ENHANCEMENT for CA XCOM for Windows to Suppress TCP/IP Connection Messages

Document ID : KB000009529
Last Modified Date : 14/02/2018
Show Technical Document Details
Introduction:

TCP/IP Connection Messages were added in r11 to be able to distinguish between  unencrypted and SSL-encrypted socket connections: 
XCOMN0793I Remote TCP/IP Connection Established.
XCOMN0805I TCP/IP Connection Ended.

TCP/IP Connection Messages were added in r11 to be able to distinguish between  unencrypted and SSL-encrypted socket connections. 
XCOMN0793I Remote TCP/IP Connection Established.
XCOMN0805I TCP/IP Connection Ended.

In our environment, we use port monitoring software to verify that XCOM is active by connecting to port 8044 on the server every 10 seconds. These messages fill up the xcomlog. These messages were not in the log in release 3.1.

 

Instructions:

There is a new parameter introduced at R11 SP02 0710C that may be specified in the xcom.glb or .cnf file to control these messages.

The parameter is:

LOG_CONNECT_MSG=N

Which allows suppression of the following messages:
XCOMN0785I,   XCOMN0786I,   XCOMN0793I,   XCOMN0805I,   XCOMN0811I,   XCOMN0812I,   XCOMN0813I,   XCOMN0814I   and   XCOMN0818I.

Valid parameter values are Y or N. This parameter defaults to Y, messages are logged.

Additional Information:

Please see LOG_CONNECT_MSG in our online documentation.