninstall, Deploy,Undeploy are actions.

For an application, the Action History is a roll-up value for all the application's components andbindings.

Because the Action History column displays historical information about previously performed actions,sometimes the Action History column may display a value that seems to conflict with the Runtime State. Forexample, you may have deployed and started an application and the Action History column correctly showsthe outcome as Deploy and Start Successful. At some later point the nodes on which the applications weredeployed are restarted and some components could fail to start due to the unavailability of a required resource.The Runtime State column for the application would then show Start Failed, but the Action History reflectingthe outcome of the action would continue to display Deploy and Start Successful.

The Action History value is displayed as a link that you can click to get more information about the outcomeof the action. When you click the link a dialog with two sections—Pending Tasks and Actions and Outcomeof Recently Completed Tasks and Actions—displays. For example, the following screen shows some of thetasks for a deploy action:

The following screen shows the outcome of a recently completed install action on a resource instance:

TIBCO ActiveMatrix Policy Director --- 1.0

48 | Administrator Interfaces

Page 49: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Sometimes actions that modify the runtime state of an object fail. To display detailed information about thefailure, move the mouse cursor over the message in the Detail column and a popup containing the informationdisplays or click the failure link to open a dialog box.

When an action is executed by Administrator, the action is initiated in the runtime, but the runtime processesthe action in the background. While an action is being processed, the Action History column will display InProgress. For asynchronous actions, there may be a time delay between the initiation and its completion. Forexample, Administrator can instruct the runtime to gracefully stop a component, but the component maytake several minutes to stop. In this case, the runtime state will display Stopped only after the componentstops.

The Action History property complements the Runtime State property. Together these properties indicatethe cause and effect of an action, which can help you and support engineers isolate problems faster.

Outstanding Actions

Actions are intended to affect runtime objects, so the objects must be available to execute the actions. Forexample, if a machine is down, actions targeted to objects running on that machine will fail. However,Administrator supports an offline mode for many actions. This means that actions in Administrator arequeued up while runtime objects are offline and executed when they comes back online.

While a target runtime object is offline (either not running or unreachable) queued actions in Administratorwait their turn for execution. For example, if a host is offline, actions performed against the host will remainqueued, and will execute as soon as the host comes back online.

An application distributed to several runtime nodes may be deployed while some nodes are online and someare offline. Administrator will split the deployment action into multiple tasks, some of which are executedright away and others put on a queue for future execution when their target node comes online.

An action is complete when all its tasks, including those placed on the queue, are done executing. For theoffline case, an action may take a very long time to complete. Even in the online case, certain asynchronousactions may take a long time to complete.

Synchronization

The Synchronization property indicates whether the runtime has the latest configuration for an object. Anobject is shown as Out of Sync when the runtime is not running the latest configuration and otherwise isshown as In sync. For example, if you modify a port number of a node after its installation, the runtime wouldhave the older port number, and node will show as Out of sync. To sync the runtime node with the latestconfiguration, you must execute one or more actions.

Only the properties that change the behavior of an object at runtime are tracked using the synchronizationflag. For example, modifying an object's permissions does not make the object go out of sync becausepermissions are used only by Administrator and are not sent to the runtime.

Administrator displays only whether an object is in sync or not. Hover over the Out of Sync text to see thechange that caused it to have a different configuration than what is in the runtime. For example if youdistribute the application to a second node the hover text will say Distribution Config. If more than one typeof change is causing the object to be out of sync, all of them will be displayed separated by semicolons. You

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Interfaces | 49

Page 50: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

may need to refresh the master list to observe a change to the synchronization state or reason. Clicking theOut of Sync text opens a dialog box Synchronization Details that provides more information about the changes.

Related TopicsHosts Reference on page 87Nodes Reference on page 114Applications Reference on page 130

Action History Reference

Table 6: Pending Tasks and Actions

DescriptionColumn

The type of the action.Action

Dynamically allocated identifiers used to correlate task dependencies.Task ID

A description of the action.Description

The node or application to which the action is applied.Node or

Application

The task IDs on which the action depends.Dependency

The time that the action was started.Start Time

Table 7: Outcome of Recently Completes Tasks and Actions

DescriptionColumn

The outcome of the action: Success or Failure.Result

The type of the action.Action

The node or application to which the action is applied.Node or

Application

Details of the result in case the outcome of the action is an error.Detail

The time that the action completed.End Time

The time taken, in seconds, to complete the action.Time Taken (s)

Show only those tasks that have failed.

This button toggles between Show Only Failed and Show All.

Show OnlyFailed

Shows detailed information for the error.Print Error

TIBCO ActiveMatrix Policy Director --- 1.0

50 | Administrator Interfaces

Page 51: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

2Administrator Server Management

Administrator servers maintain the configuration and runtime data of a TIBCO SilverTIBCO ActiveMatrix system.An Administrator server gathers management data from nodes, interacts with the Administrator web andcommand-line UIs, interacts with an authentication realm to authenticate users, interacts with hosts to managenodes, and stores and retrieves configuration and runtime data from the persistent store. Administrator serverruns on the node SystemNode, which is managed by the host SystemHost.

Administrator servers interact with other servers:• Database - maintains Administrator server configuration, performance, log, and payload data• Authentication realm - maintains user data• Notification - propagates status messages between Administrator server, hosts, and nodes• Messaging Bus - propagates messages between applications• RegistryUDDI server - (optional) maintains published service data

The communication channels between Administrator servers and other servers can be secured with SSL. Forinformation on SSL support, see the installation manual for your product.

The default ports used by these servers, their clients, and the mechanism for configuring the ports is listed in Table8: Default Ports on page 51.

Table 8: Default Ports

Configuration MechanismClientDefaultPort

Process

TIBCO Host Instances

TIBCO Configuration ToolAdministrator server6051SystemHost

TIBCO Configuration ToolAdministrator server6001Standalone host

Administrator Server

TIBCO Configuration ToolSystemHost6021SystemNode

TIBCO Configuration ToolSystemHost6031DevNode

TIBCO Configuration ToolAdministrator UI and CLI8120HTTP connector

TIBCO Configuration ToolAdministrator UI and CLI8120HTTPS connector

Administrator UI and CLIInternal use only8787Payload service

Administrator UI and CLIService clients8789Log service

TIBCO Configuration ToolConfiguration Tool

Hosts, nodes, and Administrator server6041Credential Server

Enterprise Message Serviceconfiguration file.

7222 or7243

Enterprise MessageService server

1.0 --- TIBCO ActiveMatrix Policy Director

Page 52: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Configuration MechanismClientDefaultPort

Process

Administrator servers, nodes, hosts,monitoring service

Notification Server

Applications:Messaging Bus• Monitoring service• Logging service• Implementation and binding types• Product• User-defined

Topics

• Administrator Server• Notification Server• Authentication Realms• TIBCO Credential Service• Editing Server Configurations

TIBCO ActiveMatrix Policy Director --- 1.0

52 | Administrator Server Management

Page 53: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Administrator Server

Administrator servers maintain the configuration and runtime data of a TIBCO SilverTIBCO ActiveMatrixsystem. An Administrator server gathers management data from nodes, interacts with the Administratorweb and command-line UIs, interacts with an authentication realm to authenticate users, interacts with hoststo manage nodes, and stores and retrieves configuration and runtime data from the persistent store.Administrator server runs on the node SystemNode, which is managed by the host SystemHost.

Creating an Administrator Server

Procedure

1. Run the Create TIBCO TIBCO SilverActiveMatrix Administrator Server wizard in TIBCO ConfigurationTool. For details, see the installation manual for your product.

2. Create a TIBCO Silver master instance.

Results

When the Administrator server is created, the following are created and are visible:• SystemNode - the node that runs the Administrator.• SystemEnvironment - the environment that contains SystemNode and applications that represent some

components of Administrator.• SystemHost - the host process that manages SystemNode.

Do not delete, undeploy, or uninstall from SystemEnvironment, SystemNode, or SystemHost.

Starting and Stopping an Administrator Server

Before you begin

You must start other servers before starting Administrator server:• The Enterprise Message Service server that is the notification server• The database server if you are using an external Administrator database

About this task

You start and stop an Administrator server by starting and stopping the SystemHost TIBCO Host instance.SystemHost in turn starts SystemNode, the node on which the Administrator server runs.

• Starting the SystemHost TIBCO Host Instance

– Windows

– If you created a Windows desktop shortcut, double-click the shortcut.– If SystemHost is registered as a Windows service:

1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrixAdmin-enterpriseName-adminServerName.3. Click Start.

– Run CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\bin\tibcohost.exe.

– UNIX Run CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/host/bin/tibcohost.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 53

Page 54: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Certain caveats apply to specific UNIX versions:

AIX

tibcohost may fail to start with the error:Failed to exec process : Arg list too long : ./tibcohost

To resolve, log on as root and run chdev -l sys0 -a ncargs=40.

Linux

– Disable SELinux with the command sudo echo 0 > /selinux/enforce before running tibcohost.

– Start the TIBCO Silver master instance.

The tibcohost process is started and the node processes managed by SystemHost, includingtibamx_SystemNode, are started.

• Stopping the SystemHost TIBCO Host Instance

– Windows

– If SystemHost is registered as a Windows service:1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrix Admin-enterpriseName-adminServerName.3. Click Stop.

– Run CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\bin\tibcohost.exestop -wait true.

– UNIX Run CONFIG_HOME/ tibcohost/Admin-enterpriseName-adminServerName/host/bin/tibcohoststop -wait true.

– Stop the TIBCO Silver master instance.

If you perform the stop from the command-line using the -wait option, the command completes and youare returned to the command prompt only after all the nodes are stopped.

Administrator Configuration Reference

Transport Configuration

DescriptionAcceptsSvars?

Editable?Required?Property

Notification Server

(Read-only). A name that defines a communication groupfor notification messages sent between Administrator serverand the hosts that are bound to the server.

NNYEnterpriseName

The URL for the Enterprise Message Service server thathandles notification messages.

Default: tcp://localhost:7222.

NYYEMSServerURL

The Enterprise Message Service server user.NYNUsername

The Enterprise Message Service server user's password.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for the

TIBCO ActiveMatrix Policy Director --- 1.0

54 | Administrator Server Management

Page 55: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSvars?

Editable?Required?Property

password field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

Length of time to wait between attempts to reconnect to theEnterprise Message Service server.

Default: 15000.

NYNRecoveryTimeout(ms)

The length of time to wait before sending out a statusnotification. The runtime will wait a random interval from

NYNRecoveryAttemptDelay(ms) 0 to the specified number of milliseconds before sending

messages. A value of 0 disables this feature.

Default: 500.

General

Length of time before an Administrator GUI login sessiontimes out due to inactivity.

NNYSessionTimeout

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Related TopicsConfiguring a Trust Store on page 298

Plug-Ins

Administrator server is an extensible web application. New functionality is added to Administrator byuploading and deploying a plug-in containing the new features.

Click Admin Configuration > Plug-ins for a list of the available plug-ins.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 55

Page 56: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Plug-Ins Reference

DescriptionAcceptsSVars?

Required?Editable?CLIElement orAttribute

GUIProperty

The name of the plug-in.NYYnameName

The version of the plug-in.NNNN/AVersion

The Administrator user that last modified the plug-in.NNNN/AModifiedBy

The date that the plug-in was modified.NNNN/AModifiedOn

The state of the plug-in: Deployed or Undeployed.NNYN/AState

TIBCO ActiveMatrix Policy Director --- 1.0

56 | Administrator Server Management

Page 57: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Notification Server

The notification server is an Enterprise Message Service server that performs two essential system functionswithin the TIBCO SilverTIBCO ActiveMatrix platform. It delivers status messages sent by hosts and nodesto the Administrator server. Hosts and nodes send status messages for the following types of state changes:• Starting• Stopping• Running• Start failed

Status messages are not stored persistently.

The Administrator server also stores all the tasks with no outstanding dependencies associated with an actionon persistent queues in the notification server. For example, the following screen lists some of the pendingtasks for a deploy action:

The tasks are stored persistently so that if the node stops while the tasks are being processed, the action canbe completed after the node restarts.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 57

Page 58: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Authentication Realms

An authentication realm is the mechanism for storing information about Administrator users and groups.Theauthentication realm is implemented by a database that runs in same process as SystemNode. You selectand configure the authentication realm when you create the Administrator server. For details, see theinstallation manual for your product.

TIBCO ActiveMatrix Policy Director --- 1.0

58 | Administrator Server Management

Page 59: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

TIBCO Credential Service

TIBCO The Credential Service provides credentials that secure the management connections between theAdministrator server, hosts, and nodes. TIBCO Credential Service runs as a plug-in to the Administratorserver.

TIBCO The Credential Service acts as a certificate authority and creates a unique identity for each node andhost.

TIBCOThe Credential Service is automatically created when you create an Administrator server. Forinformation on how to specify the properties of the TIBCO Credential Service, see the installation manualfor your product.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 59

Page 60: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Editing Server Configurations

For information on editing server configurations refer to the installation manual for your product.

Administrator Database

Before you begin

The script files are located in TIBCO_HOME/administrator/3.2/scripts.

Edit the file TIBCO_HOME/administrator/3.2/scripts/bootstrap-edit-build.properties. Specifyappropriate values for the following properties:• instance.properties.file - the location of the remote_props.properties file.• tibco.config.mgmt.home - the folder containing runtime object configuration, referred to as

CONFIG_HOME.• admin.enterprise.name - the enterprise name.• admin.instance.name - the name of the Administrator server instance.

Internal Database

Procedure

1. If moving from a different database, use the database specific migration tools to export or import existingdata to the new database.

2. Edit the data file for the application database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-inprocess-database-data.xml.

3. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.4. Run ant -f bootstrap-edit-build.xml edit-inprocess-database.

External Database

About this task

If using a Microsoft SQL server database make sure you use the case insensitive collation setting.

To point to a new database or to update the configuration of the existing database:

Procedure

1. If moving from a different database, use the database specific migration tools to export or import existingdata to the new database.

2. Edit the data file for the application database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-external-database-data.xml. The followingproperties have to be updated

– dialect - the value of this property should match the value specified in the Teneo resource. For examplecom.tibco.amf.sharedresource.runtime.core.hibernate.dialects.SQLServerDialect.

– dbURL - the location of the database. For examplejdbc:sqlserver://localhost:1433;databaseName=sql.

– jdbcDriver - the database driver class. For examplecom.microsoft.sqlserver.jdbc.SQLServerDriver.

TIBCO ActiveMatrix Policy Director --- 1.0

60 | Administrator Server Management

Page 61: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

– username and password - the credentials to access the database.

3. If using database drivers that have to be installed in the resolve mode, specify theprovisionMode="resolve" attribute.

4. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.5. Run ant -f bootstrap-edit-build.xml edit-external-database.6. Update and install the JDBC resource instances and the teneo and hibernate resource instances used by

the applications.7. Stop and undeploy the following applications from the SystemEnvironment:

– amx.payloadservice.app– amx.logservice.app– governance.mcr.aggregator

8. Uninstall the Teneo and hibernate resource instances used by the applications listed in step 7 on page 61.9. Uninstall the following JDBC resource instances:

– GovernanceJDBCSharedResource– cl_logservice_jdbc– payloadJdbcSharedResource

10. Install the JDBC resource instances listed in the previous step.11. Install the Teneo and hibernate resource instances used by the applications listed in step 7 on page 61.12. Deploy and start the applications listed in step 7 on page 61.

Administrator Server IP Address

About this task

The IP address of the machine on which the Administrator server is running could change due to DHCPreconfiguration if the machine is connected to a new network after being created. To recover fromcommunication errors that can arise from the change in IP address:

Procedure

1. Stop all nodes managed by the SystemHost TIBCO host instance.2. Stop the SystemHost TIBCO host instance.3. If the machine on which the Administrator server is running also hosts the Enterprise Message Service

server, restart the Enterprise Message Service server.4. Start the SystemHost TIBCO host instance.

Editing the Notification Server Configuration

About this task

Follow these steps to update the configuration for the notification server.

Procedure

1. Select Admin Configuration > Admin Server .2. Edit the properties in the Notification Server area.3. Click Save.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 61

Page 62: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ResultsThe settings are updated in the Administrator server and are pushed to all hosts bound to the server and allnodes managed by the server.

Forcing a Re-connection

About this task

You perform this task if the Administrator server loses the connection to the Enterprise Message Serviceserver that serves as the notification server. When this happens the Action History column will report InProgress.

Procedure

1. Select Admin Configuration > Admin Server .2. Click Reconnect to EMS Server.

HTTP Connectors

Internal HTTP Connector

Procedure

1. Select Shared Objects > Resource Templates.2. Click tibco.admin.http.connector.internal.3. Edit the template properties. If you enable SSL, choose TIBCO Credential Server in the SSL Certificate

Source drop-down list.4. Click Save.

5. The updated resource template must be re-installed. See Installing Resource Instances on Nodes on page280.

External HTTP Connector

Before you begin

The script files are located in TIBCO_HOME/administrator/3.2/scripts.

Edit the file TIBCO_HOME/administrator/3.2/scripts/bootstrap-edit-build.properties. Specifyappropriate values for the following properties:• instance.properties.file - the location of the remote_props.properties file.• tibco.config.mgmt.home - the folder containing runtime object configuration, referred to as

CONFIG_HOME.• admin.enterprise.name - the enterprise name.• admin.instance.name - the name of the Administrator server instance.

Procedure

1. Edit the data file for the HTTP connector. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-httpconnector-data.xml.The port number and the host name for the external HTTP connector can be updated.

2. If you have secured the TIBCO Host instance,

– Uncomment the TrinityCredentialServerDetails element.

TIBCO ActiveMatrix Policy Director --- 1.0

62 | Administrator Server Management

Page 63: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

– Add the attribute secure="true" to the TibcoHostConfig element.

3. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.4. Run ant -f bootstrap-edit-build.xml edit-httpconnector .

Monitoring and Common Logging

About this task

To update the database and the Enterprise Message Service configurations used by the monitoring andcommon logging applications:

Procedure

1. Click Applications.2. Select the application from the Applications list.3. Click the Properties tab.

The list of properties used by the application displays.4. The configurations for the database and the Enterprise Message Service are defined using resource instances.

Update the values for the associated resource templates. See Editing a Resource Template on page 187.5. Each updated resource template must be re-installed. See Installing Resource Instances on Nodes on page

280.6. Restart the application and the nodes on which the applications are deployed.

What to do next

If the node was not running when the configuration changes were made, the node has to be restarted twice.

Editing the LDAP Server Configuration

Before you begin

The script files are located in TIBCO_HOME/administrator/3.2/scripts.

Edit the file TIBCO_HOME/administrator/3.2/scripts/bootstrap-edit-build.properties. Specifyappropriate values for the following properties:• instance.properties.file - the location of the remote_props.properties file.• tibco.config.mgmt.home - the folder containing runtime object configuration, referred to as

CONFIG_HOME.• admin.enterprise.name - the enterprise name.• admin.instance.name - the name of the Administrator server instance.

Procedure

1. Edit the data file for the LDAP database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-authrealm-ldap-data.xml.

2. From the command-line prompt, navigate to the TIBCO_HOMETIBCO_HOME/administrator/3.2/scriptsfolder.

3. Run ant -f bootstrap-edit-build.xml edit-authrealm-ldap.

1.0 --- TIBCO ActiveMatrix Policy Director

Administrator Server Management | 63

Page 64: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 65: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

3Enterprise

In the TIBCO SilverTIBCO ActiveMatrix platform the term enterprise has meaning in two different contexts: runtimeand administrative.

In the runtime, enterprise refers to the collection of runtime objects that share the Enterprise Message Service serverthat functions as the notification server. The enterprise is identified by a name specified when you create anAdministrator server.

In Administrator, enterprise refers to the top-level administration object. An enterprise contains environments,hosts, and objects shared between all the environments in an enterprise.

The following table lists the enterprise objects and their location in the Administrator UI.

Table 9: Enterprise Objects

LocationEnterprise Object

Infrastructure > Software Management > Application TemplatesApplication Template

Infrastructure > EnvironmentsEnvironment

Infrastructure > Software Management > FeaturesFeature

Infrastructure > HostsHost

Shared Objects > Logging AppendersLogging appender

Shared Objects > Resource TemplatesResource template

Infrastructure > Software Management > Resource AdaptersResource adapter

Shared Objects > Substitution VariablesSubstitution variable

Governance > Users and GroupsUser, superuser, and group

Governance > Enterprise PermissionsEnterprise permission

1.0 --- TIBCO ActiveMatrix Policy Director

Page 66: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 67: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

4Environments

An environment is a logical grouping of applications and nodes. An Administrator server can have multipleenvironments. For example, you can define environments distinguished by product life cycle function such asdevelopment and production, by geographical area, or by business unit.

Environments provide a way to isolate one group of applications and nodes from another. This is useful for security,optimizing network traffic (each environment has its own Enterprise Message Service server for service buscommunication) and visual organization in the Administrator UI.

Environments contain the following types of objects:• Applications The services and references defined by an application can be promoted to the application's

environment. Services and references promoted to the environment level can be wired to each other. Thefollowing figure illustrates a service and reference exposed by a component, promoted to the composite level,promoted again to the environment level, and wired between the promoted reference and service.

Figure 2: Cross Environment Wires

• Nodes Nodes are runtime sandboxes that run application logic. Node names must be unique within anenvironment and within a host.

• Messaging Bus configuration

1.0 --- TIBCO ActiveMatrix Policy Director

Page 68: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Administrator Environment

The environment containing the node on which the Administrator server runs, SystemNode, is namedSystemEnvironment.

Development Environment

When you create an Administrator server you have the option to create a development environment and node. Bydefault, the environment is named DevEnvironment and the node is named DevNode.

When you create a TIBCO Silver instance group, a development environment named instanceGroupName and adevelopment node named masterInstanceNameNode are created automatically.

Topics

• Creating an Environment• Environment General Reference• Environment Configuration Reference• Messaging Bus

TIBCO ActiveMatrix Policy Director --- 1.0

68 | Environments

Page 69: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating an Environment

Procedure

1. Select Infrastructure > Environments.2.

Click .The New Environment Wizard displays.

3. In the Name field, type a name for the environment.4. Optionally provide description and contact information.5. Check the Enable Security Validations checkbox to enable security validations.

When checked, Administrator will not allow the following actions:• Saving an environment's Messaging Bus configuration that is not SSL-enabled.• Creating a node on a host that is not secured with SSL over JMX.• Installing a node if the environment's Messaging Bus configuration is not SSL-enabled.• Deploying an application that uses a resource instance that is not SSL-enabled. Resource instances that

are referenced by the application's resource instances must also be SSL-enabled. All composite,component, and binding properties are validated.

6. Check the checkbox for Enable Auto-Provisioning to automatically deploy applications providingimplementation or binding types to the target nodes when deploying user applications that require theseapplications.

7. Click Next >.The Messaging Bus screen displays.

8. Specify the Messaging Bus details.9. Click Finish to create the environment or Cancel to exit the wizard.

Related TopicsMessaging Bus Reference on page 73

1.0 --- TIBCO ActiveMatrix Policy Director

Environments | 69

Page 70: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Environment General Reference

<Node xsi:type="amxdata:Node" attributeList</Node>

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the node. The name must start with a letterand can contain letters, digits, dot, dash, and underscore.

NNYName

Short description of the node.NYNDescription

The user that last modified the node.NROROModifiedBy

The date that the node was modified.NROROModifiedOn

Contact information.NYNContact

The name of the host associated with the node.

Also used to identify the owner of the node.

NNYHost

When enabled, applications providing implementation orbinding types are automatically deployed to the target nodes

NYNEnableAuto-

Provisioning when deploying user applications that require theseapplications.

TIBCO ActiveMatrix Policy Director --- 1.0

70 | Environments

Page 71: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Environment Configuration Reference

Nodes

DescriptionColumn

The name of the node. The name must be unique within the environment.Name

The host the node is associated with.Host

The actual state of the node as reported by the runtime.Node State• Not Installed - after a node has been created and before is has been installed• Not Running - after a node has been installed or when it was detected that the node

ended without being stopped by the host. This applies when the process is detectedas stopped.

• Stopping - Stopping a node is expected to be a quick activity. If the node is stuck atStopping for more than a few minutes, checking the logs may indicate the problem.

• Stopped - the node was explicitly stopped. This is a normal and expected condition.• Starting - Starting a node is expected to be a quick activity. If the node is stuck at

Starting for more than a few minutes, checking the logs may indicate the problem.• Start Failed - The host was not able to start the node process. Possible causes are that

the node_classpath.tra file contains errors, the JRE libraries are not found, or theOS is unable spawn additional processes. After this state ,the node is disabled andmust be manually enabled.

• Running

Indicates whether the node runtime matches the node's configuration in the Administratordatabase.

Synchronization

The outcome of the last action performed with the intent of affecting the runtime state.Action History

Messaging Bus

DescriptionAcceptsSVars?

Editable?Required?Property

Enterprise Message Service server location or locations. Canbe a comma-separated list of URLs for fault tolerance and

YYYEMSServerURL reconnection. If a comma-separated list is specified, the

Enterprise Message Service server must be configured forfault-tolerant mode.

Default: tcp://localhost:7222

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

1.0 --- TIBCO ActiveMatrix Policy Director

Environments | 71

Page 72: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

Maximum number of connections used for sending orreceiving messages. Although messaging can work with

YYNConnectionPool Size

just one connection, the multiple connections allow parallelmessage processing.

Default: 12.

Maximum number of sessions available to send messagesto the server.

Default: 24.

YYNOutboundSessionPool Size

Number of times a node attempts to establish a connectionto the server before an error is returned.

Default : 30.

YYNReconnectAttemptCount

Time interval between successive attempts to reconnect tothe server.

Default : 500.

YYNReconnectAttemptDelay (ms)

TIBCO ActiveMatrix Policy Director --- 1.0

72 | Environments

Page 73: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Messaging Bus

An environment's Messaging Bus is the communications backbone that mediates message exchange betweenservice consumers and providers. When a consumer makes a service request, it is the responsibility ofMessaging Bus to locate providers that offer the service and deliver the message to a provider.

Messaging Bus enables service virtualization. With service virtualization, a reference does not need to knowabout the binding details of the service with which it is communicating. It only needs to know the name ofthe service. Service virtualization allows applications within an environment to communicate without requiringthe applications' promoted services and references to have bindings.

Configuring an Environment's Messaging Bus

GUI

Before you begin

Make sure you stop all applications in the environment before configuring it's Messaging Bus properties.

Procedure

1. Click Infrastructure > Environments.2. Click an environment.3. Click the Configuration tab.4. Click the Messaging Bus link.5. Configure properties according to Messaging Bus Reference on page 73.6. Click Save.

CLI

Procedure

1. In the data file, specify a MessagingBus element in full format.2. In the AMXAdminTask element, set the action attribute to add and the objectSelector attribute to

Environment/MessagingBus.3. Invoke the command-line interface on the build file.

Messaging Bus Reference

DescriptionAcceptsSVars?

Editable?Required?Property

Enterprise Message Service server location or locations. Canbe a comma-separated list of URLs for fault tolerance and

YYYEMSServerURL reconnection. If a comma-separated list is specified, the

Enterprise Message Service server must be configured forfault-tolerant mode.

Default: tcp://localhost:7222

1.0 --- TIBCO ActiveMatrix Policy Director

Environments | 73

Page 74: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

Maximum number of connections used for sending orreceiving messages. Although messaging can work with

YYNConnectionPool Size

just one connection, the multiple connections allow parallelmessage processing.

Default: 12.

Maximum number of sessions available to send messagesto the server.

Default: 24.

YYNOutboundSessionPool Size

Number of times a node attempts to establish a connectionto the server before an error is returned.

Default : 30.

YYNReconnectAttemptCount

Time interval between successive attempts to reconnect tothe server.

Default : 500.

YYNReconnectAttemptDelay (ms)

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

TIBCO ActiveMatrix Policy Director --- 1.0

74 | Environments

Page 75: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

The SSL URL of the Enterprise Message Service server.YYNEMSServer SSLURL

Related TopicsCreating an Environment on page 69Configuring a Trust Store on page 298

1.0 --- TIBCO ActiveMatrix Policy Director

Environments | 75

Page 76: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 77: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

5Hosts

A host is the runtime object that serves as the point of contact between nodes and Administrator. Hosts performoperations such as software distribution, node life cycling, and application deployment. It is not necessary for ahost to be running to perform administrative operations. Administrator queues operations and processes themwhen the host and the nodes it manages are available.

A host has a software repository that contains the application templates, features, and resource adapters availableto the nodes managed by the host.

Hosts are typed. In the current release, the only supported type is TIBCO Host. TIBCO Host is the TIBCO nativehost implementation.

A host is bound to a single Administrator server at a time. Hosts can contain nodes from multiple environmentswithin one Administrator server.

Hosts can either be clusters (J2EE only) or singleton. In the case of clusters, each member of the cluster will havea unique name and the cluster itself will have a unique "platform" name. All configurations in Administrator aredone on the platform. However, communication to runtime is done through a unique queue per cluster member(host instance). Status and actions are tracked for each host instance.

It is recommended that a host should manage nodes belonging to only one environment.

SystemHost

The host that manages the SystemNode node on which the Administrator server runs is named SystemHost.

Host Processes

The name of a TIBCO Host instance process is tibcohost. The path to the executable is:/opt/tibco/data/tibcohost/TibcoHostInstance/host/bin/tibcohost.• SystemHost TIBCO Host instance -

CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/host/bin/tibcohost, where enterpriseNameis the name specified for the Administrator enterprise when you created the Administrator server andadminServerName is the name specified for the Administrator server. If you use the default values for enterpriseNameand adminServerName, amxadmin and instanceOne, the path to the executable isCONFIG_HOME/tibcohost/Admin-amxadmin-instanceOne/host/bin/tibcohost.

• Other TIBCO Host instances - CONFIG_HOME/tibcohost/instanceName/host/bin/tibcohost.

Topics

• Creating a TIBCO Host Instance• Registering a TIBCO Host Instance as a Windows Service• Starting a TIBCO Host Instance• Stopping a TIBCO Host Instance• Binding Hosts to an Administrator Server• Enabling Secure Communication between a Host and an Administrator Server

1.0 --- TIBCO ActiveMatrix Policy Director

Page 78: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Unregistering Hosts• Hosts Reference• Host General Reference• Host Configuration Reference• Host Substitution Variables Reference• Host Resource Instances Reference

TIBCO ActiveMatrix Policy Director --- 1.0

78 | Hosts

Page 79: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a TIBCO Host Instance

Procedure

1. Run the Create TIBCO Host Instance wizard in TIBCO Configuration Tool. For details, see the installationmanual for your product.

2. Create a TIBCO Silver worker instance.A TIBCO Host instance named workerInstanceNameHost, where workerInstanceName is the name of the workerinstance is created. The host is automatically bound to the Administrator server running on the TIBCOSilver master instance. A node named workerInstanceNameNode is created in the environment namedinstanceGroupNameEnvironment, where instanceGroupName is the name of the group containing the workerinstance.

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 79

Page 80: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Registering a TIBCO Host Instance as a Windows Service

About this task

You can register SystemHost as a Windows service when you create it using TIBCO Configuration Tool. Toregister SystemHost after it has been created, do the following:

Procedure

1. Copy TIBCO_HOME\tools\wrapper\pwrap.exe to CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\bin.

2. Back up tibcohost.exe and rename pwrap.exe to tibcohost.exe.3. Run tibcohost.exe --install.

The service TIBCO SilverTIBCO ActiveMatrix Admin-enterpriseName-adminServerName is added to theWindows Services application.

TIBCO ActiveMatrix Policy Director --- 1.0

80 | Hosts

Page 81: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Starting a TIBCO Host Instance

About this task

A TIBCO Host instance must be able to connect to the notification server on the configured port (bydefault, 7222). If this port is blocked by a firewall (the default on Windows systems), the instance willnot start.

• Starting the SystemHost TIBCO Host Instance

– Windows

– If you created a Windows desktop shortcut, double-click the shortcut.– If SystemHost is registered as a Windows service:

1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrixAdmin-enterpriseName-adminServerName.3. Click Start.

– Run CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\bin\tibcohost.exe.

– UNIX Run CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/host/bin/tibcohost.

Certain caveats apply to specific UNIX versions:

AIX

tibcohost may fail to start with the error:Failed to exec process : Arg list too long : ./tibcohost

To resolve, log on as root and run chdev -l sys0 -a ncargs=40.

Linux

– Disable SELinux with the command sudo echo 0 > /selinux/enforce before running tibcohost.

– Start the TIBCO Silver master instance.

The tibcohost process is started and the node processes managed by SystemHost, includingtibamx_SystemNode, are started.

• Starting a TIBCO Host Instance

– Windows

– If you created a Windows desktop shortcut, double-click the shortcut.– If the instance is registered as a Windows service:

1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrixhostName.3. Click Start.

– Run CONFIG_HOME\tibcohost\instanceName\host\bin\tibcohost.exe.

– UNIX Run CONFIG_HOME/tibcohost/instanceName/host/bin/tibcohost.– Start the TIBCO Silver instance.

The tibcohost process is started and the node processes managed by the TIBCO Host instance are started.

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 81

Page 82: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Stopping a TIBCO Host Instance

• Stopping the SystemHost TIBCO Host Instance

– Windows

– If SystemHost is registered as a Windows service:1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrix Admin-enterpriseName-adminServerName.3. Click Stop.

– Run CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\bin\tibcohost.exestop -wait true.

– UNIX Run CONFIG_HOME/ tibcohost/Admin-enterpriseName-adminServerName/host/bin/tibcohoststop -wait true.

– Stop the TIBCO Silver master instance.

If you perform the stop from the command-line using the -wait option, the command completes and youare returned to the command prompt only after all the nodes are stopped.

• Stopping a TIBCO Host Instance

– Windows

– If the instance is registered as a Windows service:1. Open the Windows Services application.2. Click TIBCO SilverTIBCO ActiveMatrix hostName.3. Click Stop.

– Run CONFIG_HOME\tibcohost\instanceName\host\bin\tibcohost.exe stop -wait true.

– UNIX Run CONFIG_HOME/tibcohost/instanceName/host/bin/tibcohost stop -wait true.– Stop the TIBCO Silver instance.

The node processes managed by the TIBCO Host instance are stopped and the tibcohost process is stopped.

TIBCO ActiveMatrix Policy Director --- 1.0

82 | Hosts

Page 83: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Binding Hosts to an Administrator Server

Before you begin

When the host is created, it must be configured to use the same Enterprise Message Service notification serverand enterprise name as the Administrator server to which it will be bound.

About this task

When you bind a host to an Administrator server, the host and all the nodes the host manages are managedby the server.

If you create a TIBCO Host instance, you cannot use that instance with an older version of theAdministrator server.

Procedure

1. Select Infrastructure > Hosts .The Hosts screen displays.

2. Choose whether to discover hosts or register a known host.DescriptionOption

Discover 1. Click Discover.2. Click Start Discovery.3. In the Discovered Hosts list, check the checkboxes next to each host to bind and

type a name in the Name column.4. Click Bind.

Register 1. Click Register.2. In the Name field, type a name for the host.3. In the Management URL field, change the machine and port to the machine and

port of the host to bind.4. To enable secure communication between the host and Administrator server,

check the Secure checkbox.

If a host is bound to another Administrator server, the bind fails. Otherwise, the host binds to theAdministrator server.

3. If the host is bound to another server you can take control of it by checking the Force Bind checkbox andclicking Bind.First run with Force Bind unchecked to see if the host is already bound. That way you can investigate ifthis is really a host you should be binding to. If you determine that it you can take control of the host fromanother Administrator server, only then should you use the force option.With the Force Bind checked, even if the host is already bound, the bind will not throw an error. Insteadthe host will sever its connection with the existing Administrator server, and bind to this Administratorserver.

Discover Hosts Reference

Select Infrastructure > Host > Discover to discover hosts to bind to the Administrator server.

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 83

Page 84: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionColumn

The time, in seconds, after which the discovery process stops.Discovery Timeout

The name of the host. The name must be unique on theAdministrator server.

Name

The JMX URL used to communicate to the host.Management URL

The type of the host: TIBCO Host.Type

The status of the discovered host.Status

Indicate whether to communicate with the host using a securechannel.

Secure

Register Host Reference

Select Infrastructure > Host > Register to register the host.

DescriptionField

The name of the host. The name must be unique on the Administratorserver.Name

Optional description.Description

The type of the host: TIBCO Host.Host Type

The JMX URL used to communicate to the host. Stored in the fileCONFIG_HOME\tibcohost\instanceName\host\configuration\jmxendpoints.properties.

Management URL

Indicate whether to remove an existing binding between the host and anotherAdministrator server and create a new binding between the host and thisAdministrator server.

Force Bind

Indicate whether to communicate with the host using a secure channel.Secure

TIBCO ActiveMatrix Policy Director --- 1.0

84 | Hosts

Page 85: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Enabling Secure Communication between a Host and anAdministrator Server

Procedure

1. Select Infrastructure > Hosts .2. Click a host.3. Click the Configuration tab.4. Click the Security link.5. Check the Enable Secure Management Communication checkbox.6. Click Save.

Communication between the host and Administrator server is secured using SSL with a certificate obtainedfrom the TIBCO Credential Server.

Once enabled, the secure communication between the host and Administrator servercannot be disabled.

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 85

Page 86: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Unregistering Hosts

About this taskWhen you unregister a host you remove it from being managed by the Administrator server and destroy anynodes that the host manages.

GUI

Procedure

1. Select Infrastructure > Hosts .2. Choose an unregister option.

ProcedureOption

Unregister 1. Click Unregister or select Unregister > Unregister . If no nodes are installedon the host, the host is unregistered and deleted from the Administrator database.If nodes are installed on the host, the operation fails.

Force Unregister 1. Select Unregister > Force unregister . Nodes are force uninstalled from thehost and the host, nodes, and application components deployed on the nodesare deleted from the Administrator database. It's usually a good idea to first useUnregister. If you decide to proceed with removing that data, use ForceUnregister.

CLI

Procedure

1. In the data file, specify a Host element in base format (the default).<Host name="SecondHost" />

2. In the build file, set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Host.<AMXAdminTask action="delete" objectSelector="Host"/>

3. To perform a force uninstall, specify the -force option.<AMXAdminTask action="delete" objectSelector="Host" force="true"/>

TIBCO ActiveMatrix Policy Director --- 1.0

86 | Hosts

Page 87: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Hosts Reference

Select Infrastructure > Host > Discover to discover hosts to bind to the Administrator server.

DescriptionColumn

The name of host instance, host cluster, or host cluster member.Name

Host clusters are at parent level. Cluster members are at child level.

The type of the host: TIBCO Host.Type

The state of the host:Host State

• Initializing• Initializing_Failed - click the Action History link to get more information.• Initialized• Lost_Contact - when the host has lost contact with the Administrator server.• Starting• Starting_Failed - click the Action History link to get more information.• Running• Stopping• Stopped - when the host is explicitly stopped and has completed the shutdown process.• Unknown

The name of the machineTIBCO Silver instance on which the host is running.Machine

The outcome of the last action performed with the intent of affecting the runtime state.Action History

Related TopicsRuntime State, Action History, and Synchronization Columns on page 46

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 87

Page 88: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Host General Reference

Select Infrastructure > Host for a list of hosts. Click on a host to view details.

DescriptionAcceptsSVar?

Editable?Required?GUIProperty

The type of the host: TIBCO Host.NNYType

The state of the host.NRORORuntimeState

The status of the last runtime action performed on the host.NROROActionHistory

Optional description.NYNDescription

Contact information.NYNContact

The date that the host was modified.NROROModifiedOn

The user that last modified the host.NROROModifiedBy

The JMX URL used to communicate the status of nodesmanaged by the host and send life cycle commands such asstart and stop to the nodes.

YYYManagementURL

The operating system on the machineTIBCO Silver instanceon which the host is running.

NROROOperatingSystem

The name of the machineTIBCO Silver instance on which thehost is running.

NROROMachineName

TIBCO ActiveMatrix Policy Director --- 1.0

88 | Hosts

Page 89: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Host Configuration Reference

Select Infrastructure > Host to view the list of available hosts. Select a host and navigate to the Configurationtab to access the Logging Configurations and Security settings .

Logging Configurations

Table 10: Logging Configuration: Basic Mode

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the logging configuration. The loggingconfiguration name must be the name of a logger in the

NYYLoggerName

source code or the name of the package in which the sourcecode is contained.

One of:NYYAdditivity• true Log messages are passed to the parent logging

configuration.• false Log messages are not passed to the parent logging

configuration.

The destination to which log events are appended.NYYAppender

All events of a level equal to or lower than the specifiedlevel are logged. For the Info level, Info, Warn, Error andFatal events are logged. One of:

NYYLevel

• TRACE All events.• DEBUG Fine-grained informational events used for

debugging an application. Do not use Debug severitywith the JMS appender for an extended period of time.Debug severity generates a large volume of messageswhich could overwhelm a log service.

• INFO Coarse-grained informational messages thathighlight the progress of the application.

• WARN Potentially harmful events.• ERROR Errors that allow the application to continue

running.• FATAL Errors that cause the application to fail.• Off Blocks passing messages to a parent

Security

Check the Enable Secure Management Communication checkbox to secure the communication between thehost and the Administrator server using certificates obtained from the TIBCO Credential Server.

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 89

Page 90: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Host Substitution Variables Reference

This table lists the substitution variables defined for a host.

Use the Add button to add variables for use in properties or logging configurations or the Delete button toremove variables so they can be resolved at another level, such as the environment.

Table 11: Substitution Variables

DescriptionEditable?Required?Property

The name of the substitution variable.YYName

The type of the substitution variable. One ofYYType• String• Integer• Boolean• Password

Default: String.

Description of the substitution variable.YNDescription

The local value or the substitution variable.YYLocal Value

TIBCO ActiveMatrix Policy Director --- 1.0

90 | Hosts

Page 91: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Host Resource Instances Reference

DescriptionColumn

The name of the resource instance.Instance Name

The type of the resource instance.Type

The name of the resource template from which the instance was created.Template Name

The state of the resource instance.Instance State• Not Installed - after a resource instance has been added to a node and before it has

been installed• Running - after a resource instance has been installed and the node on which it has

been installed is Running• Uninstalled - either the resource instance is uninstalled or the node on which the

resource instance is installed is Not Running

Indicates whether the resource instance runtime matches the host's configuration in theAdministrator database.

Synchronized

The node where the resource instance is installed.Node Name

The outcome of the last action performed with the intent of affecting the runtime state.Action History

1.0 --- TIBCO ActiveMatrix Policy Director

Hosts | 91

Page 92: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 93: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

6Nodes

A node is the runtime environment for applications. Nodes exist in an environment and are managed by hosts.When managed by a host, a node runs in its own OS process and JVM. You can configure a host with multiplenodes. Nodes act as sandboxes for applications.

The reasons to use multiple nodes include:• Increase throughput.• Run different versions of software and limit the set of affected application fragments when updating software

versions.• Allow applications to use different resource instance configurations of the same name.• Enable fault tolerance.• Implement various security policies by limiting access to certain nodes and resources.

The reasons to share a node include:• Share resource instances between applications such as thread pools and database connection pools.• Communication between components in a node avoids serialization overheads.• Reduced overall memory utilization.

Application fragments are components or bindings of an application that are distributed and deployed to nodes.A fragment can be distributed to many nodes, and a single node can run many fragments. To increase throughputfor a component or binding you can deploy multiple copies of the fragment to multiple nodes.

A node has a set of product and features shared by resource instances and application fragments running on thenode. You can upgrade or downgrade the features to match the feature versions to those available in the softwarerepository.

The following figure depicts a configuration of environments, hosts, and nodes that illustrates the flexibility achievedwith a multinode setup. The two environments are assigned to groups of users that have responsibility for a specificphase of the application life cycle: Development and Production. Isolation between the groups is achieved bycreating two nodes on each host and assigning them to different environments. Nodes A and B are located on Host1 and nodes C and D are located on Host 2. Nodes A and C are managed by the Development environment andnodes B and D are managed by the Production environment. In addition, access to a JDBC resource is restrictedto the nodes in the Production environment.

1.0 --- TIBCO ActiveMatrix Policy Director

Page 94: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Figure 3: Multiple Node Scenario

Node Processes

A node process is named tibamx_nodeName, where nodeName is the name of the node. The location of the processexecutable is: /opt/tibco/data/tibcohost/TibcoHostInstance/nodes/nodeName/bin/.

• Nodes managed by the SystemHost TIBCO Host instance -CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\nodes\nodeName\bin, where enterpriseNameis the name specified for the Administrator enterprise when you created the Administrator server andadminServerName is the name specified for the Administrator server. If you use the default values for enterpriseNameand adminServerName, amxadmin and instanceOne, the path to the executable isCONFIG_HOME\tibcohost\Admin-amxadmin-instanceOne\nodes\nodeName\bin\.

• Nodes managed by other TIBCO Host instances - CONFIG_HOME\tibcohost\instanceName\nodes\nodeName\bin\.

Administrator Node

The node on which the Administrator server runs is named SystemNode.

Developer Node

When you create an Administrator server you have the option to create a developer configure a BPM node. Thedefault name of the node is DevNodeBPMNode. The master instance has a developer node namedDevNodeBPMNode. The names of any additional hosts that you create must be unique on the host and also withinthe environment.

Topics

• Navigating to a Nodes List• Creating a Node• Creating a Proxy Node• Editing a Node• Installing or Syncing Nodes• Uninstalling Nodes• Starting Nodes• Stopping Nodes• Deleting Nodes• Updating the Port Number for a Node

TIBCO ActiveMatrix Policy Director --- 1.0

94 | Nodes

Page 95: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Updating the JVM Configuration for a Node• Adding a Feature to a Node• Enabling and Disabling Debuggers• Enabling and Disabling the Java Security Manager• Nodes Reference• Node General Reference• Node Configuration Reference• Node Substitution Variables Reference

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 95

Page 96: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Navigating to a Nodes List

Procedure

Choose a starting point and follow the relevant procedure:ProcedureStarting Point

Node 1. Select Infrastructure > Nodes.2. Select an environment from the Environment drop-down list.

Environment 1. Select Infrastructure > Environment.2. In the Environments list, click an environment.3. Click the Configuration tab.4. Click the Nodes link.

Host 1. Select Infrastructure > Host .2. In the Hosts list, click a host.3. Click the General tab.4. Expand the host and environment nodes.

Related TopicsNode General Reference on page 115

TIBCO ActiveMatrix Policy Director --- 1.0

96 | Nodes

Page 97: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a NodeRelated Topics

Node General Reference on page 115

GUI

About this task

You create a node in an environment and associate it with a host within the environment.

Procedure

1. Choose a starting point and follow the appropriate procedure.ProcedureStarting Point

Environments 1. Select Infrastructure > Environments.2. Select an environment and click the Configuration tab and click Nodes.3. Click the Add button.

Hosts 1. Select Infrastructure > Hosts.2. Select an environment and click the Configuration tab and click Nodes.3. Click the Add button.

Nodes 1. Select Infrastructure > Nodes.2. Click the New button.

The New Node dialog displays.2. In the Name field, type a name.3. If you have not started from a host, choose a host.

– Select a host from the Host drop-down list.

– Click add host.

The Add Host dialog overlays the New Host dialog allowing you to bind to a host.

4. Optionally add one or more of the features available to the Administrator server. If these do not currentlyexist on the host, they will be automatically and silently installed onto the host.The selected features are added to the node when it is created. If you do not specify features, only thosefeatures needed by the platform application are added to the node when it is installed.

5. Click Save.The node is added to the Nodes list with a Runtime State of Not installed.

CLI

Procedure

1. In the data file, specify a Node element in full format.<Node xsi:type="amxdata:Node" name="DevNode" hostName="SystemHost" contact="TIBCO" portNumber="5006"></Node>

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 97

Page 98: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

2. In the AMXAdminTask element, set the action attribute to add and the objectSelector attribute toEnvironment/Node.<AMXAdminTask action="add" objectSelector="Environment/Node" />

TIBCO ActiveMatrix Policy Director --- 1.0

98 | Nodes

Page 99: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a Proxy Node

Procedure

1. Follow steps described in Creating a Node on page 97 to create a node.2. Add the TIBCO ActiveMatrix Mediation IT feature to the node.

ResultsThe proxy node is created.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 99

Page 100: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Editing a Node

GUI

Procedure

1. Navigate to a nodes list.2. Select a node.

The node details display in the General tab.3. Edit the contact, description, and the startup mode.4. Click the Configuration, Substitution Variables, Resource Instances tabs for other editable information.5. Click Save.

CLI

Procedure

1. In a data file, specify a Node element in full format using the new attribute values.2. In the AMXAdminTask element set the action attribute to edit and the objectSelector attribute to

Environment/Node[@name='nodeName'], where nodeName is the name of the node to edit.

TIBCO ActiveMatrix Policy Director --- 1.0

100 | Nodes

Page 101: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Installing or Syncing Nodes

Before you begin

Clicking theInstall or Sync button either installs the node or syncs the node by applying the latest configurationchanges.

About this taskThe install or sync action performs any of the following actions:• Creates the node on the host. This action is skipped if the node is installed or running.• Applies updated configuration changes.• Installs features.• Update the port number.• Update the JVM values• Enables or disables debuggers.• Installs the platform applications and associated resource instances.

To complete the installation process, the node must be started.

GUI

Procedure

1. Navigate to a nodes list.2. In the Nodes list, click one or more nodes.3. Choose an install option.

EffectInstall Option

If the Runtime State is Not Installed, the node runtime files arecreated in the file system, the Runtime State changes to Not

Install or Sync or

Install or Sync Install/ SyncRunning and the Action History is Platform Install will resumeafter node start.

If the Runtime State is Not Running or Running, there is nochange.

Applies changes to the node's configuration to the runtime andcauses all applications deployed on the node to use the latestversions of the features on which they depend.

Install or Sync Install with Resolve

Using the Resolve mode will cause thenode to restart (and by extension allcomponents and bindings on the node).

Causes all applications deployed on the node to use the latestversions of the features on which they depend.

Install or Sync Resolve only

4. If the Action History is Platform Install waiting for node start, click Start.The Runtime State changes to Running and the Action History changes to In Progress and then to StartSuccessful.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 101

Page 102: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

CLI

Procedure

1. In the data file, specify an Environment and one or more Node definitions in base format. You can alsouse a data file previously used to create the nodes in which the nodes are specified in full format.<Environment name="DevEnvironment" <Node name="node1"/> <Node name="node2"/></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to install and the objectSelectorattribute to Environment/Node.<AMXAdminTask action="install" objectSelector="Environment/Node" />

TIBCO ActiveMatrix Policy Director --- 1.0

102 | Nodes

Page 103: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Uninstalling Nodes

GUI

Procedure

1. Navigate to a nodes list.2. In the Nodes list, click one or more nodes.3. Choose an uninstall option.

ProcedureOption

Uninstall

The nodes must be stopped and no application fragments canbe distributed to the nodes.

1. Click Uninstall or select UninstallUninstall.

2. Uninstalls the nodes.

Force Uninstall

Terminates the nodes, deletes application components, anduninstalls the nodes. Components running on the nodes arenot notified before the nodes are stopped.

1. Select Uninstall Force Uninstall.

CLI

Procedure

1. In the data file, specify an Environment and one or more Node definitions in base format. You can alsouse a data file previously used to create the nodes in which the nodes are specified in full format.<Environment name="DevEnvironment" <Node name="node1"/> <Node name="node2"/></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to uninstall and theobjectSelector attribute to Environment/Node. To perform a force uninstall, specify the force="true"attribute.<AMXAdminTask action="uninstall" objectSelector="Environment/Node" />

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 103

Page 104: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Starting Nodes

About this taskThe following procedures assume that you are starting the nodes using the Administrator GUI or CLI. If theAdministrator server is not running, you can start the nodes by starting the TIBCO Host instance that managesthe nodes.

GUI

Procedure

1. Navigate to a nodes list.2. In the Nodes list, click one or more nodes.3.

Click the button.The Runtime State of the node changes to Starting.

4. Click the button until the Runtime State changes to Running.

CLI

Procedure

1. In the data file, specify an Environment and one or more Node definitions in base format. You can alsouse a data file previously used to create the nodes in which the nodes are specified in full format.<Environment name="DevEnvironment" <Node name="node1"/> <Node name="node2"/></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to start and the objectSelectorattribute to Environment/Node.<AMXAdminTask action="start" objectSelector="Environment/Node" />

TIBCO ActiveMatrix Policy Director --- 1.0

104 | Nodes

Page 105: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Stopping Nodes

About this taskThe following procedures assume that you are stopping the nodes using the Administrator GUI or CLI. Ifthe Administrator server is not running, you can stop the nodes by stopping the TIBCO Host instance thatmanages the nodes.

GUI

Procedure

1. Navigate to a nodes list.2. Click one or more nodes.3. Choose a stop option.

DescriptionOption

Stops the nodes. Components running on the node are notified and allowedto finish work. The components may take a few minutes to an hour to stop.

Stop or Stop Stop

Stops the nodes. Components running on the node are notified and allowedto perform clean up operations such as closing connections. The componentstypically take a few seconds to stop.

Stop Stop immediately

Stops the nodes. Supported only for nodes running on a host of type TIBCOHost. Components running on the node are not notified before the nodeis stopped.

Stop Terminate nodeprocess

CLI

Procedure

1. In the data file, specify an Environment and one or more Node definitions in base format. You can alsouse a data file previously used to create the nodes in which the nodes are specified in full format.<Environment name="DevEnvironment" <Node name="node1"/> <Node name="node2"/></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to stop, the options attribute tonothing, immediate, or terminate, and the objectSelector attribute to Environment/Node.<AMXAdminTask action="stop" objectSelector="Environment/Node" />

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 105

Page 106: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting Nodes

GUI

Procedure

1. Navigate to a nodes list.2. In the Nodes list, click one or more nodes.3. Choose a delete option.

ProcedureOption

The node must be uninstalled and noapplication components can bedistributed to the node.

Delete

Deletes the nodes from the database.

1. Click Delete or Delete Delete.

Force Delete

Terminates and uninstalls the nodes, deletes components, anddeletes the nodes from the database. Components running on thenodes are not notified before the nodes are stopped.

1. Click Delete Force Delete

This option is enabled only if you have the necessary permissions.See Setting Enterprise Permissions on page 313 for moreinformation..

You should exercise extreme caution when using thisoption as it may leave your system in a non-working state.

CLI

Procedure

1. In the data file, specify an Environment and one or more Node definitions in base format. You can alsouse a data file previously used to create the nodes in which the nodes are specified in full format.<Environment name="DevEnvironment" <Node name="node1"/> <Node name="node2"/></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Environment/Node. To perform a force delete, specify the force="true" attribute.<AMXAdminTask action="delete" objectSelector="Environment/Node" />

TIBCO ActiveMatrix Policy Director --- 1.0

106 | Nodes

Page 107: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Updating the Port Number for a Node

GUI

Procedure

1. ProcedureStarting Point

Nodes 1. Select Infrastructure > Nodes.2. Select an environment from the Environment drop-down list.3. Select a node from the Nodes list.4. Click the General tab.

Hosts 1. Select Infrastructure > Host .2. In the Hosts list, click a host.3. Click the General tab.4. Expand the host and environment nodes.5. Select a node from the Nodes list.6. Click the General tab.

2. Update the port number.3. Click Save.4. The updates take effect when the node is next started. If the node is out of sync, click Install or Sync. If

the node was running, restart the node.

CLI

About this task

The port number used by the node can be updated using the Administrator CLI using the files node_data.xmland node_build.xml located in TIBCO_HOME/administrator/3.2/samples.

Procedure

1. Edit node_data.xml and update the Node element.2. Edit node_build.xml and update the objectSelector attribute to Environment/Node[@name='nodeName'],

where nodeName is the name of the node.3. Run ant -f node_build.xml update.

The port number is updated. Using the Administrator GUI, navigate to a nodes list to see the updatedport number. The Action History of the node changes to Change node management port Successful.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 107

Page 108: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Updating the JVM Configuration for a Node

Procedure

1. Navigate to a nodes list.2. Select a node.

The node details display in the General tab.3. Click the Configuration tab.4. Click the JVM Configuration link.

The JVM arguments are displayed.5. Modify the JVM arguments and click Save.

6. Click Install or Sync.7. Restart the node.

TIBCO ActiveMatrix Policy Director --- 1.0

108 | Nodes

Page 109: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Adding a Feature to a Node

Before you begin

The feature must have previously been added to the enterprise by being installed or uploaded through aDAA file.

GUI

Procedure

1. Choose a starting point and follow the procedure.ProcedureStarting Point

Nodes 1. Select Infrastructure > Nodes.2. Select an environment from the Environment drop-down list.3. In the Nodes list, click a node.4. Click the Configuration tab.5. Click the Features link.6. Click the Add link over the Features table. A new row is added to the table.7. Select the feature type, name, and version from the drop-down lists in the respective

columns.8. Click Save.

SoftwareManagement

1. Select Infrastructure > Software Management.2. Click the Features tab.3. In the View By drop-down list, choose whether to display features or nodes as the

parent object.– Features Click one or more features and click Edit.The Edit Nodes for Feature

Version dialog displays.

Click one or more nodes in the Available Nodes list and click . The nodesmove to the Selected Nodes list.

– Nodes Click one or more nodes and click Edit.The Edit Features for Node dialogdisplays.

Click one or more features in the Available Features list and click . The featuresmove to the Selected Features list.

4. Click Save.

The feature is added to the node and the Runtime State changes to Marked for Install.2. Apply the update.

– Apply - Installs the selected features on the nodes. Applications deployed on the nodes will continueto use the features that were available on the node when they were deployed.

– Apply with Resolve- Installs the selected features on the nodes, restarts the nodes, and causes allapplications deployed on the nodes to use the latest versions of the features on which they depend.Use this operation to install a new version of an existing feature, to force applications that referencethe existing feature to use the new version, or if after clicking Apply you get an error that says thatbecause the node is running in stable mode, it cannot accept the deployment of the feature.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 109

Page 110: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

– Resolve only - Restarts the nodes and causes all applications deployed on the nodes to use the latestversions of the features on which they depend.

The Runtime State of the feature changes to Installed.

CLI

Procedure

1. In the data file, specify a Feature element nested in a Node element.<Node xsi:type="amxdata:Node" name="node1" <Feature xsi:type="amxdata_base:FeatureID" componentID="myFeature" version="myFeatureVersion"/></Node>

2. In the AMXAdminTask element, set the action attribute to add and the objectSelector element toEnvironment/Node/Feature.<AMXAdminTask action="add" objectSelector="Environment/Node/Feature"/>

3. In the AMXAdminTask element, set the action attribute to reprovision and the objectSelector elementto Environment/Node. If the feature includes a resource instance that is dependant on drivers that mustbe installed in the resolve mode, specify the options="resolve" attribute. Using the resolve optionrestarts the node.<AMXAdminTask action="reprovision" objectSelector="Environment/Node"/>

TIBCO ActiveMatrix Policy Director --- 1.0

110 | Nodes

Page 111: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Enabling and Disabling Debuggers

Disabling Debuggers

About this task

Debuggers are used to debug remotely deployed applications by attaching to a running application. Beforedebugging a remotely deployed application, you must enable debuggers on the nodes on which the applicationis deployed.

Debuggers should not be enabled in production systems as a rogue process could attach to a debuggerand halt the node.

Enabling a debugger will increase the time it takes to receive responses to requests sent to applicationsrunning on the node.

Procedure

1. Navigate to a nodes list.2. Click a node.3. Click the Configuration tab.4. Click the Debuggers link.5. Click the next to a debugger type.

The debugger properties display.6. If the port property is not set:

a) In the row for the Debug Port, click the Property Value column, and type a port value that is notcurrently used on the node's host.

b) Click in another column. The Save button is enabled.c) Click Save.The Synchronization column changes to Out of Sync.

7. Click a debugger and click Enable.ResultDebugger Type

The State column changes to Enabled.Java

An application com.tibco.amf.debugger.daa.NodeName is created if onedoes not exist and the application is deployed on the node and started. TheState changes to Enabling and then Enabled.

Platform

8. If you have enabled a Java debugger, restart the node.

Disabling Debuggers

Procedure

1. Navigate to a nodes list.2. Click a node.3. Click the Configuration tab.4. Select a debugger and click Disable.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 111

Page 112: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

The debugger is disabled.

If you disable the platform degugger, the application com.tibco.amf.debugger.daa.NodeName that wascreated when you enabled the debugger is deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

112 | Nodes

Page 113: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Enabling and Disabling the Java Security Manager

About this task

A Java security manager prevents code from calling System.exit. When a security manager is enabled, thenode process by accidentally or by calling System.exit. However, a security manager may lead to aperformance degradation if code is written to perform most system API calls in a privileged block accordingto Java best practices for security. Therefore, although a security manager is available for a node, by defaultthe security manager is disabled. You can set a node configuration property to enable the security managerin scenarios where the safety measure is more important than the performance or for diagnostic purposes.

Enabling

1. Add the property amx.securitymanager.enable=true to the .tra file of the node.2. Restart the node.

Disabling

1. Reset the value of the amx.securitymanager.enable property to false in the .tra file of the node.2. Restart the node.

The .tra file of the node is located in the folderCONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/nodes/nodeName/bin.

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 113

Page 114: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Nodes Reference

DescriptionColumn

The name of the node. The name must be unique within the environment.Name

The host the node is associated with.Host

The name of the physical machine the node is or will be installed on.Machine

The actual state of the node as reported by the runtime.Node State• Not Installed - after a node has been created and before is has been installed• Not Running - after a node has been installed or when it was detected that the

node ended without being stopped by the host. This applies when the process isdetected as stopped.

• Stopping - Stopping a node is expected to be a quick activity. If the node is stuckat Stopping for more than a few minutes, checking the logs may indicate theproblem.

• Stopped - the node was explicitly stopped. This is a normal and expected condition.• Starting - Starting a node is expected to be a quick activity. If the node is stuck at

Starting for more than a few minutes, checking the logs may indicate the problem.• Start Failed - The host was not able to start the node process. Possible causes are

that the node_classpath.tra file contains errors, the JRE libraries are not found,or the OS is unable spawn additional processes. After this state ,the node isdisabled and must be manually enabled.

• Running

Indicates whether the node runtime matches the node's configuration in theAdministrator database.

Synchronization

The startup mode of the node:Startup Mode• Automatic - The node starts when the TIBCO Host instance that manages the

node is started.• Manual - The node starts when an Administrator start action is applied to the

node.• Disabled - The node cannot be started.

The outcome of the last action performed with the intent of affecting the runtimestate.

Action History

Related TopicsRuntime State, Action History, and Synchronization Columns on page 46

TIBCO ActiveMatrix Policy Director --- 1.0

114 | Nodes

Page 115: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Node General Reference

<Node xsi:type="amxdata:Node" attributeList</Node>

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the node. The name must start with a letterand can contain letters, digits, dot, dash, and underscore.

NNYName

Contact information.NYNContact

The user that last modified the node.NROROModifiedBy

The date that the node was modified.NROROModifiedOn

The name of the host associated with the node.

Also used to identify the owner of the node.

NNYHost

The port of the node on which it receives life cyclemanagement messages from the host. The number assigned

NNYPortNumber

to a new port is two more than the largest number currentlyassigned to any port on the host.

Used only when host is of type TIBCO Host.

Default: 26842.

NYYStartupMode

NNNVersion

Short description of the node.NYNDescription

Related TopicsNavigating to a Nodes List on page 96Creating a Node on page 97

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 115

Page 116: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Node Configuration Reference

Features

DescriptionColumn

The name of the feature.Name

The type of the feature.Type

The version of the feature.Version

The status of the feature:Status• Installed• Marked for Install• Marked for Uninstall

Logging Configurations

Table 12: Logging Configuration: Basic Mode

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the logging configuration. The loggingconfiguration name must be the name of a logger in the

NYYLoggerName

source code or the name of the package in which the sourcecode is contained.

One of:NYYAdditivity• true Log messages are passed to the parent logging

configuration.• false Log messages are not passed to the parent logging

configuration.

The destination to which log events are appended.NYYAppender

All events of a level equal to or lower than the specifiedlevel are logged. For the Info level, Info, Warn, Error andFatal events are logged. One of:

NYYLevel

• TRACE All events.• DEBUG Fine-grained informational events used for

debugging an application. Do not use Debug severitywith the JMS appender for an extended period of time.Debug severity generates a large volume of messageswhich could overwhelm a log service.

• INFO Coarse-grained informational messages thathighlight the progress of the application.

• WARN Potentially harmful events.• ERROR Errors that allow the application to continue

running.• FATAL Errors that cause the application to fail.• Off Blocks passing messages to a parent

TIBCO ActiveMatrix Policy Director --- 1.0

116 | Nodes

Page 117: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Debuggers

DescriptionAcceptsSVars?

Editable?Required?Property

The type of the debugger:NNYType• Java Debugger - supports debugging Java and Spring

component implementations. Implemented by changingproperties on the Java VM in which the node runs.Requires restarting the node enable.

• Platform Debugger - supports debugging compositeapplications. Implemented as a composite applicationthat runs on the node.

The state of the debugger:NNYState• Marked for Enable - displayed by a Java Debugger when

you set the value of the Debug Port property.• Enabling• Enabled• Disabled

Indicates whether the node runtime matches the nodeversion in the Administrator database.

NNYSynchronization

The name of the property to configure:NNYPropertyName • Java - Debug Port

• Platform - TCP Port

The property value.NYYPropertyValue

JVM Configuration

This link is displayed only if the node is associated with a TIBCO host.

DescriptionAcceptsSVars?

Editable?Required?Property

The maximum size of the heap for the JVM. If Max HeapSize is specified -XmxMax Heap Sizem is appended to theJVM argument string.

NYNMax HeapSize (MB)

The size of the Java thread stack. If a Java thread stack sizeis specified the string -XssJava Thread Stack Sizem is appendedto the JVM argument string.

JavaThreadStack Size(MB)

When enabled, code running on the node cannot shut downthe node process by accidentally or purposefully callingSystem.exit.

NYNEnableJVMSecurityManager

General arguments to pass to the JVM.NYNGeneralArgs

Properties to pass to the JVM. For each property, name isrequired but value is optional. For a property with a value

YYNProperties

the string -Dname=value is appended to the JVM argument

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 117

Page 118: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

string. For a property without a value the string -Dname isappended to the JVM argument string.

The argument string passed to the JVM. It is generated fromthe other properties.

ROROJVMArgumentString

Tuning

A node supports resource instances as JCA resource adapters. Resource adapters can dispatch runnable jobsto the JCA work manager which internally uses a JCA thread pool to execute the jobs. There is one JCA threadpool per node and all resource adapters use same thread pool to dispatch their jobs. Currently only the JMSresource adapter is using this thread pool for its job execution.

DescriptionAcceptsSVars?

Editable?Required?Property

When a new task is submitted and fewer than Core PoolSize threads are running, a new thread is created to handle

YYNCore PoolSize

the request, even if other threads are idle. If there are greaterthan Core Pool Size but fewer than Max Pool Size threadsrunning, a new thread is created only if no threads are idle.Must be greater than or equal to zero.

When a Java or Spring component service isconfigured with a Threading policy with a non-zerotimeout value and is promoted to a compositeservice using a SOAP or JMS binding, concurrencyis halved because two threads are used per request.To achieve the desired concurrency, specify doublethe number of threads for the thread pool size.

Default: 2. Two threads are used to service one request: onefor receiving the request and one for receiving the response.

The maximum number of threads in the pool. Must begreater than zero and greater than or equal to Core PoolSize.

Default: 10.

YYNMax PoolSize

The amount of time an idle thread remains in the pool beforebeing reclaimed if the number of threads in pool is morethan Core Pool Size.

Default: 30 s.

YYNKeepAliveTime (s)

TIBCO ActiveMatrix Policy Director --- 1.0

118 | Nodes

Page 119: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Node Substitution Variables Reference

This table lists the substitution variables defined for a node.

Use the Add button to add variables for use in properties or logging configurations or the Delete button toremove variables so they can be resolved at another level, such as the environment.

Table 13: Substitution Variables

DescriptionEditable?Required?Property

The name of the substitution variable.YYName

The type of the substitution variable. One ofYYType• String• Integer• Boolean• Password

Default: String.

Description of the substitution variable.YNDescription

The local value or the substitution variable.YYLocal Value

1.0 --- TIBCO ActiveMatrix Policy Director

Nodes | 119

Page 120: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 121: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

7Applications

TIBCO SilverTIBCO ActiveMatrix SOA applications assume different forms in different phases of the applicationlife cycle.

In the design phase a TIBCO SilverTIBCO ActiveMatrix SOA application consists of one or more composites. Eachapplication has a root composite. A composite contains components, services, references, and properties. Thecomponents, services, and references depend on custom features and resources. Services, references, and propertiespromoted to the root composite comprise the public interface of the application.

The output of the design phase is a distributed application archive (DAA). A DAA contains features and anapplication template, which consists of the root composite and a set of related configuration files: nested composites,resource templates, WSDL files, and substitution variable files.

In the administration phase, you create an application by instantiating an application template. The product installeradds product application templates to Administrator. When you upload a DAA file to Administrator, Administratorextracts the application template and (optionally) the features and resource templates.

You can configure the application by setting properties, logging configurations, and substitution variables. Youcan add bindings to services, promote services and references to the environment, and wire services and referencesto services and references in other applications or environments. You also specify a distribution of the applicationto the runtime infrastructure. You can explicitly distribute application fragments—components and bindings—toone or more nodes or you can specify that an application should be distributed to the same nodes as anotherapplication. When you deploy the application, Administrator applies the distribution and the configuration.Features are automatically distributed with components, but resource instances required by the application mustbe manually installed into nodes before deployment. Life cycle operations on the application are translated intolife cycle operations on the application fragments. You can also start and stop application fragments.

The following figure illustrates the application artifacts across the application life cycle.

1.0 --- TIBCO ActiveMatrix Policy Director

Page 122: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Figure 4: Application Life Cycle

Topics

• Deploying Applications• Undeploying Applications• Starting Applications• Stopping Applications• Deleting Applications• Applications Reference• Displaying an Application's Dependencies• Displaying an Application's Components• Displaying an Application's Bindings• Application Configuration Reference• Application General Reference• Application UDDI Publication Reference• Proxy Service Management• Application Folders• Services and References• Properties

TIBCO ActiveMatrix Policy Director --- 1.0

122 | Applications

Page 123: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deploying Applications

About this task

ActiveMatrix components and bindings depend on functionality provided by ActiveMatrix productapplications. The ActiveMatrix platform product application installed on every node supports Java, Spring,and Web Application components and SOAP and JMS bindings. Before deploying an application containingany other type of component or binding on a node, an instance of the product application template thatsupports that component or binding must be deployed on that node. For Mediation components, the productapplication name is TIBCO ActiveMatrix Mediation Implementation Type Application and the productapplication template name is TIBCO ActiveMatrix Mediation Implementation Type Application Template.For all other component and binding types, see the documentation for the component and binding type forwhether a product application is needed and for the name of the required product application template.

ActiveMatrix components and bindings depend on functionality provided by ActiveMatrix productapplications. The ActiveMatrix platform product application installed on every node supports Java, Spring,and Web Application components and SOAP and JMS bindings. Before deploying an application containingany other type of component or binding on a node, an instance of the product application template thatsupports that component or binding is automatically deployed on that node. For Mediation components, theproduct application name is TIBCO ActiveMatrix Mediation Implementation Type Application and theproduct application template name is TIBCO ActiveMatrix Mediation Implementation Type ApplicationTemplate. For all other component and binding types, see the documentation for the component and bindingtype for whether a product application is needed and for the name of the required product applicationtemplate.

Related TopicsApplication Dependencies

GUI

Procedure

1. Click the Applications button.2. In the Applications list, click one or more applications.3. Choose a deploy option.

ProcedureOption

Deploy Deploy with Start

Dependencies on targetproduct applications arechecked.

1. Do one of the following:– Click Deploy.– Select Deploy Deploy with Start.

2. If the applications depend on undeployed target product applications,the Deployment Application Dependencies dialog displays.

3. Check the checkboxes next to the target applications to deploy.

Deploy without Start

Dependencies on targetproduct applications arechecked.

1. Select Deploy Deploy without Start2. If the applications depend on undeployed target product applications,

the Deployment Application Dependencies dialog displays.3. Check the checkboxes next to the target applications to deploy.

More Deploy Options 1. Select Deploy More deploy options2. Check the checkboxes for one or more of the following options

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 123

Page 124: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureOption

– Start Applications - Dependencies on target applications are checked.– Resolve Mode - Dependencies on target product applications are

checked.

Deploys the selected applications on the nodes, restarts the nodes, andcauses all applications deployed on the nodes to use the latest versionsof the features on which they depend. Use this operation to deploy anapplication with a new version of an existing feature, to forceapplications that reference the existing feature to use the new version,or if after clicking Deploy you get an error that says that because thenode is running in stable mode, it cannot accept the deployment ofthe application.

– Force Deploy - Dependencies on target product applications are notchecked and validation errors ignored. May result in brokenapplications and should be used with caution.

3. Click Deploy to deploy the application or Cancel to cancel thedeployment.

ResultsThe applications are deployed and if auto-provisioning is enabled, those applications that provideimplementation or binding types to the applications being deployed are also automatically deployed to thetarget nodes.

CLI

Procedure

1. In the data file, specify Environment and Application elements in base format.<Environment xsi:type="amxdata:Environment" name="envName" > <Application xsi:type="amxdata_base:Application_base" name="app" /></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element set to deploy and theobjectSelector attribute to Environment/Application. To deploy without starting the application,specify the options attribute and set the value to nostart.<AMXAdminTask action="deploy" [options="nostart"] objectSelector="Environment/Application" />

3. Invoke the command-line interface on the build file.• The application is deployed and started.• If the application is a dependent application and its target application has been deployed, the application

is deployed and started. If the target application is not deployed, the deployment will fail.• If an application is a target application, it and all its dependent applications are deployed and started.

TIBCO ActiveMatrix Policy Director --- 1.0

124 | Applications

Page 125: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Undeploying Applications

About this task

When you undeploy an application, the system queues the request and applies it to components as theybecome available. During undeployment, dependencies are taken into account to allow processing to cleanup before removing components and bindings.

Related TopicsApplication Dependencies

GUI

Procedure

1. Click the Applications button.2. In the Applications list, click one or more applications.3. Choose an undeploy option.

ProcedureOption

Undeploy

Dependencies on targetproduct applicationsare checked.

1. Do one of the following:– Click Undeploy.– Select Undeploy Undeploy

2. If any of the selected applications has dependencies, the ApplicationDependencies to Undeploy dialog displays with target applications.

3. Check the checkboxes next to the target applications to undeploy.4. Click Undeploy. The selected target applications are undeployed. The length

of time this action takes to complete depends on how long it takes for thetarget applications to complete their processing. It may take up to severaldays or longer.

Force Undeploy

Dependencies on targetproduct applicationsare not checked.

1. Select Undeploy Force undeploy2. Click Undeploy. Components in the selected applications are allowed to

perform clean up operations. In rare cases, a component may hang whileperforming its cleanup. When that happens a node that becomes unusablemight need to be restarted. If a component stores information in a databaseor file, that data may remain after a force undeploy and must be cleaned upmanually.

More undeployoptions

1. Select Undeploy More undeploy options2. Check the checkboxes for one or more of the following options:

– Resolve Mode - Dependencies on target product applications are checked.

If any of the selected applications has dependencies, the ApplicationDependencies to Undeploy dialog displays with target applications. Theapplications are deleted from the node and the runtime state changes toNot deployed. The nodes where the applications are undeployed arerestarted to load software updates.

– Force Undeploy - Dependencies on target product applications are notchecked.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 125

Page 126: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureOption

Components in the selected applications are allowed to perform clean upoperations. In rare cases, a component may hang while performing itscleanup. When that happens a node that becomes unusable might needto be restarted. If a component stores information in a database or file,that data may remain after a force undeploy and must be cleaned upmanually.

3. Click Undeploy to undeploy the application or Cancel to cancel theundeployment process.

CLI

Procedure

1. In the data file, specify Environment and Application elements in base format.<Environment xsi:type="amxdata:Environment" name="envName" > <Application xsi:type="amxdata_base:Application_base" name="app" /></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to undeploy and the objectSelectorattribute to Environment/Application. To perform a force undeploy, specify the -force option.<AMXAdminTask action="undeploy" objectSelector="Environment/Application" [-force] />

3. Invoke the command-line interface on the build file.

TIBCO ActiveMatrix Policy Director --- 1.0

126 | Applications

Page 127: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Starting ApplicationsRelated Topics

Application Dependencies

GUI

Procedure

1. Click the Applications button.2. In the Applications list, click one or more applications.3. Click the Start button.

If there are target applications, the Application Dependencies to Start dialog displays.4. Check the checkboxes next to the target applications to start.5. Click Start.

The target applications are started and the selected applications are started after the target applicationsare running. The Runtime State of the selected applications changes to Starting.

6. Click the button until the Runtime State changes to Running.

CLI

Procedure

1. In the data file, specify Environment and Application elements in base format.<Environment xsi:type="amxdata:Environment" name="envName" > <Application xsi:type="amxdata_base:Application_base" name="app" /></Environment>

2. In the build file set the action attribute of the AMXAdminTask element to start and the objectSelectorattribute to Environment/Application.<AMXAdminTask action="start" objectSelector="Environment/Application" />

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 127

Page 128: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Stopping ApplicationsRelated Topics

Application Dependencies

GUI

Procedure

1. Click the Applications button.2. In the Applications list, click one or more applications.3. Choose a stop option.

ProcedureOption

Stop

Allows applications to complete processing beforeshutting down.

1. Do one of the following:– Click Stop.– Select Stop Stop

Dependencies on target product applications arechecked.

2. If there are target applications, the ApplicationDependencies to Stop dialog displays.

3. Check the checkboxes next to the targetapplications to stop.

Applications may take anywhere from a few secondsto an hour to stop.

4. Click Stop.

Components with dependencies will bestopped only after the components they dependupon have stopped.

Stop immediately

Applications may take a few seconds to stop.1. Select Stop Stop immediately

Applications are allowed to perform cleanupoperations but not complete their current processing.

Applications are not stopped in dependency order.

The selected applications and target applications are stopped.

CLI

Procedure

1. In the data file, specify Environment and Application elements in base format.<Environment xsi:type="amxdata:Environment" name="envName" > <Application xsi:type="amxdata_base:Application_base" name="app" /></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to stop, the options attribute toimmediate and the objectSelector attribute to Environment/Application.<AMXAdminTask action="stop" objectSelector="Environment/Application" />

3. Invoke the command-line interface on the build file.

TIBCO ActiveMatrix Policy Director --- 1.0

128 | Applications

Page 129: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting ApplicationsRelated Topics

Application Dependencies

GUI

Procedure

1. Click the Applications button.2. In the Applications list, click one or more applications.3. Choose a delete option.

DescriptionOption

Delete

Deletes the application if the application is not deployedand no order application depends on it.

1. Do one of the following:– Click Delete.– Delete Delete.

2. If there are target applications, theApplication Dependencies to Delete dialogdisplays.

3. Check the checkboxes next to the targetapplications to delete.

4. Click Delete.

Force Delete

Deletes the application regardless of its state.1. Select Delete Force Delete.

This option is enabled only if you have the necessarypermissions. See Setting Enterprise Permissions on page313 for more information.

You should exercise extreme caution when usingthis option as it may leave your system in anon-working state.

The selected applications and target applications are deleted.

CLI

Procedure

1. In the data file, specify Environment and Application elements in base format.<Environment xsi:type="amxdata:Environment" name="envName" > <Application xsi:type="amxdata_base:Application_base" name="app" /></Environment>

2. In the build file, set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Environment/Application. To perform a force delete, add the -force option.<AMXAdminTask action="delete" objectSelector="Environment/Application" [-force] />

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 129

Page 130: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Applications Reference

DescriptionColumn

The name of an application. By default, the Applications list contains theplatform application amx.platform-app. This application contains the default

Name

binding type implementations, platform services, and data binding converters.The platform application is dependent on the TIBCO ActiveMatrix Platformfeature. Administrator automatically provisions this feature whenamx.platform-app is deployed.

The runtime state of the application. The application state is a rollup of thestate of its constituent components and bindings.

Application State

• Not Deployed - before an application is deployed.• Deployed - after the first time the application is deployed.• Partially Undeployed - while an application is being undeployed.• Partially Running - the application is deployed to more than one node and

not all the nodes are running.• Starting• Start Failed - click the Action History link to get more information.• Running• Stopped - after the application has been started and stopped.• Stopping• Partially Stopped - the application's components and bindings are in

different states.• Uninstalling• Partially Uninstalled - not all the components and bindings of the

application have been uninstalled.• Waiting for Dependencies - Either a resource instance or application that

this application depends upon is not running. Once all dependencies arerunning, the components which are waiting will automatically be started.

• Preparing for Undeploy - the process of undeploying the application hasstarted.

• Partially Ready for Undeploy - Some components have completedprocessing and have been marked as ready for undeploy, but othercomponents in the application have yet to complete processing.

• Unknown

The date that the application was last deployed.Last Deployed On

Indicates whether the runtime has the latest configuration for the application.Synchronization

The outcome of the last action performed with the intent of affecting theruntime state.

Action History

Related TopicsRuntime State, Action History, and Synchronization Columns on page 46

TIBCO ActiveMatrix Policy Director --- 1.0

130 | Applications

Page 131: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Displaying an Application's Dependencies

Procedure

1. Click Applications.The Applications list displays.

2. Click an application.The application details display.

3. Click next to Depends On.The list of applications and the resource instances that the selected application depend on displays.

Click on an application or a resource instance to view additional details.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 131

Page 132: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Displaying an Application's Components

Procedure

1. Click Applications.2. Click an application.3. In the Status tab, click Component Status.

The applications's components display.

TIBCO ActiveMatrix Policy Director --- 1.0

132 | Applications

Page 133: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Displaying an Application's Bindings

Procedure

1. Click Applications.2. Click an application.3. In the Status tab, click Binding Status.

The application's bindings display.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 133

Page 134: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Application Configuration Reference

Wires

To wire a reference to a service1. Click a reference.

Dots are now visible on the services and references.

2. Click the dot on the reference and continue to press and hold the left mouse button.3. Move the mouse to a service4. Release the mouse button.

The reference is now wired to the service.

DescriptionField

Click this button to add a binding for a reference. Configure properties according toManual Binding Reference on page 150.

Add Binding

Click this button to edit properties for a binding.Edit Binding

Click this button to delete the binding added to a reference.Delete Binding

Click this button to replace a wire with a manual banding.Switch toBinding

Logging Configuration

You can either use the node's logging configuration or create a new logging configuration.

To create a new logging configuration1. Uncheck the checkbox for Use node's logging configuration2. Refer Creating a Logging Configuration on page 261 for information on creating a logging configuration.

Table 14: Logging Configuration: Basic Mode

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the logging configuration. The loggingconfiguration name must be the name of a logger in the

NYYLoggerName

source code or the name of the package in which the sourcecode is contained.

One of:NYYAdditivity• true Log messages are passed to the parent logging

configuration.• false Log messages are not passed to the parent logging

configuration.

The destination to which log events are appended.NYYAppender

TIBCO ActiveMatrix Policy Director --- 1.0

134 | Applications

Page 135: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

All events of a level equal to or lower than the specifiedlevel are logged. For the Info level, Info, Warn, Error andFatal events are logged. One of:

NYYLevel

• TRACE All events.• DEBUG Fine-grained informational events used for

debugging an application. Do not use Debug severitywith the JMS appender for an extended period of time.Debug severity generates a large volume of messageswhich could overwhelm a log service.

• INFO Coarse-grained informational messages thathighlight the progress of the application.

• WARN Potentially harmful events.• ERROR Errors that allow the application to continue

running.• FATAL Errors that cause the application to fail.• Off Blocks passing messages to a parent

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 135

Page 136: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Application General Reference

The General tab displays the application's logical nodes, components, and promoted services and referencesin a hierarchical list. The information displayed on the right hand side matches the object selected from thehierarchical list.

Details

DescriptionEditable?Required?Property

The name of the application.Y (if theapplication isundeployed)

YName

A contact information for the owner of the application.YNContact

Description of the application.YNDescription

The Administrator user that last modified the application.ROROModified By

The date and time that the application was last modified.ROROModified On

The Administrator user that last deployed the application.ROROLast DeployedBy

The date and time that the application was last deployed.ROROLast DeployedOn

The name of the application template from which theapplication was created.

NYTemplateName

The version of the application template from which theapplication was created.

NYTemplateVersion

Determines how the application's fragments are distributedto nodes. One of:

NYDistributionPolicy

• Product Application - The fragments are distributed tothe nodes based upon the locations where components ofa specified product application are deployed.

• Manual - The fragments are distributed to the nodes thatyou specify.

• Environment - The fragments are distributed to everynode in an environment. Currently only the platformapplication uses this policy.

Displays only if the Distribution Policy is set to ProductApplication. The product application with which theapplication must be deployed.

NNProductApplication

Binding Status

Shows the status of bindings on a particular node.

DescriptionColumn

Identifies the binding with the name and the path of nested components for the componentwith which the binding is associated. The type of binding (direction, service or reference,

Binding Path

TIBCO ActiveMatrix Policy Director --- 1.0

136 | Applications

Page 137: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionColumn

and whether the binding is intermediate) is indicated by the value in parenthesis. Valuesare often too long to be completely visible. Hovering over the name shows a tooltip thatdisplays the full name.

The node on which the binding is running. If the binding is distributed to multiple nodes,there will be a row in the table for each node. The binding path will be the same, but thenode name differentiates them.

Node Name

The state of the binding.Runtime State

The outcome of the last action on the binding instance.Action History

Component Status

DescriptionColumn

The set of nested composites containing the component separated by forward slashesfollowed by the component name, an underscore, and the component version.

Component Path

The node on which an instance of the component is running.

If the component is distributed to multiple nodes, then each node will have its own rowwith the component path being duplicated.

Node Name

The state of the component.Runtime State

The outcome of the last action.Action History

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 137

Page 138: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Application UDDI Publication Reference

DescriptionAcceptsSVars?

Editable?Required?Property

The services exposed by the application.NNYService

The number of tags associated with the service. Click to open a tag editor.

NYNTags

Indicates whether the service should be published orunpublished when the Apply changes button is clicked.

NYYPublish

The publication status.NNNPublicationStatus

The pending changes and actions.NNNChanges/PendingActions

Run ant -f uddi_amxpubmngt.xml target where target is:

• GetOrCreatePubs: List the service publication configuration.• UpdatePubs: Update configuration, such as unpublish a service, add a tag, and so on.• ApplyPubs: Publish into or unpublish from registry.

The properties used by the script are defined inTIBCO_HOME/administrator/samples/uddi_amx_pubmngt_data.properties.

TIBCO ActiveMatrix Policy Director --- 1.0

138 | Applications

Page 139: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Proxy Service Management

TIBCO ActiveMatrix Policy Director allows you to create proxies for services managed in external containerssuch as TIBCO ActiveMatrix BusinessWorks, WebSphere Application Server, and Windows CommunicationFoundation (WCF).

TIBCO ActiveMatrix Policy Director facilitates a consistent way to apply and manage policies on proxyapplications and on other ActiveMatrix applications that use TIBCO ActiveMatrix Policy Director.

Proxy Applications

A proxy application is an intermediary that enforces policies on behalf of a consumer or provider.

You use TIBCO ActiveMatrix Policy Director Proxy Agent to manage proxy applications.

A set of global preferences is available for creating and managing proxy applications. You typically set thesepreferences before you create proxy applications. However, you can set or modify them later.

Proxy Nodes

A proxy node consists of resources for deploying proxy applications. The proxy node is a standard ActiveMatrixnode with three added capabilities:• The Mediation IT (implementation type) is deployed and runs on the node to execute the mediation

application. The mediation application functions as the proxy application to the external service.• At least one connector shared resource provides a functional endpoint for the promoted service of the

mediation application.• At least one client shared resource allows the mediation application to reference the external service.

Once you create a new proxy node, proxy management services automatically deploy the mediation IT on everynew proxy node. No additional user configuration is needed. TIBCO ActiveMatrix Policy Director providesyou with the option of providing connector and client shared resource information.

Registering an External ServiceRegistering an external service involves registering a WSDL representing the service. After registering theWSDL, create a proxy application that can interact with the external service.

Procedure

1. Click Governance > External Services.The External Services list is displayed.

2.Click The New WSDL dialog is displayed.

3. Choose the source of the WSDL:

– File (s)

– URL– WSDL Name : This option is available only when you select a zip file as the source. Specify the name

of the WSDL contained in the zip file.

To register the WSDL successfully, ensure that you select a concrete WSDL.

4. Click Save.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 139

Page 140: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ResultsThe WSDL gets registered and an external service is created.

Modifying an External ServiceTo modify an external service, you modify a WSDL representing the service.

Procedure

1. Click Governance > External Services.The External Services list is displayed.

2. Select a WSDL that you want to modify.3. Click General Information .4. Make changes Name, Description, and Properties of the WSDL.5. Click Save to save the changes.

Deleting an External Service

Procedure

1. Click Governance > External Services.The External Services list is displayed.

2. Select a WSDL that you want to delete.3.

Click .The Delete WSDL dialog is displayed .

4. Click Yes to confirm deletion.The WSDL will now be deleted.

Creating a Proxy Application

About this task

Procedure

Choose a starting point and follow the relevant procedure:ProcedureStarting Point

Governance > ExternalServices

1. Select Governance > External Services.2.

Select a listed service and click .3. Click Create to create the proxy application.

The proxy application that gets created is now displayed in the ProxyApplications section.

Governance > ExternalServices

1. Select Governance > External Services.2.

Select a listed service and click .3. Click Create and Configure to configure the application immediately

after creating the proxy.

TIBCO ActiveMatrix Policy Director --- 1.0

140 | Applications

Page 141: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureStarting Point

Governance > ProxyApplications

1. Select Governance > Proxy Applications.2.

Click .3. Select a service from the New Proxy Application dialog box.

ResultsThe proxy application is created. For information on configuring a proxy application, see Configuring a ProxyApplication on page 141.

The TIBCO ActiveMatrix Policy Director Administrator UI only supports SOAP/HTTP endpoints.SOAP/JMS can be configured using CLI.

Configuring a Proxy Application

Procedure

1. Select Governance > Proxy Applications.The list of proxy applications is displayed.

This step is optional if you have reached this screen soon after creating the proxy.

2. Click the General Information tab for the chosen proxy application.3. Configure the endpoints by providing values for the following. Values for the Node, Connector Resource

and Client Resource rendered based on the chosen Environment.• Endpoint URL• Environment• Node• Connector Resource• Client Resource• Proxy Endpoint URL

4. Click Save.

ResultsThe proxy application is configured and can be deployed. For more information, see Deploying a ProxyApplication on page 142.

Using System PreferencesTIBCO ActiveMatrix Policy Director Proxy Service Management offers a set of command line options to add,modify, or delete system preferences. You can use the system preferences to customize a proxy application.System Preferences can only be changed using CLI. By default, the data files, properties file, and the WSDLfile required to change the system preferences are located at <TIBCO-HOME>\ps\pd\1.0\scripts\psm. The<TIBCO-HOME>\ps\pd\1.0\scripts\psm\build.xml file contains the commands used to make changes toproxy applications. Sample proxy applications are available for your reference at<TIBCO-HOME>\PD\1.0\Samples\proxyapp. You can customize the samples to suit your needs.

Adding or Modifying System Preferences

Use the -ant command and the commands from the <TIBCO-HOME>\ps\pd\1.0\scripts\psm\build.xmlfile to make changes to the system preferences. For example, if you are running the sample application forSOAP/HTTP, open the command prompt from <TIBCO-HOME>\ps\pd\1.0\scripts\psm. and run thefollowing command to add or update system preferences:

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 141

Page 142: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ant -DdataFile="cli_data_http.xml"

-DdataFile.properties="cli_data_http.properties-template" -DwsdlFile="path_to_wsdl_file"

addOrUpdateSystemPreferences

Deleting System Preferences

You can delete a system preference by using the -ant command and the commands from the<TIBCO-HOME>\ps\pd\1.0\scripts\psm\build.xml file. For example, if you are running the sampleapplication for SOAP/HTTP, open the command prompt from <TIBCO-HOME>\ps\pd\1.0\scripts\psm,and run the following command to delete the system preferences:

ant -DdataFile="cli_data_http.xml"

-DdataFile.properties="cli_data_http.properties-template" -DwsdlFile="path_to_wsdl_file"

deleteSystemPreference

If you have modified the location or the name of the data file, properties file, or the WSDL file,remember to make those changes in the commands.

Updating a Proxy Application

Procedure

1. Select Governance > Proxy Applications.A list of proxy applications is displayed.

2. Select the proxy application you want to modify.3. Click the General Information tab.4. Modify the endpoints by providing values for the following. Values for the Node, Connector Resource

and Client Resource rendered based on the chosen Environment.• Endpoint URL• Environment• Node• Connector Resource• Client Resource• Proxy Endpoint URL

5. Click Save.

Deploying a Proxy Application

Procedure

1. Click Governance > Proxy Applications.The list of proxy applications is displayed.

2. Select a proxy application.Details of the application are displayed.

3.Click .

ResultsThe proxy application is deployed.

TIBCO ActiveMatrix Policy Director --- 1.0

142 | Applications

Page 143: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Starting a Proxy Application

Procedure

1. Click Governance > Proxy ApplicationsA list of proxy application is displayed.

2. Select the proxy application you want to start.3.

Click The proxy application is now running.

Stopping a Proxy Application

Procedure

1. Click Governance > Proxy ApplicationsA list of proxy applications is displayed.

2. Select the proxy application that you want to stop.3.

Click The proxy application is now stopped.

Click to see the changes.

Undeploying a Proxy Application

Procedure

1. Click Governance > Proxy Applications.A list of proxy applications is displayed.

2. Click a proxy application.Details of the application are displayed.

3. Click The proxy application is undeployed.

Deleting a Proxy Application

Procedure

1. Select Governance > Proxy Applications.A list of proxy applications is displayed.

2. Select the proxy application you want to delete.

To be eligible for deletion, applications should be in the "Undeployed" state.

3.Click .The Delete Proxy Application dialog box is displayed.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 143

Page 144: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

4. Click Yes to confirm deletion.The proxy application will now be deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

144 | Applications

Page 145: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Application Folders

Application folders allow to you organize your applications. They work in much the same way as file systemfolders or manila folders in a filing cabinet. When you create an application you can optionally choose afolder in which to store the application. If you do not choose a folder, the application is stored in the rootfolder. Permissions assigned to a folder are inherited by all applications contained within the folder.

Each environment contains a System folder. This folder contains TIBCO product applications. It isrecommended that you do not create user applications in this folder.

Creating a Folder

GUI

Procedure

1. Click New > New Application Folder .The New Folder dialog displays.

2. Type a folder name and an optional description, and click Save. Folder names should be unique withinan environment.The application folder is created at the same level as the System folder.

3. To create the folder at another levela)

Select the folder where in the tree view of the folder names select the folder and click .b) Type a folder name and an optional description, and click Save.The folder is created at the selected

CLI

Procedure

1. In the data file, specify an ApplicationFolder element in full format.<Environment xsi:type="amxdata:Environment" name="MyEnvironment" description="My environment"> <ApplicationFolder xsi:type="amxdata:ApplicationFolder" name="FolderA" description="description for FolderA">

... </ApplicationFolder> ...

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Environment/ApplicationFolder.<AMXAdminTask action="add" objectSelector="Environment/ApplicationFolder" />

3. Invoke the command-line interface on the build file.

Renaming a Folder

GUI

Procedure

1. Click Applications.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 145

Page 146: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

The Applications screen displays.2. Select an environment from the Environment drop-down list.3. In Applications list, select an application folder.

The folder details display.4. Edit the Folder Name and, optionally, the Description and click Save.

CLI

Procedure

1. In the data file, specify an ApplicationFolder element in full format.<Environment xsi:type="amxdata:Environment" name="MyEnvironment" description="My environment"> <ApplicationFolder xsi:type="amxdata:ApplicationFolder" name="MyApp" newName="MyAppNew"> ... </ApplicationFolder> ...

2. In the build file set the action attribute of the AMXAdminTask element to rename and the objectSelectorattribute to Environment/Application.<AMXAdminTask action="rename" objectSelector="Environment/ApplicationFolder" />

3. Invoke the command-line interface on the build file.

Deleting a Folder

GUI

Procedure

1. Click Applications.The Applications screen displays.

2. Select an environment from the Environment drop-down list.3. In Applications list, select an application folder and click Delete.

The confirm dialog displays.4. Click OK.

ResultsThe selected folder is deleted along with any sub-folders and undeployed applications. If the folder containsany deployed application, the folder is not deleted.

CLI

Procedure

1. In the data file, specify an ApplicationFolder element in full format.<Environment xsi:type="amxdata:Environment" name="MyEnvironment" description="My environment"> <ApplicationFolder xsi:type="amxdata:ApplicationFolder" name="MyFolder"> ... </ApplicationFolder> ...

2. In the build file set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Environment/Application.<AMXAdminTask action="delete" objectSelector="Environment/ApplicationFolder" />

TIBCO ActiveMatrix Policy Director --- 1.0

146 | Applications

Page 147: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

3. Invoke the command-line interface on the build file.

Moving an Application to a Folder

GUI

Procedure

1. Click Applications.The Applications screen displays.

2. Select an environment from the Environment drop-down list.3. In Applications list, select an application folder and click Move .

The Move Applications dialog displays.4. Select the folder where you want to move the application and click Save.

The application is added to the specified folder.

CLI

Procedure

1. In the data file, specify an ApplicationFolder element in full format.<Environment xsi:type="amxdata:Environment" name="MyEnvironment" description="My environment"> <ApplicationFolder xsi:type="amxdata:ApplicationFolder" name="MyApp"> <TargetFolder path="/folderOne/"/> ... </ApplicationFolder> ...

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Environment/Application.<AMXAdminTask action="move" objectSelector="Environment/ApplicationFolder" />

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 147

Page 148: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Services and References

Applications interact via services and references. A service is a set of operations and the messages requiredby the operations. A reference identifies the service consumed by a component or composite. Applicationsoffer services and invoke references to other services. An application's services and references are promotedfrom the services and references of the components it contains.

Component services can be consumed by other components within the composite or promoted as compositeservices for use by consumers outside the composite. A composite service has an interface and one or morebindings.

Component references consume services provided by other components in the same composite or servicesprovided outside the composite. A composite reference has an interface and one binding.

Displaying the Bindings for a Service or a Reference

Procedure

1. Click Applications.The Applications list displays.

2. Click an application.The application details display.

3. Click the Configuration tab.The View drop-down list displays Currently Configured.

4. Expand the application node and click a service or a reference.The bindings display in the right pane.

5. Click next to a binding to display the nodes on which a binding is deployed.

The following figure shows the bindings for a service.

Publishing Services in a UDDI Server

About this task

This task describes how to manually publish services and edit tags associated with the services. Before youcan publish services you must configure a UDDI server. If you configure the UDDI server with AutomaticPublication, services are automatically published when an application is deployed. The Apply Changes toUDDI Server button is enabled if the application is deployed.

TIBCO ActiveMatrix Policy Director --- 1.0

148 | Applications

Page 149: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Procedure

1. Click the Applications button.2. Click an application.3. Click the UDDI Publication tab.

If you have configured a UDDI server, the services exposed by the application display in the Services list.Otherwise, click Configure a new UDDI server to configure the server.

4.To edit the tags associated with the service, in the Tags column, click .

– Add - Type a name in the Tag Name field, a value in the Value field, and click Add.–

Edit - Click , select a tag name, and edit the value in the Value field.– Delete - Click next to a tag value.

5. Choose an action:

– Check the Publish checkbox to publish the service.– Uncheck the Publish checkbox to unpublish the service.

The pending actions are listed in the last column of the Services table.6. In the Publication Business drop-down list, optionally select the business or type a new business in which

to publish the service. If you do not provide a business, the business selected when the UDDI server wascreated will be used.

If you type a business name and the business was already created by a different user, Administrator willthrow an exception when you apply the changes. Change the permission of the existing business to allowyou to publish the service to the business. Refer to your UDDI server documentation for managingpermissions.

7. If you want to configure multiple services with different settings, click Save.Saves the changes in the database.

8. Click Apply Changes to UDDI Server, where UDDI Server is the name of the default UDDI server.Saves the changes in the database and applies the changes to the UDDI server.

Reference Details Reference

DescriptionAcceptsSVars?

Editable?Required?Property

Name of the source component.NROROSourceComponentName

Name of the source component reference.NROROSourceComponentReferenceName

NROROInterface

TheNROROMEP

NYNPromotedtoEnvironmentas

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 149

Page 150: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Indicates whether the interface is dynamic.NROROWired byImplementation

Manual Binding Reference

DescriptionEditable?Required?Field

Name of the binding.YYName

YYType

The type of transport supported by the binding. HTTP or JMS.YYTransportType

The version of the SOAP specification: 1.1 or 1.2.

Default: 1.1.

YNSOAPVersion

HTTP

The version of the SOAP specification. Set to 1.1.YYHTTPClientConfiguration

Indicate whether to enable WS-Addressing headers. When checked,the Anonymous checkbox displays.

Default: Unchecked.

YNEnableWS-Addressing

A HTTP Connector on page 198 .NConnectorName

JMS

JMS - Inbound

The acknowledgment mode for incoming messages. Set to Auto,meaning that the message is automatically acknowledged when itis received.

YYAcknowledgeMode

A JMS Destination Configuration on page 209 .NReplyDestination

JMS-Outbound

A JMS Connection Factory Configuration on page 208 .YYJMSConnectionFactoryConfiguration

A JMS Destination Configuration on page 209.YYJMSDestination

The delivery mode of messages:YNDeliveryMode • Persistent Messages are stored and forwarded.

• Non-Persistent Messages are not stored and may be lost due tofailure.

TIBCO ActiveMatrix Policy Director --- 1.0

150 | Applications

Page 151: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionEditable?Required?Field

Default: Non-Persistent.

The priority of the message. Priority is a value from 0-9. Highernumbers signify a higher priority (that is, 9 is a higher priority than8).

Default: 4.

YNMessagePriority

The length of time a message can remain active. 0 means that themessage does not expire.

Default: 0.

YNMessageExpiry(ms)

Wire to Binding Reference

DescriptionRead-only?Field

When selected, only those services that are valid for the reference are displayed.NShow onlyValid

Name of the application.YApplicationName

Name of the target service.NServiceName

The type of service binding.NServiceBinding

Description for the target service.NRemarks

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 151

Page 152: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Properties

A property is an externally visible data value. Properties enable object behavior to be configured at deploymenttime.

A property has a type, which may be either simple or complex. Implementations, components, composites,bindings, logging configurations and appenders, and resource templates can have properties. Implementation,component, and composite properties are defined in TIBCO Business Studio. Binding, logging configurationand logging appender, and resource template properties are defined by the TIBCO SilverActiveMatrixplatform.

Properties can have explicit values or may be bound to substitution variables, which can be set at deploymenttime in various scopes. Depending on the object possessing the property, the property value can be boundat design time, deployment time, or both:• At design time you can provide default values and indicate whether a composite or component property

value must be set at deployment time.• Some properties can be bound to substitution variables.

At design time, a composite property value can be set to a constant or bound to a substitution variable. Eithertype of binding can be overridden at administration time. However, only the properties of the root compositeof an application or those on bindings associated with application level services and references can beoverridden. If there are nested composites (component of type composite) then their property values cannotbe changed by an Administrator.

A composite property is specific to an application. Often the same property may be defined in more than oneapplication. For business reasons or ease of use an Administrator may want to define the value only onceand have it be used by more than one composite property. This is achieved by binding the composite propertyto a substitution variable, which can be defined at the enterprise, host, environment, node, application, andapplication fragment levels. The following figure shows a property named Greeting bound to a substitutionvariable named Greeting.

A component may be deployed to more than one node and you may want to have different values passedfor a component property in every node. In such cases you would set the component property to a substitutionvariable, and set the substitution variable to different values on each node.

Setting a Property Value

About this taskYou can set a property value to a constant, a substitution variable, or the name of a resource instance availableon the node on which an application is deployed. To bind a property value to a substitution variable, set thevalue to %%variableName%%, wherevariableName is the name of the substitution variable.

GUI

Procedure

1. Select the node where the application is deployed.2. Click Applications.

TIBCO ActiveMatrix Policy Director --- 1.0

152 | Applications

Page 153: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

3. Click an application.4. Click the Properties tab.5. Click the Editable Properties link.6. Click next to a property owner.

The owner's properties and their associated values display.7. Click a property row in the Value column.

The value is enabled for input.8. Specify a value according to the property type.

ProcedureProperty Type

Type a value or substitution variable string.Simple

ResourceInstance

• Type a value or substitution variable string.• Select an existing resource instance.

1. Click the icon. The Lookup Resource Instance dialog displays.a. In the Hosts column, choose a node.b. In the Instances column, choose a resource instance.c. Click Save.

• Create a new resource template.1. Click the new link. The Add Resource Template dialog displays.2. Complete the dialog and click Save. The property value is filled in with the

name of the resource template.

When you create and install a resource instance of a referencing resourcetemplate, a resource instance with the same name as the referencedresource template is instantiated and installed on the same node. Forexample, if you create and install an SSL Client Provider resourceinstance, the Keystore Provider it references will be created and installed.

9. Click Save.The property value is updated in the database.

10. Click The value in the Synchronization column changes to Out of Sync.

11. Click Deploy.The property value is updated in the runtime and the Synchronization column changes to In Sync.

CLI

Procedure

1. In the data file specify a Property definition in full format. Nest the Property element under anApplication element.<Property xsi:type="amxdata:Property" name="propertyName" value="propertyValue"/>

2. In the build file set the action attribute of the AMXAdminTask element to edit and the objectSelectorattribute to //Application/Property.<AMXAdminTask action="edit" objectSelector="//Application/Property"/>

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Applications | 153

Page 154: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Editable Properties Reference

The editable properties defined for an application are accessed by selecting an application and navigating tothe Properties tab and clicking the Editable Properties link.

DescriptionRead-only?Field

Name of the application or binding.YOwner

YOwner Type

The name of the property.YPropertyName

The type of the property. Either string or a resource template type.YPropertyType

The value of the property.NPropertyValue

Non-Editable and Policy Set Properties Reference

The non-editable and policy set properties defined for an application are accessed by selecting an applicationand navigating to the Properties tab and clicking the Non-editable Properties or Policy Set Properties link.

DescriptionRead-only?Field

Name of the application or binding.YOwner

YOwner Type

The name of the property.YPropertyName

The type of the property. Either string or a resource template type.YPropertyType

The value of the property.YPropertyValue

TIBCO ActiveMatrix Policy Director --- 1.0

154 | Applications

Page 155: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

8Object Groups

An object group is a user-defined set of governed objects. Assigning governed objects to a group of similar governedobjects allows you to manage and use them as a unit during runtime.

Object Groups and Object Group Types

A governed object can be a logical object, such as an ActiveMatrix application, or a physical object, such as acomponent instance. An object group always contains the same type of governed objects, and might consist ofhosts, services, references, applications, and machines. For example, an object group can consist of all machinesthat run Linux, or can consist of web applications that run in the DMZ, or of services that a Claims system uses.

TIBCO ActiveMatrix Policy Director supports several object group types:• Service Bindings• Reference Bindings• Components• Instances (for reference bindings, service bindings and components)

Defining Object Groups

You can define object groups in two ways:• Fixed, with governed objects that are explicitly added and that don’t change.• Dynamic, or defined by criteria, with governed objects that move in and out of the group as they meet the

standards set for membership.

When an object group is dynamic, you can apply the appropriate governance policies to any governed objectthat the system discovers in the future.

Ways to Use Object Groups

Use an object group to combine governed objects that have the same governance requirements and to apply thesame policies to that group.

Examples of using an object group to apply policies to related objects:• Apply an encryption policy to all finance services.• Apply a message logging policy to all proxy services

Once you create an object group by combining governed objects with the same governance requirements, you canapply the same policies to the group.

For example, you can apply:• An encryption policy to all finance services• A message logging policy to all proxy services

Topics

• Creating an Object Group• Publishing an Object Group

1.0 --- TIBCO ActiveMatrix Policy Director

Page 156: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Copying a Object Group• Deleting an Object Group

TIBCO ActiveMatrix Policy Director --- 1.0

156 | Object Groups

Page 157: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating an Object Group

Procedure

1. Click Shared Objects > Object Groups.The Object Groups screen displays.

2.Click .The New Object Group wizard displays.

3. Provide values for:a) Name - The name for the object group.b) Object Domain - Choose between AMX and BW.c) Object Type - The drop-down list is rendered based on the chose object domain.d) Choose how you want to define the group members.

Fixed - members are explicitly added to the group when it is created. The members do not change foran object group after it has been created.Dynamic - members are defined by the specified criteria. Members may move in and out of the objectgroup as they meet the criteria for membership.

4. Click Next.The Group Details screen displays.

5. Specify the search criteria:a) Choose between All Criteria and Any Criteria.b)

Click and define the search criteria.More than one search criteria can be defined.

c) Click Search.The object types that meet the search criteria are listed.

6.To select a listed object, select the object and click .

To select all the listed objects, click .

7. Click Finish.

ResultsThe object group is created. The members of the group depend on how you defined the group members.

1.0 --- TIBCO ActiveMatrix Policy Director

Object Groups | 157

Page 158: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Publishing an Object Group

Procedure

1. Click Shared Objects > Object Groups.The Object Groups screen displays.

2. Choose an object group from the list of Object Groups on the left side of the screen.Details of the object group are displayed on the right hand.

3.Click .

TIBCO ActiveMatrix Policy Director --- 1.0

158 | Object Groups

Page 159: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Copying a Object Group

Procedure

1. Click Shared Objects > Object Groups.The Object Groups screen displays.

2.Choose an object group from the list of Object Groups on the left side of the screen and click .

ResultsA copy of the selected object group is created. The newly created object group is in the draft mode.

1.0 --- TIBCO ActiveMatrix Policy Director

Object Groups | 159

Page 160: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting an Object Group

Procedure

1. Click Shared Objects > Object Groups.2.

Choose an object group from the list of Object Groups on the left side of the screen and click .

ResultsThe selected object group is deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

160 | Object Groups

Page 161: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

9Governance Controls

Creating and applying runtime policy, or governance control involves these phases:• Defining governed object group• Publishing governed object group• Defining the policy• Associating the policy with one or more object groups• Deploying the policy (by default, deployment activates the policy)

To apply policies on proxy applications, you register the target service, create a proxy application for the service,and apply your runtime policies to the proxy application.

Governance Control menu options are visible only to users with superuser permissions.

Topics

• Creating a Governance Control• Deploying a Policy• Activating a Policy• Deactivating a Policy• Undeploying a Policy• Synchronizing a Policy• Displaying a Policy• Copying a Policy• Deleting a Policy• Policy Status List• Governance Control Templates

1.0 --- TIBCO ActiveMatrix Policy Director

Page 162: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a Governance Control

Procedure

1. Select Governance > Governance Control.2.

Click .The New Governance Control wizard displays.

3. Click on a template to select it. Choose from the Filter By drop-down list to narrow your options.4. Type a Name for the template and provide an optional Description. For additional information on

Governance Control templates, refer to Governance Control Templates.5. Click Next.

The screen renders based on the chosen template.6. Provide values for the template and click Next.

The Configuration Summary screen displays.7. Review the configuration information and choose one of the following options:

– Back - Navigate to the previous screen in the wizard.– Next - Proceed to apply the governance control. The Applies to tab is enabled.– Save and Exit - Save the governance control. See for information on editing a governance control.– Cancel - exit the wizard without creating the governance control.

8. Distribute the governance control.

– Select from the existing object groups. For additional information on Object Groups, refer to ObjectGroups.

Select the checkboxes for the object groups and click Next.

Only published object groups are available for selection.

– Create a new object group.

Follow directions in Creating an Object Group on page 157. Click Next.

See Creating an Object Group on page 157 for more information.

The Governance Control Application Summary screen displays.9. Review the configuration information and choose one of the following options:

– Back - Navigate to the previous screen in the wizard.– Cancel - exit the wizard without creating the governance control.

ResultsA governance control gets created in the Draft state.

TIBCO ActiveMatrix Policy Director --- 1.0

162 | Governance Controls

Page 163: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deploying a PolicyWhen you deploy a policy successfully, the policy changes it status from the Draft state to the Deployedstate. The Distribution Engine passes the policy to the agents in their respective ActiveMatrix nodes or TIBCOActiveMatrix BusinessWorks engines. When you deploy a policy for the first time, the policy will be in anActivated state.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Select a policy and click .The policy is now deployed. You can see the following buttons are now active on the page:• Activate• Undeploy• Sync• Status of the policy changes to Version: Deployed. Use the Version button to toggle between the Draft

and Deployed versions of a policy.

When the Draft version of a policy is different from the Deployed version of the policy, usethe Deploy button to deploy the new configuration.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 163

Page 164: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Activating a PolicyWhen you deploy a policy, the agent enforces the policy on the selected object groups on ActiveMatrix nodesor TIBCO ActiveMatrix BusinessWorks engines.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Select a policy and click .The policy is now activated. The agent will now enforce the policy on the object groups you selectedduring the creation of the policy. You can see the following buttons are now active on the page:• Deactivate• Undeploy• Sync• Version: Deployed.

TIBCO ActiveMatrix Policy Director --- 1.0

164 | Governance Controls

Page 165: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deactivating a PolicyWhen you deactivate a policy, the agent stops enforcing policies on the object groups, but the configurationremains intact on ActiveMatrix nodes or TIBCO ActiveMatrix BusinessWorks engines.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Select a policy and click .The policy is now deactivated. The agent stops enforcing the policy on the object groups. The followingbuttons are now active on the page:• Activate• Undeploy• Sync• Version: Deployed.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 165

Page 166: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Undeploying a PolicyWhen you undeploy a policy, the agent stops enforcing the policy on the object groups selected and removesthe policy configuration from the ActiveMatrix nodes or TIBCO ActiveMatrix BusinessWorks engines.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2. Select a policy and click .The policy is now undeployed.

TIBCO ActiveMatrix Policy Director --- 1.0

166 | Governance Controls

Page 167: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Synchronizing a PolicyThere are cases when the targeted configuration of a policy, including the object group membership, can goout-of-sync with the deployed configuration residing on the agents. Here are some situations that lead toan out-of-sync status: when an object group membership is updated, but not reflected on the agents, orwhen a policy displays an error status. In such cases, use the Sync button to synchronize the policyconfigurations.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Select a policy and click .The policy is now synchronized. The agent will now reflect all the changes on the policy. The status ofthe policy will now be shown as In Sync.

If a policy displayed an error status and the error condition was fixed, then click the Sync buttonto bring the policy back to the Deployed status.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 167

Page 168: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Displaying a Policy

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Click to sort policies based on their type. You can select from the following options: All,Security, WS-Addressing, Logging, and Reliability.Based on your selection, a list of policies are displayed.

3. Select a policy to see the policy details.4. Click Summary.

The Summary tab summarizes the details related to the policy.

TIBCO ActiveMatrix Policy Director --- 1.0

168 | Governance Controls

Page 169: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Copying a PolicyWhen you copy a policy, a replica of the policy is made with the same configuration as the original policy.

Procedure

1. Click Governance > Governance Control.A list of policies are displayed.

2.Select a policy and click .A copy of the policy is created with the same configuration as the original one.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 169

Page 170: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting a PolicyA policy can either be deleted after it is undeployed, or it can be deleted forcefully while services are stillrunning. Use the Delete option to delete an undeployed policy. Use the Force Delete option to delete deployedpolicies that go out-of-sync, or to delete invalid policies.

Procedure

1. Click Governance > Governance Controls.A list of policies are displayed.

2.Select a policy and click .

– Choose Delete to delete an undeployed policy. Using this option to delete a policy will not have animpact on any running services.

– Choose Force Delete to delete a deployed policy. Using this option to delete a policy will have animpact on running services.

The Delete Governance Controls dialog is displayed.3. Click Yes to confirm deletion.

ResultsThe policy will now be deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

170 | Governance Controls

Page 171: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Policy Status ListA policy can have multiple statuses through out its life-cycle.

DescriptionValue

A policy is in a Draft state when it is being configured in the TIBCOActiveMatrix Policy Director, and the Distribution Engine has not yet dispatchedit to an agent.

Draft

A policy is in a Deployed state when it is residing on an agent, and the agenthas all the information related to the policy. When you deploy a policy for thefirst time, it is automatically activated.

Deployed

A policy is in an Activated state when it is residing on an agent, and the agenthas enforced the policy on selected object groups.

Activated

A policy is in an DeActivated state when it is residing on an agent, but theagent has stopped enforcing the policy on selected object groups.

Deactivated

A policy is in an Undeployed state when the policy is not residing on an agent.Undeployed

The DeployError status is displayed when deploying a policy on some or allof the members of the object group fails.

DeployError

The DeploySuccessful status is displayed when deploying a policy on all themembers of the object group was successful.

Deploy Successful

When the targeted configuration of a policy or the resource instances associatedwith the policy is not synchronized with the deployed configuration, the statusis displayed as out-of-sync.

out-of-sync

When the targeted configuration of a policy or the resource instances associatedwith the policy is synchronized with the deployed configuration, the status isdisplayed as in-sync.

In-sync

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 171

Page 172: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Governance Control Templates

Policies are broadly categorized into four types:1. Security2. WS-Addressing3. Reliability4. Logging

Authentication by Kerberos ReferenceAuthentication by Kerberos Reference is a security policy to ensure that consumer requests provide theircredentials as Special Negotiation (SPNEGO) tokens using Kerberos authentication. Kerberos authenticationis applicable to the following endpoints: AMX SOAP HTTP Service Binding Instance, AMX WebAppComponent Instance, and BW SOAP HTTP Service Endpoint Instance.

DescriptionProperty

Choose the service provider from the drop-down list.Service provider for SPNEGO authentication

Specify a name for the service.Service Name

Configuring Kerberos Authentication for TIBCO ActiveMatrix Policy Director

About this taskThis task helps you configure Kerberos Authentication forTIBCO ActiveMatrix Policy Director. TIBCOActiveMatrix Policy Director supports Microsoft Active Directory 2008. Before completing these steps, youmust enable Microsoft Active Directory to act as the Kerberos Distribution Center. Please refer to the Microsoftdocumentation to complete the steps on setting up Kerberos Authentication for Single Sign-On.

Procedure

1. Click Shared Objects > Resource Templates.The Resource Templates table is displayed.

2.Click .The Add Resource Template dialog is displayed.

3. From the Type drop-down list, select Kerberos Authentication.4. On SAML Options tab, specify the following:

a) Validity of SAML Tokens in seconds.b) Signer of SAML Tokens.

5. On Configuration File tab, specify the following:a) Kerberos Realm: Specify the Kerberos Realm name mentioned in the Kerberos .ini file on your system.b) Kerberos Distribution Center: Specify the IP Address mentioned in the Kerberos .ini file.c) Kerberos Configuration File Option: Specify the Kerberos Configuration file location. You can either

specify a system specific file location, or specify a custom file location, or generate your ownconfiguration file.

If you do not have the Kerberos Initialization file (for example, C:\winnt\krb.ini) in your system,Microsoft Active Directory will only act as an LDAP service and not as a Kerberos Domain Controller.

6. Click Advanced tab. Specify the following:a) Module Class

TIBCO ActiveMatrix Policy Director --- 1.0

172 | Governance Controls

Page 173: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

b) Principal NameThe Principal Name can be optional as it is generic at this stage. The right place to specify the PrincipalName is when you define Authentication by Kerberos Governance Control template.

7. Check Keytab.If you are using server-side authentication, ensure that you check the Keytab option. If not, the sessionticket is not generated. This field is optional when you are using client-side authentication.In addition to these steps, enable your browser to pass SPNEGO tokens by selecting the Enable IntegratedWindows Authentication option on the Advanced tab of your browser and adding the site to the list ofTrusted Sites.

Authentication by SiteMinder ReferenceAuthentication by SiteMinder Reference is a security policy to ensure that the consumer credentials arevalidated as username tokens using the SiteMinder protocol. SiteMinder authentication is applicable to AMXSOAP HTTP Service Binding Instance and AMX WebApp Component Instance endpoints.

DescriptionProperty

Choose the service provider from the drop-down list.Service provider to perform username/ passwordauthentication

Specify a name for the service.Service Name

The Service Name should either be left blankin the SiteMinder Authentication SharedResource template, or it should be the sameas the one given in the SiteMinderAuthentication Shared Resource template.

Configuring SiteMinder for TIBCO ActiveMatrix Policy Director

Procedure

To configure SiteMinder, perform the following steps :ProcedureStarting Point

On the command prompt 1. Install TIBCO ActiveMatrix Policy Director2. Replace tibcojre/lib/security/jce.jar with the latest jce.jar file.3. Install Jurisdiction Policy. Refer to Installing Unlimited Jurisdiction Files

on page 302 for more details.4. From <AMX-HOME>\tibcojre\jre\lib\security overwrite the files:

local_policy.jar and us_export_policy.jar.

Run tpcl, configure third-party drivers to support SiteMinder libraries, andload the following files:

If you are using SiteMinder Policy Server version R12, then install:

On Tibco ConfigurationTool

1. smagentapi.jar

2. cryptoj.jar

If you are using SiteMinder Policy Server version R6, then install:1. jsafe.jar

2. jsafeJCEFIPS.jar

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 173

Page 174: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureStarting Point

3. smagentapi.jar

On ActiveMatrixAdministrator UI

1. Choose Infrastructure > Software Management.2. Select Show System Features.3. Select Tibco ActiveMatrix SiteMinder WebAgent Feature.4. Click Edit.5. Select a node to deploy.6. Click Apply with resolve.

The following status indicates that the configuration was successful:1. Feature Status = Installed.2. Node Runtime State = Running.3. Action History= Change features successful.

Refer to the SiteMinder documentation to configure Single Sign-On.On SiteMinder

When you configure a shared resource for SiteMinder configuration, ensure that you check EnableSecurity Token Attribute on the SAML Options tab.

Authorization by Role ReferenceAuthorization by Role is a security policy that ensures that a request is authorized based on the role used inthe Security Assertion Markup Language (SAML) tokens. This authorization is applicable to the followingendpoints: AMX Service Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS), BW ServiceEndpoint(SOAP/HTTP).

DescriptionProperty

Choose between the followingDefault authorization for all operations• Deny access to all operations• Allow access to all operations for - use the Add

Operation button to add an operation. Assignaccess and roles for the operation.

Basic Authentication ReferenceBasic authentication is a security policy that ensures that a consumer request is validated based on thecredentials in the HTTP header. Basic authentication is applicable to the following endpoints: AMX SOAPHTTP Service Binding Instance, AMX WebApp Component Interface, and BW SOAP HTTP Service Endpoint.

DescriptionProperty

From the drop-down list, choose a Shared ResourceTemplate for LDAP Authentication.

Service provider to perform username/ passwordauthentication

Basic Credential MappingBasic Credential Mapping is a policy to ensure that the credentials in the consumer request are validatedonce and propagated across domains. Credentials are mapped using a password identity provider. Theidentity extracted from the password identity is inserted as HTTP Basic Authentication in the outgoingrequest. It is applicable to the following endpoints: AMX SOAP Http Binding Instance, BW SOAP Http ServiceEndpoint, and BW SOAP Http Reference Endpoint.

TIBCO ActiveMatrix Policy Director --- 1.0

174 | Governance Controls

Page 175: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionProperty

Select this option to map credentials using defaultmapping. Once selected, you will be prompted toselect the name of the Identity Provider.

Default Credential Mapping

Following options can be selected to exempt fromdefault credential mapping:

Exceptions to the Default Credential Mapping

1. Map credentials for authenticated users.2. Map credentials for anonymous users.3. Map credentials for users with specified roles.

After one of these options are selected, you will beprompted to enter the name of the Identity Provider.

BusinessWorks to SAML Credential Mapping ReferenceBusinessWorks to SAML Credential Mapping Reference is a policy to transform UserInfoDoc (TIBCOActiveMatrix BusinessWorks Schema) to SAML assertions (SAML Schema). In this case, the Policy Enforcementat Runtime (PER) provider does not generate a security context. This policy is applicable to AMX ServiceBinding Instance(SOAP, SOAP/HTTP, JMS) and BW SOAP Service Endpoint(SOAP, HTTP) endpoints.

DescriptionProperty

Specify a unique name for the policy.Name

Enter a description.Description

When you create an application, remember to select TIBCO ActiveMatrix Policy Director BWCredential Mapping as the Existing Application Template and remember to deploy it on everynode. This will ensure that BusinessWorks to SAML Credential Mapping reference will work on thosenodes.

SAML to BusinessWorks Credential Mapping ReferenceSAML to BusinessWorks Credential Mapping Reference is a policy to transform SAML tokens to UserInfoDoc.The Policy Enforcement at Runtime (PER) provider generates tokens and provides a security context. Thispolicy is applicable to AMX Reference Binding Instance(SOAP, SOAP/HTTP, JMS), BW ServiceEndpoint(SOAP/HTTP), and BW Reference Endpoint (SOAP/HTTP) endpoints.

DescriptionProperty

Specify a unique name for the policy.Name

Enter a description.Description

When you create an application, remember to select TIBCO ActiveMatrix Policy Director BWCredential Mapping as the Existing Application Template and remember to deploy it on everynode. This will ensure that SAML to BusinessWorks Credential Mapping reference will work on thosenodes.

Logging ReferenceLogging reference is a logging policy that helps you create and maintain log entries. It is applicable to thefollowing endpoints: AMX Service Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS) , AMX Reference

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 175

Page 176: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS) , BW Service Endpoint (SOAP/HTTP), and BW ReferenceEndpoint (SOAP/HTTP).

DescriptionProperty

Choose between the followingMessage content to log• Message and properties• Properties only• Transformation - specify an XSLT transformation.

The duration for which the log entries are retained.Length of time to retain logs

Choose betweenConditions on which logs are saved• Always• Only faults• XPath - specify an XPath expression that retuens

a boolean value.

Choose betweenOperations to log• All• Specified operations - click the Add Operation

button.

Using Logging Policy with Internal DatabasesYou can use the Logging Policy with an internal HSQL database. Before using the Logging Policy, configurethe shared resources and the log service application.

Procedure

1. From the command prompt, navigate to <TIBCO_HOME>\administrator\3.2\scripts\logging\policy.2. Execute target by running the command: ant install.

This creates a separate policy node and deploys the shared resources and log service application.

Using Logging Policy with External DatabasesTIBCO ActiveMatrix Policy Director supports external databases such as Oracle, MS SQL, and DB2.

Procedure

Perform the following steps to use the Logging policy with an external database:ProcedureStarting Point

Open data.properties file andupdate the following logservice and

Navigate to<TIBCO_HOME>\administrator\3.2\scripts\logging\policy.

payload service properties to suit theexternal database set up on yoursystem:1. Database Driver2. Database URL3. Account and password4. Dialect for the database5. Database Vendor

TIBCO ActiveMatrix Policy Director --- 1.0

176 | Governance Controls

Page 177: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureStarting Point

Execute ant install.node.From<TIBCO_HOME>\administrator\3.2\scripts\logging\policy,open the command prompt.

Log into TIBCOAdministrator TIBCO ActiveMatrix Policy DirectorAdministrator UI.

1. Navigate to Infrastructure >Software Management.

2. To verify whether or not a JDBCdriver for the external database isinstalled on the policy node, clickShow System Features.

3. If the JDBC driver for the externaldatabase is not installed, select thenode and click Edit.

4. Add features pertaining to theexternal database you are usingand click Apply.

Execute ant install.srupdate.appender install.service.

From<TIBCO_HOME>\administrator\3.2\scripts\logging\policy,open command prompt.

The Logging policy can now be used with the external database.

SAML Authentication for SSO ReferenceSecurity Assertion Markup Language (SAML) Authentication for Single Sign-on (SSO) Reference is a securitypolicy that ensures that authentication of a consumer's request is done using SAML tokens. User credentialsare then propagated across domains. This policy is applicable to AMX Virtualization Service Binding Instance.

DescriptionProperty

Check the checkbox to verify the signature.Verify signature on SAML

SAML Credential Mapping for SSO ReferenceSAML Credential Mapping for Single Sign-On (SSO) Reference is a security policy to authenticate consumerrequests using SAML tokens. Once authenticated, tokens are propagated across domains. This policy isapplicable to AMX Virtualization Service Binding Instance.

DescriptionProperty

From the drop-down list, choose the Mutual IdentityProvider.

Sign SAML Assertion

Choose betweenDuration of the SAML Assertion• SAML Assertion is valid forever• Specify validity period - specify the duration in

seconds.

User Name Token AuthenticationUser Name Token Authentication is a security policy that validates user name tokens sent over a SOAPHeader as WSS Security token.TIBCO ActiveMatrix Policy Director performs basic authentication for credentials

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 177

Page 178: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

sent over HTTP Header. This policy applies to AMX Service Binding Instance (SOAP, SOAP/HTTP,SOAP/JMS) and BW Service Endpoint (SOAP/HTTP).

DescriptionProperty

Choose the service provider from the drop-down list.Service Provider

WS Reliable MessagingThe WS Reliable Messaging template is used to create policies that enforce reliable messaging. WS ReliableMessaging ensures reliable delivery of messages to the endpoint. This policy is applicable to the followingendpoints: AMX Service Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS), AMX Reference BindingInstance (SOAP, SOAP/HTTP, SOAP/JMS) and on virtualization bindings.

DescriptionProperty

Specify a name for the service.Name

Specify a Description about the service.Description

WS-Addressing for ReferenceWS-Addressing offers a standard mechanism to build Web services by identifying and exchanging messagesbetween multiple endpoints. The WS-Addressing mechanism supports two communication modes -Anonymous and Non-Anonymous. This policy is applicable to the following endpoints : AMXReferenceBindingInstance (SOAP, SOAP/HTTP, SOAP/JMS).

DescriptionProperty

Specify a name for the service.Name

Specify a Description about the service.Description

Can either by Anonymous or Non-AnonymousCommunication Mode

Specify an HTTPClient Resource InstanceHttpClient Resource Instance

WS-Addressing for ServiceWS-Addressing offers a standard mechanism to build Web services by identifying and exchanging messagesbetween multiple endpoints. The WS-Addressing mechanism supports two communication modes -Anonymous and Non-Anonymous. This policy is applicable to the following endpoints : AMXServiceBindingInstance (SOAP, SOAP/HTTP, SOAP/JMS).

DescriptionProperty

Specify a name for the service.Name

Specify a Description about the service.Description

Can either be Anonymous or Non-AnonymousCommunication Mode

WSS Consumer ReferenceWSS Consumer Reference is an encryption-based security policy used with WSS Provider Reference. Thispolicy facilitates processing of WS-Security Header from response message. WSS Consumer acts on theReference side to ensure that the confidentiality, integrity, and timestamp of a request remains secure. Tomaintain confidentiality, a response is decrypted at its endpoint. To maintain integrity, the response is verified

TIBCO ActiveMatrix Policy Director --- 1.0

178 | Governance Controls

Page 179: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

for a valid signature. To track the time of the response, a timestamp is inserted in the response. This policyis applicable to the following endpoints: AMX Reference Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS),BW Reference Endpoint (SOAP/HTTP).

Select the checkboxes for the required features.

DescriptionProperty

The provider for the WSS authentication service. Thisoption is required if you intend to selectAuthentication, Confidentiality, or Integrity.

WSS Processor

Decrypt responses and encrypt requests.Confidentiality

Verify that requests have signatures and thatresponses are signed.

Integrity

Verify timestamp on responses. Set timestamps onrequests.

Timestamp

Use supported identity token profiles to insert identitytoken into outgoing requests. Select one from thefollowing options:

Credential Mapping

1. Username Token Credential Mapping usingIdentity Provider.

2. SAML Token based Credential Mapping

DescriptionProperty

Specify a Resource Template for WSS Processing.Select this option only if you do not want thegovernance control to process response messages.

Resource Template for WSS Processing

Select Encrypt Request and/or Decrypt Response.

Select one of the following:

Confidentiality

1. Use client certificate for encryption2. Use a resource template for encryption

Select which of the following should be encrypted:Use client certificate for encryption1. Encrypt parts: Body and/or Header2. Encrypt Elements: Add elements to be encrypted.

Use a resource template for encryption 1. From the drop-down box, select a Resourcetemplate for encryption

2. Specify a Key Alias.

Select Sign Request and/ or Verify parts that aresigned.

Integrity

Select a Resource template for signing.Sign Request

Select which of the following should be signed:1. Sign Parts: Body and/or Header2. Sign Elements: Add elements to be signed.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 179

Page 180: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionProperty

Select from the following options:Verify parts that are signed1. At least some parts or elements in the message

that should be signed2. Entire message should be signed3. Message header should be signed4. Message body should be signed

Select from the following:Timestamp1. Set timestamp on request. Specify time-to-live in

seconds.2. Verify timestamp on response.

DescriptionProperty

SAML Token based Credential Mapping 1. From the drop-down list, select SAML tokenprofile.

2. If you select Sign SAMLAssertion, specify sharedresource for signing SAML.

3. Enter SAML issuer name4. Select SAML Assertion Validity

WSS Provider ReferenceWSS Provider Reference is an encryption-based security policy used in conjunction with WSS ConsumerReference. This policy is used to encrypt the credentials of a consumer's request. WSS Provider acts on theServer side to ensure that the confidentiality, integrity, and timestamp of a request remains secure. To maintainconfidentiality, a request is encrypted at its endpoint. To maintain integrity, the request is verified for a validsignature. To track the time of the request, a timestamp is inserted in the request. This policy is applicable tothe following endpoints: AMX Service Binding Instance (SOAP, SOAP/HTTP, SOAP/JMS), BW ServiceEndpoint(SOAP/HTTP), and BW Reference Endpoint (SOAP/HTTP).

DescriptionProperty

The provider for the WSS authentication service.WSS Processor

The identity token profiles processed by this policy.Authentication

Decrypt requests and encrypt responses.Confidentiality

Verify that requests have signatures and thatresponses are signed.

Integrity

Verify timestamp on requests. Set timestamps onresponses.

Timestamp

DescriptionProperty

Specify a Resource Template for WSS Processing.Select this option only if you do not want the

Resource Template for WSS Processing

governance control to process request messages. Thisoption is required if you intend to selectAuthentication, Confidentiality, or Integrity.

TIBCO ActiveMatrix Policy Director --- 1.0

180 | Governance Controls

Page 181: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionProperty

Authentication can be done in the following ways:Authentication1. Verify user name token2. Verify SAML token3. Verify Kerberos token

Select one of the following confirmation methods:Verify SAML token1. Sender Vouches2. Holder of Key3. Bearer

Select one of the following security token types:1. SAML 1.1 Token 1.12. SAML 2.0 Token 1.1

Specify Issuer Name.

Specify Service Name.Verify Kerberos token

Select Decrypt Request and/or Encrypt Response.

Select one of the following:

Confidentiality

1. Use client certificate for encryption2. Use a resource template for encryption

Select which of the following should be encrypted:Use client certificate for encryption1. Encrypt parts: Body and/or Header2. Encrypt Elements: Add elements to be encrypted.

Use a resource template for encryption 1. From the drop-down box, select a Resourcetemplate for encryption

2. Specify a Key Alias.

Select Verify signature on request and/ or SignResponse.

Integrity

Select a Resource template for signing.Sign Response

Select which of the following should be signed:1. Sign Parts: Body and/or Header2. Sign Elements: Add elements to be signed.

Select from the following options from thedrop-down, Verify parts that are signed:

Verify signature on request

1. At least some parts or elements in the messagethat should be signed

2. Entire message should be signed3. Message header should be signed4. Message body should be signed

Select from the following:Timestamp1. Set timestamp on response. Specify time-to-live in

seconds.2. Verify timestamp on request.

1.0 --- TIBCO ActiveMatrix Policy Director

Governance Controls | 181

Page 182: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 183: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

10Resource Templates

A resource template specifies configuration details for resources. One resource template can be used to configuremany resource instances. Resource instances allow sharing of resources such as connection pools. They also eliminatethe need to provide such details in services, component implementations, and references. Instead, you specify aproperty of the type of required resource in the service, component, or reference. When you configure the applicationfor deployment, you map the property to a resource instance available on the node on which the service, component,or reference is deployed.

Resource templates are defined at the enterprise level. You create resource templates in two ways:• Manually via actions in the command-line and web interfaces• Automatically when you import them during the procedure to create an application

In either case you must have the enterprise permission Create Resource Template.

Topics

• Creating a Resource Template• Navigating to a Resource Templates List• Editing a Resource Template• Deleting Resource Templates• Creating an Obfuscated Password• Hibernate• HTTP Client• HTTP Connector• JDBC• JMS Resource Templates• LDAP Connection• SMTP• Teneo• Thread Pool• Security Resource Templates

1.0 --- TIBCO ActiveMatrix Policy Director

Page 184: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a Resource TemplateRelated Topics

Hibernate on page 191HTTP Client on page 194HTTP Connector on page 198Identity Provider on page 223JDBC on page 201JNDI Connection Configuration on page 210JMS Connection Factory on page 207JMS Connection Factory Configuration on page 208JMS Destination on page 209JMS Destination Configuration on page 209Kerberos Authentication on page 224Kerberos Identity Provider on page 228Keystore Provider on page 229

If you set up your environment for SSL, you have to set up a keystore. As part of the process, youconfigure a keystore provider.

LDAP Authentication on page 232Mutual Identity Provider on page 236SiteMinder Authentication on page 237SSL Client Provider on page 240SSL Server Provider on page 242Teneo on page 218Thread Pool on page 221Trust Provider on page 245WS-Security ASP on page 245

GUI

Procedure

1. Navigate to a resource templates list. Choose a starting point.ProcedureStarting Point

Shared Objects 1. Select Shared Objects > Resource Templates.2.

Click .

Hosts 1. Select Infrastructure > Hosts > hostName > Resource Instances.2.

Click .

2.Click .The Add Resource Template dialog displays with the drop-down list for the resource instance typeexpanded.

3. Select a resource type from the Type drop-down list.

TIBCO ActiveMatrix Policy Director --- 1.0

184 | Resource Templates

Page 185: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

The dialog redraws with type-specific fields.4. Edit the template configuration fields.

The name of the resource template must not contain the characters : or &.

5. Click Save.

CLI

Procedure

1. Choose whether to explicitly specify a template or import from an application template.DescriptionOption

In the data file, specify the type of the resource template in the xsi:type attribute.Manual

For example:<ResourceTemplate xsi:type="amxdata:HttpClientResourceTemplate" name="HttpclientRT" ... </ResourceTemplate>

In the data file, specify the name of the resource template in the ImportRTNames element.Import

Specify the value _ALL_ to import all templates. For example:<Application xsi:type="amxdata:Application" name="app"> <ApplicationTemplate xsi:type="amxdata_reference:ApplicationTemplate_reference" name="appTemplate"/> <ImportRTNames>HttpclientRT</ImportRTNames></Application>

2. In the build file, set the action attribute of the AMXAdminTask element to add.DescriptionOption

Set the objectSelector attribute to ResourceTemplate.Manual

For example:<AMXAdminTask action="add" objectSelector="ResourceTemplate"/>

Set the objectSelector attribute to Environment/Application.Import

For example:<AMXAdminTask action="add" objectSelector="Environment/Application" />

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 185

Page 186: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Navigating to a Resource Templates List

Procedure

Choose a starting point and follow the applicable procedure.ProcedureStarting Point

Shared Objects 1. Select Shared Objects > Resource Templates.2.

Click .

Hosts 1. Select Infrastructure > Hosts > hostName > Resource Instances.2.

Click .

The New Resource Template dialog displays.

Related TopicsHibernate on page 191HTTP Client on page 194HTTP Connector on page 198Identity Provider on page 223JDBC on page 201JNDI Connection Configuration on page 210JMS Connection Factory on page 207JMS Connection Factory Configuration on page 208JMS Destination on page 209JMS Destination Configuration on page 209Kerberos Authentication on page 224Kerberos Identity Provider on page 228Keystore Provider on page 229

If you set up your environment for SSL, you have to set up a keystore. As part of the process, youconfigure a keystore provider.

LDAP Authentication on page 232Mutual Identity Provider on page 236SiteMinder Authentication on page 237SSL Client Provider on page 240SSL Server Provider on page 242Teneo on page 218Thread Pool on page 221Trust Provider on page 245WS-Security ASP on page 245

TIBCO ActiveMatrix Policy Director --- 1.0

186 | Resource Templates

Page 187: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Editing a Resource Template

Procedure

1. Select Shared Objects > Resource Templates.2. In the Resource Templates list, click a template.

The General tab of the template displays.3. Click a tab to choose which configuration fields to edit.4. Edit one or more template configuration fields.

ProcedureField Type

Type a value for the field. Some resource templates have properties that acceptpasswords. Passwords can be specified as clear or obfuscated text.

Text

Select a value from the list.Drop-down List

Resource Template • Select an existing resource template.1. Click to display a picker that lists matching resource templates.2. Click a template.3. Click OK.

• Create a new resource template.1. Click new to display the New Resource Template dialog.2. Create a resource template.

The Save and Revert buttons are enabled.5. Click an action button. The action performed by a button applies only to the tab being edited.

ActionOption

Save changes to the database.Save

Discard changes and revert to the last saved state.Revert

Restore default values for fields that have a default. If a field does nothave a default, the value stays as is.

Restore Default

The Save and Revert buttons are disabled.6. If there are resource instances that depend on the modified resource template and if there are applications

that use those resource instances, the Apply Changes in Resource Template to Runtime dialog displays.a) Select the resource instances that you want to reinstall. These are resource instances created from this

resource template or other resource templates that depend on the modified resource template.b) Select the applications that you want to restart.c) Select the nodes where you want the resource instances reinstalled and the applications restarted.

7. Click OK.

Related TopicsHibernate on page 191HTTP Client on page 194HTTP Connector on page 198Identity Provider on page 223JDBC on page 201

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 187

Page 188: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

JNDI Connection Configuration on page 210JMS Connection Factory on page 207JMS Connection Factory Configuration on page 208JMS Destination on page 209JMS Destination Configuration on page 209Kerberos Authentication on page 224Kerberos Identity Provider on page 228Keystore Provider on page 229

If you set up your environment for SSL, you have to set up a keystore. As part of the process, youconfigure a keystore provider.

LDAP Authentication on page 232Mutual Identity Provider on page 236SiteMinder Authentication on page 237SSL Client Provider on page 240SSL Server Provider on page 242Teneo on page 218Thread Pool on page 221Trust Provider on page 245WS-Security ASP on page 245

TIBCO ActiveMatrix Policy Director --- 1.0

188 | Resource Templates

Page 189: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting Resource Templates

Procedure

1. Select Shared Objects > Resource Templates .2. In the Resource Templates list, click one or more templates.3. Click Delete.

If resource instances created from the templates exist an error dialog will be displayed. Otherwise, thetemplates are deleted from the database.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 189

Page 190: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating an Obfuscated Password

Procedure

Run the command: ant -f CONFIG_HOME/admin/enterpriseName/samples/obfuscate_build.xml-Dpassword=yourpassword

ExampleC:\>ant -f C:\amx3data\admin\amxadmin\samples\obfuscate_build.xml -Dpassword=mypwBuildfile: C:\amx3data\admin\amxadmin\samples\obfuscate_build.xml -Dpassword=mypw

encrypt:[AMXObfuscateTask] INFO - Initializing JSSE's crypto provider class com.sun.net.ssl.internal.ssl.Provider in default mode[AMXObfuscateTask] Obfuscated value:[#!EotHYBCR6OhxS0l7VK0GqnyKeSAp0DVd]

BUILD SUCCESSFULTotal time: 3 seconds

TIBCO ActiveMatrix Policy Director --- 1.0

190 | Resource Templates

Page 191: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Hibernate

Represents a Hibernate resource. Used by component implementations to access databases. Hibernate is aframework that supports storing Java objects in a relational database. Hibernate solves object-relationalimpedance mismatch by replacing direct database access with high-level, object-handling functions.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a JDBC on page 201 that represents theconnection to the database.

YYYDataSource

Indicate whether to create or validate schema in the databasewhen the session factory is created:

NNNSchemaGenerationType • Do Nothing - Indicate that only data is added, changed,

and deleted. If the schema does not already exist, theapplication will experience errors when it runs.

• Validate - Validate the schema.• Create - Create the schema every time the session factory

is created, deleting old schema and data if it exists.• Create Drop - Same as Create, but drops the schema at

the end of the session.• Update - Update the schema with the changes implied

by the Java objects being mapped to the database.

Default: Do Nothing.

The class name of a Hibernate dialect that enables Hibernateto generate SQL optimized for a particular relationaldatabase. The supported dialects are:

YYYDialect

org.hibernate.dialect.

DB2Dialect

HSQLDialect

SQLServerDialect

MySQLDialect

OracleDialect

Oracle9Dialect

PostgreSQLDialect

SAPDBDialect

SybaseDialect

SybaseAnywhereDialect

com.tibco.amf.sharedresource.runtime.core.

hibernate.dialects.

DB2Dialect

HSQLDialect

SQLServerDialect

MySQL5Dialect

Oracle9Dialect

Oracle10GDialect

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 191

Page 192: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Default: com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.HSQLDialect.

Advanced

DescriptionAcceptsSVars?

Editable?Required?Property

Permit data collection in the SQL Server transaction log file.

Default: Unchecked.

NNNEnableSQLLogging

Enables JDBC batch processing.

Default: 5.

YYNBatch Size

DescriptionAcceptsSVars?

Editable?Required?Property

Hibernate configuration properties:YYNProperties• Format SQL Enabled• Default Schema• Default Catalog• Max Fetch Depth• Default Batch Fetch Size• Use Order Updates• Use Order Inserts• Use Generate Statistics• Use Identifier Rollback• Use SQL Comments• Fetch Size• Batch Versioned Data• Batcher Factory Class• Use Scrollable Resultset• Use Stream For Binary• Use Get Generated Keys• Connection Isolation• Use Auto Commit• Connection Release Mode• Cache Provider Class• Use Minimal Puts• Use Query Cache• Use Second Level Cache• Query Cache Factory• Cache Region Prefix• Use Structured Entries• Transaction Factory Class• JTA Transaction JNDI Name• Flush Before Completion

TIBCO ActiveMatrix Policy Director --- 1.0

192 | Resource Templates

Page 193: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

• Auto Close Session• Query Factory Class• Query Substitutions• Use Reflection Optimizer

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 193

Page 194: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

HTTP Client

Represents an outgoing HTTP connection. HTTP clients are used by a reference's SOAP binding.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the host that accepts the incoming requests.For machines that have only one network card, the default

YYYMachineName

value localhost specifies the current machine. For machinesthat have more than one network card, this field specifiesthe host name of the card that used to accept incomingHTTP requests.

Default: localhost.

The port number on which to invoke outgoing HTTPrequests.

Default: 80.

YYYPort

The length of time to wait before closing an inactiveconnection. If more than zero, and data transmission has

YYNIdleTimeout(s) not finished, a call to close the connection blocks the calling

program until the data is transmitted or until the specifiedtimeout occurs. If 0, a call to close the connection returnswithout blocking the caller and an attempt is made to sendthe data. Normally this transfer is successful, but it cannotbe guaranteed. This value should be changed only on theadvise of TIBCO Support.

Default: 0 s.

Defines the socket timeout (SO_TIMEOUT), which is thetimeout for waiting for data or a maximum period inactivity

YYNSocketTimeout(ms) between consecutive data packets. This should be changed

when connecting to very slow external services. A timeoutvalue of zero is interpreted as an infinite timeout.

Default: 0 ms.

Determines the timeout until a connection is established.This should be changed when connecting to very slow

YYNConnectionTimeout(ms) external services. A timeout value of zero is interpreted as

an infinite timeout.

The timeout is influenced by operating systemspecific behavior at the TCP socket layer. OnWindows 2008, Windows 7 and Windows XP thetimeout value configured in this field is not honored,and instead it uses an internal timeout of around 21seconds. Some versions of Linux, such as Ubuntu,also do not honor this timeout.

TIBCO ActiveMatrix Policy Director --- 1.0

194 | Resource Templates

Page 195: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Default: 0 ms.

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Advanced

DescriptionAcceptsSVars?

Editable?Required?Property

Indicates whether the HTTP method should automaticallyfollow HTTP redirects.

This option is used when client connection receives theredirect responses from server like Moved Permanently,Moved Temporarily, Temporary Redirect and so on.

NNNAcceptRedirect

Default: Unchecked.

When a TCP connection is closed, the connection mightremain in a timeout state for a period of time after the

NNNReuseAddress

connection is closed (typically known as the TIME_WAITstate or 2MSL wait state).

For applications using a well-known socket address or port,it might not be possible to bind a socket to the requiredSocketAddress if there is a connection in the timeout stateinvolving the socket address or port.

Default: Unchecked.

Indicate whether to use the single or multi-threadedconnection manager.

Default: Unchecked.

NNNDisableConnectionPooling

Determines whether the Nagle algorithm is used.

The Nagle algorithm tries to conserve bandwidth byminimizing the number of segments that are sent. When

NNNSuppressTCP Delay

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 195

Page 196: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

applications wish to decrease network latency and increaseperformance, they can disable Nagle's algorithm by enablingSuppress TCP Delay.

Data will be sent earlier at the cost of an increase inbandwidth consumption and the number of packets.

Default: Checked.

Determines whether the stale connection check is to be used.Disabling the stale connection check can result in slight

NNNStaleCheck

performance improvement at the risk of getting an I/O errorwhen executing a request over a connection that has beenclosed at the server side.

Default: Unchecked.

Socket buffer size in bytes.

A suggestion to the kernel from the application about thesize of the buffers to use for the data transferred over thesocket.

YYNBuffer Size(B)

Default: -1. Allow the runtime to determine the buffer size.

The timeout, in milliseconds, until a connection isestablished.

Default: 0.

YYNConnectionRetrievalTimeout(ms)

Local host address to be used for creating the socket.

Default: None.

YYNLocalSocketAddress

Controls the maximum number of simultaneous activeconnection that this resource instance allows. The value

YYNMaximumTotalConnections should be increased for application that creates a lot of

long-lived connections.

Default: 20.

Controls the maximum number of simultaneous activeconnection to a same host that this resource instance allows.

YYNMaximumTotal

This number cannot be greater than Maximum TotalConnections.

Default: 2.

Connectionsper Host

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

196 | Resource Templates

Page 197: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Configuring Mutual Authentication

About this taskFollow these steps to configure mutual authentication between an HTTP Client and an HTTP server:

Procedure

1. Create a trust store keystore following the instructions in Creating a Trust Store Keystore on page 298 withthe public root certificate of the HTTP server. You do not need the private key of the HTTP server.

2. Create a trust store Keystore Provider resource template.a) Click the Browse button, select the keystore you created in 1 on page 197, and click Open.b) In the Type drop-down list, select JKS.c) In the Password field, type the keystore password.d) Save the Keystore Provider resource template.

3. Create a keystore file that has the certificate containing the private key for the client. You can use thekeytool utility to create such a keystore and import the client-side certificate. You can combine the twokeystores if you choose to maintain a single keystore file that stores the client identity certificate as wellas trusted certificates.

4. Create an identity Keystore Provider resource template.a) Click the Browse button, select the keystore you created in 3 on page 197, and click Open.b) In the Type drop-down list, select JKS.c) In the Password field, type the keystore password.d) Save the Keystore Provider resource template.

5. Create an SSL Client Provider resource template.a) Configure the Keystore Provider as Trust Store field with the trust store Keystore Provider resource

template you created in 2 on page 197.b) Check the Enable Mutual Authentication checkbox.c) Configure the Keystore Provider Having Identity field with a Keystore Provider resource template

that you created in 4 on page 197.d) Save the SSL Client Provider resource template.

6. Configure the HTTP Client resource template to reference the SSL Client Provider resource template.7. Install the HTTP Client on a node.

The HTTP Client, SSL Client Provider, and Keystore Provider resource instances referenced by the HTTPClient resource instance are installed on the node.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 197

Page 198: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

HTTP Connector

Represents an incoming HTTP connection. HTTP connectors are used by a service's SOAP binding.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the machine that accepts the incoming requests.For machines that have only one network card, the default

YYYMachineName

value, localhost, specifies the current machine. For machinesthat have more than one network card, this field specifiesthe host name of the card that will be used to acceptincoming HTTP requests.

If there is more than one network card on the machine, andyou specify 0.0.0.0 in this field, all network cards on themachine will listen for incoming HTTP requests on thespecified port. Only one HTTP connector can be started oneach port. Therefore make certain that all HTTP connectionresources that use the same machine name specify differentport numbers.

Default: 0.0.0.0. Note that machine name signifies themachine on which the node is running, not the machine onwhich the Administrator server is running.

The port number on which to listen for incoming requests.YYYPort

Once you install an HTTP connector resourceinstance the port is bound to the connector even ifthere are no applications using the connector. Youshould uninstall unused instances to conserve ports.

Default: 9895.

The number of incoming requests that can be queued beforeadditional requests are rejected.

Default: 0, which indicates that the JVM should use thedefault value for accept queue size. For Oracle JVM, thedefault value is 50.

YYNAcceptQueueSize

The number of threads dedicated to processing incomingconnection requests. Ideally, you want to have enough

YYNAcceptorThreads

acceptor threads so that there is always one available whena user needs one, but few enough so that they do notprovide too much of a burden on the system. The threadsare started when the HTTP Connector resource instance isinstalled on a node.

An acceptor thread accepts the connection, then queues therequest to the worker thread pool and returns to processthe next connection request.

TIBCO ActiveMatrix Policy Director --- 1.0

198 | Resource Templates

Page 199: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

In general, the number of acceptor threads should be keptlow. A good rule of thumb is the number of acceptor threadsshould not be greater than twice the number of processors.

Default: 20.

SSL

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

Indicate that SSL connections should be enabled. Whenchecked, the SSL Certificate Source field is enabled.

Default: Unchecked.

NNNEnableSSL

The source of the SSL certificate:NYNSSLCertificateSource

• TIBCO Credential Server• SSL Server Provider - when selected the SSL Provider

field is enabled.

The name of an SSL Server Provider resource instance.YYNSSL ServerProvider

Advanced

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

The size of the buffer available for the HTTP header.

Default: 4096.

YYNHeaderBuffer Size(B)

The size of the buffer available for the HTTP request.

Default: 8192.

YYNRequestBuffer Size(B)

The size of the buffer available for the HTTP response.

Default: 24576.

YYNResponseBuffer Size(B)

The period that a connection is allowed to be idle whenthere are more than (the number of) Low ResourcesConnections.

Default: -1. There is no timeout.

YYNLowResourcesMax IdleTime (ms)

The maximum idle time for a connection. The maximumidle time is applied when:

YYNMax IdleTime (ms)

• Waiting for a new request to be received on a connection• Reading the headers and the content of a request• Writing the headers and the content of a response

Default: 200000 ms.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 199

Page 200: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

The time to delay before a socket resets. Before a socketterminates a connection, it can linger, allowing unsent data

YYNLingerTime (ms)

to be transmitted or it can reset, which means that all unsentdata will be lost.

Default: -1. There is no delay before resetting.

Indicate whether to use non-blocking or blocking IO. Innon-blocking IO, the thread will read whatever data is

NNNUseNon-BlockingIO Sockets available and return to perform other tasks. In blocking IO,

the thread will block on a read operation until all the datais available.

Default: Checked.

Restriction: Due to a [bug] in the Oracle JVM version 1.6,non-blocking IO does not work when the Machine Namefield contains an IPv6 address or when the machine nameresolves only to an IPv6 address. If the machine nameresolves to a IPv4 and an IPv6 address, the IPv4 addresswill be used and non-blocking IO will work correctly.Because of this limitation, you should either use blockingIO or use IPv4 addresses for connectors with non-blockingIO.

Indicate whether to use direct buffers with non-blockingIO. Some JVMs have memory management issues withdirect buffers.

Default: Checked.

NNNUse DirectBuffers

The name of a Thread Pool resource instance containing thethreads used to handle the HTTP request.

YYNWorkerThreadPool When unset, a thread pool with Max Pool Size set

to 250 is created.

Default: None.

By default all HTTP methods are enabled for HTTP connectors. To disable HTTP OPTIONS and PUT methodsfor all connectors on a node or a specific connector, configure the following node JVM properties:• amf.node.disableHTTPOptions• amf.node.disableHTTPOptions.connectorName

• amf.node.disableHTTPPut• amf.node.disableHTTPPut.connectorName

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

200 | Resource Templates

Page 201: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

JDBC

Represents a JDBC connection. Used by component implementations to access databases.

General

DescriptionAcceptSVars?

Editable?Required?Property

The type of the JDBC connection:NNYConnectionType • Direct The connection to the database is through a

vendor-specific driver. When selected, the DatabaseDriver and Database URL fields display.

• XA The connection to the database is through avendor-specific data source. When selected, the DataSource field displays. A component implementation thatuses a JDBC connection of connection type XA typicallyexecutes within a global transaction and consequentlymay not explicitly commit transactions. To ensure thatsuch implementations always behave correctly, theTIBCO SilverTIBCO ActiveMatrix platform detects whensuch a resource is used outside of a global transactionand enables the JDBC autocommit feature, so that alldatabase access by the component is committed.

Table 15: Direct

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the JDBC driver class. You can select from adrop-down list of supported drivers or type the name of a customdriver:

YYYDatabaseDriver

• org.hsqldb.jdbcDriver

• com.microsoft.sqlserver.jdbc.SQLServerDriver

• com.mysql.jdbc.Driver

• oracle.jdbc.OracleDriver

• com.ibm.db2.jcc.DB2Driver

• org.postgresql.Driver

Additional drivers available when using TIBCO Business Studio:• com.ibm.as400.access.AS400JDBCDriver

• com.informix.jdbc.lfxDriver

• ca.edbc.jdbc.EdbcDriver

When you select a driver, the Database URL field is populatedwith a template for the URL of the driver.

Default: org.hsqldb.jdbcDriver.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 201

Page 202: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The URL to use to connect to the database. A template of theURL is supplied for the driver you select in the Database Driverfield or you can type the name of a URL:

YYYDatabaseURL

• jdbc:hsqldb:hsql://localhost:<port#>/<db_instancename>• jdbc:sqlserver://<server

Name>:<portNumber>;databaseName=<dbname>;• jdbc:mysql://localhost:<port#>/<server.dbname>• jdbc:oracle:thin:@(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=

(PROTOCOL=TCP)(HOST=<host >)(PORT=<port>)))

(CONNECT_DATA=(SID=<oracle_sid>)(SERVER=dedicated)))

• jdbc:db2://<host>:<portNumber>/<database name >• jdbc:postgresql://<host>:<port>/DB

Available when using TIBCO Business Studio:• jdbc:as400://server<server_ip>;libraries=<lib>• jdbc:informix-sqli://<host>:<port

>/<database>:informixserver=<server>• jdbc:edbc://<host>:<port>/<database>

You must supply the portions of the URL shown between anglebrackets and remove the angle brackets.

Default: jdbc:hsqldb:hsql://localhost:<port#>/<db_instancename>.

Table 16: XA

DescriptionAcceptSVars?

Editable?Required?Property

The fully-qualified name of the javax.sql.XADataSourceimplementation class. The supported classes are:

YYYDataSource

• com.ibm.db2.jcc.DB2XADataSource

• com.mysql.jdbc.jdbc2.optional.MysqlXADataSource

• oracle.jdbc.xa.client.OracleXADataSource

• com.microsoft.sqlserver.jdbc.SQLServerXADataSource

• org.postgresql.xa.PGXADataSource

Default:com.mysql.jdbc.jdbc2.optional.MysqlXADataSource.

DescriptionAcceptsSVars?

Editable?Required?Property

The maximum number of database connections to allocate.The minimum value that can be specified is 0.

Default: 10.

YYNMaximumConnections

TIBCO ActiveMatrix Policy Director --- 1.0

202 | Resource Templates

Page 203: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Time to wait for a successful database connection. If theJDBC driver does not support connection timeouts, the

YYNLoginTimeout(ms) value of this field is ignored. Only JDBC drivers that support

connection timeouts use this configuration field. Most JDBCdrivers support connection timeouts.

Default: 30000 (30 seconds).

(TIBCO Business Studio only) Indicate whether theapplication demarcates transaction boundaries. If

NYNSupportsTransactions

unchecked, the application does not demarcate transactionboundaries and all SQL statements are autocommitted.

If checked, the application demarcates transactionboundaries.

Default: Unchecked.

Login Credentials

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 203

Page 204: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Advanced

DescriptionAcceptsSVars?

Required?Editable?GUI

Properties to configure the connection between the JDBCresource and a specific type of host.

NNYHost TypeProperties

Indicates whether the driver requires a commit to beperformed before enabling auto-commit on a connection.

NNYCommitBefore

This should be (and is, by default) set to false for compliantdrivers to avoid extraneous commits to the database.

Default: false.

AutoCommit

The class used by the resource adapter to judge if anexception is fatal to the connection. That is, whether the

NNYExceptionSorterClass connection pool should discard the connection from the

pool, since it is no longer reusable. As the name implies,the default SQLState08ExceptionsAreFatalSorter treats SQLState 8 exceptions as fatal (connection errors). All otherexceptions do not result in any connection pool action (butof course are passed up to the application for it to react asit wishes). The class must implementorg.tranql.connector.ExceptionSorter.

Default:com.tibco.amf.sharedresource.runtime.tibcohost.jdbc.SQLState08ExceptionsAreFatalSorter.

Maximum number of connections in the pool.

Default: 20.

NNYPool MaxSize

Minimum number of connections in the pool.

Default: 5.

NNYPool MinSize

The length of time a requestor will wait for a connectionwhen the pool is at maximum.

Default: 60000 ms.

NNYPoolBlocking

TIBCO ActiveMatrix Policy Director --- 1.0

204 | Resource Templates

Page 205: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?GUI

Timeout(ms)

The length of time after which idle connections are closed.

Default: 5 min.

NNYPool IdleTimeout(min)

The size of the cache containing prepared statements. Thesize should correspond to the number of JDBC statementsyou expect your application to reuse.

Default: 0; that is, the cache is disabled.

NNYPreparedStatementCache Size

Table 17: Direct

DescriptionAcceptsSVars?

Editable?Required?Property

Properties to configure connections to a database driver.The properties are vendor specific.

NYNConnectionProperties

Table 18: XA

DescriptionAcceptSVars?

Editable?Required?Property

Properties to configure connections to a data source. Theproperties are vendor specific.

NYNConnectionProperties

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187Configuring a Trust Store on page 298

Configuring Third-Party JDBC Drivers

About this task

Before deploying an application that uses a third-party JDBC server, the JDBC client library must be packagedand installed on each node on which the application will run.

Procedure

1. Configure the third-party JDBC client driver as described in the installation manual for your product.A feature named "TIBCO enabled JDBC client for vendor" is added to the Administrator server softwarerepository.

2. Add the feature to the nodes on which the JDBC resource instances are installed.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 205

Page 206: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

JMS Resource Templates

JMS resource templates enable applications to access objects maintained in JMS servers.

The JMS resource templates are:• JNDI Connection Configuration - Provides a JNDI connection to look up a JMS server.• JMS Connection Factory - Used to create a Request/Reply connection to a JMS server.• JMS Destination - Used for Request/Reply messages. Specifies destination objects, which represent virtual

channels (topics and queues) in JMS. When a message is sent, it is addressed to a destination, not to aspecific application. Any application that subscribes or registers an interest in that destination can receivethat message. Depending on the JMS messaging model used, the destination is called a topic or a queue.In the publish-subscribe model, a message is published for many subscribers to a topic (destination). Inthe point-to-point model, one message is sent to one potential receiver using a queue (destination).

• JMS Connection Factory Configuration - Creates a request connection to a JMS server to enable requestreceipt of JMS messages.

• JMS Destination Configuration - Specifies what topic or queue to listen to for request messages.

JMS Resource Template Relationships

The JMS resource templates are used in different combinations to accomplish the tasks involved in settingup JMS enterprise messaging:• Identifying the JMS server to connect to• Establishing request communication• Establishing reply communication

Identifying the JMS server is accomplished through the JNDI Connection resource template. All the otherJMS resource templates contain a link for the JNDI Connection that assists them in determining which JMSserver to look up. Additionally, before the connection to the JNDI server is made, the JNDI might requireauthentication. Authentication can take the form of a username and password, or supplying credentialinformation stored in a keystore using an identity provider. If the JNDI server is SSL-enabled, you providethe required SSL configuration.

To establish request or reply communication, you need these resource templates: JMS Connection Factory,JMS Destination, and JNDI Connection.

Only JMS Connection Factory resource template is needed, if direct destinations are used.

Configuring Third-Party JMS Drivers

About this task

Before deploying an application that uses a third-party JMS server, the JMS client library must be packagedand installed on each node on which the application will run.

Procedure

1. Configure the third-party JMS client driver as described in the installation manual for your product.A feature named "TIBCO enabled JMS client for vendor" is added to the Administrator server softwarerepository.

2. Add the feature to the nodes on which the JMS resource instances are installed.

TIBCO ActiveMatrix Policy Director --- 1.0

206 | Resource Templates

Page 207: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

JMS Connection Factory

Used to create a Request/Reply connection to a JMS server.

DescriptionAccepts SVars?Editable?Required?Property

The name of aconnection factory.

YYYConnection FactoryJNDI Name

The name of a JNDIConnectionConfiguration.

NYYJNDI ConnectionConfiguration

Security

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

SSL Configuration

SSL communication works only for EMS and WebSphere MQ JMS providers. Make sure Connectionfactory used in JMS Connection Factory JNDI Name which resides on JNDI Server is SSL enabled.

DescriptionAccepts SVars?Editable?Required?Property

Enable SSLconnections. When

NYNEnable SSL

checked, the SSLproperties aredisplayed.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 207

Page 208: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAccepts SVars?Editable?Required?Property

Default:Unchecked.

The name of an SSLClient Provider .

NYNSSL Client Provider

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

JMS Connection Factory Configuration

Creates a request connection to a JMS server to enable request receipt of JMS messages.

DescriptionAccepts SVars?Editable?Required?Property

The name of aconnection factory.

YYYConnection FactoryJNDI Name

The name of a JNDIConnectionConfiguration.

NYYJNDI ConnectionConfiguration

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

TIBCO ActiveMatrix Policy Director --- 1.0

208 | Resource Templates

Page 209: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

JMS Destination

Used for Request/Reply messages. Specifies destination objects, which represent virtual channels (topicsand queues) in JMS. When a message is sent, it is addressed to a destination, not to a specific application.Any application that subscribes or registers an interest in that destination can receive that message. Dependingon the JMS messaging model used, the destination is called a topic or a queue. In the publish-subscribe model,a message is published for many subscribers to a topic (destination). In the point-to-point model, one messageis sent to one potential receiver using a queue (destination).

DescriptionAcceptsSVars?

Required?Editable?Property

A JNDI name of a JMS destination that points to a particularqueue or topic.

YYYDestinationJNDIName

The name of a JNDI Connection Configuration.NYYJNDIConnectionConfiguration

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

JMS Destination Configuration

Specifies what topic or queue to listen to for request messages.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 209

Page 210: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

A JNDI name of a JMS destination that points to a particularqueue or topic.

YYYDestinationJNDIName

The name of a JNDI Connection Configuration.NYYJNDIConnectionConfiguration

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

JNDI Connection Configuration

Provides a JNDI connection to look up a JMS server.

General

DescriptionAcceptsSVars?

Required?Editable?Property

The provider to use for JNDI lookup:NYYJNDIProvider • TIBCO EMS

• Progress SonicMQ• IBM WebSphere MQ• Custom - Used for custom JNDI providers.

The Initial Context Factory field is populated based on theJNDI provider selected. SSL lookup is only available for theTIBCO EMS provider.

Default: TIBCO EMS.

Initial context factory to be used for the JNDI lookup. Thevalue for Initial Context Factory is set based on the JNDIprovider selected:

YYYInitialContextFactory

• TIBCO EMS -com.tibco.tibjms.naming.TibjmsInitialContextFactory

value is populated• Progress SonicMQ - the

com.sonicsw.jndi.mfcontext.MFContextFactory

value is populated• IBM WebSphere MQ -

– com.sun.jndi.ldap.LdapCtxFactory for the JNDIlookup in LDAP. Pair this value with the NamingProvider URL: ldap://<ldap_url>.

– com.sun.jndi.fscontext.RefFSContextFactory

for the JNDI lookup in a file system. Pair this valuewith the Naming Provider URL: file:<url_of_bindings_file>.

TIBCO ActiveMatrix Policy Director --- 1.0

210 | Resource Templates

Page 211: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

• Custom provider - Specify the custom initial contextfactory value.

Default:com.tibco.tibjms.naming.TibjmsInitialContextFactory

Provider URL of the JNDI server.YYYNamingProviderURL

• TIBCO EMS - tibjmsnaming://host:port

• Progress SonicMQ - tcp://host:2506• IBM WebSphere MQ -

– ldap://<ldap_url> for the JNDI lookup in LDAP.Example:ldap://mymachine.tibco.com:2076/dc=tibco,dc=com.Pair this value with the Initial Context Factory:com.sun.jndi.ldap.LdapCtxFactory.

– file:<url_ of_bindings_file> for the JNDI lookup in a filesystem. Example: file:/D:/ProgramFiles/IBM/fileBinding. Pair this value with the InitialContext Factory:com.sun.jndi.fscontext.RefFSContextFactory.

• Custom - specify the custom provider URL.

Default: tibjmsnaming://host:port.

Login Credentials

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 211

Page 212: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Advanced

A list of properties used for JNDI lookup.

Table 19: Application Properties

DescriptionProperty

The name of the property.Name

The type of the property. One of: string, boolean, byte, short, char, int, long, float, ordouble.

Type

The property value.

Default: Depends on value of 'Type'.

Value

You can set a property value to a literal or a substitution variable.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

212 | Resource Templates

Page 213: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

LDAP Connection

Represents a connection to an LDAP server. Used by component implementations to look up names in anLDAP directory server.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The factory object that provides the starting point forresolution of names within the LDAP server.

Default: com.sun.jndi.ldap.LdapCtxFactory.

YYYConnectionFactory

The time to wait for a response from the LDAP directoryserver.

Default: 0.

YYNConnectionTimeout(ms)

The URL that provides the host and port number on whichthe LDAP server is listening for connections. It can alsoinclude a Base DN, the DN of an entry in the directory.

The Base DN:

YYYProviderURL

• Identifies the LDAP entry that is the starting point of allsearches

• Limits the searches to a subtree of the LDAP Server'sdirectory

If the Base DN is not specified, all searches begin at the rootDN.

Any unsafe characters in the URL must be represented bya special sequence of characters called escaping. Forexample, a space must be represented as %20. Thus, the DNou=Product Development must be encoded asou=Product%20Development.

Default: ldap://localhost:389.

Login Credentials

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 213

Page 214: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Advanced

DescriptionAcceptSVars?

Editable?Required?Property

The length of time that an idle connection may remain inthe pool without being closed and removed from the pool.

Default: 300000.

YYNPoolTimeout(ms)

The number of connections per connection identity to createwhen initially creating a connection for the identity.

Default: 5.

YYNPool Initial

The preferred number of connections per connection identitythat should be maintained concurrently.

Default: 10.

YYNPool Size

TIBCO ActiveMatrix Policy Director --- 1.0

214 | Resource Templates

Page 215: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptSVars?

Editable?Required?Property

The maximum number of connections per connectionidentity that can be maintained concurrently.

Default: 15.

YYNPoolMaximum

Indicate whether an LDAP server should return a reference(a referral) to another LDAP server which may containfurther information instead of returning a result.

Default: False.

FollowReferrals

Related TopicsConfiguring a Trust Store on page 298

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 215

Page 216: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

SMTP

Represents a connection to an SMTP server. Used by component implementations to send and receive messagesto and from an SMTP mail server.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the host that accepts incoming requests.

Default: localhost.

YYYMachineName

The port number on which to listen for SMTP requests.

Default: 25.

YYYPort

The length of time to wait for a response from the server.The timeout must be greater than 0. A timeout of zero isinterpreted as an infinite timeout.

Default: 6000.

YYNRequestTimeout(ms)

The length of time to wait before a connection to the server.The timeout must be greater than 0. A timeout of zero isinterpreted as an infinite timeout.

Default: 6000.

YYNConnectionTimeout(ms)

Login Credentials

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how the credentials required to authenticate to aserver are provided:

NYYLoginCredentials

• Username + Password - Provide inline username andpassword credentials. When selected, the Username andPassword fields are activated.

• Identity Provider - Provide username and passwordcredentials encapsulated in an identity provider resource.When selected, the Identity Provider field is activated.

The username used to authenticate connections to the server.NYNUsername

The user's password used to authenticate connections tothe server.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

NYNPassword

display even if it was set when it was created. If you havepermission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

TIBCO ActiveMatrix Policy Director --- 1.0

216 | Resource Templates

Page 217: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the Identity Provider used to authenticate theuser.

YYNIdentityProvider

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

Related TopicsConfiguring a Trust Store on page 298

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 217

Page 218: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Teneo

Represents a Teneo resource. Used by component implementations to access databases. Teneo is amodel-relational mapping and runtime database persistence solution for the Eclipse Modeling Framework(EMF). Teneo integrates EMF with Hibernate.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a JDBC on page 201 that represents theconnection to the database.

YYYDataSource

Indicate whether to create or validate schema in the databasewhen the session factory is created:

NNNSchemaGenerationType • Do Nothing - Indicate that only data is added, changed,

and deleted. If the schema does not already exist, theapplication will experience errors when it runs.

• Validate - Validate the schema.• Create - Create the schema every time the session factory

is created, deleting old schema and data if it exists.• Create Drop - Same as Create, but drops the schema at

the end of the session.• Update - Update the schema with the changes implied

by the Java objects being mapped to the database.

Default: Do Nothing.

The class name of a Hibernate dialect that enables Hibernateto generate SQL optimized for a particular relationaldatabase. The supported dialects are:

YYYDialect

org.hibernate.dialect.

DB2Dialect

HSQLDialect

SQLServerDialect

MySQLDialect

OracleDialect

Oracle9Dialect

PostgreSQLDialect

SAPDBDialect

SybaseDialect

SybaseAnywhereDialect

com.tibco.amf.sharedresource.runtime.core.

hibernate.dialects.

DB2Dialect

HSQLDialect

SQLServerDialect

MySQL5Dialect

Oracle9Dialect

Oracle10GDialect

TIBCO ActiveMatrix Policy Director --- 1.0

218 | Resource Templates

Page 219: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Default: com.tibco.amf.sharedresource.runtime.core.hibernate.dialects.HSQLDialect.

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate how class hierarchies are mapped to tables.NNNInheritanceMappingType

• SINGLE-TABLE The classes of one class hierarchy areall mapped to one table.

• JOINED Each subclass has its own table. To retrieve anobject from the database, the superclass and subclasstables are joined. This also applies to subclasses ofsubclasses.

Default: Single Table.

Advanced

DescriptionAcceptsSVars?

Editable?Required?Property

Permit data collection in the SQL Server transaction log file.

Default: Unchecked.

NNNEnableSQLLogging

Enables JDBC batch processing.

Default: 5.

YYNBatch Size

Indicate whether clients share the session factory or whethera new factory is created for each client.

Default: Checked.

NYNShareSessionFactory

DescriptionAcceptsSVars?

Editable?Required?Property

Hibernate configuration properties:YYNProperties• Format SQL Enabled• Default Schema• Default Catalog• Max Fetch Depth• Default Batch Fetch Size• Use Order Updates• Use Order Inserts• Use Generate Statistics• Use Identifier Rollback• Use SQL Comments• Fetch Size• Batch Versioned Data• Batcher Factory Class

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 219

Page 220: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

• Use Scrollable Resultset• Use Stream For Binary• Use Get Generated Keys• Connection Isolation• Use Auto Commit• Connection Release Mode• Cache Provider Class• Use Minimal Puts• Use Query Cache• Use Second Level Cache• Query Cache Factory• Cache Region Prefix• Use Structured Entries• Transaction Factory Class• JTA Transaction JNDI Name• Flush Before Completion• Auto Close Session• Query Factory Class• Query Substitutions• Use Reflection Optimizer

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

220 | Resource Templates

Page 221: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Thread Pool

A thread pool is a queue of threads available to run a queue of tasks. Thread pools are used to improveperformance when executing large numbers of asynchronous tasks by reducing per-task invocation overheadand provide a means of bounding and managing the resources consumed when executing a collection oftasks.

A thread pool is created with zero threads.

General

DescriptionAcceptsSVars?

Editable?Required?Property

When a new task is submitted and fewer than Core PoolSize threads are running, a new thread is created to handle

YYNCore PoolSize

the request, even if other threads are idle. If there are greaterthan Core Pool Size but fewer than Max Pool Size threadsrunning, a new thread is created only if no threads are idle.Must be greater than or equal to zero.

When a Java or Spring component service isconfigured with a Threading policy with a non-zerotimeout value and is promoted to a compositeservice using a SOAP or JMS binding, concurrencyis halved because two threads are used per request.To achieve the desired concurrency, specify doublethe number of threads for the thread pool size.

Default: 2. Two threads are used to service one request: onefor receiving the request and one for receiving the response.

The maximum number of threads in the pool. Must begreater than zero and greater than or equal to Core PoolSize.

Default: 10.

YYNMax PoolSize

The amount of time an idle thread remains in the pool beforebeing reclaimed if the number of threads in pool is morethan Core Pool Size.

Default: 30 s.

YYNKeepAliveTime (s)

Indicate that Core Pool Size threads should be created andstarted when the thread pool is created. Normally corethreads are created and started only when new tasks arrive.

Default: Unchecked.

NNNAutostartCoreThreads

A string prepended to the name of each thread.

Default: None.

YYNThreadPoolNamePrefix

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 221

Page 222: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The default priority of the threads in the pool.

Default: 5.

NNYPriority

The policy applied when no thread is available to run a task:NNYRejectionPolicy • Abort - The task is aborted and an exception is thrown.

• Blocking - The task is blocked until a thread from threadpool picks up this task.

• Caller Runs - The task is run in the calling thread.

Default: Blocking.

Indicate whether the threads can be started as daemon oruser.

Default: Unchecked.

NNNDaemon

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

222 | Resource Templates

Page 223: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Security Resource Templates

Security features are provided by a set of resource templates that provide access to various types of securityproviders: identity, trust, mutual identity, keystore, SSL client and server, and authentication.

Identity, keystore, trust, and mutual identity providers enable clients and servers to assert and establishidentity. SSL resource templates are used to enable SSL configurations for use in resource templates thatdefine connections to various types of servers. For example, the SSL configuration for an HTTP Client, is setby an SSL Client Provider. The SSL Client Provider in turn references a Keystore Provider to establish theidentity of a trusted server. Authentication providers enable connections to authentication services. Someresource templates types, for example authentication providers, are only available in Administrator.

Resource TemplateType

Identity • Identity Provider - Provides access to a username and password credential storedin a keystore.

• Kerberos Identity Provider - Provides access to an identity stored in a Kerberosauthentication server.

• Keystore Provider - Provides access to a keystore. Keystores can be stored internallyin Administrator or externally.

• Mutual Identity Provider - An identity provider that supplies an identity and servesas a trust store.

• Trust Provider - Maintains the identity of a trusted resource.

SSL • SSL Client Provider - Maintains the credentials required by an SSL client.• SSL Server Provider - Maintains the credentials required by an SSL server.

Authentication • Kerberos - Represents a Kerberos authentication service.• LDAP Authentication - Represents an LDAP server providing authentication

services.• SiteMinder Authentication - Represents a SiteMinder authentication service.• WS-Security ASP - Enables a connection to Web Services Security authentication

services.

Identity Provider

Provides access to a username and password credential stored in a keystore.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider that maintains a keystoreused to assert an identity.

YYYKeystoreProviderto SupplyIdentity

Enables access to an identity keystore. To establish SSLconnections, certain third-party systems such as MySQL

NNNEnableAccess to

require access to a keystore file location. In such situationsCredentialAdministrator provides a copy of credentials in a keystore,Storewhich are then written to disk and used by the third party

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 223

Page 224: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

as the SSL credential store. To prevent Administrator fromproviding credentials, uncheck the checkbox.

Default: Checked.

ContainingIdentity

The name of the alias used to access the identity.YYNKey Aliasto AccessIdentity

The password for the alias.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

YYNKey AliasPasswordto AccessIdentity display even if it was set when it was created. If you have

permission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Keystore Provider resource instance.YYNKeystoreProvideras TrustStore

Enables access to the trust store.NYNEnableAccess toTrust Store

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

Kerberos Authentication

Represents a Kerberos authentication service.

SAML Options

SAML assertions are accessed from a security context and can be propagated between components to achievesingle sign-on.

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether SAML 1.1 assertions are generated.

Default: Unchecked.

NYNGenerate SAML 1.1Assertions

Indicate whether SAML 2.0 assertions are generated.

Default: Checked.

NNNGenerate SAML 2.0Assertions

The duration of the validity of the SAML tokens.

Default: 600 s.

YYNValidity of SAMLTokens (s)

TIBCO ActiveMatrix Policy Director --- 1.0

224 | Resource Templates

Page 225: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether an attribute that contains a securitytoken should be enabled.

This checkbox should be checked.

NYNEnable SecurityToken Attribute

Default: Unchecked.

The name of an Identity Provider that identifies thesigner of the SAML tokens.

YYNSigner of SAMLTokens

Configuration File

DescriptionAcceptsSVars?

Required?Editable?Property

The Kerberos realm.

Default: None.

NYNKerberos Realm

The Kerberos key distribution center.

Default: None.

NYNKey DistributionCenter

The method for specifying the location of the Kerberosconfiguration file. One of:

NYNKerberosConfiguration FileOption • System Specific Default Location - Use the

system-specific default location.• Custom Configuration File - Use a custom

configuration file. Enables the CustomConfiguration File Name field.

• Generated Configuration File - Use a generatedconfiguration file. Enables the GeneratedConfiguration File field and all other fields whosevalues are used in generating the configurationfile.

Default: System Specific Default Location.

The fully-qualified path to the configuration file.

Default: None.

YYYCustomConfiguration FileName

The fully-qualified path to which the generatedconfiguration file is saved.

Default: None.

YYYGeneratedConfiguration FileName

The default DNS domain to which the Kerberos realmbelongs.

Default: None.

YYYDefault DNSDomain

Indicate that initial Kerberos ticket will be addressless.

Default: Checked.

NNYAddressless Tickets

Indicate that initial Kerberos ticket will be proxiable.

Default: Checked.

NNYProxiable Tickets

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 225

Page 226: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

Indicate that initial Kerberos ticket will beforwardable.

Default: Unchecked.

NNYForwardable Tickets

The maximum allowable amount of clock skew beforea Kerberos message is assumed to be invalid.

Default: 600.

YNYClock Skew(s)

The lifetime for initial tickets.

Default: 24.

YNYTicket Lifetime(h)

The renewable lifetime for initial tickets.

Default: 0.

YNYRenew Lifetime(h)

The encryption types to use for the session key in theticket granting ticket.

Default: aes128-cts-hmac-sha1-96, aes128-cts,des3-cbc-sha1.

NNYClient TCSEncryption

The encryption types to use for the session key in theticket granting ticket.

Default: aes128-cts-hmac-sha1-96, aes128-cts,des3-cbc-sha1.

NNYClient TicketEncryption

The encryption types to use for the session key inservice tickets.

Default: aes128-cts-hmac-sha1-96, aes128-cts,des3-cbc-sha1.

NNYService TicketEncryption

Indicate whether DNS SRV records should be usedto locate the KDCs and other servers for a realm, ifthe KDC is not the default realm.

Default: Checked.

NNYLookup DNS forKDC

Indicate whether DNS TXT records should be usedto determine the Kerberos realm of a host if it is notthe default realm.

Default: Unchecked.

NNYLookup DNS forRealm

Advanced

DescriptionAcceptsSVars?

Required?Editable?Property

The class that implements authentication for usersusing Kerberos authentication.

Default:com.sun.security.auth.module.Krb5LoginModule

YNYLogin Module Class

TIBCO ActiveMatrix Policy Director --- 1.0

226 | Resource Templates

Page 227: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

Indicate that you want the configuration to berefreshed before the login authentication method isinvoked.

Default: Unchecked.

NNYRefresh KRB5Configuration

Indicate that you want to renew ticket granting tickets.If checked, the Use Ticket Cache checkbox is checkedand the Ticket Cache Name field is enabled.

Default: Unchecked.

NNYRenew TGT

Indicate that you want the ticket granting tickets tobe obtained from the ticket cache.

Default: Unchecked.

NNYUse Ticket Cache

The name of the ticket cache that contains ticketgranting tickets.

Default: None.

YWhenUseTicketCache ischecked.

YTicket Cache Name

Indicate that the principal's key should be obtainedfrom the keytab. When checked, the Keytab Filename

NNYUse Key Tab

field is enabled. If Keytab Filename field is not set,the keytab is obtained from the Kerberosconfiguration file.

Default: Unchecked.

The file name of the keytab.

Default: None.

YNYKey Tab Filename

Indicate that the principal's key should be stored inthe subject's private credentials.

Default: Checked.

NNYStore Key

The name of the principal.

Default: None.

YNYPrincipal Name

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

Configuring Kerberos Authentication for TIBCO ActiveMatrix Policy Director

About this taskThis task helps you configure Kerberos Authentication forTIBCO ActiveMatrix Policy Director. TIBCOActiveMatrix Policy Director supports Microsoft Active Directory 2008. Before completing these steps, youmust enable Microsoft Active Directory to act as the Kerberos Distribution Center. Please refer to the Microsoftdocumentation to complete the steps on setting up Kerberos Authentication for Single Sign-On.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 227

Page 228: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Procedure

1. Click Shared Objects > Resource Templates.The Resource Templates table is displayed.

2.Click .The Add Resource Template dialog is displayed.

3. From the Type drop-down list, select Kerberos Authentication.4. On SAML Options tab, specify the following:

a) Validity of SAML Tokens in seconds.b) Signer of SAML Tokens.

5. On Configuration File tab, specify the following:a) Kerberos Realm: Specify the Kerberos Realm name mentioned in the Kerberos .ini file on your system.b) Kerberos Distribution Center: Specify the IP Address mentioned in the Kerberos .ini file.c) Kerberos Configuration File Option: Specify the Kerberos Configuration file location. You can either

specify a system specific file location, or specify a custom file location, or generate your ownconfiguration file.

If you do not have the Kerberos Initialization file (for example, C:\winnt\krb.ini) in your system,Microsoft Active Directory will only act as an LDAP service and not as a Kerberos Domain Controller.

6. Click Advanced tab. Specify the following:a) Module Classb) Principal NameThe Principal Name can be optional as it is generic at this stage. The right place to specify the PrincipalName is when you define Authentication by Kerberos Governance Control template.

7. Check Keytab.If you are using server-side authentication, ensure that you check the Keytab option. If not, the sessionticket is not generated. This field is optional when you are using client-side authentication.In addition to these steps, enable your browser to pass SPNEGO tokens by selecting the Enable IntegratedWindows Authentication option on the Advanced tab of your browser and adding the site to the list ofTrusted Sites.

Kerberos Identity Provider

Provides access to an identity stored in a Kerberos authentication server.

DescriptionAcceptsSVars?

Required?Editable?Property

The name of a Kerberos Authentication containingthe identity.

Default: None.

NYYKerberosAuthenticationProvider

The name of a Kerberos service principal.

Default: None.

YNYKerberos ServicePrincipal Name

The name of a Kerberos client principal. Specify thisinformation to gain access to the private key of theclient principal.

Default: None.

YNYKerberos ClientPrincipal Name

TIBCO ActiveMatrix Policy Director --- 1.0

228 | Resource Templates

Page 229: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

The password of the Kerberos client principal. Inaddition to the Kerberos Client Principal Name,

NNYKerberos ClientPrincipal Password

specify this information to gain access to the privatekey of the client principal.

Default: None.

Kerberos Identity Provider must be set up before configuring WSS Authentication.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

Keystore ProviderIf you set up your environment for SSL, you have to set up a keystore. As part of the process, you configurea keystore provider.

Provides access to a keystore. Keystores can be stored internally in Administrator or externally.

General

DescriptionAcceptsSVars?

Editable?Required?Property

Location of the keystore:NYYKeystore ServedFrom • Administrator

• External location

Path to the keystore to be uploaded intoAdministrator. After the keystore is uploaded, a linkdisplays from which the keystore can be downloaded.

NYYAdministrator -Upload KeystoreFrom

Location of the external keystore.YYYURL

Password for the keystore.

(Administrator only) For superusers, passwordsdisplay encrypted. For non-superusers, the password

YYYPassword

doesn't display even if it was set when it was created.If you have permission to edit the password, you canspecify a new value and save. If you edit other fields,the old value for the password field is retained. If youwant to set an empty value as password, click the linkSet Blank Password.

Name of the keystore provider:NNNProvider• SunJCE (JCEKS format)• SUN (JKS format)• IBMJCE (IBM JREs)• SunJSSE (PKCS12 format)

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 229

Page 230: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

You can also type the name of another provider thatmust be already installed.

Default: Empty. The first matching providersupporting the format will be chosen.

Type of the keystore: JCEKS, JKS, PKCS12.

Default: JCEKS.

NNYType

Refresh interval, greater than 0. If the keystoreprovider is accessed after the refresh interval hasexpired:

YYYRefresh Interval (ms)

1. The keystore provider is refreshed from its backingkeystore.

2. The refresh timer is reset to zero.3. Operations on the keystore provider are performed

on the refreshed copy.

Default: 60000.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187Configuring a Trust Store on page 298

KeystoresIf you set up your environment to use SSL, you have to set up keystores.

SSL uses keys and certificates when it establishes the secure connection. A keystore is a database of keys andcertificates. A keystore password is required to access or modify the keystore.

In ActiveMatrix, access to keystores is provided by a Keystore Provider resource instance.

Keystore Entries

A keystore has two types of entries:• Private key - holds a cryptographic private key, which is optionally stored in a protected format to prevent

unauthorized access. The private key is accompanied by a certificate chain for the corresponding publickey. Private keys and certificate chains are used by a given entity for self-authentication.

• Trusted certificate - contains a single public key certificate. It is called a trusted certificate because thekeystore owner trusts that the public key in the certificate belongs to the identity identified by the subject(owner) of the certificate. This type of entry can be used to authenticate other parties.

Certificates of trusted entities are typically imported into a keystore as trusted certificates.

Keystore Entries and Aliases

Each entry in a keystore is identified by an alias. In the case of private keys and their associated certificatechains, these aliases distinguish among the different ways in which the entity may authenticate itself. Forexample, the entity may authenticate itself using different certificate authorities, or using different publickey algorithms. An alias might be named after the role in which the keystore owner uses the associated key,or might identify the purpose of the key.

TIBCO ActiveMatrix Policy Director --- 1.0

230 | Resource Templates

Page 231: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Keystore Passwords and Private Key Passwords

The private keys in a keystore are encrypted with a keystore password, which should be several words long.

You can also protect each private key with its individual password, which may or may not be the same asthe keystore password.

If a password is lost, the associated keys cannot be recovered.

Creating a Keystore Containing a Username and PasswordYou can create a keystore that contains a username and password by editing data and build files and runningan Ant script.

Procedure

1. Go to the CONFIG_HOME/admin/enterpriseName/samples/ directory.2. Open the keystore_data.xml data file and edit the following attributes of the CredentialEntry element:

DescriptionAttribute

Alias identifying the keystore entry.alias

Password that protects the keystore entry.protectionParam

Username.username

Password.secret

3. Open the keystore_build.xml build file and edit the following attributes of the AMXKeyStoreTaskelement in the addCredential target:

DescriptionAttribute

The name of the file to contain the keystore.adminKeyStorelocation

The password protecting the keystore.adminKeyStorePassword

4. Run ant -f keystore_build.xml addCredential.

Example<?xml version="1.0" encoding="UTF-8"?><amxdata_base:Enterprise xmlns:amxdata="http://tibco.com/amxadministrator/command/line/types" xmlns:amxdata_base="http://tibco.com/amxadministrator/command/line/types_base" xmlns:amxdata_reference="http://tibco.com/amxadministrator/command/line/types_reference"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://tibco.com/amxadministrator/command/line/types_base ../schemas/amxdata_base.xsd http://tibco.com/amxadministrator/command/line/types ../schemas/amxdata.xsd">

<AMXKeyStore xsi:type="amxdata:AMXKeyStore"> <CredentialEntry alias="myDatabase" protectionParam="databaseKeyAliasPassword" username="scott" secret="tiger" /> <CredentialEntry alias="myLDAP" protectionParam="ldapKeyAliasPassword" username="cn=Manager,dc=example,dc=com" secret="password" /> </AMXKeyStore>

</amxdata_base:Enterprise>

<target name="addCredential"> <AMXKeyStoreTask dataFile="keystore_data.xml" adminKeyStorelocation = "my_keystore.jceks" adminKeyStorePassword = "password" action="add"/></target>

>ant -f keystore_build.xml addCredentialBuildfile: C:\amx320data\admin\amxadmin\samples\keystore_build.xml

addCredential:

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 231

Page 232: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

[AMXKeyStoreTask] INFO - Keystore file C:\amx320data\admin\amxadmin\samples\my_keystore.jceks does not exist; creating a new keystore file[AMXKeyStoreTask] Adding entry for alias 'myDatabase'...[AMXKeyStoreTask] Adding entry for alias 'myLDAP'...[AMXKeyStoreTask] Saving to keystore file C:\amx320data\admin\amxadmin\samples\my_keystore.jceks

BUILD SUCCESSFULTotal time: 12 seconds

LDAP Authentication

Represents an LDAP server providing authentication services.

General

DescriptionAcceptsSVars?

Editable?Required?Property

A space-separated list of URLs for an LDAP server.To achieve fault tolerance, you can specify URLs. For

YYYServer URLs

example, ldap://server1.example.com:686ldap://server2.example.com:1686.

Default: ldap://localhost:389.

The name of the LDAP attribute from which the userdisplay name can be obtained. Always specify an

YYNAttribute Name toGet User's Name

Attribute Name even though this field is labeledoptional.

You must use an attribute that is part of the LDAPschema. Otherwise, any attribute not defined by theschema can result in an error.

Determines whether the authentication should searchsub-branches of the LDAP directory. Always checkYes.

Default: Checked.

NNNSearch EntireSubtree Starting atBase DN

The DN of the user being authenticated is used toconnect to the LDAP server. Always uncheck thisoption.

If checked, the following fields display:

NNYLog in asAdministrator

• User Search Base DN• User Search Expression• Login Type with Username + Password option

shown• Username• Password

If unchecked, the User DN Template field displays.

The template by which the User DN, used to connectto the LDAP server, is generated. Because the full DN

YYYUser DN Template

is always supplied, the template should always be 0(zero).

Default: {0}.

TIBCO ActiveMatrix Policy Director --- 1.0

232 | Resource Templates

Page 233: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Base distinguished name from which the search starts.

Default: ou=<--->,dc=<--->,dc=com.

YYYUser Search BaseDN

The expression used for searching a user. An examplefor this expression is (CN=%U). '%U' is replaced by

YYNUser SearchExpression

the username being searched for. You can define anycomplex filter like (&(cn=%U)(objectClass=account)).

Default: (uid=%U).

Method to identify the user being authenticated:NYYLogin Type• Username + Password - Activates the Username

and Password fields.• Identity Provider that Supplies Credentials -

Activates the Identity Provider field.• Keystore Provider to Supply Identity (deprecated)

- Activates the Keystore Provider fields.

Name of a user in the LDAP server.YYYUsername

Password for the user.YYYPassword

The name of an Identity Provider .YYYIdentity Provider

The name of a Keystore Provider .YYYKeystore Provider toSupply Identity

Alias of the user's key entry in the keystore managedby the keystore provider.

YYYKey Alias to AccessIdentity

The password protecting the key entry.YYYKey Alias Password

Group Attributes

DescriptionAcceptsSVars?

Editable?Required?Property

Specifies how a user's group memberships are found. Groupinformation is used by Administrator when a user, onceauthenticated, performs other activities in the system.

Options:

NYNGroupIndication

• Group has users A list of users that belong to the group.• User has groups A list of groups to which the user

belongs.• User DN has groupsThe DN with a list of groups to

which the user belongs.• No Group Info Group memberships are not handled.

If the selected value is User has groups or User DN hasgroups, the Users Attribute with Group Names fielddisplays.

If the selected value is Group has users, the following fieldsdisplay:

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 233

Page 234: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

• Group Search Base DN• Group Search Expression• Group Attribute with User Names• Group Attribute with Group Name• Group Attribute with Subgroup Names• Group Search Scope Subtree

Default: No Group Info.

The name of the attribute in each user object that lists thegroups to which the user belongs.

YYYUserAttributewithGroupNames

Searches for groups beginning at this base distinguishedname (DN).

YYNGroupSearchBase DN

Search by matching this expression against potential groups.YYYGroupSearchExpression

The name of the attribute in the group object that containsits users. For example, for OpenLDAP: uniqueMember, forActiveDirectory: member.

YYYGroupAttributewith UserNames

The name of the attribute in the group object that containsthe name of the group. For example, for OpenLDAP: cn,for ActiveDirectory:sAMAccountName.

YYYGroupAttributewithGroupName

The name of the attribute in the group object that containsits subgroups. For example, for OpenLDAP: uniqueMember,for ActiveDirectory: member.

YYNGroupAttributewithSubgroupNames

Search the entire subtree starting at the base DN for groups(default). Otherwise, search only the nodes one level belowthe base DN.

NNNGroupSearchScopeSubtree

SSL

DescriptionAcceptsSVars?

Editable?Required?Property

Enable SSL connections. When checked, the SSL propertiesdisplay.

Default: Unchecked.

NNNEnableSSL

TIBCO ActiveMatrix Policy Director --- 1.0

234 | Resource Templates

Page 235: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The name of an SSL Client Provider .YYNSSL ClientProvider

(Administrator only) Invokes a wizard to import certificatesfrom an SSL-enabled server, optionally create an SSL Client

NNNConfigureSSL

Provider , and configure the trust store of the newly createdor an existing SSL Client Provider with the importedcertificates. When you complete the wizard, the SSL ClientProvider field is filled in.

SAML Options

SAML assertions are accessed from a security context and can be propagated between components to achievesingle sign-on.

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether SAML 1.1 assertions are generated.

Default: Unchecked.

NYNGenerate SAML 1.1Assertions

Indicate whether SAML 2.0 assertions are generated.

Default: Checked.

NNNGenerate SAML 2.0Assertions

The duration of the validity of the SAML tokens.

Default: 600 s.

YYNValidity of SAMLTokens (s)

Indicate whether an attribute that contains a securitytoken should be enabled.

This checkbox should be checked.

NYNEnable SecurityToken Attribute

Default: Unchecked.

The name of an Identity Provider that identifies thesigner of the SAML tokens.

YYNSigner of SAMLTokens

Advanced

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

The factory object that provides the starting point forresolution of names within the LDAP server.

Default: com.sun.jndi.ldap.LdapCtxFactory.

YYNContextFactory

The maximum number of connections to keep active in thepool.

Default: 10.

YYNMaximumConnections

Value of Simple Authentication and Security Layer (SASL)authentication protocol to use. Values are

YYNSecurityAuthentication

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 235

Page 236: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

implementation-dependent. Some possible values aresimple, none, md-5.

Default: simple.

The time to wait for a response from the LDAP directoryserver.

Default: -1, which means to wait forever.

YYNSearchTimeout(ms)

Indicate whether the client should follow referrals returnedby the LDAP server.

Default: Unchecked.

NYNFollowReferrals

Optional list of user attributes to retrieve from the LDAPdirectory during authentication.

Default: None.

YYNUserAttributesExtra

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187Configuring a Trust Store on page 298

Mutual Identity Provider

An identity provider that supplies an identity and serves as a trust store.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider that maintains a keystoreused to assert an identity.

YYYKeystoreProviderto SupplyIdentity

Enables access to an identity keystore. To establish SSLconnections, certain third-party systems such as MySQL

NNNEnableAccess to

require access to a keystore file location. In such situationsCredentialAdministrator provides a copy of credentials in a keystore,Storewhich are then written to disk and used by the third partyContaining

Identity as the SSL credential store. To prevent Administrator fromproviding credentials, uncheck the checkbox.

Default: Checked.

The name of the alias used to access the identity.YYNKey Aliasto AccessIdentity

TIBCO ActiveMatrix Policy Director --- 1.0

236 | Resource Templates

Page 237: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The password for the alias.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

YYNKey AliasPasswordto AccessIdentity display even if it was set when it was created. If you have

permission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Keystore Provider resource instance.YYNKeystoreProvideras TrustStore

Enables access to the trust store.NYNEnableAccess toTrust Store

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider resource instance thatmaintains a keystore that confirms an identity.

YYYKeystoreProvideras TrustStore

Enable access to a trust credential store.

In order to establish SSL connections certain third-partysystems, such as MySQL, require access to a keystore file

NNNEnableAccess toTrust Store

location. In such situations Administrator provides a copyof the credentials in a keystore which are then written todisk and used by the third party as the SSL credential store.

Default: Checked.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

SiteMinder Authentication

Represents a SiteMinder authentication service.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 237

Page 238: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

General

DescriptionAcceptsSVars?

Required?Editable?Property

The name of the SiteMinder agent that enforces accesscontrol policies provided by the Policy Server.

Default: None.

YYYAgent Name

The IP address of the machine on which theSiteMinder agent is installed.

Default: None.

YNYClient IP Address

The name should match the corresponding valuespecified in the policy set or it should be left blank.

The name should match the corresponding valuespecified in the Governance Control or it should beleft blank.

YNYProtected ResourceName

Default: None.

SAML Options

SAML assertions are accessed from a security context and can be propagated between components to achievesingle sign-on.

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether SAML 1.1 assertions are generated.

Default: Unchecked.

NYNGenerate SAML 1.1Assertions

Indicate whether SAML 2.0 assertions are generated.

Default: Checked.

NNNGenerate SAML 2.0Assertions

The duration of the validity of the SAML tokens.

Default: 600 s.

YYNValidity of SAMLTokens (s)

Indicate whether an attribute that contains a securitytoken should be enabled.

This checkbox should be checked.

NYNEnable SecurityToken Attribute

Default: Unchecked.

The name of an Identity Provider that identifies thesigner of the SAML tokens.

YYNSigner of SAMLTokens

TIBCO ActiveMatrix Policy Director --- 1.0

238 | Resource Templates

Page 239: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Configuration File

DescriptionAcceptsSVars?

Required?Editable?Property

The method for specifying the location of theSiteMinder configuration file.

NYNHost ConfigurationFile Option

• System Specific Default Location - Use thesystem-specific default location.

• Custom File Location - Use a custom configurationfile. Enables the Custom Configuration File Namefield.

• Generate - Use a generated configuration file.Enables the Generated Configuration File fieldand all other fields whose values are used ingenerating the configuration file.

Default: System Specific Default Location.

The path to the configuration file.

Default: None.

YYYConfiguration FileCustom Location

The path to which the generated configuration file issaved.

Default: None.

YYYGeneratedConfiguration FileName

The name of the host.

Default: None.

YYYTrusted Host Name

The host's configuration object name.

Default: None.

YYYHost ConfigurationObject

The host's shared secret.

Default: None.

YYYShared Secret

The URLs of the SiteMinder Policy Server.

Default: None.

YYYPolicy Server

The validity period for the shared secret.

Default: None.

YNYShared Secret Time

The name of the crypo provider.

Default: None.

YNYCrypto Provider

The request timeout.

Default: None.

YNYRequest Timeout (s)

The FIPS mode for the crypto provider.NNYFIPS Mode• FIPS-Compatibility Mode - the environment uses

existing SiteMinder algorithms to encrypt sensitivedata.

• FIPS-Migration Mode - the SiteMinder PolicyServer continues to use existing SiteMinder

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 239

Page 240: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

encryption algorithms as you migrate theenvironment to use only FIPS-compliantalgorithms.

• FIPS-only Mode - the environment only usesFIPS-compliant algorithms to encrypt sensitivedata.

Default: None.

When you configure a shared resource for SiteMinder configuration, ensure that you select EnableSecurityToken Attribute on the SAML Options tab.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

SSL Client Provider

Maintains the credentials required by an SSL client.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider resource instance thatmaintains a keystore that confirms an identity.

YYYKeystoreProvideras TrustStore

Enable access to a trust credential store.

In order to establish SSL connections certain third-partysystems, such as MySQL, require access to a keystore file

NNNEnableAccess toTrust Store

location. In such situations Administrator provides a copyof the credentials in a keystore which are then written todisk and used by the third party as the SSL credential store.

Default: Checked.

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether the client in the SSL connection willauthenticate to the server. When checked, the identity fieldsare enabled.

Default: Unchecked.

NYNEnableMutualAuthentication

TIBCO ActiveMatrix Policy Director --- 1.0

240 | Resource Templates

Page 241: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider that maintains a keystoreused to assert an identity.

YYYKeystoreProviderto SupplyIdentity

Enables access to an identity keystore. To establish SSLconnections, certain third-party systems such as MySQL

NNNEnableAccess to

require access to a keystore file location. In such situationsCredentialAdministrator provides a copy of credentials in a keystore,Storewhich are then written to disk and used by the third partyContaining

Identity as the SSL credential store. To prevent Administrator fromproviding credentials, uncheck the checkbox.

Default: Checked.

The name of the alias used to access the identity.YYNKey Aliasto AccessIdentity

The password for the alias.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

YYNKey AliasPasswordto AccessIdentity display even if it was set when it was created. If you have

permission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Keystore Provider resource instance.YYNKeystoreProvideras TrustStore

Enables access to the trust store.NYNEnableAccess toTrust Store

Advanced

DescriptionAcceptsSVars?

Editable?Required?Property

Optional. The SSL security provider.YYNSSLSecurityProvider

The SSL protocol to use in the SSL connection:YYNSSLProtocol • SSLv3

• TLSv1

Default: TLSv1.

The number of bits in the key used to encrypt data:YYNSSLCipherClass

• No Exportable Ciphers

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 241

Page 242: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

• At Least 128 Bit• More Than 128 Bit• At Least 256 Bit• FIPS Ciphers• All Ciphers• Explicit CiphersThe greater the number of bits in the key (cipher strength),the more possible key combinations and the longer it wouldtake to break the encryption.

Default: At Least 128 Bit.

A list of ciphers. Enabled when SSL Cipher Class is set toExplicit Ciphers. Use the JSSE format for ciphers names.

YYNExplicitCipherList

Indicate whether the name on the server's certificate mustbe verified against the server's hostname. If the server's

NNNVerifyRemoteHostname hostname is different than the name on the certificate, the

SSL connection will fail. The name on the certificate can beverified against another name by specifying ExpectedRemote Hostname. When checked, the Expected RemoteHostname field is enabled.

Default: Checked.

Optional. The expected name of the remote host.YYNExpectedRemoteHostname

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187Configuring a Trust Store on page 298

SSL Server Provider

Maintains the credentials required by an SSL server.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider that maintains a keystoreused to assert an identity.

YYYKeystoreProviderto SupplyIdentity

Enables access to an identity keystore. To establish SSLconnections, certain third-party systems such as MySQL

NNNEnableAccess to

require access to a keystore file location. In such situationsCredential

TIBCO ActiveMatrix Policy Director --- 1.0

242 | Resource Templates

Page 243: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

StoreContainingIdentity

Administrator provides a copy of credentials in a keystore,which are then written to disk and used by the third partyas the SSL credential store. To prevent Administrator fromproviding credentials, uncheck the checkbox.

Default: Checked.

The name of the alias used to access the identity.YYNKey Aliasto AccessIdentity

The password for the alias.

(Administrator only) For superusers, passwords displayencrypted. For non-superusers, the password doesn't

YYNKey AliasPasswordto AccessIdentity display even if it was set when it was created. If you have

permission to edit the password, you can specify a newvalue and save. If you edit other fields, the old value for thepassword field is retained. If you want to set an empty valueas password, click the link Set Blank Password.

The name of the Keystore Provider resource instance.YYNKeystoreProvideras TrustStore

Enables access to the trust store.NYNEnableAccess toTrust Store

DescriptionAcceptsSVars?

Editable?Required?Property

Indicate whether mutual authentication is enabled. Whenchecked, the Make Client Authentication As, Keystore

NYNEnableMutualAuthentication Provider as Trust Store, and Enable Access to Trust Store

fields display.

Default: Unchecked.

Indicate whether it is optional or required for an SSL clientto authenticate to the SSL server.

Default: Optional.

NYNMakeClientAuthenticationAs

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider resource instance thatmaintains a keystore that confirms an identity.

YYYKeystoreProvideras TrustStore

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 243

Page 244: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Enable access to a trust credential store.

In order to establish SSL connections certain third-partysystems, such as MySQL, require access to a keystore file

NNNEnableAccess toTrust Store

location. In such situations Administrator provides a copyof the credentials in a keystore which are then written todisk and used by the third party as the SSL credential store.

Default: Checked.

Advanced

DescriptionAcceptsSVars?

Editable?Required?Property

Optional. The SSL security provider.YYNSSLSecurityProvider

The SSL protocol to use in the SSL connection:YYNSSLProtocol • SSLv3

• TLSv1

Default: TLSv1.

The number of bits in the key used to encrypt data:YYNSSLCipherClass

• No Exportable Ciphers• At Least 128 Bit• More Than 128 Bit• At Least 256 Bit• FIPS Ciphers• All Ciphers• Explicit CiphersThe greater the number of bits in the key (cipher strength),the more possible key combinations and the longer it wouldtake to break the encryption.

Default: At Least 128 Bit.

A list of ciphers. Enabled when SSL Cipher Class is set toExplicit Ciphers. Use the JSSE format for ciphers names.

YYNExplicitCipherList

Indicate whether the name on the server's certificate mustbe verified against the server's hostname. If the server's

NNNVerifyRemoteHostname hostname is different than the name on the certificate, the

SSL connection will fail. The name on the certificate can beverified against another name by specifying ExpectedRemote Hostname. When checked, the Expected RemoteHostname field is enabled.

Default: Checked.

TIBCO ActiveMatrix Policy Director --- 1.0

244 | Resource Templates

Page 245: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

Optional. The expected name of the remote host.YYNExpectedRemoteHostname

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

Trust Provider

Maintains the identity of a trusted resource.

General

DescriptionAcceptsSVars?

Editable?Required?Property

The name of a Keystore Provider resource instance thatmaintains a keystore that confirms an identity.

YYYKeystoreProvideras TrustStore

Enable access to a trust credential store.

In order to establish SSL connections certain third-partysystems, such as MySQL, require access to a keystore file

NNNEnableAccess toTrust Store

location. In such situations Administrator provides a copyof the credentials in a keystore which are then written todisk and used by the third party as the SSL credential store.

Default: Checked.

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

WS-Security ASP

Enables a connection to Web Services Security authentication services.

General

DescriptionAcceptsSVars?

Required?Editable?Property

Indicate whether to verify the signatures. If checked,activates the Trust Provider field.

Default: Unchecked.

NYNEnableSignatureVerification

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Templates | 245

Page 246: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Required?Editable?Property

Indicate whether to enable decryption. If checked, activatesthe Identity Provider field.

Default: Unchecked.

NYNEnableDecryption

The name of the Identity Provider or Kerberos IdentityProvider that provides the credential used to decryptmessages.

YNYIdentityProviderorKerberosIdentityProvider

The name of a Trust Provider or Kerberos Identity Providerthat provides the credential use to verify a signature.

YNYTrustProviderorKerberosIdentityProvider

The name of a Mutual Identity Provider or Kerberos IdentityProvider . Activated if Enable Decryption and EnableSignature Verification are checked.

YNYMutualIdentityProviderorKerberosIdentityProvider

The name of an LDAP Authentication that providesauthentication services.

YNYAuthenticationProvider

Related TopicsNavigating to a Resource Templates List on page 186Creating a Resource Template on page 184Editing a Resource Template on page 187

TIBCO ActiveMatrix Policy Director --- 1.0

246 | Resource Templates

Page 247: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

11Substitution Variables

A substitution variable is a variable that you can reuse in resource, logging, and application configurations. Substitutionvariables enable late binding of property values to values set at administration time. For example, you can createan HTTP client resource template and bind its port property to a substitution variable that is set when the templateis instantiated. The types of substitution variables are:• String (default type)• Integer• Boolean• Password

You can create substitution variables at design time and during administration. At design time, instead of explicitlysetting property values, you can bind them to substitution variables. During administration, you set the substitutionvariables values to values supported by the resources available on the node on which the components and bindingsare deployed.

A substitution variable is identified by a name. Names may not contain whitespace. When a property value isbound to a substitution variable, the property value is a string containing the substitution variable name surroundedby two pairs of percent signs.

Substitution Variable Scope

In Administrator you can define and set enterprise, host, node, and environment substitution variables and canset application and application fragment substitution variables.

Using Substitution Variables

Logging appender, resource template, application, component, and binding properties can be bound to substitutionvariables. The following figure shows a component property named Greeting bound to a substitution variablenamed Greeting.

Topics

• Creating a Substitution Variable• How Substitution Variables Are Resolved

1.0 --- TIBCO ActiveMatrix Policy Director

Page 248: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating a Substitution Variable

GUI

Procedure

1. Open a substitution variable screen.CommandsLevel

Host 1. Infrastructure > Hosts2. Choose a host.3. Click Substitution Variables.

Environment 1. Infrastructure > Environments2. Choose an environment.3. Click Substitution Variables.

Node 1. Infrastructure > Nodes2. Choose a node.3. Click Substitution Variables.

Application 1. Applications .2. Choose an application.3. Click Substitution Variables.

Application fragment 1. Applications .2. Choose an application.3. Click Substitution Variables.4. Click Application Fragment Substitution Variables.

2. In the Substitution Variables table, click Add.A row is added to the table.

3. In the Name column, type a name for the variable.4. In the Type column, select the variable type from the drop-down list.5. Optionally click the Description and Local Value columns and provide a description and value respectively.6. Click Save.

CLI

Procedure

1. In the data file, specify a SVar element in base format. Nest the SVar element under a parent Enterprise,Environment, Host, Node, Application, or AppFragment element.<SVar xsi:type="amxdata_base:SubstitutionVariable" name="svarName" type="String" value="svarValue"/>

2. In the build file, set the action attribute of the AMXAdminTask element to set or add and theobjectSelector attribute to //SVar. The add action adds variables in the data file that don't exist in the

TIBCO ActiveMatrix Policy Director --- 1.0

248 | Substitution Variables

Page 249: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

database and updates variables defined both data file and database. The set does the same as add anddeletes variables in the database not defined in the data file.<AMXAdminTask action="add" objectSelector="//SVar"/>

1.0 --- TIBCO ActiveMatrix Policy Director

Substitution Variables | 249

Page 250: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

How Substitution Variables Are Resolved

Substitution variables are resolved during deployment time.

Substitution variables bound to logging appender properties are resolved by logging configurations.Substitution variables bound to resource template properties are resolved by resource instances. Substitutionvariables bound to application, component, and binding properties are resolved based upon the node theyare deployed to.

The resolution order goes from most specific to most general. For example, a substitution variable in a loggingappender used for a node-level logging configuration will be resolved by searching for values at the levelsnode, host, environment, and enterprise. The process stops when a matching variable is found. If there is novalue at any level, the value is undefined and will generate a warning when the node is provisioned.

Host-Level Objects

At the host level, substitution variables can be used in logging appenders and are resolved by loggingconfigurations. For example, when a substitution variable bound to a logging appender property is used fora host-level logging configuration, it is resolved by searching for values on the host and enterprise.

Node-Level Objects

At the node level, substitution variables can be bound to logging appender and resource template propertiesand are resolved by logging configurations and resource instances respectively. When a substitution variableis bound to a resource instance property, it is resolved by searching for values on the node, host, environment,and enterprise.

Application Fragment-Level Objects

At the application fragment level, substitution variables can be used in logging appender, component, andbinding properties. For example, a substitution variable in a service binding property will be resolved bysearching for values in the application fragment for the node to which the binding is deployed, application,node, host, environment, and enterprise levels in that order.

TIBCO ActiveMatrix Policy Director --- 1.0

250 | Substitution Variables

Page 251: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

12Logging

TIBCO SilverTIBCO ActiveMatrix supports a flexible logging architecture that enables runtime objects to log eventsto various types of destinations. The TIBCO SilverTIBCO ActiveMatrix logging environment is depicted in Figure5: TIBCO SilverTIBCO ActiveMatrix Logging Architecture on page 251.

Figure 5: TIBCO SilverTIBCO ActiveMatrix Logging Architecture

TIBCO SilverTIBCO ActiveMatrix runtime objects—hosts, nodes, and applications—use log4j technology to outputlog statements to a variety of output targets. In log4j, a target is called an appender. TIBCO SilverTIBCO ActiveMatrixsupports the following logging appender types: clear text file, Common Base Event (CBE) format file, and JMS.Events logged to a JMS appender are stored in a database.

In log4j, a logger associates a runtime object with an appender, specifies the types of events to be logged, andwhether to pass messages to a parent logger. In the Administrator web interface, a logger is referred to as a loggingconfiguration.

An TIBCO SilverTIBCO ActiveMatrix logging environment involves the following participants:• Log event generator An TIBCO SilverTIBCO ActiveMatrix runtime object that generates log events. You specify

the appender to which runtime objects send log events in a logging configuration. In Figure 5: TIBCO SilverTIBCOActiveMatrix Logging Architecture on page 251, Node 1 sends message to a JMS appender. Node 2 sendsmessages to a file and JMS appenders.

• Log event queue A JMS queue to which log event generators can send events.• Log service An application that monitors a log event queue and stores log events to a database.• Payload service An application that manages large payloads associated with log events.• Log viewer A browser-based server and client UI for viewing log events stored to a database.

Topics

• Log Services

1.0 --- TIBCO ActiveMatrix Policy Director

Page 252: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Logging Appenders• Logging Configurations• Log Viewer• Payload Services• Creating Additional Log and Payload Services

TIBCO ActiveMatrix Policy Director --- 1.0

252 | Logging

Page 253: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Log Services

A log service is an TIBCO SilverTIBCO ActiveMatrix application that offers logging services. The log serviceapplication com.tibco.amx.commonlogging.logservice.app is deployed in the environment SystemEnvironmenton SystemNode, the node that runs the Administrator server.

A log service receives log entries sent to a JMS destination and stores the entries in a database.

A log service is created when you create an Administrator server. The log service uses the same EnterpriseMessage Service server for receiving log messages as the Administrator server uses for receiving notificationmessages. You can configure a log service to use the Enterprise Message Service server of your choice. Youcan choose to store log data in the same database used by Administrator server or use another database. Fordetails, see the installation manual for your product.

If the connection to the EMS server is lost, logservice messages and payload service data is stored in the folderCONFIG_HOME/tibcohost/Admin-enterpriseName-serverName/data_3.2._x/nodes/nodeName/work/clrecovery.The logservice messages and payload service data is processed when the connection to the EMS server is restored.

Editing Log Service Properties

About this task

Edit log service properties to change where log events are sent, the database where log events are stored,and how often log events are purged from the database. To edit log service properties, follow the process inSetting a Property Value.

Procedure

1. In the Environment drop-down list, select SystemEnviroment.2. In the Applications list, click com.tibco.amx.commonlogging.logservice.app.

Related TopicsLog Service Property Reference on page 253

Log Service Property Reference

DescriptionTypeName

com.tibco.amx.commonlogging.logservice.app

The name of the Teneo resource instance to which log entries arestored.

Teneocl_logservice_teneo

The name of the JMS Destination resource instance that representsthe JMS queue to which the log events are sent.

JMS Queuecl_logservice_jmsDestination

The name of the JMS Connection Factory resource instance thatrepresents the Enterprise Message Service server that receives logevents.

JMSConnection

cl_logservice_

jmsConnectionFactory

The name of the HTTP Connector used by the Log Viewer. It mustbe set to the same value as the HttpInboundConnectionConfigproperty.

stringdefaultConnector

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 253

Page 254: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionTypeName

The frequency with which expired log entries are purged from thedatabase.

intcl_logservice_timeinterval(h)

• 0 - log entries are never purged.• 1 - expired log entries are purged every hour.

Default: 0.

Indicate whether to save messages larger than 2K to the payloadservice.

booleancl_logservice_largeMessages

ToPayload• false - messages larger than 2K are truncated to 2K. The

truncated messages are saved to the log service database. Theoriginal message is discarded.

• true -messages larger than 2K are saved into the payloaddatabase. Messages of size larger than 2K are truncated to 2K.The truncated message is then saved to the log service database.The original message can be accessed from the payload servicedatabase.

Default: false.

logserviceinstancemanager.soapbinding

The name of the HTTP Connector resource instance used by thelog service.

HTTPConnector

HttpInboundConnectionConfig

payloadservice.soapbinding

The name of the HTTP Client resource instance used by the logservice.

HTTPClient

HttpOutboundConnectionConfig

Related TopicsEditing Log Service Properties on page 253

TIBCO ActiveMatrix Policy Director --- 1.0

254 | Logging

Page 255: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Logging Appenders

TIBCO SilverTIBCO ActiveMatrix runtime objects—hosts, nodes, and applications—use log4j technology tooutput log statements to a variety of output targets. In log4j, a target is called an appender. TIBCO SilverTIBCOActiveMatrix supports the following logging appender types: clear text file, Common Base Event (CBE)format file, and JMS. Events logged to a JMS appender are stored in a database.

Logging appenders are defined at the enterprise level and can be referenced by multiple logging configurations.You can create the following types of logging appenders:• File Appends events to a log file.

– Clear Text - the log file is stored in clear text format.– CBE - the log file is stored in CBE format.

• JMS Appends events to a log service instance, which in turn stores the events to a database.

Default Logging Appenders

The default logging configurations use a file logging appender named nodeName_ROOT whose File Pathproperty is configured as listed in Table 20: Default Logging Appender File Paths on page 255.

Table 20: Default Logging Appender File Paths

File PathObject

CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\host\logs\tibcohost.logSystemHost

CONFIG_HOME/tibcohost/TIBCOHostInstance/host/logs/tibcohost.logSystemHost

CONFIG_HOME\tibcohost\Admin-enterpriseName-adminServerName\nodes\nodeName\logs\nodeName.log

Nodes managed bySystemHost

CONFIG_HOME/tibcohost/TIBCOHostInstance/nodes/nodeName/logs/nodeName.logNodes managed bySystemHost

CONFIG_HOME\tibcohost\instanceName\host\logs\tibcohost.logTIBCO Host instance

CONFIG_HOME\tibcohost\instanceName\nodes\nodeName\logs\nodeName.logNodes managed by aTIBCO Host instance

Related TopicsCreating a Logging Appender on page 255Navigating to a Logging Configurations List on page 261Creating a Logging Configuration on page 261Applying a Logging Configuration on page 262

Creating a Logging AppenderRelated Topics

Logging Appender Reference on page 257Logging Configurations on page 261Logging Appenders on page 255Log Entry Enrichment on page 259

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 255

Page 256: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

GUI

Procedure

1. Select Shared Objects > Logging Appenders.2.

Click .The New Logging Appender dialog displays with the drop-down list of the logging appender typeexpanded.

3. Select an appender type from the Type list.

– Clear Text File - Appends events to a file in clear text format.– CBE XML File - Appends events to a file in Common Base Event (CBE) format.– JMS - Append events to a log service.

The dialog redraws with the appender-specific fields.4. Accept the default name or type a name for the appender in the Name field.5. Fill in the fields and click Save.

The appender is added to the Logging Appenders table and is selected.

Results

CLI

Procedure

1. In the data file, specify the type of the appender in the xsi:type attribute.File Log Appender<LogAppender xsi:type="amxdata:FileLogAppender" name="HelloWorldFileAppender"

filePath="C:/amx-3admin/tibco/cfgmgmt/tibcohost/Admin-amxadmin-instanceOne/nodes/DevNode/logs/HelloWorld.log"

maxSize="10000" maxBackupNum="5"/>

CBE File Appender<LogAppender xsi:type="amxdata:FileLogAppender" name="myFileLogAppender" description="This is File LogAppender"

filePath="C:/amx-3admin/tibco/cfgmgmt/tibcohost/Admin-amxadmin-instanceOne/nodes/DevNode/logs/HelloWorld-CBE.log"

TIBCO ActiveMatrix Policy Director --- 1.0

256 | Logging

Page 257: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

type="cbe" maxSize="1000" maxBackupNum="5"/>

JMS Appender without payload support<LogAppender xsi:type="amxdata:JmsLogAppender" name="myJmsLogAppender" description="This is Jms LogAppender without payload support" jmsConnectionFactoryName="cl_logservice_jmsConnectionFactory" jmsConnectionName="cl_logservice_jndiConnectionConfig" jmsDestination="cl_logservice_jmsConnectionDestionation" type="jndi" sync="true"/>

JMS Appender with payload support<LogAppender xsi:type="amxdata:JmsLogAppender" name="myJmsLogAppender" description="This is Jms LogAppender with payload support" jmsConnectionFactoryName="cl_logservice_jmsConnectionFactory" jmsConnectionName="cl_logservice_jndiConnectionConfig" jmsDestination="cl_logservice_jmsConnectionDestionation" type="jndi" sync="true" payloadURL="c:/payloadURL" sharedDiskURL="c:/sharedDiskURL"/>

2. In the AMXAdminTask element, set the action attribute to add and the objectSelector attribute toLogAppender.<AMXAdminTask action="add" objectSelector="LogAppender"/>

3. Invoke the command-line interface on the build file.

Results

Refer to Composite Development for information on how to retrieve log entries from the destination queue ofa JMS appender.

Logging Appender Reference

File Appender<LogAppender xsi:type="amxdata:FileLogAppender" attributeList />

DescriptionAcceptsSVars?

Editable?Required?Property

The fully-qualified path to the log file. The filenamecomponent of the path is appended with a number asdescribed in Max Backup Index.

YYYFile Path

Controls the format of the log entries for a clear text fileappender. Conforms to the log4j pattern layout.

Default:"%d{dd MMM yyyy HH:mm:ss,SSS} [%t] [%-5p] %c %X{_cl.correlationId} - %m%n"

PatternLayout

This string prints the date, the name of the thread thatgenerated the event, the level of the logged event, thecategory of the logged event, a correlation ID (an enrichmentfield), a message, and a line separator. For example:17 Dec 2009 16:43:41,250 [Job_Executor2] [INFO ] com.tibco.amf.hpa.tibcohost.node.TibcoHostNode.BPMNodeIntegrationNode - Successfully finished processing of RDA rda6705267566599374829.zip

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 257

Page 258: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

In addition to the default format, TIBCO SilverTIBCOActiveMatrix also supports the pattern layouts extendedwith enrichment fields.%R{_cl.physicalCompId.matrix.host} %d'{dd MMM yyyy HH:mm:ss,SSS}' [%t] [%-5p] %c - %m%n

When the CBE file appender is chosen, the appender's layoutis set to BEF2CBELayout, whose pattern is not configurable.

The maximum size of each log file in kilobytes.YYYMax FileSize

The number of log files to keep. When a log file reaches themaximum size, a new log file is created. After the number

YYYMaxBackupIndex of files matches the number specified, the oldest is deleted

when a new file is created. Each file is appended with anumber.

JMS Appender<LogAppender xsi:type="amxdata:JmsLogAppender" attributeList />

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

A JMS Connection Factory on page 207 resource template.YYYJNDIConnectionFactory

A JNDI Connection Configuration on page 210 resourcetemplate.

YYYJNDIConnection

A JMS Destination on page 209 resource template.YYYJNDIDestination

The length of time before a log entry is marked as expired.Expired log entries are purged from the database accordingto the cl_logservice_timeinterval property of the log service.

YYNLogMessageExpirationTime (h)

Payload Logging (optional)

Indicate whether payload logging should be enabled. Whenchecked, the Payload Connection Factory, Payload

YNPayloadLogging

Connection, Payload Destination , and Shared Disk URLfields display.

Default: unchecked.

A JMS Connection Factory on page 207 resource template.YYYPayloadConnectionFactory

A JNDI Connection Configuration on page 210 resourcetemplate.

YYYPayloadConnection

A JMS Destination on page 209 resource template.YYYPayloadDestination

TIBCO ActiveMatrix Policy Director --- 1.0

258 | Logging

Page 259: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?GUIProperty

The complete path to the file where the payload data willbe saved.

If blank, the payload data will be saved to the payloadservice database.

YYNSharedDisk URL(optional)

Related TopicsCreating a Logging Appender on page 255

Log Entry Enrichment

Upon receipt of a log entry from a log client, the TIBCO SilverTIBCO ActiveMatrix platform sets enrichmentfields that can be used to augment the log record. The enrichment fields are set in two locations: LRE andMDC. To include an LRE field in the log output, preface the name of the field key surrounded by bracketswith %R in the pattern layout of the simple file appender . For example,%R{_cl.physicalCompId.matrix.host}. To include an MDC field, preface the field surrounded by bracketsin the simple file appender's pattern layout with %X. For example, %X{_cl.correlationId}. Table 21:Enrichment Fields on page 259 lists the available enrichment fields and where they are set. All the enrichmentfields are included in CBE file and the JMS appender.

Table 21: Enrichment Fields

DescriptionMDCLREField Key

ID to correlate the context with which the logevent is associated with another context inthe same message exchange.

*_cl.correlationId

Context with which the log event isassociated.

*_cl.contextId

Parent of the context with which the logevent is associated.

*_cl.parentContextId

Scheme of the physicalCompId format.

Default: amx3.

**_cl.physicalCompId.scheme

Environment name. Field1 of the physicalcomponent ID. Scheme must be amx3.

*_cl.physicalCompId.matrix.env

Host name. Field2 of the physical componentID. Scheme must be amx3. Only available onhost logging.

*_cl.physicalCompId.matrix.host

Node name. Field3 of the physicalcomponent ID. Scheme must be amx3.

*_cl.physicalCompId.matrix.node

Implementation or binding type name. Field4of the physical component ID. Scheme mustbe amx3.

*_cl.physicalCompId.matrix.typeadapter

Scheme of the logicalCompId format.

Default: amx3.

**_cl.logicalCompId.scheme

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 259

Page 260: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionMDCLREField Key

Application name. Field 1 of the logicalcomponent ID.

*_cl.logicalCompId.matrix.application

Composite or component name. Field 2 ofthe logical component ID.

*_cl. logicalCompId.matrix.component

Component version.*_cl.

logicalCompId.matrix.component.version

Component revision.*_cl.

logicalCompId.matrix.component.revision

Service name. Field3 of the logical componentID. Scheme must be amx3.

*_cl.logicalCompId.matrix.service

Reference name. Field3 of the logicalcomponent ID. Scheme must be amx3.

*_cl.logicalCompId.matrix.reference

Operation name. Field4 of the logicalcomponent ID. Scheme must be amx3.

*_cl.logicalCompId.matrix.operation

Value of the security principal if applicable.*_cl.securityPrincipal

_cl.payload.id

auto-generated file name_cl.payload.name

auto-detected mimetype of payload file._cl.payload.type

URI of payload data. This has beendeprecated.

_cl.payload.uri

The file size of payload file._cl.payload.size

MD5 value of payload file_cl.payload.MD5

Time to leave of payload data. The payloaddata will be automatically purged if it's

_cl.payload.TTL

reached the time to leave. Unit of TTL ishour.

Binary data of payload file._cl.payload.data

Related TopicsCreating a Logging Appender on page 255Navigating to a Logging Configurations List on page 261Creating a Logging Configuration on page 261Applying a Logging Configuration on page 262

TIBCO ActiveMatrix Policy Director --- 1.0

260 | Logging

Page 261: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Logging Configurations

In log4j, a logger associates a runtime object with an appender, specifies the types of events to be logged, andwhether to pass messages to a parent logger. In the Administrator web interface, a logger is referred to as alogging configuration.

A logger is an ancestor of another logger if its name followed by a dot is a prefix of the descendant loggername. A logger is a parent of a child logger if there are no ancestors between itself and the descendant logger.For example, com.tibco is a parent of com.tibco.silver. Each host, node, and application can have a loggingconfiguration and each logging configuration has a root logger. The logging level is specified for each appenderthat belongs to a logger. This lets a logger to send logs to different destination with a different level. You canuse the Administrator graphical and command-line interfaces to create loggers and appenders and to addappenders to existing loggers.

Default Logging Configurations

By default, TIBCO SilverTIBCO ActiveMatrix nodes log at the WARN level. Node level configuration andapplication level configuration are independent. The node and application levels share a configuration whena root logger has not been configured for an application. It such a case, the application logging configurationshares the root logger configuration of the node where part or all the application components run.

To modify the default log configurations for a node, edit theCONFIG_HOME/admin/amxadmin/private/instanceName/DefaultLogConfiguration.properties file.

Related TopicsCreating a Logging Appender on page 255Navigating to a Logging Configurations List on page 261Creating a Logging Configuration on page 261Applying a Logging Configuration on page 262

Navigating to a Logging Configurations List

Procedure

1. Navigate to a list of hosts, nodes, or applications.2. Click a host, node, or application.3. Click the Configuration tab.4. Click the Logging link.

The logging configurations table for the host, node, or application displays.

Related TopicsLogging Configurations on page 261Logging Appenders on page 255Log Entry Enrichment on page 259

Creating a Logging ConfigurationRelated Topics

Logging Configuration Reference on page 263Logging Configurations on page 261Logging Appenders on page 255Log Entry Enrichment on page 259

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 261

Page 262: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

GUI

Procedure

1. Choose a starting point Navigate to a logging configurations list.ProcedureStarting Point

Applications 1.

Host

Node1.

2. Click Add.A row is added to the list.

3. In the Logger Name column, type a logging configuration name.4. In the Additivity column, select an additivity.5. Click Set Appender.

A row is added to the list.6. In the Level column, select a logging level.7. In the Appender column, select an appender.8. Click Save and Apply.

CLI

Procedure

1. In the data file specify Logger, AppenderRef, and Appender elements.<Logger xsi:type="amxdata:Logger" name ="HelloWorldLogger" additivity="false"> <AppenderRef xsi:type="amxdata:AppenderRef" effectivelevel="INFO"> <Appender xsi:type="amxdata_reference:LogAppender_reference" name="HelloWorldFileAppender/> </AppenderRef></Logger>

2. In the build file set the action attribute of the AMXAdminTask element to add or set and the objectSelectorattribute to Path/Logger, where Path is the navigation path to the logger. For example, to set the loggingconfigurations for all application loggers in a data file, action is set and objectSelector isEnvironment/Application/Logger:<AMXAdminTask action="set" objectSelector="Environment/Application/Logger"/>

3. Invoke the command-line interface on the build file.

Applying a Logging ConfigurationRelated Topics

Logging Configurations on page 261Logging Appenders on page 255Log Entry Enrichment on page 259

TIBCO ActiveMatrix Policy Director --- 1.0

262 | Logging

Page 263: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

GUI

Procedure

1. Select the object for which logging is being configured.2. Navigate to a logging configurations list and click a logging configuration.3. Click Apply.

ResultsThe logging configuration is propagated to the object.

CLI

Procedure

1. In the data file specify an Logger definition in full format.In the following example, the Node element contains a logging configuration for a node namedadmin01-node. The logging configuration named com.tibco specifies an appender that logs all Debug,Info, Warn, Error and Fatal events to a file specified in the logging appender named node_file. The logmessages are passed to the root parent logging configuration.<Node xsi:type="amxdata:Node" name="admin01-node"> <Logger xsi:type="amxdata:Logger" name="com.tibco" additivity="true"> <AppenderRef xsi:type="amxdata:AppenderRef" effectiveLevel="DEBUG"> <Appender xsi:type="amxdata_reference:LogAppender_reference" name="node_file"/> </AppenderRef> </Logger></Node>

2. Create a build file. In the AMXAdminTask element set the action attribute to deploy or deployLog and theobjectSelector attribute to Environment/Object, where Object is the object for which logging is beingconfigured.<AMXAdminTask action="deploy" objectSelector="Environment/Node"/>

3. Invoke the command-line interface on the build file.The logging configuration is propagated to the object.

Logging Configuration Reference

A logging configuration is modeled with nested Logger, AppenderRef, and Appender elements. The Loggerspecifies the name and additivity properties. The AppenderRef element specifies the logging level. TheAppender element references a logging appender.<Logger xsi:type="amxdata:Logger" name="loggerName" additivity="additivity" > <AppenderRef xsi:type="amxdata:AppenderRef" effectiveLevel="effectiveLevel"> <Appender xsi:type="amxdata_reference:LogAppender_reference" name="appenderName" /> </AppenderRef></Logger>

Table 22: Logging Configuration: Basic Mode

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the logging configuration. The loggingconfiguration name must be the name of a logger in the

NYYLoggerName

source code or the name of the package in which the sourcecode is contained.

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 263

Page 264: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionAcceptsSVars?

Editable?Required?Property

One of:NYYAdditivity• true Log messages are passed to the parent logging

configuration.• false Log messages are not passed to the parent logging

configuration.

The destination to which log events are appended.NYYAppender

All events of a level equal to or lower than the specifiedlevel are logged. For the Info level, Info, Warn, Error andFatal events are logged. One of:

NYYLevel

• TRACE All events.• DEBUG Fine-grained informational events used for

debugging an application. Do not use Debug severitywith the JMS appender for an extended period of time.Debug severity generates a large volume of messageswhich could overwhelm a log service.

• INFO Coarse-grained informational messages thathighlight the progress of the application.

• WARN Potentially harmful events.• ERROR Errors that allow the application to continue

running.• FATAL Errors that cause the application to fail.• Off Blocks passing messages to a parent

Table 23: Appender

DescriptionAcceptsSVars?

Editable?Required?Property

The appenders defined in the enterprise.NYYName

Related TopicsCreating a Logging Configuration on page 261

TIBCO ActiveMatrix Policy Director --- 1.0

264 | Logging

Page 265: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Log Viewer

The Log Viewer allows you to search the log entries stored by a log service. The log service stores the logssent from a JMSAppender.

To display the Log Viewer, select Governance > Log Viewer . The Log Viewer contains three areas:• Search Builder A filter area and toolbar. In the filter area, you specify search parameters to filter log

events. In the toolbar you invoke actions to perform searches.• Log A table of log events that satisfy the attribute values.• Log Detail Property sheets that display the details of a log event selected in the Log.

Running Searches

About this taskThe Log Viewer supports a flexible approach to running queries. You can run newly constructed or modifiedqueries.

To obtain the result count hint, click the Hint button. The result count is displayed next to the Hint button.

Procedure

1. Choose a search type.ProcedureSearch Type

Basic Search 1. In the Search Builder toolbar, select New SearchBasic Search.

Perform a search based on keywords, timeperiod, and severity.

2. Specify keyword, time period, and severity valuesto search for.

The search is case sensitive.

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 265

Page 266: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureSearch Type

Advanced Search 1. In the Search Builder toolbar, select New SearchAdvanced Search

Perform a search based on filters constructedfrom operations applied to event modelproperties.

2. Build a search in the filter area.

2. Click the Search button at the bottom of the Search Builder.A search result summary displays above the search builder

and the Log table is filled with the matching logentries.

3. Click X to dismiss the search result summary.4. DescriptionOption

New query 1. Build a new query using the query builder.2. Click the Run Query button.

Existing query 1. Select a query from the Prev Queries drop-down list.2. Click the Run Query button.

Saved query 1. Select a query from the Saved Queries drop-down list. The filters specifiedin the query are displayed in the query builder.

2. Click the Run Query button.

Modified query 1. Select a row in the Log.2. Right-click a cell within the row and select:• Add filter with cell value and run query Adds a filter with the cell value to

the filter area and runs the query.• Replace filters with cell value and run query Replaces all the filters in the

filter area with a filter with the cell value and runs the query.

Search Builder

The search builder is divided into three areas:• Toolbar Contains actions for minimizing and maximizing the query builder, and building queries.• Event Model control Contains an event model selector and a tree of the attributes available for each type

of event model.• Filter area Contains a canvas displaying the active filters.

Figure 6: Search Builder

TIBCO ActiveMatrix Policy Director --- 1.0

266 | Logging

Page 267: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Model Area

The Log Viewer allows you to search for and view log events based on different log event models.

By default, the event models shown in Event Model Control are displayed. Only attributes from the currentlyselected model are displayed in the attribute tree.

Figure 7: Event Model Control

To set the model, select the model from the drop-down list.

Filter Area

You create new searches by adding filters to the filter area. Filter Area on page 267 shows the filter area withthe creation time and severity filters.

Figure 8: Filter Area

Creation Time Filter

The Creation Time filter causes log events to be filtered based on when the events were created. You can setthe creation time filter as a relative or absolute time. To set a relative creation time, click the top radio buttonand select a time from the drop-down list. To set an absolute creation time, click the bottom radio button andspecify From and To date and times using the respective date and time pickers.

Filter Operators

Some filters allow you to provide an attribute value against which the attribute in log event is compared. Forexample, the filter in Filter Area on page 267 shows the = operator selected for the EEF Severity filter. TheLog Viewer supports the operators listed in Filter Operators.

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 267

Page 268: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Table 24: Filter Operators

DescriptionOperator

The attribute value you provide exactly matches (strings) or equals (numbers) theattribute value in the log event.

=

The attribute value you provide is greater than or equal to the attribute value in the logevent. Available only for EEF Severity and EEF Priority.

>=

The attribute value you provide is less than or equal to the attribute value in the logevent. Available only for EEF Severity and EEF Priority.

<=

The attribute value you provide contains a substring of the attribute value in the logevent. For example, the value MyContext for a Context ID attribute, matches thefollowing Context ID values: MyContext, MyContextXXX, XXXMyContextXXX

CONTAINS

Adding and Removing Filters

Adding Filters1. Left-click an attribute in the Event Model control, hold the mouse button down, and release the button in

the filter area.

Removing Filters

•Click next to a filter name.

Event Models

An event model specifies the type of attributes associated with a log event.

The supported event models are:• Base Event Format (BEF) The root of all event formats. It includes the most common attributes of an event.• Engine Event Format (EEF) Adds engine-level attributes to the Base Event Format. This is the default

model.• BW Engine Event Format (BWEEF) Adds BusinessWorks-specific engine attributes to the Engine Event

Format.

Base Event Format Attribute Reference

DescriptionField KeyAttribute

The time the log event was created._cl.creationTimeCreation Time

Expiration time (in hours) of log record. Log recordwill be automatically purged from db if it expiresfrom the creation time.

_cl.expirationTimeInDBExpiration Timein DB

Identifier of the log event message._cl.msgIdMsg ID

The event message string._cl.msgMsg

Physical component identifier category. Subcategoriesare either generic or identified by a scheme. Containsa scheme field and fields defined by the scheme.

_cl.physicalCompId.key namePhysicalComponent ID

• Generic Physical Component ID A generic physicalcomponent identifier. Contains a scheme field andup to eight fields defined by the scheme. Used to

TIBCO ActiveMatrix Policy Director --- 1.0

268 | Logging

Page 269: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionField KeyAttribute

search for log events that don't have a scheme orwhose scheme is not supported by the Log Viewer.For example, an application could specify aGeneric Physical Component ID with field1 namedcluster_name and field2 called host_name.

• AMX Physical Component ID

An ActiveMatrix physical component identifier.The ActiveMatrix scheme identifier is amx. TheID is: amx#environment name#host name#nodename#typeadapter name.

Logical component identifier category. Subcategoriesare either generic or identified by a scheme. Containsa scheme field and fields defined by the scheme.

_cl.logicalCompId.key nameLogicalComponent ID

• Generic Logical Component ID A generic logicalcomponent identifier. Contains a scheme field andup to eight fields defined by the scheme. Used tosearch for log events that don't have a scheme orwhose scheme is not supported by the Log Viewer.

• AMX Logical Component ID

An TIBCO SilverTIBCO ActiveMatrix logicalcomponent identifier. The TIBCO SilverTIBCOActiveMatrix scheme identifier is amx. The ID is:amx#application#service name#operation name.

The logger name’s type: amx or bw._cl.logicalCompId.schemeScheme

The name of the destination for the log events._cl.reportingCompId.ValueLogger Name

The class loader active at the time the event waslogged.

_cl.reportingCompId.ClassloaderClass Loader

The hierarchy of entities when the event was logged._cl.reportingCompId.hierarchyNameHierarchy

Globally unique identifier of the log event._cl.globalInstanceIdGlobal InstanceID

The ID to correlate the context with which the logevent is associated with another context in the samemessage exchange.

_cl.correlationIdCorrelation ID

A physical address that corresponds to the locationof a component.

_cl.locationIdLocation ID

An identifier of the context with which the log eventis associated.

_cl.contextIdContext ID

An identifier of the parent context of the context withwhich the log event is associated.

_cl.parentContextIdParent ContextID

A set of name-value pairs. The name and the valueare strings composed of any alphanumeric characters.

_cl.classifier.key nameClassifier

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 269

Page 270: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionField KeyAttribute

Supports searching for log events based on log eventcontents. For example, you could search for logrecords with the following classifiers:

classifierA: name=PONumber value=0001

classifierB: name=BuyerName value=aBuyer

The situation that caused the log event to begenerated. For the list of situation types and the

_cl.situationSituation

contexts in which the situation type applies, see Table110.

The authenticated entity that created the log event._cl.securityPrincipalSecurityPrincipal

Situation Types

enumerates the situation types that cause components to log events and describes the Table 25: SituationTypes on page 270contexts in which the situation applies.

Table 25: Situation Types

DescriptionSituation Type

Deals with the component startup process. Messages indicate that a componenthas finished the startup process or that it has aborted the startup process. Existingmessages include words such as: starting, started, initializing, and initialized.

StartSituation

Deals with the component shutdown process. Messages indicate that a componenthas begun to stop, that it has stopped, or that the stopping process has failed.

StopSituation

Existing messages include words such as: stop, stopping, stopped, completed, andexiting.

Deals with aspects of a component’s connection to another component. Messagesindicate that a connection failed, that a connection was created, or that a connection

ConnectSituation

was ended. Existing messages include words such as: connection reset, connectionfailed, and failed to get a connection.

Deals with the situations that identify the completion status of a request. Typicallythese requests are complex management tasks or transactions that a component

RequestSituation

undertakes on behalf of a requestor and not the mainline simple requests ortransactions. Existing messages include words such as: configurationsynchronization started and backup procedure complete.

Deals with components identifying their configuration. Any changes that acomponent makes to its configuration or that describe current configuration state

ConfigureSituation

should be logged using this category. Existing messages include words such as:port number ID, address ID, and process ID.

Deals with component operational state and availability. Provides a context foroperations that can be performed on the component by distinguishing if a product

AvailableSituation

is installed, operational and ready to process functional requests, or operationaland ready or not ready to process management requests. Existing messages includewords such as: ready to take requests, online, and offline.

Deals with the situations reported from the component, such as heartbeat orperformance information. Messages indicate current CPU utilization and current

ReportSituation

TIBCO ActiveMatrix Policy Director --- 1.0

270 | Logging

Page 271: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

DescriptionSituation Type

memory heap size. Existing messages include words such as: utilization value is,buffer size is, and number of threads is.

Deals with the situations documenting when a component creates an entity.Messages indicate a document was created or a file was created. Existing messagesinclude words such as: was created, about to create, and now exists.

CreateSituation

Deals with the situations documenting when a component removes or destroys anentity. Messages indicate that a document was destroyed or a file was deleted.

DestroySituation

Existing message include words such as: was created, about to create, and nowexists.

Deals with the situations that announce that a feature of a component is ready (ornot ready) for service requests. Message indicate services being available and

FeatureSituation

services or features being unavailable. Existing messages include words such as:now available, currently available, and transport is listening on port 123.

Deals with the situations in which components cannot find some component orfeature that they require. Messages indicate a resource was not found, that an

DependencySituation

application or subsystem that was unavailable, or that the expected version of acomponent was not found. Existing messages include words such as: could notfind and no such component.

Provides support for product-specific situations other than the predefined categories.OtherSituation

Engine Event Format Attribute Reference

DescriptionField KeyAttribute

The perceived severity of the status the event isdescribing in the context of the application thatreports the event:

_cl.severitySeverity

• Trace All events. Provides finer-grainedinformational events as compared to the Debuglevel.

• Debug Fine-grained informational events usedfor debugging an application.

• Info Coarse-grained informational messagesthat highlight the progress of the application.

• Warn Potentially harmful events.• Error Application errors that allow the

application to continue running.• Fatal Very severe errors that will cause the

process to abort.

The importance of the event: Low, Medium, orHigh.

_cl.priorityPriority

The ID of the thread running the component orsubcomponent that generated the event.

_cl.threadIdThread ID

The ID of the operating system process hostingthe engine.

_cl.OSProcessIdOS Process ID

The name of the class that implements the engine._cl.classNameClass Name

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 271

Page 272: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

BW Engine Event Format Attribute Reference

DescriptionField KeyAttribute

The name of the host hosting the BusinessWorksengine.

_cl.hostNameHost Name

BusinessWorks engine name._cl.engineNameEngineName

BusinessWorks job ID._cl.jobIdJob ID

BusinessWorks process name._cl.processNameProcessInstance ID

BusinessWorks activity name._cl.activityActivityName

BusinessWorks project name._cl.projectNameProjectName

BusinessWorks process starter name._cl.starterNameStarterName

BusinessWorks tracking identifier._cl.trackingInfoTrackingID

BusinessWorks custom identifier._cl.customIdCustom ID

Log Table

The log table displays the log events returned from a search.

Configuring Log Table Columns

To configure the columns that appear in the log table:1.

Click the icon in the Search Builder toolbar. The column picker will display:

TIBCO ActiveMatrix Policy Director --- 1.0

272 | Logging

Page 273: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

2. Check or uncheck column names.3. Click the log.

Paging Through the Log

When a large number of events is returned from a query the log is split into multiple pages. To scroll through

the pages, click the arrows in the page control below the Log.

Exporting the Log

You can export the log entries to an XML file in CBE format. To export a log, click the Export button in theSearch Builder toolbar. You can export up to 100,000 log entries at a time.

Purging Displayed Logs

You can configure the duration for which the expired logs continue to be displayed. Thecl_logservice_timeinterval property of the log service application specifies the frequency with whichthe expired logs are purged from the Log Viewer and deleted from the database. See Setting a Property Valueon page 152.

Alternatively you can the Delete Log Entries button to delete logs. See Deleting Log Entries on page 273 formore information.

Deleting Log Entries

Procedure

1. Select Governance > Log Viewer.2. Click the Delete Log Entries button.

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 273

Page 274: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

The Delete log entries dialog box displays.3. Specify the date and time range for which you want to delete the log entries and click the Delete button.

ResultsThe log entries for the specified time range are deleted.

TIBCO ActiveMatrix Policy Director --- 1.0

274 | Logging

Page 275: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Payload Services

A payload service supports archiving, persisting and retrieving large size payload data. It is an independentservice and does not depend on a log service. However, a log record sent to a log service can include a payloadURL field to link a log message and payload data. This is achieved by using the payload API in an application.

A payload service is created when you create an Administrator server. You can choose to store payload datain the same database used by the Administrator server or use another database. Use the payload API in anapplication to store payload data.

Refer Composite Development for information on how to save and retrieve payload data.

Payload Service Properties Reference

The following table lists the properties defined for a payload service. Click Applications, choose the payloadservice application and navigate to the Properties tab to view these properties.For information on modifying these properties see Setting a Property Value on page 152.

DescriptionTypeName

If the value of this property is db, the payload data will stored in adatabase, otherwise the payload data is stored in the file specified bythe fileRootDir property.

stringserverType

The name of the Teneo on page 218 resource instance to which payloadentries are stored.

TeneoteneoSessionFactory

The path to the file where the payload data is stored.stringfileRootDir

The value must be set to payload.stringcontextRoot

The name of the HTTP Connector used by the Log Viewer. It must beset to the same value as the HttpInboundConnectionConfig property.

stringdefaultConnector

AJMS Connection Factory on page 207 resource instance that representsthe Enterprise Message Service server that receives log events.

JMSConnection

jmsConnFactory

A JMS Destination on page 209 resource instance that represents theJMS queue to which the log events are sent.

JMS QueuejmsDest

payloadservice.soapbinding

The name of the HTTP Connector resource instance used by thepayload service.

HTTPConnector

HttpInboundConnection

Config

1.0 --- TIBCO ActiveMatrix Policy Director

Logging | 275

Page 276: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating Additional Log and Payload Services

About this task

A log service and a payload service are created when you create an Administrator server. Follow these stepsto create additional log or payload services on nodes other than the SystemNode.

For instructions to deploy the logging and payload services to the SystemNode if they were notdeployed when creating the Administrator server using TIBCO Configuration Tool refer toTIBCO_HOME\administrator\version\scripts\logging\readme.txt.

Procedure

1. Create a JMS queue that will be used by the log service and a JNDI name for the queue.2. Create the resource templates used by the log service. Refer Log Service Property Reference on page 253.

Additionally create the resource templates for the referenced resource instances.3. Create resource instances for the resource templates created in the previous step. Creating Resource

Instances on Nodes on page 278.4. Create a new log service application using the log service application template. Creating an Application.5. Distribute the application. Refer Distributing an Application.6. Update the properties for the application using the previously created resource instances. Setting a Property

Value on page 152.7. Deploy the application. Deploying Applications on page 123.

What to do next

Create a payload service using the above procedure. Refer Payload Service Properties Reference on page 275for the required resource templates.• The log and payload services cannot monitor the same JMS queue. However, more than one log service

can monitor the same JMS queue and store logs to the same database. This feature can be used to achievehigh availability of the log service.

• If multiple log services monitor the same queue, the log service data should be saved to the same database.Similarly, If multiple payload services monitor the same queue, the payload data should be saved to thesame database.

• The log and payload services cannot share an HTTP Connector on page 198.

TIBCO ActiveMatrix Policy Director --- 1.0

276 | Logging

Page 277: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

13Resource Instances

A resource instance is a runtime object that represents a resource, such as an HTTP, JDBC, or LDAP connection. Aresource instance instantiates the configuration defined in a resource template and makes it available to servicesrunning on a node.

Applications, components, bindings, logging appenders, and resource templates can have properties whose valueis the name of a . For example, an HTTP client resource template's SSL property configuration includes a propertywhose value is the name of SSL Client Provider . Figure 9: TIBCO Business Studio Resource Instance on page 277and Figure 10: Administrator Resource Instance on page 277 show how to set a property in TIBCO Business Studioand Administrator respectively.

Figure 9: TIBCO Business Studio Resource Instance

Figure 10: Administrator Resource Instance

Topics

• Creating Resource Instances on Nodes• Installing Resource Instances on Nodes• Uninstalling Resource Instances from Nodes• Deleting Resource Instances from Nodes• Resource Instances Reference

1.0 --- TIBCO ActiveMatrix Policy Director

Page 278: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Creating Resource Instances on Nodes

About this taskThe available nodes are the nodes managed by the selected host.

The name of the resource instance does not have to be the same as the name of the resource templatefrom which it gets its configuration though it is often desirable to keep them the same.

GUI

Procedure

Choose a starting point and follow the appropriate procedure.ProcedureStarting

Point

Hosts 1. Select Infrastructure > Hosts.2. In the Hosts table, click a host.3. Choose one of the following options:

– Click New Resource Instances.–

Click the Resource Instances tab. In the All Instances table, click .

Optionally select a resource template type from the View drop-down list and click

4. Click a resource template.

If no resource templates exist, click new resource template and follow the procedure inCreating a Resource Template on page 184.

5. Accept the default instance name or type a new one in the Instance Name field. The namemust not contain the characters : or &.

The name of the resource instance should be the same as the resource template.

6.In the Available Nodes list on the right, click one or more nodes and click .

7. Choose one of the following options:– Save to add the resource instance to the selected nodes and continue adding resource

instances.– Save and Close to add the resource instance to the selected nodes and close the dialog.– Save and Install to install the resource instance to the selected nodes and close the

dialog.

8. If you did not install the resource instance in the previous step, the Install ResourceInstances dialog box displays. Select the resource instances to install and click Install.

Nodes 1. Select Infrastructure > Nodes.2. In the Nodes table, click a node.3. Click the Resource Instances tab.4. Select a resource template type from the View drop-down list and click a resource template.

TIBCO ActiveMatrix Policy Director --- 1.0

278 | Resource Instances

Page 279: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureStartingPoint

If no resource templates exist, click new resource template and follow the procedure inCreating a Resource Template on page 184.

5. Accept the default instance name or type a new one in the Instance Name field. The namemust not contain the characters : or &.

The name of the resource instance should be the same as the resource template.

6. Click Save to add the resource instance to the selected nodes and continue adding resourceinstances or Save and Close to add to add the resource instance to the selected nodes andclose the dialog.

7. In the Install Resource Instances dialog box, select the resource instances to install andclick Install.

ResourceTemplates

1. Select Shared Objects > Resource Templates.2. Click a resource template.3. Click New Resource Instances.4. Click a host.5. Accept the default instance name or type a new one in the Instance Name field. The name

must not contain the characters : or &.

The name of the resource instance should be the same as the resource template.

6.In the Available Nodes list on the right, click one or more nodes and click .

7. Choose one of the following options:– Save to add the resource instance to the selected nodes and continue adding resource

instances.– Save and Close to add the resource instance to the selected nodes and close the dialog.– Save and Install to install the resource instance to the selected nodes and close the

dialog.

8. If you did not install the resource instance in the previous step, the Install ResourceInstances dialog box displays. Select the resource instances to install and click Install.

CLI

Before you begin

The resource template specified in the resourceTemplateName attribute must exist in theAdministratordatabase.

Procedure

1. In the data file, specify a ResourceInstance element in full format.<ResourceInstance xsi:type="amxdata:ResourceInstance" name="resourceHttpClient" resourceTemplateName="HttpclientRT" />

2. In the build file, set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Environment/Node/ResourceInstance.<AMXAdminTask action="add" objectSelector="Environment/Node/ResourceInstance"/>

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Instances | 279

Page 280: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Installing Resource Instances on Nodes

Before you begin

The resource instances must have already been added to the nodes.

GUI

Procedure

1. Select Infrastructure > Hosts.The Hosts table displays.

2. In the Hosts table, click a host.3. Click the Resource Instances tab.4. In the Resource Instances view, click All Instances.5. Click the rows containing the instances to install.6. Choose an install option:

– Install - installs the selected resources only if dependent resources can be autoinstalled or have beenpreviously installed.

– Install Force Install - installs the selected resources and issues warnings if dependent resources arenot installed.

– More install options - check the checkboxes for the following options as applicable:– Install with force, bypassing validation checks.– Provision driver in resolve mode (restarts the node).

7. If the resource instance depends on a recently modified resource template, the Apply Changes in ResourceTemplate to Runtime dialog displays.a) Select the resource instances that you want to reinstall. These are resource instances created from this

resource template or other resource templates that depend on the modified resource template.b) Select the applications that you want to restart.c) Select the nodes where you want the resource instances reinstalled and the applications restarted.

8. When using JDBC or JMS drivers, if you have configured multiple drivers that have the same class namebut different driver JAR file names, the Driver Selection Dialog displays. The following shows the dialogbox for a selecting a JDBC driver.

TIBCO ActiveMatrix Policy Director --- 1.0

280 | Resource Instances

Page 281: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

a) Select a version from the Driver drop-down list.b) If the driver requires the use of a resolve mode, the checkbox for Use Resolve Mode (node will restart)

is checked by default.c) Click OK.

ResultsThe resource instances are installed on the nodes with the Runtime State is either Stopped or Runningdepending on the state of the node.

When a resource instance is installed and its resource template references another resource template,Administrator will automatically create a resource instance of the same name as the referenced template andinstall it. This is done recursively for several levels if needed.

• Only those drivers installed using TIBCO Configuration Tool are detected and provisioned.• If the driver for a particular class is already installed on the node, the provisioning process is

skipped.• If using a driver not supported by the TIBCO Configuration Tool choose the option to ignore the

missing driver in the Driver Selection Dialog.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Instances | 281

Page 282: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

CLI

Procedure

1. In the data file, specify a ResourceInstance element in base format.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceHttpClient" />

If installing either JDBC or JMS resource instances and if you have multiple drivers available, specify thename and version of the driver using the driverFeaturename and driverFeatureVersion elements.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceJDBC_ORA" resourceTemplatename="ora" driverFeatureName="com.tibco.tpcl.gen.oracle.jdbc.feature" driverFeatureVersion="11.2.100.001" />

To store this driver version as the default driver in the resource template, use the setDriverAsDefaultoption and set it to true. All resource instances created using this resource template will now use thisdriver.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceJDBC_ORA" resourceTemplatename="ora" driverFeatureName="com.tibco.tpcl.gen.oracle.jdbc.feature" driverFeatureVersion="11.2.100.001" setDriverAsDefault="true" />

2. In the build file, set the action attribute of the AMXAdminTask element to install and the objectSelectorattribute to Environment/Node/ResourceInstance. The options element is used to specify the provisioningmode.

– auto-resolve - the mode specified by the driver is used.– resolve - the resolve mode is used.– element not specified - the provisioning is done in the stable mode.

<AMXAdminTask action="install" objectSelector="Environment/Node/ResourceInstance" options="auto-resolve"/>

TIBCO ActiveMatrix Policy Director --- 1.0

282 | Resource Instances

Page 283: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

When installing a resource instance that refers to a JMS or JDBC resource instance, the resource instancesare installed but the drivers are not provisioned.

3. To re-install all dependant resource instances and restart applications that use these resource instances,use the handle-dependencies option.<AMXAdminTask action="install" objectSelector="Environment/Node/ResourceInstance" options="handle-dependencies"/>

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Instances | 283

Page 284: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Uninstalling Resource Instances from Nodes

GUI

Procedure

1. Select Infrastructure > Hosts .The Hosts table displays.

2. In the Hosts table, click a host.3. Click the Resource Instances tab.

DescriptionOption

All Instances 1. In the Resource Instances view, click All Instances.2. Click the rows containing the instances to uninstall.3. Choose an uninstall option.

– Uninstall - uninstalls the selected resources only if applications are not using itand no other resources are using it.

– Uninstall Force Uninstall - uninstalls the selected resources and issues warningsif applications or dependent resources are using it.

Instance 1. In the Resource Instances view, first expand the All Instances node and then thenode for the resource instance type.

2. Click a resource instance.3. Click one or more nodes in the Selected Nodes list and click . The nodes move

to the Available Nodes list.4. Click Update. The selected resource instances are uninstalled only if any applications

or other resources are not using it.

CLI

Procedure

1. In the data file, specify a ResourceInstance element in base format.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceHttpClient" />

If installing either JDBC or JMS resource instances and if you have multiple drivers available, specify thename and version of the driver using the driverFeaturename and driverFeatureVersion elements.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceJDBC_ORA" resourceTemplatename="ora" driverFeatureName="com.tibco.tpcl.gen.oracle.jdbc.feature" driverFeatureVersion="11.2.100.001" />

To store this driver version as the default driver in the resource template, use the setDriverAsDefaultoption and set it to true. All resource instances created using this resource template will now use thisdriver.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceJDBC_ORA" resourceTemplatename="ora" driverFeatureName="com.tibco.tpcl.gen.oracle.jdbc.feature" driverFeatureVersion="11.2.100.001" setDriverAsDefault="true" />

TIBCO ActiveMatrix Policy Director --- 1.0

284 | Resource Instances

Page 285: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

2. In the build file, set the action attribute of the AMXAdminTask element to uninstall and theobjectSelector attribute to Environment/Node/ResourceInstance. To perform a force uninstall, specifythe -force option and set it to true.<AMXAdminTask action="uninstall" objectSelector="Environment/Node/ResourceInstance"/>

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Instances | 285

Page 286: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Deleting Resource Instances from Nodes

GUI

Procedure

1. Select Infrastructure > Hosts .The Hosts table displays.

2. In the Hosts table, click a host.3. Click the Resource Instances tab.

The list of resource instances display. The resource instances listed in the table on the left hand side aregrouped by the type of the resource instance.

4. Choose one of the following procedures:DescriptionOption

All Instances 1. In the Resource Instances view, click All Instances.2. Expand the rows for the listed resource instance type to see individual resource

instances.3. Click the rows containing the instances to delete.4. Choose a delete option.

– Delete - deletes the selected resources only if the resources are uninstalled.– Delete Force Delete - Force uninstalls the resource instance and then deletes it.

This option is enabled only if you have the necessary permissions. See SettingEnterprise Permissions on page 313 for more information.

You should exercise extreme caution when using this option as it mayleave your system in a non-working state.

Instance 1. In the Resource Instances view, expand the All Instances node and click a resourceinstance.

2. Click Remove Instance. Deletes the selected resource only if the resource isuninstalled.

CLI

Procedure

1. In the data file, specify a ResourceInstance element in base format.<ResourceInstance xsi:type="amxdata:ResourceInstance_base" name="resourceHttpClient" />

2. In the build file, set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Environment/Node/ResourceInstance. To perform a force delete, specify the -force optionand set it to true.<AMXAdminTask action="delete" objectSelector="Environment/Node/ResourceInstance"/>

TIBCO ActiveMatrix Policy Director --- 1.0

286 | Resource Instances

Page 287: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Resource Instances Reference

DescriptionColumn

The type of the resource instance.Type

The name of the resource template from which the instance was created.Template Name

The name of the resource instance.Instance Name

The state of the resource instance.Instance State• Not Installed - after a resource instance has been added to a node and before it has

been installed• Running - after a resource instance has been installed and the node on which it has

been installed is Running• Uninstalled - either the resource instance is uninstalled or the node on which the

resource instance is installed is Not Running

Indicates whether the resource instance runtime matches the host's configuration in theAdministrator database.

Synchronized State

The node where the instance is installed.Node

The outcome of the last action performed with the intent of affecting the runtime state.Action History

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Instances | 287

Page 288: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 289: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

14Resource Adapters

A resource adapter provides support for a specific resource instance type. In order to run a resource instance of thedesired type, the matching resource adapter must be available on the node. A resource adapter is an implementationof the Java Connector Architecture connection factory and manages resources shared among many applicationson a node.

Topics

• Adding Resource Adapters to the Enterprise• Setting Host Resource Adapters• Removing Resource Adapters from a Host

1.0 --- TIBCO ActiveMatrix Policy Director

Page 290: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Adding Resource Adapters to the Enterprise

GUI

Procedure

1. Choose a starting point and follow the appropriate procedure.ProcedureStarting Point

Software Management 1. Select Infrastructure > Software Management .2. Click the Features or Application Templates tab.3. Click Upload DAA or EAR.

a. Navigate to a directory containing the DAA file.b. Click the DAA file.c. Click Open.

4. Choose whether you want to import the listed features.

Applications 1. Click Applications.2. Click an application.3. In the General tab, click the Upload DAA or EAR link next to the Template

Version field.a. Navigate to a directory containing the DAA file.b. Click the DAA file.c. Click Open.

4. Choose whether you want to import the listed features.

2. Click Save.

CLI

Procedure

1. In the data file, specify a DAA element in full format.<DAA xsi:type="amxdata:DAA" location="testApp.daa"/>

2. In the build file, set the action attribute of the AMXAdminTask element, to add and the objectSelectorattribute to DAA.<AMXAdminTask action="add" objectSelector="DAA"/>

TIBCO ActiveMatrix Policy Director --- 1.0

290 | Resource Adapters

Page 291: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Setting Host Resource Adapters

GUI

Procedure

1. Select Infrastructure > Software Management.2. Click the Resource Adapter tab.3. Expand the tree for the selected adapter.4. Expand the tree for the selected version to view the hosts.5. Click Edit.

The Edit Host for Resource Adapters dialog displays6. Click one or more hosts in the Available Hosts list and click .

The hosts move to the Selected Hosts list.7. Choose one of the following options

• Apply.• Apply with Resolve.• Cancel.

CLI

Procedure

1. In the data file, specify a ResourceAdapter element in base format.

2. In the build file, set the action attribute of the AMXAdminTask element to set and the objectSelectorattribute to Host/ResourceAdapter.

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Adapters | 291

Page 292: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Removing Resource Adapters from a Host

GUI

Procedure

1. Select Infrastructure > Software Management .2. Click the Resource Adapters tab.3. In the View By drop-down list, choose whether to display resource adapters or hosts as the parent object.

– Resource Adapters Click one or more resource adapters and click an action.

ProcedureAction

Edit 1. Click Edit. The Edit Hosts for Resource Adapter dialog displays.2. Click one or more hosts in the Selected Hosts list and click . The hosts move to

the Available Hosts list.– Click Apply. Removes the selected resource adapters from the nodes managed

by the selected hosts.– Click Apply with Resolve. Removes the selected resource adapters from the

nodes managed by the selected hosts and restarts the nodes. All components andbindings running on the nodes are stopped and restarted.

Remove 1. Click Remove.

– Hosts Click one or more hosts and click an action.

ProcedureAction

Edit 1. Click Edit. The Edit Resource Adapters for Host dialog displays.2. Click one or more resources adapters in the Selected Resource Adapters list and click

. The hosts move to the Available Resource Adapters list.– Click Apply. Removes the selected resource adapters from the nodes managed

by the selected hosts.– Click Apply with Resolve. Removes the selected resource adapters from the nodes

managed by the selected hosts and restarts the nodes. All components and bindingsrunning on the nodes are stopped and restarted.

Remove 1. Click Remove.

The selected resource adapters are removed from the nodes managed by the selected hosts.

CLI

Procedure

1. In the data file, specify a ResourceAdapter element in base format.<ResourceAdapter xsi:type="amxdata:ResourceAdapter" componentID="JDBCResourceAdapter" />

TIBCO ActiveMatrix Policy Director --- 1.0

292 | Resource Adapters

Page 293: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

2. In the build file, set the action attribute of the AMXAdminTask element to uninstall and theobjectSelector attribute to Host/ResourceAdapter.<AMXAdminTask action="uninstall" objectSelector="Host/ResourceAdapter"/>

1.0 --- TIBCO ActiveMatrix Policy Director

Resource Adapters | 293

Page 294: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 295: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

15Secure Communication Channels

The ActiveMatrix platform is partitioned across many components. You can secure the corresponding communicationchannels during initial configuration or later.

ActiveMatrix components communicate with each other and with third-party applications over severalcommunication protocols. Figure 11: Communication Channels on page 295 illustrates the components andcommunication protocols.

Figure 11: Communication Channels

By default, the communication channels are not secure. To secure them, you can configure the channels to use theSecure Sockets Layer (SSL) protocol. SSL is a cryptographic protocol that provides security and data integrity forcommunications over TCP/IP networks.

An SSL client and server negotiate a connection by using a handshaking procedure. During this handshake, theclient and server agree on various parameters to establish the connection's security, as follows:1. A client requests a secure connection from an SSL-enabled server requesting a secure connection.2. The server sends back its identification in the form of a digital certificate.

The certificate usually contains the server name, the trusted certificate authority (CA), and the server's publicencryption key.

You can specify the SSL configuration of the communication channels at different times in the life cycle of adeployment. Table 26: SSL Configuration Summary on page 296 lists how to perform the initial SSL configuration

1.0 --- TIBCO ActiveMatrix Policy Director

Page 296: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

and how to upgrade, downgrade, and change the configuration of each channel. The Key column in the table pointsto the numbers in Figure 11: Communication Channels on page 295.

Table 26: SSL Configuration Summary

Upgrade, Downgrade, or ChangeConfiguration

Initial ConfigurationChannelKey

Upgrade or downgrade: AdministratorCLI

Change SSL configuration:Administrator CLI

When creating the Administrator serverin TIBCO Configuration Tool.

Administratorserver (externalHTTP port) - weband CLI clients

1

Upgrade or downgrade: Administratorweb UI or CLI

Change SSL configuration:Administrator web UI or CLI

When creating the Administrator serverin TIBCO Configuration Tool.

Administratorserver (internalHTTP port) - hostsand nodes

2

Upgrade or downgrade: Administratorweb UI or CLI

Change SSL configuration:Administrator web UI or CLI

When creating the Administrator serverin TIBCO Configuration Tool.

Administratorserver - EnterpriseMessage Serviceserver

(Notification Serverand MessagingBus)

3

Upgrade or downgrade: AdministratorCLI

Change SSL configuration:Administrator CLI

When creating the Administrator serveror TIBCO Host instance in TIBCOConfiguration Tool.

TIBCO Hostinstance - TIBCOEnterprise MessageService

4

Change SSL configuration:Administrator CLI

When creating the Administrator serverin TIBCO Configuration Tool.

Administratorserver - externaldatabase and LDAPservers

5

Upgrade: Administrator web UI or CLI

Change SSL configuration:Administrator CLI

When creating Administrator in TIBCOConfiguration Tool.Administrator

server - hosts andnodes(management)

6

Same procedure as initial configurationManually import the UDDI servercertificate into the Administrator servertrust store using keytool.

Enable secure communication inAdministrator web UI or CLI.

Administrator-UDDI server

7

Administrator Upgrade or downgrade:Administrator CLI

Change SSL configuration:Administrator CLI

Administrator - When creatingAdministrator server in TIBCOConfiguration Tool.

TIBCO Business Studio - When youconnect to Administrator.

Administratorserver (externalHTTP port) -TIBCO BusinessStudio

8

TIBCO ActiveMatrix Policy Director --- 1.0

296 | Secure Communication Channels

Page 297: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Upgrade, Downgrade, or ChangeConfiguration

Initial ConfigurationChannelKey

Administrator web UI or CLIAdministrator web UI or CLIResource instances(JDBC, JMS, SMTP,

9

LDAP, HTTP) -external servers

Topics

• Trust Stores• Enabling Secure Communication Channels Using Command-Line Scripts• Installing Unlimited Jurisdiction Files

1.0 --- TIBCO ActiveMatrix Policy Director

Secure Communication Channels | 297

Page 298: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Trust StoresA trust store is a keystore that contains trusted certificates. Each time you configure an external serverconnection for SSL, you ceate and configure a trust store for that connection.

You can create a trust store by using certificates imported from trusted servers or by uploading a keystorefile.

Creating a Trust Store KeystoreYou can create a trust store with keytool if you have a trusted public certificate.

Procedure

1. Acquire the public certificate for your server or the root CA certificate authority that signed the certificate.A root CA is an entity like VeriSign that digitally signs your certificate. The certificate will be in a file witha special extension such as .pem extension.

2. Use the JDK keytool utility to create a keystore containing the certificate from step 1.JAVA_HOME\bin\keytool -import -v -trustcacerts -alias MyCert-file server.cer -keystore MyTrustStore.jks -keypass secret -storepass keystorePassword

Record the values of the keytool options because you must supply them when you upload the trust storekeystore into TIBCO Configuration Tool or Administrator.

Configuring a Trust Store

About this taskYou can only configure a trust store containing Microsoft SQL Server certificates by the Upload method.

Procedure

1. Choose the method for configuring the trust store and follow the appropriate procedure.ProcedureMethod

Import 1. Click Configure SSL. The Configure SSL wizard displays certificates imported from thetrusted server.

2. In the Certificates list, check the checkboxes next to the certificates to trust and clickFinish.

3. In the SSL Client Provider area, choose one of the following:– Existing SSL Client Provider - Select an SSL Client Provider resource instance.– New SSL Client Provider

1. In the SSL Client Provider Name field, type a name for the SSL Client Provider.2. In the Keystore Provider as Trust Store field, type the name of a Keystore Provider

resource instance.3. In the Keystore Password field, type the password that protects the keystore.

4. Click Done.

Upload 1. Create a keystore containing the certificates from the trusted server.2. In the SSL Client Provider field, click new. In the Name field, type a name.3. In the Keystore Provider as Trust Store field, click new. In the Name field, type a name.

TIBCO ActiveMatrix Policy Director --- 1.0

298 | Secure Communication Channels

Page 299: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureMethod

4. Click the Browse button, select the keystore you created in 1.a on page 298, and clickOpen.

5. In the Type drop-down list, select JKS.6. In the Password field, type the keystore password.7. Click Save for the Keystore Provider.8. Click Save for the SSL Client Provider.9.

The SSL Client Provider field is configured.2. Click Test Connection to verify that the keystore enables an SSL connection.3. Click Save.

Related TopicsMessaging Bus Reference on page 73Administrator Configuration Reference on page 54JDBC on page 201Keystore Provider on page 229

If you set up your environment for SSL, you have to set up a keystore. As part of the process, youconfigure a keystore provider.

LDAP Authentication on page 232LDAP Connection on page 213SMTP on page 216SSL Client Provider on page 240

1.0 --- TIBCO ActiveMatrix Policy Director

Secure Communication Channels | 299

Page 300: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Enabling Secure Communication Channels Using Command-LineScripts

Before you begin

The script files are located in TIBCO_HOME/administrator/3.2/scripts.

Edit the file TIBCO_HOME/administrator/3.2/scripts/bootstrap-edit-build.properties. Specifyappropriate values for the following properties:• instance.properties.file - the location of the remote_props.properties file.• tibco.config.mgmt.home - the folder containing runtime object configuration, referred to as

CONFIG_HOME.• admin.enterprise.name - the enterprise name.• admin.instance.name - the name of the Administrator server instance.

About this task

Follow these procedures to enable SSL for the listed components.

HTTP Connector

Procedure

1. Edit the data file for the HTTP connector. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-httpconnector-data.xml.a) Update the serverBaseUrl attribute to point to the correct host and port. Make sure the https prefix

is used.b) Uncomment the SSLConfig element.c) Specify valid keystore details.

2. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.3. Run the ant script ant -f bootstrap-edit-build.xml edit-httpconnector .

ResultsYou will see the sequence in which the resources are redeployed. Lastly the SystemNode is restarted.

External Database

Procedure

1. If moving from a different database, use the database specific migration tools to export or import existingdata to the new database.

2. Edit the data file for the application database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-external-database-data.xml.a) Uncomment the SSLConfig element and specify valid keystore details.b) Set the sslJNDIName to the value of the SSLConfig > SSLClientResource > name field.c) Add the attribute sslJNDIName to the element JdbcResourceTemplate which is a child of

AppDatabaseDetails.

3. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.

TIBCO ActiveMatrix Policy Director --- 1.0

300 | Secure Communication Channels

Page 301: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

4. Run ant script with command line ant -f bootstrap-edit-build.xml edit-external-database.

ResultsYou will see the sequence in which the resources are redeployed. Lastly the SystemNode is restarted.

Database Authentication Realm

Procedure

1. If moving from a different database, use the database specific migration tools to export or import existingdata to the new database.

2. Edit the data file for the database realm database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-authrealm-external-database-data.xml.a) Uncomment the SSLConfig element and specify valid keystore details.b) Set the sslJNDIName to the value of the SSLConfig > SSLClientResource -> name field.c) Add the attribute sslJNDIName to the JdbcResourceTemplate element.

3. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.4. Run ant script with command line ant -f bootstrap-edit-build.xml edit-inprocess-database.

ResultsYou will see the sequence in which the resources are redeployed. Lastly the SystemNode is restarted.

LDAP Authentication Realm

Procedure

1. Edit the data file for the database realm database. The file is located atTIBCO_HOME/administrator/3.2/scripts/edit-authrealm-ldap-data.xml.a) Uncomment the SSLConfig element and specify valid keystore values.b) Make sure the LDAP URL has the ldaps:// prefix.

2. From the command-line prompt, navigate to the TIBCO_HOME/administrator/3.2/scripts folder.3. Run ant script with command line ant -f bootstrap-edit-build.xml edit-authrealm-ldap.

You will see the sequence in which the resources are redeployed. Lastly the SystemNode is restarted.

1.0 --- TIBCO ActiveMatrix Policy Director

Secure Communication Channels | 301

Page 302: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Installing Unlimited Jurisdiction Files

About this task

Java vendors ship a default set of policy files that do not permit unlimited strength cryptography. In countriesexempt from these restrictions, an unlimited strength set of these policy files can be downloaded and installed.The default set of policy files typically restricts usage of 192-bit AES, 256-bit AES.

Follow these steps to install the unlimited strength policy files on site of such key lengths:

Procedure

1. Download the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files from theJRE vendor.

2. Back up the files located in TIBCO_HOME/tibcojre/jre_version/lib/security.

3. Extract the files downloaded in step 1 on page 302 to TIBCO_HOME/tibcojre/jre_version/lib/security.

4. Restart the node and the TIBCO Host instance.

TIBCO ActiveMatrix Policy Director --- 1.0

302 | Secure Communication Channels

Page 303: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

16Users, Groups, and Permissions

TIBCO SilverTIBCO ActiveMatrix Administrator supports centralized authentication and authorization. A user isa person that has an authentication credential. A group is a collection of users. Authorization (or permission) toaccess and act upon objects can be assigned to both users and groups. Using Administrator, a user with theappropriate permissions can define which users and groups should have access to Administrator features andruntime objects.

Authorization for all runtime objects is provided by the Administrator server. Hence, a server must be runningand connectivity must be available from each node for any kind of management action on the nodes.

Users and groups can be searched for, viewed, and optionally edited. The asterisk wildcard is supported in allsearch areas in Users and Groups. The availability of editing functionality depends on the type of authenticationrealm you have chosen• Database Realm Read-write access provided within Administrator.• LDAP Realm Read-only access provided within Administrator. Edit functionality must go through the tools

provided by your LDAP vendor.

Topics

• Users• Superusers• Groups• Permissions

1.0 --- TIBCO ActiveMatrix Policy Director

Page 304: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Users

A user has the following attributes:• User ID Required. A string identifier that is unique within the realm. I18n characters are allowed.• Password Required. A string containing at least one character.

Creating a User

GUI

Procedure

1. Select Governance > Users & Groups and click the Users tab.2.

Click .A user dialog appears on the right.

3. Type the user ID and password in the respective fields.4. Click Save.

The dialog disappears. The user is added to the list in the Users tab and is selected.

CLI

Procedure

1. In the data file specify a user definition in full format.<User xsi:type="amxdata:User" username="linda" password="123" />

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to User.<AMXAdminTask action="add" objectSelector="User[@username='linda']" />

3. Invoke the command-line interface on the build file.

Changing a User Password

Procedure

1. In the header of TIBCO SilverTIBCO ActiveMatrix Administrator, click the username (Profile) link.2. In the Current Password field, type your current password.3. In the New and Confirm Password fields, type the new password.4. Click Save.

Resetting a User Password

Before you begin

This task can only be performed by superusers and users that have been granted the enterprise permissionReset Password.

TIBCO ActiveMatrix Policy Director --- 1.0

304 | Users, Groups, and Permissions

Page 305: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Procedure

1. Select Governance > Users and Groups .2. In the Users table, click a user.3. In the right pane, click Reset Password.4. In the New and Confirm Password fields, type the new password.5. Click Save.

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 305

Page 306: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Superusers

A superuser has implicit Owner permission for all objects. Superusers have no security restrictions. They areallowed to do anything in the system. Superusers can manage objects that have no owners. For example:• An owner of an object is on vacation, leaves the company, or is otherwise unreachable.• An owner of an object removes himself from the Owner permissions and saves the object. From then on,

the object has no explicit owner.• A group had been granted Owner permission for an object. The group initially had two users. Over a

period of time, the two users left the company, and each one got removed from that group. The object'spermissions were unchanged during this time, but effectively it has no owner.

All superusers are users in the Administrator authentication realm. For example, for the LDAP realm, theusers must be present in the LDAP server. If a superuser is deleted from the LDAP server, the user losessuperuser privilege only in the next login session. A current login session still treats the user as a superuser.

Because of the potential for a rogue superuser to vandalize the system, you should exercise caution whenassigning the superuser role to a user. For this reason, Administrator does not allow adding groups assuperusers.

Contact TIBCO Support to reset the superuser password.

Assigning Superuser Privileges

GUI

Before you beginThe user must already exist in the authentication realm.

Procedure

1. Select Governance > Users & Groups and click the Users tab.2. Click Superusers.

The Superusers dialog displays.3. Click Add Users.

The Add Superusers dialog displays.4. Click users in the list on the left.

–Click .

– Holding the left mouse button down, drag to the list on the right, and release the button.

The user is added to the list on the right.5. Click Save.

The user is added to the list of superusers.

CLI

Procedure

1. In the data file specify a ListOfSuperUser definition in full format.<ListOfSuperUser xsi:type="amxdata_base:ListOfSuperUser"> <superUser username="linda"/>

TIBCO ActiveMatrix Policy Director --- 1.0

306 | Users, Groups, and Permissions

Page 307: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

<superUser username="tom"/></ListOfSuperUser>

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to ListOfSuperUser.<AMXAdminTaskaction="add"objectSelector="ListOfSuperUser" />

3. Invoke the command-line interface on the build file.

Removing Superuser Privileges

GUI

Before you beginThe user must already exist in the authentication realm.

Procedure

1. Select Governance > Users and Groups .2. Click Superusers.

The Superusers dialog displays.3. Select an user in the list on the left and click .

The user is removed from the list.4. Close the dialog box.

CLI

Procedure

1. In the data file specify a ListOfSuperUser definition in full format.<ListOfSuperUser xsi:type="amxdata_base:ListOfSuperUser"> <superUser username="linda"/></ListOfSuperUser>

2. In the build file set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to ListOfSuperUser.<AMXAdminTaskaction="delete"objectSelector="ListOfSuperUser" />

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 307

Page 308: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Groups

A group is a collection of users. It has the following attributes:• Name Required. A string identifier that is unique among all groups. I18n characters are allowed.• Description Optional. A string that describes the group.• Members A list of users that belong to that group. A user may belong to zero or more groups and a group

may have zero or more members.

Group Hierarchy

Groups can exist within a hierarchy. The existence and nature of a group hierarchy depends on the type ofthe authentication realm. This section describes the group hierarchy available in each type of authenticationrealm.• Database

The Database authentication realm supports a group hierarchy. In the Database realm, groups do nothave a common root element; Administrator allows multiple groups at the root level.

A group can contain zero or more subgroups. A group is either at the root level, or it has one and onlyone parent group. The parent-subgroup relationship always implies membership inclusion from subgroupsto parent groups. For example, if the Company Staff group contains the City Staff group, the members ofthe City Staff group are also members of the Company Staff group.

• LDAP

The LDAP authentication realm supports a group hierarchy as it exists in your LDAP server. A changein the structure in LDAP is reflected in Administrator, but only after a cache-expiry interval.

Adding Users to Groups

GUI

Procedure

Choose one of the following options:ProcedureOption

Users 1. Select Governance > Users & Groups and click the Users tab.2. Click one or more users.3. Click Add Group Membership.4. Click one or more groups.

– Holding the left mouse button down, drag to the list on the right, and releasethe button.

–Click .

5. Click Save.

Groups 1. Select Governance > Users & Groups and click the Groups tab.2. Click a group.3. Click Add Users.

– Holding the left mouse button down, drag to the list on the right, and releasethe button.

TIBCO ActiveMatrix Policy Director --- 1.0

308 | Users, Groups, and Permissions

Page 309: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

ProcedureOption

–Click

4. Click Save.

CLI

Procedure

1. In the data file, specify a Group in base format and User in base format.<Group xsi:type="amxdata_base:Group_base" name="sales"> <User xsi:type="amxdata_base:User_base" username="linda"/> </Group>

2. In the build file, set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Group/User.<AMXAdminTaskaction="add"objectSelector="Group/User"/>

3. Invoke the command-line interface on the build file.

Deleting Users from Groups

GUI

Procedure

ProcedureOption

Users 1. Select Governance > Users & Groups and click the Users tab.2. Click a user.

The groups that the user belongs to are displayed in the Groups table.

3. Select the group from this table and click the .

Groups 1. Select Governance > Users & Groups and click the Groups tab.2. Click a group.

The users that belong to this group are displayed in the User pane.

3. Select the group from this table and click the .

CLI

Procedure

1. In the data file, specify a Group in base format and User in base format.<Group xsi:type="amxdata_base:Group_base" name="sales"> <User xsi:type="amxdata_base:User_base" username="linda"/> </Group>

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 309

Page 310: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

2. In the build file, set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Group/User.<AMXAdminTaskaction="delete"objectSelector="Group/User"/>

3. Invoke the command-line interface on the build file.

Creating a Root Group

GUI

Procedure

1. Select Governance > Users & Groups and click the Groups tab.2. Click New Root Group.

The group dialog displays on the right.3. Type the group name and description in the respective fields.4. Click Save.

The dialog disappears. The group is added to the list in the Groups tab and is selected.

CLI

Procedure

1. In the data file specify a Group definition in full format.<Group xsi:type="amxdata:Group" name="acme"></Group>

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Group.<AMXAdminTaskaction="add"objectSelector="Group"/>

3. Invoke the command-line interface on the build file.

Creating a Subgroup

GUI

Before you begin

A root group must already exist.

Procedure

1. Select Governance > Users & Groups and click the Groups tab.2. Click a root group.3. Click New Subgroup.

The group dialog displays on the right.4. Type the group name and description in the respective fields.5. Click Save.

TIBCO ActiveMatrix Policy Director --- 1.0

310 | Users, Groups, and Permissions

Page 311: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

The dialog disappears. The group is added to the list in the Groups tab as a child of the parent root groupand is selected.

CLI

Procedure

1. In the data file specify a parent group in base format and child group definition in full format.<Group xsi:type="amxdata_base:Group_base" name="acme"> <Group xsi:type="amxdata:Group" name="sales"> </Group>

2. In the build file set the action attribute of the AMXAdminTask element to add and the objectSelectorattribute to Group/Group.<AMXAdminTaskaction="add"objectSelector="Group/Group"/>

3. Invoke the command-line interface on the build file.

Deleting a Group

GUI

Procedure

1. Select Governance > Users & Groups and click the Groups tab.2. Select a group or a subgroup.3. Click Delete.

The selected group is deleted.

CLI

Procedure

1. In the data file specify a Group definition in full format.Group xsi:type="amxdata_base:Group_base" name="acme"> <Group xsi:type="amxdata:Group" name="sales"> </Group>

2. In the build file set the action attribute of the AMXAdminTask element to delete and the objectSelectorattribute to Group.<AMXAdminTaskaction="delete"objectSelector="Group/Group"/>

3. Invoke the command-line interface on the build file.

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 311

Page 312: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Permissions

The Administrator object types, environments, hosts, nodes, resource templates, logging appenders, andapplications, have permissions that grant access of a particular type to lists of users and groups. Permissionsconstrain the types of actions that a user can perform on an object. There are also enterprise level permissionsthat control the ability to create top level objects (those not controlled by the permission settings of anotherobject) and manage users.

Permission Types

There are three types of permissions—View, Edit, and Owner—that are generally applicable to any type ofobject. These permissions allow the following actions:• View Browse objects in a list or view details for an object. Excludes the viewing of object permissions.• Edit

– Perform all the actions allowed with View.– Edit the properties of an object.– Add items to a parent object. For example, if a you have Edit permission for an environment, then you

can add a node, application, or any other type of object that belongs to an environment to thatenvironment. When you add an object, its parent’s permissions are copied into that new object.Additionally, you are granted Owner permission for that object.

• Owner

– Perform all the actions allowed with Edit.– View and modify object permissions.– Delete the object.

In addition to the View, Edit, and Owner permission types, there are object-specific permission types andenterprise permission types.

Object-specific permission types grant permissions for actions that apply only to specific types of objects. Forexample, environments have a Create Node permission type. In order to be able to create nodes in anenvironment, a user would require either Edit or Create Node permission for the environment. The abilityto perform runtime actions such as start, stop, install, uninstall, deploy, and undeploy is also controlled byobject-specific permission types. For example, nodes have a Start-Stop permission type.

Enterprise permission types grant permissions for actions that apply to objects whose parent is the enterpriseobject. Many Administrator objects such as nodes and resource instances are created under a parent objectthat can be created by a user. For example, an environment is the parent of a node. Permissions on user-createdparent objects control who can create new child objects. For example, if you have Edit permission for anenvironment, you can create a node in that environment. The parent of other objects, such as environments,resource templates, and hosts is the enterprise object. The permissions of such objects are managed in theEnterprise Permissions screen. For example, the permission type to create an environment in the EnterprisePermissions screen is Create Environment. Enterprise permission types can be granted by superusers.

Permission States

If you select multiple objects of the same type and open the Permissions screen, the checkbox can take thefollowing values:• - the selected objects do not grant that permission type to the user or group.• - the selected objects grant that particular type of permission to the user or group.

TIBCO ActiveMatrix Policy Director --- 1.0

312 | Users, Groups, and Permissions

Page 313: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• - at least one of the selected objects grants the permission type to the user or group. For example, if youselect nodes Node1, Node2, and Node3, and appears next to a user in the Edit column, the user mighthave been granted Edit permission for Node1 and Node2, but not to Node3.

To change the permission state:• - The first click toggles to . Converting into grants the user or group the chosen permission type

for all selected objects for which the user or group does not have the permission type. If a selected objectalready has the permission type, the value doesn't change.

• or - Click toggles between the on and off states.

Default Permissions and Permission Propagation

• The default permission for any object is no permission.• When you create an object, you are granted Owner permission for the object.• When a child object is created, the View permissions from the parent object are propagated to the child

object. For example, a user that had View permission for an environment will have View permission fora newly created node in that environment. However, if you change the View permission on the parentenvironment at a later time, the change is not propagated to the nodes.

• When a group is granted a permission, all the group members, including the members of any child groupsof a parent group, are granted the permission.

• When a user is in multiple groups where the groups have varying permissions, the user is granted theunion of all permissions.

Setting Object-Specific Permissions

Procedure

1. Display a list of objects.2. Click one or more objects in the list.3. Click in the list toolbar.

The Permissions dialog displays.4. Optionally click Add User or Add Group to add a user or group.

A user or group row is added to the table with all checkboxes set to .5. For a given user or group, check the checkboxes in a permission type column.6. Click Save.

The selected users and groups are granted the selected permission types for the selected objects and haveunchecked permissions revoked.

Setting Enterprise Permissions

Procedure

1. Select Governance > Enterprise Permissions.The Permissions screen displays.

2. Click a tab to configure a permission type.

– Create environment, resource template, logging appender, substitution variables. Additional permissionscan configured to access the Force Delete option and the Log Viewer.

The Force Delete option is available when deleting applications, nodes, and resource instances. Bydefault no user, including root, has permission to access the Force Delete option. You have to explicitlyconfigure this permission in order to make this menu option visible.

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 313

Page 314: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

– Server register host, upload DAA, upload plug-in, transport configuration, SVN configuration, softwarerepository configuration.

– User/Group create or delete user, reset password, create group, superuser.

3. Optionally click Add User or Add Group to add a user or group.A user or group row is added to the table with all checkboxes set to .

4. For a given user or group, check the checkboxes in a permission type column.5. Click Save.

The selected users and groups are granted the selected permission types for the selected objects.

If you have modified the permissions for the Force Delete option, log out of the Administrator web interfaceand log in for the configuration changes to take effect.

Permission Reference

To perform an action on an object, you must have been granted at least one of the permissions marked witha in the action row.

Table 27: Environments

CreateEnvironment

Create NodePromote or DemoteService or Reference

OwnerEditViewRequiredPermission

Action

Create

Delete

Create node

View details

Edit details

Promote ordemote a serviceor reference

Edit MessagingBus

Add, edit, deleteSVar

(Permission must begranted for bothenvironments.)

Create wire

Createapplication

TIBCO ActiveMatrix Policy Director --- 1.0

314 | Users, Groups, and Permissions

Page 315: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Table 28: Hosts

RegisterHost

EditLoggingConfiguration

EditSoftware

CreateNode

OwnerEditViewRequiredPermission

Action

Register

Unregister

Discover

View details

Edit details

Add, edit,delete SVar

Add, edit,deleteloggingconfiguration

Editsoftware

Create node

Table 29: Resource Templates

Create ResourceTemplate

OwnerEditViewRequiredPermission

Action

Create

View details

Edit details or createa resource instanceusing this template

Delete

Table 30: Nodes

RequiredPermission forRelated Objects

EditSoftware

CreateResourceInstance

EditLoggingConfiguration

DeployTo

Start-StopOwnerEditViewRequiredPermission

Action

Create Node forparent

Create

environment andtarget host.

Delete

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 315

Page 316: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

RequiredPermission forRelated Objects

EditSoftware

CreateResourceInstance

EditLoggingConfiguration

DeployTo

Start-StopOwnerEditViewRequiredPermission

Action

View details

Edit details

Add, edit,delete SVar

Edit JVMarguments

Install oruninstall

Start or stop

Edit for applicationDistributeapplications

Edit loggingconfigurationand apply

Editfeatures andapply

Add andinstallresourceinstance

Table 31: Resource Instances

Required PermissionsRequiredPermission

Action

Create Resource Instance permission for the node and view permission to the ResourceTemplate.

Create

Create Resource Instance permission for the node.Delete

View permission for the node.View details

Create Resource Instance permission for the node.Install anduninstall

TIBCO ActiveMatrix Policy Director --- 1.0

316 | Users, Groups, and Permissions

Page 317: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Table 32: Applications

Required Permissionfor Related Objects

Deploy-UndeployEditLoggingConfiguration

Start-StopOwnerEditViewRequiredPermission

Action

Edit for environmentCreate

Delete

Viewdetails

Editdetails,Svars,properties

Editloggingconfigurationand apply

Start orstop,applicationorapplicationfragment

Deploy To for node.Distributeapplicationfragments

Upgrade

Deploy orundeploy

Table 33: Substitution Variables

Create SVarOwnerEditViewRequiredPermission

Action on OwningObject

Create

Delete

View details

Edit details

1.0 --- TIBCO ActiveMatrix Policy Director

Users, Groups, and Permissions | 317

Page 318: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Table 34: Logging Appenders

Create LoggingAppender

OwnerEditViewRequiredPermission

Action

Create

Delete

View details

Edit details

Table 35: Users

Reset PasswordDelete UserCreate UserSuperuserRequiredPermission

Action

Create

Delete

Assign to groups

Reset password

View

Table 36: Groups

Create GroupSuperuserRequired Permission

Action

Create

Delete

View

Add and remove users

Table 37: DAAs, Features, and Application Templates

Create DAARequired Permission

Action

Upload DAA

Clean up feature

Clean up application template

TIBCO ActiveMatrix Policy Director --- 1.0

318 | Users, Groups, and Permissions

Page 319: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

17Monitoring

Monitoring is a facet of operational governance. Monitoring is supported by a monitoring service, which aggregatesperformance data emitted by governed objects and dashboards, which display the data and provide mechanismsfor drilling into the objects. The TIBCO SilverTIBCO ActiveMatrix monitoring architecture is depicted in Figure12: Monitoring Architecture on page 319.

Figure 12: Monitoring Architecture

For information on monitoring and managing your hosts and nodes, refer toTIBCO_HOME/amx/3.2/samples/hawk/readme.txt.

Topics

• Monitoring Service• Dashboards

1.0 --- TIBCO ActiveMatrix Policy Director

Page 320: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Monitoring Service

The monitoring service is a TIBCO SilverTIBCO ActiveMatrix application that aggregates performance datafrom runtime objects. The monitoring service application is deployed on SystemNode, the node that runsthe Administrator server.

The monitoring service is created when you create an Administrator server. For details, see the installationmanual for your product. The monitoring service is configured with a database for storing performance dataand the notification server that conveys the performance data from runtime objects to the monitoring service.You also configure whether to enable basic or extended monitoring.

Basic monitoring provides one hour and since started time periods and a select number of metrics such asruntime state, requests, faults, response time. Extended monitoring provides additional time periods (24 hourand 7 day) and metrics. These features support advanced performance troubleshooting, but impose anadditional load on the machine on which Administrator runs.

• The Administrator UI does not differentiate between basic and extended metrics and when extendedmonitoring is not enabled, the metrics provided by extended monitoring will be blank.

• When extended monitoring is enabled, metrics collected by the basic monitoring service will bereset. However, when extended monitoring is disabled you can continue to access the metricscollected by the basic monitoring service.

Disabling the Monitoring Service

About this task

To disable a deployed monitoring service:

Procedure

1. Select Applications.2. Select SystemEnvironment from the Environment drop-down list.3. Expand the System folder.4. Select com.tibco.amx.mcr.aggregator from the Applications list and click Stop.

This stops the processing of messages by the monitoring service.5. To stop nodes from sending messages to the queue, add the following property to the .tra file for the node:

java.property.com.tibco.serviceprobe.monitoring.enabled=false. The .tra file for the node islocated in the folder CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/nodes/nodeName/bin.

6. Restart the node.

What to do next

To ensure that the monitoring service is never deployed, you can disable monitoring when you create theAdministrator server using the TIBCO Configuration Tool. For details, see the installation manual for yourproduct.

TIBCO ActiveMatrix Policy Director --- 1.0

320 | Monitoring

Page 321: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Enabling and Disabling Extended Monitoring

About this task

If you have upgraded from a version of the product where extended monitoring was not enabled when theAdministrator server was created using the TIBCO Configuration Tool, run the following commands toenable or disable monitoring:

• Enable

Run ant -f CONFIG_HOME/tct/admin/timestamp/scripts/build.xml enable.extended.monitoring.

• Disable

Run ant -f CONFIG_HOME/tct/admin/timestamp/scripts/build.xml disable.extended.monitoring.

Configuring a Fault Tolerant Monitoring Service

Procedure

1. Select Infrastructure > Nodes .2. In the Environment drop-down list, select SystemEnvironment.3. Create, install, and start a node, say AggregatorNode, on which to replicate the monitoring service.4. Add and install instances of the following resource templates on the AggregatorNode you created in the

previous step.• TIBCO ActiveMatrix Governance JDBC Resource• TIBCO ActiveMatrix Governance Hibernate Resource• TIBCO ActiveMatrix Governance Teneo Resource• TIBCO ActiveMatrix Governance JNDI Connection Resource• TIBCO ActiveMatrix Governance JMS ConnectionFactory Resource• TIBCO ActiveMatrix Governance JMS Destination Resource• TIBCO ActiveMatrix Governance statistics internal JMS Destination Resource• TIBCO ActiveMatrix Governance statistics JMS Destination Resource• If the notification server is enabled for SSL:

– TIBCO ActiveMatrix Governance CSP Keystore for EMS Resource– TIBCO ActiveMatrix Governance SSL Client for EMS Resource

• If the database is enabled for SSL:– TIBCO ActiveMatrix Governance CSP Keystore for DB Resource– TIBCO ActiveMatrix Governance SSL Client for DB Resource

5. Make sure the JDBC driver feature is provisioned on the AggregatorNode.6. Click Applications.7. In the Environment drop-down list, select SystemEnvironment.8. Expand the System folder.9. Click com.tibco.amx.mcr.aggregator .10. Click the Distribution tab.11. Distribute the following components to the AggregatorNode.

• Aggregator• CLEventParserExtension• StandardPeriodicWindowExtension

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 321

Page 322: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• StandardAggregateFunctionsExtension

12. Click the Properties tab.13. Set the allInstancesActive property to true.14. Click Save.

15. Click Deploy.The components are deployed to the selected node. The Runtime State changes to Starting and thenRunning.

16. Verify that the replicated monitoring service works:a) Select Infrastructure > Nodes .b) In the Environment drop-down list, select SystemEnvironment.c) Click SystemNode and click Stop.d) Check the Enterprise Message Service server queue amx.governance.stats for pending messages. For

information on how to check Enterprise Message Service server queues, see TIBCO Enterprise MessageService User's Guide. If the monitoring service running on the replica node is processing messages, thepending messages should be should be zero.

Updating the Messaging Configuration

Procedure

1. Select Shared Objects > Resource Templates.2. Edit the resource template Governance JNDI Connection Resource.3. Apply the change to all nodes by running: ant -f

CONFIG_HOME/tct/admin/timestamp/scripts/build.xml -Denv.name=environmentNameupdate.monitoring.log.config, where environmentName is the name of each of your environments.

4. Apply the change to the monitoring service Administrator plug-in by running: ant -fCONFIG_HOME/tct/admin/timestamp/scripts/build.xml update.mcr.plat.service.log.config .

5. Select Infrastructure > Hosts.6. Click SystemHost and click the Resource Instances tab.7. Install the updated resource instance.8. Select Shared Objects > Resource Templates.9. Edit the following resource templates to modify their descriptions:

– Governance JMS ConnectionFactory Resource– Governance JMS Destination Resource

The status of the resources instances changes to Out of Sync.10. Select Infrastructure > Hosts.11. Click SystemHost and click the Resource Instances tab.12. Install the updated resource instances listed in step 9 on page 322.13. Click Applications.14. In the Environment drop-down list, select SystemEnvironment.15. Expand the System folder.16. Restart the com.tibco.amx.mcr.aggregator application.

TIBCO ActiveMatrix Policy Director --- 1.0

322 | Monitoring

Page 323: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Metrics Reference

Table 38: Metrics Definitions and Objects

Basic orExtended

DescriptionObjectMetric

BasicThe state of a runtime object .Host, Node,Component,

Status

ComponentInstance, Binding,Binding Instance,Wire, ReferenceInstance, Reference,Application,Composite, Service,Service Instance,Resource Instance

BasicThe % of the CPU time consumed by an object.Host, Node(managed by a

CPU %

TIBCO Hostinstance only)

BasicThe total CPU time consumed by an object.Host, Node(managed by a

CPU Total (ms)

TIBCO Hostinstance only)

BasicThe (heap) memory consumed by the object.Host, Node(managed by a

Memory Used(bytes)

TIBCO Hostinstance only)

BasicThe available (heap) memory.Host, Node(managed by a

Free Memory(bytes)

TIBCO Hostinstance only)

BasicThe length of time the object has been running.Host, Node,Component,

Uptime (ms)

ComponentInstance, Binding,Binding Instance,Wire, ReferenceInstance, Reference,Service, ServiceInstance, ResourceInstance

BasicThe number of components running.Node, Component,Component

ComponentsRunning

Instance,Application,Composite

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 323

Page 324: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Basic orExtended

DescriptionObjectMetric

BasicThe ratio between the length of time an instanceis running and its lifetime.

ComponentInstance, BindingInstance, ReferenceInstance, Reference

% Uptime

BasicThe number of instances running.Component,Binding, Reference,Service

Instances Avail

BasicThe number of requests arriving at an object.Component,Component

Requests

Instance, Binding,Binding Instance,Application,Composite, Service,Service Instance

ExtendedThe rate of requests incoming to an object.Component,Component

Request Rate

Instance, Binding,Binding Instance,Application,Composite, Service,Service Instance

BasicThe number of successful responses.Binding, BindingInstance,

Success

Application,Composite, Service,Service Instance

BasicThe number of fault responses.Binding, BindingInstance, Reference

Faults

Instance, Reference,Application,Application Folder,Composite, Service,Service Instance

ExtendedThe rate of fault responses.Wire, ReferenceInstance, Reference,

Fault Rate

Application,Application Folder,Composite, Service,Service Instance

BasicThe ratio of successful responses to incomingrequests.

Component,ComponentInstance, Binding,

% Success

Binding Instance,Application,Composite, Service,Service Instance

TIBCO ActiveMatrix Policy Director --- 1.0

324 | Monitoring

Page 325: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Basic orExtended

DescriptionObjectMetric

BasicThe number of responses returned from anobject.

Binding, BindingInstance,Application,

Req Completed

Composite, Service,Service Instance

BasicThe length of time between the arrival of arequest and the generation of the response.

Component,ComponentInstance,

Req Comp Time(ms)

Application,Composite, Service,Service Instance

ExtendedThe number of requests that have passed froma service binding to a componentimplementation.

Binding, BindingInstance,Application,Composite, Service,Service Instance

Req Queued forComp

ExtendedThe number of responses returned from acomponent implementation. The component

Binding, BindingInstance, Reference

Req Comp Finished

has finished its processing and a response (ifInstance, Reference,appropriate) is returned to the caller of theservice.

Service, ServiceInstance

ExtendedThe average length of time between a requestbeing dispatched to a component

Component,Component

Avg Comp ProcTime (ms)

implementation and the response beingreturned from the implementation.

Instance, Binding,Binding Instance,Application,Composite, Service,Service Instance

ExtendedThe rate of responses returned from acomponent implementation.

Binding, BindingInstance, Wire,Reference Instance,

Req Comp FinishRate

Reference, Service,Service Instance

ExtendedThe number of requests active between theendpoint and the component implementation.

Component,ComponentInstance, Binding,

Requests In Queue

Binding Instance,Application,Composite, Service,Service Instance

BasicThe number of requests a component makes toa referenced service.

Component,ComponentInstance, Wire,

Ref Invoc

Reference Instance,Reference,Application,Composite

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 325

Page 326: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Basic orExtended

DescriptionObjectMetric

BasicThe average length of time for a response to bereturned from a referenced service.

Component,ComponentInstance, Wire,

Ref Invoc Time(ms)

Reference Instance,Reference,Application,Composite

ExtendedThe rate of requests a component makes to areferenced service.

Wire, ReferenceInstance, Reference,Application,Composite

Ref Invoc Rate

Integrate with Hawk ActiveMatrix Plug-in to view the CPU and CPU Total metrics on the dashboard.Refer to the Hawk ActiveMatrix Plug-in for more information.

Table 39: Basic and Extended Metrics

Extended MetricsBasic MetricsObject

Node • Status• CPU %• CPU Total• Memory Used• Free Memory• Uptime• Components Running

Host • Status• CPU %• CPU Total• Memory Used• Free Memory• Uptime

ResourceInstance

• Status• Uptime

Application • Fault Rate• Status• •Uptime Req Completed

•• Requests In QueueComponents Running• •Faults Request Rate

•• Req Comp Finish RateSuccess• •% Success Ref Invoc Rate• Requests• Req Completed• Req Comp Time• Ref Invoc• Ref Invoc Time

TIBCO ActiveMatrix Policy Director --- 1.0

326 | Monitoring

Page 327: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Extended MetricsBasic MetricsObject

Component • Fault Rate• Status• •Uptime Req Completed

•• Requests In QueueFaults• •Success Request Rate

•• Req Comp Finish Rate% Success• •Requests Avg Comp Proc Time

•• Ref Invoc RateReq Completed• Req Comp Time• Instances Avail• Ref Invoc Time

ComponentInstance

• Fault Rate• Status• •Uptime Req Completed

•• Requests In QueueFaults• •Success Request Rate

•• Req Comp Finish Rate% Success• •Requests Avg Comp Proc Time

•• Ref Invoc RateReq Completed• Req Comp Time• % Uptime• Ref Invoc• Ref Invoc Time

PromotedService

• Fault Rate• Status• •Uptime Req Completed

•• Requests In QueueFaultsService•• Request RateSuccess

Service Binding •• Req Comp Finish Rate% Success• •Requests Avg Comp Proc Time• Req Completed• Req Comp Time• Instances Avail

Service Endpoint • Fault Rate• Status• •Uptime Req Completed

•• Requests In QueueFaults• •Success Request Rate

•• Req Comp Finish Rate% Success• •Requests Avg Comp Proc Time• Req Completed• Req Comp Time

PromotedReference

• Fault Rate• Status• •Uptime Ref Invoc Rate

Reference • Faults• Success

ReferenceBinding

• % Success• Requests

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 327

Page 328: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Extended MetricsBasic MetricsObject

• Ref Invoc• Ref Invoc Time• Instances Avail

ReferenceEndpoint

• Fault Rate• Status• •Uptime Ref Invoc Rate• Faults• Success• % Success• Requests• Ref Invoc• Ref Invoc Time

ServiceOperation

• Fault Rate• Faults• •Success Req Completed

•• Requests In Queue% SuccessServiceOperationInstance

•• Request RateRequests• •Req Completed Req Comp Finish Rate

•• Avg Comp Proc TimeRef Invoc• Ref Invoc Time

ReferenceOperation

• Fault Rate• Faults• •Success Ref Invoc Rate

ReferenceOperationInstance

• % Success• Ref Invoc• Ref Invoc Time

Service BindingOperation

• Fault Rate• Faults• •Success Req Completed

•• Requests In Queue% SuccessService BindingOperationInstance

•• Request RateUptime• •Requests Req Comp Finish Rate

•• Avg Comp Proc TimeReq CompletedService EndpointOperation • Req Comp Time

Service EndpointOperationInstance

ReferenceBindingOperation

• Fault Rate• Faults• •Success Ref Invoc Rate• % Success

ReferenceBinding

• Uptime• Ref Invoc• Ref Invoc TimeOperation

Instance

TIBCO ActiveMatrix Policy Director --- 1.0

328 | Monitoring

Page 329: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Extended MetricsBasic MetricsObject

ReferenceEndpointOperation

ReferenceEndpointOperationInstance

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 329

Page 330: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Dashboards

Dashboards display runtime object performance statistics. They allow you to monitor the overall health andperformance of infrastructure objects, applications, and resources.

Displaying the Dashboards

Procedure

1. Select Dashboards > Infrastructure.The dashboards display.

2. Click a link at the top to display the performance statistics for a class of runtime object.3. In the Filter Criteria gadget on the right:

– Click the Time Period drop-down list and select a time period. The time period affects averages andcounts, but not metrics with an explicit last value such as Uptime. Basic monitoring provides one hourand since started time periods. Extended monitoring adds 24 hour and 7 day time periods.

– Click next to a category to display the available objects in the category and select one or moreobjects.

The items displayed in the table on the left are filtered by the selected time period and objects.

Filter Criteria Gadget

The Filter Criteria Gadget allows you to specify criteria to filter the statistics that display in the dashboards.

TIBCO ActiveMatrix Policy Director --- 1.0

330 | Monitoring

Page 331: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• You open and close lists by clicking the arrow icons on the right.• You can multi-select the items in a list.• Clicking All at the top of each list clears the selection• You can filter the items in a list by typing a string in the text box at the top of the list. Only items that

match the string display. However, the items selected before the list was filtered remain selected eventhough they are hidden.

• Lists with selections have a bluish background when closed.

Setting Dashboard Preferences

About this task

After upgrading from an earlier 3.1.x version of the product, only those metrics for basic monitoring aredisplayed by default. Set the dashboard preferences to view any additional metrics.

Procedure

1. Click above a dashboard table.The User Preferences dialog displays.

2. In the Refresh Interval field, type the time to wait before the statistics are refreshed.

1.0 --- TIBCO ActiveMatrix Policy Director

Monitoring | 331

Page 332: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

3.In the accumulator list, select one or more statistics on the right and click to add them to the display

and select one more statistics on the left and click to remove them from the display.4. Click OK.

Drilling Down into Objects

Procedure

1. Choose filter criteria.2. Click a tab for a runtime object category.

A table of statistics for the object that satisfy the selected filters displays.3. Double-click a row in the table.

Detailed statistics for the object and the children of the selected object display. For example, if youdouble-click a row in the Applications table, detailed statistics for the application and its components,promoted services and references, and service and reference bindings display.

Dashboard Controls

BehaviorControl

Open the preferences dialog.

Minimize a gadget.

Maximize a gadget.

Refresh statistics.

Switch to enterprise graphical view.

Display a previously viewed dashboard.

TIBCO ActiveMatrix Policy Director --- 1.0

332 | Monitoring

Page 333: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Chapter

18UDDI Servers

UDDI is an standard that enables organizations to publish and discover services. You can configure a UDDI serverin Administrator so that whenWhen you deploy an application in Administrator, the service is automaticallyregistered in the UDDI server.

Topics

• Registering a UDDI Server• Setting the Default UDDI Server• Configuring SSL Communication• UDDI Server Reference

1.0 --- TIBCO ActiveMatrix Policy Director

Page 334: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Registering a UDDI Server

Before you begin

If you plan to enable secure communication between the Administrator server and the UDDI server, youmust first configure SSL communication between the two servers.

Related TopicsUDDI Server Reference on page 338

GUI

Procedure

1. Select Infrastructure > Servers.2.

Click .The New Server dialog displays.

3. In the Name field, type a name for the server.4. Select a server type from the UDDI Server Type drop-down list.

If you select TIBCO, the UDDI URLs will be set to those for TIBCO SilverTIBCO ActiveMatrixRegistryRuntime UDDI Server. If you pick Other, you can edit the UDDI URLs. You cannot change theUDDI server type after you create it.

5. Complete the server configuration fields. The username and hostname cannot be modified after creation.6. If the Administrator and the UDDI server are not on the same machine, and you want to enable secure

communication between the servers, check the Secure Communication checkbox to enable SSL connections.7. Click Test Connection to verify the connection to the server.8. Click Set as Default UDDI Server to use the server as the default UDDI server.9. Click Save.

CLI

Procedure

1. In the data file, specify an xxx element in xxx format.

2. In the build file, set the action attribute of the AMXAdminTask element to xxx and the objectSelectorattribute to yyy.<target name="AddUDDIServer"><add serverName="SOAUDDI" businessName="BusinessTest" uddiUsername="admin" uddiPassword="admin" default="true" autoPublish="false" inquiryUrl="http://hostname:port/uddi/services/inquiry" publicationUrl="http://hostname:port/uddi/services/publication" securityUrl="http://hostname:port/uddi/services/security"/></target>

<target name="UpdateUDDIServer"><update serverName="SOAUDDI" businessName="BusinessTest" default="true" autoPublish="true" inquiryUrl="http://hostname:port/uddi/services/inquiry" publicationUrl="http://hostname:port/uddi/services/publication"

TIBCO ActiveMatrix Policy Director --- 1.0

334 | UDDI Servers

Page 335: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

securityUrl="http://hostname:port/uddi/services/security"/></target>

1.0 --- TIBCO ActiveMatrix Policy Director

UDDI Servers | 335

Page 336: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Setting the Default UDDI Server

Procedure

1. Select Infrastructure > Servers.2. In the View drop-down list, select UDDI.3. In the Servers list, click a UDDI server.4. Click Set as Default UDDI Server.5. Click Save.

TIBCO ActiveMatrix Policy Director --- 1.0

336 | UDDI Servers

Page 337: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Configuring SSL Communication

About this task

For further information on configuring SSL in ActiveMatrix RegistryRuntime UDDI Server, seehttp://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html#SSL_and_Tomcat

Procedure

1. Open a command window in TIBCO_HOME/RuntimeUDDIServer/3.2/server.2. Generate a keystore with alias TAMRUS:keytool -genkeypair -alias TAMRUS -keyalg RSA -keystore

.keystore -storepass password -dname "CN=YourName, OU=YourName, O=Engineering, L=YourCity,ST=YourState, C=YourCountryCode"

3. In TIBCO_HOME/RuntimeUDDIServer/3.2/server/conf/server.xml, replace:<Connector port="58080" protocol="HTTP/1.1" connectionTimeout="20000" />

withConnector port="8443" protocol="HTTP/1.1" SSLEnabled="true"maxThreads="150" scheme="https" secure="true"clientAuth="false" sslProtocol="TLS" keystoreFile="./.keystore" keystorePass="password"/>

4. Export the TAMRUS certificate: keytool -exportcert -alias TAMRUS -keystore .keystore-storepass password -file TAMRUS.cert

5. Import the TAMRUS certificate into the Administrator server trust keystore: keytool -importcert-alias TAMRUS -file TAMRUS.cert -keystore

TIBCO_HOME/tibcohost/1.2/templates/admin.default.ssl.trust.store.ts -storepass secret$ keytool -importcert -alias TAMRUS -file TAMRUS.cert -keystore TIBCO_HOME/tibcohost/1.2/templates/admin.default.ssl.trust.store.ts -storepass secretOwner: CN=YourName, OU=YourName, O=Engineering, L=YourCity, ST=YourState, C=YourCountryCodeIssuer: CN=YourName, OU=YourName, O=Engineering, L=YourCity, ST=YourState, C=YourCountryCodeSerial number: 4ba255a3Valid from: Thu Mar 18 17:32:35 CET 2010 until: Wed Jun 16 18:32:35 CEST 2010Certificate fingerprints:MD5: 4D:B0:EE:FC:A2:72:A0:6E:4C:13:BD:8E:F12:90:06SHA1: B99:5A:6D:15:53:BA:DC:63:AB:70:89:61:2C:C3:DA:1C:FA:EB:E3Signature algorithm name: SHA1withRSAVersion: 3Trust this certificate? [no]: yesCertificate was added to keystore

1.0 --- TIBCO ActiveMatrix Policy Director

UDDI Servers | 337

Page 338: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

UDDI Server Reference

Details

DescriptionAcceptsSVars?

Editable?Required?Property

The name of the UDDI server.NYYName

Description of the UDDI server.NYNDescription

Indicate whether deployed services are automaticallyregistered in the UDDI server. When you set the server as

NYYAutomaticPublication

default UDDI server, you can define if all deployed servicesare automatically publish or not. If you select this option,all services are published by default. If you don't select thisoption, you must manually publish the services.

Indicate whether a UDDI server is the default server towhich services should be published.

NYY

Server Configuration

DescriptionAcceptsSVars?

Editable?Required?Property

The hostname or IP address of the UDDI server. For CLI,hostname or IP and port are deduced from the Inquiry URL.

YNYHostname/IP

The port of the UDDI server.YYYPort

The Administrator username for the UDDI server.YNYUsername

The Administrator password.NYYPassword

The type of the UDDI Server.NNYUDDIServerType

Server URLs

The URL to which to send inquiry requests.NNYInquiryURL

The URL to which to send publish requests.NNYPublishURL

The URL to which to send security requests.NNYSecurityURL

The business to which the services will be published. Youcan type a business or select one from the drop-down list.

NYYPublicationBusiness

If the business name does not exist it is added to the server.Only the businesses that belong to the user will be shown.

Run ant -fCONFIG_HOME/admin/enterpriseName /samples/uddi_amx_servermngt.xmlcommand , wherecommand is:

TIBCO ActiveMatrix Policy Director --- 1.0

338 | UDDI Servers

Page 339: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• GetUDDIServers• AddUDDIServer• RemoveUDDIServer• UpdateUDDIServer

The properties used by the script are defined inCONFIG_HOME/admin/enterpriseName/samples/uddi_amx_servermngt_data.properties.

Related TopicsRegistering a UDDI Server on page 334

1.0 --- TIBCO ActiveMatrix Policy Director

UDDI Servers | 339

Page 340: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software
Page 341: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

Appendix

ATroubleshooting

AdministratorThe Runtime State of applications is Lost Contact or Unknown

If the Runtime State column of applications is Lost Contact or Unknown, the connection to theEnterpriseMessage Service server acting as the notification server and Messaging Bus has been lost.

Action History is stuck at In Progress

An Action History column stuck at In Progress could indicate that:• One or more of the pending tasks in the dialog that displays when you click the Action History link have

failed, most likely due to lost communication with the notification server. The tasks will not be re-queuedeven after the notification server starts up.

• A node involved in that action is unavailable. When the node becomes available, the action will executeand complete.

Failure to reconnect to the notification server

Restart the server if you see the following message after you try to reconnect to the notification server:Refresh Status Cache action failed , caused by:com.tibco.tibems.qin.TibQinRecoveryException: Connection to theserver is failed, caused by: Connection to the server is failed,caused by: Session is closed

Action History shows Paused Offline

This means that actions in Administrator are queued up while runtime objects are offline and executed whenthey comes back online.

Recover from network outages or IP address changes

The IP address of the machine on which the Administrator server is running could change due to DHCPreconfiguration if the machine is connected to a new network after being created. To recover fromcommunication errors that can arise from the change in IP address:1. Stop all nodes managed by the SystemHost TIBCO host instance.2. Stop the SystemHost TIBCO host instance.3. If the machine on which the Administrator server is running also hosts the Enterprise Message Service

server, restart the Enterprise Message Service server.4. Start the SystemHost TIBCO host instance.

Improve the Administrator UI response time

Create an index on the TASK table to increase the Administrator UI response time.

For example, if using the Microsoft SQL server create the index using the statement CREATE INDEX index-name

ON task (objectURI,queueURI).

1.0 --- TIBCO ActiveMatrix Policy Director

Page 342: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

TIBCO Host instancestibcohost.exe doesn't start

• Ensure tibcohost.tra is in the same folder.• Ensure the Java classpath in the tra file is updated for your environment. tibcohost is automatically

configured to use the JRE version that is installed with the product.• Ensure your Java version is at least JRE 1.6.0_14, which is required because of a bug in the Java IO

implementation on Windows.

If you see an exception while starting a TIBCO Host instance that looks like this:C:\amx\tibcohost\1.0\instances\TibcoHostInstance\HPAInstance\bin> tibcohost [TibcoHost - START] [INFO ] com.tibco.amf.hpa.tibcohost.runtime.TibcoHost - No running TibcoHost instance found on localhost. [TibcoHostInstance] [ERROR] com.tibco.amf.hpa.tibcohost.runtime.TibcoHost - TIBCO-AMX-TIBCOHOST-RUNTIME-103: TibcoHost: TIBCO ActiveMatrix host pingz-t400_TibcoHostInstance failed to start. Cause com.tibco.tibems.qin.TibQinException: Connection to the server is failed.

Check your Enterprise Message Service server configuration, especially if you installed Enterprise MessageService on Windows.2009-12-17 15:09:49.954 Storage Location: 'datastore'. 2009-12-17 15:09:49.954 Routing is disabled. 2009-12-17 15:09:49.954 Authorization is disabled. 2009-12-17 15:09:49.972 Accepting connections on tcp://pingz-t400:7222. 2009-12-17 15:09:49.972 Recovering state, please wait. 2009-12-17 15:09:49.975 Server is active. 2009-12-17 15:26:01.026 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.132ba2cc_1259ef65268_-80000a699217]. 2009-12-17 15:26:01.564 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.132ba2cc_1259ef65268_-80000a699217]. 2009-12-17 15:26:16.355 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.7f68b7a6_1259ef68ea8_-80000a699217]. 2009-12-17 15:26:16.905 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.7f68b7a6_1259ef68ea8_-80000a699217]. 2009-12-17 15:26:52.138 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.-5e8ec58d_1259ef71a70_-80000a699217]. 2009-12-17 15:26:52.732 WARNING: [admin@pingz-t400]: create subscriber failed: not allowed to create dynamic topic [EMSGMS.UnboundHost_amxadmin.-5e8ec58d_1259ef71a70_-80000a699217].

In this case you likely have an invalid Enterprise Message Service configuration, which was createdautomatically by the Enterprise Message Service installer on Windows. To fix this, run the installer of EnterpriseMessage Service and replace the installer filled default ProgramData with a valid folder. The installer doesnot create missing folders and therefore Enterprise Message Service does not work properly.

Disable notifications for the host and the nodes.

To disable notifications for the host and the nodes, delete the CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/host/configuration/notification.xml file.

Memory guidelines for the SystemNode for enterprises with a large number of nodes.

The SystemNode is capable of accommodating simultaneous messages from up to 400 nodes hosting userapplications if it is given a heap size of 3G (-Xmx3g).

TIBCO host shows erratic behavior after waking up from hibernation

Sometimes the tibcohost process runs into problems with communicating with its nodes. This happens whenthe machine was hibernated or suspended and woken up afterwards. The management connections do notalways reinitialize properly leaving the connection 'hanging'. Only a restart can solve this issue, but tibcohostmay not be able to properly shut down the node processes.

Another effect is the problem of the connection to the notification server not initializing properly after thewakeup from hibernation. This is especially true when the wakeup is performed in a different environment

TIBCO ActiveMatrix Policy Director --- 1.0

342 | Troubleshooting

Page 343: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

from the hibernation. For example, hibernate in the office, wakeup at home. In this case, the IP address changesupon wakeup, which causes communication problems with connections relying on the TCP/IP stack in Java.Avoid wakeup in a different environment or restart with the new IP address.

Is TIBCO Host instance connected to the right node process?

With the problem described in the preceding section, it can happen that a node process sticks around longafter control is returned to the TIBCO Host instance. If the instance is either restarted or it is told to start thenode again, it may immediately connect to the older node process that is in the process of shutting down.

To verify that the TIBCO Host instance is connected to the correct node process, it prints out the node processunique identifier when it successfully connected. This UUID can be compared to the UUID printed in thenode process log file upon startup. Since the UUID is unique for every run, it becomes easy to verify thecorrectness of the connection.

Node process log:[DEBUG] control.internal.FrameworkImpl - framework is starting with UUID 116295c6-adea-472d-9655-1d6e305a1959

TIBCO Host instance log:[DEBUG] ProxyImpl.AMXAdministratorNode - reached node AMXAdministratorNode_116295c6-adea-472d-9655-1d6e305a1959

When installing a TIBCO Host instance and some nodes on remote systems you have to make sure that theyare properly connected via the network. The instance and the node will try to reach the Enterprise MessageService server on the configured port (7222 per default) and for this it is necessary that the port is enabled onthe firewall. Especially on Windows systems this port may be blocked by default.

The same problem will occur when the node is trying to reach Administrator. Make sure that the connectoris configured on an interface that is reachable over the network and the port is unblocked on the firewall.

TIBCO Host instance or node does not come up on remote systems

When installing a TIBCO Host instance and some nodes on remote systems you have to make sure that theyare properly connected via the network. The instance and the node will try to reach the Enterprise MessageService server on the configured port (7222 per default) and for this it is necessary that the port is enabled onthe firewall. Especially on Windows systems this port may be blocked by default.

The same problem will occur when the node is trying to reach Administrator. Make sure that the connectoris configured on an interface that is reachable over the network and the port is unblocked on the firewall.

NodesNode runs out of memory (Java heap space)

When this occurs, configure the node JVM to dump a snapshot of the heap by editing the .tra file of the nodeand adding the following argument to java.extended.properties:-XX:HeapDumpPath=file

where file is the name of the file in which the binary heap dump will be written. The dump file can then beanalyzed offline by profiling tools such as .

The .tra file of the node is located in the folder CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/nodes/nodeName/bin.

Node doesn't start

Look at the following places to analyze the problem:

• Check the log file of the node for exceptions

1.0 --- TIBCO ActiveMatrix Policy Director

Troubleshooting | 343

Page 344: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Check the node-stdout.log file of the instance for exceptions and unusual error messages, which mayindicate a problem

• Check the Equinox log file, which is always written to <nodename>/configuration/123....log. Every startof the node process produces a new version of the file. Check for exceptions.

Bundles cannot be started. The likely causes are a Java.lang.ClassNotFoundException in the Equinox log fileindicates a fatal condition in the node, which prevents it from starting up. For example:!ENTRY com.tibco.trintiy.server.credentialserver.common 4 0 2009-05-21 11:06:05.186 !MESSAGE !STACK 0 org.osgi.framework.BundleException: The activator com.tibco.trintiy.server.credentialserver.jmx.Activator for bundle com.tibco.trintiy.server.credentialserver.common is invalid at

org.eclipse.osgi.framework.internal.core.AbstractBundle.loadBundleActivator(AbstractBundle.Java:146)

at

org.eclipse.osgi.framework.internal.core.BundleContextImpl.start(BundleContextImpl.Java:980)

at org.eclipse.osgi.framework.internal.core.BundleHost.startWorker(BundleHost.Java:346) at org.eclipse.osgi.framework.internal.core.AbstractBundle.resume(AbstractBundle.Java:355)

at org.eclipse.osgi.framework.internal.core.Framework.resumeBundle(Framework.Java:1074) at

org.eclipse.osgi.framework.internal.core.StartLevelManager.resumeBundles(StartLevelManager.Java:616)

at

org.eclipse.osgi.framework.internal.core.StartLevelManager.incFWSL(StartLevelManager.Java:508)

at

org.eclipse.osgi.framework.internal.core.StartLevelManager.doSetStartLevel(StartLevelManager.Java:299)

at

org.eclipse.osgi.framework.internal.core.StartLevelManager.dispatchEvent(StartLevelManager.Java:489)

at org.eclipse.osgi.framework.eventmgr.EventManager.dispatchEvent(EventManager.Java:211) at org.eclipse.osgi.framework.eventmgr.EventManager$EventThread.run(EventManager.Java:321)

Caused by: Java.lang.ClassNotFoundException: com.tibco.trintiy.server.credentialserver.jmx.Activator at

org.eclipse.osgi.framework.internal.core.BundleLoader.findClassInternal(BundleLoader.Java:483)

at org.eclipse.osgi.framework.internal.core.BundleLoader.findClass(BundleLoader.Java:399) at org.eclipse.osgi.framework.internal.core.BundleLoader.findClass(BundleLoader.Java:387) at

org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass(DefaultClassLoader.Java:87)

at Java.lang.ClassLoader.loadClass(ClassLoader.Java:251) at org.eclipse.osgi.framework.internal.core.BundleLoader.loadClass(BundleLoader.Java:315) at org.eclipse.osgi.framework.internal.core.BundleHost.loadClass(BundleHost.Java:227) at

org.eclipse.osgi.framework.internal.core.AbstractBundle.loadBundleActivator(AbstractBundle.Java:139)

Node doesn't stop after the TIBCO Host instance stop -wait true has completed

Occasionally, you will find that it takes several minutes for the node processes to finally disappear.Unfortunately, this may or may not be a problem and requires a closer look almost every time. In most cases,it is a normal behavior and can be explained like this:

• The node process runs an OSGi framework. There are many concurrent activities in separate threads thatinteract during the shutdown sequence. These include Springframework Timers, Framework EventDispatcher, Startlevel Thread, custom extenders from TIBCO and from customers.

TIBCO ActiveMatrix Policy Director --- 1.0

344 | Troubleshooting

Page 345: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Each thread is competing for the same shared resources (CPU, IO). Depending on the overall load of thesystem (operating system), it may take some time for threads to be scheduled and proceed. Because ofinterdependencies, this may cause a delay of the overall shutdown sequence

• During shutdown, the Activator.stop() method is called for every bundle if present. Any long running orCPU/IO intensive operation performed in that implementation stalls the overall shutdown procedure.Therefore, it is essential to keep this implementation short and quick.

• As a last item of work before ending the process, the OSGi framework (Equinox in our case) persists thecurrent state of the runtime to the disk. This includes bundles and wiring information. Depending on thenumber of bundles in the runtime and the availability of IO cycles, this operation may take a long time(i.e. > 1min) to complete. It is essential not to disrupt this procedure or else the runtime state may getcorrupted and the node may not come up and function as expected.

With all or most of the possible reasons for the delays listed above, there is still the possibility of a problemwith the node itself. Any process that hangs around for an excessively long time, that is, > 5min should beexamined carefully. To diagnose the issue you can open the node log files and look at the end for where thenode may have gotten stuck. A typical run ends with statements similar to this:11 Feb 2010 18:07:08,412 [Event Dispatcher] [DEBUG] control.internal.FrameworkImpl - com.tibco.commonlogging.cbe.model stopped 11 Feb 2010 18:07:08,412 [Framework - sync] [INFO ] control.internal.FrameworkImpl - Sync thread ends. 11 Feb 2010 18:07:08,413 [Bundle Shutdown] [DEBUG] control.internal.FrameworkImpl - removing node.lck 11 Feb 2010 18:07:08,482 [Bundle Shutdown] [INFO ] stdout - Restoring STDOUT 11 Feb 2010 18:07:08,482 [Bundle Shutdown] [INFO ] stdout - Restoring STDERR 11 Feb 2010 18:07:10,968 [shutdown thread] [INFO ] control.internal.FrameworkImpl - exiting process! 11 Feb 2010 18:07:10,971 [Shutdown] [INFO ] org.mortbay.log - Shutdown hook executing 11 Feb 2010 18:07:10,971 [ Shutdown] [INFO ] org.mortbay.log - Shutdown hook complete

Node can't be removed

This problem only exists on Windows systems and has to do with file locking. If you see a message like thisin the tibcohost.log file:AMXAdminHost 26 Feb 2010 14:35:22,458 [Job_Executor10] [ERROR] com.tibco.amf.hpa.tibcohost.runtime.TibcoHostInstance - error removing node "node2": error preparing for delete by renaming C:\MatrixDevInstall\tibcohost\1.0\instances\TibcoHostInstance\Nodes\node2 to C:\MatrixDevInstall\tibcohost\1.0\instances\TibcoHostInstance\Nodes\node2.tmp0

then Java code tries to delete a folder for which another process: Windows Explorer, a text editor open witha log file, or even the node process has a lock. On Windows systems, those locks have to be removed beforethe node folder can be deleted.

The tool is very helpful in finding the processes that keep holding the lock.

The entire directory tree of the node folder must be unlocked.

TIBCO host takes a long time to start up on Linux platforms.

This may happen intermittently and is not always reproducible. The pseudo-random number generator needsto be seeded with truly random bits. Reads from /dev/random device will wait until there's data to returnand in case of insufficient entropy the wait can last for a long time (many minutes). To confirm that the problemis due to seeding of pseudo-random number generator, run kill -QUIT pid or kill -3 pid. The stacktraceshould include com.sun.SeedGenerator. For truly random seed bits, run the daemon rngd which reads froma hardware device and inserts verified random entropy bits to /dev/random. If fast start is more important,switch to /dev/urandom which does not wait for random bits but reuses already returned bits. Alternativesinclude:• Add the line {{java.properties.java.security.egd=file:/dev/./urandom}} to tibcohost.tra.

The .tra file of the host is located in the folder CONFIG_HOME/tibcohost/Admin-enterpriseName-adminServerName/host/bin.

1.0 --- TIBCO ActiveMatrix Policy Director

Troubleshooting | 345

Page 346: TIBCO ActiveMatrix® Policy Director · 2012. 8. 29. · important information some tibco software embeds or bundles other tibco software. use of such embedded or bundled tibco software

• Edit $JAVA_HOME/jre/lib/security/java.security and replace securerandom.source withsecurerandom.source=file:/dev/./urandom.

Errors when starting a node in a replicated environment if an external URL used for load balancing.

If an external port is used for load balancing during replication, using the Administrator UI add to theSystemNode and SystemNodeReplica a logging configuration named org.mortbay.log with a loggingappender systemnode_root with the Level set to ERROR.

TIBCO ActiveMatrix Policy Director --- 1.0

346 | Troubleshooting


Recommended