Spotfire Service for R
The Spotfire Service for R provides Spotfire clients with the ability to execute open-source R code, using the user-installed R engine, on the R service node.
Spotfire Service for R is required to execute data functions in Spotfire files from Spotfire Automation Services and Spotfire Web Player, because those services do not have R engines.
The Spotfire Service for R itself is running the service as the same user account as is running the node manager on which the service runs. See Node Manager.
By default, R scripts executed by the Spotfire Service for R on behalf of its users are executed in a different execution context, as explained here.
Python service component | Default | Description |
---|---|---|
Service account | NT Authority\System or
spotfire (Linux)
|
Default:
NT Authority\System or
root (Linux)
|
Log files | <node manager
installation>/logs
See the topic Service Logs in the Spotfire® Service for R Installation and Administration guide for more information. |
Name | Default Port and Protocol | Function Description | Secure/Encrypted |
---|---|---|---|
Communication port | Next available general purpose
950<x>/tcp . (For example,
9502/tcp, or 9503/tcp, and so on, depending on the other data function services
installed.)
|
For secure (HTTPS) internal communication. Cannot be accessed directly. | Yes |
R engine ports |
63001/tcp ->
64000/tcp
|
Host-internal communication between Spotfire Service for R and the R engine. | No |
- Settings and Configuration Tasks for Spotfire Service for R
You can use these settings to limit the capabilities of running R data functions. - Script Security for R
The following mechanisms control security of Spotfire Service for R and to prevent users from running malicious scripts on the server.
- Settings and Configuration Tasks for Spotfire Service for R
You can use these settings to limit the capabilities of running R data functions. - Script Security for R
The following mechanisms control security of Spotfire Service for R and to prevent users from running malicious scripts on the server.