Redwood Documentation

Product Documentation

 

›Platform Process Servers

RunMyJobsPlatform Agents

External Platforms

  • Connecting Redwood Server to External Platforms

Credentials

  • Storing Credentials
  • Credential Protocols

Platform Process Servers

  • On-site Platform Process Servers
  • Cloud Platform Agents
  • Using the Wizard to Create Process Servers
  • Configuring Platform Agents
  • Spool Host Agents
  • The Environment of Platform Agent OS Processes
  • Processing Platform Processes
  • Process Server Services
  • Configuring Agentless Process Servers
  • Automatically Updating Platform Agents
  • Enabling TLS
  • Creating Monitoring Checks
  • Configuring Load Balancing on Platform Agents
  • Platform Agent Registry Entries
  • Monitoring Servers with Platform Process Servers

UNIX Agents

  • UNIX Process Servers
  • UNIX Process Server Configuration Data
  • File Events on UNIX
  • Creating UNIX Process Servers (Advanced)
  • Choosing a User Switching Security Mode
  • Controlling Unix Platform Agents
  • Uninstalling Redwood Server Platform Agents from UNIX

Windows Agents

  • Creating a Microsoft Windows Process Server
  • File Events on Microsoft Windows Process Servers
  • Configuration of a Microsoft Windows Process Server
  • Managed Services
  • Configuring Platform Agents on Microsoft Windows
  • Automating Windows tasks that require a desktop window
  • Uninstalling Redwood Server from Microsoft Windows

Agent Definition Types

  • Using the BASH Definition Type
  • Using the KSH Definition Type
  • Using the CSH Definition Type
  • Using the Perl Definition Type
  • Using the Python Definition Type
  • Using the PowerShell Definition Type
  • Using the Visual Basic Script Definition Type
  • Using the CMD Definition Type
  • Using the R Process Definition Type
  • Using the DCL Definition Type
  • Using Platform Definition Types
  • Using the OS Native Definition Type
  • Microsoft Windows Definition Types
  • Using the SQLPLUS Definition Type
  • Using the FTP Definition Type
  • Using the Groovy Definition Type

Command Line Tools

  • Command Line System Tools
  • jtool
  • jcat
  • jdescription
  • jevent
  • jecho
  • jftp
  • JFTP Return Codes
  • jgetcredential
  • jgetfile
  • jgetpar
  • jjoin
  • jlink
  • jlog
  • jmail
  • jmessage
  • jmonitor
  • jputfile
  • jregister
  • jrfc
  • jscp
  • jtool screenshot
  • jscript
  • jsecret
  • jsleep
  • jsplit
  • api-tool.jar

OpenVMS Process Servers

  • Creating HP OpenVMS Process Servers
  • Installing the Platform Agent on HP OpenVMS
  • Configuring HP OpenVMS Process Servers
  • File Events on HP OpenVMS
  • HP OpenVMS Definition Types

AS/400 Connector

  • IBM AS/400 Connector Architecture
  • Setting up the IBM AS/400 Connector
  • Creating an IBM AS/400 Process Server
  • Files on AS/400 Raise Events
  • Using the AS/400 Definition Type
  • Redwood Server OS Support
  • IBM z/OS Definition Types
  • Using the JCL_FTP Definition Type
  • IBM z/OS System Tools

Reference

  • Balancing the Load
  • Credential Protocols
← Credential ProtocolsCloud Platform Agents →

on-site-related topic On-site Platform Process Servers

Platform process servers are used to perform the following activities:

  • Run Operating System processes.
  • Watch for file events.
  • Observe the system load.
  • Act as file servers for OS process files.

To make this possible a platform agent is installed on the computer system where you wish to run OS processes. The platform agent makes the specific OS system calls required for running OS processes and monitoring the system. The central Redwood Server communicates with the platform agent over the TCP/IP network using the HTTP or HTTPS protocols.

note

When installing a platform agent on an SAP application server, Redwood recommends to name the process server <SID>_<APP_SVR>_PlatformAgent, where <APP_SVR> is the hostname of the application server.

The configuration of a process server that runs OS processes consists of settings in the Repository and the installation and configuration of the platform agent.

The process server is a logical object in the central Redwood Server. It consists of two threads: one is responsible for send messages to the platform agent and the other is responsible for processing messages coming from the platform agent.

The process server is configured using the Process Server Parameters.

Overall settings for all platform agents are configured using the Platform Agent Registry Entries.

The platform agent itself consists of a number of different executables and/or scripts, each playing their own role. How these interact is documented in more detail in the pages below, but in general there are usually at least the following programs:

  • network-processor is the program that is responsible for communicating with the central Redwood Server.
  • (UNIX, Microsoft Windows, OpenVMS) job-processor is the program that is responsible for a single process. When a process starts, an instance of the job-processor starts.
  • jtool and derivatives form the System Tools.

For more details see:

  • Creating UNIX Process Servers (Advanced)
    • User Switching Security Options
  • Creating Microsoft Windows process servers (Advanced)
  • Creating HP OpenVMS process servers

Platform process servers that schedule workload or use file events require at least one of the following keys:

  • ProcessServerService.External.limit - the total number of external process servers (Platform agents, distinct web service endpoints, and SAP connectors).
  • ProcessServerService.OS.limit - the total number of platform agent process servers.

Monitoring-only platform process servers on Microsoft Windows and UNIX are free of charge, you may use as many as you like. Monitoring platform agents must have the PlatformAgentService service and are not allowed to have any definition types nor file events.

Support for Networked File Systems

When you want to use Redwood Server in a networked environment there are occasions when you want to use networked file systems in your infrastructure. The term networked file system in this context designates NAS systems, also known as SMB X/NFS/SSHFS file shares; note that SAN file systems, for example mounted via iSCSI, are considered local storage.

This statement outlines the support of platform agents for using networked file systems.

Platform Agents are responsible for the actual execution of processes on an OS level. Platform Agents are not required to run all types of process definitions, notably RedwoodScript, SAP and chains do not require a Platform Agent. When a platform agent is required, it must be installed on the target system that the processes need to be executed on. Platform Agents also have the ability to monitor file systems for changes in directories, and can raise file events upon these changes being noticed.

On Microsoft Windows servers the installation directory and DataRootDirectory must be located on a local file-system.

On UNIX the installation directory can be on a network share. If the DataRootDirectory is on a non-local file-system the following restrictions apply:

  1. The network file share should support UNIX file modes such as setuid and setgid bits, or restrictions may apply to user switching.
  2. The default mechanism for detecting locked files is inoperative. A workaround that uses file age is available.

It is always possible to link files from outside of the DataRootDirectory to processes, if large files need to be stored and managed with the process.

Performance on a network file system will be substantially lower, due to the additional networking overhead when accessing files over the network.

Agent Connection

The central Redwood Server communicates with the platform agent (the network-processor, to be exact) via a TCP connection carrying data in the form of the HTTP protocol. The platform agent is contacted by the scheduler central Java server, and not the other way around. In other words, in terms of the TCP/IP connection the agent is the server and the central Redwood Server is the client. This has the advantage that no incoming TCP ports have to be enabled on the central Redwood Server in order to schedule processes on a machine beyond a firewall.

The default installation procedure also establishes secrets. These secrets are a simple form of key that ensure that a particular platform agent only talks to the Java server that is in possession of the same secret. Message data is also protected by a hash value. The combination of these measures means that it is very hard for an attacker to falsify the communications and act as a Java server.

If, however, you need to protect the content of the data connections as well, you need encryption. Encryption is done using an optional layer that is available only from Redwood directly, as it contains some third party source code. See Secure Agent Connections for more details.

Overriding Process Server Default Values

You can override process server parameter default values globally by setting the following registry entry:

/configuration/ProcessServerParameters/<name>

The <name> is the name of the process server parameter. Note that this registry entry only affects default values; if you add the process server parameter to the process server, then that value will have precedence over the value of this registry entry.

Only the scheduler-isolation-administrator can create/edit these registry entries.

See Also

  • Using the Wizard to Create Process Servers
  • Configuring Platform Agents on Windows
  • Configuring Load Balancing on Platform Agents
  • Automatically Updating Platform Agents
  • Securing Communications for Platform Agents and System Tools
  • Creating a Monitoring Platform Agent
  • Monitoring External Systems with Platform Agents
  • Creating a Monitor Check
  • Reversing Network Connections to Platform Agents
  • Platform Agent Registry Entries

onsiteTopic

← Credential ProtocolsCloud Platform Agents →
  • Support for Networked File Systems
  • Agent Connection
  • Overriding Process Server Default Values
  • See Also
Docs
Getting StartedInstallationFinance InstallationConcepts
TroubleshootingArchiving
Learn and Connect
Support Portal
BlogEventsResources
ISO/ IEC 27001 Information Security Management
Automate to be human

2023 All Rights Reserved |

Terms of Service | Policies | Cookies | Glossary | Third-party Software | Contact | Copyright | Impressum |