I'm working on a Business Operation whit an HTTP Outbound Adapter and I would like to know if is possible to adjust the FailureTimeout value based on the incoming message type. For example, I would like to have a FailureTimeout of 60 seconds for the standard operations and a FailureTimeout of -1 (wait forever) for few special operations that absolutely need a response.
Can we dynamically modify the FailureTimeout through code, based on either the incoming message type or a specified parameter?n the incoming message type or depending by a parameter?
I was recently asked whether we have a function to convert LDAP date time stamps into $HOROLOG format or other formats and the answer is not at the moment, but there is a simple method to do the conversion.
Let us look at the facts and figures involved...
1) Active Directory's (AD) date 0 (zero) is 1601-01-01 00:00:00.000 or January 1st, 1601 at midnight (00:00:00)
2) AD timestamps are calculated as the number of 100 nanosecond intervals from date 0
3) 864000000000 is the number of 100 nanosecond intervals per day
https://www.youtube.com/embed/3BivXX1gImQ [This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]
We are moving away from Delegated Authentication in which I stored a username and password for our LDAP in a GLOBAL to be called by ZAUTHENTICATE.
Is there a way to pull in that GLOBAL into the LDAP Configuration within the Managment Portal instead of having to manually enter it? There seems to be an issue with Copy/Paste that the password isn't being set correctly when I use Copy/Paste.
Else I just export/import the LDAP Configuration from 1 server to another and manually update the Certificate to point to the correct file.
It's with immense excitement that we introduce a brand new series of announcements that showcase the implementations of your ideas from the Ideas Portal. With this series, we're about to turn the spotlight on the incredible ideas that have been transformed into real-world solutions.
If you're running IRIS in a mirrored configuration for HA in AWS, the question of providing a Mirror VIP (Virtual IP) becomes relevant. Virtual IP offers a way for downstream systems to interact with IRIS using one IP address. Even when a failover happens, downstream systems can reconnect to the same IP address and continue working.
If there is an alternative to use instead of Telnet due to security reasons in the Cache terminal? Telnet is using a plain text protocol generating security violations. I am using Cache for Windows 2018.1.8.
today I'm asking your help with an issue related to the response messages sent from my production to a client software, such as Postman or SoapUI.
Issue
In the last few days I've been unable to view the responses received from my production in Postman, even if I was able to do so earlier. I'm sending the request to a remote server reachable via a Putty tunnel.
We have web gateway installed as a standalone on the web server and when I access it through the direct link https://mydomain.com/csp/bin/Systems/Module.cxw, it doesn't require authentication it just opens as per screenshot below.
This time around, we've decided to spruce up this activity a little and extended this rubric to encompass all 6 communities - English, Japanese, Chinese, Spanish, Portuguese, and French. Isn't this exciting?
And this month we have our first non-English entry.
Without further ado, here are the Key Questions of October chosen by InterSystems Experts within all Communities:
You can hide the source by exporting/importing only the *.obj that is generated after compiling the source program.
The command execution example specifies EX1Sample.obj and EX2Sample.obj, which are generated by compiling EX1Sample.mac and EX2Sample.mac, as export targets and exports them to the second argument file.
After moving to another namespace, I am using the exported XML file to perform the import.
Watch this new video guide for migrating off the PWS:
https://www.youtube.com/embed/KlSp8ho0mBg [This is an embedded link, but you cannot view embedded content directly on the site because you have declined the cookies necessary to access it. To view embedded content, you would need to accept all cookies in your Cookies Settings]
This video is part of a new series, describing the steps to follow to migrate your instance off the PWS during upgrade for Linux/Unix or Windows.
In the previous announcement, we asked you what are your thoughts regarding the new rubric Water Cooler Talk - basically a moderated (possibly biweekly) discussion about some programming topic not directly related to the InterSystems products. Since the majority reacted positively, we'd like to invite you to write the topics that interest you in the comments to this post and mention if you would like to lead the discussion.
Here in %SYS, we have already examined users, resources, and roles. Now that we know how to set all of that up, we should give it a purpose. Next we will talk about applications! As you may expect, we will see various identical class methods defined here that we have seen in the previous classes. However, some of them will have some tiny yet significant differences.