Homepage | About EASA | Contact
Before adding a new Compute Server, one must know:
A Windows Compute Server may communicate via:
An Excel Server machine must:
The EXCEL SERVER PROCESSING object, which is specifically designed for configuring Excel Servers, is the only approach available for establishing the communication between the EASA Server and Excel Server. For an example of configuring an Excel Server, please see Configure a Compute Server.
Tip: When configuring an Excel Server, you can usually use the existing default EXCEL SERVER PROCESSING object under DEFAULT SERVER PROCESSING. Exceptions include use of a 'Port Number' within the Remote Server software other than 80 or a change in the 'Username' and 'Password' for authenticating communications with Remote Servers.
Excel Add-ins are disabled by default in for EASA Excel processes for performance reasons, in most cases, full functionality is available without Add-ins.
If Excel Add-ins need to be enabled, add the line below, to the file:
To add permissions for the tomcat service to a new user see DCOM settings for an Excel Server.
Excel 2016 requires an interactive user to close a popup that appears at the first invocation, yet by default an Excel Server runs as the non-interactive user, SYSTEM.
To fix this Excel 2016 specific problem:
Follow the detailed steps below:
When configuring a UNIX or a Linux Compute Server, there are three communication approaches to choose from:
If the third choice is selected, you can select from existing SERVER PROCESSING objects under DEFAULT SERVER PROCESSING. The table below provides guidance on the selection of the existing SERVER PROCESSING objects.
EASA Server Operating System | Compute Server Operating System | Template Server Processing Object |
---|---|---|
Windows | UNIX or Linux | windows to Unix csh |
Linux | UNIX or Linux | linux to linux |
Also, with the third choice above and the use of rsh, there are a few important issues to be aware of:
.rhosts
file containing the hostname or IP address of the EASA Server and the Username used to run it must be present on the Compute Server in the home directory of the User ID on the UNIX computer (See # 2 below).
Note: The settings for the owner, group and file permissions on the .rhosts file are also important. Set the owner to the User ID being used and the group to same group that the User ID belongs to. Finally, use file permissions of 600 or rw- --- ---
.
With Linux computers, one issue for concern is that rsh may not be activated and available for use by default in Linux. You can check whether rsh has been turned on by typing the following command in a shell window:
chkconfig --list
You should then see a list of available services and their status. Look for the line corresponding to rsh. You will need to turn rsh on if you see the following in a shell window:
rsh: off
You can turn rsh on by logging on the Linux computer as root and then typing the following command:
chkconfig rsh on
To help configure Compute Servers, a flow diagram of the configuration process is provided: