How to remove a watch

  1. Use Mouse Right-click on the watched element in the Watches tab.
  2. Click on the option "Remove Watch" in the pop-up menu.

How to add a certificate to the environments

  1. Go to the Application Gateway Details for the current environment.
  2. From the Settings menu, select Listeners.
  3. Select "appGatewayHttpsListener".
  4. To add a new certificate, upload the .pfx file with the name of your choice and password.

How to create the REST API Method

  1. Right-click your REST API and choose Add REST API Method.
  2. Give a name to your REST API method such as GetCustomerData, AddCustomer, UpdatePaymentMethod.
  3. Set the HTTP Method property corresponding to the action your method will perform: GET – Read POST – Create PUT – Update DELETE – Delete
  4. Write the method as an action that fetches or transforms the data you need. Examples: GetCustomerData will return the data of the particular customer such as Customer Name, Customer Address, Customer ID.

Create a database table from an Excel file

  1. Description.
  2. Due Date.
  3. Is Active.

How to open multiple files simultaneously

  1. Use Control and Mouse Left-Click together to add the clicked file to your selection
  2. Use Shift and Mouse Left-Click to select all files between the last file you previously selected and the clicked file
  3. Use Control, Shift and Mouse Left-Click to add to your previous selection all files from the last file you previously selected to the clicked file

Move Controller and Front-end roles to a different server

  1. In .NET stack, open the Services management console and operate on the service Out Systems Deployment Controller Service.
  2. In Java stack, use command service outsystems stop CONTROLLER followed by disabling of the service with ./serviceconfigurator.sh -interactive

Why use a reverse proxy with OutSystems?

  1. Reduce the Load on the Application Servers. Reverse proxies have the ability to compress and cache content, encrypt data (HTTPS), relieving these tasks from the application server.
  2. Increased security and traceability With all the application traffic passing through the reverse proxy, logging, authentication and access control can be configured and managed in a centralized place. It also prevents Internet exposure of application servers, protecting them from vulnerabilities the servers might have in other software or services.
  3. Ensure High Availability Reverse proxies can support high-availability methods. This will allow you to eliminate downtime. In an OutSystems farm scenario, there are multiple application servers. The reverse proxy will then enforce a load balancing technique like round-robin to distribute the load among the servers in the cluster. When a server goes down for maintenance, the system will automatically fail over to the next server in the round-robin sequence keeping the applications available.

Change the Icon of an Action

  1. Action: Name of the action with the following syntax: Action
  2. Target: Indicates which C# member of the assembly will be invoked when this action is called inside your module. The Target syntax is as follows: ( ): Member type is one of: Constructor, Method, Property and Field.
  3. Declaring Type: Full name of the class where the member was defined.
  4. Parameters: Input and output parameters of the action created by the wizard. The Parameter syntax is as follows: ( <- <.NET_data_type>):

Change the Action Properties

  1. Action: Name of the action with the following syntax: Action
  2. Target: Indicates which C# member of the assembly will be invoked when this action is called inside your module. The Target syntax is as follows: ( ): Member type is one of: Constructor, Method, Property and Field.
  3. Declaring Type: Full name of the class where the member was defined.
  4. Parameters: Input and output parameters of the action created by the wizard. The Parameter syntax is as follows: ( <- <.NET_data_type> ):

About the serial number generation

  1. Restarting the deployment controller server hosted on a Virtual Machine.
  2. Changing the physical network devices of that server, changes the environment serial number, making your license invalid.
  3. Promoting a front-end server to deployment controller can also make your license invalid.