CONTENTS   NextPrevious  



Visual Administrator

SAP J2EE Engine 6.20 Visual Administrator is a graphical user interface (GUI) that enables administration of the whole cluster, of the cluster nodes, and all modules running on them.  Visual Administrator is written in the Java programming language and can be run in any environment where a Java Virtual Machine is available. It enables remote monitoring and management of the cluster, and for each cluster element, and enables the system administrator to monitor all managers and services working on each node in a single GUI. Visual Administrator includes functions for:

Logging on to SAP J2EE Engine 6.20

To connect to SAP J2EE Engine 6.20, the following parameters must be specified in the “Login” dialog box:

When Visual Administrator is started for the first time, the fields of the “Login” dialog box contain the default values. Each time Visual Administrator is started, the last-known values for “User Name,” “Host,” and “Port” are displayed.

Visual Administrator Utilities

Visual Administrator utilities enable you to obtain general information about services and managers, setting the properties, security management, runtime control, and log viewing.

General Utilities

Main Menu and Toolbar

The main menu provides the following options:

The toolbar provides additional options for administration of cluster nodes:

 – Shuts down the selected cluster node

 – Reboots the selected cluster node

The toolbar enables you to start or stop SAP J2EE Engine 6.20 modules:

 – Starts the server or dispatcher part of a service (or both)

 – Stops the server or dispatcher part of a service (or both)

The toolbar provides the following options for saving or resetting SAP J2EE Engine 6.20 modules properties:

 – Saves the properties that were changed in the “Properties” or in the “Control Descriptor” tab

 – Resets the properties from the last change

Status Bar

The “Status” bar provides information about system events.

 – Provides detailed information about system events

Module Information

The “Control Descriptor” tab provides the following subtabs with information about each service.

General

This tab provides general information about the SAP J2EE Engine 6.20 services. The tab contains the following fields:

Note 1: All core services must be in “STARTUP_ALWAYS” mode.

Note 2: All transport services (HTTP, IIOP, P4) must be in either “STARTUP_ALWAYS” or “STARTUP_MANUAL” mode.

Security

The “Security” tab provides information about “Security roles,” “User Mapping,” and “Access to Methods” - separated in three tabs.

The usage of the “Security” tab is described in the Security Management section below.

Properties

The “Properties” tab provides information about cluster services properties.

The usage of the “Properties” tab is described in Setting the Properties section below.

Distribute

Additional

The “Additional” tab provides basic information about each service. You can change the “Running Service Icon,” “Stopped Service Icon,” and “Suspended Service Icon” fields, or set their default values.

Setting Properties

Properties 

The “Properties” tab contains the cluster modules properties that can be modified. These properties are specific for each service and are used to start the service. Each property has “Key” and “Value” according to java.util.Properties .

Control Descriptor

The subtab “Properties” of the “Control Descriptor” tab provides information about the service properties:

Note: For detailed information about the service properties, refer to the Services Administration Reference and Managers Administration Reference sections in this manual.

Security Management

Visual Administrator ( Control Descriptor ® Security   tab) defines security roles assigned to specified users or groups of users. Security roles can be bound with access rights for particular methods of a service, or for the entire service. All parameters must be set in the following order.

Security Roles

A security role is defined by specifying the following parameters in the “Security Roles” tab: 

User Mapping

User mapping handles correspondence between the security roles (mnemonic users) and the selected real server users who have access permissions to certain methods:

Access to Methods

Defined security roles can be granted access permissions to a single method or entire service (all methods). The “Access to Methods” tab contains a list of mnemonic names of all defined security roles:

Runtime Control

The “Runtime” tab provides options to modify certain service properties at runtime. The toolbar provides additional options for each “Runtime” tab, which are described when the corresponding service “Runtime” tab is considered.

Note: Service-specific “Runtime” tabs are described in the corresponding Services Administration Reference sections in this manual.

Log Viewing

All significant events that occur on cluster nodes are written to log files that correspond to each module. A list of these events is displayed in the “Log Viewer” tab. You can view the following types of log messages:

 Emergency  – system is unusable

 Alert  – immediate action must be taken

 Critical – critical conditions

 Error – error conditions

 Warning – warning conditions

 Notice – normal but significant events for the system

 Info – information

 Trace – events that occur during application methods execution

 Debug – debug-level messages

 All – shows all existing events

Log messages can be displayed in ascending or descending order by type, date and time, caller (the specific service), user, client IP, and cluster.

By choosing  (Save log messages) on the toolbar, all displayed log messages in the table are saved.

By choosing  (Reset log messages) on the toolbar, all displayed log messages in the table are deleted and pointers are nullified.

By choosing  (Next log) on the toolbar, the next log of the selected type in the table is displayed and the log message content is shown.

By choosing  (Next log messages) on the toolbar, the next “X” log messages are added in the table, where “X” is the number specified in the “CountField”.  

By choosing  (Auto on) on the toolbar, the next “X” log messages are added in the table in the defined period automatically.

By choosing  (Auto off) on the toolbar, the “Auto on” option is turned off.

Previous  Next