+

Search Tips   |   Advanced Search

Core group bridge custom properties

Use these custom properties for advanced configurations for core groups and core groups that communicate with the core group bridge.

We can use the custom properties page to define the following core group bridge custom properties:


CGB_ENABLE_602_FEATURES

Deprecated feature: You should use the cgb.allowUndefinedBridges custom property instead of the CGB_ENABLE_602_FEATURES custom proeprty. The cgb.allowUndefinedBridges custom property performs the same functionality as the CGB_ENABLE_602_FEATURES custom property performed in Versions 6.0.x and 6.1.x.

If we have automation that adds this property to the core group bridge settings, this automation still works in this version of the product. However you should update the automation to add the cgb.allowUndefinedBridges custom property instead of the CGB_ENABLE_602_FEATURES custom property because the CGB_ENABLE_602_FEATURES custom property might not be recognized as a valid property in future releases. depfeat


cgb.allowUndefinedBridges

We can define the cgb.allowUndefinedBridges custom property on all of the access point groups in the configuration to have the capability to add core group bridge servers to the configuration without restarting the other servers in the configuration. After you enable this property, we can add a core group bridge server in one cell, without modifying the configuration in the other cell to include peer ports for the core group bridge server. The core group in the other cell automatically discovers the peer ports for the first cell when the first cell initiates communication with the second cell.

transition: The cgb.allowUndefinedBridges custom property performs the same functionality as the CGB_ENABLE_602_FEATURES custom property performed in Versions 6.0.x and 6.1.x. If we have automation that adds this property to the core group bridge settings, this automation still works in this version of the product. However you should update the automation to add the cgb.allowUndefinedBridges custom property instead of the CGB_ENABLE_602_FEATURES custom property because the CGB_ENABLE_602_FEATURES custom property might not be recognized as a valid property in future releases.

The existence of the cgb.allowUndefinedBridges property automatically enables this property. Therefore, we can set the value to any string value. Setting the value to false does not disable the property. To disable the property, remove it from the list of defined custom properties or change its name.

If we decide to use the cgb.allowUndefinedBridges custom property, decide which cell is the listener cell and which cell initiates communication with the other cells before you begin the configuration. The listener cell does not need to contain any peer access points or peer ports for the other cells in the configuration. For example, in a configuration containing a secured cell and an unsecured cell, configure the unsecured cell as the listener. The unsecured cell cannot access information about the secured cell. Configure the core group bridge service on the listener cell first.

Avoid trouble: Do not configure the cgb.allowUndefinedBridges custom property if we have already configured the FW_PASSIVE_MEMBER custom property. Any server for which the FW_PASSIVE_MEMBER custom property is configured cannot initiate contact with other systems in the configuration.gotcha


cgb.rebuild.waitTime

Use this property in a core group bridge configuration to specify, in seconds, the length of time that the core group bridge service waits for a core group bridge rebuild to complete.

This property is ignored unless we have specified the IBM_CS_HAM_PROTOCOL_VERSION=6.0.2.31 core group custom property for every core group that is part of the core group bridge configuration.


FW_PASSIVE_MEMBER

Use this property in a core group bridge configuration when there is a firewall between the core groups and the secure side of the firewall is configured to listen only.

Set the FW_PASSIVE_MEMBER custom property to make the bridge interfaces that are in the core group access point passive. Set the value on the core group access point that is on the secure side of the firewall so that the core group bridge interfaces listen for connections from the unsecured side of the firewall but do not initiate any connections. The servers on the secure side of the firewall are passive. The custom property should correspond to the defined firewall rules that allow connections from the unsecured region to the secure region only.

To configure this custom property, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name > Core group access points > core_group_access_point_name > Show detail > Custom properties > New in the console.

You also must set this custom property in any peer access points that refer to the core group access points configured with this custom property.

Figure 1. Configuring the FW_PASSIVE_MEMBER custom property

For example, server_A and server_B are configured in core_group_1. Server_C and server_D are configured in core_group_2. Core_group_2 is behind a firewall configured to listen only through the firewall. Core_group_1 is on the unsecured side of the firewall. Core_group_1 and core_group_2 can communicate with each other through an access point group. To configure server_C and server_D to be passive, perform the following steps:

  1. In the console for the cell containing core_group_2, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name > Core group access points > core_group_access_point_name > Show detail > Custom properties > New.

  2. Add the FW_PASSIVE_MEMBER custom property. Enter any value to enable the property.

  3. In the console for the cell containing core_group_1, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name> Peer access points > peer_access_point_name > Show detail > Custom properties > New. The peer access point you select should correspond to the core group access point for core_group_2.

  4. Add the FW_PASSIVE_MEMBER custom property. Enter any value to enable the property.

By configuring the FW_PASSIVE_MEMBER custom property, you configured the servers on the secured side of the firewall, server_C and server_D, to be passive. These servers listen for connections from the other side of the firewall but do not initiate any connections to the unsecured side of the firewall.


IBM_CS_LS_DATASTACK_MEG

Eliminate a condition that is reported by a message that is displayed repeatedly in the SystemOut.log file.

This topic references one or more of the application server log files. As a recommended alternative, we can configure the server to use the High Performance Extensible Logging (HPEL) log and trace infrastructure instead of using SystemOut.log , SystemErr.log, trace.log, and activity.log files on distributed and IBM i systems. We can also use HPEL in conjunction with the native z/OS logging facilities. If we are using HPEL, we can access all of the log and trace information using the LogViewer command-line tool from the server profile bin directory. See the information about using HPEL to troubleshoot applications for more information on using HPEL.

We might see a message similar to the following message in the SystemOut.log file multiple times:

If the member IP address is in the format of a dotted decimal IP address and port, we can eliminate these messages by increasing the amount of memory that is allocated to the core stack used for core group communication. Increase the value of this property until you no longer see the message in the SystemOut.log file. Because the memory is dynamically allocated, setting a larger stack size than we need does not cause memory problems.

Set the custom property on the bridge interface containing the particular member that is in the messages. We can also set the custom property on the access point group or the core group access point. If we set the value on the access point group or core group access point, all the bridge interfaces that are in the particular group are affected. If we set the value on an individual bridge interface and an access point group or core group access point, the value set for the bridge interface is used. If the value is set on both an access point group and a core group access point, the value set for the core group access point is used.

To configure this custom property...

  1. Set the custom property in the console.

    • To set the custom property on a bridge interface, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name > Core group access points > core_group_access_point_name > Show detail > Bridge interfaces > bridge_interface_name> Custom properties > New .

    • To set the custom property on a core group access point, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name > Core group access points > core_group_access_point_name > Show detail > Custom properties > New.

    • To set the custom property on an access point group, click Servers > Core Groups > Core group bridge settings > Access point groups > access_point_group_name > Show detail > Custom properties > New.

  2. Add the IBM_CS_LS_DATASTACK_MEG custom property. Enter a value that is greater than the default value of 5 megabytes.

Units Megabytes
Default 5


Related tasks

  • Configure the core group bridge service
  • Configure the core group bridge between core groups that are in different cells
  • Use High Performance Extensible Logging to troubleshoot applications