avoid overwriting user defined access security rules by caPutLog

This commit is contained in:
2021-03-22 14:23:59 +01:00
parent 44246b4b84
commit 910f1ada88
2 changed files with 4 additions and 4 deletions

View File

@@ -134,6 +134,10 @@ execute STRINGBUFFER
require "utilities", getenv("utilities_VERSION")
require "misc", getenv("misc_VERSION")
# caPutLog
putenv "EPICS_CA_PUT_LOG_ADDR=gfa-syslog:1515 gfa-logstash.psi.ch:1515"
require "caPutLog", getenv("caPutLog_VERSION")?getenv("caPutLog_VERSION"):"ifexists"
# Run Channel Access only on 1st network port
putenv "EPICS_CA_AUTO_ADDR_LIST=NO"
putenv getenv("EPICS_CA_ADDR_LIST") ? "" : bootInfo("EPICS_CA_ADDR_LIST=%B")

View File

@@ -1,9 +1,5 @@
# 2nd part of common vxWorks startup
# caPutLog
putenv "EPICS_CA_PUT_LOG_ADDR=gfa-syslog:1515 gfa-logstash.psi.ch:1515"
require "caPutLog", getenv("caPutLog_VERSION")?getenv("caPutLog_VERSION"):"ifexists"
# IOC monitoring
require R3_13?"iocmon":"iocStats", getenv(R3_13?"iocmon_VERSION":"iocStats_VERSION")