ENHANCEMENT for CA XCOM for Windows to Suppress TCP/IP Connection Messages
search cancel

ENHANCEMENT for CA XCOM for Windows to Suppress TCP/IP Connection Messages

book

Article ID: 9529

calendar_today

Updated On:

Products

XCOM Data Transport XCOM Data Transport - Windows

Issue/Introduction

TCP/IP Connection Messages were added in r11 to be able to distinguish between  unencrypted and SSL-encrypted socket connections: 
XCOMN0793I Remote TCP/IP Connection Established.
XCOMN0805I TCP/IP Connection Ended.

TCP/IP Connection Messages were added in r11 to be able to distinguish between  unencrypted and SSL-encrypted socket connections. 
XCOMN0793I Remote TCP/IP Connection Established.
XCOMN0805I TCP/IP Connection Ended.

 

With port monitoring active which connects to port 8044 on the server every 10 seconds, these messages fill up the xcomlog. These messages were not in the log in earlier releases.

Environment

Release: CA XCOM Data Transport for Windows
Component:  XCPCNT

Resolution

There is a new parameter introduced at R11 SP02 0710C that may be specified in the xcom.glb or .cnf file to control these messages.

The parameter is:

LOG_CONNECT_MSG=N

Which allows suppression of the following messages:
XCOMN0785I,   XCOMN0786I,   XCOMN0793I,   XCOMN0805I,   XCOMN0811I,   XCOMN0812I,   XCOMN0813I,   XCOMN0814I   and   XCOMN0818I.

Valid parameter values are Y or N. This parameter defaults to Y, messages are logged.

Additional Information

Please see LOG_CONNECT_MSG in our online documentation.