volume i • student guide_toc

24
8/11/2019 Volume I • Student Guide_TOC http://slidepdf.com/reader/full/volume-i-student-guidetoc 1/24 Oracle WebLogic Server 10R3: System Administration Volume I Student Guide D56082GC10 Edition 1.0 March 2009 D58924

Upload: abery-au

Post on 03-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 1/24

Oracle WebLogic Server 10g R3:

System Administration

Volume I • Student Guide

D56082GC10

Edition 1.0

March 2009

D58924

Page 2: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 2/24

Copyright © 2009, Oracle. All rights reserved.

Disclaimer 

This document contains proprietary information and is protected by copyright and

other intellectual property laws. You may copy and print this document solely for your

own use in an Oracle training course. The document may not be modified or altered in

any way. Except where your use constitutes "fair use" under copyright law, you may

not use, share, download, upload, copy, print, display, perform, reproduce, publish,

license, post, transmit, or distribute this document in whole or in part without the

express authorization of Oracle.

The information contained in this document is subject to change without notice. If you

find any problems in the document, please report them in writing to: Oracle University,

500 Oracle Parkway, Redwood Shores, California 94065 USA. This document is not

warranted to be error-free.

Restricted Rights Notice

If this documentation is delivered to the United States Government or anyone using

the documentation on behalf of the United States Government, the following notice is

applicable:

U.S. GOVERNMENT RIGHTS

The U.S. Government’s rights to use, modify, reproduce, release, perform, display, or

disclose these training materials are restricted by the terms of the applicable Oracle

license agreement and/or the applicable U.S. Government contract.

Trademark Notice

Oracle is a registered trademark of Oracle Corporation and/or i ts affiliates. Other

names may be trademarks of their respective owners.

Author

Vishal Parashar 

Technical Contributors

and Reviewers

Ken Cooper 

Steve FriedbergBalamurali Kothandaraman

Robert Lavallie

Thomas Palazzolo

Editors

Vijayalakshmi Narasimhan

Joyce Raftery

Graphic Designer

Priya Saxena

Publishers

Sujatha Nagendra

Joseph Fernandez

Veena Narasimhan

Page 3: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 3/24

Contents

Preface

1 Installing Oracle WebLogic Server Environment

Objectives 1-2

Road Map 1-3

Distributed Systems 1-4

How Standards Help 1-6

The J2EE Standard 1-7

The J2EE Architecture 1-8

Java Servlets 1-9JavaServer Pages (JSPs) 1-10

Enterprise JavaBeans (EJBs) 1-11

Java Database Connectivity (JDBC) 1-12

Java Naming and Directory Interface (JNDI) 1-13

Java Transaction API (JTA) 1-14

Java Message Service (JMS) 1-15

Java Authentication and Authorization 1-16

Java Management Extensions (JMX) 1-17

Client Application 1-18

Web Client 1-19

Proxy Server 1-20

Firewalls 1-21

Web Server 1-22

 Application Servers 1-23

Web Application Server Configuration 1-24

 Application Server Configuration 1-25

Domain 1-26

Why Use Domains 1-28

Domain Restrictions 1-30

Server 1-31

 Administration Server 1-32

Managed Server 1-34

Interaction Between the Administration Server and the Managed Server 1-35

Machine 1-36

Cluster 1-37

iii

Page 4: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 4/24

Cluster Guidelines 1-39

Node Manager 1-40

Road Map 1-43

Oracle WebLogic Server Installation 1-44

GUI Mode Installation 1-46

Choosing an Installation Type and Products 1-47

Choosing the JDK and Product Directory 1-48

Installation and Summary 1-49

Console and Silent Mode Installations 1-51

Postinstallation: Oracle Home 1-52

Oracle WebLogic Server Directory Structure 1-53

Samples Directory Structure 1-55

Setting Environment Variables 1-56

Quiz 1-57

Summary 1-65

2 Configuring Oracle WebLogic Server Environment

Objectives 2-2

Road Map 2-3

Domain Overview 2-4

Domain Diagram 2-6

Configuring a Domain 2-7

Starting the Domain Configuration Wizard 2-8

Flow Chart to Create a Domain Using the Domain Configuration Wizard 2-9

Creating a New WebLogic Domain and Selecting the Domain Source 2-10Configuring Administrator Settings, Start Mode, and JDK 2-11

Customizing the Environment and RDBMS Security Store 2-12

Configuring the Administration and Managed Servers 2-14

Configuring Clusters and Assigning Servers to Clusters 2-15

Creating an HTTP Proxy Application and Configuring Machines 2-17

 Assigning Servers to Machines and Configuring JDBC Data Sources 2-19

Configuring JDBC Data Sources 2-20

Testing Data Source Connections and Running Database Scripts 2-23

Configuring the JMS File Store and Reviewing the WebLogic Domain 2-25

Creating the WebLogic Domain 2-27

Domain Directory Structure 2-28

JVM Run-Time Arguments 2-30

Oracle WebLogic Server Dependencies 2-31

Configuring CLASSPATH  2-32

Starting Oracle WebLogic Administration Server 2-34

iv

Page 5: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 5/24

Page 6: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 6/24

Configuration Change Management 2-86

Console Change Center 2-87 

Domain Configuration Repository 2-88 

Configuration Change Process 2-89

Predictable Distribution of Domain Configuration Changes 2-90

Configuration Management Architecture 2-91

WebLogic Scripting Tool (WLST) 2-93

Jython 2-94

Using Jython 2-95

WLST Modes 2-96

WLST Example 2-97

WLST Command Requirements 2-98

Running WLST Scripts 2-99

Importing WLST as a Jython Module 2-100

General WLST Commands 2-101 Offline WLST Commands 2-102 

Creating a Domain: Example 2-103 

Online WLST Commands 2-104 

WebLogic JMX: Overview 2-105 

Navigating JMX MBeans 2-106 

Creating a Server: Example 2-103 

Generating a WLST Script 2-108

Quiz 2-109

Summary 2-127

3 Managing and Monitoring the Oracle WebLogic Server Environment

Objectives 3-2

Road Map 3-3

Node Manager 3-4

What Node Manager Can Do 3-5

Node Manager Architecture 3-7

How Node Manager Starts an Administration Server 3-8

How Node Manager Starts a Managed Server 3-9

How Node Manager Restarts an Administration Server 3-10

How Node Manager Restarts a Managed Server 3-11

How Node Manager Shuts Down a Server Instance 3-12

Versions of Node Manager 3-13

Node Manager Configuration 3-15

Node Manager Default Behaviors 3-16

Configuring Java-Based Node Manager 3-17

Starting Node Manager at System Startup 3-19

vi

Page 7: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 7/24

Configuring Node Manager as a Windows Service 3-20

Daemonizing Node Manager for UNIX Systems 3-21

Starting Oracle WebLogic Server at Boot 3-23

Oracle WebLogic Server as a Windows Service 3-24

Setting up Windows Service 3-25

Oracle WebLogic Server as a Unix Daemon 3-27

Oracle WebLogic Server at Boot 3-28

Example rc Scripts 3-29

Configuring Java-Based Node Manager Security 3-31

 Administration Console Node Manager Security 3-33

Remote Server Start Security for the Java-Based Node Manager 3-34

Reviewing nodemanager.properties  3-35

Configuring Node Manager on Multiple Machines 3-37

Configuring Script-Based Node Manager 3-39

Creating a Node Manager User 3-40Configuring Script-Based Node Manager Security 3-41

 Additional Configuration Information 3-43

Configuring a Machine to Use Node Manager 3-44

Configuring the nodemanager.domains File 3-45

Configuring Remote Startup Arguments 3-46

Ensuring that the Administration Server Address Is Defined 3-48

Setting Node Manager Environment Variables 3-49

Node Manager Configuration and Log Files 3-50

Road Map 3-53

Oracle WebLogic Server Logs 3-54

Server and Domain Logs 3-56 

Configuring Server Logging 3-57 

Viewing Logs with the Console 3-59 

Message Attributes 3-60 

Message Severity 3-61 

Message Catalog 3-62 

Log Filters 3-64

Creating a Log Filter 3-65

 Applying a Log Filter 3-66 

Console Monitoring 3-67 

Monitoring All Servers 3-68 

Customizing the View for All Servers 3-70 

Monitoring Individual Servers 3-71

Road Map 3-72

Network Addressing Features 3-73

vii

Page 8: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 8/24

Network Channels 3-75

Configuring Network Channels 3-76

Using Channels: Example 1 3-77

Using Channels: Example 2 3-78

 Administration Port 3-79

Overriding the Administration Port 3-83

Quiz 3-84

Summary 3-87

4 Basic Deployment

Objectives 4-2

Road Map 4-3

The Role of Web Servers 4-4

 A Typical Web Interaction 4-5

MIME Types 4-7HTTP Status Codes 4-8

Static Content 4-9

Dynamic Content 4-10

Road Map 4-11

Java EE Web Applications 4-12

Packaging Web Applications 4-14

Web Application Structure 4-15

Configuring Web Applications 4-18

web.xml  4-20

weblogic.xml  4-21

The weblogic.xml Deployment Descriptor 4-22

Web Application Archive 4-23

URLs and Web Applications 4-25

Web Service Applications 4-26

Virtual Directory Mappings 4-27

Virtual Directory Mapping: Example 4-28

 Archive Versus Expanded Directory 4-29

Road Map 4-30

EJB Applications 4-31

Types of EJBs 4-32

weblogic-ejb-jar.xml  4-35

EJB Administrator Tasks with WLS 4-36

Road Map 4-37

What Is an Enterprise Application? 4-38

 A Typical Java EE System 4-39

viii

Page 9: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 9/24

J2EE Enterprise Application 4-40

Java EE Enterprise Applications 4-41

Why Enterprise Applications? 4-42

Enterprise Application Structure 4-43

weblogic-application.xml  4-44

Configuring WLS-Specific Features 4-45

WLS Application Classloader 4-46

EAR Class Libraries 4-47

J2EE Library Support 4-48

WebLogic Shared Java EE Libraries 4-49

Shared Library References 4-50

Road Map 4-51

Deployment Process: Overview 4-52

Deployment Methods 4-53

Deployment Tools 4-54 Auto-Deployment – Copying Files 4-55

 Auto-Deployment 4-56

FastSwap and On-Demand Deployment 4-57

Development Versus Production Modes 4-59

Production Mode Flag 4-60

Console Deployment Method 4-61

Preparing a New Application 4-63 

Deploying or Undeploying Applications 4-65 

Redeploying an Application 4-66

Console Deployment 4-67Editing Deployment Descriptors 4-69

Monitoring an Application 4-70

 Application Testing 4-71

 Application Update and Delete 4-72

Command-Line Deployment 4-75

Deployment with weblogic.Deployer  4-76

weblogic.Deployer: Examples 4-77

Deploying Applications with WLST 4-78

Deploying an Application with WLST 4-79

Deployment with WLST 4-80

Quiz 4-81

Summary 4-84

ix

Page 10: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 10/24

5 Understanding JNDI

Objectives 5-2

Road Map 5-3

What Is JNDI? 5-4

Why JNDI? 5-5

JNDI Structure 5-6

Naming Service 5-7

JNDI Tree 5-8

Contexts and Subcontexts 5-10

JNDI for Administrators 5-11

Viewing the JNDI Tree 5-12

Listing the JNDI Contents 5-13

Summary 5-14

6 Setting Up JDBCObjectives 6-2

Road Map 6-3

What Is JDBC? 6-4

JDBC Review 6-5

JDBC Data Sources 6-6

Data Source Scope 6-7

Two-Tier Architecture 6-8

Multi-Tier Architecture 6-9

JDBC Architecture 6-10

Type 1 Driver 6-11Type 2 Driver 6-12

Type 3 Drivers 6-13

Type 4 Drivers 6-15

WebLogic JDBC Drivers 6-16

Choosing the Correct Driver 6-18

Road Map 6-19

What Is a Data Source? 6-20

What Is a Connection Pool? 6-21

Benefits of Data Sources and Connection Pools 6-22

JDBC Data Source Architecture 6-23

Modular Configuration and Deployment of JDBC Resources 6-24

How Data Sources Are Used 6-25

Creating a Data Source 6-26

Connection Pool Configuration 6-28

Targeting a Data Source 6-29

Viewing the Server JNDI Tree 6-30

x

Page 11: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 11/24

Demonstration 6-31

Connection Pool Checklist 6-32

JDBC URLs 6-33

JDBC URL Examples 6-34

Connection Properties 6-35

Multi Data Sources 6-37

Road Map 6-39

Monitoring and Testing a Data Source 6-40

Quiz 6-41

Summary 6-44

7 Setting Up Java Message Service (JMS) Applications

Objectives 7-2

Road Map 7-3

Message-Oriented Middleware 7-4Point-to-Point Queue 7-5

Publish-Subscribe Topics 7-6

Oracle WebLogic Server JMS Features 7-7

JMS Architecture: Connecting 7-9

JMS Architecture: Sending Messages 7-10

Transacted Messaging 7-11

 Administrative Tasks 7-12

Oracle WLS JMS Server 7-13

Creating a JMS Server 7-14

Targeting a JMS Server 7-15Configuring a JMS Server 7-16

JMS Resources 7-17

Modular JMS Resource Configuration and Deployment 7-19

Connection Factories 7-21

Creating a Connection Factory 7-23

Configuring a Connection Factory 7-24

Destination 7-25

Queue Destinations 7-26

Topic Destinations 7-27

Creating a Destination 7-28

Creating a Queue Destination 7-30

Threshold and Quota 7-32

Configuring Thresholds and Quotas 7-33

Road Map 7-34

Durable Subscribers and Subscriptions 7-35

When to Use Persistent Messaging 7-36

xi

Page 12: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 12/24

How a Durable Subscription Works 7-37

Configuring a Durable Subscription 7-38

Persistent Messaging 7-39

Creating a JMS Store 7-40

Creating a JMS JDBC Store 7-41

 Assigning a Store to a JMS Server 7-43

Persistent Connection Factory 7-44

Configuring a Persistent Destination 7-45

Road Map 7-46

Statistics for JMS Objects 7-47

Monitoring JMS Servers 7-48

Monitoring and Managing Destinations 7-49 

Quiz 7-50

Summary 7-52

8 Managing Transactions

Objectives 8-2

Road Map 8-3

What Is a Transaction? 8-4

 ACID Properties of a Transaction 8-5

Transaction Management 8-6

Transferring Without Transactions 8-7

Successful Transfer with Transactions 8-8

Unsuccessful Transfer with Transactions 8-9

Types of Transactions 8-10The Two-Phase Commit Protocol 8-12

Extended Architecture Protocol 8-13

Transaction and Resource Managers 8-14

Successful Two-Phase Commit 8-16

Unsuccessful Two-Phase Commit 8-17

Java Transaction API (JTA) 8-18

Configuring Transactions 8-19

Configuring the Transaction Log 8-20

JTA Configuration Options 8-23

Creating XA Resources 8-27

Creating Non-XA Resources 8-28

Logging Last Resource 8-30

Transacted Messaging 8-31

Inter-Domain Transactions 8-32

Enabling Trust Among Different Domains 8-34

Monitoring Transactions 8-35

xii

Page 13: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 13/24

Monitoring Transactions by Resource 8-37

Viewing Transaction Statistics for XA Resources 8-38

Summary 8-40

9 Securing WLS Resources and Applications

Objectives 9-2

Road Map 9-3

 Architecture Goals 9-4

Security Architecture 9-5

Process Architecture 9-6

Security Services 9-7

 Authentication Providers 9-8

 Authorization Providers 9-10

Confidentiality 9-12

Credential Mapping 9-13 Auditing 9-14

Road Map 9-15

Security Realms 9-16

What Is LDAP? 9-17

Embedded LDAP Server 9-18

Configuring Embedded LDAP 9-19

Connecting Using an External LDAP Browser 9-21

Users and Groups 9-22

Configuring New Users 9-23

Groups 9-24Configuring New Groups 9-25

 Adding Groups to Users 9-26

Roles 9-27

Configuring New Roles 9-29

Migrating Security Data 9-30

Exporting the WLS Default Authenticator Provider 9-31

Importing into a Different Domain 9-32

Demonstration 9-33

Road Map 9-34

J2EE Declarative Security 9-35

Using Deployment Descriptors 9-36

Protecting Web Applications 9-37

Defining Security Roles 9-38

Determining Protected Resources 9-39

Mapping Roles to Resources 9-40

Mapping Roles to Users in Realms 9-42

xiii

Page 14: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 14/24

Setup Authentication 9-43

 Authentication Examples 9-44

Policies and Roles 9-45

Defining Policies and Roles for Web Resources 9-47

Defining Policies and Roles for Other Resources 9-48

Road Map 9-50

What Is SSL? 9-51

Trust and Identity 9-52

Using an SSL Connection 9-53

Enabling Secure Communication 9-55

Oracle WebLogic Server SSL Requirements 9-57

keytool Utility 9-58

Obtaining a Digital Certificate: keytool Examples 9-59

Configuring SSL for an Oracle WebLogic Server 9-61

Configuring Keystores 9-62Road Map 9-63

Protecting Against Attacks 9-64

Man-in-the-Middle Attacks 9-65

Man-in-the-Middle Countermeasures 9-66

Configuring Hostname Verifier 9-68

Denial of Service Attacks 9-69

DoS Countermeasures 9-70

Filtering Network Connections 9-71

Connection Filter 9-72

Consuming WLS Resources 9-73

Large Buffer Attacks 9-74

Connection Starvation 9-76

User Lockout 9-78

Configuring User Lockout 9-79

Unlocking Users 9-80

Protecting the Administration Console 9-81

Summary 9-83

10 Advanced Deployment

Objectives 10-2

Road Map 10-3

What Is a Deployment Plan? 10-4

Deployment Plans 10-5

Deployment Plan: Advantages 10-6

Configuring an Application for Multiple Deployment Environments 10-7

Sample Deployment Plan 10-9

xiv

Page 15: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 15/24

Creating a Deployment Plan 10-10

Creating a New Deployment Plan 10-12

weblogic.PlanGenerator  10-13

Using the Administration Console to Generate a Deployment Plan 10-14

Using an Existing Deployment Plan to Configure an Application 10-15

Using an Existing Deployment Plan 10-17

Generic File Loading Overrides 10-18

Directory Structure for Easier Production Deployment 10-19

Sanity Checking in Production Without Disruption to Clients 10-21

Road Map 10-22

Staged Deployment 10-23

Road Map 10-24

Production Redeployment 10-25

 Application Availability 10-27

WebLogic Production Redeployment 10-28Production Redeployment 10-29

 Advantages of Production Redeployment 10-31

Requirements and Restrictions for Production Redeployment 10-32

Redeploying a New Application Version 10-34

Redeploying Versus Distributing 10-35

Distributing a New Version of the Production Application 10-36

Distributing a New Application Version 10-38

Production Redeployment 10-39

Quiz 10-41

Summary 10-44

11 Introduction to Clustering

Objectives 11-2

Road Map 11-3

Definition: Clustering 11-4

What Is a Cluster? 11-5

Benefits of Clustering 11-7

Key Capabilities 11-9

Cluster Architecture 11-11

Deciding on a Cluster Architecture 11-12

Basic Cluster Architecture 11-13

Multitier Cluster Architecture 11-15

Basic Cluster Architecture: Advantages and Disadvantages 11-16

Multitier Advantages and Disadvantages 11-18

Proxy Servers 11-20

Basic Cluster Proxy Architecture 11-21

xv

Page 16: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 16/24

Multitier Cluster Proxy Architecture 11-22

WLS HttpClusterServlet  11-23

WLS Plug-Ins 11-24

Proxy Plug-In Versus Load Balancer 11-27

 Architecture Recommendations 11-28

Road Map 11-29

Cluster in Networks 11-30

Local Area Networks 11-31

Metropolitan Area Networks 11-32

Wide Area Networks 11-33

Road Map 11-34

Server Communication in a Cluster 11-35

Cluster Communication 11-37

Detecting a Failure 11-39

One-to-Many Communications 11-40Peer-to-Peer Communications 11-42

Multitier Communications 11-43

Communication in a WAN 11-44

Summary 11-45

12 Configuring a Cluster

Objectives 12-2

Road Map 12-3

Preparing Your Environment 12-4

Cluster Architecture 12-5Network and Security Topology 12-6

Security Options for Cluster Architectures 12-8

Hardware 12-9

Clustering on One Piece of Hardware 12-10

Names and Addresses 12-11

Cluster Address 12-12

Road Map 12-13

Configuration Options 12-14

Creating a Cluster 12-15

 Adding Cluster Members: Option 1 12-16

 Adding Cluster Members: Option 2 12-17

Creating a Cluster by Using the Administration Console 12-18

Configuring Cluster Communication 12-21

 Adding Servers 12-22

Creating a Cluster with the Configuration Wizard 12-24

Clusters and the Configuration Wizard 12-25

xvi

Page 17: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 17/24

Using the Cluster MBean 12-26

Clusters and WLST 12-27

Starting Servers in a Cluster 12-28

Road Map 12-30

High Availability for HTTP Clients 12-31

WebLogic Proxy Servers 12-33

Creating the WebLogic Proxy Server with the Configuration Wizard 12-34

Creating the WebLogic Proxy Server Manually 12-35

Configuring HttpClusterServlet 12-36

Specifying Initial Parameters 12-37

Servlet Mapping 12-38

HttpClusterServlet Initialization Parameters 12-39

Web Server Plug-Ins 12-41

Installing the Apache Plug-In 12-42

Configuring the Apache Plug-In 12-43General Plug-In Parameters 12-48

 Apache Plug-In and SSL 12-49

Configuring Apache Plug-In SSL 12-50

Quiz 12-51

Summary 12-54

13 Managing Clusters

Objectives 13-2

Road Map 13-3

Packaging Applications 13-4

Two-Phase Deployment 13-5

Deploying Applications to a Cluster 13-6

Production Redeployment in a Cluster 13-7

Deploying Applications to a Cluster 13-8 

Road Map 13-11

HTTP Session Failover 13-12

HTTP Session State Replication 13-13

Machines 13-14

Replication Groups 13-15

Configuring Replication Groups 13-17

Secondary Ranking 13-18

In-Memory Replication 13-19

In-Memory Replication and Proxy Servers 13-20

In-Memory Replication: Example 13-21

In-Memory Replication 13-22

Failover with Load balancer 13-24

xvii

Page 18: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 18/24

Requirements for In-Memory Replication 13-25

Configuring In-Memory Replication 13-26

JDBC Replication 13-28

Persistent JDBC Replication 13-29

Configuring JDBC Replication 13-30

JDBC Persistent Table Configuration 13-31

File Replication 13-33

File Persistence 13-34

Configuring File Replication 13-35

Cross-Cluster Replication 13-37

MAN and WAN Replication 13-38

Configuring Cross-Cluster Replication 13-39

State Management Best Practices 13-40

Road Map 13-41

Server Version 13-42Multicast 13-43

Test Multicast: Example 13-44

CLASSPATH  13-46

Garbage Collection 13-47

Quiz 13-48

Summary 13-51

14 Clustering EJB Objects

Objectives 14-2

Road Map 14-3Oracle WebLogic Server EJB Clustering Capabilities 14-4

High Availability for EJBs 14-5

Levels of Clustering for EJB 14-7

Load-Balancing Clustered EJB Objects 14-8

Road Map 14-10

Stateless Session Bean: Load Balancing and Failover 14-11

Configuring EJB Clustering 14-12

Configuring Clusterable Stateless Session EJBs 14-14

Configuring Stateless Session Clusterable EJBs 14-15

Stateful Session Beans 14-16

Configuring Clusterable Stateful Session EJBs 14-17

Road Map 14-18

Read-Write Versus Read-Only 14-19

Entity Bean Cluster-Aware Home Stubs 14-20

EJB Best Practices 14-21

Summary 14-22

xviii

Page 19: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 19/24

 

15 Clustering Services

Objectives 15-2

Road Map 15-3

Services That Can Be Clustered 15-4

Service Failover 15-6

Service-Level Migration 15-7

Server-Level Migration 15-9

Road Map 15-10

JNDI Clustering Support 15-11

Clusterwide JNDI Service 15-13

JNDI Naming Conflicts 15-14

Road Map 15-15

JDBC Clustering 15-16

Clustering Versus Multi Data Sources 15-17Targeting a DataSource to a Cluster 15-18

Road Map 15-20

Transaction Recovery After Failure 15-21

Transaction Recovery Service 15-22

Recovering JTA Without a Cluster 15-24

Recovering Transactions in a Cluster 15-25

Recovering Transactions for a Failed Clustered Server (Manually) 15-26

Migrating JTA 15-28

Configuring JTA Service Migration 15-29

Manually Migrating the JTA to Another Server in a Cluster 15-30Configuring Automatic Migration of the JTA Transaction 15-31

Configuring Automatic Migration of the JTA Transaction 15-33

 Automatic Failback of the Transaction Recovery Service Back

to the Original Server 15-34

JTA Migration Limitations 15-35

Road Map 15-37

JMS Clustering Support 15-38

JMS Connection Factory Clustering 15-39

Distributed Destination 15-41

Distributed Queues 15-42

Distributed Topics 15-43

Creating a Distributed Topic 15-44

Distributed Destination Threshold and Quota 15-47

Server Affinity 15-48

Zero Consumers 15-49

Load Balancing 15-51

xix

Page 20: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 20/24

Location Transparency 15-52

Failover 15-53

JMS Server Migration 15-54

Performing Migration 15-55

JMS Migratable Targets 15-56

Migrating JMS Data 15-58

Migration Configuration 15-59

Configuring a Migratable Target 15-60

Targeting JMS Server to a Migratable Target 15-61

Migrating Services 15-62

Summary 15-63

Appendix A: Practices and Solutions

Appendix B: Virtual HostObjectives B-2

Understanding Virtual Hosts B-3

The Big Picture of Virtual Hosting B-4

Configuring Virtual Hosts B-5

Creating Virtual Hosts B-6

Targeting Virtual Hosts to Servers B-7

Targeting Applications to a Virtual Host B-8

Configuring Virtual Host Logging B-9

Summary B-10

Appendix C: Getting Started with BEA Guardian

Road Map C-3

Guardian Architecture C-4

Road Map C-5

Installation C-6

Guardian Workspace C-7

Updating Guardian C-8

Deploying the Agent C-9

Road Map C-10

 Activate a Domain C-11

Explorer Views C-12

Domain Inventory C-14

Evaluation Summary C-15

Comparing Evaluations C-17

Submitting Support Case C-18

Guardian Security C-21

xx

Page 21: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 21/24

Using a Proxy Server C-23

Guardian from the Command Line C-24

Summary C-25

Index

xxi

Page 22: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 22/24

 

Page 23: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 23/24

Page 24: Volume I • Student Guide_TOC

8/11/2019 Volume I • Student Guide_TOC

http://slidepdf.com/reader/full/volume-i-student-guidetoc 24/24