1.1Using IA64-hosted X86 Cross-Complier? |
1.2Troubleshooting? |
↩︎ | ↖︎ | ↑︎ | ↘︎ | ↪︎ |
WASD is outlined in the Introduction and Package Overview sections of the WASD Features document.
There are a number of approaches to installing and updating a WASD package.
The vanilla recipes are 2. Installation and 3. Update but there are
5. Other Ways to Deploy.
This section provides a quick guide to getting your WASD package installed, configured and serving.
Install the files following the guidelines in 2. Installation.
Note that more than one archive may be needed
(‘Source Archive, Object Module Archives’ in 2.1 Package UNZIP).
If Transport Layer Security (TLS - a.k.a. Secure Sockets Layer - SSL) is to be used and a TLS/SSL server image to be built the WASD [Open]SSL product must be installed at this stage (see TLS/SSL Functionality Sources of WASD Features and Facilities). An existing VSI SSL111 for OpenVMS product (all based on OpenSSL 1.0.2 and earlier obsolete) requires no additional step. If the WASD [Open]SSL package it must UNZIPed into the [.WASD_ROOT] tree at this stage.
Note the use of the "-d" switch.
Server installation is performed using the INSTALL.COM procedure (2.9 INSTALL.COM Procedure).
Following the execution of the INSTALL.COM procedure the package should require only minor, further configuration.
Initially two files may require alteration.
More generally server runtime configuration involves the considerations discussed in Site Organisation of WASD Configuration along with the following aspects:
Execute the startup procedure (‘STARTUP.COM’ in 4.3 Account Support Files). Get your browser and connect!
Of course something will not be right! This can happen with the initial configuration and sometimes when changing configuration. The server provides information messages in the run-time log, look in the WASD_ROOT:[LOG_SERVER] directory.
Remember, the basic installation's integrity can always be checked as described in 2.10 Quick-Check). This uses the configuration files from the [EXAMPLE] directory, so provided these have not been altered the server should execute in demonstration mode correctly.
Can't resolve it? See 2.12 Reporting Problems.
Until a native X86 C compiler becomes available all WASD package and additional application builds must be done in two phases.
When building using the cross-compiler tools the procedures recognise the XCC$COMPILER environment and adjust to create and use [.OBJ_X86_64] object code directories.
For example; to build WASD package:
Proceed with the second phase.
For example:
Proceed with the second phase.
When initially installing or configuring WASD, and sometimes later where something breaks spectacularly, it is most useful to be able to gain insight into what the server is up to.
The go-to tool is WATCH (yes, all capitals, and for no other reason than it makes it stand out).
WATCH is described in detail in WATCH Facility of the WASD Features and Facilities document.
For most circumstances WATCH can be made available for troubleshooting even if the configuration is significantly broken. This is done by using a skeleton-key to authorise special access into the server.
The skeleton-key is described in detail in Skeleton-Key Authentication of the WASD Features and Facilities document.
TL;DR
Enable at the command-line with the username anything beginning with an underscore and at least 8 characters, same for the password length.
Then using a browser access any available service, entering the above username (including underscore) and password when prompted.
The service administration facilities (of which WATCH is one) are also available and useful.
↩︎ | ↖︎ | ↑︎ | ↘︎ | ↪︎ |