You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/onprem/en/robotmk.asciidoc
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -519,13 +519,15 @@ Here in the screenshot, under [.guihint]#Plan Settings# you can see the upload f
519
519
Pay attention to the name at the top under [.guihint]#Properties.#
520
520
This is mandatory, as the robot will later be configured in the scheduler using this name.
521
521
522
+
.The robot itself is simply transferred as an archive
522
523
image::robotmk_managed_robots_robot.png[alt="Configuration of a managed robot."]
523
524
524
525
To use such a [.guihint]#Managed robot#, the [.guihint]#Robotmk scheduler (Windows|Linux)# rule is again used.
525
526
But instead of scheduling the execution of the robot here, simply specify the desired, preconfigured robot under [.guihint]#Sequence of plans#.
526
527
If required, you can still adapt the plan's configuration for the preconfigured robot for this application here.
527
528
In practice, the feature is therefore usually limited to outsourcing the known configuration and having the robot archive files distributed by the agent.
528
529
530
+
.The [.guihint]#mybot_managed# managed robot is scheduled using the default plan configuration
529
531
image::robotmk_managed_robots_scheduler.png[alt="Configuration of the scheduler with a managed robot."]
530
532
531
533
The agent then transfers the specified archives to the desired hosts and stores them in the agent directory under `robomk_output/managed`, where they are then unpacked and finally executed.
@@ -939,6 +941,7 @@ In the [.guihint]#Robotmk Scheduler (Windows|Linux)# rule (or in [.guihint]#Mana
939
941
Please do not confuse this path with the `holotree path`!
940
942
This serves only as a repository for the Hololib catalog ZIPs to be imported.
941
943
944
+
.The storage location for zipped Hololib catalogs (templates for building environments)
942
945
image::robotmk_rcc_offline_dependency_handling.png[alt="Information on handling a zipped catalog."]
943
946
944
947
When the scheduler is later started, it will import all Hololib catalog ZIPs and build the spaces from these templates, i.e. the environments that are actually going to be used.
@@ -962,17 +965,20 @@ You can find out how to set up RCCRemote-Docker, handle certificates and import
962
965
963
966
The configuration on the {CMK} side is now again -- typically -- quite simple: The [.guihint]#Environment dependency handling# option is this time set to [.guihint]#Fetch from RCC remote server# and supplied with the server's address.
964
967
968
+
.The RCCRemote Docker can deliver catalogs via the network
965
969
image::robotmk_rcc_offline_dependency_handling_2.png[alt="Specification for handling RCCRemote."]
966
970
967
971
One final setting is still missing, depending on whether your RCCRemote server uses a self-signed or a CA-signed certificate.
968
972
In both cases, you usually have to set [.guihint]#Robotmk scheduler (Windows|Linux)# the option [.guihint]#RCC profile configuration# to [.guihint]#Custom profile#.
969
973
970
974
For a self-signed certificate, it is sufficient to leave the [.guihint]#Validate TLS certificates# box unchecked:
971
975
976
+
.TLS certificates do not necessarily have to be validated.
972
977
image::robotmk_rcc_offline_tls_self.png[alt="Inactive TLS validation for self-signed certificates."]
973
978
974
979
If, however, it is a CA-signed certificate, this option must be activated and the certificate from the signing authority must be stored under [.guihint]#Root CA# (in PEM format):
975
980
981
+
.CA-signed TLS certificates are validated as usual by specifying the root CA
976
982
image::robotmk_rcc_offline_tls_ca.png[alt=”Stored certificate from the CA."]
0 commit comments