You can index resources for their element usages within the selected scope of the Teamwork Cloud repository and later query these usages through the modeling tool. This enables you to evaluate what impact modifying or deleting certain model elements will have on other models that are using it. To enable this functionality, Teamwork Cloud needs to be incorporated with a dedicated search engine - Elasticsearch. This This component makes it possible to index model element usage data and serve it quickly when queried from a modeling tool.
Image Modified
Conceptual solution for the global element usage indexing and search functionality.
Elasticsearch system requirements and installation
To start using the global element usage search functionality, you need to install and set up Elasticsearch (v7 series) as described below.
Installing and setting up Elasticsearch
System requirements
We recommend using NVMe SSD disks for the Elastic search instance.
The -Xmx value should be set to 4GB as a minimum.
The expected indexing speed under recommended hardware settings is roughly 1 revision per second.
The following formula can be used to roughly determine the required disk space per single Indexing Configuration:
Used Project size (element count) x 400 bytes x N x # of Using Projects (specified scope),
where N equals the number of times both using and used elements get changed throughout their history (N tends to range from 4 to 10 as noted from experiments with production data). The formula also assumes that actual element-level reference ratio is 15-20% from all of the elements in a Used Project. E.g. A DB size of 250GBs yields an index size of 60GBs under the above mentioned conditions.
Alternatively, if the certificate subject name does not match the hostname, you can generate the certificate to facilitate the Subject Alternative Name extension:
3. Import the certificate into Java's trusted certificates keystore cacerts.
First, export the X.509 certificate (usually *.crt or *.cer file) from the *.p12 file (for this use tools like OpenSSL or KeyStore Explorer). Then import the certificate file using Java's keytool: