Runtime Parameters Reference
The runtime is configured using parameters defined in the engineParameters.xml
file located in the properties/
sub-folder of the runtime installation directory.
This file includes the following configuration elements:
In this file, you can also configure:
-
The repositories storing the deliveries,
-
The Java options added to the runtime startup.
Configuration samples are provided in the properties/samples/ sub-folder of the runtime installation directory.
|
Passwords are encrypted using the encrypt <password> command on the runtime console
|
You can externalize the parameters in the engineParameters.xml file using environment variables.
|
Runtime Parameters
The following parameters define the overall behavior of the runtime.
Parameter | Default value | Description | ||
---|---|---|---|---|
|
|
Temporary folder for the Runtime. Used by developers as a workspace, and by the Runtime to store some temporary files. |
||
|
|
Extension of the deliveries. Do not change this value. |
||
|
|
Default fetch value for reading data in databases. This value may be overriden by data flows designers or when configuring deliveries for production. |
||
|
|
Default batch update value for writing data into databases. This value may be overriden by data flows designers or when configuring deliveries for production. |
||
|
|
Default timeout database connections in seconds. |
||
|
|
Default timeout for database queries in seconds. |
||
|
|
If this parameter is set to true, connections created and used by the runtime to communicate with JDBC databases are performed through a connection pool. |
||
|
|
If this parameter is set to true, connections created and used by the runtime to communicate with the log database are performed through a connection pool. |
||
|
|
Default number of sessions for the reporting part of the runtime. This value may be overriden by the graphical interface. |
||
|
|
Jython interpreter version used for scripting actions. To use another Jython version, copy the corresponding Jython files (you can download the Jython Standalone library files from the Jython website) to a
|
||
|
|
Set to true to write the stacktrace to the standard output in case of an error. |
||
|
|
Set to true to write the statistics to the standard output at the end of a session. |
||
|
List of the variables used to compute the session statistics. |
Services
The following parameters configure the runtime services.
Service Startup
Parameter | Default value | Description |
---|---|---|
|
|
Start the built-in scheduler. |
|
|
Start the execution engine. |
|
|
Start an internal H2 database used for session logs and schedules. |
|
|
Start the SOAP and REST servers that enable Semarchy xDI to expose web services. |
Services Ports
Parameter | Default value | Description |
---|---|---|
|
|
Defines whether clients can connect and perform operations on the Runtime using the HTTP protocol. |
|
RMI host (IP address or host name). You can specify it for specific network configurations. For example, when there are multiple domains, or when address translation generate different IP addresses for the same host. It defaults to localhost when undefined. |
|
|
|
IP port of the Java RMI service used by the clients (Designer and Semarchy xDI Production Analytics) to communicate with the Runtime |
|
In the RMI protocol, clients can also receive queries from the server on a callback port. The callback port defaults to the |
|
|
SOAP and REST host (IP address or host name). You can specify it for specific network configurations. For example, when there are multiple domains, or when address translation generate different IP addresses for the same host. It defaults to localhost when undefined. |
|
|
|
Listening port for the SOAP and REST servers. |
|
|
Internal database TCP port for JDBC access. |
|
|
Internal database port for web access. |
Web Services Parameters
Parameter | Default value | Description |
---|---|---|
|
Optional user for queries to the SOAP server |
|
|
Optional password for queries to the SOAP server |
|
|
Optional unencrypted password for queries to the SOAP server |
|
|
Maximum number of concurrent threads on the SOAP server. If number exceeds this size, sessions are put on hold |
|
|
Optional user for queries to the REST server |
|
|
Optional password for queries to the REST server |
|
|
Optional unencrypted password for queries to the REST server |
|
|
|
Specifies if the input files created during web services invocations should be kept or not. The possible values are: |
|
|
Specifies if the output files created during web services invocations should be kept or not. The possible values are: |
|
|
Specifies if the fault files created during web services invocations should be kept or not. The possible values are: |
Security
Services
Parameter | Default value | Description |
---|---|---|
|
|
Set to true to secure the RMI protocol with TLS. |
|
Protocol to be used to secure the endpoints. For example, TLSv1.1. |
|
|
Path to the Java keystore containing the certificate used to secure the endpoints. |
|
|
Java keystore type, such as |
|
|
Password of the keystore file. |
|
|
Alias of the key in the keystore. |
|
|
Password of the key. |
Encryption
Parameter | Default value | Description |
---|---|---|
|
Name of the key used for all password encryption/decryption operation. This key must be in the keystore defined in the Runtime configuration. This parameter replaces the deprecated |
|
|
Name of the key used for password decryption while running a delivery. This key is used for passwords stored in deliveries. This key overrides |
Logging
In this part, the default values will be those used for the logs in H2 (the internal base). For other logs examples, please refer to the example files that are provided.
Logging Configuration
The following parameters define the overall logging behavior of the runtime.
Parameter | Default value | Description | ||
---|---|---|---|---|
|
|
Debug level in the Runtime |
||
|
|
Database used for logging. A corresponding log database configuration must exist under the |
||
|
|
Scan delay of the logs that have been brought back to memory so as to be purged, in milliseconds. |
||
|
|
Default Log Level for the sessions. A higher value means that more information is logged. Possible values are:
|
||
|
true |
This parameter defines whether child sessions should by default inherit the log level from their parent session. This applies only for child sessions started without a log level defined. See Log Level Inheritance for more details. |
||
|
Batch size used when performing purge operations on the log database. When this parameter is not specified the purge operations process all rows at once. Specifying a batch size avoids overloading the database for purge operations. |
Log Database Properties
The following properties can be set in the log database definition (<log>
node) to configure this database.
Property | Default value | Description |
---|---|---|
|
|
Name of the log database. This name is used in the |
|
|
Set to true to automatically update the tables of the log when needed. |
|
|
Java class used for logging. Do not change this value. |
|
|
Log capture mode:
|
Log Database Parameters
The following parameters can be set under a log database definition to configure the storage for this log database.
Parameter | Default value | Description |
---|---|---|
|
|
Driver used to communicate with the log database storage. This driver should be in the module specified in the |
|
|
Connection URL to the log database storage. |
|
|
User connecting to the log database storage. |
|
User password in clear text. |
|
|
User password, encrypted. Passwords are encrypted using the |
|
|
Module containing the libraries to communicate with the log database storage (typically a JDBC driver). |
|
|
|
Type used when the data is a character string. |
|
|
Maximum length of the character strings with the type defined above. |
|
|
Type used when the data is a numeric. |
|
|
Type used when the data is textual (CLOB, unlimited text) |
|
|
Type used when the data is binary (BLOB) |
|
logs Database schema name. |
|
|
|
Set to true to prefix index created with the log database schema name. |
|
|
Syntax of the delete commands. The name of the table to delete is added after this string. |
|
|
Type of compression used for the log database (if activated). Possible values: |
|
|
Delivery storage format in the log database. Possible values are |
|
|
Size above which character strings should be stored as CLOB. |
|
|
Size above which CLOBs should be stored as BLOB. The value |
|
|
Specifies the compression of the BLOB. Possible values are |
|
|
SQL query used to retrieve the current timestamp. |
|
|
Inactivity detection period. |
|
|
Inactivity refresh interval. |
|
Clause added after the SQL commands to creates indexes. Use this parameter to specify physical storage parameters such as tablespaces or underlying physical types. |
|
|
Clause added after the SQL commands which creates tables. Use this parameter to specify physical storage parameters such as tablespaces or underlying physical types. |
|
|
|
Set to true for the runtime to attempt to reconnect to the log database if it becomes unavailable. |
|
|
Number of times the runtime attempts to reconnect to the log database if it becomes unavailable. |
|
|
Delay between reconnection attempts. |
Log Level
The session log level defines the level of information which is logged inside log database for each session executed by the Runtime.
The higher the value is the higher information are logged.
You can find below the different log level values and what level of details can be consulted, depending on the session status.
Log Level | Running Sessions | Successful Sessions | Sessions with Errors |
---|---|---|---|
|
Not logged |
Not logged |
Not logged |
|
Full details |
Not logged |
Full details |
|
Full details |
Session Header and Statistics |
Full details |
|
Full details |
Same as |
Full details |
|
Full details |
Same as |
Full details |
|
Full details |
Full details |
Full details |
Log Level Inheritance
Child sessions started from a parent session without a specific log level may inherit their parent session’s log level, depending on the defaultChildSessionLogLevelInheritance
runtime property value.
In addition, you can set the following values for a session’s log level to override the inheritance machnism:
-
-2
forces the session to use the runtime’sdefaultSessionLogLevel
, ignoring thedefaultChildSessionLogLevelInheritance
property. -
-3
forces the session to inherit the parent session’s loglevel, ignoring thedefaultChildSessionLogLevelInheritance
property.
Misc Parameters
Parameter | Default value | Description |
---|---|---|
|
|
Defines when Modules are loaded by the runtime:
|