General Settings
Networking
Settings for how the different services will communicate and interoperate.
General load balancing model
In a multi-server deployment (cluster), the internal Routing Service will automatically send requests to the various engines to share the load. Changing the load balancing settings in this panel determines the method for sharing:
- Round Robin - Going down the list of servers in the group, the round-robin load balancer forwards a task to each server in turn. When it reaches the end of the list, the load balancer loops back and goes down the list again
- Performance Routing - The load balancer shares out tasks based on a evaluation of the load a given server is under in comparison to other servers in the cluster. This is affected both by its hardware settings (virtual or bare metal) and by the current list of tasks it is processing.
- Queue - The load balancer shares out tasks based on the current queue size for each of the services. That is, incoming tasks are sent to the runtime engine service that currently have the smallest queue.
Note: This feature is only available in the Enterprise edition.
Task load balancing model
Specifies the model to be used for Task Balancing:
- Eager: The task engine accepts as many tasks as it can. As a result, one task engine operates at full capacity while the other remains idle.
- Semi-balanced: The task engine handles half of the jobs it can perform while the remaining tasks are handled by the second task engine. The burden can be dispersed more evenly this way than with the eager option.
Failover Mechanism
Indicates the action that should be performed when a runtime request fails during processing. The options are:
- Never Redirect - In the event of a failure, no redirect will occur. The user will receive an exception.
- Always Redirect - In the event of a failure, the request is always redirected to a different runtime engine. If no alternative runtime engine is available, the request fails and the user will receive an exception.
- Selective Redirect - In the event of a failure, the request is redirected to a different runtime engine based on its weight in terms of CPU usage. You need to set a Selective Threshold (see below) for this option.
Selective Threshold
This threshold indicates the "weight" of requests that qualify to be redirected after failure where a Selective Redirect is in place:
- Select Light to only redirect requests that make medium, heavy, or very heavy use of CPU resources (not light).
- Select Medium to redirect requests that make heavy or very heavy use of CPU resources (not light or medium).
- Select Heavy to only redirect requests that make very heavy use of CPU resources.
Otherwise, the user will receive an exception.
Max ping wait timeout (sec)
Indicates how long (in seconds) to wait for a service response before going to the reset flow,
Monitor cluster performance
Logs the CPU performance so that it can be analyzed.
Warning: This option should only be used when absolutely needed. It will cause performance degradation when it is enabled.
Active Memory Management
- Proactive Garbage Collection: automatically free up memory by removing unused items. Every half-hour, Pyramid will check if there are unused items; if so the garbage collection will run. The garbage collector can also be run for a specified service from the Summaries Panel, or for all services from Server Instances.
- Proactive Renderer Collection: automatically clear printing processes every half-hour to free up printing services.
Proxy Settings
Many organizations use Proxy Servers as part of their internet gateway topology. Since there are various items within Pyramid that require access to the internet, the proxy server configuration may be needed to enable these functions.
Note: This feature currently supports printing of map visualizations, and querying Google BigQuery and Google Analytics data sources.
To configure a proxy server:
- Select the Enable proxy server checkbox.
- Provide the proxy server's address and port.
- If your proxy server requires login credentials, select 'Use Credentials' and enter the server's user name and password.
- Choose whether to bypass the proxy server for local addresses.