Previous Table of Contents Index Next
Perforce 2009.1: System Administrator's Guide



A
access level
and protections 80
access levels 81
access logging 21, 60
admin access level 37, 82
administrator
force flag 49
privilege required 143
administrators
and job specifications 93
allocating disk space 18
AppleSingle 28
.asp files 47
audit log file
specifying 156
auditing 21, 60
authentication 37
with triggers 119
automated checkpoints 25
automating Perforce 41
.avi files 47
B
backing up 29
backup
procedures 29
recovery procedures 31
backups
and Perforce Proxy 150
.bmp files 47
branches
namespace 64
.btr files 47
buffering
of input/output in scripts 128
C
can 142
case-sensitivity
and cross-platform development 22
UNIX and Windows 22, 55
change review 125
changelist numbers
highest possible 127
pending vs. submitted changelists 128
changelist submission triggers 106
changelist triggers 111
changelists
deleting 45
editing 45
checkpoint
as part of backup script 29
creating 24
creation of, automating 25
defined 24
ensuring completion of 30
failed 25
introduced 23
managing disk space 18
when to call support 25
checkpoints
creating with p4 admin 25, 29
client
and port 13
clients
namespace 64
.cnf files 47
commands
forcing 49
concurrent development 49
content
trigger type 112, 113
counter
limits 127
CPU
and performance 131
CR/LF conversion 62
creating checkpoints 24
creating users 41
creation of users
preventing 41
cross-platform development
and case sensitivity 22
.css files 47
D
daemon
change review 125
daemons 103
changelist numbers 128
creating 126
database files 60
defined 23
where stored 23
db.* files 23
defect tracking
integrating with Perforce 101
deleting
changelists 45
depots 66
files, permanently 44
user groups 86
deleting users 43
depot
and Mac file formats 28
and server root 64
depot files
see versioned files 28
depots
defined 23
defining 63
deleting 66
listing 66
local 64
mapping field 69
multiple 63
namespace 64
remote 63, 70
remote, defining 69
disabling journaling 28
disk
performance 129
sizing 130
disk space
allocating 18
and server trace flags 58
estimating with p4 sizes 131
freeing up 44
distributed development 67
DNS
and performance 132, 133
.doc files 47
.dot files 47
drives
and db.*and journal file 17
E
editing
changelists 45
editor
Wordpad, limitation 146
environment variables
P4PCACHE 148, 150
P4PORT 148
P4TARGET 148, 150
error logging 21
error messages
and p4 verify 45
example
specifying journal files 27
exclusionary mappings
and protections 84
exclusive locking 49
.exp files 47
F
fields
of job template 94
file formats
AppleSingle 28
file names
mapping to file types 46
file specification
and protections 80
file types 47
mapping to file names 46
files
access to, limiting 84
.asp 47
.avi 47
.bmp 47
.btr 47
.cnf 47
.css 47
database 23
.doc 47
.dot 47
.exp 47
.gif 47
.htm 47
.html 47
.ico 47
.inc 47
.ini 47
.jpg 47
.js 47
left open by users, reverting 43
.lib 47
.log 47
logging access to 21, 60
matching Perforce file types to file names 46
.mpg 47
.pdf 47
.pdm 47
permanent deletion of 44
.ppt 47
subscribing to 126
verification of 45
versioned 23
.xls 47
.zip 47
filesystems
and performance 129
large 19
NFS-mounted, caveats 20, 130
firewall
defined 51
running Perforce through 51
fix
trigger type 114
fix status
default 98
fix triggers 114
fixes
triggers 114
flags
and Perforce Proxy 149
-f to force 49
server, listed 155
form triggers 118
form-commit
trigger type 118
forms
triggers 115
G
.gif files 47
groups
and protections 80, 85
and subgroups 85
deleting 86
editing 85
of users 85
H
history of changes to forms 64
hostname
changing your server's 63
hosts
and protections 80
hosts file
on Windows and UNIX 133
.htm files 47
.html files 47
I
-i
and inetd 54
automating job submissions 102
automating user creation 41
.ico files 47
in
trigger type 117
.inc files 47
inetd 54, 156
.ini files 47
installation
Windows 14
installing
license file 17
on network drives 20
on NFS filesystems 20, 130
on UNIX 11
on Windows 14
on Windows network drives 143
Perforce Proxy 148
IP address
changing your server's 63
servers and P4PORT 53
IP forwarding
and ssh 52
J
job fields
data types 96
job specification
and administrators 93
and comments 98
default format 93
defining fields 95
extended example 100
warnings 99
job template
default 93
fields of 94
viewing 94
jobs
comments in 98
other defect tracking systems 101
triggers 114
journal
defined 26
introduced 23
managing size of 18
where to store 18
journal file
specifying 156
store on separate drive 17
journaling
disabling 28
.jpg files 47
.js files 47
L
label
namespace 64
.lib files 47
license 17, 43
licensing information 17
limitations
Wordpad 146
list access level 81
listing
depot names 66
local depots 64
localhost 54
locking
exclusive 49
log file
specifying 156
.log files 47
logging file access 21, 60
logging in 38
login 38
M
Mac
and file formats 28
Macintosh
OS X 11
mappings
and depots 69
maxlocktime
and performance 135
maxresults
and multiple groups 137
and performance 135
use of 135
maxscanresults
and performance 135
use of 135
maxscanrows
and multiple groups 137
MD5 signatures 45
memory
and performance 129
requirements 129
metadata
see database files 23, 60
monitoring server activity 56
moving servers 60
across architectures 61
from Windows to UNIX 62
new hostname 63
new IP address 63
same architecture 61
.mpg files 47
multiple depots 63
N
naming
depots 64
network
and performance 131, 132
Perforce Proxy configuration 147
problems, diagnosing 132
network drives
and triggers 124
and Windows 20
network interface
directing server to listen to specific 53
NFS
and installation 20, 130
non-forking 156
O
obliterating files 44
open access level 81
operating systems
and large filesystem support 19
OS X
and UNIX 11
out
trigger type 116
P
p4 admin
and Windows 15, 142
creating checkpoints 25, 29
stopping server with 14, 32, 33
p4 jobspec
warnings 99
p4 login 38
p4 monitor 56
p4 set -s
setting variables for Windows services 145
p4 sizes 131
p4 triggers
form 105
p4 typemap 46
p4 verify 45
P4AUDIT 156
p4d
flags, listed 155
security 21, 124
specifying audit log 156
specifying journal file 156
specifying log file 156
specifying port 157
specifying server root 157
specifying trace flags 157
p4d.exe 15
P4DEBUG 157
and proxy server 150
P4JOURNAL 156
P4LOG 156
and proxy server 149
P4P
and remote development 67
see Perforce Proxy 147, 148
P4PCACHE 148, 150
P4PFSIZE
and proxy server 149
P4POPTIONS
and proxy server 149
P4PORT
and client 13
and proxy server 149
and server 13, 157
IP addresses and your server 53
Perforce Proxy 148
P4ROOT 12, 157
and depot files 64
p4s.exe 15
P4TARGET 148, 150
passwords 37
setting 18, 41
PDF files
and p4 typemap 46
.pdf files 47
.pdm files 47
Perforce clients
and P4PORT 13
Perforce file types 47
Perforce Proxy 67, 147
backups 150
diskspace usage 150
installation 148
options 149
protections 151
startup 148
stopping 150
troubleshooting 150
tuning 152
Perforce server
and P4PORT 13
and triggers 108
and Windows network drives 20
installing under NFS 20, 130
monitoring 56
moving to another machine 60
running from inetd 54
upgrading 16
verifying 45
vs. service 15
Perforce service
vs. server 15
perforce.exe 14
performance
and memory 129
and scripts 137
and wildcards under Windows 132
CPU 131
monitoring 56
network 131, 147
preventing server swamp 133
slow, diagnosing 132
performance tracking 58
performance tuning
and Perforce Proxy 152
permissions
see protections 83
pessimistic locking 49
port
for client 13
for server 13
specifying 157
ports
running out of TCP/IP 131
.ppt files 47
privileges
administrator 143
protections 7987
algorithm for applying 86
and commands 87
and groups 85
and Perforce Proxy 151
and performance 135
and superusers 79
commands affected by 87
default 83
exclusionary 84
multiple 83
schemes for defining 82
securing remote depots 70
protections table 79
proxy 147
and remote development 67
python 125
R
RAM
and performance 129
read access level 81
recovery
procedures 31
remote depots 63
and virtual users 70
defining 69
securing 70
resetting passwords 41
review access level 81
review daemon 125
revision range
and obliterate 45
rich text
and p4 typemap 46
root
must not run p4d 21, 124
S
save
trigger type 115
scripting
buffering standard in/output 128
guidelines for efficient 137
with -i 41
secure shell 51
security
and passwords 18
p4d must have minimal privileges 21, 124
preventing user impersonation 18
restrict remote access 70
server
and triggers 108
auditing file transfers 156
backing up 29
changing IP address 43
disk space required by 131
license file 17
licensing 17, 43
migrating 60
monitoring 56
performance tracking 58
port 13
proxy 147
recovery 31
root, specifying 157
running from inetd 54
running in background 156
running single-threaded 156
specifying journal file 156
specifying log file 156
specifying port 157
stopping on Windows 142
stopping with p4 admin 14, 32, 33
trace flags 58
upgrading 16
verifying 45
vs. service 15
Windows 15
server flags
listed 155
server root
and depots 64
and P4ROOT 12
creating 12
defined 12
specifying 157
setting passwords 18, 41
single-threaded 156
spec depot
populating 65
spec depot 64
specification triggers 106, 115, 116, 117
specifications
triggers 115
ssh 51
standard input/output
buffering 128
stopping server
on Windows 142
with p4 admin 14, 32, 33
subgroups
and groups 85
super access level 37, 82
superuser
and triggers 105
force flag 49
Perforce, defining 18
superusers
and protections 79
svcinst.exe 143
symbolic links
and disk space 19
T
TCP/IP
and port number 13
running out of ports 131
technical support
when to call 25
template
job, default 93
tickets 37
expiry 38
timeout 38
trace flags
specifying 157
trigger type 111
triggers 103
and Windows 124
authentication 119
content 112, 113
fields 105
firing order 123
fix 114
fix triggers 114
form 105, 118
input 117
multiple 123
naming 105
on changelists 111
output 116
passing arguments to 109
portability 124
save 115
script, specifying arguments to 108
security and p4d 21, 124
specification triggers 115
submit 111
types of 106
warnings 116
troubleshooting
Perforce Proxy 150, 152
slow response times 132
type mapping 46
U
umask(1) 12
unicode 156
UNIX
/etc/hosts file 133
and case-sensitivity 55
upgrading
server 16
user tracking 21, 60
users
access control by groups 85
and protections 80
creating 41
deleting 43
files, limiting access to 84
nonexistent 43
preventing creation of 41
preventing impersonation of 18
resetting passwords 41
virtual, and remote depots 70
V
variables
in trigger scripts 109
setting for a Windows service 145
verifying server integrity 45
version information
and Perforce Proxy 150
clients and servers 17
versioned files 60
defined 23
format and location of 28
introduced 23
where stored 23
versioned specifications 64
view
scope of, and performance 134
W
warnings
and job specifications 99
disk space and Perforce Proxy 150
obliterating files 45
recursive triggers 116
security 70
security and p4d 21, 124
wildcards
and protections 80
and Windows performance 132
Windows
and case-sensitivity 22, 56
and p4 admin 15
hosts file 133
installer 14
installing on 14
installing on network drive 20, 143
server 15
service, setting variables in 145
stopping server 142
triggers and network drives 124
Wordpad
limitation 146
write access level 81
X
.xls files 47
Z
Zeroconf 13, 156, 157
.zip files 47


Previous Table of Contents Index Next

Perforce 2009.1: System Administrator's Guide
Copyright 1997-2009 Perforce Software.