Creating Application Objects
To create an Application object, perform the following actions:
- Go to Configuration > System > Configuration Manager.
- Click Applications. The Applications list displays.
- Click the New button.
- Enter the following information. For some fields, you can either enter the name of a value or click the
Browse button to select a value from a list:
- Name—The name of the Application. You must specify a value for this property, and that value must be unique
within the Configuration Database. Genesys does not recommend that you use symbols (including single and double quotation marks)
in Application names; doing so may cause Applications to malfunction.
- Template—The Application Template on which this Application is based. This value is set automatically when
you select the Application Template.
- Type—The type of the Application. This value is set automatically, based on the selected Application
Template.
- Version—The version of the Application. This value is set automatically, based on the selected Application
Template version.
- Is Application Server—This field is checked for all daemon Applications and not checked
for all GUI Applications. It is set automatically, based on the Type field.
- Tenant—In a multi-Tenant environment, the Tenant to which this object
belongs. This value is automatically set to the Tenant that was specified in the Tenant Directory field in the object list.
- State Enabled—If selected, indicates that the object is in regular
operating condition and can be used without any restrictions.
The following fields apply only to daemon Applications, not to GUI Applications:
- Working Directory—The full path to the directory where this Application is installed. This field is mandatory.
When creating a new Application, Genesys recommends inserting a period (.). The path will be filled in automatically when the new Application
is installed and connects to Configuration Server.
- Command Line—The command line that is used to start this Application, specifying the name of the Application's
executable file. This field is mandatory. When creating a new Application, Genesys recommends inserting a period (.). The command line
will be filled in automatically when the new Application is installed and connects to Configuration Server.
- Command Line Arguments—Additional command-line parameters that are used to start this Application. When creating
a new Application, Genesys recommends leaving this field blank. Any arguments will be filled in automatically when the new Application
is installed and connects to Configuration Server.
- Startup Timeout—The time interval, in seconds, during which the Management Layer expects this Application to
start. If the Application has been configured with the autostart configuration option set to true, this is also the
amount of time that Solution Control Server should wait to start this Application after initialization or after a system reboot.
This field is mandatory.
- Shutdown Timeout—The time interval, in seconds, during which the Management Layer expects this Application
to shut down. This field is mandatory.
- Auto-Restart—Indicates whether the Management Layer automatically restarts the Application after it shuts down
unexpectedly.
- Host—The host computer on which the Application is running.
Note: To support specific HA configurations, more than one server can be registered on the same port within the same host.
Otherwise, do not assign the port number to any other server on the same host.
- Backup Server—The server that Client Applications contact if the connection to the primary server fails.
You cannot associate one backup server with more than one primary server. You must use the same Application Template for the backup
server that you use for the primary server, and you must associate the servers with the same user account.
Note: When you designate an Application as a backup server for another server, the Application's Connections, Tenants,
and Switch (for T-Server Applications) are automatically changed to match the corresponding values for the primary server. As long as this
Application is associated with the primary server, its Connections are treated as read-only, and they are changed only when you apply
changes to the Connections of the primary server.
- Redundancy Type—The type of redundancy with which this Application is running.
- Timeout—The amount of time, in seconds, that the client Application waits between reconnection attempts
after a connection failure with the server.
- Attempts—The number of attempts to reconnect to this server before trying to connect to the backup
server. This value must be 1 or higher. This property is used only if you specify a Backup Server for this server.
Note: Setting this parameter to any value other than 1 may not take effect for some types of Applications.
- Login as SYSTEM—If checked, indicates that this Application logs into Configuration Server on behalf of the SYSTEM
account.
- Login As Account—Identifies the account that applications must use to log in to Configuration Server. If Login
as SYSTEM is checked, this field is disabled. For Configuration Server type applications, this field defaults to
Environment\default.
Note: If you are configuring Configuration Server Proxy, Genesys strongly recommends that you use the default value
(Environment\default).
- Certificate—The security certificate value. In Windows, select the certificate
value from the list of installed certificates. In UNIX, enter the full path to the <serial_#>_<host_name>_cert.pem
file.
- Certificate Description—An optional description of the Certificate.
- Certificate Key—The full path to the <serial_#>_<host_name>_priv_key.pem file of the
security certificate key. This field is used only if Genesys Security is deployed on UNIX; otherwise this field is empty.
- Trusted CA—The full path to the ca_cert.pem file of the CA that issued the default security
certificate. This field is used only if Genesys Security is deployed on UNIX; otherwise this field is empty.
Note: Refer to the Genesys Security Deployment Guide for more information about deploying Genesys TLS Security.
- The Connections tab lists the connections that this Application has to other Applications. Click the Add button
to add a connection.
- Enter the following information in the pop-up window that displays on your screen:
- Server—The server application that this application connects to as a client when it starts.
- Port ID—The port of the server to which the application connects. If you want to use a secure connection, be sure to select a secure port.
- Connection Protocol—The name of the connection control protocol.
Note: Set the ADDP protocol between Local Control Agent and Solution Control Server in the Options tab of the Host object.
- Local Timeout—This value is required only if you specified addp in Connection Protocol. This value specifies
the heartbeat polling interval, measured in seconds, on a client side. This indicates how often the client application sends polling signals to the server
application. To enable this functionality, specify any integer as the value.
Warning! To avoid false disconnect states that might occur because of delays in the data network, Genesys recommends that you set the ADDP
timeouts to values greater than 10 seconds.
- Remote Timeout—This value is required only if you specified addp in Connection Protocol. This value specifies
the heartbeat polling interval measured, in seconds, on a server side. This indicates how often the server application sends polling signals to the client
application. To enable this functionality, specify any integer as the value.
Warning! To avoid false disconnect states that might occur because of delays in the data network, Genesys recommends that you set the ADDP
timeouts to values greater than 10 seconds.
- Trace Mode—The connection trace mode used between a server and its client.
- Trace Is Turned Off—Select if you do not want either the client or the server application to print ADDP-related messages in its log.
- Trace On Client Side—Select if you want the client application to print ADDP-related messages in its log.
- Trace On Server Side—Select if you want the server application to print ADDP-related messages in its log.
- Trace On Both Sides—Select if you want both the client and server applications to print ADDP-related messages in their log.
- Connection Mode—Specifies whether this port is secured or not by Genesys Security using the TLS protocol. This field is disabled
if the client does not use Genesys Security.
- Transport Protocol Parameters—Any text, usually key=value pairs, separated by a semicolon (;). This property
is application-specific. Refer to the documentation for the particular application to determine the appropriate values for this field, if any.
- Application Parameters—Any text, usually key=value pairs, separated by a semicolon (;). This property
is application-specific. Refer to the documentation for the particular application to determine the appropriate values for this field, if any.
- Click the Apply button to save the information in the Connections tab.
- The Ports tab lists communication ports used by the clients of an application to connect to a server. To support specific high-availability
configurations, more than one server can be registered on the same port within the same host. Otherwise, do not assign the port number to any other server on the same host.
Click the Add button to add a connection.
- Enter the following information in the pop-up window that displays on your screen:
- Port ID—The identifier of the port.
- Communication Port—The port associated with the specified port ID.
- Connection Protocol—The protocol used for the connection.
- HA Sync—If selected, an HA backup server will use this port to establish a connection to the primary server.
- Listening Mode—The listening mode configured for this port
- Certificate—The security certificate value. In Windows, select the certificate
value from the list of installed certificates. In UNIX, enter the full path to the <serial_#>_<host_name>_cert.pem
file.
- Description—An optional description of the Certificate.
- Certificate Key—The full path to the <serial_#>_<host_name>_priv_key.pem file of the
security certificate key. This field is used only if Genesys Security is deployed on UNIX; otherwise this field is empty.
- Trusted CA—The full path to the ca_cert.pem file of the CA that issued the default security
certificate. This field is used only if Genesys Security is deployed on UNIX; otherwise this field is empty.
Note: Refer to the Genesys Security Deployment Guide for more information about deploying Genesys TLS Security.
- Transport Parameters—Any text, usually key=value pairs, separated by a semicolon (;). This property
is application-specific. Refer to the documentation for the particular application to determine the appropriate values for this field, if any.
- Application Parameters—Any text, usually key=value pairs, separated by a semicolon (;). This property
is application-specific. Refer to the documentation for the particular application to determine the appropriate values for this field, if any.
- Click the Apply button to save the information in the Ports tab.
- The Tenants tab functional meaning only in a multi-Tenant environment. It specifies a list of Tenants that this application serves.
The information specified in this list does not restrict the access privileges of the daemon applications with respect to the configuration data.
Click the Add button to add a Tenant to this Application object.
Note: T-Server and High Availability (HA) Proxy applications do not display the Tenant property. A T-Server can serve only one Tenant,
which is specified in the T-Server's General properties. An HA Proxy can serve only the same Tenant as the corresponding T-Server,
and this Tenant is also specified in the HA Proxy's General properties.
- Click the Save button.