Views
2 years ago

Admin. Guide Vol. 2 - NC State Remedy Implementation

Admin. Guide Vol. 2 - NC State Remedy Implementation

With a shared cache, AR

With a shared cache, AR System servers can access database information in acache shared by all the server processes on a machine. When one serverprocess changes a structure, it changes the cache at the same time it modifiesthe database. All other processes on that machine will then use the newstructures in the shared cache. This enables servers to retrieve structureinformation without having to access the database directly, improving systemperformance and enabling administrators to make changes during workhours.Shared cache is available for machines configured to run with shared memoryand semaphores.Windows NTWindows NT machines always use a shared cache and need no specialconfiguration. Use of the shared cache cannot be disabled on Windows NT.UNIXUNIX machines run without shared cache by default. To enable shared cacheon UNIX, add the line Enable-Shared-Cache: T to your /ETC/ar.conf file (Fdisables shared cache). You might also need to add or modify theShared-Cache-Segment-Size value of the ar.conf file for the amount ofshared memory you want to allocate. If the Shared-Cache-Segment-Size lineis not present, a default value of 4 MB is used. To determine the necessary sizeof each shared memory segment, run arserverd with the -c option.➤Using the arserverd -c Option1. Determine whether any AR System servers are active.The arserverd process can conflict with other active AR System servers.Although arserverd does not interfere with the functionality of otherservers, it does detect them and fail to load its cache. If you have activeAR System servers, run arserverd as a private server.2. If you are not running any other AR System servers, type the arserverdexecutable as follows:arserverd -c1-10 Action Request System Administrator’s Guide, Volume 2

Shared CacheIf you are running other AR System servers and need to run arserverd asa private server, include in the command an unused RPC program numberfrom within the private server range (390680–390694). For example, if youare running a system with only administration, fast, list, escalation, andFlashboards servers, you can run arserverd as a private server by typing:arserverd -c -r 390680The process returns the number of bytes consumed by a single copy of thecache (if the cache resides in shared memory) and the recommended size youallocate in the Shared-Cache-Segment-Size line of the ar.conf file. Theoutput is formatted as follows:Total bytes used for initial cache -- 1045800Recommended bytes per cache -- 1307250The arserverd process returns the number of bytes currently consumed for itscache. Allow at least 25 percent extra space for your cache to grow (or more ifyou expect to make many administrative changes); this is the numberarserverd returns as the recommended bytes per cache. In the example,arserverd returns 1,045,800 bytes for the currently consumed cache, andrecommends 1,307,250 bytes for each shared memory segment.1,045,800 * 1.25 = 1,307,250When you know the amount of space needed, use that number in theShared-Cache-Segment-Size line of the ar.conf file (the default value is4 MB). The following example shows the shared cache lines of the ar.conf filefor an AR System running shared cache and having a segment size of1,307,250 bytes:Enable-Shared-Cache: TShared-Cache-Memory-Size: 1307250You might need to adjust the available shared memory in your environment toprovide space for the AR System.The maximum amount of shared memory that AR System servers canconsume is the amount of memory per cache multiplied by one more than thenumber of AR System servers to be run.Performance Issues 1-11

  • Page 2 and 3: © 1991-1998 by Remedy Corporation.
  • Page 4 and 5: AR System Components...............
  • Page 6 and 7: Using FTS..........................
  • Page 10 and 11: GlossaryIndexarservtcd (UNIX Only).
  • Page 12 and 13: Creating an OLE Automation Action L
  • Page 14 and 15: xiv Action Request System Administr
  • Page 16 and 17: Chapter 3, “AR System Servers,”
  • Page 18 and 19: The Action Request System Error Mes
  • Page 22 and 23: Gathering Performance InformationIf
  • Page 24 and 25: Using AR System Log Files to Gather
  • Page 26 and 27: Avoid Macros in Run Process Actions
  • Page 28 and 29: ■■■■Notification serverArch
  • Page 32 and 33: For example, if you run an administ
  • Page 34 and 35: ■For searches that reference inde
  • Page 36 and 37: To improve active link performance,
  • Page 38 and 39: Consider indexing the Status field
  • Page 40 and 41: To extend the SQL statement when fo
  • Page 42 and 43: Example ardb Configuration FilesThe
  • Page 44 and 45: 1-24 Action Request System Administ
  • Page 46 and 47: Installation LogsThe AR System gene
  • Page 48 and 49: Whenever a mode is activated or the
  • Page 50 and 51: ORA-00001: unique constraint (ARADM
  • Page 52 and 53: This log enables you to see who is
  • Page 54 and 55: Escalation LogThe escalation log tr
  • Page 56 and 57: Thread Log (Windows NT)The thread l
  • Page 58 and 59: Pending type -- 1 Source Schema --
  • Page 60 and 61: 2-16 Action Request System Administ
  • Page 62 and 63: How the arservtcd Process Administe
  • Page 64 and 65: A warning message appears. Stopping
  • Page 66 and 67: ■■■Installation log—A file
  • Page 68 and 69: The following are additional resour
  • Page 70 and 71: ■Gains—It provides a distinct a
  • Page 72 and 73: Remedy User operations that use lis
  • Page 74 and 75: 4. If you must run your server on a
  • Page 76 and 77: If you specify a value for Server-N
  • Page 78 and 79: ■■If you activated the escalati
  • Page 80 and 81:

    Client tools and AR System servers

  • Page 82 and 83:

    Firewall 1 Firewall 2Notificationse

  • Page 84 and 85:

    vServerThreads/ProcessesTCD ServerF

  • Page 86 and 87:

    ➤Configuring Windows Clients for

  • Page 88 and 89:

    ■If you want the notification ser

  • Page 90 and 91:

    • To set ARTCPPORT:#include main(

  • Page 92 and 93:

    On Windows NT, ntservd.exe handles

  • Page 94 and 95:

    Notification Delivery from AR Syste

  • Page 96 and 97:

    In the following sample nfy configu

  • Page 98 and 99:

    What Is Full Text Search?Full Text

  • Page 100 and 101:

    Using the Ignore Words ListYou can

  • Page 102 and 103:

    The FTS engine uses the final searc

  • Page 104 and 105:

    See “FTS Issues When Performing S

  • Page 106 and 107:

    ■■■someone turns aroundsomeon

  • Page 108 and 109:

    How QBE Settings Affect FTSEnter a

  • Page 110 and 111:

    For example, you could perform a se

  • Page 112 and 113:

    When you are performing a full text

  • Page 114 and 115:

    Figure 4-1User Form3. Select the Fu

  • Page 116 and 117:

    3. Select from the following option

  • Page 118 and 119:

    Configuring FTS OptionsIn both accr

  • Page 120 and 121:

    Table 4-2 Effects of FTS Search Opt

  • Page 122 and 123:

    ■■turningturnaboutModifying the

  • Page 124 and 125:

    If you install the AR System server

  • Page 126 and 127:

    The FTS index for a field is automa

  • Page 128 and 129:

    Figure 4-7Results List Fields Tab3.

  • Page 130 and 131:

    4-34 Action Request System Administ

  • Page 133 and 134:

    Using Electronic Mail to Submit Req

  • Page 135 and 136:

    Setting Up the Mail HandlerThere ar

  • Page 137 and 138:

    Setting Up the Mail HandlerTable 5-

  • Page 139 and 140:

    Starting the Mail HandlerStarting t

  • Page 141 and 142:

    Using Mail TemplatesGenerating Mail

  • Page 143 and 144:

    Using Mail TemplatesThe AR-Message-

  • Page 145 and 146:

    Additional Configuration File Optio

  • Page 147 and 148:

    Preparing the Electronic Mail Templ

  • Page 149 and 150:

    Preparing the Electronic Mail Templ

  • Page 151 and 152:

    Using Electronic Mail for Notificat

  • Page 153 and 154:

    Email Notifications For UNIX Server

  • Page 155 and 156:

    Setting Up a Windows NT Account3. C

  • Page 157 and 158:

    Additional Troubleshooting TipsAddi

  • Page 159 and 160:

    Chapter 6Dynamic Data ExchangeThis

  • Page 161 and 162:

    DDE Time-Out SettingsDDE Time-Out S

  • Page 163 and 164:

    Example Program and BufferThe name

  • Page 165 and 166:

    Example Program and Buffer// Get th

  • Page 167 and 168:

    Example Program and Buffer; // give

  • Page 169 and 170:

    Microsoft Excel ExampleThe key word

  • Page 171 and 172:

    Microsoft Excel ExampleFigure 6-2Sa

  • Page 173 and 174:

    Microsoft Excel ExampleFigure 6-4Sa

  • Page 175 and 176:

    Microsoft Word ExampleThere are fou

  • Page 177 and 178:

    Microsoft Word ExampleIn the sample

  • Page 179 and 180:

    Microsoft Word ExampleFigure 6-10Sa

  • Page 181 and 182:

    DDE and Reports2. Using a text edit

  • Page 183:

    DDE and ReportsThe following exampl

  • Page 187 and 188:

    Combining Other Application’s Fea

  • Page 190 and 191:

    6. Name the form OLE-Testform and s

  • Page 192 and 193:

    1. Select OLE Automation from the N

  • Page 194 and 195:

    ➤ Creating an OLE Automation Acti

  • Page 196 and 197:

    11. Click Add Action and save the a

  • Page 198 and 199:

    1. Select the last OLE Automation i

  • Page 200 and 201:

    1. Select the last OLE Automation i

  • Page 202 and 203:

    Ensure that you distribute the loca

  • Page 204 and 205:

    Linking to an ActiveX ControlCreati

  • Page 206 and 207:

    7-22 Action Request System Administ

  • Page 208 and 209:

    OverviewA production application is

  • Page 211 and 212:

    Changing Menu ListsChanging Menu Li

  • Page 213 and 214:

    Manual Changes4. Delete the product

  • Page 215 and 216:

    Chapter 9Technical EssaysThe techni

  • Page 217 and 218:

    Access Control ProcessTo support ce

  • Page 219 and 220:

    Overview4. Ensure that the Server I

  • Page 221 and 222:

    OverviewOverviewTo migrate your AR

  • Page 223 and 224:

    Overview4. Select all filters, acti

  • Page 225 and 226:

    Overview➤3. If desired, format th

  • Page 227 and 228:

    The MacroDetermine the field or fie

  • Page 229 and 230:

    Changing the Next Available ID for

  • Page 231 and 232:

    SQL DatabasesINFORMIX Database Exam

  • Page 233 and 234:

    Flat-File Databases2. In that file,

  • Page 235 and 236:

    The Request ID Field➤Changing the

  • Page 237 and 238:

    Changing Existing Request ID Field

  • Page 239 and 240:

    Changing Existing Request ID Field

  • Page 241 and 242:

    Changing Existing Request ID Field

  • Page 243 and 244:

    Changing Existing Request ID Field

  • Page 245 and 246:

    Chapter 10Using the Remedy ODBC Dri

  • Page 247 and 248:

    Using Crystal Reports with the AR S

  • Page 249 and 250:

    Selecting Report Fields in Crystal

  • Page 251 and 252:

    Understanding Considerations for Jo

  • Page 253 and 254:

    Appendix AAR System Configuration F

  • Page 255 and 256:

    ar.conf (ar.cfg)ar.conf (ar.cfg)Des

  • Page 257 and 258:

    ar.conf (ar.cfg)Crossref-Blank-Pass

  • Page 259 and 260:

    ar.conf (ar.cfg)Distributed-RPC-Soc

  • Page 261 and 262:

    ar.conf (ar.cfg)FullText-License-Ti

  • Page 263 and 264:

    ar.conf (ar.cfg)Max-Entries-Per-Que

  • Page 265 and 266:

    ar.conf (ar.cfg)Submitter-Mode:A co

  • Page 267 and 268:

    ardb.conf (ardb.cfg)ardb.conf (ardb

  • Page 269 and 270:

    nfy.conf (nfy.cfg)nfy.conf (nfy.cfg

  • Page 271 and 272:

    ar.iniThread-Log-File:Windows NT on

  • Page 273 and 274:

    Appendix BAR System Server Utilitie

  • Page 275 and 276:

    arcache (arcache.exe)-GSpecifies th

  • Page 277 and 278:

    arimportarimportDescriptionSynopsis

  • Page 279 and 280:

    armaild (armailex.exe)OptionsThe fo

  • Page 281 and 282:

    armaild (armailex.exe)Reply-Failure

  • Page 283 and 284:

    arreload (arreload.exe)arreload (ar

  • Page 285 and 286:

    arservdsd (UNIX Only)arservdsd (UNI

  • Page 287 and 288:

    arserverd (arserver.exe)arserverd (

  • Page 289 and 290:

    arservftd (UNIX Only)arservftd (UNI

  • Page 291 and 292:

    ntserverd (ntservd.exe) and ntsendd

  • Page 293 and 294:

    ntserverd (ntservd.exe) and ntsendd

  • Page 295 and 296:

    Glossaryaccess controlaccess permis

  • Page 297 and 298:

    Assignee Group groupattachmentbutto

  • Page 299 and 300:

    dynamic menuentryescalationA menu t

  • Page 301 and 302:

    guest userguidehidden fieldAn unreg

  • Page 303 and 304:

    angeread licensereal data typeRemed

  • Page 305 and 306:

    toolbartoolbar buttontrimtrim data

  • Page 307 and 308:

    IndexAaccess control, troubleshooti

  • Page 309 and 310:

    equests, submitting 5-11searching 5

  • Page 311 and 312:

    modifying 5-13searching via email 5

  • Page 313 and 314:

    multiprocessingadministering 3-2des

  • Page 315 and 316:

    Index-9

  • Page 317 and 318:

    Reader ResponseAction Request Syste

SoundStation 2 Nortel User/Admin Guide - Polycom
Sketches by Boz - Vol 2 - Penn State University
CPNI - GPG - Guide 2 - Implement Secure Architecture
ManageEngine Desktop Central :: Admin Guide
Guide to the Bach Flower Remedies
Path Forward for Triad Implementation - Federal Remediation ...
Aquarius Web Admin Guide
A Remediation Manager Reference Implementation - Build Security In
Guide to term sheets - BVCA admin
Admin Guide - VoIP software provider
flex-guide-to-legal-remedies-f
Vol. 14, No. 2 August 2006 - United States Association of Energy ...
Ecclesiastical Records, State of New York, Vol 2 - Ancestral Trackers
Implementing an Effective Academic Remediation Program: Results ...
Computer Music product Guide 09 Vol.2 - Roland
Download - State Coalition for Remediation of Drycleaners
to read. - NC State Alumni Association
to read. - NC State Alumni Association
The Talon Vol. 1 Issue 2 - Fall 2006 - Coppin State University ...
Vol. 7, No. 2 - Spring 2006 - Western Connecticut State University
Computer Music Products Guide 2009 Vol.2 (PDF)