Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • --url
  • --user
    • Specifies the user account for login to JOC Cockpit. If JS7 - Identity Services are available for Client authentication certificates that are specified with the --client-cert and --client-key options then their common name (CN) attribute has to match the user account.
    • If a user account is specified then a password can be specified using the --password option or interactive keyboard input can be prompted using the -p switch.
  • --password
    • Specifies the password used for the account specified with the --user option for login to JOC Cockpit.
    • Password input from the command line is considered insecure.
      • Consider use of the -p switch offering a secure option for interactive keyboard input.
      • Consider use of the encrypt command to encrypt a password: ./deploy-workflowcontroller.sh encrypt --in=root --cert=encrypt.crt.
        • The encryption result will include the prefix enc: followed by the encrypted symmetric key, initialization vector and encrypted secret separated by space.
        • If an encrypted password is specified, then it will be decrypted using the Private Key file: ./deploy-workflowcontroller.sh <command> --password="enc:BF8J8KP7TPlxy..." --key=encrypt.key.
  • --ca-cert
    • Specifies the path to a file in PEM format that holds the Root CA Certificate and optionally Intermediate CA Certificates to verify HTTPS connections to JOC Cockpit.
  • --client-cert
    • Specifies the path to a file in PEM format that holds the Client Certificate if HTTPS mutual authentication is used..
  • --client-key
    • Specifies the path to a file in PEM format that holds the Client Private Key if HTTPS mutual authentication is used..
  • --timeout
    • Specifies the maximum duration for requests to the JS7 REST Web Service. Default: 60 seconds.
  • --controller-id
    • Specifies the identification of the Controller.
  • --controller-url
    • When used with the check command, specifies the protocol, host and optionally port of the Controller instance to which the connection is tested.
  • --primary-url
    • When used with the register command, specifies the protocol, host and optionally port of a Standalone Controller or Primary Controller instance in a cluster. The JOC Cockpit will connect to the Controller instance using the URL specified.
    • When used with the store-agent command for an Agent Cluster, specifies the protocol, host and optionally port of the Primary Director Agent. The Controller will connect to the Director Agent instance using the URL specified.
  • --primary-cluster-url
    • Specifies the URL used by the Pirmary Controller instance to connect to the Secondary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the --primary-url option used for access from JOC Cockpit to the Primary Controller instance.
    • .The option can be used for example if a proxy service is active between Controller instances.
  • --primary-title
    • When used with the register command specifies the title of a Standalone Controller or Primary Controller instance.
    • When used with the store-agent command specifies the title of the Primary Director Agent in an Agent Cluster.
  • --primary-subagent-id
    • When used with the store-agent command specifies the identifier of the Primary Director Agent in an Agent Cluster.
  • --secondary-url
    • When used with the register command, specifies the protocol, host and optionally port of a Secondary Controller instance in a cluster. The JOC Cockpit will connect to the Controller instance using the URL specified.
    • When used with the store-agent command for an Agent Cluster specifies the protocol, host and optionally port of the Secondary Director Agent. The Controller will connect to the Director Agent instance using the URL specified.
  • --secondary-cluster-url
    • Specifies the URL used by the Secondary Controller instance to connect to the Primary Controller instance in a cluster. The URL can be specified if it is different from the value specified with the --secondary-url option used for access from JOC Cockpit to the Secondary Controller instance.
    • .The option can be used for example if a proxy service is active between Controller instances.
  • --secondary-title
    • When used with the register command, specifies the title of the Secondary Controller instance.
    • When used with the store-agent command, specifies the title of the Secondary Director Agent in an Agent Cluster.
  • --secondary-subagent-id
    • When used with the store-agent command, specifies the identifier of the Secondary Director Agent in an Agent Cluster.
  • --file
    • Specifies the location of an archive file that is used with export-agent and import-agent commands.
    • On export an existing archive file will be overwritten.
  • --format
    • Specifies the format of the archive file indicated with the --file option.
    • The format can be one of ZIP or TAR_GZ. Default: ZIP. The JS7 can process archive files in .zip format on Unix.
  • --agent-id
    • The Agent ID specifies a unique identifier for a Standalone Agent or Agent Cluster that cannot be changed later on.
    • Agents are identified from their Agent ID.
  • --agent-name
    • The Agent name specifies a unique identifier for a Standalone Agent or Agent Cluster that can be changed later on..
  • --agent-url
    • When used with the store-agent command, the option specifies the protocol, host and optionally port of a Standalone Agent.
  • --title
    • Specifies the title of a Controller, Agent or Subagent Cluster with related register, store-agent and store-cluster commands.
  • --alias
    • When used with the store-agent command, the option specifies alternative names for a Standalone Agent or Agent Cluster. Any number of alias names can be specified separated by comma.
    • Alias names can be used for assignment of Agents to jobs.
  • --process-limit
    • Specifies the maximum number of processes running in parallel in a Standalone Agent or Agent Cluster.
    • In an Agent Cluster the maximum number of processes is counted for all Subagents.
  • --subagent-id
    • When used with the store-subagent and delete-subagent commands, the option specifies the related Subagent.
    • When used with the store-cluster command, any number of Subagent IDs can be specified separated by comma. This allows to specify Subagents that are members of a Subagent Cluster.
  • --subagent-url
    • The option is used with the store-subagent command to specify the proocol, host and port by which the Subagent can be reached.
  • --role
    • When used with the store-subagent command, the Subagent's role can be specified. In an Agent Cluster we find the following roles:
      • Primary Director
      • Secondary Director
      • No Director
    • The option accepts the values primary, secondary, no. Default: no.
  • --cluster-id
    • Specifies the unique identifier of a Subagent Cluster. The Subagent Cluster ID cannot be changed after the Subagent Cluster is created.
    • The option is used with the store-cluster , delete-cluster, deploy-cluster and revoke-cluster commands.
  • --priority
    • Specifies an active-passive or active-active Subagent Cluster. The option accepts one fo the values first (active-passive) or next (active-active). Default: first.
    • The option is used with the store-cluster command.
  • --key
    • When used with the decrypt command, specifies the path to a file that holds the Private Key used for decrypting in PEM format.
  • --cert
    • When used with the encrypt command, specifies the path to a file that holds the CA signed or self-signed X.509 Certificate. Alternatively the path to a file holding the Public Key can be specified. The Certificate is expected in PEM format.
    • For encryption the Certificate must match the Private Key used for later decryption specified with the --key option.
  • --key-password
    • When used with the decrypt command, specifies the password for access to the key file using the --key option.
    • Password input from the command line is considered insecure.
      • Consider use of the -k switch or more elaborate mechanisms, for example by temporarily populating the system keystore form a security key such as a YubiKey® or similar.
      • Consider use of encrypted passwords as explained with the --password option.
  • --in
    • When used with the encrypt and decrypt commands, specifies the input value that should be encrypted or decrypted.,
    • One of the options --in or --infile can be specified.
  • --infile
    • When used with the encrypt and decrypt commands, specifies the path to the input file that should be encrypted/decrypted.
    • One of the options --in or --infile can be specified. This option requires use of the --outfile option.
  • --outfile
    • When used with the encrypt command, specifies the path to the output file that will be created holding the encrypted content of the input file.
    • When used with the decrypt command, specifies the path to the output file that will be created holding the decrypted content of the input file.
    • The option is required if the --infile option is specified
  • --java-home
    • When used with the encrypt and decrypt commands or with encrypted passwords, specifies the Java home directory. By default the JAVA_HOME environment variable is used to determine the location of Java.
    • The Java home directory is the top-level directory of a Java installation. The directory includes the bin sub-directory and java executable.
  • --java-lib
    • When used with the encrypt and decrypt commands or with encrypted passwords, a number of Java libraries are required to perform encryption/decryption.
    • The Java libraries are expected in the lib sub-directory of the JS7 Unix Shell CLI. Default: ./lib.
  • --audit-message
    • Specifies a message that is made available to the Audit Log.
    • Specification of Audit Log messages can be enforced on a per user basis and for a JS7 environment.
  • --audit-time-spent
    • Specifies the time spent to perform an operation which is added to the Audit Log.
    • The option can be specified if the --audit-message option is used.
  • --audit-link
    • Specifies a link (URL) which is added to the Audit Log.
    • The option can be specified if the --audit-message option is used.
  • --log-dir
    • If a log directory is specified then the script will log information about processing steps to a log file in this directory.
    • File names are created according to the pattern: deploy-workflowcontroller.<yyyy>-<MM>-<dd>T<hh>-<mm>-<ss>.log
    • For example: deploy-workflowcontroller.2022-03-19T20-50-45.log

Anchor
switches
switches
Switches

...