Skip to content

Service Keys


The key value store of Consul administrates the PLOSSYS 5 server configuration.

You can change the key via the Consul Web interface (see Consul) or via PLOSSYS CLI (see Administrate the System Configuration).


Units

Size

Values with size specifications are specified in the following size units:

  • bytes (B)

  • kilobytes (KB)

  • megabytes (MB)

  • gigabytes (GB)

Example - with size units

10 Megabytes: 10MB


Time

Values with time specifications are specified in the following time units:

  • seconds (s, sec)

  • minutes (m, min)

  • hours (h, hr)

  • days (d)

  • weeks (w, wk)

  • months

  • years (y, yr)

Example - with time units

2 hours and 30 minutes: 2h30m

4 minutes and 2 seconds: 4m2s


ALLOWED_OIDC_CLIENTS

ALLOWED_OIDC_CLIENTS specifies the mapping of permissions to roles specified in the OIDC identity provider. For some examples, refer to Configure the PLOSSYS 5 Server.

The key is available for the seal-rest service.

In Consul, the key is specified here:

  • dc/home/env/service/rest/tag/any/ALLOWED_OIDC_CLIENTS

Available values: JSON string format

Default: none


AUTH_CLIENT_ID

AUTH_CLIENT_ID specifies the client name configured in the OIDC identity provider for retrieving the access token.

The key is available for the following services:

  • seal-plossysadmin

  • seal-plossyscli

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AUTH_CLIENT_ID
  • dc/home/env/service/plossyscli/tag/any/AUTH_CLIENT_ID

Available values: String

  • <client_id>

Default:

  • seal-plossyscli service: seal-plossyscli

  • seal-plossysadmin service: seal-plossysadmin


AUTH_CLIENT_SECRET

AUTH_CLIENT_SECRET specifies the client secret for retrieving the OIDC identity provider's access token.

The key is available for the following services:

  • seal-plossysadmin

  • seal-plossyscli

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AUTH_CLIENT_SECRET
  • dc/home/env/service/plossyscli/tag/any/AUTH_CLIENT_SECRET

Available values: String

  • <client_secret>

Default: not revealed


AUTH_CLOCK_TOLERANCE

AUTH_CLOCK_TOLERANCE specifies the number of seconds allowed as time difference between the OIDC identity provider and the client.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AUTH_CLOCK_TOLERANCE

Available values: String

  • <number_seconds>

Default: 5


AUTH_DEFAULT_SESSION_DURATION

AUTH_DEFAULT_SESSION_DURATION specifies the duration of the default session in seconds if the OIDC identity provider does not expose the refresh_expires_in parameter in the token.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/AUTH_DEFAULT_SESSION_DURATION

Avaialble values: String

  • <number_sessions>

Default: 180


AUTH_ISSUER_URL

AUTH_ISSUER_URL specifies the OIDC issuer URL. This URL is configured in Keycloak for example. For more information about Keycloak used with SEAL Systems products, refer to the SEAL Interfaces for OIDC documentation.

The key is available for all services.

Caution - ID_PROVIDER_NAME

AUTH_ISSUER_URL has to be set to the same value as ID_PROVIDER_NAME.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/AUTH_ISSUER_URL

Available values: String

  • <oidc_issuer_url>

Default: https://localhost:32769/auth/realms/SEAL


AUTH_REDIRECT_PROTOCOL

AUTH_REDIRECT_PROTOCOL specifies the transfer protocol.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AUTH_REDIRECT_PROTOCOL

Available values: String

  • http

  • https

Default: The protocol of the user interface server is used.


AUTH_REFRESH_TOLERANCE

AUTH_REFRESH_TOLERANCE specifies the number of seconds after which a token will be refreshed when it is about to expire.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AUTH_REFRESH_TOLERANCE

Available values: String

  • <number_seconds>

Default: 5


AUTH_TYPE

AUTH_TYPE specifies the mode of the client authentication.

The key is available for the following services:

  • seal-ipp-checkin

  • seal-job-notifier

  • seal-rest

In Consul, the key is specified here:

  • dc/home/env/service/checkin/tag/ipp/AUTH_TYPE
  • dc/home/env/service/job-notifier/tag/any/AUTH_TYPE
  • dc/home/env/service/rest/tag/any/AUTH_TYPE

Available values: String

  • basic

    The service accepts any authentication. This is implemented by the Basic Auth authentication.

  • oidc

    In the request the service expects a JSON Web token (JWT) which is received from an authentication via OpenID server connect.

  • oidc basic (Only available the seal-rest service.)

    Use oidc and basic concurrently.

Default: oidc

Hint - in practice

In practice, only oidc is relevant due to PLOSSYS Administrator does only work with oidc and using multiple user authentication does not make sense.


AVAILABLE_LANGUAGES

AVAILABLE_LANGUAGES specifies the languages provided to the user in the user interface, PLOSSYS Adminstrator. With the same name, a language file (<language>.json) has to exist in C:\Program Files\SEAL Systems\seal-plossysadmin\public\assets\i18n on Windows or /opt/seal/seal-plossysadmin/public/assets/i18n on Linux. Multiple languages are separated by comma.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/AVAILABLE_LANGUAGES

Available values: String

  • <language1>,<language2> ... <languagex>

Default: de,en


CHECKIN_TIME_FROM_DB

CHECKIN_TIME_FROM_DB specifies whether the checkin services or the database sets the checkin time of the new output jobs. Setting by the checkin services is faster and consumes less resources. However, the database can guarantee a correct checkin time if keeping the times synchronous on all servers belonging to the cluster is impossible.

Caution - MongoDB version

Only MongoDB as of version 4.2 supports this feature!

The key is available for the following services:

  • seal-checkin

  • seal-ipp-checkin

In Consul, the key is specified here:

  • dc/home/env/service/checkin/tag/lpr/CHECKIN_TIME_FROM_DB
  • dc/home/env/service/checkin/tag/ipp/CHECKIN_TIME_FROM_DB

Available values: Boolean

  • true

    The database sets the checkin time.

  • false

    The checkin services set the checkin time.

Default: false


CONFIG

CONFIG specifies the customized content of the CONFIG configuration file required by the SAPGOF converter.

The key is available for the SAPGOF converter.

In Consul, the key is specified here:

  • dc/home/plossys/convert-sapgof/CONFIG

Available values: String

  • <content_config_file>

Default: none (The settings in C:\Program Files\SEAL Systems\seal-convert-sapgof\lib\initialization\config\CONFIG are used.)


CONFIG_DIR

CONFIG_DIR specifies the name of the directory which contains the configuration of the services unless the configuration is read from Consul.

The key is available for the following services:

  • seal-convert-pdfstamp

  • seal-convert-sapgof

In Consul, the key is specified here:

  • dc/home/env/<service>/any/tag/any/CONFIG_DIR

Available values: String

  • <config_dir>

Default: none (The settings are read from Consul.)


CONSUL_DOMAIN

CONSUL_DOMAIN specifies the domain with which the PLOSSYS 5 services log on.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/CONSUL_DOMAIN

Available values: String

  • <domain_name>

Default: consul


CONSUL_TOKEN

CONSUL_TOKEN specifies the ACL token with which the PLOSSYS 5 services authenticate themselves to Consul.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/CONSUL_TOKEN

Available values: String

  • <token>

Default: INSECURE_ACL_MASTER_TOKEN


CONSUL_URL

CONSUL_URL specifies the URL of the Consul server to which the PLOSSYS 5 services log on.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/CONSUL_URL

Available values: String

  • <consul_url>

Default: https://localhost:8500


CUSTOM_FLOW_<environment_variable>

CUSTOM_FLOW_<environment_variable> specifies the value for the environment variable <environment_variable> which is passed to the main flow processed by the seal-convert-dispatcher service.

The key is available for the seal-convert-dispatcher service.

In Consul, the key is specified here:

  • dc/home/env/service/convert-dispatcher/tag/any/CUSTOM_FLOW_<environment_variable>

Available values: String

  • <value>

Default: none

Example - pass COLOR set to blue

When dc/home/env/service/convert-dispatcher/tag/any/CUSTOM_FLOW_COLOR has been set to blue in Consul, the seal-convert-dispatcher service passes the COLOR environment variable with the value blue to the main flow.


ELASTICSEARCH_INDEX_LOG

ELASTICSEARCH_INDEX_LOG specifies the index with which the log messages are stored in Elasticsearch.

The key is available for the seal-rest service.

In Consul, the key is specified here:

  • dc/home/env/service/rest/tag/any/ELASTICSEARCH_INDEX_LOG

Available values: String

  • <index_name>

Default: seal-plossys-5-log


ELASTICSEARCH_INDEX_STATISTICS

ELASTICSEARCH_INDEX_STATISTICS specifies the index with which the statistics messages are stored in Elasticsearch.

The key is available for the seal-rest service.

In Consul, the key is specified here:

  • dc/home/env/service/rest/tag/any/ELASTICSEARCH_INDEX_STATISTICS

Available values: String

  • <index_name>

Default: seal-plossys-5-statistics


ELASTICSEARCH_REST_URL

ELASTICSEARCH_REST_URL specifies the URL of the Elasticsearch server.

The key is available for the seal-rest service.

In Consul, the key is specified here:

  • dc/home/env/service/rest/tag/any/ELASTICSEARCH_REST_URL

Available values: String

  • <elasticsearch_url>

Default: http://localhost:9200


GRIBS74_PDF_DB

GRIBS74_PDF_DB contains the customized content of the GRIBS74_PDF_DB configuration file required by the SAPGOF converter.

The key is available for the SAPGOF converter.

In Consul, the key is specified here:

  • dc/home/plossys/convert-sapgof/GRIBS74_PDF_DB

Available values: String

  • <content_gribs74_pdf_db_file>

Default: none (The settings in C:\Program Files\SEAL Systems\seal-convert-sapgof\lib\initialization\config\GRIBS74_PDF_DB are used.)


HOUSEKEEPER_INTERVAL

HOUSEKEEPER_INTERVAL specifies the time interval after which the service is restarted. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/HOUSEKEEPER_INTERVAL

Available values: String

  • <time_interval_and_unit>

Default: 1h


HTPASSWD

HTPASSWD specifies the valid users when basic authentication is used. The value has to accord to the format of the Apache htpasswd file. If HTPASSWD is set, HTPASSWD_FILE will be ignored.

The key is available for the seal-rest service.

In Consul, the key is specified here:

  • dc/home/env/service/rest/tag/any/HTPASSWD

Available values: String

  • <htpasswd_content>

Default: none


HTPASSWD_FILE

HTPASSWD_FILE specifies the location of the password file which contains the valid users when basic authentication is used. The content of this file has to accord to the format of the Apache htpasswd file.

The key is available for the following services:

  • seal-housekeeper

  • seal-ipp-checkin

  • seal-rest

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/HTPASSWD_FILE
  • dc/home/env/service/checkin/tag/ipp/HTPASSWD_FILE
  • dc/home/env/service/rest/tag/any/HTPASSWD_FILE

Available values: String

  • <htpasswd_path>

Default: none


ID_PROVIDER_NAME

ID_PROVIDER_NAME specifies the name of the OIDC identity provider.

The key is available for all services.

Caution - AUTH_ISSUER_URL

ID_PROVIDER_NAME has to be set to the same value as AUTH_ISSUER_URL.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/ID_PROVIDER_NAME

The key is mandatory.

Available values: String

  • <id_provider_name> (For example, with Keycloak, it is a complete URL: https://<hostname>:32769/auth/realms/SEAL)

Default: none


JOB_LIFETIME_CANCELED

JOB_LIFETIME_CANCELED specifies the time interval after which a job with the Canceled status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_CANCELED

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: 24h


JOB_LIFETIME_ERROR

JOB_LIFETIME_ERROR specifies the time interval after which a job with the Error status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_ERROR

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: 3d


JOB_LIFETIME_PAUSED

JOB_LIFETIME_PAUSED specifies the time interval after which a job with the Paused status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_PAUSED

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: 3d


JOB_LIFETIME_PREPROCESSING

JOB_LIFETIME_PREPROCESSING specifies the time interval after which a job with the Preprocessing status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_PREPROCESSING

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: -1


JOB_LIFETIME_PROCESSED

JOB_LIFETIME_PROCESSED specifies the time interval after which a job with the Processed status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_PROCESSED

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: 24h


JOB_LIFETIME_PROCESSING

JOB_LIFETIME_PROCESSING specifies the time interval after which a job with the Processing status is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_PROCESSING

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: -1


JOB_LIFETIME_WAITING

JOB_LIFETIME_WAITING specifies the time interval after which a job waiting in a non-pickup queue is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_WAITING

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: -1


JOB_LIFETIME_WAITING_PICKUP

JOB_LIFETIME_WAITING_PICKUP specifies the time interval after which a job waiting in a pickup queue is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_WAITING_PICKUP

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: 3d


JOB_LIFETIME_WAITPREPROCESSING

JOB_LIFETIME_WAITPREPROCESSING specifies the time interval after which a job waiting for preprocessing is deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/JOB_LIFETIME_WAITPREPROCESSING

Available values: String

  • <time_interval_and_unit>

  • -1

    The time interval will never be reached and so the jobs never will be deleted.

Default: -1


JOB_MAX_POSTPONED_COUNT

JOB_MAX_POSTPONED_COUNT specifies how often a job will be postponed by the service in case the next service is not available for example. After exceeding the specified maximum of postponements, the job will be considered erroneous.

The key is available for the following services:

  • seal-convert-dispatcher

  • seal-dispatcher

In Consul, the key is specified here:

  • dc/home/env/service/convert-dispatcher/tag/any/JOB_MAX_POSTPONED_COUNT
  • dc/home/env/service/dispatcher/tag/any/JOB_MAX_POSTPONED_COUNT

Available values: Integer

  • <number_max_count>

    The maximum of postponements.

Default: 10


LOG_LEVEL

LOG_LEVEL specifies the log level for the correspondent service. Messages that correspond to this log level or a higher one are written to the log file.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/LOG_LEVEL for all services

  • dc/home/env/service/<service>/tag/any/LOG_LEVEL for the specific <service> service

Available values: String

  • debug

    Debug messages are written to the log file of the service.

  • info

    Information messages are written to the log file of the service.

  • warn

    Warning messages are written to the log file of the service.

  • error

    Error messages are written to the log file of the service.

  • fatal

    Serious error messages are written to the log file of the service.

Default: info

Example - log level error

Messages of the log levels error and fatal are written to the log file.

Example - log level info

Messages of the log levels info, warn, error and fatal are written to the log file.


LOUNGE_TTL

LOUNGE_TTL specifies the time interval between two transmission attempts in case of error. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the following services:

  • seal-convert-dispatcher

  • seal-dispatcher

In Consul, the key is specified here:

  • dc/home/env/service/convert-dispatcher/tag/any/LOUNGE_TTL
  • dc/home/env/service/dispatcher/tag/any/LOUNGE_TTL

Available values: String

  • <time_interval_and_unit>

Default: 1m


LPR_ENCODING

LPR_ENCODING specifies the encoding of the job that is accepted or output via LPR.

The key is available for the following services:

  • seal-checkin

  • seal-checkout

In Consul, the key is specified here:

  • dc/home/env/service/checkin/tag/lpr/LPR_ENCODING
  • dc/home/env/service/checkout/tag/any/LPR_ENCODING

Available values: String

Default: win1252


MAX_INSTANCES

MAX_INSTANCES specifies the maximum of parallel conversions.

The key is available for the following services:

  • seal-convert-pdf2ps

  • seal-convert-ps2pdf

  • seal-convert-sapgof

  • seal-ghost

In Consul, the key is specified here:

  • dc/home/env/service/convert-pdf2ps/tag/any/MAX_INSTANCES
  • dc/home/env/service/convert-ps2pdf/tag/any/MAX_INSTANCES
  • dc/home/env/service/convert-sapgof/tag/any/MAX_INSTANCES
  • dc/home/env/service/ghost/tag/any/MAX_INSTANCES

Available values: Integer

  • <number_instances>

Default: Number of the available CPU cores in the system


MONGO_ACTIONS_URL

MONGO_ACTIONS_URL specifies the URL of the database where the internal system actions are stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_ACTIONS_URL

Available values: String

  • <mongo_actions_url>

Default: mongodb://localhost:27017/spooler-actions


MONGO_ACTIONS_AGE

MONGO_ACTIONS_AGE specifies the time interval after which an action is regarded as outdated and deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/MONGO_ACTIONS_AGE

Available values: String

  • <time_interval_and_unit>

Default: 10m


MONGO_CONNECT_RETRIES

MONGO_CONNECT_RETRIES specifies the number of attempts of a service to connect to the database.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_CONNECT_RETRIES

Available values: Integer

  • <number_retries>

Default: 10


MONGO_EVENTS_COLLECTION_SIZE

MONGO_EVENTS_COLLECTION_SIZE specifies the size ot the capped collection used to store events in the database.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_EVENTS_COLLECTION_SIZE

Available values: String

  • <collection_size>

Default: 1MB


MONGO_EVENTS_URL

MONGO_EVENTS_URL specifies the URL of the database where the internal system notifications are stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_EVENTS_URL

Available values: String

  • <mongo_events_url>

Default: mongodb://localhost:27017/spooler-events


MONGO_JOBS_URL

MONGO_JOBS_URL specifies the URL of the database where the job data is stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_JOBS_URL

Available values: String

  • <mongo_jobs_url>

Default: mongodb://localhost:27017/spooler-jobs


MONGO_LOCKS_AGE

MONGO_LOCKS_AGE specifies the time interval after which a lock is regarded as outdated and deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/MONGO_LOCKS_AGE

Available values: String

  • <time_interval_and_unit>

Default: 10s


MONGO_LOCKS_URL

MONGO_LOCKS_URL specifies the URL of the database where the data for the system-wide locking is stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_LOCKS_URL

Available values: String

  • <mongo_locks_url>

Default: mongodb://localhost:27017/spooler-locks


MONGO_LOCKS_INTERVAL

MONGO_LOCKS_INTERVAL specifies the time interval after which the ages of the locks are checked. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/MONGO_LOCKS_INTERVAL

Available values: String

  • <time_interval_and_unit>

Default: 5s


MONGO_PREPROCESS_URL

MONGO_PREPROCESS_URL specifies the URL of the database where the flow configuration for the preprocessing is stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_PPREPROCESS_URL

Available values: String

  • <mongo_preprocess_url>

Default: mongodb://localhost:27017/spooler-preprocess


MONGO_PRINTERS_URL

MONGO_PRINTERS_URL specifies the URL of the database where the printer configuration is stored.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/MONGO_PRINTERS_URL

Available values: String

  • <mongo_printers_url>

Default: mongodb://localhost:27017/spooler-printers


NODE_TLS_REJECT_UNAUTHORIZED

NODE_TLS_REJECT_UNAUTHORIZED specifies if self-signed certificates are allowed.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/NODE_TLS_REJECT_UNAUTHORIZED

Available values: Integer

  • 0

    Self-signed certificates are allowed.

  • 1

    Self-signed certificates are not allowed.

Default: 1

Caution - security gap

Setting NODE_TLS_REJECT_UNAUTHORIZED to 0 in a productive system is a serious security gap! Only use it for test purposes!


PACER_INTERVAL

PACER_INTERVAL specifies the time interval after which the database is searched again for jobs that have not yet been processed. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the following services:

  • seal-convert-dispatcher

  • seal-dispatcher

In Consul, the key is specified here:

  • dc/home/env/service/convert-dispatcher/tag/any/PACER_INTERVAL
  • dc/home/env/service/dispatcher/tag/any/PACER_INTERVAL

Available values: String

  • <time_interval_and_unit>

Default: 5m


PRINT_ERROR_SHEET specifies if an error sheet is output in case of error.

The key is available for the following services:

  • seal-dispatcher

In Consul, the key is specified here:

  • dc/home/env/service/convert-dispatcher/tag/any/PRINT_ERROR_SHEET
  • dc/home/env/service/dispatcher/tag/any/PRINT_ERROR_SHEET

Available values: String

  • Y

    An error sheet is output in case of error.

  • N

    No error sheet is output in case of error.

Default: N

Hint - default behavior has been changed

Up to version 5.0.5, an error sheet was output in case of error. As of version 5.1.0, the error sheet is not output by default but can be activated by setting PRINT_ERROR_SHEET to Y.


PRINTER_CACHE_TTL

PRINTER_CACHE_TTL specifies the time interval after that a cached printer object expires.

The key is available for the following services:

  • seal-checkin

  • seal-ipp-checkin

In Consul, the key is specified here:

  • dc/home/env/service/checkin/tag/lpr/PRINTER_CACHE_TTL
  • dc/home/env/service/checkin/tag/ipp/PRINTER_CACHE_TTL

Available values: String

  • <time_interval_and_unit>

Default: 5m


REST_BASE_URL

REST_BASE_URL specifies the address of the PLOSSYS REST API.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/REST_BASE_URL

Available values: String

  • <rest_url>

Default: https://localhost:8080


REST_VERSION

REST_VERSION specifies the version of the URL suffix of the PLOSSYS REST API.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/REST_VERSION

Available values: String

  • <version>

Default: v3


SAP_JOBNOTIFY_TIMEOUT

SAP_JOBNOTIFY_TIMEOUT specifies the timeout for sending job notifications to SAP. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-job-notifier service.

In Consul, the key is specified here:

  • dc/home/env/service/job-notifier/tag/any/SAP_JOBNOTIFY_TIMEOUT

Available values: String

  • <time_interval_and_unit>

Default: 60s


SAP_JOBNOTIFY_WAITTIME

SAP_JOBNOTIFY_WAITTIME specifies the time after which the final status notification is replied to SAP. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/SAP_JOBNOTIFY_WAITTIME

Available values: String

  • <time_interval_and_unit>

Default: 15m


SAPNWRFCINI_PATH

SAPNWRFCINI_PATH specifies the directory where the SAP configuration file sapnwrfc.ini is stored. The key has to be set if notifications are to be returned to the requesting SAP Systems.

The key is available for the seal-job-notifier service.

In Consul, the key is specified here:

  • dc/home/env/service/job-notifier/tag/any/SAPNWRFCINI_PATH

Available values: String

  • <path>

Default:

  • Windows: C:/ProgramData/SEAL Systems/PLOSSYS/config

  • Linux: /opt/seal/etc


SERVICE_DISCOVERY

SERVICE_DISCOVERY specifies if PLOSSYS 5 is running in an on-premise installation or in a cloud environment. In the cloud environment, the configuration is not read from Consul but from files or the environment.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/SERVICE_DISCOVERY

Available values: String

  • cloud

    PLOSSYS 5 is running in a cloud environment.

  • consul

    PLOSSYS 5 is running in an on-premise installation.

Default: consul


SERVICE_URL

SERVICE_URL specifies how a service can be accessed.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/<service>/tag/any/SERVICE_URL for the specific <service> service

Available values: String

  • <service_url>

Default: The server name is determined when a service is started and the default port is used. The correspondent assignment is described in Used Ports.


SOCKET_CLOSE_TIMEOUT

SOCKET_CLOSE_TIMEOUT specifies the timeout after which the socket is forced closed after sending a spool file to the printer unless the printer closes the connection. The time interval has to be specified as the number of milliseconds to wait. For disabling the forced closing, specify 0.

The key is available for the seal-checkout service.

In Consul, the key is specified here. If the key does not yet exist, you have to create it:

  • dc/home/env/service/checkout/tag/any/SOCKET_CLOSE_TIMEOUT

Available values: Integer

  • <time_interval>

Default: 0


SOCKET_CLOSE_TIMEOUT_IS_JOB_ERROR

SOCKET_CLOSE_TIMEOUT_IS_JOB_ERROR specifies if the job status is set to error after the socket has been forced closed.

The key is available for the seal-checkout service.

In Consul, the key is specified here. If the key does not yet exist, you have to create it:

  • dc/home/env/service/checkout/tag/any/SOCKET_CLOSE_TIMEOUT_IS_JOB_ERROR

Available values: Boolean

  • true

    The job status is set to error after the socket has been forced closed.

  • false

    The job status is not set to error after the socket has been forced closed.

Default: false


SWEEP_AGE

SWEEP_AGE specifies the time interval after which an incomplete job is regarded as incorrect and deleted from the database. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the seal-housekeeper service.

In Consul, the key is specified here:

  • dc/home/env/service/housekeeper/tag/any/SWEEP_AGE

Available values: String

  • <time_interval_and_unit>

Default: 10m


SYSTEMS

SYSTEMS specifies the list of SAP systems whose output jobs are to be stamped. The value is a multiline text containing one system name in each line.

The key is available for the seal-convert-dispatcher service.

In Consul, the key is specified here:

  • dc/home/plossys/sapgof/stamp/SYSTEMS

Available values: Multiline string

  • <system1> |

    <system2> |

    ...

    <systemn>

Default: none


TEMPLATE

TEMPLATE specifies the stamp layout for the SAP output jobs.

The key is available for the seal-convert-pdfstamp service.

In Consul, the key is specified here:

  • dc/home/plossys/sapgof/stamp/TEMPLATE

Available values: String

  • <template_file>

Default: The default layout of PDF Stamp is used. For more information about PDF Stamp, refer to the PDF Stamp documentation.


TEXT

TEMPLATE specifies the stamp text for the SAP output jobs. In the text, variables can be specified.

The key is available for the seal-convert-pdfstamp service.

In Consul, the key is specified here:

  • dc/home/plossys/sapgof/stamp/TEXT

Available values: String

  • <stamp_text>

Default: The default stamp text of PDF Stamp is used. For more information about PDF Stamp, refer to the PDF Stamp documentation.


TIMEOUT

TIMEOUT specifies the time interval after which a conversion is aborted if it has not generated any new data. The time interval has to be specified including the unit. The available units are listed at the top of the page.

The key is available for the following services:

  • seal-convert-pdf2ps

  • seal-convert-ps2pdf

  • seal-convert-sapgof

  • seal-convert-pdfstamp

In Consul, the key is specified here:

  • dc/home/env/service/convert-pdf2ps/tag/any/TIMEOUT
  • dc/home/env/service/convert-ps2pdf/tag/any/TIMEOUT
  • dc/home/env/service/convert-sapgof/tag/any/TIMEOUT
  • dc/home/env/service/convert-pdfstamp/tag/any/TIMEOUT

Available values: String

  • <time_interval_and_unit>

Default: 2m


TLS_DIR

TLS_DIR specifies the directory containing the certificate files necessary for the secure transfer between the clients and servers and within PLOSSYS 5.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/TLS_DIR

Available values: String

  • <dir_name>

The directory contains the following files:

  • key.pem

    File with the private key

  • cert.pem

    File with the certificate

  • ca.pem

    File with the CA certificate

Default: none

Hint - certificate files contained in delivery

The self-signed certificates contained in delivery are hard-coded. The tls directories contained in delivery only contain examples which certificate files are required and how they look like.


TLS_PADIR

TLS_PADIR specifies the directory containing the certificate files necessary for secure transfer with PLOSSYS Administrator.

The key is available for the seal-plossysadmin service.

In Consul, the key is specified here:

  • dc/home/env/service/plossysadmin/tag/any/TLS_PADIR

Available values: String

  • <dir_name>

The directory contains the following files:

  • key.pem

    File with the private key

  • cert.pem

    File with the certificate

  • ca.pem (optional)

    File with the CA certificate

Default: none

Hint - certificate files contained in delivery

The self-signed certificates contained in delivery are hard-coded. The tls directories contained in delivery only contain examples which certificate files are required and how they look like.


TLS_UNPROTECTED

TLS_UNPROTECTED specifies the encryption between the PLOSSYS 5 services.

The key is available for all services.

In Consul, the key is specified here:

  • dc/home/env/service/any/tag/any/TLS_UNPROTECTED

Available values: String

  • none

    All connections are encrypted via HTTPS.

  • loopback

    The local connections are not encrypted. The connections between different servers are encrypted via HTTPS.

Default: loopback


Back to top