rvrd
Command
Syntax
rvrd -store filename
[-http [ip_address:]http_port]
[-https [ip_address:]https_port]
[-http-only]
[-https-only]
[-no-http]
[-license url]
[-idle]
[-listen [socket_protocol:|ip_address:]tcp_port]
[-no-permanent]
[-no-lead-wc | -lead-wc]
[-no-multicast]
[-reliability time]
[-max-consumer-buffer size]
[-rxc-max-loss loss]
[-rxc-recv-threshold bps]
[-rxc-send-threshold bps]
[-compress-level level]
[-reuse-port inbox_port]
[-logfile log_filename]
[-log-max-size size]
[-log-max-rotations n]
[-log-config config_log_filename]
[-foreground]
[-udp-ttl hops]
[-tls-min-proto-version version]
[-tls-max-proto-version version]
[-tls-ciphers string1:string2:stringN]
[-tls-ciphersuites name1:name2:nameN]
[-no-wc]
Purpose
The routing daemon efficiently connects Rendezvous programs on distant IP networks, so that messages flow between them as if within a single network. Nonetheless, communicating programs remain decoupled from internetwork addresses and other details.
Remarks
The rvrd process subsumes the behavior of rvd, so it is not necessary to run a separate rvd process on computers that run rvrd. We recommend against running both components on the same computer.
rvrd must run on a host computer with a permanent IP address. For example, a temporary address assigned by DHCP is invalid.
Command Line Parameters
|
Parameter |
Description |
||||||
|
|
This file contains the routing table entry and parameters that configure
Important The store file requires physical security safeguards and operating system protection. Keep it in a location that is accessible only to the system administrators who maintain it. See also Store Files. |
||||||
|
|
The browser administration interface accepts connections on this HTTP or HTTPS port. Permit administration access only through the network interface specified by this IP address. To limit access to a browser on the When the IP address is absent, the daemon accepts connections through any network interface on the specified HTTP or HTTPS port. If the explicitly specified HTTP port is already occupied, the program exits. If the explicitly specified HTTPS port is already occupied, the program selects an ephemeral port. When the When the In all cases, the program prints (in its start banner and log file) the actual HTTP and HTTPS ports where it accepts browser administration interface connections. |
||||||
|
|
Disable HTTPS (secure) connections, leaving only an HTTP (non-secure) connection. |
||||||
|
|
Disables HTTP (non-secure) connections, leaving only an HTTPS (secure) connection. |
||||||
|
|
Disables all HTTP and HTTPS connections, overriding |
||||||
-license url
|
The URL to a TIBCO Activation Service in the form of Note:
Production environments must use a TIBCO Activation Service for TIBCO product activation. Using a license file to configure the Rendezvous daemon is only supported for development environments. The URL format for a license file is
file://pathname.
|
||||||
|
|
Starts When absent, start |
||||||
|
|
The IP address specifies the network interface through which this daemon accepts TCP connections. To bar connections from remote programs, specify IP address When the IP address is absent, the daemon accepts connections from any computer on the specified TCP port. When this parameter is entirely absent, the default behavior is to accept connections from any computer on TCP port 7500. For more detail about the choreography that establishes conduits, see Daemon Client Socket—Establishing Connections. Warning This parameter does not correspond to the |
||||||
|
|
If present (or when If not present, This parameter is not available with IPM. |
||||||
|
|
Sending to subjects with lead wildcards (for example, When When |
||||||
|
When present, the daemon disables multicast (and broadcast) communication. For details, see Disabling Multicast. |
|||||||
|
|
Rendezvous daemons compensate for brief network failures by retaining outbound messages, and retransmitting them upon request. This parameter is one of several ways to control the message reliability interval. For a complete discussion the concept of reliability, the various ways to control it, the interaction among those ways, and reasonable values, see Reliability and Message Retention Time. If this parameter is absent, If this parameter is present, |
||||||
|
|
When present, the daemon enforces this upper bound (in bytes) on each consumer buffer (the queue of messages for a client transport). When data arrives faster than the client consumes it, the buffer overflows this size limit, and the daemon discards the oldest messages to make space for new messages. The client transport receives a When absent or zero, the daemon does not enforce a size limit on the consumer buffer. (However, a 60-second time limit on messages still limits buffer growth, independently of this parameter.) |
||||||
|
|
These three parameters configure the retransmission control (RXC) feature, which suppresses retransmission requests from chronically-lossy receivers. (This feature applies to the If
For a complete explanation, see Retransmission Control . |
||||||
|
|
When present, this option guides the trade-off between data compression and data latency. Acceptable values are integers in the range
This option applies across all neighbor interfaces (it is not possible to specify different values for each neighbor). Furthermore, it applies only to neighbor interfaces that are configured for data compression without TLS. When absent, the default behavior is equivalent to |
||||||
|
|
When present, other daemons on the same host computer can reuse service ports. When absent, other daemons cannot reuse a service port that is in use by this daemon. For correct operation, all the daemons that use a common service port on a host computer must specify this option. For background and details, see Reusing Service Ports. The Furthermore, you must not use the |
||||||
|
|
Sends log output to this file. When absent, the default is |
||||||
|
|
When present, activates the log rotation regimen (see Log Rotation). When you specify these options, you must also specify
|
||||||
|
|
Sends duplicate log output to this file for log items that record configuration changes. The daemon never rotates nor removes this special log file. Instead, this file remains as a record of all configuration changes. When absent, the default is |
||||||
|
|
Available only on UNIX platforms. When present, When absent, |
||||||
|
|
UDP TTL (Available only with TRDP daemons.) When present, the daemon sends UDP packets with a TTL value of When absent, the default TTL is 16 hops. |
||||||
|
|
Sets the minimum or maximum supported protocol versions for the ctx using OpenSSL calls |
||||||
|
|
Sets the list of available ciphers (TLSv1.2 and earlier) using OpenSSL call |
||||||
|
|
Configures the available TLSv1.3 ciphersuites using OpenSSL call |
||||||
|
|
Silently drops any messages published by clients that contain any wild card tokens. |
||||||
-pwd-hash password-string
|
Prints a base64-encoded PBKDF2 hash password string before exiting. Rendezvous daemons do not store passwords, they convert the plain text passwords into a secure hash first. Provides a secure hash instead of a plain-text Administrator password in the XML/JSON configuration and you can remove Rendezvous daemons from the chain of custody of the password. Secure hashes are one-way, and passwords cannot be recovered from the secure hash. Ensure that you securely store the original password. |