1、P P T T C C W W i i n n d d c c h h i i l l l l A A d d v v a a n n c c e e d d D D e e p p l l o o y y m m e e n n t t G G u u i i d d e e P P T T C C W W i i n n d d c c h h i i l l l l 1 1 0 0 . . 2 2 M M 0 0 3 3 0 0C C o o p p y y r r i i g g h h t t 2 2 0 0 1 1 5 5 P P T T C C I I n n c c . . a
2、 a n n d d / / o o r r I I t t s s S S u u b b s s i i d d i i a a r r y y C C o o m m p p a a n n i i e e s s . . A A l l l l R R i i g g h h t t s s R R e e s s e e r r v v e e d d . . User and training guides and related documentation from PTC Inc. and its subsidiary companies (collectively “PTC“
3、) are subject to the copyright laws of the United States and other countries and are provided under a license agreement that restricts copying, disclosure, and use of such documentation. PTC hereby grants to the licensed software user the right to make copies in printed form of this documentation if
4、 provided on software media, but only for internal/personal use and in accordance with the license agreement under which the applicable software is licensed. Any copy made shall include the PTC copyright notice and any other proprietary notice provided by PTC. T raining materials may not be copied w
5、ithout the express written consent of PTC. This documentation may not be disclosed, transferred, modified, or reduced to any form, including electronic media, or transmitted or made publicly available by any means without the prior written consent of PTC and no authorization is granted to make copie
6、s for such purposes. Information described herein is furnished for general information only , is subject to change without notice, and should not be construed as a warranty or commitment by PTC. PTC assumes no responsibility or liability for any errors or inaccuracies that may appear in this documen
7、t. The software described in this document is provided under written license agreement, contains valuable trade secrets and proprietary information, and is protected by the copyright laws of the United States and other countries. It may not be copied or distributed in any form or medium, disclosed t
8、o third parties, or used in any manner not provided for in the software licenses agreement except with written prior approval from PTC. UNAUTHORIZED USE OF SOFTW ARE OR ITS DOCUMENT A TION CAN RESUL T IN CIVIL DAMAGES AND CRIMINAL PROSECUTION. PTC regards software piracy as the crime it is, and we v
9、iew off enders accordingly . W e do not tolerate the piracy of PTC software products, and we pursue (both civilly and criminally) those who do so using all legal means available, including public and private surveillance resources. As part of these efforts, PTC uses data monitoring and scouring tech
10、nologies to obtain and transmit data on users of illegal copies of our software. This data collection is not performed on users of legally licensed software from PTC and its authorized distributors. If you are using an illegal copy of our software and do not consent to the collection and transmissio
11、n of such data (including to the United States), cease using the illegal version, and contact PTC to obtain a legally licensed copy . I I m m p p o o r r t t a a n n t t C C o o p p y y r r i i g g h h t t , , T T r r a a d d e e m m a a r r k k , , P P a a t t e e n n t t , , a a n n d d L L i i c
12、c e e n n s s i i n n g g I I n n f f o o r r m m a a t t i i o o n n : : See the About Box, or copyright notice, of your PTC software. U U N N I I T T E E D D S S T T A A T T E E S S G G O O V V E E R R N N M M E E N N T T R R E E S S T T R R I I C C T T E E D D R R I I G G H H T T S S L L E E G G
13、E E N N D D This document and the software described herein are Commercial Computer Documentation and Software, pursuant to F AR 12.212(a)-(b) (OCT95) or DF ARS 227.7202-1(a) and 227.7202-3(a) (JUN95), and are provided to the US Government under a limited commercial license only . For procurements p
14、redating the above clauses, use, duplication, or disclosure by the Government is subject to the restrictions set forth in subparagraph (c)(1)(ii) of the Rights in T echnical Data and Computer Software Clause at DF ARS 252.227- 7013 (OCT88) or Commercial Computer Software-Restricted Rights at F AR 52
15、.227-19(c)(1)-(2) (JUN87), as applicable. 01012015 P P T T C C I I n n c c . . , , 1 1 4 4 0 0 K K e e n n d d r r i i c c k k S S t t r r e e e e t t , , N N e e e e d d h h a a m m , , M M A A 0 0 2 2 4 4 9 9 4 4 U U S S A AC C o o n n t t e e n n t t s s About This Guide . . . . . . . . . . . . .
16、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18、 . . . . . . . . . . . . . . 10 Client Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Reverse Proxies . . . . . . . . . . . . . . . .
19、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Split DNS with Reverse Proxy Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20、. . . . . . . . . . . 19 rsync Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Authentication . . . . . . . . . . . . . . . . . . . . . . .
21、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 The Windchill Authentication Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
22、 . . . . . . . . . . . . . . . . . . . . 24 Configuring an Alternative Authentication in Windchill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Advanced Windchill Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Load Balancing Multiple Method Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Configuring Background Method Servers . . . . . . . .
24、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Configuring RMI for T unneling over HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Configuring LDAP Failover
25、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Installing and Configuring a Cluster Windchill Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
26、. . . . . . 59 Server Cluster Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 External File V ault Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Data Loading Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Windchill Index Search Considerations . .
28、. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Windchill PartsLink Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29、. . 73 Installing a Windchill Cluster Using the PTC Solution Installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Web Server Concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30、. . . . . . . . . . . . . . . . . . 81 Installing Additional Products or Updates Using the PTC Solution Installer . . . . . . . . . . . . . . 82 Reverting a Cluster to a Single System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31、. . . . . . . 82 Third Party Clustering Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Dual HTTP and HTTPS Protocol Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32、 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 T roubleshooting T ips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 3A A b b o o u u t t T T h h i
33、 i s s G G u u i i d d e e The PTC W indchill Advanced Deployment Guide is a collection of topics that are also available in the PTC W indchill Help Center compiled into a PDF . This topic collection assists PTC W indchill system administrators by providing advanced operations and configurations for
34、 PTC W indchill solutions. This guide assumes you have the following knowledge and skills: Knowledge of the existing W indchill architecture used at your site Knowledge of the W eb architecture used at your site UNIX system administration skills (if you are on a UNIX system) W indows system administ
35、ration skills (if you are on a W indows system) Throughout this guide, there are references to property files. When changing such properties, PTC recommends that you use the xconfmanager utility . Using this tool preserves overridden property values when updating software versions to the latest main
36、tenance releases. For information on the xconfmanager utility , see the PTC W indchill Specialized Administration Guide . Examples in this guide referencing third-party products are intended for demonstration purposes only . For additional information about third-party products, contact individual p
37、roduct vendors. Some code examples in this guide have been reformatted for presentation purposes and, therefore, may contain hidden editing characters (such as tabs and end-of-line characters) and extraneous spaces. If you cut and paste code from this manual, check for these characters and remove th
38、em before attempting to use the example in your application. 5R R e e l l a a t t e e d d D D o o c c u u m m e e n n t t a a t t i i o o n n The following documentation may be helpful: PTC W indchill Specialized Administration Guide PTC W indchill Administration - Configuring Y our PTC W indchill E
39、nvironment PTC W indchill Customization Guide PTC W indchill Installation and Configuration Guide T T e e c c h h n n i i c c a a l l S S u u p p p p o o r r t t Contact PTC T echnical Support through the PTC website, or by phone, email, or fax if you encounter problems using this product or the pro
40、duct documentation. The PTC eSupport portal provides the resources and tools to support your PTC W indchill implementation: https:/ For complete details, see the PTC Customer Support Guide : http:/ Y ou must have a Service Contract Number (SCN) before you can receive technical support. If you do not
41、 know your SCN, see “Preparing to contact TS” on the P P r r o o c c e e s s s s e e s s tab of the PTC Customer Support Guide for information about how to locate it. D D o o c c u u m m e e n n t t a a t t i i o o n n f f o o r r P P T T C C P P r r o o d d u u c c t t s s Y ou can access PTC docum
42、entation using the following resources: P P T T C C W W i i n n d d c c h h i i l l l l H H e e l l p p C C e e n n t t e e r r The PTC W indchill Help Center includes all PTC W indchill documentation. Y ou can browse the entire documentation set, or use the search capability to perform a keyword se
43、arch. T o access the PTC W indchill Help Center, you can: Click any help icon in PTC W indchill Select H H e e l l p p W W i i n n d d c c h h i i l l l l H H e e l l p p C C e e n n t t e e r r from the Q Q u u i i c c k k L L i i n n k k s s menu at the top right of any PTC W indchill page Use the
44、 following link to access all PTC help centers: https:/ R R e e f f e e r r e e n n c c e e D D o o c c u u m m e e n n t t s s websiteThe Reference Documents website is a library of all PTC guides: http:/ 6 PTC W indchill Advanced Deployment GuideA Service Contract Number (SCN) is required to acces
45、s the PTC documentation from the Reference Documents website. If you do not know your SCN, see “Preparing to contact TS” on the P P r r o o c c e e s s s s e e s s tab of the PTC Customer Support Guide for information about how to locate it: http:/ When you enter a keyword in the S S e e a a r r c c
46、 h h O O u u r r K K n n o o w w l l e e d d g g e e field on the PTC eSupport portal, your search results include both knowledge base articles and PDF guides. C C o o m m m m e e n n t t s s PTC welcomes your suggestions and comments on its documentation. T o submit your feedback, you can: Send an
47、email to . T o help us more quickly address your concern, include the name of the PTC product and its release number with your comments. If your comments are about a specific help topic or book, include the title. Click the feedback icon in the PTC W indchill Help Center toolbar and complete the fee
48、dback form. The title of the help topic you were viewing when you clicked the icon is automatically included with your feedback. Comments 71 1 N N e e t t w w o o r r k k C C o o n n f f i i g g u u r r a a t t i i o o n n Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Client Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .