Welcome!

Python Authors: Matt Davis, AppDynamics Blog, Pat Romanski, Donald Meyer, Liz McMillan

Blog Feed Post

Calling all Dispatchers


There are two items of general NetWeaver Identity Managementmaintenance that I get asked about frequently.
  • How do you prevent deadlocks    
  • What is the best way to configure my dispatchersin IDM?
All too often these issues are actually related asinefficient dispatcher setup can cause database deadlocks. In this blog entryI’d like to recommend some possible architecture scenarios that will help outwith this. For the purposes of this discussion, we’ll be talking about aNetWeaver IDM 7.1 installation on Microsoft SQL Server 2008 R2. According to Microsoft:
A deadlock occurs when two or more tasks permanently blockeach other by each task having a lock on a resource which the other tasks aretrying to lock. The following graph presents a high level view of a deadlockstate where:
·        Task T1 has a lock on resource R1 and hasrequested a lock on resource R2.
·        Task T2 has a lock on resource R2 and has requesteda lock on resource R1.
·        Because neither task can continue until aresource is available and neither resource can be released until a taskcontinues, a deadlock state exists.

Attaching multiple dispatchers to the same task would thenseem to create the potential for deadlocks to occur in the database,particularly if they are all trying to access the same rows in the various IDMtables. But wait, we’re supposed to be able to do this to encourage HighAvailability, Load balancing and failover, so what gives?

Well the secret lies in the architecture, of course. If therequests come from separate physical hosts, it is much easier for the both IDMand the database to manage the threads and requests. Let’s look at a couple ofexamples. First here is a basic dispatcher setup assuming one server with acouple of dispatchers on it.

This setup is OK since each dispatcher (D) is connected to adistinct Job (J) or set of jobs. Sometimes there is a need to have aconfiguration like this, which usually something like one dispatcher for provisioningjobs, one for housekeeping(HK) and one that provides some sort of elevatedaccess for Directory Services(DS) access.

Based on this there might be a temptation to set up thedispatcher/job relationship to look something like this to provide additionalfail over and support for some specific jobs. Consider the following examplewhere I outline a scenario with a crossover between multiple dispatcherspointing to jobs in a many to one relationship:
This scenario is exactly what we do not want to have as itis most likely to create a deadlock scenario as having multiple dispatchers accessingthe same jobs that are accessing the same database resources. What we have hereis a potential for deadlocks as the system is trying to manage multipledatabase resources (rows) at the same time.

What tends to compound this situation is the way that thedatabase is being accessed. Using the To Identity Store Pass creates the leastamount of deadlock strain on the system, since this is under the direct controlof the workflow system and its dispatchers, while using techniques such as the uIS_SetValue function, that can becalled from anywhere, at any time, create the greatest possibility as thesystem is managing standard job based access with unforeseen access via uIS_SetValue.
This scenario should be replaced by something like this:

In this case the potential for deadlocks is significantlyreduced since there is separate management of the database connections. It alsoprovides a degree of load-balancing and failover since if the D1 or D3Dispatchers are busy or unable to process an assigned task then the D4or D5 dispatchers respectively can take over. A good resource forthis can be found in the SAP document SAPNetWeaver Identity Management Identity Center Implementation Guide OptimizingDispatcher Performance.

What also needs to be recognized is that it’s not always asmuch “where” the requests come from, but when the requests come. Care should betaken to monitor the frequency and duration of the larger and more intensivetasks and workflows to make sure that the more involved tasks do not run at thesame time (For example the HCM load should probably not happen the same timethat the Directory Service reconciliation is occurring). These should be thefirst candidates for having their down dedicated dispatchers if there is a needto run them on similar schedules and this cannot be avoided.

Given all of this, the thing to remember when consideringdispatcher allocation is to make sure that there are not multiple dispatchersthat are competing for the same set of Identity Store resources at the sametime. As long as this is kept in mind when setting up dispatchers, thepossibility of deadlocks is minimized.
A related question to this is how many dispatchers are neededto assign for provisioning and de-provisioning operations. I have always used25,000 objects per dispatcher as a general rule. Based on this the scenarioshown above would be good for an enterprise where there are a maximum of 50,000users, roles, privileges or groups that are being managed in any given task.


As a final note, it is a good thing to remember that thedispatchers do not need to be installed on Microsoft Windows based systemsonly. Any UNIX/LINUX environment is just fine for setting up IDM Dispatchers.For more information, check out the SAP document: HowTo: Setting Up An Identity Management Dispatcher On A Unix Host Flavor.



Read the original blog entry...

More Stories By Matthew Pollicove

Matt Pollicove is an Identity Management architect, engineer, trainer, project manager, author and blogger with experience in user account provisioning, data synchronization, virtual directory and password management solutions. As a MaXware Technical Consultant and later as a System Engineer, he worked extensively with MaXware (now SAP) software products in large customer environments. In the past Matt has worked with several leading national and international consulting firms and is currently a Sr. Principal Consultant for Commercium Technologies. He is currently the Practice Lead for SAP NetWeaver Identity Management and SailPoint IIQ.

@ThingsExpo Stories
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo at the Javits Center in New York City, NY.
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...