Page History
...
--url
- Specifies the URL by which JOC Cockpit is accessible using
<http|https>://<host>:<port>
. - Example: http://centostest-primary.sos:4446
- Example: https://centostest-primary.sos:4443
- Specifies the URL by which JOC Cockpit is accessible using
--user
- Specifies the user account for login to JOC Cockpit. If JS7 - Identity Services are available for Client authentication certificates that are specified with the
--client-cert
and--client-key
options then their common name (CN) attribute has to match the user account. - If a user account is specified then a password can be specified using the
--password
option or interactive keyboard input can be prompted using the-p
switch.
- Specifies the user account for login to JOC Cockpit. If JS7 - Identity Services are available for Client authentication certificates that are specified with the
--password
- Specifies the password used for the account specified with the
--user
option for login to JOC Cockpit. - Password input from the command line is considered insecure.
- Consider use of the
-p
switch offering a secure option for interactive keyboard input. - Consider use of the
encrypt
command to encrypt a password:./deploy-workflowcontroller.sh encrypt --in=root --cert=encrypt.crt
.- The encryption result will include the prefix
enc:
followed by the encrypted symmetric key, initialization vector and encrypted secret separated by space. - If an encrypted password is specified, then it will be decrypted using the Private Key file:
./deploy-workflowcontroller.sh <command> --password="enc:BF8J8KP7TPlxy..." --key=encrypt.key
.
- The encryption result will include the prefix
- Consider use of the
- Specifies the password used for the account specified with the
--ca-cert
- Specifies the path to a file in PEM format that holds the Root CA Certificate and optionally Intermediate CA Certificates to verify HTTPS connections to JOC Cockpit.
--client-cert
- Specifies the path to a file in PEM format that holds the Client Certificate if HTTPS mutual authentication is used..
--client-key
- Specifies the path to a file in PEM format that holds the Client Private Key if HTTPS mutual authentication is used..
--timeout
- Specifies the maximum duration for requests to the JS7 REST Web Service. Default:
60
seconds.
- Specifies the maximum duration for requests to the JS7 REST Web Service. Default:
--controller-id
- Specifies the identification of the Controller.
--controller-url
- When used with the
check
command, specifies the protocol, host and optionally port of the Controller instance to which the connection is tested.
- When used with the
--primary-url
- When used with the
register
command, specifies the protocol, host and optionally port of a Standalone Controller or Primary Controller instance in a cluster. The JOC Cockpit will connect to the Controller instance using the URL specified. - When used with the
store-agent
command for an Agent Cluster, specifies the protocol, host and optionally port of the Primary Director Agent. The Controller will connect to the Director Agent instance using the URL specified.
- When used with the
--primary-cluster-url
- Specifies the URL used by the Pirmary Controller instance to connect to the Secondary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the
--primary-url
option used for access from JOC Cockpit to the Primary Controller instance. - .The option can be used for example if a proxy service is active between Controller instances.
- Specifies the URL used by the Pirmary Controller instance to connect to the Secondary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the
--primary-title
- When used with the
register
command specifies the title of a Standalone Controller or Primary Controller instance. - When used with the
store-agent
command specifies the title of the Primary Director Agent in an Agent Cluster.
- When used with the
--primary-subagent-id
- When used with the
store-agent
command specifies the identifier of the Primary Director Agent in an Agent Cluster.
- When used with the
--secondary-url
- When used with the
register
command, specifies the protocol, host and optionally port of a Secondary Controller instance in a cluster. The JOC Cockpit will connect to the Controller instance using the URL specified. - When used with the
store-agent
command for an Agent Cluster specifies the protocol, host and optionally port of the Secondary Director Agent. The Controller will connect to the Director Agent instance using the URL specified.
- When used with the
--secondary-cluster-url
- Specifies the URL used by the Secondary Controller instance to connect to the Primary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the
--secondary-url
option used for access from JOC Cockpit to the Secondary Controller instance. - .The option can be used for example if a proxy service is active between Controller instances.
- Specifies the URL used by the Secondary Controller instance to connect to the Primary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the
--secondary-title
- When used with the
register
command, specifies the title of the Secondary Controller instance. - When used with the
store-agent
command, specifies the title of the Secondary Director Agent in an Agent Cluster.
- When used with the
--secondary-subagent-id
- When used with the
store-agent
command, specifies the identifier of the Secondary Director Agent in an Agent Cluster.
- When used with the
--file
- Specifies the location of an archive file that is used with
export-agent
andimport-agent
commands. - On export an existing archive file will be overwritten.
- Specifies the location of an archive file that is used with
--format
- Specifies the format of the archive file indicated with the
--file
option. - The format can be one of
ZIP
orTAR_GZ
. Default:ZIP
. The JS7 can process archive files in .zip format on Unix.
- Specifies the format of the archive file indicated with the
--agent-id
- The Agent ID specifies a unique identifier for a Standalone Agent or Agent Cluster that cannot be changed later on.
- Agents are identified from their Agent ID.
--agent-name
- The Agent name specifies a unique identifier for a Standalone Agent or Agent Cluster that can be changed later on..
--agent-url
- When used with the
store-agent
command, the option specifies the protocol, host and optionally port of a Standalone Agent.
- When used with the
--title
- Specifies the title of a Controller, Agent or Subagent Cluster with related
register
,store-agent
andstore-cluster
commands.
- Specifies the title of a Controller, Agent or Subagent Cluster with related
--alias
- When used with the
store-agent
command, the option specifies alternative names for a Standalone Agent or Agent Cluster. Any number of alias names can be specified separated by comma. - Alias names can be used for assignment of Agents to jobs.
- When used with the
--process-limit
- Specifies the maximum number of processes running in parallel in a Standalone Agent or Agent Cluster.
- In an Agent Cluster the maximum number of processes is counted for all Subagents.
--subagent-id
- When used with the
store-subagent
anddelete-subagent
commands, the option specifies the related Subagent. - When used with the
store-cluster
command, any number of Subagent IDs can be specified separated by comma. This allows to specify Subagents that are members of a Subagent Cluster.
- When used with the
--subagent-url
- The option is used with the
store-subagent
command to specify the proocol, host and port by which the Subagent can be reached.
- The option is used with the
--role
- When used with the
store-subagent
command, the Subagent's role can be specified. In an Agent Cluster we find the following roles:- Primary Director
- Secondary Director
- No Director
- The option accepts the values
primary
,secondary
,no
. Default:no
.
- When used with the
--cluster-id
- Specifies the unique identifier of a Subagent Cluster. The Subagent Cluster ID cannot be changed after the Subagent Cluster is created.
- The option is used with the
store-cluster
,delete-cluster
,deploy-cluster
andrevoke-cluster
commands.
--priority
- Specifies an active-passive or active-active Subagent Cluster. The option accepts one fo the values
first
(active-passive) ornext
(active-active). Default:first
. - The option is used with the
store-cluster
command.
- Specifies an active-passive or active-active Subagent Cluster. The option accepts one fo the values
--key
- When used with the
decrypt
command, specifies the path to a file that holds the Private Key used for decrypting in PEM format.
- When used with the
--cert
- When used with the
encrypt
command, specifies the path to a file that holds the CA signed or self-signed X.509 Certificate. Alternatively the path to a file holding the Public Key can be specified. The Certificate is expected in PEM format. - For encryption the Certificate must match the Private Key used for later decryption specified with the
--key
option.
- When used with the
--key-password
- When used with the
decrypt
command, specifies the password for access to the key file using the--key
option. - Password input from the command line is considered insecure.
- Consider use of the
-k
switch or more elaborate mechanisms, for example by temporarily populating the system keystore form a security key such as a YubiKey® or similar. - Consider use of encrypted passwords as explained with the
--password
option.
- Consider use of the
- When used with the
--in
- When used with the
encrypt
anddecrypt
commands, specifies the input value that should be encrypted or decrypted., - One of the options
--in
or--infile
can be specified.
- When used with the
--infile
- When used with the
encrypt
anddecrypt
commands, specifies the path to the input file that should be encrypted/decrypted. - One of the options
--in
or--infile
can be specified. This option requires use of the--outfile
option.
- When used with the
--outfile
- When used with the
encrypt
command, specifies the path to the output file that will be created holding the encrypted content of the input file. - When used with the
decrypt
command, specifies the path to the output file that will be created holding the decrypted content of the input file. - The option is required if the
--infile
option is specified
- When used with the
--java-home
- When used with the
encrypt
anddecrypt
commands or with encrypted passwords, specifies the Java home directory. By default theJAVA_HOME
environment variable is used to determine the location of Java. - The Java home directory is the top-level directory of a Java installation. The directory includes the
bin
sub-directory andjava
executable.
- When used with the
--java-lib
- When used with the
encrypt
anddecrypt
commands or with encrypted passwords, a number of Java libraries are required to perform encryption/decryption. - The Java libraries are expected in the
lib
sub-directory of the JS7 Unix Shell CLI. Default:./lib
.
- When used with the
--audit-message
- Specifies a message that is made available to the Audit Log.
- Specification of Audit Log messages can be enforced on a per user basis and for a JS7 environment.
--audit-time-spent
- Specifies the time spent to perform an operation which is added to the Audit Log.
- The option can be specified if the -
-audit-message
option is used.
--audit-link
- Specifies a link (URL) which is added to the Audit Log.
- The option can be specified if the -
-audit-message
option is used.
--log-dir
- If a log directory is specified then the script will log information about processing steps to a log file in this directory.
- File names are created according to the pattern:
deploy-workflowcontroller.<yyyy>-<MM>-<dd>T<hh>-<mm>-<ss>.log
- For example:
deploy-workflowcontroller.2022-03-19T20-50-45.log
Anchor | ||||
---|---|---|---|---|
|
...
Overview
Content Tools