Skip to main content

IBM Websphere MQ - Creating and configuring a telemetry channel - Middleware News

IBM Websphere MQ - Creating and configuring a telemetry channel - Middleware News


A telemetry channel connects a number of MQTT clients to WebSphere® MQ. Create one or more telemetry channels on a queue manager. Each of these telemetry channels might have different configuration settings, making it easier to manage the clients attached to them.

Procedure

Create and configure a new telemetry channel by completing the following steps:
  1. Right-click the telemetry Channels folder and click New > Telemetry channel. The New Telemetry Channel wizard opens.
  2. Type the name of the channel in the Channel name field.
    The names of telemetry channels are restricted to 20 characters. The characters that can be used in a telemetry channel name, as with all WebSphere MQ names, are:
    • Uppercase A-Z
    • Lowercase a-z
    • Numerics 0-9
    • Period (.)
    • Underscore (_)
    • Forward slash (/)
    • Percent sign (%)
    Leading or embedded blanks are not allowed.
  3. Type the port number in the Port number field. The default port number for a telemetry channel without SSL security is 1883.
  4. Optional: If you choose to secure your new telemetry channel using SSL, select Secure channel using SSL. The port number changes to 8883, which is the default for a channel secured using SSL.
    1. Click Next.
    2. Type the name of the SSL file to use in the SSL Key File field.
    3. Type the password to unlock the key file in the SSL Passphrase field.
    4. Select Identify client using digital certificate to force all clients to send their privately signed digital certificate for authentication, or select Allow anonymous clients to stop the telemetry channel from authenticating the client using SSL.
  5. Click Next.
  6. Select one of the following options for client authentication:
    • Don't check client supplied username and password: Select this option if you want your program to either perform its own authentication, or you do not need any clients authenticated.
    • Check client supplied username and password (using JAAS): Select this option to verify the identity of the client using JASS. Select the name of the JAAS configuration you want to implement from the JAAS config name menu.
  7. Click Next.
  8. Select from one of the following menu options:
    • Select MQTT Client ID to use the supplied MQTT client ID.
    • Select Fixed user ID to disregard whatever user ID is supplied by the client. Type your preferred user ID in the User ID field. The default value is Guest on Windows® systems, andnobody on Linux® systems.
    • Select Username provided by client to use the user name supplied in by the client. If no user name is supplied, the client fails to connect to WebSphere MQ.
  9. Click Next.
  10. Optional: Select Launch MQTT client utility to launch the graphical utility to test the MQTT protocol.
  11. Review the list of actions to be performed and click Finish.

Comments

adsrerrapop

Popular posts from this blog

IBM Websphere MQ interview Questions Part 5

MQ Series: - It is an IBM web sphere product which is evolved in 1990’s. MQ series does transportation from one point to other. It is an EAI tool (Middle ware) VERSIONS:-5.0, 5.1, 5.3, 6.0, 7.0(new version). The currently using version is 6.2 Note: – MQ series supports more than 35+ operating systems. It is platform Independent. For every OS we have different MQ series software’s. But the functionality of MQ series Default path for installing MQ series is:- C: programfiles\BM\clipse\SDK30 C: programfiles\IBM\WebsphereMQ After installation it will create a group and user. Some middleware technologies are Tibco, SAP XI. MQ series deals with two things, they are OBJECTS, SERVICES. In OBJECTS we have • QUEUES • CHANNELS • PROCESS • AUTHENTICATION • QUERY MANAGER. In SERVICES we have LISTENERS. Objects: – objects are used to handle the transactions with the help of services. QUEUE MANAGER maintains all the objects and services. QUEUE: – it is a database structure ...

IBM Websphere MQ Reason code list / mq reason codes / websphere mq error codes / mq error messages

Reason code list ================= The following is a list of reason codes, in numeric order, providing detailed information to help you understand them, including: * An explanation of the circumstances that have caused the code to be raised * The associated completion code * Suggested programmer actions in response to the code * 0 (0000) (RC0): MQRC_NONE * 900 (0384) (RC900): MQRC_APPL_FIRST * 999 (03E7) (RC999): MQRC_APPL_LAST * 2001 (07D1) (RC2001): MQRC_ALIAS_BASE_Q_TYPE_ERROR * 2002 (07D2) (RC2002): MQRC_ALREADY_CONNECTED * 2003 (07D3) (RC2003): MQRC_BACKED_OUT * 2004 (07D4) (RC2004): MQRC_BUFFER_ERROR * 2005 (07D5) (RC2005): MQRC_BUFFER_LENGTH_ERROR * 2006 (07D6) (RC2006): MQRC_CHAR_ATTR_LENGTH_ERROR * 2007 (07D7) (RC2007): MQRC_CHAR_ATTRS_ERROR * 2008 (07D8) (RC2008): MQRC_CHAR_ATTRS_TOO_SHORT * 2009 (07D9) (RC2009): MQRC_CONNECTION_BROKEN * 2010 (07DA) (RC2010): MQRC_DATA_LENGTH_ERROR * 2011 (07DB) (RC2011): MQRC_DYNAMIC_Q_NAME_ERROR * 2012 (07DC) (RC201...

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News 1. Security Considerations IBM advises customers who are using SSL, that the most secure way to do this is to use recognized Certification Authorities to sign their certificates. Ensuring secure transfer of information is the main purpose of SSL. This integrity must be properly observed when setting up SSL. You should always be certain who has signed each of your SSL certificates, who has had and who continues to have access to them. The first secure way to generate certificates is to generate a certificate request, on each system or machine that uses SSL. This request has to be signed by an external Certification Authority before it can be used. Getting certificate requests signed by a CA is secure, because during the signing process at no point do any files contain the certificate's Private Keys. This principle is vital to SSL security. Signing certificates in this way is covered...