Hawk Install Configure
Hawk Install Configure
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
TIBCO Hawk Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Other TIBCO Product Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Third Party Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
How to Contact TIBCO Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Figures
Tables
Preface
This manual covers the installation of the TIBCO Hawk™ software on Microsoft
Windows 2000, Microsoft Windows XP, Solaris, HP-UX, AIX, Compaq TRU64
UNIX, Linux, and OS/400. Custom configuration is also covered in this manual.
This manual assumes you are familiar with TIBCO Rendezvous architecture and
the concepts of system monitoring.
Topics
Related Documentation
For comments or problems with this manual or the software it addresses, please
contact TIBCO Support Services as follows.
• For an overview of TIBCO Support Services, and information about getting
started with TIBCO Product Support, visit this site:
http://www.tibco.com/services/support/default.jsp
• If you already have a valid maintenance or support contract, visit this site:
http://support.tibco.com
Entry to this site requires a username and password. If you do not have a
username, you can request one.
This chapter gives a basic overview of the TIBCO Hawk monitoring system, its
components, and the components supported on the various platforms. Not all
components run on all platforms, so determine what is supported on your system
before beginning installation and configuration.
This book provides instructions for installing the TIBCO Hawk software on each
software platform, as well as how to configure the software for specific
applications after installation.
Topics
The TIBCO Hawk monitoring system consists of the following main software
components.
Installing TIBCO Hawk on Windows updates the system path to include TIBCO
Rendezvous 7.2. If you have TIBCO applications installed that use Java, and if
those applications are using the TIBCO Rendezvous bundled in TRA 5.1.x
(instead of a separately installed TIBCO Rendezvous), the applications will not be
able to start the TIBCO Rendezvous daemon, rvd.exe, after you install TIBCO
Hawk.
To allow the previous TIBCO applications to start rvd.exe again, remove the
TIBCO Rendezvous 7.2 directory from the system path (for example,
c:\tibco\tibrv\bin). This will not affect the operation of TIBCO Hawk.
TIBCO applications that use Java include TIBCO Adapter 4.x, TIBCO Designer
4.x, TIBCO BusinessWorks 5.x, TIBCO BusinessWorks 5.x, and others.
Topics
Installer Overview
Installation Directory
If this is the first TIBCO software product you are installing on the system, you
can specify the installation directory where TIBCO Hawk will be installed. On
Microsoft Windows, the default installation directory is C:\tibco\hawk. On
UNIX, the default installation directory is /opt/tibco.
If you already have a TIBCO 5.x product on your machine and you install TIBCO
Hawk, the installer will automatically select the TIBCO 5.x product installation
directory. You cannot choose a different location. If you wish to install TIBCO
Hawk in a different location, you must first completely uninstall all TIBCO 5.x
products from the machine.
install-path
The directory into which you install TIBCO Hawk is referred to in this
documentation as install-path.
For example, if you accept the default installation path on Windows, install-path is
C:\Tibco\hawk.
The uninstaller removes all files that were installed as a part of TIBCO Hawk
installation, even if those files were modified by the user or the application. Files
that were created by the user are not deleted or modified.
Make sure you have a backup of user-modified files before proceeding with the
uninstallation.
Product Dependencies
TIBCO Designer and TIBCO Runtime Agent (TRA) are dependent on TIBCO
Hawk being present on the machine. If you have TIBCO Designer or TRA
installed on your machine, you will need to uninstall them before uninstalling
TIBCO Hawk, in the following order:
1. Uninstall TIBCO Runtime Agent (tra-install-path\version\uninst) and any of its
product dependencies.
2. Uninstall TIBCO Hawk (hawk-install-path\hawk\uninst).
If you do not have TIBCO Designer or TRA installed on your machine, you can
uninstall TIBCO Hawk without prerequisite.
Uninstallation Instructions
Microsoft Windows
Uninstall the product(s) in the order shown above, using one of the following
methods:
• Click Start>Programs>TIBCO>TIBCO Runtime Agent>Uninstall.
• Use Add/Remove Programs from the Control Panel.
• Navigate to the _uninst directory located in each of the folders listed above
and invoke the Tibuninstall.exe program.
UNIX Systems
Uninstall the product(s) in the order shown above, by navigating to the _uninst
directory located in each directory shown and invoke the Tibuninstall.bin
program.
The installer maintains an installation registry consisting of two files with the
prefix vpd, which stands for Vital Product Database.
The location of the registry varies by platform. This section explains where the
registry files are located on each platform.
Do not edit, modify, move, rename, or delete any of the registry vpd files.
Installation History
The installer creates a file called TIBCOInstallationHistory.xml. Each time an
installation or uninstallation is performed, entries are appended to the file. The
installer uses the registry file during subsequent installations.
The installation history file is created in the same directory as the installation
registry.
The installer searches for and uses only JRE 1.3.1. It will not use a different version
even if the other version exists on the system or is specified using an environment
variable or command-line option.
Registry \HKEY_LOCAL_MACHINE\SOFTWARE\
JavaSoft\Java Runtime Environment\
1.3\JavaHome \HKEY_LOCAL_MACHINE\SOFTWARE\
JavaSoft\ Java DevelopmentKit\1.3\JavaHome
Path /usr/jre1.3.1
/usr/java1.3.1
/usr/jdk1.3.1
/opt/jre1.3.1
/opt/java1.3.1
/opt/jdk1.3.1
Path /opt/java1.3
/opt/java1.3/jre
Path /usr/jdk_base
/usr/jdk_base
/usr/java131
/usr/java131
Path /usr/jre1.3
/usr/local/jre1.3
/opt/jre1.3
/opt/j2re1.3.1
This chapter explains how to install and uninstall TIBCO Hawk on computers
running the Microsoft Windows 2000 or XP operating system. Information in this
chapter applies to all three platforms unless otherwise noted.
Topics
Installation Prerequisites
OS Hardware
Microsoft Windows 2000 with Intel Pentium
Service Pack 3 (build 2195)
User Privileges
You must have administrator privileges to install TIBCO Hawk. If you do not, the
installer will exit. You must then log out of the system and log in as a user with
administrator privileges.
If you install in Execute mode, the installation registry is maintained in your user
home folder. If you install in the Install mode, the installation registry is
maintained in the SystemDrive:\WINNT\ folder.
Check your server mode by typing the following command:
C:\> change user /query
You can change the server mode to Install by typing the following command:
C:\> change user /install
Before actually installing the files, the installer calculates the disk space that the
selected components will require in the installation directory. The installer will
proceed only if sufficient free disk space is available in the installation directory.
If some of the required disk space is taken by another process during installation,
the installer may fail and display a failure message.
Temp Directory
At least 152MB free space is required in the temp directory. To reduce this
amount, see Specifying the JRE Location on page 7.
Installation Directory
At least 35MB free space is required in the TIBCO Hawk installation directory. To
reduce this amount, see Specifying the JRE Location on page 7.
RAM
All platforms require at least 256 MB RAM.
Software
The following software is required as indicated on the target machine.
TIBCO Software
TIBCO Rendezvous 6.9 or higher is required, with any available patches. The
TIBCO Hawk installation package includes TIBCO Rendezvous 7.2.
If you have already installed TIBCO Rendezvous software on a network-wide
basis, you will not need additional TIBCO Rendezvous licenses unless you will be
running TIBCO Rendezvous Routing Daemon (RVRD) processes on a particular
machine. In this case, you need a valid RVRD license in the tibrv.tkt file for that
machine.
JRE
TIBCO Hawk requires Java Runtime Environment (JRE) version 1.3.1, 1.3.1_01,
1.3.1_02, or 1.4.1, with any available patches, on the target machine. TIBCO Hawk
does not support Java 1.3.1_03.
The installer asks you during installation to verify that JRE is on the system. If it is
not, you must exit the installer, install JRE, then start TIBCO Hawk installation
again.
If a new version of JRE is installed after installing TIBCO Hawk software, you
must manually set the Java Home Directory value using the Advanced Settings
options of the TIBCO Hawk Configuration Utility. See Java Runtime
Configuration on page 95 for more information.
Before you begin installation, close all open programs. If any errors appear during
installation, consult Appendix B, Troubleshooting, page 159, for possible
solutions.
Installation Media
You can either download the TIBCO Hawk installation package or install the
components from a CD.
Installation Modes
The installer allows you to install in different modes. Each mode is supported on
all platforms.
• GUI mode allows you to select which components to install, where to install
them, and so on. GUI mode is the installer’s default mode.
• Console mode allows you to run the installer from the command line and
allows you to select which components to install. You can create a response
file or template file using console mode.
• Silent mode installs in console mode without prompting you for input. It
installs using either the default settings or a response file that was saved
during an earlier installation.
You can use any of the following options to install TIBCO Hawk:
• Install Using GUI, page 31
• Install Using Console, page 31
• Install in Silent Mode, page 31
Instructions for using the response file during subsequent installations are given
in Install Using a Response File, below.
To install from a Windows command window, type the following (note there is no
space between -options and -record):
TIB_hawk-suite_4.2.1_w32.exe -is:javaconsole -console
-options-record responseFilepath
Silent Mode In silent mode, you are not prompted during installation. TIBCO Hawk is
installed using the values in the response file.
To install from a Windows command window, type:
TIB_hawk-suite_4.2.1_w32.exe -silent -options responseFilepath
Interactive Mode In interactive mode, you are prompted for values during installation. The values
in the response file are presented as suggested defaults.
• To install from a Windows command window, type:
TIB_hawk-suite_4.2.1_w32.exe -options responseFilepath
Post-Installation Tasks
After the installation program has finished, it automatically starts the TIBCO
Hawk configuration utility, described in Chapter 7, Using the Configuration
Utility.
Before using the configuration utility, perform the following post-installation
tasks as noted.
Task C Change the Logon Account for TIBCO Hawk Windows Services
Now you must change the logon account for the TIBCO Hawk Windows services
to the selected administrative user account, as follows.
1. Choose Start>Settings>Control Panel and double-click on the Services icon.
You see the Services dialog.
2. Select the desired TIBCO Hawk service from the list and click Startup. You see
the Service dialog.
3. In the Log On As panel, click This Account and enter the desired user account
and password.
4. Click OK to save your action and return to the Services dialog.
5. Repeat from step 2 for each TIBCO Hawk Windows service in the services list.
6. You can now configure processes started by the TIBCO Hawk agent to run in
the foreground. This is optional; if you don’t want to do this, skip to step 7.
a. Select the TIBCO Hawk Agent service from the list and click Startup. You
see the Service dialog.
b. In the Log On As panel, click System Account and Allow Service to
Interact with Desktop enter the desired user account and password.
c. Click OK to save your action and return to the Services dialog.
7. Click Close to exit the Services dialog, then close the Control Panel window.
You must reboot the machine for the TIBCO Hawk service configuration
changes to take effect.
This chapter explains how to install and uninstall the TIBCO Hawk monitoring
system on computers running the UNIX operating system.
Topics
Installation Prerequisites
OS Hardware Patches
Solaris 2.6 Sun SPARC None required for TIBCO Hawk.
Solaris 2.7 Sun SPARC (32- and 64-bit) None required for TIBCO Hawk.
Solaris 2.8 Intel (32-bit)
Solaris 2.9
Installer Privileges
TIBCO Hawk can be installed by a regular (non-root) user or super-user (root).
If a non-root user installs TIBCO Hawk, change the permissions and ownership of
the tibhawkhma binary to root after installation, as shown:
#> chmod 4555 tibhawkhma
#> chown root:bin tibhawkhma
If the required JRE version is already on your system, significantly less disk space
is required in the temp directory. See Specifying the JRE Location on page 7.
If your system does not have sufficient free disk space in the temp directory listed
in the table below, you can use a different temp directory by including the
following option when starting the installer, where /new_tmp has sufficient free
disk space:
-is:tempdir /new_tmp
Installation
Operating System Temp Directory Free Space Directory
Free Space
Solaris (Sun SPARC and 15 MB in /var/tmp 177 MB
Intel)
Home Directory
The user's home directory must at least have 500 KB of free disk space for the
installation registry. See Installation Registry and History on page 6.
RAM
All platforms require at least 256 MB RAM.
Software
The following software is required as indicated.
TIBCO Software
TIBCO Rendezvous 6.9 or higher is required, with any available patches.
JRE
TIBCO Hawk requires Java Runtime Environment (JRE) version 1.3.1, 1.3.1_01,
1.3.1_02, or 1.4.1, with any available patches, on the target machine. TIBCO Hawk
does not support Java 1.3.1_03.
JRE is not included with the TIBCO Hawk installation package. The following
table lists web sites where you can download the recommended versions.
a. On Solaris 2.6 and 2.7, it is strongly recommended that the factory-installed JDK 1.1.3 or 1.1.6
(respectively) be removed before you install JRE 1.3.1 to avoid conflicts. To remove the JDK, run pkgrm
SUNWjvjit and pkgrm SUNWjvjrt.
If BIN_SH is not set properly, the TIBCO Hawk installer will abort with the
following error:
^D@AA: is not an identifier.
Before you begin installation, close all open applications. If any errors appear
during installation, consult Appendix B, Troubleshooting, for possible solutions.
On HP-UX, if you are upgrading to TIBCO Rendezvous 7.2.0, stop all TIBCO
Rendezvous processes before installing TIBCO Hawk.
Installation Packages
The following table lists the platform-specific installation packages. Copy the
appropriate tar file from the download site or the CD and unpack it on your
system.
AIX 4.3
TIB_hawk-suite_4.2.1_rs_43.tar
AIX 5.1
AIX 5.2
Installation Modes
The installer allows you to install in different modes. Each mode is supported on
all platforms.
• GUI mode allows you to select which components to install, where to install
them, and so on. GUI mode is the installer’s default mode.
• Console mode allows you to run the installer from the command line and
allows you to select which components to install. You can create a response
file or template file using console mode.
• Silent mode installs in console mode without prompting you for input. It
installs using either the default settings or a response file that was saved
during an earlier installation.
You can use any of the following options to install TIBCO Hawk:
• Install Using GUI, page 31
• Install Using Console, page 31
• Install in Silent Mode, page 31
• Install and Generate a Response File, page 31
• Install and Generate a Template File, page 32
• Install Using a Response File, page 32
These options and the instructions for installing TIBCO Hawk are provided in the
following sections. The following examples use the installation package for SUN
SPARC Solaris 2.6.
To install from a UNIX terminal window, type the following (note there is no
space between -options and -record):
TIB_hawk-simple_4.2.1_s4_56.bin -options-record responseFilepath
Silent Mode In silent mode, you are not prompted during installation. TIBCO Hawk is
installed using the values in the response file.
To install from a UNIX terminal window, type:
TIB_hawk-simple_4.2.1_s4_56.bin -silent -options responseFilepath
Interactive Mode In interactive mode, you are prompted for values during installation. The values
in the response file are presented as suggested defaults.
To install from a UNIX terminal window, type:
TIB_hawk-simple_4.2.1_s4_56.bin -options responseFilepath
When TIBCO Hawk is installed using this method, an entry for it is not placed in
the installation registry. Other TIBCO products (such as TIBCO Runtime Agent
5.x and TIBCO Administrator 5.x) that depend on Hawk 4.2.1 will not be able to
recognize or locate this TIBCO Hawk installation, and installation of those
products may fail.
To successfully install these TIBCO products on this machine, you must install the
TIBCO Hawk 4.2.1 Lite product (agent only) included with TRA 5.1.0 when you
install TRA 5.1.0. Subsequent TIBCO product installations will detect the presence
of TIBCO Hawk Lite and will complete successfully.
When you install TIBCO Hawk using this method, product documentation is not
installed on the system. You can view the documentation on the product CDROM
in the doc folder at root level or obtain it from the product download site.
The tar image is placed on your system when you unpack the tar file on your
system as described in Installation Packages on page 29.
The following procedure describes how to install TIBCO Hawk using the tar
image.
1. As root user, navigate to the directory that will be HAWK_ROOT.
2. Unpack the tar file in that directory. For example, the following command
unpacks the tar image for SUN SPARC Solaris 2.6:
#> tar -xvf download_directory/TIB_hawk_4.2.1_s4_56.tar
Post-Installation Tasks
After installing TIBCO Hawk on UNIX, the root user must perform the following
post-installation tasks as noted.
On the TRU64 UNIX platform, execute the following command before starting
any TIBCO Hawk component:
ln -s <RV_HOME>/libtibrvj.so <RV_HOME>/libtibrvj64.so
The TIBCO Hawk agent and TIBCO Hawk HMA components can be configured
to start automatically during the system boot cycle. A sample autostart script,
Hawk2, is provided in the $HAWK_ROOT/samples/etc directory. It invokes the
starthma and startagent scripts during the boot cycle. You can modify this
script for your environment. It can be used on all supported UNIX platforms.
The following sections list the steps involved in starting TIBCO Hawk
components automatically at system boot. Refer to the correct section for your
operating system.
• Solaris Instructions on page 35
• HP-UX Instructions on page 36
• AIX Instructions on page 36
• TRU64 Instructions on page 37
• LINUX Instructions on page 37
Solaris Instructions
This section describes how to start TIBCO Hawk components automatically at
system boot on a SUN SPARC Solaris or Intel Solaris operating system.
1. Open the file $HAWK_ROOT/samples/etc/hawk2 in an editor and make the
following changes.
Edit the line: HAWK_ROOT=/usr/tibco/hawk to reflect your TIBCO Hawk
installation directory.
Edit the line: RV_ROOT=/usr/tibco/tibrv to reflect your TIBCO Rendezvous
installation directory.
Edit the line JRE_ROOT=usr/tibco/java to reflect your Java installation
directory.
2. Copy the hawk2 file as follows:
cp $HAWK_ROOT/samples/etc/hawk2 /etc/init.d/hawk2
HP-UX Instructions
This section describes how to start TIBCO Hawk components automatically at
system boot on an HP operating system.
1. Open the file $HAWK_ROOT/samples/etc/hawk2 in an editor and make the
following changes.
Edit the line: HAWK_ROOT=/usr/tibco/hawk to reflect your TIBCO Hawk
installation directory.
Edit the line: RV_ROOT=/usr/tibco/tibrv to reflect your TIBCO
Rendezvous installation directory.
Edit the line JRE_ROOT= /usr/tibco/java to reflect your Java installation
directory.
2. Copy the hawk2 file as follows:
cp $HAWK_ROOT/samples/etc/hawk2 /etc/init.d/hawk2
AIX Instructions
This section describes how to start TIBCO Hawk components automatically at
system boot on an IBM operating system.
1. Open the file $HAWK_ROOT/samples/etc/hawk2 in an editor and make the
following changes.
Edit the line: HAWK_ROOT=/usr/tibco/hawk to reflect your TIBCO Hawk
installation directory.
Edit the line: RV_ROOT=/usr/tibco/tibrv to reflect your TIBCO
Rendezvous installation directory.
Edit the line JRE_ROOT= usr/tibco/java to reflect your Java installation
directory.
2. Add an entry to the /etc/inittab file as follows:
# hawk:2:once:<HAWK_ROOT>/samples/etc/hawk2 -start
>/dev/console 2>&1
TRU64 Instructions
This section describes how to start TIBCO Hawk components automatically at
system boot on a TRU64 operating system.
1. Open the file $HAWK_ROOT/samples/etc/hawk2 in an editor and make the
following changes.
Edit the line: HAWK_ROOT=/usr/tibco/hawk to reflect your TIBCO Hawk
installation directory.
Edit the line: RV_ROOT=/usr/tibco/tibrv to reflect your TIBCO
Rendezvous installation directory.
Edit the line JRE_ROOT= usr/tibco/java to reflect your Java installation
directory.
2. Copy the hawk2 file as follows:
cp $HAWK_ROOT/samples/etc/hawk2 /sbin/init.d/hawk2
LINUX Instructions
This section describes how to start TIBCO Hawk components automatically at
system boot on a LINUX operating system.
1. Open the file $HAWK_ROOT/samples/etc/hawk2 in an editor and make the
following changes.
Edit the line: HAWK_ROOT=/usr/tibco/hawk to reflect your TIBCO Hawk
installation directory.
Edit the line: RV_ROOT=/usr/rv. to reflect your TIBCO Rendezvous
installation directory.
Edit the line JRE_ROOT= to reflect your Java installation directory.
2. Copy the hawk2 file as follows:
cp $HAWK_ROOT/samples/etc/hawk2 /etc/init.d/hawk2
This chapter explains how to install the TIBCO Hawk monitoring system on
computers running the OS/400 operating system.
Topics
Installation Prerequisites
Software
The following software is required as indicated.
TIBCO Software
TIBCO Rendezvous 6.9 or higher is required, with any available patches.
If you have already installed TIBCO Rendezvous software on a network-wide
basis, you will not need additional TIBCO Rendezvous licenses unless you will be
running TIBCO Rendezvous Routing Daemon (RVRD) processes on a particular
machine. In this case, you need a valid RVRD license in the tibrv.tkt file for that
machine.
JRE
TIBCO Hawk requires Java Runtime Environment (JRE) version 1.3.1, 1.3.1_01,
1.3.1_02, or 1.4.1, with any available patches, on the target machine. TIBCO Hawk
does not support Java 1.3.1_03.
JRE is not included with the TIBCO Hawk installation package.
CRTLIB <libname>
3. Create SAVE files TIBHAWKSF and TIBHAWKSFL within the library <libname>.
Use the command CRTSAVF to do this.
4. Unzip the distribution archive on a Microsoft Windows system.
5. Copy the TIBHAWKSF and TIBHAWKSFL files from the Microsoft Windows
system to the SAVE files you created in step 2 on your OS/400 system. You
can use FTP or other mechanisms to do so.
6. Perform the installation using the command RSTOBJ as follows:
RSTOBJ OBJ(*ALL) SAVLIB(TIBHAWK) DEV(*SAVF)
SAVF(<libname>/TIBHAWKSF)
Where <libname> is the library where you created the SAVE files in step 2.
7. After RSTOBJ is complete, perform the following steps.
a. Create a directory for TIBCO Hawk in /usr (if it doesn't exist already).
CRTDIR ('/usr/tibco/hawk')
b. Restore the file containing the java files and the IFS file structure RST
DEV('/qsys.lib/<libname>.lib/TIBHAWKSFL.file')
OBJ(('/usr/tibco/hawk/*'))
Post-Installation Tasks
After installing TIBCO Hawk on OS/400, the user must perform the following
post-installation tasks as noted.
1. To use TIBCO Hawk components, you must turn on multi-threading. To turn
on multi-threading, choose from one of these options:
— To run the components as jobs, enable the job descriptions for multiple
threads.
— To use qsh to run Hawk components you set the environment variable
QIBM_MULTI_THREADED to Y before you start qsh. If you do not set this
variable, the TIBCO Hawk components will not run reliably.
— To set the variable permanently, you can create a CL program that is run
when a user logs in, by setting INLPGM parameter in the user profile, that
sets the environment variable QIBM_MULTI_THREADED.
For example:
PGM /* start it */
ADDENVVAR ENVVAR(QIBM_MULTI_THREADED) VALUE(Y)
ENDPGM
If you do this manually when you log in, it persists until you log out.
2. When submitting jobs using SBMJOB, make sure that the ALWMLTTHD
parameter is set to (*YES)
If you are uncertain whether your job description has multi-threading enabled
set ALWMLTHTHD to *YES. Without multi-thread support set in the job
description, the sample program will not start.
• TIBCO Hawk Agent
You can start TIBCO Hawk Agent in the following ways:
— Start TIBCO Hawk Agent from the native system using the following
command:
call tibhawk/tibhawktmp
— Execute the startagent script from qshell. This script is located in the
$HAWK_ROOT/bin directory.
The default codepage use for reading output from the TIBCO Hawk methods
Custom::ExecuteForString and Custom::ExecuteForNumber is Cp037. You can
override this default value by This default can be overrided by specifying the
codepage in the Java property customMA.codepage.
For example, to change the code page to Cp500, add the following line
-DcustomMA.codepage="Cp500"
This chapter describes how to edit the configuration files for the TIBCO Hawk
Display, Agent, HMA and Event Service components on Microsoft Windows and
UNIX platforms. It also describes how to use the startup scripts, create a TIBCO
Hawk domain, and create a TIBCO Rendezvous session.
On Microsoft Windows platforms, you can alternatively use a GUI interface to
configure TIBCO Hawk General, Display, Agent, and Event Service components.
This is described in Chapter 7, Using the Configuration Utility.
Topics
Please read this chapter and determine your system’s particular configuration
and setup requirements before changing any values.
A set of startup scripts and configuration files is provided with the TIBCO Hawk
software. A startup script and default configuration file are supplied for each
component. The configuration files and options are described in the next sections.
Described
Component Startup Script Configuration File
on Page
TIBCO Hawk Display startdisplay hawkdisplay.cfg 48
Startup scripts and configuration files are located in <TIBCO Hawk installation
directory>/bin.
The startup scripts take a single command line option of -file, followed by the
filename of the absolute path to the .cfg file. You can create and name your own
configuration files, modelling them on the default supplied.
This chapter describes the command line options you can use in the configuration
files. If no command line options are specified, the startup scripts use the supplied
default values in the configuration files (as shipped) by default.
On UNIX, if the startagent script is run using arguments for a predefined file,
the script does not recognize special characters such as quotation marks ( " ).
Special characters must be escaped with a backslash ( \ ).
This instructs the system to create the log directory under <TIBCO Hawk installation
directory>. In other words, ./log expands to <TIBCO Hawk installation directory>/log.
After installation, when executing the scripts to start either the agent, TIBCO
Hawk Display or the HMA, you must customize the configuration files to specify
the absolute path to the .cfg file for your environment, as shown here:
startagent -file ./hawkagent.cfg
The options in the hawkdisplay.cfg configuration file are used to configure the
following functions related to TIBCO Hawk Display. The functions and options
are described in the next sections.
Because the TIBCO Hawk software uses the functionality of the TIBCO
Rendezvous system, it must connect to a TIBCO Rendezvous daemon by creating
a session.
If TIBCO Rendezvous is only used on one network and no special TIBCO
Rendezvous sessions are needed, use the TIBCO Rendezvous daemon session
default values. To use the default TIBCO Hawk session parameters, omit the
-rvd_session command-line options.
If you use this option, all three parameters must be present and separated by
white space. Use a semicolon (;) to indicate a null value, or use an empty string,
for example:
-rvd_session 7474 "" tcp:7474
See Creating a TIBCO Rendezvous Session, page 84, for more details.
Character Encoding
-character_encoding <character encoding string>
Specifies the character encoding to be used for strings sent over all TIBCO
Rendezvous transports.
Logging Information
-logdir <directory for display logs>
-logmaxsize <maximum size of single display log>
The -log_format option allow you to select the format of log file entries. Either
the existing Hawk format or the ActiveEnterprise format can be specified.
Display File
-display_file <display file path and name>
Specify the location of a display file to be loaded automatically. To use the default,
omit this option.
Security Policy
-security_policy <class implementing security>
Because security needs vary greatly, the TIBCO Hawk system provides a
mechanism by which you can develop your own security policy plug-in. To create
a security policy, you must write a Java class that implements a security policy
specific to your needs. For more information on creating a security policy class,
see the TIBCO Hawk Programmer’s Guide.
For more information on the Trusted and Certified security policies that come
with TIBCO Hawk software, see Chapter 10 on page 131.
Depending on your security needs, complete the -security_policy option as
follows.
• If you are not using a security policy, omit this option.
• To use a specific security policy, on each machine where you want to use the
policy, specify the name of the security policy class. Do not enter the file
extension. For example, if your Java class file is named
ASecurityPolicy.class you would specify ASecurityPolicy.
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
Variables
-variables <External variables property file>
Use the Variables option to specify a variables file. The variables file can pass data
to define external variables to be used in either host or tool menu commands.
On UNIX systems, the env command outputs environment values in the correct
format. However, in Windows, the following restrictions apply to external
variables:
• The variables file to support External variables in the agent must conform to
the Java properties file format.
• Variables and variable names cannot include spaces or any of the following
characters: equals sign (=), period (.), or forward slash(\).
• Any special characters must be escaped to be evaluated properly.
For example, to use a variable for c:\tibco\hawk, you would specify in the file:
HAWK_ROOT=c:\\tibco\\hawk. Also, due to the Java file path separator format,
HAWK_ROOT=c:/tibco/hawk will also work properly on the Windows platform.
-M Self
This module of the agent configuration file deals with the following command
line options which relate to the agent itself:
Option Description
-cluster <cluster name> The name of the container in which this agent will appear in the
display by default. The display will create the container if it does
not already exist. Allows for grouping of multiple agents.
The default name for the container is the IP subnet address. The
cluster name must be enclosed within quotes, if the name
contains spaces.
-agent_name <agent name> The agent name as it appears in the TIBCO Hawk Display. The
default name for the TIBCO Hawk agent is the host name of the
computer on which it is installed.
Each agent being managed must have a unique combination of
agent_name, agent_domain, and hawk_domain values.
To use the host name as the agent name, omit this option. To use a
different name, specify a name as desired.
-agent_domain <agent domain Sets the agent domain name. The default value is "none". Each
name> agent being managed must have a unique combination of
agent_name, agent_domain, and hawk_domain values.
-hawk_domain <TIBCO Hawk Sets the hawk domain name. The agents and the display must
domain name> have the same hawk domain value in order to communicate. Each
agent being managed must have a unique combination of
agent_name, agent_domain, and hawk_domain values.
-character_encoding Specifies the character encoding to be used for strings sent over
<character encoding string> all TIBCO Rendezvous transports.
-hma_plugin_dir <directory> Specifies the directory the TIBCO Hawk Agent should search
when loading microagent plug-ins.
-file <configuration file> Read more command line arguments from a config file. The
contents of the file have the same syntax and semantics as
command lines. Multiple lines are permitted. All characters from
# to the end of a line are treated as a comment. This option is not
allowed in a config file. You may supply no more than one -file
parameter.
-M RuleBaseEngine
This module of the agent configuration file deals with the following command
line options which relate to the rulebases used by this agent.
If you are using the rulebase map, you usually do not need to list any rulebases in
the -rulebases option. Using both a rulebase map and the -rulebases option
increases the complexity of managing your monitoring configuration.
The -rulebases option is provided to maintain backward compatibility with
previous versions of TIBCO Hawk that do not contain the rulebase map feature.
Option Description
-rulebases <rulebase> Typically used only if rulebase map is not being used
<rulebase> ...
If manual or repository configuration mode is used, specify a list of
rulebases to be loaded at startup.
If -rulebases option is used, you must omit the -auto_config_dir
option and use either manual configuration mode or repository
configuration mode options.
-config_path <list of If manual configuration mode is used, specify the path to be searched
directories to use as for configuration objects. The delimiter for path entries is a colon (:).
configuration sources> The default used if this option is omitted is the current working
directory.
If -config_path is used, omit the -auto_config_dir,
-repository_path, and -repository_cache_dir options.
-variables <property file> Use this option to specify a variables file. The variables file can pass
data to define external variables to be passed to rules for use in
rulebase configurations.
-config_path
-repository_path
-repository_cache_dir
-M AMIService
This module of the agent configuration file deals with the following command
line options which relate to monitoring an AMI-instrumented application.
-ami_rvd_session <service> <network> <daemon>
Applications instrumented with AMI must create and use a TIBCO Rendezvous
session to connect with a TIBCO Rendezvous daemon (rvd).
To monitor an AMI-instrumented application that uses the same session
parameters as those used in the Self section of the agent configuration file (the
primary session), omit the AMIService options.
To monitor AMI-instrumented applications that use different session parameters
than those used in the TIBCO Hawk configuration, you must create additional
AMI sessions.
You can specify a secure Rendezvous session that uses Rendezvous DataSecurity
along with digital certificates to guarantee the integrity and authenticity of the
messages sent to applications instrumented with AMI. To do this, use the
-ami_rvds_session option.
If you use these options, all three parameters must be present and separated by
white space. Use an empty string to indicate a null value, for example:
-ami_rvd _session 7474 "" tcp:7474
You can specify any number of additional TIBCO Rendezvous sessions for a
TIBCO Hawk agent to monitor. Applications using these sessions appear as
primary sessions in the TIBCO Hawk Display in the same list as managed
applications (and microagents). TIBCO Hawk agents can use rulebases that refer
to the applications, as long as those applications are running.
See Creating a TIBCO Rendezvous Session, page 84, for more on defining
sessions.
-M LogService
This module of the agent configuration file deals with the following command
line options which relate to log files used by this agent.
-log_dir <directory to store TIBCO Hawk logs>
-M TIBProtocolAdapter
This module of the agent configuration file deals with the following command
line options which relate to agent heartbeat and security used by this agent.
Option Description
-interval The TIBCO Hawk agent heartbeat interval can be set on each computer
<heartbeat interval in where an agent is installed. The TIBCO Hawk Display uses this value to
seconds> determine when to mark an agent dead.
To use the default value of 30 seconds, omit this option. To use a different
value, enter a number of seconds, as desired.
-security_policy TIBCO Hawk provides a mechanism by which you can develop your own
<class that implements security policy plug-in. To create a security policy, you must write a Java class
security> that implements a security policy specific to your needs.
(For more information on creating a security policy class, see the TIBCO Hawk
Programmer’s Guide. For more information on the Trusted and Certified
security policies, see Chapter 10 on page 131.)
Depending on your security needs, complete this option as follows:
• If you are not using a security policy, omit this option.
• To use the TIBCO Hawk Trusted Security Policy, specify:
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
To use a specific security policy, specify the name of the security policy class
on each machine where you want to use the policy. Ensure that this class file
is placed in <TIBCO Hawk installation directory>/Java. Do not enter the file
extension. For example, if your Java class file is named
ASecurityPolicy.class you would specify ASecurityPolicy.
Note: If your security policy class is not part of the default package (for
example, if you used the Java "package" directive in your code), you will
need to create the appropriate directory structure beneath <TIBCO Hawk
installation directory>/Java that corresponds to your package name and place
your class file in the appropriate location. For example, if your fully qualified
class name is com.mycorp.MySecurity, you will place MySecurity.class in
<TIBCO Hawk installation directory>/Java/com/mycorp.
-M Repository
This module of the agent configuration file deals with the following command
line options which relate only to agents used as repositories for the TIBCO Hawk
system.
-repository_name <repository name>
If a TIBCO Hawk agent is to act as a repository for the TIBCO Hawk system, enter
a name (with no spaces or periods) for the repository and a path for storage of the
configuration object files. The default is <TIBCO Hawk installation
directory>/repository.
-M LogfileMicroAgent
This module of the agent configuration file deals with the following command
line options which relate to agent heartbeat and security used by this agent.
-block_size < size in kilobytes> The TIBCO Hawk agent block size is the maximum number of
kilobytes to read on each scan. The default value is 16 kilobytes. To
use the default value of 16 kilobytes, omit this option. To use a
different value, enter a number of seconds, as desired.
-eval_rate <rate in seconds> The TIBCO Hawk agent eval rate is the rate at which all the
logfiles being monitored are re-evaluated. The default eval rate is
300 seconds. To use the default value of 300 seconds, omit this
option. To use a different value, enter a number of seconds, as
desired.
Function Options
TIBCO Rendezvous (RVD) -rvd_session <service> <network> <daemon>
Session
-ignore_sigterm
-ignore_sigabrt
Because the TIBCO Hawk software uses the functionality of the TIBCO
Rendezvous system, it must connect to a TIBCO Rendezvous daemon by creating
a session.
If TIBCO Rendezvous is only used on one network and no special TIBCO
Rendezvous sessions are needed, use the TIBCO Rendezvous daemon session
default values. To use the default session parameters (specified in the Self module
of the agent configuration file), omit the -rvd_session command-line options.
If you use this option, all three parameters must be present and separated by
white space. Use an empty string to indicate a null value, for example:
-rvd _session 7474 "" tcp:7474
See Creating a TIBCO Rendezvous Session, page 84, for more details.
Logging Information
-logdir <directory to store HMA logs>
By default, the unit of measure for -logmaxsize is kilobytes and the default size
is 1024. To specify a value in megabytes, use the suffix m or M. For example, 10M
specifies ten megabytes.
If, for example, you have configured a maximum of five log files, log files roll over
until there are five files (named file1, file2… file5). At this point, the next
rollover eliminates file5 and renames file4 to file5, thus maintaining a total
of five rollover files. The log thus retains the latest log information and discards
the oldest.
The -log_format option allow you to select the format of log file entries. Either
the existing Hawk format or the Active Enterprise format can be specified.
Timeout
-timeout <milliseconds>
Specifies the amount of time the Hawk Agent should wait for HMA method
invocations to complete before timing them out. The default is 10000
milliseconds. Normally there is no need to change this value, however, on
machines under extreme stress where method invocations are timing out, this
new option allows the timeout value to be increased
Trace Level
-tracelevel <desired trace level>
Specifies the level of diagnostic trace output. You can choose -1 to enable all
tracing, 0 to enable no tracing, or calculate a desired trace level by adding together
values from the following table:
Value Purpose
1 enables information level trace messages
The default value for tracing is 7, or 1+2+4 (information, warning and error).
-ignore_sigterm
-ignore_sigabrt
These options specify that the TIBCO Hawk HMA should ignore the SIGINT,
SIGTERM, and SIGABRT signals, respectively. These options will cause the HMA
to set the disposition of the corresponding signal to SIG_IGN.
By default, the HMA installs a signal handler for these signals that performs a
graceful shutdown of the HMA in response to one of these signals. For most
circumstances, this is the desired behavior and these options would not be
specified.
These options can be used to configure the HMA not to shutdown or terminate in
response to any of these signals. For example, the HMA can be started as a
background process from a UNIX console with -ignore_sigint so that the HMA
will not be shutdown if Ctrl-C is entered from the console.
The TIBCO Hawk Event Service has two main purposes: to record the activity of
TIBCO Hawk agents, and to detect and respond to agent termination.
The event service records:
• all alerts raised and cleared by TIBCO Hawk agents across the network, as
well as changes in an agent’s alert level (as would be shown by a color in the
TIBCO Hawk Display)
• all instances of agent activation and expiration
The event service also can call a script (using the -script option in the Event
Service configuration file) when the heartbeat of a TIBCO Hawk agent is lost (not
received for a specified length of time). This usually means that the agent process
has terminated or that network communication has been interrupted. This facility
could be used to send an e-mail or page, or to take some other automated action.
You will normally run the TIBCO Hawk Event Service on a single system in a
TIBCO Hawk managed network. Multiple instances can be run on separate
systems for fault tolerance.
Be careful not to confuse TIBCO Hawk Event Service data files (Event.dat) with
Event Service log files (Event.log).
• Event.dat data files contain the data produced by the Event Service.
• Event.log log files record the state of the Event Service itself.
The Event.log file is discussed in the TIBCO Hawk Administrator’s Guide.
Option Description
-hawk_root The TIBCO Hawk root installation directory.
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-rvd_session Specifies the TIBCO Rendezvous session used by TIBCO Hawk Event
Service.
If you use this option, the following three parameters must be present
and separated by white space:
-rvd_session <service> <network> <daemon>
-ami_rvd_session Specifies the TIBCO Rendezvous rvd session used by the TIBCO Hawk
Event Service for AMI communications. If this options is used, all three
parameters must be present and separated by whitespace but any of
them may be an empty string to indicate a null value.
The default ami_rvd_session uses rvd_session values.
-character_encoding Specifies the character encoding to be used for strings sent over all
TIBCO Rendezvous transports.
-datadir The directory in which TIBCO Hawk will create rolling data files
(event.dat) for the event service. Default is <install-path>/data.
-datamaxnum The maximum number of rolling data files to keep. The default is 5.
Values lower than the default number are ignored, and the default is
used instead.
-JDBCdbType Database vendor name. Supported values are SQLSERVER, ORACLE, DB2,
INFORMIX and SYBASE.
-JDBCdriverClassName Class name for the vendor's JDBC driver. For example,
com.microsoft.jdbc.sqlserver.SQLServerDriver.
-log_format The format of log file entries. Valid values are default (Hawk format)
or ae4 (Active Enterprise format).
-logmaxsize When one rolling log file has reached this size, it is closed and
renamed, and a new log file with the original name is started.
By default, the unit of measure for -logmaxsize is kilobytes and the
default size is 1024. To specify a value in megabytes, use the suffix m or
M. For example, 10M specifies ten megabytes.
-script The script to execute on lost agent heartbeat. Hawk passes the agent
hostname and IP address to the script to identify which agent died.
-file Reads more command line arguments from this file. The file has
exactly the same syntax and semantics as if it were a continuation of
the command line. If you supply -file, it must be the last parameter
on the command line. You may supply no more than one -file
parameter.
Create a TIBCO Hawk domain if you wish to isolate groups of TIBCO Hawk
agents into independent monitoring sets. Remember that each TIBCO Hawk
agent can belong to only one TIBCO Hawk domain and cannot communicate with
the TIBCO Hawk Display program on other domains.
The default is to monitor an entire network as one group. To use the default, omit
the -hawk_domain option.
Testing a Domain
To test the domain option, temporarily set the TIBCO Hawk domain on a single
system to a name such as test, then start (or restart) the TIBCO Hawk
Display. If you entered a unique domain name, you only one discovered host
should appear in the TIBCO Hawk Display main window. This shows that only
the local agent and the local TIBCO Hawk Display are using the test domain.
If the domain is as desired, you can now install it on the network systems where
you want to assign specific computers to that domain. All systems assigned to
that TIBCO Hawk domain appear on the Display as part of that domain.
When finished with testing, change back to the default domain and restart the
TIBCO Hawk Display to verify that it was correctly restored.
If you use this option, all three parameters must be present and separated by
white space. Use an empty string to indicate a null value, for example:
-rvd _session 7474 "" tcp:7474
Specify a remote daemon by inserting its host name or IP address between the
tcp entry and the port number of the daemon parameter, for example:
tcp:remote_computer:7800
This chapter explains how to configure TIBCO Hawk using the Configuration
Utility GUI.
Topics
General Configuration
The General tab contains basic TIBCO Hawk configuration items common to all
TIBCO Hawk components. When you start TIBCO Hawk, the fields in these
dialogs are populated with values appropriate for your configuration. In most
cases, you do not need to change those values.
Domain Information
Separate domains create independent TIBCO Hawk systems. Each TIBCO Hawk
agent can belong to only one TIBCO Hawk domain and cannot communicate with
TIBCO Hawk Display programs monitoring on other domains. Use TIBCO Hawk
domains if you want to isolate groups of TIBCO Hawk agents into independent
monitoring sets.
Leave the Hawk Domain field blank to use the default domain.
To give the agent a domain name, enter the desired name in the Hawk Domain
field. Give this same name to all agents that you want to include in the domain,
when you configure them on the systems where they are installed. The domain
you enter here is used for both the TIBCO Hawk agent and for any instance of the
TIBCO Hawk Display program running on that system.
Rendezvous Session
Use this section to configure the TIBCO Rendezvous session. Because the TIBCO
Hawk software uses the functionality of the TIBCO Rendezvous system, it must
connect to a TIBCO Rendezvous daemon by creating a session.
Sessions
A TIBCO Rendezvous session is a direct conduit through which an application
and a TIBCO Rendezvous daemon communicate.
The following processes in the TIBCO Hawk system communicate with a TIBCO
Rendezvous daemon through sessions:
• TIBCO Hawk Agent
• TIBCO Hawk HMA
• TIBCO Hawk Display
• TIBCO Hawk Event Service
Security
Because security needs vary greatly, the TIBCO Hawk system provides a
mechanism by which you can develop your own security policy plug-in. To create
a security policy, you must write a Java class that implements a security policy
specific to your needs. For more information on creating a security policy class,
see the TIBCO Hawk Programmer’s Guide.
For more information on the Trusted and Certified security policies that come
with TIBCO Hawk software, see Chapter 10 on page 131.
Depending on your security needs, complete the Security Policy field as follows.
• If you are not using a security policy, leave the Security Policy Class field
blank.
• To use the TIBCO Hawk Trusted Security Policy, enter:
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
• To use a specific security policy, on each machine where you want to use the
policy, enter the name of the security policy class. Ensure that this class file is
placed in <TIBCO Hawk installation directory>\Java. Do not enter the file
If your security policy class is not part of the default package (for example, if
you used the Java "package" directive in your code), you will need to create
the appropriate directory structure beneath <TIBCO Hawk installation
directory>\Java that corresponds to your package name and place your class
file in the appropriate location. For example, if your fully qualified class name
is com.mycorp.MySecurity, you will place MySecurity.class in <TIBCO
Hawk installation directory>\Java\com\mycorp.
Logging
The TIBCO Hawk system logs specific events as they occur. The events are
categorized as errors, warnings, or informational events. The logs provide a
detailed picture of the status and health of each of the TIBCO Hawk components
to aid in diagnosing problems.
The settings configured in the Logging panel control logging of the following
components:
• The TIBCO Hawk agent (Hawk.log).
• The TIBCO Hawk Display (Display.log).
• The TIBCO Hawk Event Service (Event.log).
field, log entries roll over to reuse the oldest log file. If, for example, you have
configured a maximum of five log files, log files roll over until there are five files
(named file1, file2… file5). At this point, the next rollover eliminates file5
and renames file4 to file5, thus maintaining a total of five rollover files. The
log thus retains the latest log information and discards the oldest.
• Log Files Directory
Enter the name of the directory where the TIBCO Hawk system should place
its log files. The default value is <TIBCO Hawk installation directory>\Log.
• Maximum Number of Files
Enter the maximum number of rolling log files to create. You can enter at
minimum 5 and at maximum 999. The default value is 5.
• Maximum Size of Log File
In this edit field, enter the maximum log file size, in kilobytes. Enter only
digits. The default is 1024. Note that the maximum log file size is 2097151
kilobytes.
HMA Configuration
AMI Timeout
Specifies the amount of time the Hawk Agent should wait for HMA method
invocations to complete before timing them out. The default is 10000
milliseconds. Normally there is no need to change this value, however, on
machines under extreme stress where method invocations are timing out, this
option allows the timeout value to be increased.
Codepage
The Codepage configuration option indicates the desired character encoding to be
used by the HMA when converting multi-byte characters (MBCS) to UNICODE.
The default codepage identifier is 65001, which is the Microsoft Windows ID for
UTF-8, and which will work for all locales.
The only reason to change this value is for compatibility with other TIBCO
Rendezvous applications not using UTF-8. This value is specified using Microsoft
Windows code page values, as listed at the following URL:
http://msdn.microsoft.com/library/default.asp?url=/library/en-u
s/intl/unicode_81rn.asp
If you change the Codepage value, you must also change the value of the
Character Encoding, page 95. For example, if you want to specify Latin-1 locales
(such as French), the Codepage value must be 1252 and the Character Encoding
value must be ISO-8859-1. See Code Page Identifiers on page 177 for the list of
code page identifiers.
Advanced Configuration
On the General configuration tab, click the Advanced button to access the
Advanced Configuration dialog.
Prevent an Agent For example, an agent can exit when a user logs off the desktop. To prevent the
from Exiting agent from exiting, add the -Xrs option to the agent's JVM command line (JRE
1.3.1 only).
Character Encoding
The Character Encoding configuration option indicates the desired character
encoding to be used by the Agent, Display, and Event Service. This is also the
encoding used for the character data that TIBCO Hawk transmits over TIBCO
Rendezvous.
The default setting of UTF-8 will work for all locales. The only reason to change
this setting is for compatibility with other TIBCO Rendezvous applications. If you
change this value, you must also change the Codepage value, which sets the
character encoding for the TIBCO Hawk HMA.
Possible Character Encoding values are listed in Table 22, Code Page Identifiers,
on page 178.
The Display tab allows you to specify a previously created layout to be loaded
automatically at startup and to specify a variables file.
Display
Use the Display option to specify the previously created layout you want loaded
automatically at startup.
Variables
Use the Variables option to specify a variables file. The variables file can pass data
to define external variables to be used in either host or tool menu commands. The
format of the file is that used by the standard Java class java.util.Properties.
There is one line per variable where each line has the format variablename=value.
The Agent tab allows you to configure options specific to the TIBCO Hawk agent.
Identification
Agent Name
The agent name appears in the TIBCO Hawk Display. The default name for the
TIBCO Hawk agent is the host name of the computer on which it is installed.
To use the host name as the agent name, leave the Agent Name field blank. To use
a different name, enter a name as desired.
Agent Domain
An agent domain must be specified when two computers within the same TIBCO
Hawk domain have the same name but reside in different network domains. To
specify an agent domain for a TIBCO Hawk agent, enter the desired domain in
the Agent Domain field, for example, pa.tibco.com.
Cluster
Enter the container name in which this agent is to appear in the TIBCO Hawk
Display. The default name for the container is the IP subnet address. The cluster
name must be enclosed within quotes, if the name contains spaces.
Configuration Modes
Use the options in this panel to set up what mode the agent is to use when it
searches for configuration objects. The default is to use Automatic configuration.
Automatic, Manual, and Repository configuration modes are mutually exclusive.
When the radio button for one of these modes is selected, the other options are
disabled.
The delimiter for path entries is a semicolon ( ; ).
If you are using the rulebase map, you usually do not need to list any rulebases in
the rulebase list dialog. Using both a rulebase map and the rulebase list dialog
increases the complexity of managing your monitoring configuration.
The rulebase list dialog (which corresponds to the UNIX or file config option
-rulebases) is provided to maintain backward compatibility with previous
versions of TIBCO Hawk that do not contain the rulebase map feature.
To set up manual configuration, you specify a configuration path to use, and a list
of rulebases, as follows.
1. Select the Manual radio button.
2. In the Manual Configuration Path field, specify a list of directories to be
searched by separating directory entries with semicolons. The default
directory is <TIBCO Hawk installation directory>\Config.
3. Click Rulebases to bring up the Rulebase Configuration dialog
4. Do either of the following until your list is as desired, then click OK:
— To add a rulebase to the list, click Add, enter a a rulebase filename, and click
OK.
— To remove a rulebase from the list, select it and click Delete.
Do not use a file extension when entering rulebase names. The .hrb extensions
are only used for rulebase files. See RuleBaseEngine:loadRuleBase() and
RuleBaseEngine:loadRuleBaseFromFile() for more information.
Repository
If a TIBCO Hawk agent is to act as a repository for the TIBCO Hawk system, enter
a name (with no spaces or periods) for the repository and a path for storage of the
configuration object files. The default is <TIBCO Hawk installation
directory>\Repository.
MicroAgent Plugins
Use the Plugins Directory option to specify the directory that the TIBCO Hawk
Agent should search when loading microagent plugins.
Variables
Use the Variables option to specify a variables file. The variables file can pass data
to define external variables to be passed to rules for use in rulebase
configurations.
Logfile Microagent
Heartbeat
The TIBCO Hawk agent heartbeat interval can be set on each computer where an
agent is installed. The default heartbeat interval is 30 seconds. The TIBCO Hawk
Display uses this value to determine when to mark an agent dead.
To use the default value of 30 seconds, leave the value in the Interval field set to
30. To use a different value, enter a number of seconds, as desired.
AMI
Applications instrumented with AMI must create and use a TIBCO Rendezvous
session to connect with a TIBCO Rendezvous daemon (rvd).
3. Enter a Session Name and select a Session Type for the AMI session. Select
RVDS to specify a secure Rendezvous session that uses Rendezvous
DataSecurity along with digital certificates to guarantee the integrity and
authenticity of the messages sent to applications instrumented with AMI. (See
Chapter 10 on page 131 for details.)
4. In the Session Parameters panel, enter values for Service, Network, and
Daemon. Use the same values as those used by the application to initialize its
TIBCO Rendezvous daemon session. To determine these values, check the
application’s configuration files or documentation. (Although AMI session
parameters are named differently from their non-AMI counterparts, the
arguments are the same and the resulting sessions are similar.)
The default values for an AMI session are RVD, with session parameters
specified as
— Service: 7474
— Network: ;
— Daemon: TCP: 7474
5. Click OK to close the AMI Session window and add the AMI session to the list
of sessions.
The Event Service tab allows you to configure options specific to the TIBCO
Hawk Event Service.
The TIBCO Hawk Event Service is a separate process that collects information
about TIBCO Hawk Agents. It performs the following functions:
• Logs the activity of TIBCO Hawk agents in the event.dat log file.
• Detects and responds to agent termination using a user-supplied command
line executable.
• Uses AMI instrumentation to asynchronously notify users of events on a
particular Hawk domain.
• Allows persistence of TIBCO Hawk Events using JDBC.
• Provides Event Service fault tolerance.
These functions are described in the TIBCO Hawk Administrator's Guide. The event
service AMI methods are described in the TIBCO Hawk Methods Reference.
Be careful not to confuse TIBCO Hawk Event Service data files (Event.dat) with
Event Service log files (Event.log).
• Event.dat data files contain the data produced by the Event Service.
• Event.log log files record the state of the Event Service itself.
The Event.log file is discussed in the TIBCO Hawk Administrator’s Guide.
Logging File
The event service records the following items:
• All alerts raised and cleared by TIBCO Hawk agents across the network, as
well as changes in an agent’s alert level (as would be shown by a color in the
TIBCO Hawk Display)
• All instances of agent activation and expiration
Some example event.dat log file service entries are shown below.
AGENT_ALIVE : agent={ host-name=asture, dns=none,
host-ip=160.101.26.108,
network-ip=160.101.26.0 }, alert-state=0, at Sat Dec 18 11:40:23
EST 1999
Command-Line Executable
The Event Service can call a command-line script or executable when the
heartbeat of a TIBCO Hawk agent is lost (not received for a specified length of
time). This usually means that the agent process has terminated or that network
communication has been interrupted. This facility could be used to send an e-mail
or page, or to take some other automated action.
Disabling the To disable the TIBCO Hawk Event Service, disable the TIBCO Hawk Event
Event Service Service in the Windows Services control panel as follows:
1. Choose Start>Settings>Control Panel, then double-click on the Services icon.
2. Select TIBHawk Event in the list of services and click Startup.
3. In the Service window, click the Disabled radio button, then click OK. The
service is shown in the list as disabled.
4. If the service is already running, click Stop to stop it. The status in the list is
blank, indicating the service is stopped.
Event Data
Check the Enable Event Service Data Files box to enable logging. The TIBCO
Hawk Event Service writes to rolling data files in the same way that the standard
TIBCO Hawk logging system writes to rolling log files (see Logging, page 92).
As with TIBCO Hawk log files, you can set the following options:
• The directory in which to store data files. The default data file directory is
<TIBCO Hawk installation directory>\Data.
Database Configuration
Check the Enable Event Persistence box to enable event persistence.
When this feature is enabled, fill in the following fields:
• User Name: User name to connect to the database.
• Password: User password to connect to the database.
• Database Type: The database vendor. Select the appropriate vendor from the
dropdown menu.
• Database Connection: URL that identifies the database connection.
• JDBC Driver Class Name: Class name for the vendor's JDBC driver. For
example, com.microsoft.jdbc.sqlserver.SQLServerDriver.
Fault Tolerance
Check the Enable Fault Tolerance box to enable fault tolerance on this instance.
This instance joins a fault tolerant group named
HawkEventService:hawkdomain, where hawkdomain is the value specified in the
General tab.
Weight
Assign the weight of this instance using a positive integer. The highest weight is 1,
meaning the instance outranks all others. When an instance fails, the next-highest
instance is activated.
Note the following considerations:
• Each TIBCO Hawk Event Service instance in the fault tolerance group must be
assigned a weight.
• Each weight must be a positive whole number, starting with 1.
• Each service should have a unique weight.
• The weights do not need to be consecutive.
• If two or more TIBCO Hawk Event Services have the same weight,
Rendezvous fault tolerance software assigns a rank to them but does not
update the Weight field in this dialog with the new value.
Defaults
This button clears all fields and returns them to their default values.
This chapter explains how to configure TIBCO Hawk monitoring for use across
networks or subnets. It also explains how to access TIBCO Hawk monitoring
through a dial-up connection.
Topics
The TIBCO Rendezvous messaging software that TIBCO Hawk uses operates
within either IP Broadcast or IP Multicast protocols. Network traffic for these
protocols is not generally routed openly between subnets or networks.
IP Multicast traffic can be passed through configuration of the network routers,
but IP Broadcast must use other means to reach other subnets. TIBCO
Rendezvous software uses a process known as a routing daemon (rvrd) to allow
TIBCO Rendezvous messages to transcend multiple networks.
If all TIBCO Hawk agents are installed on computers within one subnet, no
configuration changes are necessary, but if the TIBCO Hawk agents are installed
on computers in different subnets or networks, you must change their
configuration to allow them to communicate using the routing daemon, rvrd.
Figure 9 shows a sample routing daemon implementation where all TIBCO Hawk
messages are available throughout the network, and there is only one TIBCO
Hawk domain. Host B acts as the hub. All other rvd processes in each subnet will
obtain information from the other subnets through rvrd processes on host A, B or
C, as applicable.
On these machines, the rvrd process would replace the regular rvd process.
However, in addition to its routing functions, the rvrd will support the local
applications just as rvd would.
host
C
Router
host
A
host
B
(hub) neighbor
connection
Router
Full Visibility
The simplest TIBCO Hawk routing configuration is full visibility of all agents
from any TIBCO Hawk Console, anywhere on the network. In this case, the
subject configuration of the Rendezvous routing daemons is identical across all
routing daemons, as shown:
Import and Export: "_HAWK.>"
When starting the rvrd process, use the -store <file name> argument, which is
specific to TIBCO Rendezvous, to store the parameters that configure rvrd. rvrd
reads this file when the process starts, and writes this file each time you change
the configuration using the browser administration interface. For details on using
the Browser Administration Interface, see TIBCO Rendezvous Administration.
A TIBCO Rendezvous license file is required to use TIBCO Hawk with rvrd.
6. In the Add Value window that appears, enter DependOnService in the Value
Name edit box.
7. Select a Data Type of REG_MULTI_SZ.
8. Click OK.
9. In the Multi-String Editor window that appears (as shown in Figure 11), enter
rvrd in the Data edit box and click OK.
10. Repeat from step 3 for TIBHawkHma and TIBHawkEvent (if installed).
11. Exit regedt32.
12. Reboot your system.
The TIBCO Hawk system supports remote monitoring. If you are using a machine
that has dial-in access to your network, you can monitor your network remotely.
Standard connection techniques such as PPP and a simple configuration change
are all that are required. The dial-in computer must have an IP address on the
network, and should only run the TIBCO Hawk Display, and no other TIBCO
Hawk services (such as HMA, agent, or event service).
The remote host must already be running a correctly configured TIBCO
Rendezvous daemon. You cannot spawn a remote daemon. The easiest way to
achieve a dial-up connection is to choose a machine that already has a properly
configured TIBCO Hawk agent or TIBCO Hawk Display running.
This procedure can also be used for remote networks without an rvrd.
or
startdisplay -rvd_session 7474 123.123.123 tcp:123.123.123.12:7474
When the dial-up connection is established, restart the TIBCO Hawk Display.
where <internal rvd host> is any computer on the internal network which a
TIBCO Rendezvous daemon process is running. For example:
tcp:office_computer:7474
or
tcp:123.123.123.12:7474
3. When the dial-up connection is established, restart the TIBCO Hawk Display.
If, on UNIX, the TIBCO Hawk software is installed in any location other than the
default path of /usr/tibco/hawk, you must update all rules using the
logfile:onNewLine data source in the sample rulebases. For example,
HawkAgent-Unix (in the directory $HAWK_ROOT/samples) must be updated to
reflect the correct path to $HAWK_ROOT/log.
Topics
NoDataSource errors can result if any rules in the rulebase use data sources that
are unavailable on the agent where the rulebase is loaded. You cannot edit those
rules.
On UNIX, if the TIBCO Hawk software is not installed in the default location
(/usr/tibco/hawk), you must update all rules using the logfile:onNewLine
data source in the sample rulebases. For example, HawkAgent-Unix (in the
directory $HAWK_ROOT/samples) must be updated to reflect the correct path to
$HAWK_ROOT/log.
The TIBCO Hawk software distribution includes source code for sample
applications that demonstrate the use of the TIBCO Hawk Application
Management Interface (AMI). AMI is used to instrument applications so that
TIBCO Hawk agents can directly monitor them. AMI is a specification of TIBCO
Rendezvous messages that define the interactions that take place between a
TIBCO Hawk agent and an AMI application. Please refer to the TIBCO Hawk
Programmer's Guide for a complete description of AMI.
• To see the list of AMI application internal names for a particular TIBCO Hawk
agent, invoke its Self:getMicroAgentInfo method.
• To view the display name, right-click on the desired agent in TIBCO Hawk
Display, and select GetMicroAgents from the menu. The MicroAgents,
Methods, and Arguments dialog appears. When the sample applications are
successfully executed you should see their names appear on the associated
TIBCO Hawk agent.
The TIBCO Hawk AMI API sample applications can be found in the directory:
$HAWK_ROOT/samples/ami_api directory
This directory contains three sub-directories c, cpp, and java that contain sample
applications for the C, C++, and Java TIBCO Hawk AMI APIs, respectively. These
applications are discussed in the following sections.
• ami_sample1.c
This sample shows how to AMI instrument a non-Rendezvous application.
This method can be used with only a Hawk license. The AMI API does all the
Rendezvous work under the covers.
This method limits the number of dispatching threads to one thread. This is
the only thread which will call the user applications AMI API callback
functions. As a result, the users application can be single threaded. If the users
application is to be multi-threaded then the code in this sample would run on
a dedicated thread. The users application would be responsible for thread
safety regarding any of its own data structures.
• ami_sample2.c
This sample shows how to AMI instrument a Rendezvous application. The
users application creates a Rendezvous transport and queue and is
responsible for dispatching that queue.
The users application is free to be single or multiple threaded. The users
application is responsible for synchronizing access to user application data in
the multi-threaded case.
• ami_sample3.c
This sample is identical to ami_sample1.c except that it demonstrates how to
create methods that return tabular data.
• ami_sample4.c
This sample shows how to create an asynchronous AMI method for a
synchronous data source. This technique is used when synchronous data
needs to be polled at a certain rate, possibly calculations performed on the
data across samples, and the results returned at that rate or another rate. This
technique makes use of the auto-invoke feature of the AMI C API.
You can execute the TIBCO HAWK AMI C sample programs as a job or from qsh.
To submit a job, execute the following command:
SBMJOB CMD(CALL PGM(TIBHAWK/AMI_SAMPL1)) JOBQ(QUSRNOMAX)
MSGQ(*USRPRF) ALWMLTTHD(*YES)
Filename: AmiSample1.cpp
Display name: AmiSample1
Internal name: COM.TIBCO.hawk.ami_api.cpp.AmiSample1
This sample creates an AMI session to support methods that demonstrate how
to:
— pass data to an instrumented application,
— receive data from an instrumented application,
— return tabular data,
— return data asynchronously, and
— shutdown an application.
The sample application can be built by following the instructions in the
Makefile.sample file, also located in the sample directory.
For example:
run_spot -rvd_session 7474 123.123.123 tcp:7474
Chapter 10 Security
This chapter discusses the two security models supplied with the TIBCO Hawk
system. For details on creating a custom security model, refer to the TIBCO Hawk
Programmer’s Guide.
Topics
Overview
The TIBCO Hawk product supports a security mechanism which enables all
method invocation requests made of a TIBCO Hawk agent to be verified for
authenticity and integrity and then authorized (or not) based on the identity of
the user making the request.
The security implementation you choose will depend on your security
requirements for authorization, authentication, integrity and privacy. You can use
one of the security models provided with the TIBCO Hawk product (Trusted or
Certified), or develop a custom security model (as explained in the TIBCO Hawk
Programmer's Guide).
The definitions of security terms used in this manual are as follows:
Authentication
Authentication is the practice of determining that an entity (e.g. person, process,
etc.) is who they say they are.
Integrity
Data integrity is the ability to guarantee that the content of a message that is sent
from one party to another is received just as it was sent.
Authorization
Authorization is the practice of granting and denying privileges to users of a
service or resource. The ability to authorize a request requires two pieces of
information: the identity of the user and the nature of the request. The system can
then determine if the user has sufficient privileges for the request.
Privacy
Privacy is the ability to guarantee that the content of a message that is sent from
one party to another is hidden from other parties.
Trusted Model
The Trusted model provides a simple yet effective mechanism for addressing
authorization concerns. It addresses security issues as follows:
• Authentication: the Trusted security model does not guarantee the
authenticity of the request.
• Integrity: the Trusted security model does not guarantee the integrity of the
request.
• Authorization: the Trusted security model guarantees that only authorized
users can perform restricted actions. See below.
• Privacy: the Trusted security model does not address the privacy of the
request. All requests are sent using plain text.
Authorization
The Trusted model uses an ASCII file as a simple yet effective entitlement server.
This has the benefit of being easily distributed to all nodes, making it a very
scalable mechanism. A scan of the ASCII file for information about the user
determines if the request will be granted.
Users are explicitly granted or denied access through the access control file. A
user who is not in this file is not allowed to perform any operations on the TIBCO
Hawk system. Access control information is in a plain ASCII file located in
<TIBCO Hawk installation directory>/security. See Access Control File, page 135, for
more details.
Logging
All trusted requests (both Trusted and TrustedWithDomain) can be logged to
rolling log files in a directory of your choice.
The current log file is named Trusted.log. When it reaches the maximum size
(size), it is closed and renamed Trusted1.log, and a new Trusted.log is
started. When the number of logs exceeds the maximum (n), log entries roll over
to reuse the oldest log file.
To activate logging, add the following line to the access control file:
<LogService> -log_dir <logDir> -log_max_size <size> -log_max_num <n>
where:
Option Description
logDir The directory where the log file is saved.
Make sure this directory exists before you activate logging.
size The maximum size of the rolling log file in KB. The suffix m or M can
be used for indicating MB.
Two sample access control files are included with TIBCO Hawk.
• Trusted.txt can be used on UNIX or Windows. It is used when the
command line specifies Trusted.
• TrustedWithDomain.txt is for use on Windows only, and is used when the
command line specifies TrustedWithDomain.
The access control files, Trusted.txt and TrustedWithDomain.txt, are
described in the next section.
To use the Trusted model:
1. Create a directory called <TIBCO Hawk installation directory>/security/.
2. Modify the appropriate sample access control file, Trusted.txt or
TrustedWithDomain.txt, according to the requirements of your system.
3. Save the modified file in the directory you created, without changing the
filename. The program automatically searches for the access control file in this
directory.
4. Start the TIBCO Hawk agent and Display as follows:
— On UNIX, specify the following in the agent configuration file:
COM.TIBCO.hawk.security.trusted.Trusted
— On Windows, enter one of the following in the Security Policy Class dialog
of the Windows Configuration Utility:
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
The Trusted model is now in effect. The security policy will stay in force as long as
the process is running.
Sample access control files are shipped with the TIBCO Hawk software, in the
directory <TIBCO Hawk installation directory>/samples/security/.
Trusted.txt
This access control file can be used with UNIX or with Windows 2000, or XP.
The user for authorization is the login ID of the TIBCO Hawk Display owner.
TrustedWithDomain.txt
This file can only be used with Windows 2000 or XP, and only when specified in
the command used to start TIBCO Hawk agent and Display, as in
-security_policy COM.TIBCO.hawk.security.trusted.TrustedWithDomain.
The user is the login ID and the domain where the user is logged on. For example,
for user1 in domainX, the user is <domainX>\user1.
Group Operations
A group operation effectively performs a method invocation simultaneously on
all of the specified target microagents. It is useful for affecting a group of
microagents in a single operation. There are two kinds of group operation:
network query and network action. See the TIBCO Hawk Administrator’s Guide for
more details.
Wildcard characters + and * affect permissions on group operations and
point-to-point invocations as shown in Access Control File Settings, page 137.
• Use + in node access to allow access to group operations.
• Use * in node access to allow access to point-to-point invocations.
• Use + in method access to allow access to all INFO and ACTION methods.
• Use * in method access to allow access.
Explanation of Settings
The settings in the example files below provide access to the following users as
shown here:
• Grant user1 point-to-point access to all methods on all microagents, except:
— All ACTION methods on the Custom microagent on all nodes.
— The specified methods on the Repository microagent on all nodes.
— The specified methods on the RuleBaseEngine microagent on nodeA.
• Grant user2 point-to-point and group operation invocation access to all
methods on all microagents, except:
— All ACTION methods on the Custom microagent on all nodes.
— All ACTION methods on the Repository microagent on all nodes.
— All ACTION methods on the RuleBase microagent on all nodes.
• Grant user3 point-to-point and group operation invocation access to all
methods on all microagents on all nodes, except:
— group operation invocation access to all ACTION methods on the RuleBase
microagent.
• Grant user4 full access to all methods on all microagents on nodeB.
• Grant user5 point-to-point access to all INFO methods on all microagents on
all nodes.
#
# This file is used by agent running with COM.TIBCO.hawk.security.trusted.Trusted
# security model.
#
#
# Explanation of Settings:
#
# Grant "user1" point-to-point access to all methods on all Microagents, EXCEPT
# - all ACTION methods on the Custom microagent on all nodes.
# - the specified methods on the Repository microagent on all nodes.
# - the specified methods on the RuleBaseEngine microagent on "nodeA".
user2 + * +
!user2 * COM.TIBCO.hawk.microagent.Custom +
!user2 * COM.TIBCO.hawk.microagent.Repository +
!user2 * COM.TIBCO.hawk.microagent.RuleBaseEngine +
user3
!user3 + COM.TIBCO.hawk.microagent.RuleBaseEngine +
user4 nodeB
user5 * * *
#
# To activate logging, uncomment the following:
# <LogService> -log_dir logDir -log_max_size size -log_max_num n
#
# where: logDir is the directory where the log file will be stored
# size is the maximum size of a rotating log file in KB.
# A suffix m or M can be used for indicating MB .
# n is the maximum number of rotating log files.
#
# This file is used by agent running with
# COM.TIBCO.hawk.security.trusted.TrustedWithDomain security model.
#
# To allow a user running with COM.TIBCO.hawk.security.trusted.TrustedWithDomain
# security model on Windows platform to access this agent, the user
# specified should include the domain of the user.
# For example, for user1 in domainX, the user should be specified as
# "domainX\user1".
#
# Note that agents using the TrustedWithDomain security model also allow
# users running with COM.TIBCO.hawk.security.trusted.Trusted security model
# to access this agent. For these users, the domain should not be
# included in the user.
#
#
# Explanation of Settings:
#
# Grant "user1" point-to-point access to all methods on all Microagents, EXCEPT
#- all ACTION methods on the Custom microagent on all nodes.
# - the specified methods on the Repository microagent on all nodes.
# - the specified methods on the RuleBaseEngine microagent on "nodeA".
#
# Grant "user2" point-to-point and network access to all methods on all
# Microagents, EXCEPT
#- all ACTION methods on the Custom microagent on all nodes.
#- all ACTION methods on the Repository microagent on all nodes.
#- all ACTION methods on the RuleBase microagent on all nodes.
#
# Grant "user3" point-to-point and network access to all methods on all
# Microagents on all nodes, EXCEPT
#- network access to all ACTION methods on the RuleBase microagent.
#
# Grant "user4" full access to all methods on all microagents on nodeB.
#
# Grant "user5" point-to-point access to all INFO methods on all microagents
# on all nodes.
#
#
user2 + * +
!user2 * COM.TIBCO.hawk.microagent.Custom +
!user2 * COM.TIBCO.hawk.microagent.Repository +
!user2 * COM.TIBCO.hawk.microagent.RuleBaseEngine +
user3
!user3 + COM.TIBCO.hawk.microagent.RuleBaseEngine +
user4 nodeB
user5 * * *
#
# To activate logging, uncomment the following:
# <LogService> -log_dir logDir -log_max_size size -log_max_num n
#
# where: logDir is the directory where the log file will be stored
# size is the maximum size of a rotating log file in KB.
# A suffix m or M can be used for indicating MB .
# n is the maximum number of rotating log files.
Certified Model
The certified model provides a high degree of security for the TIBCO Hawk
system.
Authentication
Authentication can be done via shared secret (e.g., password) or via certificates
and digital signatures.
The Certified model uses the decryption capability provided by TIBCO
Rendezvous DataSecurity to decrypt a file on disk containing the private key of
the principal after prompting the user for a password. It then uses the certificate
that was sent along with the message to verify the signature and identify the
sender enabling a decision to be reached regarding the processing of the request.
Integrity
Digital signature techniques can be used to apply a one-way hash algorithm on
the message and encrypt the hash value using a private key. This process, known
as signing, enables the holder of the corresponding certificate to verify the
integrity of the message. The sender will use the certificate that accompanied the
message to calculate the one-way hash value. Comparing with the signature can
verify the integrity of all messages. The use of the one-way hash algorithm is a
powerful tool for determining if a document has been tampered with.
Authorization
The Certified model uses the Certified.txt properties file to store
information about the TIBCO Rendezvous Access Control Daemon (rvacld) and
Hawk users and agents. Entitlements are handled by configuring the rvacld
daemon, which then functions as the entitlement server. A user or agent that is
not specified in the rvacld configuration referred to in the Certified.txt file is
not allowed to perform any operations on the TIBCO Hawk system.
The Certified.txt properties file must be formatted according to specifications
for J2SE 1.4 and above, available at
www.javasoft.com/j2se/1.3/docs/api/java/util/Properties.html.
Certificates
The Certified model can use either login/password authentication (default) or
certificates with corresponding private keys for each user of the TIBCO Hawk
system.
The encrypted certificate and private key must be in a X509 encoded PEM
formatted file in a directory called .hawk in the home directory of the owner of
the TIBCO Hawk Display process, in a file called username.key. The system will
look for this file in the user’s system and use it as the user’s certificate. Otherwise,
the system will assume that the user is authenticated by password only, and the
user will be prompted.
Architecture
The architecture supporting the certified model is shown in Figure 12.
Rendezvous
Encrypted DataSecurity
Certificate File
CA Root
TIBCO Rendezvous Certificate
DataSecurity
Embedded Certificate
TIBCO Rendezvous Transport
Access control
To set access control using the Certified model you must first ensure that you
have a valid Certified.txt properties file, then configure the rvacld..
- or -
agent.key.passwd.file = mypasswordfile
Or, if the agent is only identified by a password, comment out the agent.key.* lines
and use on of these:
#agent.passwd = apassword
#agent.passwd.file = agent.pass
In addition to the above, each user has to be identified, but that doesn't happen
here. The username is taken from the system property named user.name. If
absent, the default value of anonymous is used.
If the user has a directory named .hawk in their home directory, then it is searched
for a file named username.key, and this is used as the user's certificate. Otherwise it
is assumed that the user is identified by a password only, and he/she is prompted
for this.
If the console cannot prompt the user (for example, if the security code is being
used in DAEMON mode), then the ~/.hawk directory is checked for a file named
username.pass, and the content of this file is used as the user's password.
Creating Users
Create a user entry in the rvacld for each Hawk user that will be permissioned.
The TIBCO RVDS manuals give information about how to create users, and give
them certificates if desired.
Create a user for each agent, or set of agents that will be controlled. (You can have
all of your agents log in as the same "user" if you want, or assign a different "user"
for each agent.)
• On Windows, enter the following in the Security Policy Class dialog of the
Windows Configuration Utility:
COM.TIBCO.hawk.security.certified.Certified
The program will automatically search for the access control file in the <TIBCO
Hawk installation directory>/security directory. Note that you must create this
directory manually.
The security policy will stay in force as long as the process is running.
The TIBCO Hawk agent supports secure AMI communication using TIBCO
Rendezvous DataSecurity. This enables the AMI applications to verify the
authenticity and integrity of all requests.
The TIBCO Hawk agent and HMA support an option to specify the use of TIBCO
Rendezvous DataSecurity for communicating with AMI applications
(-ami_rvds_session). This permits a single TIBCO Hawk agent and HMA to be
shipped regardless of security concerns. It is necessary for the TIBCO Hawk
agent, HMA, and AMI applications to distinguish between secure and non-secure
communication because TIBCO Rendezvous DataSecurity requires decryption of
all messages, even messages that are signed but NOT encrypted.
The architecture supporting secure AMI communication is shown in Figure 13.
Certificate agent
Encrypted
Certificate File
CA Root
Certificate
Certificate console
Trusted Users
File
RVDS Key RVDS
Holder Context
Embedded Certificate
TIBCO Rendezvous Transport
The TIBCO Hawk agent supports a mechanism by which the TIBCO Hawk
administrator can import a certificate and private key for use by TIBCO
Rendezvous DataSecurity for AMI communication. The TIBCO Hawk agent will
look for the following file: <TIBCO Hawk installation directory>/security/
password.ami. This contains the password needed by the TIBCO Rendezvous
DataSecurity decryption facility to decrypt the file on disk containing the
certificate and private key. The encrypted certificate and private key must be in a
X509 encoded DER formatted file in the following location: <TIBCO Hawk
installation directory>/security/certificate.ami. The TIBCO Hawk agent will
pack all AMI messages using the private key. An AMI application will use the
certificate that accompanies the message to verify the authenticity and integrity of
the message.
Since the private key used to pack AMI messages is provided to the TIBCO Hawk
agent at run-time, it is also necessary to provide the corresponding certificate to
any AMI applications wishing to perform authorization. Applications should
look in the following location: <TIBCO Hawk installation directory>/security/
certificate.ami. Only requests that have been signed using the private key
associated with this certificate will be considered authorized.
UNIX Procedure
1. Add a command to start the localhost rvd prior to starting any TIBCO Hawk
processes, as follows:
rvd -listen tcp:127.0.0.1:<daemon>
Windows Procedure
Use rvntsreg.exe to install a localhost rvd as a Windows service. The procedure
is similar to that given in Setting Up Network Communication in Windows,
page 118. See that section for a fuller description.
1. Create an rvd service using rvntsreg.exe. See Installing a Routing Daemon
as a Windows Service, page 118, for details. Use the following parameters:
-listen tcp:127.0.0.1:<daemon>
2. Make all TIBCO Hawk services dependent upon this new rvd service. See
Making TIBCO Hawk Services Depend on the Routing Daemon Windows
Service, page 118, for details.
3. In the Configuration Utility, modify the daemon parameter to the following:
tcp:127.0.0.1:<daemon>
Certificate Authorities
• VeriSignClass3PrimaryCA20040107
• VeriSignClass3PrimaryCA20180518
• VeriSignClass4PrimaryCA
• VeriSignCommercialSoftwarePublishersCA20040107
• VeriSignIndividualSoftwarePublishersCA20040107
• VeriSignTimeStampingCA
Appendix A Migration
Topics
Migration Issues
Appendix B Troubleshooting
Topics
UNIX Errors
This section lists possible installation errors on UNIX along with solutions.
The DISPLAY variable must be set to the IP address or name of the computer (on
which the installer graphics window are to be displayed), followed by a screen
address, which can be :0.0. For example:
# Bourne shell
DISPLAY=<ip_address>:0.0; export DISPLAY
# Korn shell
export DISPLAY=<ip_address>:0.0
# C-shell
setenv DISPLAY <ip_address>:0.0
For example, consider a scenario where you install TIBCO Hawk on a remote
HP-UX machine (named itaska). Because you have a Solaris machine (named
alaska) with a video card and monitor, you can run an X-window application on
it. So you decide to telnet to itaska from alaska.
When you telnet to itaska, you will not get access to itaska's monitor and will
be unable to display an X-window application. That is why you must set the
DISPLAY variable, which instructs the X-server to redirect all windows to the
computer set in the variable. Before doing so, the computer (specified in the
DISPLAY variable) must give permissions to share its monitor.
The following error can occur only on HP-UX 11.00 64 bit systems. It does not
happen on an HP-UX 11.00 32 bit system or an HP-UX 11.11 (or 11.i) system.
Installation on a HP-UX 11.00 64 bit system may crash with the following error
message:
Pid nnn killed due to trashed stack.
Pid nnn was killed due to failure in writing the signal context.
If this error occurs, install HP-UX kernel patch PHKL_27282 and then install
TIBCO Hawk.
Windows Errors
This section lists possible installation errors on Windows along with solutions.
In this case, you must reinstall Hawk with a shorter installation path.
General Errors
This section lists installation errors that can occur on both UNIX and Windows.
This means that the user account specified for starting the TIBCO Hawk services
does not have sufficient privileges to start the services.
Because this error occurs during installation, you will not be able to change the
account used to start the services (the services will not appear in the list of
services in your Services control panel).
To resolve the situation, uninstall the TIBCO Hawk software, then install the
software again giving a valid account. To uninstall the software, select
Start>Programs>TIBCO Hawk Software>UnInstall.
No Administrator Privilege
During TIBCO Hawk installation on Windows, if you encounter the following
message:
Severe - You must have administrator privilege to install Hawk
Services.
You need to log back into the machine as a user with local administrator
privileges to correctly install TIBCO Hawk software.
This message probably means the services cannot find crucial TIBCO Rendezvous
files. Usually this is because one of two environment variables, CLASSPATH or
PATH, is set incorrectly.
To view and change environment variables:
1. Choose Start>Settings>Control Panel, double-click the System icon, and click
the Environment tab.
2. In System Variables, check that your CLASSPATH variable includes the file
<TIBCO Rendezvous installation directory>\lib\tibrvj.jar.
3. In System Variables, check that your PATH environment variable includes the
directory <TIBCO Rendezvous installation directory>\bin.
To change an environment variable:
1. Select the variable in the System Variables list.
2. Change the text in the edit box labeled Value.
3. Click Set.
If, after checking these variables, you still get the error, try removing all other files
from your CLASSPATH, so that it includes only the tibrvj.jar file (writing
down the names of the removed files is recommended, to make sure none are
omitted on re-installation). Reboot and try the services again. If this corrects the
error, re-add other files to the CLASSPATH one at a time, after the TIBCO
Rendezvous file.
You can also determine your CLASSPATH and PATH settings by opening a DOS
command-line window and typing echo %CLASSPATH% or echo %PATH%.
Because TIBCO Hawk is a Windows service, all changes made to the environment
and registry require that the Windows machine be rebooted for the changes to
propagate to the Windows Service.
If you have checked all of these possibilities, and you still get Error 2140, verify
that the Windows Service Pack 4 was reinstalled after any recent major changes
were made, before contacting TIBCO Hawk technical support.
This appendix lists the files installed with TIBCO Hawk on Windows and UNIX
platforms.
Topics
Table 21 explains the directory structure and general placement of files in the
TIBCO Hawk software installation subdirectories. The data directory is created
only if the TIBCO Hawk event service is installed, and files are placed in it only
when the event service is started.
.
console_api
ConsoleApp.java
GroupOpSample.Java
TestConsole.java
ma_plugin
DemoMicroagent.java
DM1.java
DM2.java
DM1_Dynamic.java
DM2_Dynamic.java
rulebases
AIX.hrb
HP-UX.hrb
HawkAgent-Unix.hrb
HawkWindowsEventLog.hrb
Linux2x.hrb
Sleep.hrb
Solaris2x.hrb
Spot.hrb
TibRendezvous.hrb
Tru64UNIX.hrb
Win2000.hrb
WinNT.hrb
WinNT_Server.hrb
WinXP.hrb
rbmap.hrm
schedules.hsf
schedule_api
ScheduleCreateAndSave.java
ScheduleGetandSet.java
ScheduleSampleConsole.java
ScheduleSampleConstant.java
ScheduleWithPeriodGroup.java
security
Certified.txt
Test.java
TestOperation.java
Trusted.txt
TrustedWithDomain.txt
Files on OS/400
ami_api
c
ami_sample1.c
ami_sample2.c
java
AmiSample.java
Appendix D Certificates
Topics
The certificate and private key for an agent can be included in the Certified.txt
file, or a pointer can be provided to a separate file containing this information.
PEM encoding is always used for certificates, so they look like text, as in the
following example.
Remove the # at the beginning of each line to uncomment the line.
#agent.key = -----BEGIN CERTIFICATE-----\n \
#MIIDGDCCAoGgAwIBAgIBAjANBgkqhkiG9w0BAQQFADBgMQswCQYDVQQGEwJVUzET\n \
#MBEGA1UECBMKTmV3IEZvb2JhcjEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ\n \
#dHkgTHRkMRkwFwYDVQQDExBDQSBBZG1pbmlzdHJhdG9yMB4XDTAxMDcwMzE3MzQ0\n \
#NloXDTAyMDcwMzE3MzQ0NlowWjELMAkGA1UEBhMCVVMxEzARBgNVBAgTClNvbWUt\n \
#U3RhdGUxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDETMBEGA1UE\n \
#AxMKSGF3ayBBZ2VudDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsi0mvVAq\n \
#Ak/S6HN97GXU0ztJLxEmBkZuxde99H7cUJjAJyoENpgWb6ZIhbDSQSL6yMWY/B+Z\n \
#9SnLHs+f9n6qrAOn1Xlrvlne8UhnuBSZ3HL5OUWCjaHYijRmnK1FkFMsBJ1X23T5\n \
#kL2plTrEABQzQHX67lAmkbZ8tyanPP5teIkCAwEAAaOB5zCB5DAJBgNVHRMEAjAA\n \
#MCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAd\n \
#BgNVHQ4EFgQU1oO0yNN8Tpicz+4CaROknQV9Cj0wgYkGA1UdIwSBgTB/gBS6Jwjz\n \
#PR4x4/WgY/OV2+WmXLBQmqFkpGIwYDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l\n \
#dyBGb29iYXIxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEZMBcG\n \
#A1UEAxMQQ0EgQWRtaW5pc3RyYXRvcoIBADANBgkqhkiG9w0BAQQFAAOBgQCd56Y6\n \
#eEgRuz1KfWBq25/MRhGxtWVJscuraOUUPFlcYeUlSpdRsxKBq9VgdHcAQgut5ZgJ\n \
#DM0oyg2lHcZAWAt9dIWtFqCg2p8mdIxMzi2pLC+eZEgx7t7NUwtQL6oRfZHSl7vD\n \
#uWfn6w4gFepY/ynaSiPDIlCr3Zbzjy7hNLZNag==\n \
#-----END CERTIFICATE-----\n \
#-----BEGIN RSA PRIVATE KEY-----\n \
#Proc-Type: 4,ENCRYPTED\n \
#DEK-Info: DES-EDE3-CBC,118CDC345C0DAB35\n \
# \n \
#QgGaqKReWk7xS9mEdDLjBQLXHI5MeSjtFMLtjp1xKlA8xdGsb44j4gY00UbFBTiO\n \
#fkGTutY6syjHiBxgF6svaPMgI793V7CZmkDNlDgvMUL4ZwEoL1fxtdWQ4S+OG9JV\n \
#WorTCMmIfeObrV8M2lArbBsDmYUEwBud4gSip4d3YxRqf0LiPAKTOjheVnPTolJ+\n \
#ogkcJTeE0WglsQJedHyL6cqrKMmMqlwrlRjjCnRy71KnvVafHGviLc41VkCX6maM\n \
#DdPeke+xTqMoXWIciil1R4UhupaRSQCs0UKa0szeX0mxThy/G28slDD1A6nha17I\n \
#Qwt925u6lEuCzwQSM3abjgI3EFjSZu5iYe51iMWJnWzn1cm+hVvb8hP6VDRyDNbY\n \
#iZHQjAsMvxXWj2oVf5+jRx33HUROB5JO2Elp8eeeU75yGC/1NIIIlUAqVWE8GyNh\n \
#yx9dRPOoJY5Q6ycS4iQvG3zn4WjIYSg/ZENW9AeWtDWsTAJAHdwYGdmQsO1q0uhk\n \
#XW/MGeOmDbumOJM2PO/85XNAhCkITkNOgH7OVTjJjfqucIybCUWUdBEXBeOelTXw\n \
#I+O1IYTM997d+ncH3fXqCDDBkfyXrzkveOxRZpu/Bgyd/tXQB41ARAqUZQjmxyOs\n \
#FgKryrqHmrShqvFntDH9Sqko5dRujJhftq6/QYsYlc+OgejNg/F4N4a+GkgW+wgg\n \
#WRk+WjPI365WrVlEW9ar/lhqqgHsk7bPKHk+SR+t+sbbMeFUKQd8ejg8wyPmjFO/\n \
#Ba8awLurCGq1VgrlqmlVlAKJpv38E597ahPcWA1qS5W/Llkpo8SsCg==\n \
#-----END RSA PRIVATE KEY-----\n
This appendix lists code page identifiers that can be specified to indicate the
locale of the machine running the HMA.
Topics
Code page identifiers are specified as a value in the Codepage field. See
Codepage on page 93 for details.
20261 T.61
29001 Europa 3
Index
C
-cluster 117, 121 H
configuration on Unix, Setting up the routing
daemon 121 heartbeat interval
configuration, Planning TIBCO Hawk 88 Setting 117, 121
Csh users 35 -host 117, 121
customer support xvi How the Installer Searches for JRE 7
D I
daemon configuration for TIBCO Hawk messaging, Install and Generate a Response File 16, 31
Example TIBCO Rendezvous routing 115 Install and Generate a Template File 17, 32
daemon configuration on Unix, Setting up the Install in Silent Mode 16, 31
routing 121 Install Using a Response File 17, 32
daemon service automatically, Starting the Install Using Console 16, 31
routing 118 Install Using GUI 16, 31
daemon service, Making TIBCO Hawk services Installation Directories 4
depend on the routing 118 Installation Directory 13
default container for the TIBCO Hawk Display 117, Installation Media 15, 29
121 Installation Options 15, 30
default TIBCO Hawk agent name (-host), Overriding Interactive Mode 17, 32
R T
RAM 13, 26 technical support xvi
registry editor, TIBCO Hawk services in Windows 119 Temp Directory 13
registry, Adding the rvrd service value to TIBCO Hawk agent heartbeat interval (-interval),
Windows 120 Setting 117, 121
routing daemon configuration for TIBCO Hawk mes- TIBCO Hawk agent name (-host), Overriding the
U
UNIX installation 23
User Privileges 12, 24, 40
Using the TIBCO Hawk Display over a dial-up net-
work connection 117, 121
W
Windows registry editor, TIBCO Hawk services in
Windows 119
Windows registry, Adding the rvrd service value to
the registry 120