You want to modify the circular monitoring settings for the node applications in a UTM cluster application (Unix, Linux and Windows systems) and/or the settings for node application access to the cluster configuration file and the administration journal of the UTM cluster application (Unix, Linux and Windows systems).
To do this, you must enter the new property values in the the data structure kc_cluster_par_str via the data area.
Possible modification
The following table indicates the settings that you are able to modify.
Field name | Meaning |
check_alive_timer_sec | In a UTM cluster application, every node application is monitored by another node application (circular monitoring), i.e. each node application monitors the availability of another node application and is itself monitored by a node application. To do this, the monitoring node application sends messages to the monitored node application at defined intervals (check_alive_timer_sec). If the monitored application is available, it acknowledges the message. Minimum value: ‘30'' |
communication_retry | communication_retry specifies how often a node application repeats an attempt to send a monitoring message if the monitored node application does not respond within the defined time. Minimum value: ‘0'' |
communication_reply_timer_sec | communication_reply_timer_sec specifies the maximum time in seconds that a node application waits for a response after sending a monitoring message. Minimum value: ‘1' |
restart_timer_sec | Maximum time in seconds that a node application requires for a warm start after a failure. Minimum value: 0, i.e. restart of the application is not monitored. |
file_lock_timer_sec | file_lock_timer_sec is the maximum time in seconds that a node application waits for a lock to be assigned for accessing the cluster configuration file or the cluster administration journal. |
file_lock_timer_sec: | |
file_lock_retry: | |
deadlock_prevention='N' deadlock_prevention='Y' | UTM does not perform any additional verifications for the GSSB, TLS and ULS data areas in order to prevent deadlocks. If a deadlock occurs in one of these data areas then it is resolved via a timeout. |
UTM performs additional verifications for the GSSB, TLS and ULS data areas in order to prevent deadlocks. |
Period of validity / transaction management: type GID ("KC_MODIFY_OBJECT - Modify object properties and application parameters")