1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 <2012> 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 | Index | 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 <2012> 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 |
<== Date ==> | <== Thread ==> |
---|
Subject: | RE: Using CAJ in production |
From: | <[email protected]> |
To: | <[email protected]>, <[email protected]> |
Date: | Thu, 29 Nov 2012 18:36:08 +0000 |
Hi Shankar, On Diamond Beamlines our primary EPICS client is GDA, which uses the CAJ pure Java CA client. However, if I understand you correctly, they
·
probably don’t monitor PV’s with DBE_PROPERTY through a CA gateway. ·
they don’t use CA Access Security I am not sure about the issue with EPICS_CA_MAX_ARRAY_BYTES, but they do get and monitor large arrays. Cheers, Nick Rees Principal Software Engineer Phone: +44 (0)1235-778430 Diamond Light Source Fax: +44 (0)1235-446713 From: [email protected] [mailto:[email protected]]
On Behalf Of Shankar, Murali Just wanting to check if anyone uses CAJ (pure Java CA client) clients in production especially in combination with IOC's that are using the native CA library. I've pinged a few folks offline; however, it was thought that a community wide repoll would probably be beneficial. Known issues that I am already aware of (thanks Michael and Eric) 1) Interoperability issue with the CA Gateway and clients using monitors with DBE_PROPERTY. 2) For CA Access Security, CAJ uses full hostnames (with domain) and libca uses short host names (without domain) 3) The issue with EPICS_CA_MAX_ARRAY_BYTES has already been fixed. Has anyone encountered any issues/differences on the IOC side? Regards, Murali
-- This e-mail and any attachments may contain confidential, copyright and or privileged material, and are for the use of the intended addressee only. If you are not the intended addressee or an authorised recipient of the addressee please notify us of receipt by returning the e-mail and do not use, copy, retain, distribute or disclose the information in or attached to the e-mail. |