Question & Answer
Question
Using the Tealeaf Archive reader to inject sessions or test session agents
Answer
The Tealeaf Archive Reader
The Archive Reader is a stand-alone utility that is included on each machine were the Transport Service is installed. The Archive reader has
it's own pipeline configuration file (.cfg) where session agents can be configured. The reader accepts a list of Session Archive files (.tla)
sends them through it's pipeline and typically sockets out to an HBR or Canister:

Typical uses
- Loading session data into a canister with no other session delivery available
- Loading session data into a canister from a remote copy (i.e. sample sessions for testing)
- Processing hits via Privacy and other session agents for testing those processes.
Usage notes:?
-
Run the Program File:
-
\Tealeaf\TeaLeafArchiveReader.exe
-
Execute as a true Admin...this may require "Run As Admin" to allow the mini-pipeline to launch
-
-
Select the Configuration File:
-
The default name is TeaLeafArchiveReader.cfg
-
If this file is not already configured for your desired session agents and socket connection edit it before launching.
-
The "out of the box" version of this file contains helpful configuration instructions.
-
-
Select the Input: One or more TLA files
-
The list is specified from the utility's user interface
-
TLA files are formatted as TAR files and can be saved from RTV or via the 9.0+ BBR interface
-
-
Output:
-
Typically a very short pipeline is configured:? [Globals] -> [Inflate] -> [TLAReplay] -> [Socket]
-
The Socket agent for sending the the local machine may be configured as Server=Localhost
-
The TLAReplay agent can be used to meter the delivery rate offset their timestamps etc..
-
-
Monitoring:
-
Check the target server's pipeline status to ensure the archive reader connection is established and sending
-
The Windows Application log should be checked if there is not delivery...
Transport Service and Session Agent initialization messages are written there -
Check the target Tealeaf environment's active session list to ensure the hits are arriving
-
Additional notes
-
If your user ID is not a true Administrator such as on a workstation
you must run the utility "As an Administrator in order to bind to the TCP/IP stack -
If the HBR or Canister receiving the traffic is configured for SSL (port 1997 by default)
the Archive Reader's pipeline configuration must have SSL configured also with the same SSL key
Example Configuration (SSL)
This example delivers to an SSL enabled HBR interface at port 1967.
The key differences from this configuration and the default are:
[Globals]
CertificateFile=tealeaf-tts.pem
PrivateKeyFile=tealeaf-tts.pem
[Socket]
Port=1967
UseSSL=True
Additionally an SSL key ".Pem" file matching the key of the target server must be dropped into the \Tealeaf folder.
This certificate can be generated from the PCA or elsewhere if a self-signed certificate is considered sufficient.?
An example content of a .Pem file is provided here. Note that this actual example is not in use in any Tealeaf system
and should not be used in any Tealeaf system where sensitive data may be stored. A new certificate can be generated
or a commercial certificate installed where sensitive data must be protected.
Example SSK key file:??? (i.e. tealeaf-tts.pem)
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
The example configuration file:??? (i.e. TeaLeafArchiveReader.cfg)
[StatusMaster]
DLL=StatusMaster.dll
AppName=TeaLeafAR
[Globals]
DownStreamConfigSection=Inflate
MemPctFreeDisable=0
MemPctFreeEnable=5
CertificateFile=tealeaf-tts.pem
PrivateKeyFile=tealeaf-tts.pem
[Inflate]
TypeName=Inflate
DLL=SessionAgentInflate.dll
DownStreamConfigSection=TLAReplay
[TLAReplay]
TypeName=TLAReplay
DLL=SessionAgentRulesEngine.dll
DownStreamConfigSection=Socket
ScriptTrace=OFF
ResponseType=All
EnvironmentScript=EngineEnvironment.tcl
PreProcScript=TLAReplay.PreProc.tcl
ActionScript=TLAReplay.Action.tcl
HitDelayFactor=1.0
HitPageGenFactor=1.0
TimeWarpFactor=0
[Socket]
TypeName=Socket
DLL=SessionAgentSocket.dll
Server=TL88HBR.mycompany.com
Port=1967
UseSSL=True
Was this topic helpful?
Document Information
Modified date:
08 December 2018
UID
ibm10777841