![]() ![]() ![]() ![]() ![]() ![]() ![]() |
The following sections provide an overview of the BEA Tuxedo Domains component:
As a company's business grows, application engineers may need to organize the business information management into distinct applications, each having administrative autonomy, based on functionality, geographical location, or confidentiality. These distinct business applications, known as domains, need to share information. The BEA Tuxedo Domains component provides the infrastructure for interoperability among the domains of a business, thereby extending the BEA Tuxedo client/server model to multiple transaction processing (TP) domains. The following figure shows how the BEA Tuxedo Domains component can tie multiple domains together.
By transparently making services of a remote domain available to users of the local domain, and making services of the local domain available to users of a remote domain, the BEA Tuxedo Domains component breaks down the walls between a company's business applications. In addition, the Domains component enables a company running a BEA Tuxedo application to expand its business by interoperating with applications running on other transaction processing (TP) systems, such as BEA's WebLogic Server, IBM/Transarc's Encina, and IBM's CICS.
Because a company often uses the nature of a business application as part of its name, applications have names like the "accounting" domain or the "order entry" domain. A BEA Tuxedo domain is a single computer or network of computers controlled by a single configuration file known as the UBBCONFIG
file. (The BEA Tuxedo configuration file may have any name as long as the content of the file conforms to the format described on reference page UBBCONFIG(5)
in BEA Tuxedo File Formats, Data Descriptions, MIBs, and System Processes Reference.) A BEA Tuxedo domain is administered as a single unit.
The BEA Tuxedo Domains component offers different types of gateways to be able to communicate with different types of networks and domains. Specifically, the Domains component offers the following domain gateways:
GWTDOMAIN
server process)—provides interoperability between two or more BEA Tuxedo domains through a specially designed TP protocol that flows over network protocol TCP/IP. Working with the WebLogic Tuxedo Connector (WTC) gateway, a BEA WebLogic Server component, the BEA Tuxedo TDomain gateway can also provide interoperability between Tuxedo domains and WebLogic Server applications.GWIDOMAIN
server process) provides interoperability between BEA Tuxedo domains and applications running under IBM OS/390 Customer Information Control System (CICS) and Information Management System (IMS) over network protocol TCP/IP. The gateway supports only non-transactional tasks.GWSNAX
server process)—provides interoperability between BEA Tuxedo domains and applications running on any System Network Architecture (SNA) Advanced Program-to-Program Communications (APPC) or Common Programming Interface for Communications (CPI-C) supported platform, including IBM OS/400, OS/390 CICS and IMS systems and VSE/CICS. The gateway supports communication with multiple SNA networks.GWOSITP
server process)—provides interoperability between BEA Tuxedo domains and other transaction processing applications that use the Open Systems Interconnection (OSI) transaction processing (TP) standard. OSI TP is a protocol for distributed transaction processing defined by the International Standards Organization (ISO). The gateway supports global transactions and various non-transactional tasks.The discussions that follow focus on the BEA TDomain gateway and the communication between BEA Tuxedo domains. For information about the WTC gateway, see:
For information about BEA eLink gateways, see BEA eLink Documentation .
The following figure shows an example Domains configuration involving four domains, three of which are BEA Tuxedo domains.
The BEA Tuxedo credit card authorization center at the bottom of the figure has two gateway groups: a TDomain gateway group named bankgw1
and an OSI TP gateway group named bankgw2
. bankgw1
provides access to two remote BEA Tuxedo domains, Bank ABC and Bank CBA, using network protocol TCP/IP. bankgw2
provides access to one remote domain, Bank XYZ, using network protocol OSI TP.
In this example, Bank ABC generates service requests to the credit card authorization center. These requests are received by a domain gateway server process named GWTDOMAIN
running within group bankgw1
. This gateway issues a service request, on behalf of the remote domain, to the credit card authorization service provided by another locally running server process. This server handles the request and sends the reply to the gateway, and the gateway forwards the reply to Bank ABC.
The credit card authorization center may also issue service requests. For example, the authorization center may send balance inquiries to Bank XYZ via a domain gateway server process named GWOSITP
.
The BEA Tuxedo Domains component makes the interdomain communications possible through domain gateway server processes that advertises remote services—services available in other domains—as if they were local services.
Domain gateways support the following functionality:
Domain gateways provide support for the request/response model of communication defined by the ATMI interface. Except for the following BEA Tuxedo ATMI functions, which are logically limited to use within a single application and are not supported across domains, a BEA Tuxedo application can request remote services exactly as if they were offered locally:
tpinit(3c)
/tpterm(3c)
—BEA Tuxedo applications do not attach to the environment of a remote domain; they use domain gateways to access a remote domain. Therefore, an extra tpinit()
/tpterm()
sequence is not needed for remote applications.tpadvertise(3c)
and tpunadvertise(3c)
—Domains does not support these functions because domain gateways do not support dynamic service advertisements across domains.tpnotify(3c)
and tpbroadcast(3c)
—Domains does not support the unsolicited communication paradigm provided by these functions.tppost(3c)
) and notification of events (tpsubscribe(3c)
)—Domains does not support these functions across domains.
Support for tpforward(3c)
is provided to preserve application portability. Forwarded requests are interpreted by domain gateways as simple service requests. This process is shown in the following figure, which illustrates the simple scenario of a service using tpforward
to send a request to a remote service.
For more information about the BEA Tuxedo request/response model, see Request/Response Communication" in Introducing BEA Tuxedo ATMI.
Domain gateways provide support for the conversational model of communication defined by the ATMI interface. The ATMI is a connection-oriented interface that enables clients to establish and maintain conversations with services programmed in the conversational model.
BEA Tuxedo applications use tpconnect(3c)
to open a conversation with a remote service, tpsend(3c)
and tprecv(3c)
to communicate with this service, and tpdiscon(3c)
to end the conversation. Domain gateways maintain the conversation with the remote service, and support the same semantics for returns (that is, tpreturn
with TPSUCCESS
or TPFAIL
) and disconnects that are defined for BEA Tuxedo conversational services.
Note: | The ATMI connection-oriented functions provide half-duplex conversations; tpforward(3c) is not allowed within a conversational service. |
For more information about the BEA Tuxedo conversational model, see Conversational Communication" in Introducing BEA Tuxedo ATMI.
Domain gateways provide support for the queuing model of communication defined by the ATMI interface. Any client or server can store messages or service requests in a queue in a remote domain. All stored requests are sent through the transaction protocol to ensure safe storage.
The BEA Tuxedo system enables messages to be queued to persistent storage (disk) or to non-persistent storage (memory) for later processing or retrieval. ATMI provides primitives that allow messages to be added (that is, tpenqueue
) or read (that is, tpdequeue
) from queues. Reply messages and error messages can be queued for later return to clients. An administrative command interpreter (that is, qmadmin
) is provided for creating, listing, and modifying queues. Servers are provided to accept requests to enqueue and dequeue messages (that is, TMQUEUE
server), to forward messages from the queue for processing (that is, TMQFORWARD
server), and to manage the transactions that involve queues (that is, TMS_QM
server).
For more information about the BEA Tuxedo queueing model, see Message Queuing Communication" in Introducing BEA Tuxedo ATMI.
Domain gateways support all predefined types of typed buffers supported by the release of BEA Tuxedo system software in which the domain gateway server processes are running. BEA Tuxedo supports 11 predefined buffer types.
Each buffer type supported by a BEA Tuxedo release has its own set of routines that can be called automatically to initialize, send and receive messages, and encode and decode data without programmer intervention. The set of routines is called a typed buffer switch.
In BEA Tuxedo ATMI applications, typed buffers are used to send data—service requests and replies—between clients and servers. Typed buffers, which by definition contain information about themselves (metadata), allow application programmers to transfer data without needing to know which data representation scheme is used by the machines on which the application's clients and servers are running.
A domain gateway can receive and process service requests sent from workstations, from local BEA Tuxedo machines, and from remote domains. Using the appropriate typed buffer switch, a domain gateway will decode any service request that it receives encoded for the following reasons:
OSI terminology provides a useful distinction between abstract syntax (that is, the structure of the data) and transfer syntax (that is, the particular encoding used to transfer the data). Each typed buffer implicitly defines a particular data structure (that is, its abstract syntax) and the encoding rules (or typed buffer operations) required to map the data structure to a particular transfer syntax (for example, XDR
). For the predefined buffer types that support encoding/decoding, the BEA Tuxedo system provides the encoding rules required to map these types to the XDR
transfer syntax.
For more information about typed buffers and encoding and decoding operations, see What Are Typed Buffers?" in Introducing BEA Tuxedo ATMI.
The BEA Tuxedo Domains architecture consists of four major parts:
A Domains configuration is a set of two or more domains (applications) that can communicate and share services via the BEA Tuxedo Domains component. How multiple domains are connected and which services they make accessible to one another are defined in Domains configuration files. Each BEA Tuxedo domain involved in a Domains configuration requires its own Domains configuration file.
The text version of the Domains configuration file is known as the DMCONFIG
file, although it may have any name as long as the content of the file conforms to the format described on reference page DMCONFIG(5)
in BEA Tuxedo File Formats, Data Descriptions, MIBs, and System Processes Reference. The binary version of the Domains configuration file is known as BDMCONFIG
. For a detailed description of the DMCONFIG
file, see
Understanding the Domains Configuration File.
The BEA Tuxedo Domains component achieves multiple-domain interoperability through a highly asynchronous, multitasking, multithreaded domain gateway process, which is a BEA Tuxedo supplied server that makes access to services across domains transparent to both the application programmer and the application user.
The following figure illustrates how one BEA Tuxedo domain communicates with another domain via a domain gateway.
In the figure, the domain gateway handles outgoing credit card authorization requests to another domain. It also handles incoming authorization responses.
The following figure shows the BEA Tuxedo Domains administrative servers used to administer a Domains configuration.
A domain gateway group, as shown in the previous figure, consists of a gateway administrative server (GWADM
), a domain gateway server (for example, GWTDOMAIN
), and (optional) a Domains transaction log (TLOG
). The GWADM
server enables run-time administration of the domain gateway. A BEA Tuxedo domain can communicate with one or more remote domains through a domain gateway group.
Associated with all domain gateway groups running in a BEA Tuxedo domain is a Domains administrative server (DMADM
), which enables run-time administration of the BEA Tuxedo Domains configuration file (BDMCONFIG
).
The GWADM(5)
server registers with the DMADM
server to obtain the configuration information used by the corresponding gateway group. GWADM
accepts requests from the DMADMIN
service, which is a generic administrative service advertised by the DMADM
server, for run-time statistics or changes in the run-time options of the specified gateway group. Periodically, GWADM
sends an "I-am-alive" message to the DMADM
server. If no reply is received from DMADM
, GWADM
registers again. This process ensures the GWADM
server always has the current information about the Domains configuration for its gateway group.
For more information about GWADM
, see
Administering Domains.
the DMADM(5)
server provides a registration service for gateway groups. This service is requested by GWADM
servers as part of their initialization procedure. The registration service downloads the configuration information required by the requesting gateway group. The DMADM
server maintains a list of registered gateway groups, and propagates to these groups any changes made to the Domains configuration file (BDMCONFIG
).
For more information about DMADM
, see
Administering Domains.
The following Domains administrative tools are provided by the BEA Tuxedo system for setting up and maintaining a Domains configuration:
dmloadcf(1)
—reads the DMCONFIG
file, checks the syntax, and loads the binary BDMCONFIG
configuration file.dmunloadcf(1)
—translates the BDMCONFIG
configuration file from binary to text format.dmadmin(1)
—allows a BEA Tuxedo administrator to update the BDMCONFIG
file when the Tuxedo domain is running.
The following figure shows the relationships between the Domains administrative tools and the Domains text and binary configuration files. Administration using the dmadmin
utility is through the DMADMIN
service, which is advertised by the DMADM
server.
The dmloadcf(1)
command parses the DMCONFIG
file and loads the information into BDMCONFIG
. The command uses the environment variable BDMCONFIG
to point to the device or system filename in which the configuration should be stored.
The dmloadcf
command, through the -c option, also provides an estimate of the interprocess communications (IPC) resources needed for each local domain specified in the configuration.
The dmloadcf command checks the DMTYPE
file (%TUXDIR%\udataobj\DMTYPE
for Windows or $TUXDIR/udataobj/DMTYPE
for UNIX) to verify that the domain gateway types specified in the Domains configuration file are valid. Each type of domain gateway has a domain type designator (TDOMAIN
, SNAX
, OSITP
, OSITPX
), which is used as a tag in the DMTYPE
file. Each line in this file has the following format:
dmtype:access_module_lib:comm_libs:tm_typesw_lib:gw_typesw_lib
The file has the following entry for the TDomain gateway:
TDOMAIN:-lgwt:-lnwi -lnws -lnwi::
For more information about dmloadcf
, see reference page dmloadcf
(1)in BEA Tuxedo Command Reference.
The dmunloadcf(1)
command converts the BDMCONFIG
configuration file from binary to text format and prints the output to standard output. For more information about dmunloadcf
, see reference page dmunloadcf
(1) in BEA Tuxedo Command Reference.
The dmadmin(1)
command allows a BEA Tuxedo administrator to configure, monitor, and tune domain gateways when the Tuxedo domain is running. It acts as an administrative command interpreter that translates administrative commands and sends requests to the DMADMIN
service, a generic administrative service advertised by the DMADM
server. DMADMIN
invokes functions that validate, retrieve, or update information in the BDMCONFIG
file.
You invoke dmadmin
with the -c
option to dynamically update the BDMCONFIG
file. Depending on the configuration being changed, some updates will take place immediately, while others will take place only for new occurrences of whatever is affected by the update.
For more information about dmadmin
, see
Administering Domains.
Each BEA Tuxedo domain involved in a Domains configuration has a configuration file in which the interdomain parameters are defined. The text version of the configuration file is referred to as DMCONFIG
, although the configuration file may have any name, as long as the content of the file conforms to the format described on reference page DMCONFIG(5) in BEA Tuxedo File Formats, Data Descriptions, MIBs, and System Processes Reference. Typical configuration filenames begin with the string dm
, followed by a mnemonic string, such as config
in the filename dmconfig
.
As the administrator for the Domains configuration, you need to create a separate DMCONFIG
file for each BEA Tuxedo domain participating in the configuration. You can create and edit a DMCONFIG
file with any text editor.
For a BEA Tuxedo domain involved in a Domains configuration, the DMCONFIG
file resides on the machine on which the Domains administrative server DMADM
is to run, as specified in the UBBCONFIG
file for the Tuxedo domain. The DMADM
server may run on any machine (master machine, non-master machine) in a Tuxedo domain.
Note: | The master machine for a BEA Tuxedo domain contains the domain's UBBCONFIG file, and is designated as the master machine in the RESOURCES section of the UBBCONFIG file. Starting, stopping, and administering a Tuxedo domain is done through the master machine. |
The BDMCONFIG
file is a binary version of the DMCONFIG
file. It is created by running the dmloadcf
command, which parses DMCONFIG
and loads the binary BDMCONFIG
file to the location referenced by the BDMCONFIG
environment variable. As with DMCONFIG
, the BDMCONFIG
file may be given any name; the actual name is the device or system filename specified in the BDMCONFIG
environment variable. The BDMCONFIG
environment variable must be set to an absolute pathname ending with the device or system filename where BDMCONFIG
is to be loaded.
Unlike the TUXCONFIG
file, which is the binary version of UBBCONFIG
, the BDMCONFIG
file is not propagated to any other machine in a Tuxedo domain when the Tuxedo application is booted. For the BDMCONFIG
file to reside on any other machine in a Tuxedo domain, the administrator for that domain must manually place it there.
The DMCONFIG
file is made up of specification sections. Lines beginning with an asterisk (*) indicate the beginning of a specification section. Each such line contains the name of the section immediately following the *. The asterisk is required when specifying a section name.
DM_LOCAL
(also known as DM_LOCAL_DOMAINS
)DM_REMOTE
(also known as DM_REMOTE_DOMAINS
)DM_EXPORT
(also known as DM_LOCAL_SERVICES
)DM_IMPORT
(also known as DM_REMOTE_SERVICES
)DM_RESOURCES
DM_ROUTING
DM_ACCESS_CONTROL
DM_
domtype
, where domtype
is TDOMAIN
, OSITP
, OSITPX
, or SNACRM
+ SNALINKS
+ SNASTACKS
Note: | The DM_LOCAL section must precede the DM_REMOTE section. |
As the administrator for the Domains configuration, you use these sections to:
TDOMAIN
, ...) and network addresses.The following figure is a simple example of what you are trying to accomplish.
In the example, you must also create a DMCONFIG
file for Domain Y that complements the DMCONFIG
file created for Domain X. That is, a local domain access point in the Domain X DMCONFIG
file would be a remote domain access point in the Domain Y DMCONFIG
file, and a remote domain access point in the Domain X DMCONFIG
file would be a local domain access point in the Domain Y DMCONFIG
file. The example demonstrates the use of the TDomain gateway server.
The following table provides a description of each section in the DMCONFIG
file.
Defines one or more local domain access point identifiers (also known as local domains, or
LDOMs ). For each local domain access point (logical name) that you define, you specify a domain gateway group (TDOMAIN , ...) for the access point in this section, and you specify in the DM_EXPORT section the local services available through the access point. The local services available through the local domain access point will be available to clients in one or more remote domains.
You can define multiple local domain access points in this section, one for each gateway group (
TDOMAIN , SNAX , OSITP , OSITPX ) used by this BEA Tuxedo domain to communicate with a remote domain.
One and only one local domain access point is allowed per gateway group. A domain gateway group consists of a
GWADM server process and a domain gateway server process (for example, GWTDOMAIN , the TDomain gateway server).
|
|||
Defines one or more remote domain access point identifiers (also known as remote domains, or
RDOMs ). For each remote domain access point (logical name) that you define, you specify a domain gateway group (TDOMAIN , ...) for the access point in this section, and you specify in the DM_IMPORT section the remote services available through the access point. The remote services available through the remote domain access point will be available to clients in the local domain.
You can define multiple remote domain access points in this section, one or more for each gateway group (
TDOMAIN , SNAX , OSITP , OSITPX ) used by this BEA Tuxedo domain to communicate with a remote domain.
*DM_REMOTE "BA.BANK01" "BA.BANK02"
|
|||
Specifies the local services exported to one or more remote domains through a local domain access point defined in the
DM_LOCAL section. Only the services specified for a local domain access point are available to clients on one or more remote domains, meaning that specifying services in this section is a way to restrict remote client access to local services. If the DM_EXPORT section is absent, or is present but empty, all services advertised by the local domain are available to the remote domains.
A local service made available to remote domains inherits many of its properties from the
SERVICES section of the local UBBCONFIG file. Some of the properties that may be inherited are LOAD , PRIO , AUTOTRAN , ROUTING , BUFTYPE , and TRANTIME .
|
|||
Specifies the remote services imported through one or more remote domain access points defined in the
DM_REMOTE section and made available to the local domain through one or more local domain access points. If the DM_IMPORT section is absent, or is present but empty, no remote services are available to the local domain.
A remote BEA Tuxedo service made available to the local domain inherits many of its properties from the
SERVICES section of the remote UBBCONFIG file. Some of the properties that may be inherited are LOAD , PRIO , AUTOTRAN , ROUTING , BUFTYPE , and TRANTIME .
|
|||
Specifies global Domains configuration information, specifically a user-supplied configuration version string. The only parameter in this section is
VERSION= string , where string is a field in which users can enter a version number for the current DMCONFIG file. This field is not checked by the software.
|
|||
Specifies data-dependent routing criteria for routing local service requests to one of several remote domains offering the same service. For an example, see
Specifying Domains Data-Dependent Routing.
|
|||
Specifies one or more access control list (ACL) names and associates one or more remote domain access points with each specified ACL name. You can use the
ACL parameter in the DM_EXPORT section by setting ACL= ACL_NAME to restrict access to a local service exported through a particular local domain access point to just those remote domain access points associated with the ACL_NAME .
|
|||
Defines the parameters required for a particular Domains configuration. Currently, the value of
domtype can be TDOMAIN , OSITP , OSITPX , or SNACRM + SNALINKS + SNASTACKS . Each domain type must be specified in a separate section.
In a
DM_TDOMAIN section, you define the TDomain-specific network configuration for a local or remote domain access point. You can also define the network configuration for one or more remote domain access points associated with one or more WebLogic Server applications, to combine Tuxedo ATMI servers and WebLogic Server Enterprise JavaBean (EJB) servers in an application; for details, see
BEA Tuxedo Interoperability.
The
DM_TDOMAIN section should have an entry per local domain access point if requests from remote domains to local services are accepted through that access point. For each local domain access point specified in this section, you must specify the network address to be used for listening for incoming connections.
The
DM_TDOMAIN section should have an entry per remote domain access point if requests from the local domain to remote services are accepted through that access point. For each remote domain access point specified in this section, you must specify the destination network address to be used when connecting to that remote domain access point.
Beginning with Tuxedo release 9.0, the
DM_TDOMAIN section can have an entry per TDomain session between specific local and remote domain access points. For each TDomain session specified in this section, you must specify the destination network address to use when connecting to that TDomain session.
When Domains link-level failover is in use, you can specify more than one destination network address for a remote domain access point or TDomain session to implement the mirrored gateway capability. For an example of a mirrored gateway, see
How to Configure Domains Link-Level Failover.
|
For a detailed description of the DMCONFIG
file, see reference pages DMCONFIG
(5)and DM_MIB
(5)in BEA Tuxedo File Formats, Data Descriptions, MIBs, and System Processes Reference.
For BEA Tuxedo release 7.1 or later, the Domains MIB uses improved class and attribute terminology to describe the interaction between local and remote domains. The improved terminology has been applied to the DMCONFIG(5)
reference page, section names, parameter names, and error messages, and to the DM_MIB(5)
reference page, classes, and error messages.
For backwards compatibility, aliases are provided between the DMCONFIG
terminology used prior to BEA Tuxedo 7.1 and the improved Domains MIB terminology. For BEA Tuxedo release 7.1 or later, both versions of DMCONFIG
terminology are accepted. The following table shows the mapping of the previous and improved terminology for the DMCONFIG
file.
For BEA Tuxedo release 7.1 or later, the dmunloadcf
command generates by default a DMCONFIG
file that uses the improved domains terminology. Use the -c
option to print a DMCONFIG
file that uses the previous domains terminology. For example:
prompt> dmunloadcf -c > dmconfig_prev
You can specify data-dependent routing criteria for the routing of local service requests to remote domains in the DM_ROUTING
section of the DMCONFIG
file for any of the following buffer types:
In the following example, the remote service TOUPPER
is available through two different remote domain access points named REMOT1
and REMOT2
, and the data-dependent routing criteria for TOUPPER
is defined in the routing criteria table named ACCOUNT
. In the example, RTOUPPER1
and RTOUPPER2
are alias service names for TOUPPER
, which is the actual service name expected by the remote domains.
*DM_IMPORT
"
RTOUPPER1 AUTOTRAN=N
RACCESSPOINT=REMOT1
LACCESSPOINT=LOCAL1
CONV=N
RNAME=TOUPPER"
"
ROUTING=ACCOUNT
RTOUPPER2 AUTOTRAN=N
RACCESSPOINT=REMOT2
LACCESSPOINT=LOCAL1
CONV=N
RNAME=TOUPPER"
ROUTING=ACCOUNT
*DM_ROUTING
"
ACCOUNT FIELD=branchid
BUFTYPE=VIEW:account"
"
RANGES=MIN-1000:REMOT1,1001-3000:REMOT2"
For the ACCOUNT
routing table, VIEW
and account
are the type and subtype of data buffers for which this routing table is valid, and branchid
is the name of the field in the VIEW data buffer to which routing is applied. The allowed values for the branchid
field are as follows:
If the value of the branchid
field for a TOUPPER
service request is within the range MIN-1000, the service request is routed through the REMOT1
access point. If the value of the branchid
field for a TOUPPER
service request is within the range 1001-3000, the service request is routed through the REMOT2
access point.
The BEA Tuxedo system provides two timeout mechanisms: a transaction timeout mechanism and a blocking timeout mechanism. The transaction timeout is used to define the duration of an ATMI transaction, which may involve several service requests. The timeout value is defined when the transaction is started. The blocking timeout is used to define the duration of individual service requests, that is, how long the ATMI application is willing to wait for a reply to a service request.
If a process is not in transaction mode, the BEA Tuxedo system performs blocking timeouts. If a process is in transaction mode, the BEA Tuxedo system performs transaction timeouts but not blocking timeouts. The latter statement is true for intradomain transactions (that is, transactions handled within a single BEA Tuxedo domain) but is not true for interdomain transactions. For interdomain transactions, if a process is in transaction mode, the Domains software performs both transaction timeouts and blocking timeouts.
The BEA Tuxedo transaction timeout mechanism is used unchanged in the Domains component. Use of the same transaction timeout mechanism is necessary because domain gateways implement the transaction manager server (TMS) functionality and therefore are required to handle the TMS timeout messages generated by the BEA Tuxedo Bulletin Board Liaison (BBL) administrative process.
A local service made available to remote domains in the DM_EXPORT
section of the DMCONFIG
file inherits the following transaction-related properties from the SERVICES
section of the local UBBCONFIG
file:
AUTOTRAN
—When AUTOTRAN
is turned on for a service and a service request is received for the service that is not already within a transaction, the local BEA Tuxedo system automatically starts a transaction for the service.TRANTIME
—Transaction timeout value in seconds for transactions automatically started for the service. If this timeout value is exceeded for a transaction, the BEA Tuxedo nodes (machines) infected with the transaction generate a TMS timeout message.
Similarly, a remote BEA Tuxedo service made available to the local domain in the DM_IMPORT
section of the DMCONFIG
file inherits the AUTOTRAN
and TRANTIME
properties from the SERVICES
section of the remote UBBCONFIG
file. If the TRANTIME
timeout value is exceeded for a transaction, the BEA Tuxedo nodes infected with the transaction generate a TMS timeout message.
A service advertised on a machine running BEA Tuxedo release 8.1 or later inherits an additional transaction-timeout property named MAXTRANTIME
from the RESOURCES
section of the UBBCONFIG
file. If the MAXTRANTIME
timeout value is less than the TRANTIME
timeout value or the timeout value passed in a tpbegin(3c)
call to start a transaction, the timeout for a transaction is reduced to the MAXTRANTIME
value. MAXTRANTIME
has no effect on a transaction started on a machine running BEA Tuxedo 8.0 or earlier, except that when a machine running BEA Tuxedo 8.1 or later is infected by the transaction, the transaction timeout value is capped—reduced if necessary—to the MAXTRANTIME
value configured for that node.
For a Domains configuration, the following transaction-handling scenarios are possible:
MAXTRANTIME
parameter, or the node understands the MAXTRANTIME
parameter but the parameter is not set, the timeout value for the transaction is determined by TRANTIME
or by the timeout value passed in the tpbegin()
call that started the transaction. If the TRANTIME
or tpbegin()
timeout value is exceeded, all BEA Tuxedo nodes infected with the transaction—including the node that started the transaction—generate a TMS timeout message.MAXTRANTIME
parameter and the parameter is set for that node, the timeout value for the transaction is reduced to no greater than the MAXTRANTIME
value on that node.
If the TRANTIME
or tpbegin()
timeout value is less than or equal to MAXTRANTIME
, the transaction-handling scenario becomes the one previously described.
If the TRANTIME
or tpbegin()
timeout value is greater than MAXTRANTIME
, the infected node reduces the timeout value for the transaction to MAXTRANTIME
. If the MAXTRANTIME
timeout value is exceeded, the infected node generates a TMS timeout message.
For more information about MAXTRANTIME
, see MAXTRANTIME
in the RESOURCES
section in UBBCONFIG(5)
or TA_MAXTRANTIME
in the T_DOMAIN
class in TM_MIB(5)
.
The BEA Tuxedo blocking timeout mechanism uses information stored in the registry slot assigned to each BEA Tuxedo client or server process—one registry slot per process—running on the local machine. Information in the registry slot is used by the local BBL to detect requesters that have been blocked for a time greater than BLOCKTIME
. Because a domain gateway process is a multitasking server that can process several service requests at a time (which would require multiple registry slots), domain gateways cannot use the registry slot mechanism. When a blocking timeout condition arises in a Domains environment, a domain gateway sends an error/failure reply message to the requester and cleans any context associated with the service request.
In the DM_LOCAL
section of the DMCONFIG
file, you can set the blocking timeout for a local domain access point using the BLOCKTIME
parameter. For example:
*DM_LOCAL
"
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID=BA.CENTRAL01"
BLOCKTIME=30
The BLOCKTIME
parameter specifies the maximum wait time a blocking ATMI call will block before timing out. A blocking timeout condition implies that the affected service request has failed.
The blocking timeout value is a multiplier of the SCANUNIT
parameter specified in the RESOURCES
section of the UBBCONFIG
file. The value SCANUNIT * BLOCKTIME
must be greater than or equal to SCANUNIT
and less than or equal to 32,767 seconds.
If BLOCKTIME
is not specified in the DMCONFIG
file, the default is set to the value of the BLOCKTIME
parameter specified in the RESOURCES
section of the UBBCONFIG
file. If the BLOCKTIME
parameter is not specified in the UBBCONFIG
file, the default is set so that (SCANUNIT * BLOCKTIME
) is approximately 60 seconds.
Be aware that interdomain transactions generate blocking timeout conditions when transaction duration exceeds BLOCKTIME
. That is, for an interdomain transaction, if the BLOCKTIME
value is less than (a) the TRANTIME
timeout value specified in the SERVICES
section of the UBBCONFIG
file or (b) the timeout value passed in the tpbegin()
call to start the transaction, the timeout for the transaction is reduced to the BLOCKTIME
value. In contrast, for intradomain transactions (that is, transactions handled within a single BEA Tuxedo domain), the BLOCKTIME
value specified in the RESOURCES
section of the TUXCONFIG
file has no effect on the timeout of an intradomain transaction.
You can specify the conditions under which a local domain gateway tries to establish a connection to one or more remote domains by selecting one of the following connection policies:
ON_DEMAND
(default)—Connect when requested by either (1) a client request to a remote service or (2) an administrative "connect" command. Under this connection policy, a connection can be established in any of the following ways:ON_STARTUP
—Connect at gateway server initialization (boot) time. Under this connection policy, a connection can be established in any of the following ways:INCOMING_ONLY
—Accept incoming connections but do not initiate a connection automatically. Under this connection policy, a connection can be established in any of the following ways:Connection policy applies only to TDomain gateways.
In the DM_LOCAL
section of the DMCONFIG
file, you set the connection policy for a local domain access point using the CONNECTION_POLICY
parameter. For example:
*DM_LOCAL
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID="BA.CENTRAL01"
BLOCKTIME=30
CONNECTION_POLICY=ON_STARTUP
If you do not specify a connection policy for a local domain access point, the connection policy for that access point defaults to ON_DEMAND
.
For TDomain gateways running BEA Tuxedo release 8.1 or later software, you can set the connection policy on a per local or per remote domain basis in the DM_TDOMAIN
section of the DMCONFIG
file. For example:
*DM_LOCAL
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID="BA.CENTRAL01"
BLOCKTIME=30
*DM_REMOTE
REMOT1 TYPE=TDOMAIN
DOMAINID="REMOT1"
REMOT2 TYPE=TDOMAIN
DOMAINID="REMOT2"
*DM_TDOMAIN
LOCAL1 NWADDR="//albany.acme.com:4051"
CONNECTION_POLICY=ON_STARTUP
REMOT1 NWADDR="//newyork.acme.com:65431"
CONNECTION_POLICY=ON_DEMAND
REMOT2 NWADDR="//philly.acme.com:65431"
The connection policy specified for a remote domain access point takes precedence over the connection policy specified for a local domain access point. So, in the preceding example, the connection policy configurations will be:
LOCAL1
to REMOT1
— ON_DEMAND
to
LOCAL1REMOT2
— ON_STARTUP
For BEA Tuxedo 8.1 or later, you can specify any of the following connection policy values for a local domain access point in the DM_TDOMAIN
section of the DMCONFIG
file:
Specifying no connection policy for a local domain access point defaults to the global connection policy specified in the DM_LOCAL
section of the DMCONFIG
file. Specifying a global connection policy in the DM_TDOMAIN
section takes precedence over the global connection policy specified in the DM_LOCAL
section.
Note: | If you choose to specify a global connection policy in the DM_TDOMAIN section, do not specify a global connection policy in the DM_LOCAL section. |
For BEA Tuxedo 8.1 or later, you can also specify any of the following connection policy values for a remote domain access point in the DM_TDOMAIN
section of the DMCONFIG
file:
Specifying LOCAL
or no connection policy for a remote domain access point defaults to the global connection policy.
Without the remote-domain connection policy capability, a global connection policy of ON_STARTUP
means that the local TDomain gateway will try to connect to all remote domains at boot time, even if some of the remote domains will not be used initially. With a large number of remote domains, the boot time could be substantial. With the remote-domain connection policy capability, you can select which remote domain connections not to automatically establish at boot time for a global connection policy of ON_STARTUP
.
Beginning with BEA Tuxedo 9.0, you can set the connection policy for TDomain gateways on a per TDomain session basis in the DM_TDOMAIN
section of the DMCONFIG
file.
In order to initiate a per TDomain session connection policy you must do the following:
You can create one or more record entries to describe the parameters and attributes you want to use per TDomain session.
connection_policy
parameter attributes you want to use. If you do not specify a connection policy for a TDomain session, the connection policy attribute for that session point defaults to LOCAL
.
Two parameters in the DM_TDOMAIN
section of the DMCONFIG
file are used to create a TDomain session:
You can specify other TDomain session parameters and attributes, for example SECURITY
and DMKEEPALIVE
. For more information on FAILOVERSEQ
and LACCESSPOINT
, as well as other TDomain parameters and attributes, see
Optional parameters for the DM_TDOMAIN section in BEA Tuxedo File Formats, Data Descriptions, MIBs, and System Processes Reference.
The FAILOVERSEQ
, LACCESSPOINT
and CONNECTION_POLICY
parameters are used to establish a per TDomain session policy and are specified in the following example:
*DM_LOCAL
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID="BA.CENTRAL01"
BLOCKTIME=30
LOCAL2 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID="BA.CENTRAL02"
BLOCKTIME=30
*DM_REMOTE
REMOT1 TYPE=TDOMAIN
DOMAINID="REMOT1"
REMOT2 TYPE=TDOMAIN
DOMAINID="REMOT2"
*DM_TDOMAIN
LOCAL1 NWADDR="//albany.acme.com:4051"
LOCAL2 NWADDR="//chicago.acme.com:4032"
LOCAL1 NWADDR="//albany.acme.com:4052"
REMOT1 NWADDR="//newyork.acme.com:65431" LACCESSPOINT=LOCAL1
CONNECTION_POLICY=ON_STARTUP
MINENCRYPTBITS=128 MAXENCRYPTBITS=128
FAILOVERSEQ=100
REMOT1 NWADDR="//newyork.acme.com:65432" LACCESSPOINT=LOCAL2
CONNECTION_POLICY=INCOMING_ONLY
FAILOVERSEQ=110
REMOT2 NWADDR="//philly.acme.com:65431" LACCESSPOINT=LOCAL2
CONNECTION_POLICY=ON_DEMAND
FAILOVERSEQ=120
REMOT1 NWADDR="//detroit.acme.com:65431" LACCESSPOINT=LOCAL1
CONNECTION_POLICY=INCOMING_ONLY
MINENCRYPTBITS=40 MAXENCRYPTBITS=40
FAILOVERSEQ=130
The DM_TDOMAIN
section consists of seven records that include three TDomain sessions.
LOCAL1,REMOT1
since its FAILOVERSEQ
number is smaller than record 7. The connection policy for this TDomain session is ON_STARTUP
, and it requires 128 bits Link-Level Encryption security policy. If connection to this record fails, then a connection attempt is made to its secondary/backup record, which is record 7.LOCAL1,REMOT1
since its FAILOVERSEQ
number is larger than record 4.
The connection and security policies for record 7 are ignored because record 4 is the primary record for this session. Record 7 has no secondary/backup failover record. If connection to record 7 fails, then a connection to record 4 is retried as determined by RETRY_INTERVAL
until MAXRETRY
is exhausted. For more information about RETRY_INTERVAL
, see
How To Use Connection Retry Processing on page 1-37.
LOCAL2,REMOT1
. The connection policy for this TDomain session is INCOMING_ONLY
. There is no secondary/backup failover record for this session.LOCAL2,REMOT2
. The connection policy for this session is ON_DEMAND
. There is no secondary/backup failover record for this session. Local access point LOCAL2
connects with two TDomain sessions: one with REMOT1
in record 5, and another with REMOT2
.
If two or more records for the same TDomain session have the same FAILOVERSEQ
value, the first record entered will be the primary record. The failover sequence for the remaining records is determined based on record-entry order.
To initiate your per TDomain session policy, perform the following steps:
To make the DMCONFIG
file smaller and easier to work with, LACCESSPOINT
can contain regular expressions to describe multiple local domain access points.
Note: | DM_TDOMAIN is the only section in the DMCONFIG file that allows LACCESSPOINT to contain regular expressions. |
When the DMCONFIG
file is compiled, regular expressions are expanded to their full local domain names in the output binary BDMCONFIG
file. The size of the BDMCONFIG
file is increased accordingly as shown in the following example:
*DM_LOCAL
ALPHA1 . . .
ALPHA2 . . .
ALPHA3 . . .
ALPHA10 . . .
ALPHA11 . . .
ALPHA24 . . .
ALPHA36 . . .
BETA2 . . .
BETA3 . . .
BETA15 . . .
BETA20 . . .
*DM_REMOTE
REMOT1 . . .
REMOT2 . . .
REMOT3 . . .
*DM_TDOMAIN
REMOT1 NWADDR="//philly.acme.com:65431" LACCESSPOINT=ALPHA1
CONNECTION_POLICY=INCOMING_ONLY
FAILOVERSEQ=100
REMOT1 NWADDR="//philly.acme.com:65432" LACCESSPOINT=BETA2
CONNECTION_POLICY=ON_DEMAND
FAILOVERSEQ=110
REMOT1 NWADDR="//philly.acme.com:65433" LACCESSPOINT="ALPHA[1-2][0-9]"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=120
REMOT1 NWADDR="//philly.acme.com:65434" LACCESSPOINT="BETA[1-2][0-9]*"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=130
TDomain session records three and four use regular expressions to define local access points. When dmloadcf
parses this DMCONFIG
file, the BDMCONFIG
file output is as follows.
REMOT1 NWADDR="//philly.acme.com:65431" LACCESSPOINT=ALPHA1
CONNECTION_POLICY=INCOMING_ONLY
FAILOVERSEQ=100
REMOT1 NWADDR="//philly.acme.com:65432" LACCESSPOINT=BETA2
CONNECTION_POLICY=ON_DEMAND
FAILOVERSEQ=110
REMOT1 NWADDR="//philly.acme.com:65433" LACCESSPOINT="ALPHA10"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=120
REMOT1 NWADDR="//philly.acme.com:65433" LACCESSPOINT="ALPHA11"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=120
REMOT1 NWADDR="//philly.acme.com:65433" LACCESSPOINT="ALPHA24"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=120
REMOT1 NWADDR="//philly.acme.com:65434" LACCESSPOINT="BETA2"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=130
REMOT1 NWADDR="//philly.acme.com:65434" LACCESSPOINT="BETA15"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=130
REMOT1 NWADDR="//philly.acme.com:65434" LACCESSPOINT="BETA20"
CONNECTION_POLICY=ON_STARTUP
FAILOVERSEQ=130
Using DM_MIB
to specify and request TDomain session information directly modifies the BDMCONFIG
file. The original DMCONFIG
file is unmodified. For more information about DM_MIB
, see DM_MIB(5) in Section 5 - File Formats, Data Descriptions, MIBs, and System Processes Reference.
Note: | You can use dmunloadcf >DMCONFIG to parse the BDMCONFIG file to update its changes in the DMCONFIG file. For more information about dmunloadcf , see Domains Administrative Tools. |
DM_MIB
uses three T_DM_TDOMAIN Class Definition attributes to create a per TDomain session connection policy in the BDMCONFIG
file:
TA_DMFAILOVERSEQ
: Specifies and requests the session connection failover sequences and primary records for a TDomain session record in the BDMCONFIG
file.TA_DMLACCESSPOINT
: Specifies and requests a local domain access point found in the DM_LOCAL
section for a TDomain session record in the BDMCONFIG
file.TA_DMCONNECTION_POLICY
: Specifies a TDomain connection policyYou can also specify and request other T_DM_TDOMAIN Class Definition attributes, for example security and keepalive. For more T_DM_TDOMAIN Class Definition attribute information, see T_DM_TDOMAIN Class Definition in Section 5 - File Formats, Data Descriptions, MIBs, and System Processes Reference.
You can use DM_MIB
to add, delete, or retrieve TDomain session records in the BDMCONFIG
file. All applicable T_DM_TDOMAIN Class Definition key fields must be used to add, delete, or retrieve requests for TDomain session record information.
Example 1: DM_MIB
request used to add a new TDomain session and connection policy record.
TA_OPERATION SET
TA_CLASS T_DM_TDOMAIN
TA_DMACCESSPOINT RDOM1
TA_DMNWADDR //philly.acme.com:65431
TA_STATE NEW
TA_DMLACCESSPOINT LDOM3
TA_DMFAILOVERSEQ 50
TA_DMCONNECTION_POLICY ON_STARTUP
This will add the following TDomain session record in BDMCONFIG
file:
RDOM1 NWADDR="//philly.acme.com:65431" LACCESSPOINT=LDOM3
FAILOVERSEQ=50
CONNECTION_POLICY=ON_STARTUP
Example 2: DM_MIB
request used to delete an existing TDomain session connection policy record.
The requested record is marked "invalid" in the BDMCONFIG
file and is not included in the TDomain session.
TA_OPERATION SET
TA_CLASS T_DM_TDOMAIN
TA_DMACCESSPOINT RDOM1
TA_DMNWADDR //philly.acme.com:65431
TA_STATE INV
TA_DMLACCESSPOINT LDOM3
TA_DMFAILOVERSEQ 50
TA_DMCONNECTION_POLICY ON_STARTUP
Example 3: DM_MIB request used to retrieve an existing TDomain session connection policy record.
TA_OPERATION GET
TA_CLASS T_DM_TDOMAIN
TA_DMACCESSPOINT RDOM1
TA_DMNWADDR //philly.acme.com:65431
TA_STATE INV
TA_DMLACCESSPOINT LDOM3
TA_DMFAILOVERSEQ 50
TA_DMCONNECTION_POLICY ON_STARTUP
You can use Tuxedo's command line interface, DMADMIN
, to specify and request TDomain session information. For a general description of DMADMIN
, seeDomains Administrative Tools.
Using DMADMIN
to specify and request TDomain information works similarly to using DM_MIB
. That is to say, using DMADMIN
modifies the BDMCONFIG
file and leaves the original DMCONFIG
file unmodified.
DMADMIN
uses three field indentifiers to add a per TDomain connection policy record in the BDMCONFIG
file:
TA_DMFAILOVERSEQ
: Specifies and requests the session connection failover sequences and primary records for a TDomain session record in the BDMCONFIG
file. TA_LDOM
: Specifies and requests a local domain access point found in the DM_LOCAL
section for a TDomain session record in the BDMCONFIG
file.TA_CONNECTION_POLICY
: Specifies a TDomain connection policy
For more information about TA_DMFAILOVERSEQ
, TA_LDOM,
TA_CONNECTION_POLICY
and other field indentifiers, see dmadmin(1) in BEA Tuxedo Command Reference.
You can use DMADMIN
to add, delete, or retrieve TDomain session records. The following example illustrates how DMADMIN
is used to add a TDomain session connection policy record in the BDMCONFIG
file:
TA_CMPLIMIT 2147483647
TA_CONNECTION_POLICY
TA_MINENCRYPTBITS 0
TA_MAXENCRYPTBITS 128
TA_DMNWADDR //philly.acme.com:65431
TA_LDOM LDOM3
TA_DMFAILOVERSEQ 50
TA_RDOM RDOM1 ON_STARTUP
Tuxedo 9.x TDomain gateways can communicate with older Tuxedo release TDomain gateways. However, if you want to use the TDomain session feature running Tuxedo 9.x and 8.1 in a mixed application environment, please note the following limitations:
DMADM
server and dmloadcf
when you want to create a TDomain session.The TDomain session feature does not work with Tuxedo releases older than 8.1 in a mixed application environment.
When CONNECTION_POLICY
is set to ON_STARTUP
, you can configure two other parameters to determine how many times the local domain gateway attempts to establish a connection to the remote domains. By default, the local domain gateway retries failed connections every 60 seconds, but you can specify a different value for this interval using parameters MAXRETRY
and RETRY_INTERVAL
.
You use the MAXRETRY
parameter to specify the number of times that a domain gateway tries to establish connections to remote domains. The minimum value is 0, and the maximum value is 2147483647. The default setting is 2147483647. Setting this parameter to 0 turns off connection retry processing.
You use the RETRY_INTERVAL
parameter to specify the number of seconds between automatic attempts to establish a connection to remote domains. The minimum value is 0, and the maximum value is 2147483647. The default setting is 60. If the MAXRETRY
parameter is set to 0, setting RETRY_INTERVAL
is not allowed.
*DM_LOCAL
"
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID=BA.CENTRAL01"
BLOCKTIME=30
CONNECTION_POLICY=ON_STARTUP
MAXRETRY=5
RETRY_INTERVAL=100
Example 2 (Only possible for TDomain gateways running BEA Tuxedo release 8.1 or later software):
*DM_LOCAL
"
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID=BA.CENTRAL01"
BLOCKTIME=30
*DM_TDOMAIN
"
LOCAL1 NWADDR=//albany.acme.com:4051"
"
CONNECTION_POLICY=ON_STARTUP
MAXRETRY=5
RETRY_INTERVAL=100
REMOT1 NWADDR=//newyork.acme.com:65431"
CONNECTION_POLICY=ON_STARTUP
MAXRETRY=10
RETRY_INTERVAL=40
In the second example, the MAXRETRY
and RETRY_INTERVAL
values 10 and 40 will be the automatic connection retry criteria used by the local TDomain gateway to establish a connection to the remote domain access point named REMOT1
.
The connection policy that you specify determines how services imported from a remote domain are advertised in the BEA Tuxedo bulletin board by the domain gateway:
ON_DEMAND
, the local domain gateway continually advertises services imported from a remote domain.ON_STARTUP
, the local domain gateway advertises services imported from a remote domain as long as a connection exists to the remote domain.INCOMING_ONLY
, the local domain gateway advertises services imported from a remote domain when the gateway receives an incoming connection or when a dmadmin connect
command is issued.
When the connection policy is ON_STARTUP
or INCOMING_ONLY
(but not ON_DEMAND
), Dynamic Status, a TDomain gateway feature, checks the status of remote services. The status of a remote service depends on the status of the network connection between the local and remote domain gateways. Remote services are advertised and available on the local domain whenever a connection is successfully established to the domain on which they reside. Remote services are suspended and unavailable whenever the connection is not established to the domain on which they reside.
For each service, the domain gateway keeps track not only of the remote domains from which the service is imported, but also of which remote domains are available. In this way, the gateway provides intelligent load balancing of requests to remote domains. If all the remote domains from which a service is imported become unreachable, the domain gateway suspends the service in the BEA Tuxedo bulletin board.
For example, suppose a service named RSVC is imported from two remote domains, as specified by the following entries in the DM_IMPORT
section of the DMCONFIG
file:
*DM_IMPORT
RSVC AUTOTRAN=N
RACCESSPOINT=REMOT1
LACCESSPOINT=LOCAL1
RSVC AUTOTRAN=N
RACCESSPOINT=REMOT2
LACCESSPOINT=LOCAL1
When connections to both REMOT1
and REMOT2
are up, the domain gateway load balances requests for the RSVC
service. If the connection to REMOT1
goes down, the gateway sends all requests for RSVC
to REMOT2
. If both connections go down, the gateway suspends RSVC
in the bulletin board. Subsequent requests for RSVC
are either routed to a local service or fail with TPENOENT
.
In the DM_IMPORT
section of the DMCONFIG
file, you can set up the Domains-level failover and failback functionality for your Domains configuration. In the DM_TDOMAIN
section of the DMCONFIG
file, you can set up the Domains link-level failover functionality for your Domains configuration.
Domains-level failover is a mechanism that transfers requests to alternate remote domains when a failure is detected with a primary remote domain. It also provides failback to the primary remote domain when that domain is restored.
To support Domains-level failover and failback, you specify a list of the remote domain access points through which a particular service can be executed. For example:
*DM_IMPORT
"
TOUPPER RACCESSPOINT=REMOT1,REMOT2,REMOT3"
In this example, the TOUPPER
service can be executed through any of three remote domain access points: REMOT1
(primary), REMOT2
, and REMOT3
. When REMOT1
is unavailable, REMOT2
is used for failover. When REMOT1
and REMOT2
are both unavailable, REMOT3
is used for failover.
You must specify ON_STARTUP
or INCOMING_ONLY
as the value of the CONNECTION_POLICY
parameter if you want to configure alternate remote domains for a service. If you specify ON_DEMAND
as your connection policy, your servers cannot "fail over" to the alternate remote domains that you have specified in the RACCESSPOINT
parameter.
Domains-level failback occurs when a network connection to the primary remote domain is re-established for any of the following reasons:
Domains link-level failover is a mechanism that ensures that a secondary network link becomes active when a primary network link fails. However, it does not provide failback to the primary link when that link is restored, meaning that when the primary link is restored, you must manually bring down the secondary link to force traffic back onto the primary link.
To configure Domains link-level failover, you specify multiple entries for a remote domain access point in the DM_TDOMAIN
section of the DMCONFIG
file. For example:
*DM_TDOMAIN
"
REMOT1 NWADDR=//newyork.acme.com:65431"
"
REMOT1 NWADDR=//trenton.acme.com:65431"
The first entry is considered to be the primary address, which means its NWADDR
is the first network address tried when a connection is being attempted to the remote domain access point. The second entry is considered to be the secondary address, which means its NWADDR
is the second network address tried when a connection cannot be established using the primary address.
The second entry points to a secondary remote gateway that must reside in a different BEA Tuxedo domain than the BEA Tuxedo domain in which the primary remote gateway resides. The secondary and primary remote gateways must have the same ACCESSPOINTID
defined in the DM_LOCAL
section of their associated DMCONFIG
files; this arrangement is often referred to as a mirrored
gateway. This feature is not recommended for use with transactions or conversations. In addition, the mirrored gateway is not recommended for use when the primary remote gateway is available.
The FAILOVERSEQ
parameter in the DM_TDOMAIN
section of the DMCONFIG
file is used to configure TDomain session link-level failover. For more information about specifying FAILOVERSEQ
in a TDomain session, see Per TDomain Session Connection Policy.
You can also use the TA_DMFAILOVERSEQ
attribute in DM_MIB
to configure TDomain session link-level failover. For more information, see Using DM_MIB to Specify or Request TDomain Session Information.
Domains keepalive, available for TDomain gateways running BEA Tuxedo release 8.1 or later software, allows you to enable and configure a keepalive protocol at the TCP level and/or application level for each TDomain gateway connection. TCP-level keepalive and application-level keepalive are not mutually exclusive, meaning that you can configure a Domains connection using both options.
The following table provides some key information about Domains keepalive.
Most BEA Tuxedo Domains configurations span across firewalls, and firewalls typically time out idle connections. Not only will Domains keepalive keep BEA Tuxedo interdomain connections open during periods of inactivity, but it will also enable TDomain gateways to quickly detect Domains connection failures. Currently, a TDomain gateway learns of a Domains connection failure through the underlying TCP stack, which may report the failure 15 minutes or more (depending on the local operating system configuration) after the failure occurs.
Although the keepalive functionality is not part of the TCP specification, most operating systems provide a TCP keepalive timer. The TCP keepalive timer allows the server machine at one end of a TCP connection to detect whether the client machine at the other end of the connection is reachable.
Every message received by the server machine over the TCP connection resets the TCP keepalive timer. If the keepalive timer detects no activity on the TCP connection for a predefined period of time (typically two hours), the timer expires, and the server machine sends a probe segment packet to the client machine. If the connection is still open and the client machine is still alive, the client machine responds by sending an acknowledgement to the server machine. If the server machine does not receive an acknowledgement within a fixed period of time of sending the probe segment packet, the server machine assumes that the connection is broken and releases any resources associated with the connection.
Besides determining whether the connection is open and the client machine is alive, TCP-level keepalive is a way of keeping idle connections open through firewalls. Automatically sending a probe segment packet after a predefined period of connection inactivity resets the firewall's idle-connection timer before it times out, which allows the connection to stay open.
The interval for an operating system's TCP keepalive timer is typically set to two hours. This interval can be changed, but changing it affects all TCP connections for a machine. An operating system's TCP keepalive interval is a system-wide value.
The BEA Tuxedo TCP-level keepalive option for Domains is named TCPKEEPALIVE
, which has been added as an optional parameter in the DM_TDOMAIN
section of the DMCONFIG
file. You can use this parameter to enable the Domains TCP-level keepalive option on a per local or per remote domain basis.
The allowed values for TCPKEEPALIVE
are:
By default, the Domains TCP-level keepalive option is disabled. When you enable TCP-level keepalive for a Domains connection, the keepalive interval used for the connection is the system-wide value configured for the operating system's TCP keepalive timer.
To clarify the use of TCPKEEPALIVE
, consider the following Domains TCP-level keepalive configuration:
*DM_TDOMAIN
"
LOCAL1 NWADDR=//albany.acme.com:4051"
"
TCPKEEPALIVE=Y
REMOT1 NWADDR=//newyork.acme.com:65431"
"
REMOT2 NWADDR=//philly.acme.com:65431"
TCPKEEPALIVE=NO
The TCP-level keepalive configuration specified for a remote domain access point takes precedence over the TCP-level keepalive configuration specified for the local domain access point. So, in the preceding example, the TCP-level keepalive configurations will be:
LOCAL1
to REMOT1
— TCP-level keepalive enabledLOCAL1
to REMOT2
— TCP-level keepalive disabled
For a local domain access point, you can specify any of the following values for the TCPKEEPALIVE
parameter:
For a remote domain access point, you can specify any of the following values for the TCPKEEPALIVE
parameter:
Specifying LOCAL
or no configuration for a remote domain access point defaults to the local TCP-level keepalive configuration.
Note: | You can enable each of two interoperating BEA Tuxedo domains with TCP-level keepalive, assuming that both domains are running BEA Tuxedo 8.1 or later software. |
If the connection policy for a Domains connection is ON_STARTUP
and the TCP connection is closed due to a TCP-level keepalive failure, automatic connection retry attempts. If the connection retry is not successful, you must use the dmadmin
connect
command to re-establish the connection. For information about the dmadmin
connect
command, see
How to Establish Connections Between Domains.
Some people argue against using the operating system's TCP keepalive, citing that the probe segment packets consume unnecessary bandwidth and waste money on internet connections where users pay on a per packet basis. Some people also believe that keepalive belongs in the application layer or link layer, not in the transport (TCP) layer, citing that the application layer should:
Regardless of who thinks what, one advantage of application-level keepalive over TCP-level keepalive is that the interval for the keepalive timer can be set on a per connection basis. With TCP-level keepalive, the timer interval must be set on a per machine basis.
Using application-level keepalive, the server application sends an application-specific keepalive message whenever the application keepalive timer times out. (Typically, the keepalive message consists of just header information, meaning that the message has no associated data.) The client application responds by sending an acknowledgement to the server application. If the server application does not receive an acknowledgement within a predefined period of time of sending the keepalive message, the server application assumes that the connection is broken and releases any resources associated with the connection.
Besides determining whether the connection is open and the client application is running, application-level keepalive is a way of keeping idle connections open through firewalls. Automatically sending a keepalive message after a predefined period of connection inactivity resets the firewall's idle-connection timer before it times out, which allows the connection to stay open.
The BEA Tuxedo application-level keepalive option for Domains is named KEEPALIVE
. This parameter and a companion parameter named KEEPALIVEWAIT
have been added as optional parameters in the DM_TDOMAIN
section of the DMCONFIG
file. You can use these parameters to configure the Domains application-level keepalive option on a per local or per remote domain basis.
You use the DMKEEPALIVE
parameter to specify the maximum time that the local TDomain gateway will wait without receiving any traffic on the Domains connection; if the maximum time is exceeded, the gateway sends an application-level keepalive request message. The allowed values for DMKEEPALIVE
are:
The DMKEEPALIVE
default setting is 0.
You use the DMKEEPALIVEWAIT
parameter to specify the maximum time that the local TDomain gateway will wait without receiving an acknowledgement to a sent keepalive message. If the maximum time is exceeded, the gateway assumes that the connection to the remote TDomain gateway is broken and releases any resources associated with the connection. The minimum value for DMKEEPALIVEWAIT
is 0, and the maximum value is 2147483647 milliseconds, currently rounded up to the nearest second by the Domains software. The DMKEEPALIVEWAIT
default setting is 0.
DMKEEPALIVE
is 0 (keepalive disabled), setting DMKEEPALIVEWAIT
has no effect.DMKEEPALIVE
is enabled and DMKEEPALIVEWAIT
is set to a value greater than DMKEEPALIVE
, the local TDomain gateway will send more than one application-level keepalive message before the DMKEEPALIVEWAIT
timer expires. This combination of settings is allowed.DMKEEPALIVE
is enabled and DMKEEPALIVEWAIT
is set to 0, receiving an acknowledgement to a sent keepalive message is unimportant: any such acknowledgement is ignored by the local TDomain gateway. The local TDomain gateway continues to send keepalive messages every time the DMKEEPALIVE
timer times out. Use this combination of settings to keep an idle connection open through a firewall.
To clarify the use of DMKEEPALIVE
and DMKEEPALIVEWAIT
, consider the following Domains application-level keepalive configuration:
*DM_TDOMAIN
"
LOCAL1 NWADDR=//albany.acme.com:4051"
"
DMKEEPALIVE=1010
DMKEEPALIVEWAIT=20
REMOT1 NWADDR=//newyork.acme.com:65431"
"
DMKEEPALIVE=4000
DMKEEPALIVEWAIT=3000
REMOT2 NWADDR=//philly.acme.com:65431"
DMKEEPALIVE=-1
The keepalive configuration specified for a remote domain access point takes precedence over the keepalive configuration specified for the local domain access point. So, in the preceding example, the application-level keepalive configurations will be:
LOCAL1
to REMOT1
— Keepalive timer = 4 seconds, and wait timer = 3 secondsLOCAL1
to REMOT2
— Keepalive timer = 2 seconds, and wait timer = 1 second
For a local domain access point, you can specify any of the following values for the DMKEEPALIVE
parameter:
For a remote domain access point, you can specify any of the following values for the DMKEEPALIVE
parameter:
Specifying -1 or no keepalive configuration for a remote domain access point defaults to the local application-level keepalive configuration.
Note: | You can configure each of two interoperating BEA Tuxedo domains with application-level keepalive, using the same or different wait intervals, assuming that both domains are running BEA Tuxedo 8.1 or later software. |
If the connection policy for a Domains connection is ON_STARTUP
and the connection experiences an application-level keepalive failure, automatic connection retry processing attempts to re-establish the connection. For more information about connection retry processing, see
How To Use Connection Retry Processing.
Domains TCP-level keepalive is compatible with BEA Tuxedo 8.0 or earlier software. The BEA Tuxedo software running at the other end of the TCP connection may be any release of BEA Tuxedo because Domains TCP-level keepalive is executed at the network transport (TCP) layer.
Domains application-level keepalive is not compatible with BEA Tuxedo 8.0 or earlier software. The BEA Tuxedo software running at the other end of the TCP connection must be BEA Tuxedo 8.1 or later to be able to understand an application-level keepalive message. When connected to a TDomain gateway running an earlier release of BEA Tuxedo software, the TDomain gateway does not send an application-level keepalive message; instead, it logs a warning message in the local user log (ULOG) stating that the remote domain is running an earlier release of BEA Tuxedo software and does not support Domains application-level keepalive.
The following list summarizes the tasks that you must complete to configure a Domains environment for the TDomain gateway type:
UBBCONFIG
file with any text editor and configure the Domains administrative servers and the TDomain gateway server. For example:
*GROUPS
DMADMGRP LMID=SITE1 GRPNO=1
GWTGROUP LMID=SITE2 GRPNO=2
*SERVERS
"
DMADM SRVGRP=DMADMGRP
SRVID=1001
REPLYQ=N
RESTART=Y
GRACE=0
GWADM SRVGRP=GWTGROUP
SRVID=1002
REPLYQ=N
RESTART=Y
GRACE=0
GWTDOMAIN SRVGRP=GWTGROUP
SRVID=1003
RQADDR=GWTGROUP"
REPLYQ=N
RESTART=Y
GRACE=0
Note: | In the previous example, REPLYQ=N is specified for the DMADM , GWADM , and GWTDOMAIN servers. This setting is not required: you can, if you prefer, designate a reply queue for any of these servers by specifying REPLYQ=Y . When REPLYQ is set to N , however, performance may be improved. |
The TDomain gateway server and its associated GWADM
server must run on the same machine in a BEA Tuxedo domain. The DMADM
server may run on any machine—master machine, non-master machine—in the BEA Tuxedo domain.
tmloadcf(1)
. The tmloadcf
command parses UBBCONFIG
and loads the binary TUXCONFIG
file to the location referenced by the TUXCONFIG
variable.DMCONFIG
file with any text editor and configure the Domains environment for the TDomain gateway server. For example:*DM_LOCALLOCAL1 GWGRP=GWTGROUP
"
TYPE=TDOMAIN
ACCESSPOINTID=BA.CENTRAL01"
BLOCKTIME=30
CONNECTION_POLICY=ON_STARTUP
MAXRETRY=5
RETRY_INTERVAL=100
*DM_REMOTE
"
REMOT1 TYPE=TDOMAIN
ACCESSPOINTID=BA.BANK01"
"
REMOT2 TYPE=TDOMAIN
ACCESSPOINTID=BA.BANK02"
*DM_EXPORT
"
LTOLOWER LACCESSPOINT=LOCAL1
CONV=N
RNAME=TOLOWER"
*DM_IMPORT
"
RTOUPPER AUTOTRAN=N
RACCESSPOINT=REMOT1
LACCESSPOINT=LOCAL1
CONV=N
RNAME=TOUPPER"
*DM_TDOMAIN
"
LOCAL1 NWADDR=//albany.acme.com:4051"
"
REMOT1 NWADDR=//newyork.acme.com:65431"
"
REMOT2 NWADDR=//philly.acme.com:65431"
The DMCONFIG
file must reside on the same machine as the DMADM
server.
dmloadcf(1)
. The dmloadcf
command parses DMCONFIG
and loads the binary BDMCONFIG
file to the location referenced by the BDMCONFIG
variable.tmboot(1)
. The tmboot
command executes all administrative processes and all servers listed in the SERVERS
section of the TUXCONFIG
file named by the TUXCONFIG
and TUXOFFSET
environment variables. It starts the servers in the order that they are listed in the SERVERS
section: DMADM
, then GWADM
, and then GWTDOMAIN
. The Domains servers must be started in this order. In addition, the Domains servers must be started before the application servers.For a detailed example of configuring a Domains ATMI environment, see Planning and Configuring ATMI Domains. For a detailed example of configuring a Domains CORBA environment, see Planning and Configuring CORBA Domains.
The following sample UBBCONFIG
and DMCONFIG
files give you an idea of how to configure a BEA Tuxedo application for Domains migration. The entries of particular importance to the Domains migration are highlighted in bold.
*RESOURCES
IPCKEY 76666
MASTER SITE1,SITE2
OPTIONS LAN,MIGRATE
MODEL MP
#
*MACHINES
mach1 LMID=SITE1
TUXDIR="/home/rsmith/tuxroot"
APPDIR="/home/rsmith/bankapp"
TUXCONFIG="/home/rsmith/bankapp/tuxconfig"
mach2 LMID=SITE2
TUXDIR="/home/rsmith/tuxroot"
APPDIR="/home/rsmith/bankapp"
TUXCONFIG="/home/rsmith/bankapp/tuxconfig"
mach3 LMID=SITE3
TUXDIR="/home/rsmith/tuxroot"
APPDIR="/home/rsmith/bankapp"
TUXCONFIG="/home/rsmith/bankapp/tuxconfig"
#
*GROUPS
DMADMGRP LMID="SITE1,SITE3
" GRPNO=1
GWTGROUP LMID="SITE2,SITE3
" GRPNO=2
.
.
.
*NETWORK
SITE1 NADDR="//albany.acme.com:4065"
NLSADDR="//albany.acme.com:4068"
SITE2 NADDR="//auburn.acme.com:4065"
NLSADDR="//auburn.acme.com:4068"
SITE3 NADDR="//boston.acme.com:4065"
NLSADDR="//boston.acme.com:4068"#
*SERVERS
DMADM SRVGRP=DMADMGRP
SRVID=1001
REPLYQ=N
RESTART=Y
GRACE=0
GWADM SRVGRP=GWTGROUP
SRVID=1002
REPLYQ=N
RESTART=Y
GRACE=0
GWTDOMAIN SRVGRP=GWTGROUP
SRVID=1003
RQADDR="GWTGROUP"
REPLYQ=N
RESTART=Y
GRACE=0
.
.
.
Note: | In the previous example, REPLYQ=N is specified for the DMADM , GWADM , and GWTDOMAIN servers. This setting is not required: you can, if you prefer, designate a reply queue for any of these servers by specifying REPLYQ=Y . When REPLYQ is set to N , however, performance may be improved. |
*DM_LOCAL
LOCAL1 GWGRP=GWTGROUP
TYPE=TDOMAIN
ACCESSPOINTID="BA.CENTRAL01"
BLOCKTIME=30
CONNECTION_POLICY=ON_STARTUP
MAXRETRY=5
RETRY_INTERVAL=100
*DM_REMOTE
REMOT1 TYPE=TDOMAIN
ACCESSPOINTID="BA.BANK01"
REMOT2 TYPE=TDOMAIN
ACCESSPOINTID="BA.BANK02"
*DM_EXPORT
LTOLOWER LACCESSPOINT=LOCAL1
CONV=N
RNAME="TOLOWER"
*DM_IMPORT
RTOUPPER AUTOTRAN=N
RACCESSPOINT=REMOT1
LACCESSPOINT=LOCAL1
CONV=N
RNAME="TOUPPER"
*DM_TDOMAIN
LOCAL1 NWADDR="//albany.acme.com:4051"LOCAL1 NWADDR="//boston.acme.com:4051"
REMOT1 NWADDR="//newyork.acme.com:65431"
REMOT2 NWADDR="//philly.acme.com:65431"
In the sample configuration files, the DMADM
server and the TDomain gateway group servers are configured to migrate to the SITE3
machine. For the DMADM
migration, an administrator will activate a DMADM
server process on the SITE3
machine after completing the following tasks:
For the TDomain gateway group migration, an administrator will activate GWADM
and GWTDOMAIN
server processes on the SITE3
machine. At that point, the configurations and responsibilities associated with the LOCAL1
access point will be handled by the new GWTDOMAIN
server process listening for incoming connection requests on network address boston.acme.com:4051
.
Note: | The DMADM and domain gateway group(s) do not have to be migrated to the same machine. |
To migrate DMADM
to a new machine, follow these steps.
DMCONFIG
to the new machine and run dmloadcf
.DMADM
server process on the new machine. For details, see Methods for Activating Individual Server Processes.
If you do not restart the domain gateway groups, they will continue to function, but after DMADM
has been migrated, all MIB requests for them will fail.
When transactions are being used in a Domains configuration, the TDomain gateway group can be migrated only across machines of the same type.
To migrate a TDomain gateway group, follow these steps.
DMCONFIG
file, add multiple listening addresses, in the following format, to the DM_TDOMAIN
section:*DM_TDOMAIN
LOCAL1 NWADDR="//primary
:port
"
LOCAL1 NWADDR="//backup
:port
"
DMCONFIG
files for the remote domains should include both network addresses specified in step 1.GWADM
and GWTDOMAIN
server processes on the new machine. For details, see the following section.You can use any of the following methods to activate individual BEA Tuxedo server processes:
For information about performing application migration tasks, see Migrating Your Application in Administering a BEA Tuxedo Application at Run Time.
![]() ![]() ![]() |