Notice that most of the as-agent command line options map to a Runtime Context Variable of the same name, with “AS_” prepended. For example, the -metaspace command line option maps to the
AS_METASPACE Runtime Context Variable. These directly mapped Runtime Context Variables are used and behave in the same way as if they were specified as as-agent command line options.
The remote listen URL is used to specify the IP address and port on which an as-agent listens for connections from remote clients. When using ActiveSpaces Enabler, the AS_REMOTE_LISTEN Runtime Context Variable is used to specify the remote listen URL. If you specify a value for AS_REMOTE_LISTEN, then that same value is used for every as-agent started using that component configuration. You could run into port conflicts if these as-agents end up running on the same machine.
When running as-agents in the cloud, you might not be able to use AS_REMOTE_LISTEN unless you use Elastic IP addresses, because you will not know ahead of time the IP address of the engine an as-agent will be started on.
Therefore, in most cases you should use the Runtime Context Variable AS_REMOTE_LISTEN_PORT instead of
AS_REMOTE_LISTEN to compose the remote listen URL.
When you use AS_REMOTE_LISTEN_PORT, the remote listen URL is constructed as follows:
For each instance of a component that is started, AS_REMOTE_LISTEN_PORT increments to prevent port conflicts. You will notice that when you add
AS_REMOTE_LISTEN_PORT to your component configuration, it is set to a negative number. You must set this value to a positive port number for
AS_REMOTE_LISTEN_PORT to be recognized by the enabler.
If neither AS_REMOTE_LISTEN_PORT nor
AS_REMOTE_LISTEN is added to your component configuration, then a remote listen URL is not included when starting up as-agents using the component configuration.
AS_DISCOVERY runtime context variable is used to configure a specific discovery URL that all as-agents started using this component configuration use. See the
TIBCO ActiveSpaces Developer's Guide for more detailed information on discovery URLs.
If a component does not configure AS_DISCOVERY and another component on which it depends exports its
AS_DISCOVERY setting, the exported
AS_DISCOVERY setting is used by the component that did not configure its own
AS_DISCOVERY setting. This scenario is likely to occur when using TCP for discovery in the cloud. See the next section for more information.
AS_SHARED_DISCOVERY_DIR specifies a directory on a shared drive where each as-agent about to be started can register its listen address and port. When the number of as-agents that have registered reaches the amount specified in
AS_NUM_DISCOVERY_NODES, the ActiveSpaces Enabler uses the listen addresses and ports of those as-agents to calculate and publish the discovery URL in
AS_DISCOVERY Runtime Context Variable so that dependent components can use the dynamically determined discovery URL.
Use AS_TOTAL_DISCOVERY_NODES when you have multiple components in your stack and you only want a certain number of discovery nodes from each component to be used. In this case,
AS_NUM_DISCOVERY_NODES is used to determine the number of as-agents from each component to use as discovery nodes, and
AS_TOTAL_DISCOVERY_NODES is used to specify the total number of discovery nodes needed for the complete discovery URL.
then the setting from AS_NUM_DISCOVERY_NODES is used for
AS_TOTAL_DISCOVERY_NODES and the first two instances of this component are used to determine the discovery URL for the metaspace.
The runtime context variables AS_FIND_DISCOVERY_MAX and
AS_FIND_DISCOVERY_WAIT are used to control how long to wait for the discovery URL to be determined.
AS_FIND_DISCOVERY_MAX is the number of times the enabler loops looking for the total number of discovery nodes to have registered themselves.
AS_FIND_DISCOVERY_WAIT is the number of seconds the enabler waits before looking again for all of the discovery nodes.
The runtime context variable AS_SITE_NAME can be used to specify the ActiveSpaces site name. You can pass an argument
-site_name <string> to the as-agent.
The runtime context variable AS_SYSTEM_SEEDER is a setting, that allows you to set if the as-agent seeds any internal system spaces.You can add the variable
AS_SYSTEM_SEEDER to component, and configure its value. If you set its value to False, the non-leach as-agents do not seed the cross-site related system spaces.
AS_SECURITY_POLICY specifies the full path to the security policy file. This file needs to be accessible to each as-agent being started as a security domain controller for the metaspace. If a single component configuration is being used to start multiple as-agents which will act as security domain controllers running on different machines, a shared drive should be used to store the security policy file so that all instances of as-agents being deployed will have access to the security policy file as configured in the
AS_SECURITY_POLICY configuration setting.
AS_IDENTITY_PASSWORD specifies the policy's security domain's identity password if the identity is encrypted.
AS_SECURITY_TOKEN specifies the full path to the security token file. This must be accessible to each as-agent being started as a security domain requester for the metaspace. If a single component configuration is being used to start multiple as-agents which are security domain requesters running on different machines, a shared drive should be used to store the security token file. Then all instances of as-agents that are deployed, have access to the security token file as configured in the
AS_SECURITY_TOKEN configuration setting. The security token file can be uploaded to component as a content file. For more details refer
Security Runtime Context Variable.
AS_IDENTITY_PASSWORD specifies the policy's security domain's or the token's identity password if the identity is encrypted. When security domain controller is using user authentication, add below security runtime context variables to security domain requester component:
AS_AUTHENTICATION_DOMAIN specifies the name of the windows domain to log into. If local/ntlm account (as per the controller), “.” can be used. If not windows, it is ignored.
AS_AUTHENTICATION_USERNAME specifies the authentication username of the user account to be logged in as.
AS_AUTHENTICATION_PASSWORD specifies the authentication password of the user account to be logged in as or password for user account.
AS_AUTHENTICATION_KEYFILE specifies the pkcs12 keyfile location of the user to be logged in as (sasl/external x509 ldap auth). The key file can be uploaded to component as a content file. For more details refer
Security Runtime Context Variable.
AS_AUTHENTICATION_PASSWORD specifies the password of the pkcs12 key file.
A runtime context variable AS_HOARD_SUPPORT is added to the TIBCO Silver Fabric Enabler for ActiveSpaces.
You can use the Add from Enabler button on the Component Wizard and select AS_HOARD_SUPPORT from the enabler specific context variable drop-down list. Click
OK for the Hoard support.