The Domain Configuration Reference

From the Hawk Console web interface, on the Configure Domain window, you can configure a Hawk domain.

For more information about Hawk domains and their transport configuration, see TIBCO Hawk Installation, Configuration, and Administration guide.

 

Configure Domain Fields

Field

Description

Domain Type

Specify whether the Hawk domain to be registered is a regular domain or a proxy domain. Based on the domain type, the fields are displayed on the Configure Domain window. The values are:

proxy - For details about fields for the proxy domain type, see Configure Domain Fields for Proxy Domain Type.
regular - For details about fields for the regular domain type, see Configure Domain Fields for Regular Domain Type.

Domain Name

Specify the Hawk domain name.

Security Policy

Select the security policy that you want to apply to a domain:

Default: None
Trusted: Select this option to apply Trusted Security policy.
Trusted with Domains (only for Windows XP domains): Select this option for Microsoft Windows XP domains only.
Custom: To apply a custom security policy select this policy and enter the name of the custom security policy.

For more information about Hawk Trusted Security Model, see TIBCO Hawk Installation, Configuration, and Administration guide.

 

Configure Domain Fields for Proxy Domain Type

Field

Description

Host URL

URL of the domain that needs to be registered.

Username

User name required to log in to the domain.

Password

Password for the domain Username.

Secured Channel

Select the check box for connecting to the domain by using a secure channel.

 

Configure Domain Fields for Regular Domain Type

Field

Description

Transport

Type of transport that the Hawk domain is using. The following transport types are available:

TCP - TCP Transport for TIBCO Hawk
RV - TIBCO Rendezvous Transport
EMS - TIBCO Enterprise Message Service (EMS) Transport

Based on the transport type selected, transport configuration fields are displayed.

TCP Transport for TIBCO Hawk

Self Url

Unique socket address of the Hawk Console for connecting to the TCP Transport for TIBCO Hawk cluster.

Daemon Url

The socket address of the Cluster Manager acting as the seed node for the TCP Transport for TIBCO Hawk cluster.

Additional transport options

Select the check box to provide additional details for SSL based TCP transport for the domain. The following fields are displayed after you select the check box:

Key store

Absolute path of the keystore that contains the Monitoring Console certificate and key to be loaded while communicating with the Hawk domain. You must provide a custom keystore that has a password protected key.

Key store password

Password to access the keystore.

Key password

Password to access the private key.

Trust store

Absolute path to trust store which will be used to validate the Hawk component certificates while communicating with the Hawk domain. For example, the default trust store of LogLogic LMI: /loglogic/tomcat/conf/truststore

Trust store password

Password to access the trust store.

SSL protocol

This is an optional field. Only TLSv1.2 protocol is supported. If you want to specify a protocol in this field, then it must be TLSv1.2.

SSL Enabled Algorithms

This is an optional field.

Default value: TLS_RSA_WITH_AES_128_CBC_SHA

 

You can use LogLogic LMI certificates to establish a secure communication between the Hawk components and the Monitoring Console. If the Hawk components are already configured to use the different CA certificates then you must add them to the LogLogic LMI trust store. There is no need to restart the LogLogic LMI engines after enabling SSL configuration for the Hawk domain.

To add the Hawk CA certificates to the default LogLogic LMI trust store, perform the following steps on the UI of LogLogic LMI:

Note: Use the Trusted Certificate tab to create a trusted relationship between the Monitoring Console and the remote Hawk components.

1. On the top navigation bar, click Administration > SSL Certificate > Trusted Certificate.
2. Copy the Hawk component certificate and paste it in the Import Trusted Certificate text box.
3. Click the Import button.

TIBCO Rendezvous Transport

RV Service

Specify the service that the Rendezvous daemon uses to convey messages on this transport. You can specify the port number as the service to be used, for example, 7474.

RV Network

Specify the network that the Rendezvous daemon uses for all communications involving this transport. The network parameter consists of up to three parts, separated by semicolons: network, multicast groups, and send address.

RV Daemon

Specify the socket address of the Rendezvous daemon.

TIBCO Enterprise Message Service (EMS) Transport

EMS Server URL

Specify the location of the EMS server.

EMS Username

Specify the user name to login to the EMS server.

EMS Password

Specify the password for the EMS Username.

Additional transport options

Select the check box to provide additional details for SSL based EMS transport for the domain. The following fields are displayed after you select the check box:

EMS SSL Vendor
EMS SSL Trace
EMS SSL Trusted
EMS SSL Private Key
EMS SSL Expected Hostname
EMS SSL Password