Authenticate ActiveMQ on Remote Agents | Teradata Data Mover - 17.00 - Configuring ActiveMQ on Remote Agents - Teradata Data Mover

Teradata® Data Mover Installation, Configuration, and Upgrade Guide for Customers

Teradata Data Mover
Release Number
November 30, 2021
English (United States)
Last Update

In a high availability environment, ActiveMQ authentication is automatically configured when running dmcluster config during the install or upgrade process to Data Mover 17.00 or later. The secondary (standby) server and all additional agents in the clustered environment are automatically configured with the ActiveMQ secret and encrypted password from the Primary Data Mover server.

However, if your environment is not configured to use a high availability cluster, perform the following steps after the install or upgrade so that any remote agents can successfully access ActiveMQ on the Primary server.

  1. Copy /etc/opt/teradata/tdactivemq/ from the Primary Data Mover server to the same location on the remote agent(s), as in the following example:
    # scp /etc/opt/teradata/tdactivemq/ root@your_agent_server:/etc/opt/teradata/tdactivemq
  2. Login to each remote agent to verify the ActiveMQ permissions are similar to the following:
    -rw-r----- 1 root activemq 16 Feb 10 14:49
  3. If necessary, set the permissions for on each remote agent:
     # chmod 640
     # chgrp activemq
  4. Update the agent broker.password property in the file with the same value defined on the Primary Data Mover server.
    Update /etc/opt/teradata/datamover/ if it exists. If not, update opt/teradata/client/nn.nn/datamover/agent/
  5. Restart the agent.
    /etc/init.d/dmagent stop
    /etc/init.d/dmagent start