Linux Picture Book – Learn the Pictorial Way – 1

Advertisements

TIBCO Master Data Management – Installation Guide

Hi Guys,

After a long time i am going to upload a document on installation of TIBCO MDM (master Data Management.)

MASTER DATA MANAGEMENT

Data is your organizations’ most valuable asset. When mixed and matched in the right ways, it can reveal new opportunities, unseen threats, and areas for business improvement.

While mountains of data are collected to capture valuable intelligence, information is often scattered across the business. Living in multiple and often overlapping locations – from application siloes to spreadsheets on personal computers – knowledge is hard to attain, let alone shared and applied in an effective, meaningful way.

Hey Past, Are These Events Important?

Sprawling data records also jeopardize business outcomes, especially when events are thrown in the mix. A sound reference point is required to understand the historical significance and contextual relevance of activity as things change (i.e. are a negative post on a social network and a returned product the same customer?).

Unless intelligence is up-to-date and consistent across all access points, business decisions and performance will be compromised and less effective – stunting overall growth and exposing the organization to unnecessary, avoidable risk.

Set the Record Straight: A Single Version of Truth

TIBCO’s master data management (MDM) platform delivers the governance processes needed to construct and effectively maintain a centralized source of accurate intelligence.

  • Multi-Domain Platform: Delivers powerful control over a wide range of data assets – including product, customer, and vendor information
  • Centralized Mgmt.: Unified platform offers a single set of tools to effectively manage master data records enterprise-wide
  • Stickler for Quality: Automated processes can be customized to enforce validation and quality control – ensuring records stay clean and consistent (spans geographic, line-of-business, third-party, and application silo boundaries)
  • Universal Connectivity: Data from any source can be readily integrated , accessed, and consumed by applications, business processes, business intelligence tools, and users
  • Architected for Change: Flexible and scalable platform can meet immediate business needs and adjust to support future demands (even when new business process solutions are introduced)

Benefits

  • Enhance Efficiency: Improve visibility and control over business activities by managing sophisticated relationships across products, customers, vendors, and locations
  • Optimize Outcomes: Ensure accurate, timely information supports decisions and actions made by the applications, processes, and people that run your business
  • Spot & Act on Insights Faster: Speed time-to-insight and action by allowing business users to directly access, manage, and visually interact with master data repositories
  • Accelerate Time-to-Market: Introduce new products and services faster with a richer source of product, customer, and vendor data
  • Elevate Customer Satisfaction: Accelerate loyalty and increase sales by personalizing interactions, delivering a consistent experience across channels, and tailoring products and services to customers’ specific wants and needs

Click To Download  TIBCO MDM installation in LINUX, JBOSS and Oracle Database.

TIBCO_MDM_ON_LINUX

Linux Concepts – File/Directory Permissions

Although there are already a lot of good security features built into Linux-based systems, one very important potential vulnerability can exist when local access is granted – – that is file permission based issues resulting from a user not assigning the correct permissions to files and directories. So based upon the need for proper permissions, I will go over the ways to assign permissions and show you some examples where modification may be necessary.

Basic File Permissions

Permission Groups

Each file and directory has three user based permission groups:

  • owner – The Owner permissions apply only the owner of the file or directory, they will not impact the actions of other users.
  • group – The Group permissions apply only to the group that has been assigned to the file or directory, they will not effect the actions of other users.
  • all users – The All Users permissions apply to all other users on the system, this is the permission group that you want to watch the most.

Permission Types

Each file or directory has three basic permission types:

  • read – The Read permission refers to a user’s capability to read the contents of the file.
  • write – The Write permissions refer to a user’s capability to write or modify a file or directory.
  • execute – The Execute permission affects a user’s capability to execute a file or view the contents of a directory.

Viewing the Permissions

You can view the permissions by checking the file or directory permissions in your favorite GUI File Manager (which I will not cover here) or by reviewing the output of the \”ls -l\” command while in the terminal and while working in the directory which contains the file or folder.

The permission in the command line is displayed as: _rwxrwxrwx 1 owner:group

  1. User rights/Permissions
    1. The first character that I marked with an underscore is the special permission flag that can vary.
    2. The following set of three characters (rwx) is for the owner permissions.
    3. The second set of three characters (rwx) is for the Group permissions.
    4. The third set of three characters (rwx) is for the All Users permissions.
  2. Following that grouping since the integer/number displays the number of hardlinks to the file.
  3. The last piece is the Owner and Group assignment formatted as Owner:Group.

Modifying the Permissions

When in the command line, the permissions are edited by using the command chmod. You can assign the permissions explicitly or by using a binary reference as described below.

Explicitly Defining Permissions

To explicity define permissions you will need to reference the Permission Group and Permission Types.

The Permission Groups used are:

  • u – Owner
  • g – Group
  • o or a – All Users

The potential Assignment Operators are + (plus) and – (minus); these are used to tell the system whether to add or remove the specific permissions.

The Permission Types that are used are:

  • r – Read
  • w – Write
  • x – Execute

So for an example, lets say I have a file named file1 that currently has the permissions set to _rw_rw_rw, which means that the owner, group and all users have read and write permission. Now we want to remove the read and write permissions from the all users group.

To make this modification you would invoke the command: chmod a-rw file1
To add the permissions above you would invoke the command: chmod a+rw file1

As you can see, if you want to grant those permissions you would change the minus character to a plus to add those permissions.

Using Binary References to Set permissions

Now that you understand the permissions groups and types this one should feel natural. To set the permission using binary references you must first understand that the input is done by entering three integers/numbers.

A sample permission string would be chmod 640 file1, which means that the owner has read and write permissions, the group has read permissions, and all other user have no rights to the file.

The first number represents the Owner permission; the second represents the Group permissions; and the last number represents the permissions for all other users. The numbers are a binary representation of the rwx string.

  • r = 4
  • w = 2
  • x = 1

You add the numbers to get the integer/number representing the permissions you wish to set. You will need to include the binary permissions for each of the three permission groups.

So to set a file to permissions on file1 to read _rwxr_____, you would enter chmod 740 file1.

Owners and Groups

I have made several references to Owners and Groups above, but have not yet told you how to assign or change the Owner and Group assigned to a file or directory.

You use the chown command to change owner and group assignments, the syntax is simple chown owner:group filename, so to change the owner of file1 to user1 and the group to family you would enter chown user1:family file1.

Advanced Permissions

The special permissions flag can be marked with any of the following:

  • _ – no special permissions
  • d – directory
  • l – The file or directory is a symbolic link
  • s – This indicated the setuid/setgid permissions. This is not set displayed in the special permission part of the permissions display, but is represented as a s in the read portion of the owner or group permissions.
  • t – This indicates the sticky bit permissions. This is not set displayed in the special permission part of the permissions display, but is represented as a t in the executable portion of the all users permissions

Setuid/Setgid Special Permissions

The setuid/setguid permissions are used to tell the system to run an executable as the owner with the owner\’s permissions.

Be careful using setuid/setgid bits in permissions. If you incorrectly assign permissions to a file owned by root with the setuid/setgid bit set, then you can open your system to intrusion.

You can only assign the setuid/setgid bit by explicitly defining permissions. The character for the setuid/setguid bit is s.

So do set the setuid/setguid bit on file2.sh you would issue the command chmod g+s file2.sh.

Sticky Bit Special Permissions

The sticky bit can be very useful in shared environment because when it has been assigned to the permissions on a directory it sets it so only file owner can rename or delete the said file.

You can only assign the sticky bit by explicitly defining permissions. The character for the sticky bit is t.

To set the sticky bit on a directory named dir1 you would issue the command chmod +t dir1.

When Permissions Are Important

To some users of Mac- or Windows-based computers you don’t think about permissions, but those environments don’t focus so aggressively on user based rights on files unless you are in a corporate environment. But now you are running a Linux-based system and permission based security is simplified and can be easily used to restrict access as you please.

So I will show you some documents and folders that you want to focus on and show you how the optimal permissions should be set.

  • home directories – The users\’ home directories are important because you do not want other users to be able to view and modify the files in another user\’s documents of desktop. To remedy this you will want the directory to have the drwx______ (700) permissions, so lets say we want to enforce the correct permissions on the user user1\’s home directory that can be done by issuing the command chmod 700 /home/user1.
  • bootloader configuration files – If you decide to implement password to boot specific operating systems then you will want to remove read and write permissions from the configuration file from all users but root. To do you can change the permissions of the file to 700.
  • system and daemon configuration files – It is very important to restrict rights to system and daemon configuration files to restrict users from editing the contents, it may not be advisable to restrict read permissions, but restricting write permissions is a must. In these cases it may be best to modify the rights to 644.
  • firewall scripts – It may not always be necessary to block all users from reading the firewall file, but it is advisable to restrict the users from writing to the file. In this case the firewall script is run by the root user automatically on boot, so all other users need no rights, so you can assign the 700 permissions.

10393768_799085076795298_8343613783549061313_n

Introduction to TIBCO LogLogic – Enterprise Virtual Appliance 5.5.1

LogLogic is a technology company that specializes in Security Management, Compliance Reporting, and IT Operations products. LogLogic developed the first appliance-based log management platform.

LogLogic’s Log Management platform collects and correlates user activity and event data. LogLogic’s products are used by many of the world’s largest enterprises to rapidly identify and alert on compliance violations, policy breaches, cyber attacks, and insider threats.

TIBCO BWPM Client – Configuration

Post Installation and Configuration of TIBCO BWPM Server,

To Configure BWPM Client on any running process (For Linux OS):-

  • Log in to the Server where TIBCO Administrator is running
  • cd <path>/tibco/tra/domain/<domain>/application/<deployed-application>
  • gedit <application-name>.tra
  • In the last line append the following
  • java.start.class=com.tibco.processmonitor.client.run
    tibco.clientVar.nJAMS/logMode=complete
    tibco.clientVar.nJAMS/DataProvider/JMS/useJNDI=true
    tibco.clientVar.nJAMS/DataProvider/JMS/useQueues=true
    tibco.clientVar.nJAMS/DataProvider/JMS/destination=bwpm
    tibco.clientVar.nJAMS/DataProvider/JMS/enabled=true
    tibco.clientVar.nJAMS/DataProvider/JMS/user=admin
    tibco.clientVar.nJAMS/DataProvider/JMS/password=admin
    tibco.clientVar.nJAMS/DataProvider/JMS/server=tibjmsnaming://<prod-ems-server>:7222
    tibco.clientVar.nJAMS/DataProvider/JMS/contextFactory=com.tibco.tibjms.naming.TibjmsInitialContextFactory
    tibco.clientVar.nJAMS/DataProvider/JMS/connectionFactory=QueueConnectionFactory
    tibco.clientVar.nJAMS/DataProvider/EngineLog/enabled=true
  • Save the tra file
  • Restart the service instance in the TIBCO Administrator.
  • Check the trace logs of the service instance ….
    • You should see nJams in the trace logs like this:-
    • Capture
  • Also Check your bwpm url…………………… you will see the service instance like this :-
  • Capture
  • Capture

Easy Tips For Post TIBCO Suite Installation in UNIX Environment – TIP # 1.

####################################################

  • Login to the Linux/Unix as the tibco user (OS User)
  • cd ~
  • vim .bash_profile
  • Enter the below in the bash_profile as environment variables:-

################# TIBCO PARAMETERS ##################

bash_profile

#######################################

  •  Now + wq!
  • . .bash_profile

#######################################################

TIBCO Activespaces – Basic Concept

ActiveSpaces applications are programs that use ActiveSpaces software to work collaboratively over a shared data grid.
The data grid comprises one or more tuple spaces.
An ActiveSpaces distributed application system is a set of ActiveSpaces programs that cooperate to fulfil a mission (either using the administrative CLI tool, or the ActiveSpaces API calls).
Tuples are distributed, rather than “partitioned” across seeders—members that are configured to contribute memory and processing resources to a space.
ActiveSpaces automatically redistributes tuples when seeders join and leave the space.
Unlike a horizontally partitioned database, where the allocation of items to nodes is fixed, and can only be changed through manual reconfiguration, ActiveSpaces data is automatically updated on all devices on the data grid and rebalanced transparently by using a “minimal redistribution” algorithm.
Replication allows the distribution of data replicates on different peers for fault tolerance.
ActiveSpaces’ data access optimization feature uses a replicate if one is locally available.
If a seeder suddenly fails, the replicate is immediately promoted to seeder, and the new seeder creates new replicates.

This optimizes system performance.

 

TIBCO ActiveSpaces – Create a Metaspace, Space and a Tuple

  • This video consists of the following points i have covered :-
    Create a Metaspace
    Create a Space.
    Add a tuple using Designer.
    Add a tuple using
    Also did alot of timepass which you can just observer if you come across in future or simply skip da stuffs.

TIBCO Activespaces – Prerequisites

FOR WINDOWS 32 BIT OS.

  1. Pre-requisites
    • jdk-8u25-windows-i586
    • TIB_rv_8.3.2_win_x86_vc8
  2. Binaries Used
    • TIB_activespaces_2.1.2_win_x86
    • TIB_activespaces-addon_2.1.2_win_x86
    • TIB_bwpluginactivespaces_2.0.0_win_x86
    • Spacebar-2.1-win32.win32.x86
  3. Installation Directory
    • E:\tibco
  4. Resources Tested on
    • 32 bit architecture
    • 4 cores
    • 24 GB RAM
    • 40GB HDD
  5. OS Details (Installed with administrator user)
    • Server <ip-address>
    • Administrator user password :- <password>

TIBCO_ACTIVESPACES

Do Refer to this document TIBCO Activespaces Usage and Use-cases.
Note:- Will Upload the installation Video Soon.

Contents of this BLOG

TIBCO Products :-

  1. TIBCO Business Works.
  2. TIBCO Enterprise Messaging Service.
  3. TIBCO Administrator.
  4. TIBCO Adapters.
  5. TIBCO LogLogic
  6. TIBCO Rendezvous.
  7. TIBCO Hawk.
  8. TIBCO MDM.

Non TIBCO Products :-

  1. Linux.
  2. Oracle Database.
  3. MySQL Database.
  4. Oracle Weblogic.
  5. Redhat JBOSS.
  6. Apache Tomcat.

Procedure :-

  1. Installation
  2. Configuration.
  3. High Availability, Clustering or Load Balancing.
  4. Use cases.

Contents Chapter Wise. :-

  1. Videos.
  2. Scripts.
  3. Theory.
  4. Files.

Introduction

– Howdy to all my learners,

I have created this wordpress blog to share my knowledge of TIBCO with people.

Would also appreciate if people contributed equally to this site posting informative topics .

Here TIBCO Would be the main topic of discussion, apart from TIBCO we would also discuss Non-TIBCO  Middleware, OS or Database related stuffs.

Get geared up guys, i will update one blog/day.

So always stay updated.

Also Guys please post your queries to hsivabc@gmail.com

Your mail would be responded with the earliest by me.

>> …… Arrivederci until the next post …. Stay Tuned …… Happy Bloggin ……. <<