Pega-IntSvcs agents
The following agents in the Pega-IntSvcs ruleset process queued service and connector requests .
- ProcessServiceQueue
- ProcessConnectQueue
ProcessServiceQueue
Service requests of any of seven service types can process service requests asynchronously. When configured to do so, EJB, HTTP, Java, JMS, MQ, SOAP and File services use the Queue Manager infrastructure to store service requests as persistent objects in the PegaRULES database.
The class, queuing and dequeueing options for the service request are determined by a Service Request Processor data instances. See About Service Request Processor data instances.
The first execution of an asynchronous service request occurs in the service requestor,
but in a separate background Thread that executes after, rather than before, the service
response is set. Queuing and the ProcessServiceQueue agent are used for
the second and subsequent retries, if configured. Queuing also occurs when configured
through a Queue When
condition on the Fault tab or Response tab of the
service rule.
The ProcessServiceQueue agent is disabled by default. To enable it, select the Enabled? option for it on the Schedule tab of the agent schedule instances ( Data-Agent-Queue class).
When the ProcessServiceQueue agent executes a queued service request, the execution is performed with the authorization profile of the service/listener.
For more information, see the Pega Community article How asynchronous service processing works.
ProcessConnectQueue
SOAP and HTTP connector requests can be processed asynchronously. The class, queuing and dequeueing options for the service request are determined by a Connect Request Processor data instances. See About Connect Request Processor data instances and More about SOAP connector rules.
The ProcessConnectQueue agent is disabled by default. To enable it, select the Enabled? option for it on the Schedule tab of the agent schedule instances ( Data-Agent-Queue class).
When the ProcessConnectQueue agent executes a queued connector request, the execution is performed with the authorization profile of the service/listener.