Wa8551 Va8551stud
Wa8551 Va8551stud
Wa8551 Va8551stud
cover
Front cover
WebSphere Application
Server V8.5.5 Administration
Student Notebook
ERC 1.0
WebSphere Education
Student Notebook
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide.
The following are trademarks of International Business Machines Corporation, registered in
many jurisdictions worldwide:
AFS® AIX® CICS®
CloudBurst® DataPower® DB™
DB2® developerWorks® Express®
HACMP™ IMS™ Lotus®
MVS™ Notes® OS/400®
Passport Advantage® Power® RACF®
Rational® RDN® Redbooks®
Tivoli® U® WebSphere®
z/OS® zSeries®
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Intel and Intel Core are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows Vista are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
VMware and the VMware “boxes” logo and design, Virtual SMP and VMotion are registered
trademarks or trademarks (the “Marks”) of VMware, Inc. in the United States and/or other
jurisdictions.
Other product and service names might be trademarks of IBM or other companies.
TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi
viii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xiv WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xvi WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xviii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xxii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xxiv WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
xxvi WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide.
The following are trademarks of International Business Machines Corporation, registered in
many jurisdictions worldwide:
AFS® AIX® CICS®
CloudBurst® DataPower® DB™
DB2® developerWorks® Express®
HACMP™ IMS™ Lotus®
MVS™ Notes® OS/400®
Passport Advantage® Power® RACF®
Rational® RDN® Redbooks®
Tivoli® U® WebSphere®
z/OS® zSeries®
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Intel and Intel Core are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows Vista are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of
Oracle and/or its affiliates.
VMware and the VMware “boxes” logo and design, Virtual SMP and VMotion are registered
trademarks or trademarks (the “Marks”) of VMware, Inc. in the United States and/or other
jurisdictions.
Other product and service names might be trademarks of IBM or other companies.
xxviii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Duration: 5 days
Purpose
This 5-day instructor-led course teaches you the skills that are needed
to install and administer IBM WebSphere Application Server V8.5.5.
This release offers users enhanced support for standards, emerging
technology, and a choice of development frameworks.
In this course, you learn how to install, configure, and maintain IBM
WebSphere Application Server V8.5.5 Base, Network Deployment
(ND), and the Liberty profile. You learn how to deploy enterprise Java
applications in a single computer or clustered configuration. In
addition, you learn how to work with features of WebSphere
Application Server V8.5.5, such as IBM Installation Manager,
WebSphere Customization Toolbox, security enhancements,
Intelligent Management, and centralized installation.
Throughout the course, hands-on exercises and demonstrations
reinforce lecture content and give you practical experience with
WebSphere Application Server V8.5.5. You complete tasks such as
installing and assembling applications, applying problem
determination techniques, configuring a clustered environment, and
working with fine-grained administrative security.
Audience
This course is designed for administrators who install, configure, and
manage web-based applications on WebSphere Application Server.
Web administrators, lead application developers, and application
architects can also benefit from this course.
Prerequisites
Before taking this course, you should have:
• An understanding of basic Internet concepts
• Experience in using a web browser
• Administrative skills for a web server, such as IBM HTTP Server or
Apache
Objectives
After completing this course, you should be able to:
• Relate WebSphere Application Server to the WebSphere family of
products
• Describe the features and standards in WebSphere Application
Server V8.5.5
• Describe the architectural concepts that are related to WebSphere
Application Server
• Install and configure WebSphere Application Server V8.5.5
• Install and configure IBM HTTP Server
• Assemble and install server-side Java enterprise applications
• Use WebSphere administrative tools to configure and manage
enterprise applications
• Use wsadmin scripting
• Configure WebSphere Application Server security
• Deploy applications in clustered environments
• View performance information about server and application
components
• Use problem determination tools and log files to troubleshoot
problems
• Configure messaging with the service integration bus
• Describe Intelligent Management features
• Describe WebSphere Batch features
• Describe the Liberty profile
• Install and configure the Liberty profile
Curriculum relationship
• WA380 (Windows), WA580 (Linux), WA180 (AIX)
• WA585
xxx WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
pref Agenda
Day 1
Course introduction
Unit 1: WebSphere product family overview
Unit 2: WebSphere Application Server architecture – stand-alone
Unit 3: WebSphere Application Server architecture – federated
Unit 4: IBM Installation Manager
Unit 5: WebSphere Application Server installation
Unit 6: Web server installation
Exercise 1: Installing IBM Installation Manager
Exercise 2: Installing WebSphere Application Server
Exercise 3: Installing IBM HTTP Server
Day 2
Unit 7: WebSphere Application Server administrative console
Exercise 4: Exploring the administrative console
Unit 8: Introduction to the PlantsByWebSphere application
Unit 9: Application assembly
Exercise 5: Assembling an application
Unit 10: Application installation
Exercise 6: Installing an application
Unit 11: Problem determination
Exercise 7: Problem determination
Day 3
Unit 12: Introduction to wsadmin and scripting
Exercise 8: Using wsadmin
Unit 13: Federating a cell
Exercise 9: Creating a federated cell
Unit 14: Workload management
Exercise 10: Clustering and workload management
Day 4
Unit 15: Introduction to WebSphere Messaging
Exercise 11: Configuring the service integration bus
Unit 16: Job manager and centralized installation manager
Demonstration: Using the job manager
Unit 17: Overview of Intelligent Management
Unit 18: WebSphere security
Exercise 12: Configuring WebSphere security
Exercise 13: Configuring application security
Day 5
Exercise 14: Configuring SSL for WebSphere
Unit 19: Overview of the Liberty profile
Exercise 15: Working with the Liberty profile
Unit 20: Performance monitoring
Exercise 16: Using the performance monitoring tools
Unit 21: WebSphere Batch
Unit 22: Course summary
xxxii WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe the WebSphere family of products
• Describe the relationships between various products in the WebSphere
family
• Describe the WebSphere Application Server V8.5.5 offerings
• Describe the standards that are supported in this release
Notes:
1-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Platform and packaging
• Related WebSphere products
Notes:
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
1-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• WebSphere • IBM
Process Server WebSphere
• IBM Integration Portal
Designer • IBM Web
• WebSphere Experience
Business
DataPower SOA Factory
portals
Appliances • IBM Mashup
• WebSphere MQ Center
Business
• WebSphere
integration
Message Broker
• WebSphere
Foundation and tools
Enterprise
Service Bus
Notes:
The WebSphere software platform consists of multiple products. These products can be
grouped into three categories:
• Foundation and tools
• Business integration
• Business portals
As shown in the graphic, the three categories build upon each other in the order listed.
WebSphere Application Server is the base product for all others that are listed in this slide.
Rational Application Developer is the primary Java development tool for all these products.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
WebSphere eXtreme
Fit for purpose
Scale WebSphere Application Server
foundation and V8.5.5 foundation
distributed
caching Liberty profile
DataPower XC10 Intelligent Management
WebSphere Batch
IBM JVM
© Copyright IBM Corporation 2013
Figure 1-5. WebSphere application infrastructure: The big picture WA855 / VA8551.0
Notes:
WebSphere Application Server Version 8.5.5 delivers the core foundational requirements
for the rest of the WebSphere Application Server portfolio of products. Built upon the IBM
Java Virtual Machine (JVM), the Application Server provides the foundation for the
WebSphere portfolio, including IBM Workload Deployer, WebSphere eXtreme Scale, and
the DataPower XC10 Appliance.
1-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The WebSphere Application Server family for Version 8.5.5 continues to provide offerings
to fit your needs, which might range from lightweight developer desktop environments to
highly complex and highly available enterprise environments. As more qualities of service
are required in your environment, the WebSphere Application Server family of offerings
continues to meet those requirements on a common code base.
This chart shows each of the different versions of WebSphere Application Server and how
they relate to one another regarding customer needs and capabilities.
WebSphere Application Server Express features reduced acquisition cost and enables fast
deployment of a single application server. The difference between this package and the
WebSphere Application Server “Base” edition is the license. Both editions are virtually the
same, but “Base” includes a license for unlimited processors. Express is limited to two
processors. Both Express and Base editions can support a stand-alone deployment.
WebSphere Application Network Deployment includes all the capabilities of the Base
edition, but also supports high transaction volume, scalability, clustering, high availability,
and failover.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
WebSphere Application Server for z/OS includes all the features of Network Deployment
for the z/OS platform.
WebSphere Application Server for Developers is a no-charge WebSphere Application
Server development runtime for projects that do not warrant the expense of a priced and
supported runtime on the developer desktop. The development runtime environment allows
developers to test their applications on their desktop before moving the application into a
production runtime environment.
New in version 8.5.5 is WebSphere Application Server Liberty Core. Liberty Core is a highly
composable, fast to start, and ultra lightweight profile of the application server that is
optimized for developer productivity and web application deployment.
Each of these editions is described in more detail on the following slides.
1-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Scalability, clustering,
high availability,
central administration
License
Notes:
The image compares the basic differences in packaging between the WebSphere
Application Server Express, Base, and Network Deployment editions. All three packages
include the WebSphere common base code. The major difference between Express and
Base is the license. Express has a limited license for two processors; Base has a license
for unlimited processors. The Network Deployment product adds support for scalability,
clustering, high availability, and central administration.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This chart summarizes the WebSphere Application Server V8.5.5 Express, Base, and
Network Deployment packages for production use, and provides a side-by-side
comparison of some of the important features. Detailed comparison information for the
versions can be found at:
http://www.ibm.com/software/webservers/appserv/wasfamily/compare.html
All three versions include the core application server, IBM HTTP Server, web server
plug-ins, application client, and Data Direct JDBC drivers.
The Express and Base packages provide for deployment of a stand-alone node. In addition
to a stand-alone node, the Network Deployment edition supports a managed or clustered
multi-node environment with a central point of administration.
The Express edition includes Rational Web Developer. The Base and Network Deployment
packages include a trial version of Rational Application Developer. Rational Application
Developer is available in the WebSphere Application Server disk package with two
licenses. The license for assembly and deployment capabilities does not expire. The
1-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty license for development and other capabilities is available on a trial basis and is available
only for a limited time.
In addition, the Network Deployment edition also includes the Edge Components, IBM
Tivoli Directory Server, and Tivoli Access Manager Server.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This chart summarizes the WebSphere Application Server V8.5.5 Express, Base, and
Network Deployment packages for production use, and provides a side-by-side
comparison of some of the important features.
All three versions include the core application server, IBM HTTP Server, web server
plug-ins, application client, and Data Direct JDBC drivers.
The Express and Base packages provide for deployment of a stand-alone node. In addition
to a stand-alone node, the Network Deployment edition supports a managed or clustered
multi-node environment with a central point of administration.
The Express edition includes Rational Web Developer. The Base and Network Deployment
packages include a trial version of Rational Application Developer. Rational Application
Developer is available in the WebSphere Application Server disk package with two
licenses. The license for assembly and deployment capabilities does not expire. The
license for development and other capabilities is available on a trial basis and is available
only for a limited time.
1-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty In addition, the Network Deployment edition also includes the Edge Components, IBM
Tivoli Directory Server, and Tivoli Access Manager Server.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This chart lists some of the specifications and APIs supported in WebSphere Application
Server V8.5.5. For a more exhaustive list of supported specifications and APIs, refer to the
WebSphere information center.
1-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
WebSphere family
products
Notes:
1-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Available at:
http://www.ibm.com/developerworks/downloads/ws/
wasdevelopers/index.html
Notes:
WebSphere Application Server Version 8.5.5 delivers a no-charge offering to enable quick
and easy developer access to the application server that is built on the same code base as
the other WebSphere Application Server offerings.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Operating system
Notes:
Open Virtualization Format (OVF) specifies an open, secure, portable, and flexible format
for the packaging and distribution of virtual machines.
Previously, when customers wanted to use WebSphere Application Server in a
virtualization context, they were forced to build and own these images, which involved
managing two parallel code paths (operating system and middleware). Now, IBM is building
and supporting the entire virtual image.
A virtual machine or virtual image is a complete system platform that contains an operating
system on which you can install any number of customized applications to create a
complete virtual system. A virtual image requires less time and labor to set up because the
operating system and applications are already installed and configured or partially
configured. Virtual images are run on a hypervisor, which is the virtualization technology
that manages the state of virtual images. A hypervisor product can run on top of a host
operating system, or the hypervisor can run as the operating system itself, such as VMware
ESX. Some hypervisors also handle load balancing and failover.
1-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty By deploying virtual images on VMware and other virtualization technologies, you can
consolidate servers and streamline your environments.
WebSphere Application Server Hypervisor Edition Version 8.5.5 can function either as a
stand-alone server or with IBM Workload Deployer. Workload Deployer as a hardware
appliance that provides access to software virtual images and patterns.
The virtual image can be used as a demonstration, a development system, or a simple
quality assurance system. A single virtual image can also be a single production system for
a small department.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Worklight takes WebSphere Application Server mobile web applications to the next level.
With WebSphere Application Server V8.5.5, the Web 2.0 and Mobile Feature Pack is part
of WebSphere Application Server. WebSphere developers can build and deploy reliable
mobile web applications by using standards web technologies, such as HTML 5, CSS3,
and JavaScript. Resulting applications are available on various mobile platforms by using
the web browser of the device. Supported platforms are iPhone OS, Android, and
BlackBerry. User experience is close to each mobile operating system, and supports usual
touch interactions.
Worklight extends those applications to make them deployable as hybrid or native
applications. Other functions include access to local resources and native functions (such
as camera or GPS). Installation is done through app stores.
1-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
LA London
Notes:
Applications and organizations can evolve as business needs and requirements change,
which can require more scalability or the use of some of the other advanced features that
eXtreme Scale provides.
What is IBM WebSphere eXtreme Scale? IBM WebSphere eXtreme Scale is a flexible
framework for realizing high-performance, scalable, and data-intensive applications. It is a
single map addressable space of virtualized JVM heap spaces. The first use of WebSphere
eXtreme Scale is a power cache for your applications. WebSphere eXtreme Scale can
move that collection of application caches into a grid that is highly available, elastic, and
self-healing. The second use of WebSphere eXtreme Scale is a form of in-memory
database. The third use of WebSphere eXtreme Scale is a form of redundancy across data
centers.
WebSphere eXtreme Scale dynamically caches, partitions, replicates, and manages
application data and business logic across multiple servers. WebSphere eXtreme Scale
does massive volumes of transaction processing with high efficiency and linear scalability,
and provides qualities of service such as transactional integrity, high availability, and
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
predictable response times. WebSphere eXtreme Scale can be used in different ways. It
can be used as a powerful cache, as a form of an in-memory database processing space to
manage application state, or as a platform for building powerful extreme transaction
processing (XTP) applications.
Some editions of WebSphere Application Server come with an entitlement to use
WebSphere eXtreme Scale.
1-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Several WebSphere Application Server V8.5.5 editions include entitlement to WebSphere
eXtreme Scale capabilities for both Liberty profile and full profile WebSphere Application
Server.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The IBM WebSphere DataPower XC10 is a purpose-built, easy-to-use appliance that is
designed for simplified deployment at the caching tier of your enterprise application
infrastructure. The DataPower XC10 is designed for rapid, “drop-in” use along with
WebSphere Application Server and other WebSphere family products. It is based on the
DataPower 9004 platform and contains 160 gigabytes of storage per unit. Because your
needed data can be stored on the appliance in an in-memory grid, application caching
functions can be done fast and can scale with consistent performance.
1-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Session management
Elastic DynaCache
DataPower XC10 Appliance Web side cache
• Drop-in cache solution Petabyte analytics WebSphere
that is optimized and eXtreme Scale
Data buffer
hardened for data-
oriented scenarios Event Processing
• Ultimate flexibility
• High density, low footprint
Worldwide cache across a broad range of
improves data center
In-memory OLTP
caching scenarios
efficiency
• In-memory capabilities
• Stores cached data on the In-memory SOA for application-oriented
appliance
scenarios
“Application-oriented” • Builds grids by using
JVMs
Elastic caching for linear scalability
High availability data replication
Simplified management, monitoring, and administration
Figure 1-18. WebSphere eXtreme Scale and DataPower XC10 Appliance WA855 / VA8551.0
Notes:
In simple, data-oriented scenarios, few code changes are necessary to adopt elastic
caching. Customers are looking for performance and scalability improvements that are
balanced with cost savings.
Application-oriented scenarios require investment in new architectures.
XC10 focuses on simple, data-oriented caching scenarios where customers want to quickly
and cost effectively scale their applications while improving performance. Data-oriented
caching scenarios require few application code changes; with XC10, no application code
changes are required at all for WebSphere Session Management and extending
DynaCache. XC10 provides a large (160 GB) cache in a high density, low footprint that
allows you to save time, money, and storage space. Fault tolerance is built in, lowering your
risk of data loss and providing continuous availability.
WebSphere eXtreme Scale provides the ultimate flexibility that supports a broad range of
caching scenarios, which include caches where the data and application are collocated.
These customers are investing in growing their business, differentiating their applications
from the competition.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
IBM Workload
WebSphere CloudBurst Deployer V3.1
Appliance V2.0
© Copyright IBM Corporation 2013
Notes:
IBM Workload Deployer, previously known as IBM WebSphere CloudBurst Appliance,
dispenses and manages IBM middleware to virtualized servers and private
cloud-computing environments. Workload Deployer manages two styles of patterns:
• The first style is “topology patterns,” which are customizable patterns of IBM
middleware that are packaged as “Hypervisor Edition” images. This familiar pattern was
available since WebSphere CloudBurst V1.0, but is more dynamic in Workload
Deployer V3.0. When IBM WebSphere Application Server Hypervisor Edition Intelligent
Management Pack is enabled in a deployed environment, users can enable automated
elasticity to allow patterns to grow and shrink without manual input.
• The second style of pattern is “workload patterns,” which contain all IT components that
are needed to run a certain type of workload. This type of pattern is less customizable,
but is designed to meet the needs of common use cases with little modification. As
such, workload patterns offer a much more cost-effective way of deploying and
managing suitable applications.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 1-20. IBM Tivoli Composite Application Manager for WebSphere Application Server WA855 / VA8551.0
Notes:
With IBM Tivoli Composite Application Manager, administrators can view the health of
applications and servers. They can then drill down to diagnostic information for specific
application requests to identify the root cause of problems.
1-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Rational Application Developer is the only IDE you need when you want to design, develop,
and deploy your applications. It provides a development environment for building
applications that run on WebSphere Application Server V8.5.5.
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 1-22. IBM Assembly and Deploy Tools for WebSphere Administration WA855 / VA8551.0
Notes:
The application assembly and deployment tools that are delivered together with the
WebSphere Application Server Version 8.5 offering are the IBM Assembly and Deploy
Tools for WebSphere Administration. With IBM Assembly and Deploy Tools for WebSphere
Administration, developers can accomplish key assembly and deployment needs including
editing of deployment artifacts, script development and testing, and application deployment
and debugging. This tool is not intended for general application development.
1-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe the WebSphere family of products
• Describe the relationships between various products in the WebSphere
family
• Describe the WebSphere Application Server V8.5.5 offerings
• Describe the standards that are supported in this release
Notes:
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint questions
1. What is the main difference between the Express and base
WebSphere Application Server editions?
Notes:
Write your answers here:
1.
2.
3.
4.
1-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. What is the main difference between the Express and base
WebSphere Application Server editions?
– The Express edition license covers only two processors. The license for the
base edition covers unlimited processors.
2. Which WebSphere Application Server edition do you need if you
want to deploy a single application with low transaction volume?
– Any edition allows you to deploy a single application with low transaction
volume.
3. True or False: WebSphere Application Server Hypervisor Edition is
shipped in OVF format, which includes WebSphere Application
Server and the operating system.
– True
4. True or False: Support is included for mixed WebSphere Application
Server releases in a cell.
– True
Notes:
© Copyright IBM Corp. 2013 Unit 1. WebSphere product family overview 1-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe a typical e-business application architecture
• Describe the architectural differences between WebSphere Application
Server packages
• Describe what is running in a WebSphere Application Server node
• Describe the architectural implications of the web server plug-in
• Describe the use of Java Database Connectivity (JDBC) providers and
data sources
Notes:
2-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Architecture runtime
• Architecture administration
• Profiles
Notes:
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Architecture runtime
Notes:
2-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
PMEs
Notes:
In this unit, the focus is on the Express and Base versions of WebSphere Application
Server. All of the concepts that this unit presents are applicable to all three versions:
Express, Base, and Network Deployment.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Application
Application Server
Notes:
This diagram illustrates the differences between the application, the application server, and
the hardware and operating system layers. WebSphere Application Server is a platform on
which Java based business applications run and is an implementation of the Java Platform,
Enterprise Edition specification. It provides services (database connectivity, threading,
workload management) that the business applications can use.
2-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Browser
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
The main element is the application server, a Java process that encapsulates many
services, including the containers, where business logic runs. If you are familiar with Java
EE, you recognize the web container and the EJB container. The web container runs
servlets and JavaServer Pages (JSPs), both of which are Java classes that generate
markup that a web browser can view. Traffic into and out of the web container travels
through the embedded IBM HTTP Server. While servlets and JSPs can act independently,
they most commonly make calls to EJBs to run business logic or access data. EJBs, which
run in the EJB container, are easily reusable Java classes. They most commonly
communicate with a relational database or other external source of application data, either
returning that data to the web container or changing the data on behalf of the servlet or
JSP.
The JMS messaging engine is built into the application server. This messaging engine is
pure Java. JMS destinations, which are known as queues and topics, provide
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
asynchronous messaging services to the code that runs inside the containers. JMS is
covered in more depth later in this course.
As you see in more detail later on, the web services engine provides the ability for
application components to be exposed as web services, which can be accessed by using
SOAP.
Several other services are run within the application server, including the dynamic cache,
data replication, security, and others. You look at these topics later in the course.
In addition, there are some important components outside of the application server
process.
WebSphere Application Server also provides a plug-in for HTTP servers that determines
the HTTP traffic that WebSphere intends to handle, and routes the requests to the
appropriate server. The plug-in is also a critical player in workload management of HTTP
requests, as it can distribute the load to multiple application servers, and steer traffic away
from unavailable servers. It also reads its configuration from a special XML file.
1 of 10: The browser is the main interaction mechanism for users.
2-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Browser
HTTP(S)
HTTP
server
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
2 of 10: A browser communicates with a web server (HTTP server).
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets
Server
HTTP
server JSPs
Plug-in
Plug-in
configuration
file
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
3 of 10: The way the request gets into the WebSphere Application Server is from the HTTP
server plug-in that is loaded with the HTTP server. This request is forwarded to the
embedded HTTP server within the application server. The embedded server forwards the
request into the web container to either a servlet or a JSP.
2-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Plug-in
configuration
file
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
4 of 10: If these servlets or JSPs access distributed business logic or a database, the Java
EE way to accomplish it is through EJBs within the EJB container.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Plug-in Application
configuration data
file
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
5 of 10: EJBs (entity in this case) can communicate with the database to store, retrieve,
query, and delete data. JDBC is one way that this communication can occur.
2-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Web services Messaging
Plug-in engine engine Application
configuration data
file
Dynamic cache JMX
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
6 of 10: Many other services are provided within WebSphere Application Server. Some of
those services are listed here.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Web services Messaging
Plug-in engine engine Application
configuration data
file
Dynamic cache JMX
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
7 of 10: The browser can communicate directly with the embedded HTTP server
(bypassing the external web server); use this direct communication only for testing and
development purposes. In this way, you access your application servers in many of the lab
exercises.
2-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Web services Messaging
Plug-in engine engine Application
configuration data
file
Dynamic cache JMX
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
8 of 10: Browsers are not the only clients; a pure Java client can access EJBs directly
through RMI/IIOP.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Web services Messaging
Plug-in engine engine Application
configuration data
file
Dynamic cache JMX
Web
services
client
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
9 of 10: Web services clients can also access your application server. This communication
occurs in two ways:
• Through SOAP over HTTP and passing through the embedded HTTP server
• Through SOAP over JMS communicating directly to the messaging engine within the
application server
2-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets
Server
HTTP EJBs
server JSPs
Plug-in
Web services Messaging
Plug-in engine engine Application
configuration data
file
Dynamic cache JMX
Notes:
This diagram illustrates the basic architecture of WebSphere Application Server, including
several of the larger components.
10 of 10: Finally, you can use a JMS client to communicate directly with the messaging
engine.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
JDBC providers
• Provide the JDBC driver implementation for database access
– Type 2 JDBC drivers (thick): require the database client software on the client
node to connect to the database server
– Type 3 JDBC drivers (net protocol): require server-side code to map net
protocol to native database
– Type 4 JDBC drivers (native protocol): connect directly to the database by
using its native protocol
Client node
JNDI Connection
pool JDBC Database
Database
client
JDBC driver server
Data source
Notes:
To access a database from an application server, a JDBC provider is necessary. The JDBC
provider allows access to the database through a JDBC driver implementation for database
access. There are three different JDBC driver implementations available with the
application server.
• Type 2 JDBC drivers, sometimes known as “thick”, require the database client software
on the client node to connect to the database server.
• Type 3 JDBC drivers (net protocol) require server-side code to map net protocol to the
native database.
• Type 4 JDBC drivers (native protocol) connect directly to the database by using its
native protocol.
XA drivers support transaction recovery.
2-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Data sources
• Data sources can improve performance and portability for database
access
– Standard and XA data sources
Data source
or Connection Database
Connection pool
factory
J2C
connection
manager © Copyright IBM Corporation 2013
Notes:
Rather than having the JDBC drivers communicate directly with the database, the
communication is abstracted into a data source.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Architecture administration
Notes:
2-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets
EJBs
Server
JSPs
Notes:
Earlier, you saw the runtime depiction of a WebSphere Application Server. This diagram
illustrates the basic architecture of administering WebSphere Application Server.
Two main tools are used to administer WebSphere Application Server: the administrative
console and the wsadmin command-line tool.
The configuration of the server is stored in a set of XML files, often referred to as the
configuration repository. These files define the server itself, and the resources and services
that it provides.
1 of 4: This diagram is a standard application server, as previously mentioned.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets service
JSPs EJBs
Server
Admin
Admin
MBeans
application
XML
configuration
files
© Copyright IBM Corporation 2013
Notes:
2 of 4: One of the services available within the application server is the administrative
service. This service allows for configuration of the application server. The files necessary
for configuration are stored outside of the actual application server in a set of XML
configuration files. An application that runs within the web container provides users the
ability to administer the application server through a web application: the administrative
console.
2-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Embedded HTTP
Servlets service
JSPs EJBs
Server
Admin
Admin
MBeans
application
XML
Legend HTTP/S RMI/IIOP SOAP/HTTP File I/O configuration
files
© Copyright IBM Corporation 2013
Notes:
3 of 4: This diagram illustrates communication from the browser to the XML configuration
files.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
Servlets service
JSPs EJBs
Server
Admin
Admin
MBeans
application
Web services
engine Messaging
engine
wsadmin
command-line Dynamic cache JMX
client
Data replication Security
C:\> wsadmin
Name server Other services
XML
Legend HTTP/S RMI/IIOP SOAP/HTTP File I/O configuration
files
© Copyright IBM Corporation 2013
Notes:
4 of 4: The wsadmin command-line client is used to administer the application server
through SOAP, by communicating with the embedded HTTP server, or by using RMI (the
default) to communicate directly with the administrative service.
2-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Profiles
Notes:
2-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Profiles are the configuration mechanism that allows you to run more than one application
server on a single installation of WebSphere product files.
For a stand-alone server, the dmgr profile would not exist yet. The dmgr profile is explained
in the next unit.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Notice that under the WebSphere installation directory (<was_root>) there are
subdirectories for each profile. In the example that is shown, two application servers are
each configured according to the files that exist within their own profile directory.
2-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Managing profiles
2
Notes:
These two tools are available for creating and managing profiles. Profiles are managed
through one of the tools provided:
1. The Profile Management Tool (PMT) wizard is an Eclipse-based GUI tool for creating
profiles. The wizard gathers user input and starts the manageprofiles command-line
tool to create the profiles.
2. The manageprofiles script is run from a command-line interface for profile
management functions.
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Profile types
• Cell
– Deployment manager with a federated application server
• Management
– Administrative agent
– Deployment manager
– Job manager
• Application server
– Stand-alone
• Custom profile
– Federated node
(no application server)
• Secure proxy
Notes:
There are numerous profile types:
• Cell
- Deployment manager with a federated application server
• Management
- Administrative agent
- Deployment manager
- Job manager
• Application server
- Stand-alone
• Custom profile
- Federated node
- (No application server)
- Secure proxy
2-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe a typical e-business application architecture
• Describe the architectural differences between WebSphere Application
Server packages
• Describe what is running in a WebSphere Application Server node
• Describe the architectural implications of the web server plug-in
• Describe the use of Java Database Connectivity (JDBC) providers and
data sources
Notes:
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint questions
1. Which of the following provides an environment for running servlets?
A. Client module
B. Web container
C. EJB module
Notes:
Write your answers here:
1.
2.
3.
2-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. Which of the following provides an environment for running servlets?
B. Web container
Notes:
© Copyright IBM Corp. 2013 Unit 2. WebSphere Application Server architecture – stand-alone 2-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe the Network Deployment runtime flow
• Describe Network Deployment concepts and terminology, such as cell,
node, node agent, and deployment manager
• Describe the Network Deployment administration flow
• Explain how to manage web servers from WebSphere Application
Server
Notes:
3-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Network deployment concepts
• Managing web servers
• Additional concepts
Notes:
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Network deployment
concepts
Notes:
3-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
PMEs
Notes:
This unit focuses on the Network Deployment version of WebSphere Application Server.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Cell Deployment
manager
Node 01 Node 02
Node Node
agent agent
Notes:
The deployment manager is an application server that manages the administrative
environment within a cell. As you see later in this unit, a node is represented as a profile.
The node agent is an important process that allows for communication of administrative
information, such as commands and configuration files, to reach the application servers.
3-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
AppSrv02
Plug-in
Load Java
balancer Plug-in config client
AppSrv03
Application
data
Legend AppSrv04
HTTP or Plug-in
HTTPS
Plug-in config
JDBC
RMI/IIOP
© Copyright IBM Corporation 2013
Notes:
The main theme with Network Deployment is distributed applications. While the “flow” of an
application remains the same, there are significant additions to the runtime of an
application. Note the “load balancer”: it allows for multiple HTTP servers. Users point their
browsers to the load balancer, and their requests are workload managed to an HTTP
server. When a request arrives at one of these HTTP servers, the HTTP server plug-in load
balances the request between the application servers that it is configured to serve. When
the request enters the application server, the flow is identical to how it was in Express and
Base.
The Java client requests to EJBs can also be workload managed so that the requests do
not all arrive at one application server.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The administrative console and wsadmin are the two ways that the environment is
administered. However, these tools communicate with the deployment manager and not
with the application servers directly. The communication flow of these commands is from
the tools to the deployment manager, to the node agents, to the application servers. This
flow allows for the administration of multiple nodes from a single focal point (the
deployment manager). Each node can possibly contain multiple application servers.
There is one main (master) repository for the configuration files within a cell, and those files
are associated with the deployment manager. All updates to the configuration files go
through the deployment manager. Be careful about directly connecting to an application
server with wsadmin or the administrative console. Any changes to the configuration files
are only temporary and are overwritten with the configuration files from the master files
(repository).
3-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
File synchronization
Deployment manager Node A
Web container
Admin application
Node agent
Admin service File sync service File sync service
1 Admin service
2
EAR
Notes:
Each managed process, node agent, and deployment manager starts with its own set of
configuration files. The deployment manager contains the master configuration. Any
changes at the node agent or server level are local, and the master configuration overrides
them at the next synchronization (update).
1. Node agents synchronize their files with the master copy either automatically or
manually. Automatic synchronization can be done at startup or scheduled periodically.
Manual synchronization is done with the administrative console or from the command
line.
2. During synchronization, the node agent asks for changes to the master configuration.
Any new or updated files are copied to the node.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The addition of Network Deployment to this discussion does not change the definition of a
profile. The WebSphere configuration is still built by creating profiles, which consist of
product binary files and configuration files. The profile that is listed as a “stand-alone node”
is listed here as an “application server”. The deployment manager profile is added, which is
a special type of node that manages the administrative domain of a cell.
3-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
3-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Web servers within a cell are customized. Each web server plug-in is customizable and
requires a web server definition. Defining a web server does not mean that it is managed;
plug-in properties are defined on a web-server-by-web-server basis. Each plug-in has a
unique plugin-cfg.xml file that is generated for it; a cell level plugin-cfg.xml can also
be generated.
Web servers can be managed or they can be unmanaged. For a managed web server, a
node agent or the IBM HTTP Server administrative process can manage it.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Cell Deployment
manager
Node 02
Node
Unmanaged node agent
AppSrv03 AppSrv04
Notes:
A node agent is a process that handles communications with the resources within the
node.
An unmanaged node has no node agent. It is a reference to a machine somewhere in the
topology. Typically an unmanaged node is used to define the location of web servers.
3-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Just as modules for an enterprise application must to be mapped to one or more
application servers, they also must be mapped to one or more web servers. When you
define a web server, the default is that all currently installed applications are mapped to the
web server.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
HTTP server
C:\...\configurewebserver1.bat
Plug-in
Application
All currently installed applications
server
Mapped to this web server
plugin-cfg.xml
Notes:
When the web server plug-in is configured, a script is generated that you can use to define
the web server. The script uses the same defaults as defining the web server in the
administrative console.
3-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
After the web servers are defined, any applications that are installed after the web servers
are defined must be explicitly mapped to a web server.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The plugin-cfg.xml files are automatically generated and propagated. This behavior is
the default, but it can be changed; it is configurable through the console.
The plugin-cfg.xml files can be generic to a cell or custom to a web server. To generate
a cell generic plugin-cfg.xml file, use the command-line script:
<was_root>\bin\GenPluginCfg.bat
This action is not available through the console.
To generate a web server custom plugin-cfg.xml file, you use the administrative
console. You map applications to web servers, and you can customize the plug-in settings
for each web server.
3-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The links on the right side of the page under Additional Properties provide access to pages
for changing the plug-in properties.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Virtual hosts
• Configuration that allows a host machine to resemble multiple host
machines
• Each virtual host has a logical name and one or more host aliases
• There are several default virtual hosts, including:
– default_host: used for accessing the default applications
Example: http://localhost:9080/snoop
– admin_host: used for accessing the administrative console
Example: http://localhost:9060/ibm/console
Application server
HTTP server
Browser
Plug-in
Notes:
The virtual hosts definition for the application server determines not which ports are
listened to, but what ports are acceptable for the incoming URL. Since most requests come
in from the external HTTPd, the ports that are specified either explicitly or implicitly
(because of the protocol used) are 80 and 443. If an administrator wants to allow other
ports to be used, the ports must be specified on the virtual host to which the application is
mapped. If direct access is required to an application (without going through an external
web server), adding the port that the application server accepts for incoming requests to
the virtual host definition makes that possible. More specifically, if an application server
listens to port 9084 and direct access was required (http://<hostname>:9084/<uri>),
then adding 9084 to the virtual host definition makes that possible.
A virtual host is a configuration that allows a host machine to resemble multiple host
machines.
• Allows one machine to support multiple applications
• Associated with the cell, not a single node
3-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This slide shows the definition for “default_host.” Notice that the host aliases are specified
with the “*” symbol. Using the “*” symbol means that a request for any host name on ports
9080, 80, and 9443 is forwarded to this host. When applications are installed, web modules
within those applications must be mapped to a virtual host.
3-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
There are three types of WebSphere Application Server nodes upon which you can create
and manage a web server. Over the next several pages, three common web server
management scenarios are presented:
• Using a web server as an unmanaged node
• Using IBM HTTP Server as an unmanaged node
• Using a web server as a managed node
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Node
Unmanaged
agent
web server
definition
Plug-in
AppSrv01 AppSrvN
plugin-cfg.xml
• WebSphere node agent does not manage web server (other than IBM HTTP
Server)
– Allows WebSphere system administrator to create custom plug-in files for a
specific web server
– Application mappings
– SSL certificates
• Manually copy or use FTP to transfer the plug-in configuration file from the
deployment manager machine to the web server machine
© Copyright IBM Corporation 2013
Notes:
The web server is registered as an unmanaged node in this WebSphere configuration. This
scenario is common for web servers that are installed outside the firewall or in a DMZ
where no WebSphere Application Server exists. The implication with this scenario is that all
management of the web server occurs manually, which is outside the control of WebSphere
Application Server.
3-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Node
agent
Plug-in Local
plug-in
installation
plugin-cfg.xml AppSrv01 AppSrvN
Cell
Figure 3-22. Managed web server on a managed node (local) WA855 / VA8551.0
Notes:
The deployment manager manages the web server through the node agent. In this way,
you can start or stop the web server and automatically push the plug-in configuration file to
the web server from the deployment manager. This configuration can be used when the
web server is installed on the same machine as the WebSphere Application Server is
installed. It is a common scenario for behind a firewall where a WebSphere node can be
installed.
A node agent communicates with the web server from the administrative tools of
WebSphere.
It might be undesirable to use this configuration, since access to the node agent in a DMZ
can compromise security.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Node
Remote plug-in
plugin-cfg.xml
installation AppSrv01 AppSrvN
Cell
Figure 3-23. IBM HTTP Server as unmanaged node (remote) WA855 / VA8551.0
Notes:
IBM HTTP Server can be managed completely from the deployment manager (dmgr). The
dmgr communicates with the IBM HTTP Server administrative process that runs on the
node with IBM HTTP Server. There are actually two Apache instances (processes) on the
IBM HTTP Server machine: one running the administrative services and one containing the
plug-in.
UNIX note: On UNIX operating systems, the user ID under which the IBM HTTP Server
administrative process runs must have write permissions to the plugin-cfg.xml file. By
default, when IBM HTTP Server is installed, root owns the plugin-config.xml file, and
only root has write access to it. The result is a failure with propagation of the
plugin-cfg.xml file when it is run from the administration tools.
3-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
httpd.conf file
Plug-in
plugin-cfg.xml
Notes:
The user interface that was used to administer IBM HTTP Server in earlier versions no
longer exists. You must either manually make updates to the httpd.conf file, or use the
administrative console.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
There are no changes from previous versions of IBM HTTP Server on UNIX operating
systems. The functionality in version 6 is now extended to Windows operating systems.
3-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Additional concepts
Notes:
3-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Flexible management
• Loose management coupling
• Coordinates management across a group of endpoints
– One job to install application across a number of nodes
• Can manage through administrative agent or deployment manager
Node A
Node C
AppSrv01
Node
Admin agent
AppSrv02 agent
Deployment
manager
AppSrvN AppSrv01 AppSrvN
Node D
Node B
AppSrv01 Job manager Node
•Control agent
Admin multiple
AppSrv02 agent endpoints
•Remote
management AppSrv01 AppSrvN
AppSrvN Cell
•Loose coupling
© Copyright IBM Corporation 2013
Notes:
Flexible management is an approach that allows an administrator to manage multiple
application servers or cells through a loose asynchronous interface. Flexible management
is covered later in this course.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The CIM pushes the product binary files or maintenance to the remote targets and starts
the standard installer or update installer tool to complete the installation or update on the
targets, allowing you to:
• Download interim fixes and fix packs from IBM support directly to the CIM repository
• Install interim fixes and fix packs on target nodes with the Network Deployment cell
• Monitor download and installation status of packages through the administrative
console
3-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Intelligent runtime provisioning allows the application server to start faster and with less
memory because it loads only those components that are required. As other services are
needed, they are loaded on demand.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Edge Components
• WebSphere Application Server Network
Deployment package
contains the
following Edge
Components
functions: Caching Load
Client
– Load balancer proxy balancer
Notes:
Edge Components are included the Network Deployment package. The Edge Components
include a load balancer and a caching proxy. The load balancer distributes incoming client
requests across servers, balancing workload and providing high availability by routing
around unavailable servers. The caching proxy can satisfy subsequent requests for the
same content by delivering it directly from the local cache, which is much quicker than
retrieving it again from the content host. Cacheable content includes static web pages and
JSP files with dynamically generated but infrequently changed fragments.
3-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Intelligent Management
App App
version version
1.0 2.0
Intelligent routing
Notes:
Intelligent Management provides a virtualized infrastructure that redefines the traditional
concepts of Java Platform, Enterprise Edition (Java EE) resources and applications and
their relationships with one another. This application infrastructure virtualization facilitates
the ability of the product to automate operations in an optimal manner, increasing the
quality of service. By introducing an automated operating environment with workload
management, you can reduce total cost of ownership by using less hardware to do more
work.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Describe the Network Deployment runtime flow
• Describe Network Deployment concepts and terminology, such as cell,
node, node agent, and deployment manager
• Describe the Network Deployment administration flow
• Explain how to manage web servers from WebSphere Application
Server
Notes:
3-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. A process that handles communications with the resources within the
node is __________.
2. What is the process when the node agent checks for changes to the
master configuration?
Notes:
Write your answers here:
1.
2.
3.
4.
© Copyright IBM Corp. 2013 Unit 3. WebSphere Application Server architecture – federated 3-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. A process that handles communications with the resources within the
node is the __________.
Node agent
2. What is the process when the node agent checks for changes to the
master configuration?
File synchronization
Notes:
3-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Define the IBM Installation Manager
• Describe the IBM Installation Manager wizards
• Describe the IBM Packaging Utility
• Uninstall the IBM Installation Manager
Notes:
4-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• IBM Installation Manager overview
• IBM Installation Manager installation
• IBM Installation Manager – modify
• IBM Installation Manager – update
• IBM Packaging Utility
• Uninstall IBM Installation Manager
Notes:
4-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
WebSphere Application Server Version 8.5 uses the IBM Installation Manager for the
installation process. The installation experience is now unified across all of the WebSphere
platforms. Also, various IBM products use the same IBM Installation Manager installer.
The IBM Installation Manager full product installation lifecycle management includes
product installation, adding or removing features, uninstallation, and full service
management, which includes installing and uninstalling fixes and applying and rolling back
service fix packs.
Notes:
IBM Installation Manager provides full graphical user interface for distributed platforms,
excluding z/OS and IBM i operation systems, but it provides a command-line interface for
all platforms. Using the Installation Manager command-line utility (IMCL) and the response
files, you can install products silently.
4-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Installation Manager can be configured to automatically search for updates to itself. To
verify or modify this setting, click File > Preferences > Updates in the Installation Manager
GUI. If this option is selected, network connectivity is required so Installation Manager can
look for any updates. If it finds an update, you are provided details on a possible action. If
the updating option is cleared, Installation Manager does not look for updates to itself.
Notes:
IBM Installation Manager was originally introduced to support the installation of IBM
Rational desktop products, and many products across IBM use this tool. A single instance
of IBM Installation Manager can manage the product lifecycle for any IBM Installation
Manager based product from WebSphere, Rational, Lotus, and any other brand within IBM.
The IBM Installation Manager full product installation lifecycle management includes
product installation, adding or removing features, uninstallation, and full service
management, which includes installing and uninstalling fixes and applying and rolling back
the service fix pack.
Every product is packaged and delivered differently. You can download installation files for
a product, or you can obtain product discs that contain installation files. When you insert a
disc into a local computer, the IBM Installation Manager starts automatically. If you are not
using a disc on a local computer, you must start the installation process yourself. Extract
the downloaded files or copy the disc files to a common location, and then you can
determine the files to use to start the installation.
4-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
IBM Installation Manager is a tool that you can use to install and maintain your software
packages. Wizards guide you through the steps that you must take to install, modify,
update, roll back, or uninstall your IBM products. Use Installation Manager to install
individual software packages on your local machine, or with the IBM Packaging Utility to
install software for an enterprise.
• Run the help command to view the available commands for Installation
Manager
– For example, <IM_install_root>/tools/imcl -help
© Copyright IBM Corporation 2013
Notes:
You must run imcl commands from the tools directory. You cannot use imcl from the
Installation Manager installer if an earlier version of Installation Manager is installed.
Include quotation marks around file paths that have spaces.
4-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A repository is a location that stores data for installing, modifying, rolling back, updating, or
uninstalling packages. You can add, edit, or remove repositories and modify the repository
order in the repository table. The IBM Installation Manager repository contains one or
multiple product offerings that have both metadata and actual payload for the offerings. The
offering metadata describes such aspects of the offering as: name, version, supported
operating systems, required and optional features, and relationships and dependencies
between offerings and features of offerings.
Normally, an IBM Installation Manager repository contains the full content that is required to
install on various platforms or operating systems. Remote repositories are available for
installation through the web, or product images and fixes can be stored in local repositories
and customized.
Notes:
Different IBM Installation Managers can reference repositories on different machines, and
the repository topologies can be generalized in three categories:
• Public repository, which can be publicly accessible by using a URL with an internal
connect or local share file system
• Enterprise repository, which is usually behind the firewall and accessed by multiple
machines only within the enterprise intranet
• Local repository, which a single user uses and does not share with others
There are tools available to copy offerings from one repository to another, such as the IBM
Package Utility. If you are using a third-party tool to transfer the repository between
machines, you must use binary transfer mode.
4-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
In the Repositories window, you can add, edit, or remove repositories and modify the
repository order in the repository table. You can clear credentials for a repository or test a
connection to a repository. You might find both a diskTag.inf and a repository.config
in the IBM product installation files. Use the diskTag.inf file when selecting a repository
location.
Remote installations
• IBM Installation Manager – manages installation on local system and
can:
– Access remote installation repositories
– Update the current installation
Notes:
In a flexible management environment, you can submit the Install IBM Installation
Manager job to install the Installation Manager on registered hosts of the job manager. You
can use the administrative console of the job manager or the deployment manager to
submit the job.
Use the centralized installation manager (CIM) to shorten the number of steps that are
required to create and manage environments that contain previous versions of WebSphere
Application Server. As an administrator, you can remotely install or uninstall product
components and apply maintenance from the administrative console.
4-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Installation Manager comes in the form of an installation kit, which is an archive file that
contains a set of Installation Manager binary files and a flat-file repository for the
Installation Manager product. The installation kit is used only for setup and maintenance of
Installation Manager. You run Installation Manager only on systems on which you install or
update product code. Typically, you need only one Installation Manager instance on a
computer because one instance can track any number of product installations.
Notes:
The product DVD media includes a launchpad program, which can be used to install IBM
Installation Manager Version 1.5.2, IBM WebSphere Application Server Version 8.5, and
other software products. After IBM Installation Manager is installed, it can be used to install
IBM WebSphere.
With Application Server Network Deployment, you can add or remove more optional
features of the IBM WebSphere Application Server Network Deployment installation, or
uninstall the product.
Start the launchpad from the product DVD media, and you see that the launchpad GUI
comes up. Click the link to start Installation Manager installation for administrators.
4-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The IBM Installation Manager installation wizard pops up. Follow the wizard instructions
and click Next to continue.
You cannot install multiple versions of Installation Manager on the same physical machine
in the same mode. If you try to install more instances of Installation Manager on the same
physical machine, it returns an error that indicates that it is already installed.
Notes:
Read and accept the license agreement to proceed with the installation.
4-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Choose the default installation location or keep the default directory.
Notes:
After reviewing the installation summary panel, click Install to continue with the installation.
4-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
After the installation is completed, click Restart Installation Manager to exit the
installation wizard and restart the IBM installed Installation Manager.
Notes:
Silent mode allows you to install packages in a non-interactive and non-GUI mode. It uses
a response file to provide the input for each installation. The key to silent mode
installations, then, is the creation of the response files that guide each effort. Response
files can be used to install, update, modify, roll back, and uninstall software packages.
4-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Start IBM Installation Manager on your system and click the Modify icon from the IBM
Installation Manager welcome panel to modify the installation.
Notes:
Select the package group that you would like to modify, and click Next to proceed.
You have more than one choice if you have multiple installations of WebSphere Application
Server. Each package group corresponds to an installation location.
4-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Select a new optional language that you want to install, or clear the already installed
optional language to uninstall. Click Next to proceed.
Notes:
Select or clear the optional features that you want to install or uninstall. Click Next to
proceed.
4-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Review the Modify summary panel. Click Modify to start the add or remove feature
operation.
Notes:
When the modification completes, there are final installation status details on the final
panel. You can also click the View Log File link to review the log.
4-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Update
Notes:
Start IBM Installation Manager on your system and click the Update icon from the IBM
Installation Manager welcome panel to update the installation.
Notes:
Before you can update a package, Installation Manager must have access to the repository
that contains the package updates. Internet access might be required.
Each installed package has an embedded location for its default update repository. For
Installation Manager to search the default repository locations for the installed packages,
the preference Search service repositories during installation and updates must be
selected.
If you use another installer besides Installation Manager to update a package, Installation
Manager might not be able to recognize the change. You might be required to uninstall the
update from the other installer to be able to use Installation Manager to update later.
4-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
You can use the IBM Packaging Utility to create custom or “enterprise” IBM Installation
Manager repositories that contain multiple products and maintenance levels that fit the
needs of your business. As an administrator, you can control the content of your enterprise
repository, which then can serve as the central repository to which your organization
connects for product installations and updates. IBM Packaging Utility essentially copies
from a set of source IBM Installation Manager repositories to a target repository and
eliminates duplicate artifacts, helping to keep the repository size as small as possible.
• Includes the –platform option that can copy repository files for
specific platform.
– Saves disk space and network bandwidth by copying only the files you need
– Example: -platform os=os,arch=arch
Notes:
If Installation Manager is installed, you can use the Packaging Utility repository on
www.ibm.com to install or update Packaging Utility without downloading files. If Installation
Manager is not installed, you must download the Packaging Utility files. Installation
Manager is included in the Packaging Utility download packages.
4-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Technical preview
• IBM Packaging Utility V1.6.2 includes the –updateFromVersion
technical preview
– Creates a repository that contains the files for updating from the specified
version to another version
– Copies only the files that are required to update to a later version
– Only available for the PUCL command-line interface
– Works only with packages and does not work with fixes
Notes:
Use the -updateFromVersion option to copy only the files that are required to update to a
later version. The version value is the version of the package that you are updating from.
The package that you are copying is the version that you are updating to. An update might
require files from a base offering. Use the -repositories option to list the repository for
the base offering.
4-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
4-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
To uninstall the Installation Manager, you must log on to your workstation with a user
account that has the same privileges as the user account used to install Installation
Manager.
Unit summary
Having completed this unit, you should be able to:
• Define the IBM Installation Manager
• Describe the IBM Installation Manager wizards
• Describe the IBM Packaging Utility
• Uninstall the IBM Installation Manager
Notes:
4-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. (True or False) You can have multiple versions of the IBM Installation
Manager installed on a workstation.
Notes:
Write your answers here:
1.
2.
3.
Checkpoint answers
1. False: You can have only one version of the IBM Installation
Manager installed on a workstation.
2. True. To uninstall the IBM Installation Manager, you must uninstall all
packages that the Installation Manager installed.
Notes:
4-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe the installation process for WebSphere Application Server
• Verify the installation of WebSphere Application Server
• Describe WebSphere profiles
• Describe the directories and configuration files for WebSphere
Application Server
• Describe how to use configuration commands
• Describe how to use backup and restore configuration utilities
Notes:
5-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Installation overview
• Hardware and software requirements
• Installing WebSphere Application Server
• Working with profiles
• Verifying an installation
• Post installation tasks
Notes:
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Installation overview
Notes:
5-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Preinstallation tasks
Notes:
Before beginning the installation of WebSphere Application Server, read the documentation
that is included with the product. Also, review the WebSphere Information Center for tips on
planning the installation process.
Confirm that you meet the hardware and software requirements. Application requirements
dictate more hardware and software needs.
Create and verify that the user ID that is used to install the product has the appropriate
rights for starting services. Ensure that the user ID has read and write access to the file
system where the product is installed. A non-administrator ID can be used to install
WebSphere. Review the information center topic that is titled “Describing installation by
using non-administrator ID”.
Locate the installation media. The installation files are delivered as a DVD or can be
downloaded by using a Passport Advantage ID.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
WebSphere opens up several ports by default. Ensure that the host name assigned to your
system is in DNS or in the local host’s files. The host name must remain fixed after you
create a profile. Changing the host name can cause WebSphere not to function properly.
Finally, ensure that you have enough disk space and physical memory on the system to
support your application server environment. The applications that you plan to install
contribute to the amount of disk space and physical memory needed.
5-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Installation overview
Deployment manager
+ WebSphere
IBM profile 1 Application server
Installation
1 Manager
Custom profile
Job manager
WebSphere
installation
product
binary files Cell
+ WebSphere
profile 3
Secure proxy
2 3
© Copyright IBM Corporation 2013
Notes:
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The product DVD media includes a launchpad utility, which can be used to install IBM
Installation Manager Version 1.6.2 and IBM WebSphere Application Server Version 8.5.5.
After IBM Installation Manager is installed, it can be used to:
• Install IBM WebSphere Application Server Network Deployment
• Add or remove optional features to the IBM WebSphere Application Server Network
Deployment installation
• Uninstall the installation
5-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• These product packages are packaged in the product DVD media and
also available in IBM Passport Advantage site
Figure 5-7. IBM WebSphere Application Server product packages WA855 / VA8551.0
Notes:
The IBM WebSphere Application Server Version 8.5.5 product contains multiple offering
packages. For example, Application Server Network Deployment, Base, Express, or the
IBM HTTP Server is a separate offering.
These offering packages are also available for download and to be installed directly from
the IBM Passport Advantage site. Users must have a valid Passport Advantage user ID
and password with entitlement to IBM WebSphere Application Server Version 8.5.5.
All IBM WebSphere Application Server offerings must be installed by using IBM Installation
Manager Version 1.6.2 or later.
Unlike previous versions of WebSphere Application Server, each offering contains
complete program binary files and can be installed on any supported distributed platforms.
There are not separate 32-bit and 64-bit Application Server installable packages.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
5-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Hardware requirements
Notes:
Hardware requirements vary by platform and application requirements. Use this link to
check for the latest hardware requirements. Also, consult your application documentation
to help determine your hardware requirements.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This list contains the supported operating systems. Software requirements vary by platform
and application requirements. To check for the latest supported operating system versions
and patch levels, see: http://www.ibm.com/support/docview.wss?uid=swg27038218
Also, consult your application documentation to help determine your software
requirements.
5-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 5-11. Software requirements: Web servers and database servers WA855 / VA8551.0
Notes:
The first list contains the supported web servers. To check for the latest supported web
server versions and patch levels, see:
http://www.ibm.com/support/docview.wss?uid=swg27038218
Also, consult your application documentation to help determine your web server
requirements.
The second list contains the supported database servers. Use the same link to check for
the latest supported database server versions and patch levels. Also, consult your
application documentation to help determine your database server requirements.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Installing WebSphere
Application Server
Notes:
5-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Package group
• Repository
– Local directory or remote server location for package files
• Shared resources
– Files and plug-ins that packages share
Notes:
A package is a software product that Installation Manager can install. It is a separately
installable unit that can operate independently from other packages of that software. It can
be a product, a group of components, or a single component that can be installed by using
Installation Manager. Each package has a name, version, and identifier, as shown in this
example:
• Package name: com.ibm.websphere.ND.v85
• Package version: 8.5.5.20130514_1044
• Package identifier: com.ibm.websphere.ND.v85_8.5.5.20130514_1044
The packages are installed to a defined directory location in the file system. Installation
Manager allows you to control where products are installed and at which level.
A package group is used when more than one product is installed at the same location.
Installation Manager automatically sets package group names. Some packages support
installing to the same package group, and other packages must be installed to a new
package group.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
A repository is a place where the installable packages can be found. The repository
includes metadata that describes the software version and how to install it. It has a list of
files that are organized in a tree structure and can be stored on a local directory or on a
remotely reachable server.
Shared resources provide a place where software files and plug-ins are stored and where
packages share them. You can specify the shared resources directory only the first time
you install a package, and you cannot change the location while packages are installed.
5-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Repositories
• Add the
repository that
1 contains the
installation
packages
© Copyright IBM Corporation 2013
Notes:
You must configure the repository that contains the WebSphere Application Server
installation packages.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Installation GUI
Notes:
Click Install to start the installation process.
5-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Packages
Notes:
Select the installation package for WebSphere Application Server Network Deployment.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Select the location for the shared resources directory. As soon as it is set, the directory
location cannot be modified.
5-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Determine the package group and installation directory. The package group is a location
that contains one or more packages. The installation directory is the location for the
installation binary files.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Features: Translations
Notes:
In version 8.5.5, you can select individual language packs for the WebSphere Application
Server runtime environment and administrative console. You can confirm the features to
install.
5-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
In version 8.5.5, you can select individual features to install. Other features that you can
install include sample applications.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Summary
Notes:
An installation summary panel is displayed. Review the installation location, installation
features, and the language pack option before clicking Install to start the installation.
During the installation, a progress status bar is displayed. You can pause or cancel the
installation.
5-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Results
Notes:
This image is the final panel of the installation flow. An installation status is displayed on the
top of the panel. You can also click the View Log File link to review the detailed installation
logs.
In version 8.5.5, product installation is separated from product configuration. The
installation of WebSphere Application Server does not automatically create a server profile
instance. However, a tool integration option is available at the final panel of the installation
wizard to start the Profile Management Tool application upon closing of this final installation
wizard panel.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
IBM Installation Manager also provides a command-line interface, which can be used for
installation automation, and it is useful when installing WebSphere Application Server in
many machines within the customer’s (your) enterprise. You can use the command-line
interface alone to do basic installation, modify, update, and uninstall operations, or you can
use it with an installation response file to rerun the same installation operations. IBM
Installation Manager also can record the operation to an installation response file in its GUI
mode, or you can use the sample response file that is provided in the WebSphere
Application Server Information Center. There are instructions in the sample response file to
guide you in changing it for your environment.
In the IBM WebSphere Application Server Version 8.5 Information Center, you can find
sample response files that contain complete documentation on how to modify the sample
response file to suit your particular installation environment. An example is a different
installation location or a choice of optional features.
When you record a new response file, you can specify the -skipInstall parameter.
Using this parameter has the following benefits:
5-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
5-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Profiles
• Profiles define application server configuration
Profile types packages Functions
Notes:
Profiles define application server configurations. WebSphere Application Server V8
Network Deployment has seven profile types, which are listed and described in the table.
Profiles contain the configuration files that WebSphere uses at run time and are
customizable. The Profile Management Tool, which is a graphical interface to the
manageprofiles script, is used to create profiles.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Click Create
Notes:
To begin the process of creating and configuring a profile, start the Profile Management
Tool from the WebSphere Customization Toolbox. Click Create to start the process.
The Profile Management Tool is installed to WebSphere Customization Toolbox during
installation of WebSphere Application Server.
5-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Application
deployment options
• Administration
console
• Default
application
© Copyright IBM Corporation 2013
Figure 5-27. Profile Management Tool: Environment and options WA855 / VA8551.0
Notes:
A number of different profiles can be created from this tool. In this example, the
environment for the profile is an application server. As part of the profile creation, both the
administrative console and the default application are deployed. It is best to deploy the
administrative console so there is an initial point to administer the application server. In a
development or test environment, you can install the default application. The default
application contains several servlets that provide information about the application server.
In a production environment, it is best to uninstall (or not install at all) the default
application. Installation of the default application is considered a security risk.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
To begin the process of creating and configuring a profile, start the Profile Management
Tool from the WebSphere Customization Toolbox. Click Create to start the process.
The Profile Management Tool is installed to WebSphere Customization Toolbox during
installation of WebSphere Application Server.
5-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 5-29. Profile Management Tool: Name, location, and tuning WA855 / VA8551.0
Notes:
The profile creation process provides a default name and location. You must change the
profile name and location according to the naming standards of your enterprise. The
example that is shown here is the profile name that is used in the lab exercises for this
course. The profile is created beneath the profiles directory of the application server
installation.
The runtime performance tuning standards are used to tune the environment appropriately.
There are settings for general-purpose usage (standard), optimal production usage (peak),
and development environments.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 5-30. Profile Management Tool: Node and host names WA855 / VA8551.0
Notes:
The parameters on this panel identify the profile. Node name identifies the application
server profile in the administrative console. If the node is federated, the node name must
be unique within the cell. Server name is the logical name of the application server. The
host name is the DNS name.
5-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Creating a user name and password provides access to the administrative tools
(administrative console and wsadmin). This administrative user is created in a repository
within the application server. When the profile is created, you can add users, groups, or
external repositories.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
When you import a personal certificate as the default personal certificate, import the root
certificate that signed the personal certificate. Otherwise, the Profile Management Tool
adds the signer of the personal certificate to the trust.p12 file.
5-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
If you create the certificates, you can use the default values or modify them to create new
certificates. The default personal certificate is valid for one year by default, and the root
signing certificate signs it. The root signing certificate is a self-signed certificate that is valid
for 15 years by default. The default keystore password for the root signing certificate is
WebAS. You must change the password.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Review port
value
assignments
Notes:
Verify that the port value assignments are correct and that there are no port conflicts.
5-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
You can determine to run WebSphere Application Server as a Linux service.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 5-36. Profile Management Tool: Web server definition WA855 / VA8551.0
Notes:
From this panel, you can create a web server definition that is used when a web server
routes requests to the application server. You can create that web server definition here or
when you generate the web server plug-in.
5-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Profile creation
summary
y Summary
information is
based on the
selections
you made in
previous
panels
y Review the
summary for
accuracy
Notes:
This screen provides a summary of the options you chose for the profile creation. Review
the summary and click Next.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
You can optionally start the First steps console. The newly created profile is displayed in
the list of profiles.
5-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Use the manageprofiles command to create, delete, augment, back up, and restore
profiles, which define runtime environments. The manageprofiles command and its
graphical user interface, the Profile Management Tool, are the only ways to create runtime
environments. There are multiple parameters for this command. Consult the information
center for an explanation of each parameter.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Verifying an installation
Notes:
5-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
First steps
Notes:
You can automatically start the First steps console after profile creation. Click the
Installation verification link to start the verification process.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Installation verification
Notes:
The IVT tool starts the server process of a profile automatically if the server is not running.
After the server initializes, the IVT runs a series of verification tests. The tool displays pass
or fail status in a console window. The tool also logs results to the ivtClient.log file in
the logs directory for the profile. As the tool verifies your system, it reports any detectable
errors in the SystemOut.log file.
5-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
5-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Depending on the options you chose during installation and profile creation, several
applications can be installed.
System applications consist of isclite (administrative console) and the filetransfer
application. These applications are not listed in the administrative console, and you cannot
administer them.
Enterprise applications consist of the Default application and the Query application.
Sample applications consist of PlantsByWebSphere.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Uninstall
Always use IBM Installation Manager to uninstall
• Do not use Add/Remove program to uninstall
WebSphere
Cannot custom
uninstall parts of
WebSphere
installation
• All the components are
removed
• Logs and properties
files are not removed
Silent uninstallation is
supported by
running IBM
Installation Manager
as a background
process
© Copyright IBM Corporation 2013
Notes:
In WebSphere Application Server V8, use the IBM Installation Manager to uninstall the
product. You cannot uninstall parts of the installation. All components are removed. Logs
and properties files are not removed.
The silent option can also be used to uninstall the product.
5-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Directory structure
Installable
applications
Plug-ins
Profile root
System
applications
© Copyright IBM Corporation 2013
Notes:
This picture displays the directory structure after a profile is created. Take note of the
profiles directory. Beneath the profiles directory are the files and directories that
represent the runtime environment for the application server. This picture shows a single
profile, but there can be a deployment manager and other profiles in the profiles
directory.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Configuration files
Notes:
Beneath the config directory of the profile, you find configuration files that are specific to
the application server for the profile. Configuration files are typically well-formed XML files.
5-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The startServer command is used to start an instance of an application server. The
startServer command reads the configuration file for the specified server process and
starts that server process.
The stopServer command reads the configuration file for the specified server process.
This command sends a Java management extensions (JMX) command to the server that
tells it to shut down. The server process can be an application server, a DMZ secure proxy
server for IBM WebSphere Application Server, an administrative agent server, or a job
manager server. By default, the stopServer command does not return control to the
command line until the server completes the shutdown process. There is a -nowait option
to return immediately, and other options to control the behavior of the stopServer
command. For more information about where to run this command, see the “Using
command-line tools” topic.
The serverStatus command displays the status of one or all of the servers that are
configured on a node.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The versionInfo tool displays important data about the product and its installed fix packs
and interim fixes, such as the build version and build date. This tool is useful when working
with support personnel to determine the cause of any problem.
5-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Server commands
• WebSphere commands are profile aware
– There is a -profileName option on many WebSphere V8 commands
<was_root>\bin\startServer server1 –profileName profile1
– Or issue the commands from the appropriate profile directory
<profile_root>\profile1\bin\startServer server1
• Examples:
– startServer server1 -profileName profile1
– startManager -profileName DmgrProfile
– stopServer server1 (assumes the default profile)
Notes:
WebSphere commands are profile aware. These commands can be issued from the bin
directory of the WebSphere Application Server root, or they can be issued from the bin
directory of the profile. If the command is issued from the WebSphere Application Server
root, then you must supply the profile name by using the -profileName option.
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Commands for backing up and restoring a configuration are shown here. When you use the
backupConfig command, all servers on the node stop before the backup is made so that
partially synchronized information is not saved by default. For more information about
where to run this command, see command-line tools. If you do not have root authority, you
must specify a path for the backup file in a location where you have write permission. The
backup file is saved in compressed file format.
5-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 5-52. Accessing the information center: Offline options WA855 / VA8551.0
Notes:
There are two solutions to configure and view the information center content offline.
Install the documentation plug-in into an existing IBM User Interface Help System that is
provided as part of another IBM product. The IBM Rational Application Developer and IBM
Assembly and Deploy Tool are two products where the plug-ins can be installed.
The other option is to customize and export documentation plug-ins from the Toolkit for
Custom and Reusable Solution Information.
5-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe the installation process for WebSphere Application Server
• Verify the installation of WebSphere Application Server
• Describe WebSphere profiles
• Describe the directories and configuration files for WebSphere
Application Server
• Describe how to use configuration commands
• Describe how to use backup and restore configuration utilities
Notes:
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint questions
1. What are the types of profiles that can be configured?
2. Which log file is used to verify that the installation was successful?
Notes:
Write your answers here:
1.
2.
3.
5-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. What are the types of profiles that can be configured?
– For the application server, an application server profile. For
Network Deployment, you can also configure deployment manager, custom,
and cell profiles.
2. Which log file is used to verify that the installation was successful?
– Examine the log file <was_root>\logs\install\log.txt
Notes:
© Copyright IBM Corp. 2013 Unit 5. WebSphere Application Server installation 5-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-72 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Explain the installation process for IBM HTTP Server
• Verify the installation of IBM HTTP Server
• Explain the installation process for WebSphere Customization Toolbox
• Install web server plug-ins for WebSphere Application Server
• Use the Plug-in Configuration Tool to configure the web server plug-in
Notes:
6-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Installing IBM HTTP Server
• WebSphere Customization Toolbox overview
• Installing web server plug-ins
Notes:
6-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
6-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Browser
traffic
Figure 6-4. Web servers for WebSphere Application Server WA855 / VA8551.0
Notes:
Plug-in module
Web server
Web Server
configuration
file
Plug-in configuration
XML file
Notes:
6-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Silent installation
– Uses a response file as an input
install –options "responsefile.txt" –silent
Notes:
Notes:
6-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Figure 6-9. IBM HTTP Server: Installation directory and package group WA855 / VA8551.0
Notes:
6-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
6-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
6-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Topic: WebSphere
Customization Toolbox
overview
Notes:
6-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
WebSphere Customization Toolbox in essence is a container framework that holds various
tools that are used for configuring an WebSphere Application Server environment.
WebSphere Customization Toolbox comes as an independent stand-alone offering; it is
also embedded into WebSphere Application Server. Tools that get wrapped into the
WebSphere Customization Toolbox framework are different in the stand-alone and
embedded offerings.
Notes:
Embedded WebSphere Customization Toolbox comes as a part of WebSphere Application
Server. Therefore, it gets installed on all architectures wherever WebSphere Application
Server is supported. Added GUI support on AIX 64-bit is introduced in version 8. Platforms
include: HPUX 64 bit, Windows (32 and 64), Linux on x86 (32 and 64), Linux on Power PC
(32 and 64), Linux on IBM System z (32 and 64), Solaris, and AIX (32 and 64).
Stand-alone WebSphere Customization Toolbox is available on the following platforms:
HPUX 64-bit, Win2K (32 and 64), Linux on x86 (32 and 64), Linux on Power (32 and 64),
Linux on IBM System z (32 and 64), Solaris, and AIX (32 and 64). Note: even on 64-bit
systems, stand-alone WebSphere Customization Toolbox operates as a 32-bit component
with a 32-bit JDK. Platforms include: HPUX, Windows, Linux on x86, Linux on Power, Linux
on IBM System z, Solaris, and AIX.
6-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
AIX 64-bit (embedded) requires GTK as a prerequisite. GTK stands for GNU GUI toolkit
from the GNU project. The installer can directly install GTK, or by installing Firefox the GTK
is automatically installed.
Figure 6-18. WebSphere Customization Toolbox: Selective tool installation WA855 / VA8551.0
Notes:
This picture illustrates the choices for possible WebSphere Customization Toolbox tool
selections during installation.
6-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This picture illustrates the choices for possible WebSphere Customization Toolbox tool
features selections during modification, which is the same panel for features installation.
Notes:
6-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
6-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Command-line arguments are documented in the information center.
Notes:
6-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
6-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
6-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 6-28. Web server plug-ins: Package group and installation directory WA855 / VA8551.0
Notes:
Notes:
6-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
y Verify the
package
y Review the
results
Figure 6-30. Web server plug-ins: Summary and results WA855 / VA8551.0
Notes:
Notes:
After you install the plug-in, it must be configured. Configuration is done through the Web
Server Plug-ins Configuration Tool. The first step is to provide the location of the plug-in,
which is selected during installation of the plug-in.
6-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
y Select the
web server
y Select the
location of
the
httpd.conf
file
© Copyright IBM Corporation 2013
Figure 6-32. Plug-ins Configuration Tool: Web server selection WA855 / VA8551.0
Notes:
Select the web server to configure. Be sure that it is installed. You also must select the web
server configuration file and web server port. After configuration, the configuration file
contains the location of the plug-ins and other information about the plug-ins.
y Configure IBM
HTTP Server
Administrative
Server when
administering
IBM HTTP
Server from the
administrative
console
Notes:
IBM HTTP Server Administration Server is used to control communication between the
administrative console and IBM HTTP Server.
6-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 6-34. Plug-ins Configuration Tool: Web server definition name WA855 / VA8551.0
Notes:
The web server definition name is displayed in the administrative console and is used to
identify the web server.
Notes:
Determine whether the web server is hosted locally or remotely.
6-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
6-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Explain the installation process for IBM HTTP Server
• Verify the installation of IBM HTTP Server
• Explain the installation process for WebSphere Customization Toolbox
• Install web server plug-ins for WebSphere Application Server
• Use the Plug-in Configuration Tool to configure the web server plug-in
Notes:
Checkpoint questions
1. What are the two platforms for the WebSphere Configuration Tool?
Notes:
Write your answers here:
1.
2.
3.
6-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. What are the two platforms for the WebSphere Configuration Tool?
• Embedded and stand-alone
Notes:
Exercise 1
Notes:
6-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Install IBM Installation Manager
• View the installation log file
• Confirm the installation of Installation Manager
Notes:
Exercise 2
Notes:
6-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Use IBM Installation Manager to install WebSphere Application Server
Network Deployment
• Use IBM Installation Manager to modify a product feature
• Use the Profile Management Tool to create a profile
• Verify that the installation was successful by examining log files
• Start and stop the application server
Notes:
Exercise 3
Notes:
6-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Install IBM HTTP Server with IBM Installation Manager
• Confirm and test the installation of IBM HTTP Server
• Install Web Server Plug-ins for WebSphere Application Server
• Install WebSphere Customization Toolbox
• Configure the Web Server Plug-ins for WebSphere Application Server
• Examine the installed directories and files for IBM HTTP Server and the
plug-ins
Notes:
6-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server Network Deployment V8.5 Information
Center:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe how to access the administrative console
• Describe the administrative console in a cell topology
• Describe the administrative console interface
• Describe the use of the following administrative tools:
– Help
– Preferences
– Filters
– Guided activities
– Troubleshooting
• Describe user and group administrative roles
• Describe the Tivoli Performance Viewer
Notes:
7-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative console
Notes:
The administrative console is also known as the Integrated Solutions Console.
The console is accessed by using any supported web browser and entering the web
address: http://<host_name>:9060/ibm/console
Using the browser back button with the console can produce unexpected results and is not
supported. Use the controls and links that are provided in the console to navigate between
pages and applications.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Node
Application Server
Admin
console Load, edit, Admin
save application EAR file
Admin
service
• AdminApplication
– Installed as a system application Configuration
(XML files)
– Runs within an application server profile
– Cannot be managed through the console
– Not listed as an installed application Stand-alone single server
Notes:
The administrative console is implemented as an application (AdminApplication). It is
deployed as a system application during product installation and within an application
server. The AdminApplication cannot be managed through the console, and is not listed as
an installed application. WebSphere administrative security is used to control which users
can log in to the console.
7-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This diagram depicts two separate views of WebSphere administration.
The flow of administration commands is shown as solid lines, and the flow of administration
configuration files is shown as dotted lines.
For both of these flows, the diagram proceeds from left to right.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Console login 1
Log on to the console
• User ID
– A string that identifies the user
– Is used to track changes that
the user makes
– User ID must be unique
• Password
– If security is set, specify a
password
User ID conflict
y Shown when another
user is logged in with
the same user ID
Notes:
To access the console, enter your user ID and password and then click Log in. The
password is required only if security is enabled.
If the user ID that you provide is already logged in at a different location, you are prompted
to choose between logging out from the other location or returning to the login page. If you
log out the user from the other location, you might be prompted to recover unsaved
changes that the user made.
7-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• You can recover prior changes if your prior session times out
• Two options are available:
– Work with the default administrative configuration
– Work with the administrative configuration from the prior session
© Copyright IBM Corporation 2013
Notes:
After you are logged in, be sure to use the Logout link in the console toolbar when you are
finished working with the console to prevent unauthorized access. If there is no activity
during this login session for an extended period, the session expires, and you must log in
again to access the console. The administrator can change the session timeout. The
default is set to 30 minutes.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Timeout value
in minutes
Notes:
This slide shows a Jacl script that modifies the administrative console timeout duration. You
are going to work with a similar script in one of the upcoming lab exercises.
7-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
1 Collection pages
2 Detail pages
3
Wizard pages
y JDBC
wizard is an
example © Copyright IBM Corporation 2013
Notes:
This slide shows the three basic types of pages in the administrative console. These
common patterns provide a consistency of format within the administrative console.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1 Banner
4 Message area
5 Help
3 Work area
2 Navigation tree
Notes:
The purpose of this slide is to show the layout of the administrative console. The details are
not the important message here. It is not critical that you can read the text on this slide.
The next several slides show each of the sections in detail.
7-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Item Description
Welcome • The administrative console home page
• Contains links to information sources
Logout • Logs you out of the administrative console session
• Shows the Login page after successfully logging out
• If changes were made and not saved, the Save page is shown
Help • Opens a new web browser with detailed online help for the administrative console
• Note: This Help is not the information center
© Copyright IBM Corporation 2013
Notes:
After you are logged in, be sure to use the Logout link in the console toolbar when you are
finished working with the console to prevent unauthorized access.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This slide briefly describes some of the tasks that are listed in the navigation tree.
Expanding any of these tasks reveals more subtasks.
7-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This slide briefly describes the remaining tasks that are listed in the navigation tree. Some
of these tasks are explored in more detail later in this unit.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
All of the help panels that you can access from the administrative console are also
accessible from the WebSphere Application Server Information Center.
7-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
You can access help in the following ways:
• Click either of the following tabs of an online help page:
- Click the Help index tab and select from the list of help panels to view administrative
console help information.
- Click the Search tab, provide search terms, and then click Search. Under Results,
select a help panel that contains the search information.
• In the help portal that is on the right side of the administrative console panel, do one or
all of the following tasks:
- Click a field label or a list marker in the administrative console panel for the help to
display under field help. Alternatively, place the cursor over the field label or the list
marker for the corresponding help to display at the cursor. Attention: When you
place the cursor over the field label or list marker, the help might be truncated in a
Firefox browser. Click the field label or list marker so that the full help displays under
field help.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- Click the link under Page help to access the help panel for the administrative
console panel. The help panel is the same help panel that displays when you click
the “?” icon.
- If Command assistance is listed, click the link under Command assistance to view
wsadmin scripting commands for the last action that completed within the console
panel.
7-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Use the preference settings to specify how you want information to display on an
administrative console panel. The preference settings vary from one administrative console
panel to another.
Turn on workspace automatic refresh: Specifies whether you want the administrative
console workspace to refresh automatically after the administrative configuration changes.
The default is for the workspace to refresh automatically. If you delete a WebSphere
variable, for example, the WebSphere variables page refreshes automatically and shows
the updated list of WebSphere variables in the WebSphere variables collection.
Enable command assistance notifications: Specifies whether to send Java
Management Extensions (JMX) notifications that contain command assistance data from
the administrative console. Enablement of the notifications allows integration with product
tools such as the Toolkit Jython editor for WebSphere Application Server. Enablement of
this option is suggested for non-production environments only.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
fields to
customize
how much
data is shown
• Select options
in the 2 Select resources
following
fields:
– Preferences 3 Set filters
– Filter
– Scope
Figure 7-16. Administrative console preferences, filters, and scope WA855 / VA8551.0
Notes:
Maximum rows: Indicates the maximum number of rows to display per page when the
collection is large.
Show resources at one authorizing group level: Specifies the authorization group level
that is used to filter the resources in the table. Only those roles that apply to your ID can
display in the table. Valid values are All Roles, Administrator, Deployer (for application
collection panels only), Operator, Configurator, and Monitor. If All Roles is selected, then all
the resources that you are authorized to view are displayed in the table and grouped by
role. Otherwise, the resources for the role that is selected are displayed in the table.
7-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Guided Activities
Notes:
The Guided Activities feature displays each administrative console page on which you
must do a task. The following information surrounds the task to help you do the task
successfully.
The Guided Activities feature displays an introduction to the task, introducing essential
concepts and describing when and why to perform the task:
• Other tasks to perform before and after performing the task
• The main steps to complete during this task
• Hints and tips to help you avoid and recover from problems
• Links to field descriptions and extended task information, which can be found in the
online documentation
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
My tasks
2 Select tasks to add to My tasks list
1 Select My tasks from the navigation view
selection list
Notes:
Use “My tasks” to create and edit a list of tasks to view in the console navigation. A task
includes a page that contains one or more web applications, or console modules, that are
used to complete that task. When you first access the console, all tasks to which you have
access are displayed in the navigation. “My tasks” is especially useful to customize the
navigation to show only the tasks you use most often. After you customize your tasks, “My
tasks” is initially displayed each time you log in to the console.
7-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative
2
roles
y Monitor
y Configurator
y Operator
1 y Administrator
User and group y ISC Admins
management y Deployer
y Administer user y Admin Security
and group roles Manager
y Manage users y Auditor
and groups
Notes:
Administrative user roles: Use this page to add, update, or remove administrative roles
for users. Assigning administrative roles to users enables them to administer application
servers through the administrative console or through wsadmin scripting.
Administrative group roles: Use this page to add, update or to remove administrative
roles for groups. Assigning administrative roles to groups enables them to administer
application servers through the administrative console or through wsadmin scripting.
Manage Users and Manage Groups: Allows you to create or delete users and groups
within your user registry.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Troubleshooting information
• Troubleshooting
– Configure log and trace settings
– Identify and view configuration problems
– View class loaders for modules within the
topology of enterprise applications
– Generate thread, heap, and system memory
dumps
• Configuration Validation
– View problems that exist in the present
configuration
• Diagnostic Provider
– Review the startup configuration, current
configuration, and current state of a
diagnostic domain
• Runtime Messages
– Review runtime error, warnings, and
information messages
Notes:
The Class Loader Viewer helps you diagnose problems with class loaders.
Diagnostic Providers are a quick method for viewing configuration and the current state of
individual components within an application server environment.
7-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Administrators and programmers can use Tivoli Performance Viewer to monitor the overall
health of WebSphere Application Server from within the administrative console.
From Tivoli Performance Viewer, you can view current activity or log Performance
Monitoring Infrastructure (PMI) performance data for the following resources:
• System resources such as processor utilization
• WebSphere pools and queues such as a database connection pool
• Customer application data such as average servlet response time
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Describe how to access the administrative console
• Describe the administrative console in a cell topology
• Describe the administrative console interface
• Describe the use of the following administrative tools:
– Help
– Preferences
– Filters
– Guided activities
– Troubleshooting
• Describe user and group administrative roles
• Describe the Tivoli Performance Viewer
Notes:
7-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. The AdminApp application can be configured with the administrative
console.
A. True
B. False
Notes:
Write your answers here:
1.
2.
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. The AdminApp application can be configured with the administrative
console.
B. False
Notes:
7-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 4
Notes:
© Copyright IBM Corp. 2013 Unit 7. WebSphere Application Server administrative console 7-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise objectives
After completing this exercise, you should be able to:
• Verify that WebSphere Application Server is started
• Start the administrative console
• Explore the navigation and functions of the administrative console
• Use the administrative console to examine configuration information,
resources, and properties
Notes:
7-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server Network Deployment V8.5 Information
Center:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe the architecture and components of the PlantsByWebSphere
application
• Explain how the application is used as a case study for WebSphere
Application Server
Notes:
8-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
PlantsByWebSphere application
Notes:
PlantsByWebSphere is a simple shopping cart application that is available with the
WebSphere Application Server distribution. It uses Derby as its back-end database, but
can also be configured to work with other databases such as DB2.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PlantsByWebSphere sample
• PlantsByWebSphere is available through the Features > Samples
Applications that come with the WebSphere Application Server
– Can be found in <was_root>\samples\PlantsByWebSphere
– Additional samples are available through the information center
• The version of PlantsByWebSphere used in this course is altered
slightly
– To make the
PlantsByWebSphere
application more
useful for
educational
purposes, two links
are added to the
bottom of the
Help page
(View Server Info
and Admin Home)
Notes:
PlantsByWebSphere is a sample application. There are numerous other sample
applications, which are now available through the information center. In previous versions
of WebSphere, these other samples were available directly through the WebSphere
Application Server distribution.
For educational purposes, the PlantsByWebSphere application is modified slightly. This
modification is made to more easily demonstrate several functional issues that are useful to
point out in a class such as this.
To demonstrate session failover in a clustered environment, another link is added to the
Help page. This link shows server information so that it is easy to understand where the
server affinity is mapped.
• To more easily demonstrate application security, another link that is called Admin Home
is also added to the Help page. This link makes it easier to access the Admin servlet,
which is protected through Java EE security. Otherwise, the user must type in the URL
(or use a bookmark).
8-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty This course also uses DB2 instead of Derby, giving students a chance to configure data
sources and JDBC drivers (instead of relying on the embedded definitions as part of the
enhanced EAR). To rebuild the DB2 database, run the CreateDB script in the software
directory.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This screen shows the home screen for the PlantsByWebSphere application.
8-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Log in with
– User: [email protected]
– Password: plants
• Or, register as new user
– Enter your own data
Notes:
This screen shows the Login and Registration screens for the PlantsByWebSphere
application.
It is not necessary to log in to the application unless the user wants to go through the
purchasing screens.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
My Account
Notes:
This screen shows the My Account page for the PlantsByWebSphere application. If this
screen shows user information, it means that the user is already logged in. If not, a login
screen is displayed.
8-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Shopping
• Select a tab, and
then click items to
view or add to cart
Notes:
This screen shows three of the shopping tabs for the PlantsByWebSphere application.
These include Trees, Flowers, and Fruits & Vegetables. From these screens, users can
click the individual items and add them to their cart.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Select an item
• When you have an item page open, you
see the details and are able to change
the quantity and Add to cart.
Notes:
This screen shows the details for an individual item within the PlantsByWebSphere
application. Users can click Add to cart and continue to shop. Or, if they want, they can
choose to check out.
8-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Shopping cart
• The shopping cart can be filled with
numerous items
• Click Checkout Now when ready
Notes:
This screen shows the shopping cart screen for the PlantsByWebSphere application. From
this screen, users can modify the quantities of their items, click Checkout Now, or continue
to shop.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
This screen shows the first of the checkout screens for the PlantsByWebSphere
application. This screen is where users confirm the billing and shipping information. They
also must enter credit card data. Be careful here, as the format of the credit card
information is required to be XXXX XXXX XXXX XXXX (with spaces).
8-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Click Submit
Order to complete
the transaction
Notes:
When the billing information is entered, the user is able to click Submit Order.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Help page
Notes:
The Help page provides an entry point to the following links: View Server Info and Admin
Home. These links are added to the PlantsByWebSphere application especially for this
course. They are not part of the PlantsByWebSphere EAR file that is distributed with the
product.
8-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
View Server Info page • The View Server Info page shows which
server is hosting the connection
– Used for demonstrating server failover
• It also displays the Session Data (and
time created)
– Used for demonstrating session failover
Notes:
The View Server Info page shows which server is hosting the current connection. This
information is useful for demonstrating server failover, since it is important to know which
cluster member to stop.
The session data is used to demonstrate failover of session information through
memory-to-memory replication.
The PlantsByWebSphere application does not store the shopping cart in an HTTP session
object, so it does not fail over correctly upon a server failure. Instead, this session
information field was created to demonstrate HTTP session object failover.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The administrative pages are mapped to the SampAdmin security role. When application
security is enabled, authentication is required to access these pages.
8-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Overview:
<was_root>/samples/PlantsByWebSphere/docs/index.html
Notes:
The following files contain potentially useful information about PlantsByWebSphere:
<was_root>/samples/PlantsByWebSphere/docs/index.html
<was_root>/samples/PlantsByWebSphere/docs/techNotes.html
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The Technotes page provides information about the default email address and password.
Also, the database tables and SQL statement for creating them are shown. A description of
the Java objects that are used in the application is shown.
The Plants by WebSphere Sample incorporates the following technologies:
• Java Persistence API (JPA) entity beans
• Stateless session beans
• Stateful session beans
• Servlets
• JavaServer Faces (JSF) files and Facelets
• Java Platform, Enterprise Edition security
The Plants by WebSphere application is supported through a series of JSF pages and
HTML pages. These pages communicate with the following servlets: AccountServlet,
8-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty ShoppingServlet, ImageServlet, and AdminServlet. The servlets use the various enterprise
bean business methods which, in turn, access data from the database as needed.
© Copyright IBM Corp. 2013 Unit 8. Introduction to the PlantsByWebSphere application 8-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Describe the architecture and components of the PlantsByWebSphere
application
• Explain how the application is used as a case study for WebSphere
Application Server
Notes:
8-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server Network Deployment V8.5 Information
Center:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
Unit objectives
After completing this unit, you should be able to:
• Describe the functions of the IBM Assembly and Deploy Tools for
WebSphere Administration
• Describe the application assembly process
• Describe the use of the IBM Assembly and Deploy Tools for
WebSphere Administration, including:
– Importing and examining application components
– Preparing and exporting an enterprise application for deployment on
WebSphere Application Server
– Explaining how annotations work and describing their benefits for programmers
– Showing the metadata that annotations generate
– Explaining the relationship between annotations and deployment descriptors
Notes:
9-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Overview of Java EE application packaging
• Application assembly and deployment tools
• Enhanced EAR
• Java EE modules
• Java EE annotations
Notes:
9-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Overview of Java EE
application packaging
Notes:
9-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Enterprise
bean Deployment
descriptors
EAR file
Servlet
Web modules
Assemble EJB modules Install
Client modules Application
JSF
Deployment server
descriptor
Client
class
Notes:
Two main activities are shown in this figure: assembly and installation. This unit describes
the assembly process, and a following unit defines the installation activity.
Java EE 6 packaging
Resource J2EE
adapter application Application
RAR file DD
EAR file
Client
Servlet class
EJB
Legend: DD
= Container file
= object that is contained
DD = deployment descriptor © Copyright IBM Corporation 2013
Notes:
This diagram shows the pieces that can be put together to create a Java EE 6 application.
9-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
IBM
bindings Enterprise HTML, Client
bean JSP DD
GIF
IBM Client
extensions class
Servlet
EJB
Legend: DD
IBM IBM IBM
= Files bindings extensions bindings
= object that is in a file
DD = deployment descriptor © Copyright IBM Corporation 2013
Notes:
See how this diagram adds more items to the enterprise application. (Hint: compare it to
the previous diagram).These additional items are required for the WebSphere Application
Server to “understand” how this application is going to run.
IBM bindings
• Bind application names to deployment platform-specific resources
– User-to-role mappings
IBM extensions
• Support other options, beyond the Java EE specification, such as:
– Access intent attributes
– Web application reloading
– File serving and servlet invoker (by class name)
Notes:
A deployment descriptor is an Extensible Markup Language (XML) file that describes how
to deploy a module or application by specifying configuration and container options.
Before an application can start, all enterprise bean (EJB) references and resource
references that are defined in the application must be bound to the actual artifacts
(enterprise beans or resources) defined in the application server.
When defining bindings, you specify Java Naming and Directory Interface (JNDI) names for
the referenceable and referenced artifacts in an application. The jndiName values that are
specified for artifacts must be qualified lookup names. An example of a referenceable
artifact is an EJB defined in an application. An example of a referenced artifact is an EJB or
a resource reference that the application uses.
9-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
9-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
IBM Assembly and Deploy Tools for WebSphere Administration enables rapid assembly
and deployment of applications to WebSphere Application Server environments. These
tools replace the previously available IBM Rational Application Developer Assembly and
Deploy function and are restricted to assembly and deployment usage only.
Figure 9-10. IBM Assembly and Deploy Tools for WebSphere Administration WA855 / VA8551.0
Notes:
With IBM Assembly and Deploy Tools for WebSphere Administration, you get access to the
complete set of Rational Application Developer documentation. Some documented
features are available only with the full Rational Application Developer for WebSphere
Software product.
9-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 9-11. IBM Assembly and Deploy Tools tasks WA855 / VA8551.0
Notes:
IBM Assembly and Deploy Tools provides all of the core functions for assembling and
deploying a Java EE application.
Figure 9-12. Features in IBM Assembly and Deploy Tools for WebSphere Administration (1 of 2) WA855 / VA8551.0
Notes:
• Java EE=Java Platform Enterprise Edition
9-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 9-13. Features in IBM Assembly and Deploy Tools for WebSphere Administration (2 of 2) WA855 / VA8551.0
Notes:
IBM Assembly and Deploy Tools supports the following WebSphere Application Server
Version 8 applications for assembly and deployment purposes:
• Java EE
• Basic OSGi
• Web services
• XML
• Basic SIP
• Basic Portlet
Notes:
The final product of the application assembly process is an EAR file.
9-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Import modules
Wizard driven:
• Import modules
– EAR files
– EJB JAR files
– Application client
JAR files
– Web module
WAR files
• Import Java
Utility JAR files
• Imported into a
new or existing
enterprise
application
Notes:
Select File > Import.
Wizards are provided for importing application modules into the enterprise application.
Java EE perspective
Editor
Project view
(Enterprise
Explorer)
Stacked views
Notes:
This screen capture shows the primary perspective of IBM Assembly and Deploy Tools for
packaging Java EE applications.
9-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The detail on this picture shows the editor for the EAR file deployment descriptor. Some of
the actions that can be done are described on the next page.
Notes:
The application.xml file identifies each module of an application. A Java EE 6
application is not required to provide an application.xml file in the EAR file. When an
application.xml file does not exist, the product examines the Java archive (JAR) file
contents to determine whether the JAR file is an enterprise bean (EJB) module or an
application client module.
9-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
It is important to understand the limitation of the default context root name. For example, if
the web module is named PlantsByWebSphereWeb.war, then the default context root is
PlantsByWebSphereWeb.
Notes:
An enhanced EAR file is created if you use the administrative console to export an
application.
To export applications, click Export on the Enterprise applications page. Using Export
produces an enhanced enterprise archive (EAR) file that contains the application and the
deployment configuration. The deployment configuration consists of the deployment.xml
and other configuration files that control the application behavior on a deployment target.
Exporting applications enables you to back up your applications and preserve binding
information for the applications. You might export your applications before updating
installed applications or migrating to a later version of the product.
9-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This picture shows how to open the editor for resources that are going to be scoped at the
application level. These types of resources are part of an enhanced EAR. Later, there is
more information about enhanced EAR files.
Notes:
This picture shows part of the editing of an enhanced EAR.
9-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Enhanced EAR
Notes:
9-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Enhanced EAR
Not part of the Java EE specification
• Used mainly during development and test stages
• Not intended to be used in
Enhanced EAR
production
• Resources at application scope
Resources
Enhanced Java EE
EAR application
EAR
Properties
Notes:
Resources are defined at application scope, which takes precedence over higher level
scopes.
Notes:
When an enhanced EAR is uninstalled, the resources that are defined at the application
scope are removed.
9-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
To ignore
application
scoped
resources at
installation time
© Copyright IBM Corporation 2013
Figure 9-26. Dealing with enhanced EAR files at deployment time WA855 / VA8551.0
Notes:
The check box named “Process embedded configuration” determines whether the
application scoped resources are deployed to the server. If this box is checked, then the
resources from the enhanced EAR get used. If it is not checked, these resources are
ignored and not installed in the WebSphere Application Server.
9-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Java EE modules
Notes:
9-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
An enterprise bean is a managed Java component that can be combined with other
resources to create Java Enterprise Edition (Java EE) applications.
Assemble an EJB 3.0 or 3.1 module to contain enterprise beans and related code artifacts.
Group web components, client code, and resource adapter code in separate modules.
After the EJB module is assembled, install it as a stand-alone application or combine it with
other modules into an enterprise application.
• No longer necessary to
put EJB classes in the
ejb-jar file
Notes:
This picture from the IBM Assembly and Deploy Tools shows an EJB JAR file that is
packaged into a WAR module. According to the Java EE 6 specification, EJBs can now be
packaged into the WAR file.
9-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The Import wizard imports into an existing enterprise application project, or creates a new
one. You can use the wizard to add web components from a WAR module, such as
servlets, JSPs, static HTML, and other supporting Java code.
Web module
Notes:
This screen gives a look at some of the files that are contained in the web module. This
module is going to be exported as a WAR file.
9-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
By clicking an item in the IBM Assembly and Deploy Tools (typically a right-click), more
information can be created or modified. In the example that is shown here, security data is
going to be added to the web module.
Notes:
This screen shows the use of the IBM Assembly and Deploy Tools to edit the DD
(deployment descriptor) of the web module.
Open the Web Application 3.0 Deployment Descriptor Editor by double-clicking the web
module name in the Enterprise Explorer.
9-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Application client projects contain the resources that are needed for application client
modules. An application client module is used to contain a full-function client Java
application (non-web-based) that connects to and uses the Java EE resources that are
defined in your server. When you place the client code in an application client module
instead of a simple JAR file, the application client benefits from the resources of the
application server. For example, it is not necessary to respecify the class path to Java EE
and server JAR files. Also, JNDI lookup is easier since the client container provides the
initial context and other parameters. The application client project allows you to work as if
you are creating a stand-alone Java application in a Java project.
An application client project enables you to do the following things:
• Develop the Java classes that implement the client module
• Set the application client deployment descriptor
• Test the application client
• Assemble application
modules
• Resolve Java EE
dependencies
• Save all changes
• Export the EAR file
• If source is available,
it can optionally be
2 included in the EAR
file
• The exported file is
ready to be deployed
© Copyright IBM Corporation 2013
Notes:
Enterprise applications are deployed in the form of an EAR file. Use the Export wizard to
export an enterprise application project into an EAR file for deployment.
Optional: To export source files, select the Export source files check box.
Optional: If you are exporting to an existing EAR file and you do not want to be warned
about overwriting it, select the Overwrite existing file check box.
The wizard exports the contents of the EAR project to the specified EAR file. Additionally,
for each project that corresponds to a module or utility JAR in the application, the project
contents are exported into a nested module or JAR file in the EAR file. If any unsaved
changes exist on any of the files in any of the referenced projects, you are prompted to
save these files before export.
9-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Java EE annotations
Notes:
9-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
@Stateless
Annotation syntax starts with @ ...
@RolesAllowed ("SampAdmin")
public class BackOrderMgr {
...
© Copyright IBM Corporation 2013
Notes:
Annotations enable you to write metadata for Enterprise JavaBeans (EJB) inside your
source code. You can use them instead of Extensible Markup Language (XML) deployment
descriptor files. Annotations can also be used with descriptor files.
Notes:
EJB 3.0 represents a vast improvement in the EJB programming model and is one of the
biggest potential sources of increased productivity for Java EE developers. An EJB can
now be an annotated “plain old Java object” (POJO), which is not required to extend a
certain class. It must implement a remote interface only, which you define or allow your IDE
to create automatically. Deployment descriptors are no longer required because the EJB
container can extract all that is necessary to know from the annotations on an EJB.
9-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
package com.ibm.websphere.samples.pbw.ejb;
import javax.ejb.Stateless;
...
/**
* The BackOrderMgr provides a transactional and secured
* facade to access back order information. This bean no longer
* requires an interface as there is one and only one implementation.
*/
@Stateless
@RolesAllowed ("SampAdmin")
public class BackOrderMgr
{
@PersistenceContext(unitName="PBW")
private EntityManager em;
...
Figure 9-39. Example of declaring a session bean with annotations WA855 / VA8551.0
Notes:
In Java Platform, Enterprise Edition 1.4, this EJB had to implement the SessionBean
interface, requiring six method implementations. In many cases, these method
implementations wind up empty and exist only to satisfy the interface and allow the code to
compile, leading to cluttered code. EJB 3.0 eliminates that problem by providing the
lifecycle annotations @PostConstruct, @PreDestroy, @PostActivate, and
@PrePassivate. You add these annotations as needed to any public, parameterless
method that returns void to implement reactions to lifecycle events.
...
@Stateless
@RolesAllowed ("SampAdmin")
public class BackOrderMgr
{
@PersistenceContext(unitName=
"PBW")
private EntityManager em;
...
Figure 9-40. Stateless session bean as shown in the Explorer view WA855 / VA8551.0
Notes:
The Explorer view within the IBM Assembly and Deploy Tools allows you to see the
hierarchy of the application, its modules, and the components of the modules.
9-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
@EJB
private CatalogMgr catalog;
Notes:
Here you see how an annotation becomes application metadata as seen in the console.
• Source
package com.ibm.websphere.samples.pbw.war;
import javax.ejb.EJB;
import javax.inject.Named;
...
@Named("help")
public class HelpBean {
@EJB ResetDBBean rdb;
Notes:
The screen capture is from the administrative console. It shows a portion of the EJB
references for the PlantsByWebSphere application. You can access this view by clicking
Applications > Application Types > WebSphere enterprise applications >
PlantsByWebSphere > EJB > EJB references.
9-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Application bindings
• All EJB references and resource references that are defined in the
application must be bound to the artifacts defined in the application
server
– These artifacts include enterprise beans or resources
• You specify Java Naming and Directory Interface (JNDI) names for the
referenced artifacts in an application
• For EJB 3.0 modules, you do not need to specify JNDI binding names
for each of the business interfaces on your enterprise beans
– If you do not explicitly assign bindings, the EJB container assigns default
bindings
Notes:
An application assembler can define bindings when modifying deployment descriptors of
an application. Bindings are specified in the WebSphere Bindings section of a deployment
descriptor editor. Modifying the deployment descriptors might change the binding
definitions in the ibm-xxx-bnd.xmi files that are created when developing an application.
After defining the bindings, the assembler gives the application to a deployer. When
installing the application onto a supported application server, the deployer does not modify,
override, or generate default bindings unless changes are necessary for successful
deployment.
Figure 9-44. WebSphere default bindings for bean interfaces WA855 / VA8551.0
Notes:
An application deployer or server administrator can use the administrative console to
modify the bindings when installing the application onto a supported application server.
New binding definitions can be specified on the installation wizard pages.
Also, a deployer or administrator can select to generate default bindings during application
installation. Selecting Generate default bindings during application installation instructs
the product to define incomplete bindings in the application with default values. Existing
bindings are not changed.
9-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Bindings support in the EJB container is expanded in Java EE 6. The EJB container
assigns default JNDI bindings for EJB 3.0 and 3.1 business interfaces. The bindings are
based on application name, module name, and component name. You do not have to
explicitly define JNDI binding names for each of the interfaces or EJB homes within an EJB
3.0 module or no-interface views within an EJB 3.1 module.
Unit summary
Having completed this unit, you should be able to:
• Describe the functions of the IBM Assembly and Deploy Tools for
WebSphere Administration
• Describe the application assembly process
• Describe the use of the IBM Assembly and Deploy Tools for
WebSphere Administration, including:
– Importing and examining application components
– Preparing and exporting an enterprise application for deployment on
WebSphere Application Server
– Explaining how annotations work and describing their benefits for programmers
– Showing the metadata that annotations generate
– Explaining the relationship between annotations and deployment descriptors
Notes:
9-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. The result of packaging an enterprise application is _________ .
Notes:
Write your answers here:
1.
2.
3.
Checkpoint answers
1. The result of packaging an enterprise application is _________.
– An EAR file
Notes:
9-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 5
Assembling an application
Notes:
Exercise objectives
After completing this exercise, you should be able to:
• Explore the Assembly and Deploy tool
• Import and examine enterprise application components
• Define application-scoped resources: data source and authentication
alias
• Export an enhanced EAR file that is ready for deployment
Notes:
9-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Describe methods of installing enterprise applications in WebSphere
Application Server
• Explain how fine-grained application updates work
• Describe enterprise application properties
• Enable monitored directories
• Deploy an application by using the monitored directory
• Use a profile-file-based configuration with monitored directories to
deploy an application
Notes:
10-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Application installation
• Application settings and interaction
• Monitored directory
Notes:
10-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Application installation
Notes:
10-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative
EAR file
console
WebSphere
Application
Server
EAR file
wsadmin>
Jython
script
Configuration
Notes:
This simple diagram shows the two paths for installing an EAR file (enterprise application)
into the application server:
• From the administrative console
• Using a script or commands with wsadmin
Installation tasks
• Configure the application environment as required
– Variables, virtual hosts, class path, security
Notes:
Installing an application involves configuring the runtime environment as required. You can
define variables, virtual hosts, and any other resources that the application needs before
you actually install the application. In general, it is a good practice to leave the static
content that the application uses in the EAR file, and allow the infrastructure to take care of
serving and caching the static content. In the end, leaving the static content in the EAR file
can be as effective as moving it to the web server.
10-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Provide
– Alias name: console
prefixes name with
node name
– User ID and
corresponding
password
– Optional description
– EJBs, data sources,
JMS resources,
and SIBus
resources use them
© Copyright IBM Corporation 2013
Notes:
Here is the input screen for creating a security resource that is used to access a back-end
resource.
Notes:
These screens show the process for creating the required resources that an application
uses to access a database. Here you see the setup for the database drivers (JDBC).
10-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
These screens show the process for creating the required resources that an application
uses to access a database. These two screens show the definition of variables that hold
the path to the database drivers.
Notes:
These screens show the process for creating the required resources that an application
uses to access a database. This simple screen shows the data that is required to access a
database.
10-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Here are the screens for the simple method of installing an application. This method is
called the “fast path.”
Step 1:
Select
installation
options
Notes:
There are various options available for the fast path installation.
10-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Summary
step
Notes:
This picture shows the summary of information just before the application is installed.
Enhanced EAR
• Enterprise archive that contains Java EE artifacts plus resource information
necessary to install on WebSphere Application Server
– JDBC resources (data sources)
– Class loader Enhanced EAR
– JAAS authentication aliases
Resources
– Shared libraries
– Virtual host information Enterprise
application
• Benefits: improved productivity EAR
Properties
– Application resources and properties come
with the application
– Application installation process creates the
necessary resources within the server or cluster
– Moving application from one server to another also moves the resources
• Support integrated with the IBM Rational Development and Assembly and
Deployment tools
– Found on Deployment page of application deployment descriptor
• Warning: Can possibly cause problems if unintended application scoped
resources are used in production
– Enhancements can be removed or ignored during application installation
© Copyright IBM Corporation 2013
Notes:
A JDBC resource can be defined in an enhanced EAR file. Enhanced EAR files are specific
to IBM WebSphere and are not part of Java EE. However, artifacts that are defined within
an enhanced EAR are ignored if this EAR file is installed on an application server other
than WebSphere.
Developers or administrators can use tools to define resources and properties within an
enterprise application, and import or export the enhanced EAR file.
Some resources still must be defined in the application server, for example, JMS and
JavaMail. Settings are defined in IBM tools, which are stored in deployment.xml, and
packaged with the EAR file. These resources are applied at the new application scope.
EAR files and enhanced EAR files are presented in more detail later in the course.
10-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Removing enhancements
• Resources can be
ignored
– Remove
enhancements from
EAR before
deploying (preferred)
– Clear Process
embedded
configurations
– Is prechecked only if
there are
enhancements
Notes:
There are several methods to ignore resources in an enhanced EAR file. The preferred
method is to remove enhancements from the EAR before deploying. If there are
enhancements, clear the check box for Process embedded configuration. This check
box is filled only if there are enhancements.
You can view resources, but not through the normal screens. You must click Application
scoped resources under the enterprise application.
10-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
10-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Starting an application
• After the application is installed, you can select from a number of options
to manage the application
– Click Applications > Application types > WebSphere enterprise
applications
Notes:
After the application is installed, you can see it listed on the Enterprise Applications page
by going to Applications > Applications types > WebSphere enterprise applications.
To start the application you installed, click the check box beside it to select it, and then click
Start. The application status symbol changes from a red X to a green arrow.
Application update
Notes:
It is possible to update an application without uninstalling that application first. This screen
is the screen that is used to update an existing application. It is not important that you read
all of the options on this slide, just that you understand the purpose of this activity.
10-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Enable or
disable New options:
automatic • Metadata
start for modules
• Manage
modules
Configure
startup
behavior
View
deployment
descriptor
Notes:
This slide shows a broad overview of the metadata for an enterprise application that can be
modified or configured through the application console.
Figure 10-19. Application startup behavior and auto start WA855 / VA8551.0
Notes:
For the startup behavior of an application, the values that are set affect how quickly an
application starts and what occurs when an application starts. By default, an application
starts when its parent server starts.
10-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This slide shows the link for viewing the application deployment descriptor. Note: IBM
Assembly and Deploy Tools allows for editing this data before the application is installed.
Notes:
You can view the application.xml deployment descriptor for the installed application
from the administrative console. Select Enterprise applications > application_name and
then click View Deployment Descriptor under Detail Properties.
10-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Manage modules (1 of 4)
• To view the web or EJB deployment descriptors for an enterprise
application
– Click Manage Modules
Notes:
These four slides show the steps for viewing the deployment descriptor of an EJB JAR file
(EJB module). First, on the application details view, click the link for Manage Modules.
Manage modules (2 of 4)
Notes:
These four slides show the steps for viewing the deployment descriptor of an EJB JAR file
(EJB module). Second, click the module that contains the EJBs (shown here as
“PlantsbyWebSphere”).
10-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Manage modules (3 of 4)
Notes:
These four slides show the steps for viewing the deployment descriptor of an EJB JAR file
(EJB module). Third, on the right side, click the link titled View Deployment Descriptor.
Manage modules (4 of 4)
Notes:
These four slides show the steps for viewing the deployment descriptor of an EJB JAR file
(EJB module). Fourth, the details of the EJB deployment descriptor are shown.
10-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
It is not necessarily a suggested practice to set metadata-complete to true if your
programmers intend to use annotation-based programming techniques. The technique that
you adopt can be based on personal preference.
Values in deployment descriptors can augment or override the equivalent annotation-based
metadata:
• After viewing the deployment descriptor information in the administrative console, the
deployer can change the appropriate deployment descriptor to reflect the required
changes.
• Expand the EAR file in the directory you installed from, for example:
<profile_root>/<profile>/installableApps
• Modify the deployment descriptor with your required changes and reinstall or update the
application.
Notes:
The next slide gives some guidelines on how and when to set the metadata-complete
options for the modules of an application.
10-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Monitored directory
Notes:
10-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
EAR
Monitored directory
Notes:
A monitored directory application deployment is a new, simple, and fast way for
administrators and developers to install, update, and uninstall applications by moving
archive files in or out of a monitored directory.
A user who prepackages an application file with all bindings specified can quickly deploy
that application without any tools other than a running application server or, in a network
deployment environment, a deployment manager.
Monitored directory application deployment can be done with applications packaged as
enterprise archive (EAR) files, web archive (WAR) files, Java archive (JAR) files, or SIP
application resources (SARs).
In addition to the mentioned archive files, a properties file can be used to deploy an
application.
Properties files are different from the other file types. They are not archives. Instead, they
contain properties that describe an application, including the source archive location and its
installation parameters. Monitored directory deployment with properties files relies on the
10-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Supported tasks
• Install: place an archive file into the monitored directory
• Uninstall: remove an archive file from the monitored directory
• Update: move or copy a new archive file with the same name as an
existing archive file in the monitored directory
remove
EAR Install
EAR
Update
EAR
Monitored directory
Notes:
To install an application, use an operating system file management tool such as a graphical
file manager or the command line to copy or move its archive file into a monitored directory.
Deleting a file from a monitored directory causes uninstallation of the corresponding
application.
To do a full replacement update of a deployed application, move or copy an updated
archive file with the same application name into a monitored directory. The archive file
name determines the application name. Or, or in case of an EAR archive, the display name
determines the application name if a display name is specified in the archive.
Notes:
Before using monitored directory deployment, it must be enabled. Go to the administrative
console under Applications > Global deployment settings. In addition to enabling the
service, the Global deployment settings panel allows configuration of the root path to the
monitored directories and the polling interval at which the monitored directories are
checked for changes.
Enabling the service is required only once.
The deployment manager or base server where the service is running must be restarted to
register any changes on the Applications > Global deployment settings panel.
10-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Directory location:
– Stand-alone:
<profile_root>/monitoredDeployableApps/servers/<servername>
– Federated:
<dmgr_profile>/monitoredDeployableApps/servers/<servername>
• For clusters:
– Create a clusters directory:
.../monitoredDeployableApps/clusters/<clustername>
Notes:
The path to a monitored directory depends on the type of application server, and what the
target of the deployment is going to be. To control where the monitored directory
applications are deployed, administrators create more directories to represent their clusters
or servers. These names must exactly match what is actually in the cell.
If you are using a stand-alone application server, then the only possible target is the server
itself, and the monitored directory is automatically created if the service is enabled. For
example, if the profile is called AppSrv01, and the server is named server1, the path is:
app_server_root/profiles/AppSrv01/monitoredDeployableApps/server1
If you are using a network deployment system, it is necessary to create the monitored
directories manually.
For application servers on a node that is federated with a deployment manager, you must
create the monitored directories for servers under the deployment manager profile:
app_server_root/profiles/dmgrprofilename/monitoredDeployableApps/servers/
server_name
If multiple servers on different nodes have the same name and you want to target only one
of the servers, you can specify the node and server in the path to the monitored directory.
Create a directory for the node by using the node name, then servers, and finally the
server_name directory.
app_server_root/profiles/dmgrprofilename/monitoredDeployableApps/nodes/node
_name/servers/server_name
For clusters, create a monitored directory under the deployment manager profile with the
name of the targeted cluster:
app_server_root/profiles/dmrprofilename/monitoredDeployableApps/clusters/
cluster_name
10-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
EAR
Notes:
Monitored directory supports the ability to drag a properties file. This support allows
administrators to customize any installation settings that might be required for monitored
directory installations.
Notes:
Version 7 introduced the properties file based configuration feature, which provides a group
of administrative commands to manage system configuration by using properties files.
Users can use the properties file based configuration commands to copy configuration
properties from one environment to another. They can also use the properties file to
troubleshoot configuration issues and apply one set of configuration properties across
multiple profiles, nodes, cells, servers, or applications. The details of the properties file
based configuration commands are documented in the version 7 information center. The
monitored directory deployment is extended to use the properties file to install, uninstall, or
update an application in version 8.
10-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
– Note: the monitored directory installation process uses only the properties that
relate to an application
Figure 10-35. Steps to use properties file to deploy applications (1 of 2) WA855 / VA8551.0
Notes:
A user can use the properties file based configuration command to extract application
properties to an application properties file. After a properties file is extracted, edit
application properties and copy the properties file to the MonitoredDeployableApps
directory under the deploymentProperties directory. The Monitored directory
deployment service runs the applyConfigProperties command to apply the application
properties change to install, uninstall, or update an application for you.
Step 1 shows how to use the properties file based configuration
extractConfigProperties command to extract application properties to a file.
By default, the extractConfigProperties command produces output that displays all
columns, including all hidden and non-hidden columns of installation tasks and task data
values, in separate rows. You can also extract application properties in simple output
format to display non-hidden columns of installation task data in columnName=value pairs.
You can also use the properties file examples that are documented in the information
center to create an application properties file to deploy, uninstall, or update an application.
copy
EAR
Figure 10-36. Steps to use properties file to deploy applications (2 of 2) WA855 / VA8551.0
Notes:
The monitored directory deployment service starts the application after it is deployed or
updated. Therefore, you must verify that the application server or cluster member on which
you want to install the enterprise application files is running.
Step 3 is to verify that the monitored directory deployment is enabled. You can look at the
information center “Setting monitored directory deployment values” section.
The last step is to copy the application properties file to the monitoredDeployableApps
directory. You can use a file browser to drag the properties file to the monitored directory or
use the operating system command to copy the properties file to the directory.
10-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe methods of installing enterprise applications in WebSphere
Application Server
• Explain how fine-grained application updates work
• Describe enterprise application properties
• Enable monitored directories
• Deploy an application by using the monitored directory
• Use a profile-file-based configuration with monitored directories to
deploy an application
Notes:
Checkpoint questions
1. True or false: You can update a single module or part of an
application in the console.
Notes:
Write your answers here:
1.
2.
3.
10-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. True. You can update a single module or part of an application.
Notes:
Exercise 6
Installing an application
Notes:
10-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Use the administrative console to install an application
• Use a web browser to test the application
• Use the drag-and-drop function to deploy an application
Notes:
10-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center,
troubleshooting and support topics:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
Unit objectives
After completing this unit, you should be able to:
• Describe a basic approach for problem determination
• List resources for completing a problem investigation
• Locate relevant log files
• Examine log activity
• Enable tracing on specific components
• Enable high performance extensible logging (HPEL) and use the Log
Viewer
• Locate other troubleshooting tools
• Use the IBM Support Assistant
Notes:
11-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Server logs and diagnostic tracing
• Gathering diagnostic data
• Problem determination tools
• IBM Support Assistant
Notes:
11-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
11-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
WebSphere provides several useful logs and messaging facilities, including JVM logs,
HTTP plug-in logs, and console runtime messages.
• Process logs: contain two output streams (stdout and stderror) which
are accessible to native code that runs in the process
– One set for each application server
– native_stderr.log and native_stdout.log
Notes:
Java virtual machine (JVM) logs
The JVM logs are created by redirecting the System.out and System.err streams of the
JVM to independent log files. WebSphere Application Server writes formatted messages to
the System.out stream. In addition, applications and other code can write to these
streams by using the print() and println() methods of the streams.
In a WebSphere Application Server Network Deployment configuration, JVM logs are also
created for the deployment manager and each node agent because they also represent
JVMs.
Process logs
WebSphere Application Server processes contain two output streams, which are
accessible to native code that is running in the process. These streams are the stdout and
stderr streams. Native code, including Java virtual machines (JVM), might write data to
these process streams. JVM-provided System.out and System.err streams can be
configured to write their data to these streams.
11-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty As with JVM logs, there is a set of process logs for each application server, since each JVM
is an operating system process. For a WebSphere Application Server Network Deployment
configuration, there is a set of process logs for the deployment manager and each node
agent.
IBM service logs
The IBM service log contains the WebSphere Application Server messages that are written
to the System.out stream. It also contains some special messages that provide extended
service information, which is normally not of interest, but can be important when analyzing
problems. There is one service log for all WebSphere Application Server JVMs on a node,
including all application servers. The IBM service log is maintained in a binary format and
requires a special tool to view. This viewer, the Log Analyzer, provides more diagnostic
capabilities. In addition, the binary format provides capabilities that IBM support
organizations use.
The HTTP server plug-in log is covered later in this presentation.
Figure 11-6. Server log files: Types and locations WA855 / VA8551.0
Notes:
All WebSphere Application Server log files are under the
<was_root>\profiles\<profile_name>\logs directory.
The default names for the JVM logs are SystemOut.log and SystemErr.log. They
contain server information and user program information (sent by System.out.xxx code
in the program).
The startServer.log and stopServer.log files can also be found under the
<was_root>\logs\<servername> directory; they contain information that the server logs
as it starts and shuts down.
The activity.log file size can be set by using the administrative console as IBM service
logs. You can also disable activity.log.
The standard JVM output and error logs are SystemOut.log and SystemErr.log.
The startServer.log and stopServer.log files are written to during startup and
shutdown of the application servers.
11-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty The trace.log file contains output from a diagnostic trace if tracing is enabled. The
location and name of this log file are configurable.
The operating system uses the native_stdout.log and native_stderr.log files to log
out-of-memory exceptions and verbose garbage collection data, if verbose GC is enabled.
The http_plugin.log file is the web server plug-in log file. It is not in <was_root>, but in
<plugin_root>\logs\<webserver_name>.
Notes:
The JVM logs can be configured from the administrative console. For both log files,
systemOut and systemErr, you can specify the path to their location, file formatting (basic
or advanced), and log file rotation (by file size or time interval). You can also configure the
maximum number of historical files to store on the file system.
11-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• To view, select:
Troubleshooting >
Runtime Messages >
– Runtime Error
– Runtime Warning
– Runtime Information
Notes:
When viewing runtime messages, first select the Error, Warning, or Info category link (a
count of zero means that nothing is available). Then, the details for the selected category
are shown. Selecting one of these links gives you detail information (see next slide).
You can have multiple pages of messages; the button on the bottom of the page allows you
to view and read all of them.
Notes:
Most runtime messages are designed with improved message text. A message code, for
example SRVE0255E, can be used to look up the message in the information center.
Information is shown on the detail screen for the event, and sometimes a user action is
provided to resolve the problem.
11-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The HTTP plug-in logs messages to a log file that is stored under the plugin_root
directory on the web server. The log level can be set to different values, depending on the
amount of detail that you want written to the log. Setting the log level to Trace causes it to
log all steps in the request process.
The embedded HTTP server logs
There are administrative console panels for configuring embedded HTTP server (HTTP
transport channel) logs. There are also an access log and an error log.
From main application server configuration panel, click Troubleshooting > server_name
> HTTP Error and NCSA Access Logging.
This service is disabled by default. To enable, check the Enable logging service box, and
restart the server.
Error logs can be controlled separately with log levels: Critical, Error, Warning, Information,
Debug
Diagnostic tracing
• Diagnostic tracing can be used to collect detailed processing data for
all WebSphere Application Server components
• Trace files show the time and sequence of methods that WebSphere
Application Server base classes call
– You can use these files to pinpoint the failure
Notes:
To take advantage of tracing, you do these steps:
1. Enable tracing of one or more WebSphere components.
2. Configure and view trace logs.
3. Interpret trace logs and trace messages.
11-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Trace output allows administrators to examine processes in the application server and
diagnose various issues. On an application server, trace output can be directed either to a
file or to an in-memory circular buffer. If trace output is directed to the in-memory circular
buffer, it must be dumped to a file before it can be viewed. On an application client or
stand-alone process, trace output can be directed either to a file or to the process console
window. In all cases, trace output is generated as plain text in either basic, advanced, or log
analyzer format as the user chooses. The basic and advanced formats for trace output are
similar to the basic and advanced formats that are available for the JVM message logs.
• Troubleshooting >
Logs and Trace >
server_name >
Diagnostic Trace
Notes:
The Diagnostic Trace Service box looks almost the same as it did in previous versions. The
Configuration and Runtime tabs behave as they always have, with Configuration affecting
the configuration repository and taking effect at the next startup. The Runtime settings take
effect immediately but are only optionally persisted to the server configuration.
Trace strings must be configured on a separate panel (Log Detail Level).
View and dump are available in the Runtime tab of diagnostic trace. The Log Analyzer can
be used to analyze trace output, but you can use your favorite editor. Before you can view
or dump a trace, you must specify the log detail level.
11-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Log levels control which events Java logging processes.
WebSphere Application Server controls the levels of all loggers in the system. The level
value is set from configuration data when the logger is created and can be changed at run
time from the administrative console.
Note: Trace information, which covers events at levels fine, finer, and finest, can be written
to the trace log. Therefore, if you do not enable diagnostic trace, setting the log detail level
to fine, finer, or finest does not affect the data that is logged.
Log string syntax: <component / group> = <log level>
Examples include:
• com.ibm.ws.classloader.ClassGraph=finest enables the finest trace level for
com.ibm.ws.classloader.ClassGraph
• EJBContainer=fine enables the least verbose trace level for all components in the
EJBContainer group
11-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Select one of
– No Logging
– Messages Only
– All Messages
and Traces
• Or select
Message and
Trace Levels
and select
Message
Levels
Notes:
Examples include:
• No Logging results in the following trace string: com.ibm.websphere.security.*=off
• Messages Only results in the following trace string: *=info (the default)
• All Messages and Traces results in the following trace string:
com.ibm.websphere.security.*=all
• Trace events that are displayed in basic use the following format:
– <timestamp><threadId><shortName><eventType>[className]
[methodName]<textmessage> [parameter 1] [parameter 2]
Notes:
Other values of eventType include:
• 1: a trace entry of type fine or event
• 2: a trace entry of type finer
• Z: a placeholder to indicate that the trace type was not recognized
11-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
– Message = D Detail
PMI is enabled C Configuration
F Fatal (exits process)
I Information
O Program output (system.out)
Notes:
The following list defines the sections of a trace entry:
• TimeStamp: The timestamp is formatted by using the locale of the process where it is
formatted. It includes a fully qualified date (YYMMDD), 24-hour time with millisecond
precision, and the time zone. ThreadId is an eight-character hexadecimal value that is
generated from the hash code of the thread that issued the trace event.
• ThreadName: The name of the Java thread that issued the message or trace event.
• ShortName: The abbreviated name of the logging component that issued the trace
event. This value is typically the class name for WebSphere Application Server internal
components, but can be some other identifier for user applications.
• LongName: The full name of the logging component that issued the trace event. This
value is typically the fully qualified class name for WebSphere Application Server
internal components, but can be some other identifier for user applications.
• EventType: A one-character field that indicates the type of the trace event. Trace types
are in lowercase.
11-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Look for exceptions (search for exception from top of stack trace)
– Events before the exception are probable causes
– Events after the exception are recovery attempts
Notes:
While it is possible to use a text editor to read logs and trace files, it is suggested that you
use a tool such as Log Analyzer, which is available in the IBM Support Assistant.
• Click
Troubleshooting >
Logs and trace >
server_name
– Click Switch to
HPEL mode
Notes:
After the log level is switched to HPEL mode for a server, there is a new list of links in the
General Properties section. One new link is Change log and trace mode, which allows
you to switch back to basic logging.
11-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This screen capture shows the default configuration for HPEL logging and tracing. To
modify the configuration, click any of the links on this page.
After HPEL is enabled for a server, it is suggested that you disable the HPEL text log.
Disabling the text log improves server performance.
Notes:
Clicking the Configure HPEL logging link starts the configuration page. Changes that are
made on the Configuration tab require a server restart. Changes that are made on the
runtime tab take effect immediately.
11-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The log view section lists the records. Use the First Page, Previous Page, Next Page,
and Last Page buttons to move through the list of records. You can also specify filter
criteria in the Content and Filtering Details section to limit the rows that are shown. Records
are always listed in the order that the server recorded them. By default, the log view has
five columns:
• Time Stamp: The time when the event was recorded.
• Thread ID: The identity of the thread that recorded the event in hexadecimal notation.
• Logger: The logger that recorded the event.
• Level: The type of event that was recorded.
• Message: The message from the recorded event. If the message has a message ID,
the message ID is underlined. Click the message ID to get an explanation and
suggested user action for the message.
To manipulate the log view, you can use available buttons to complete the following
actions:
• Refresh View: Uses records from the server to clear the contents of the viewer and
reinitialize the view. Use this button to retrieve information about any additional rows
that are created since the log viewer was started.
• Show Only Selected Threads: Show only records with the same thread as the one
that is selected in the selection area. Clicking this button enables the Show All
Threads button.
• Show All Threads: Lists any records that were filtered when you clicked Show Only
Selected Threads. This button is enabled only when you use the Show Only Selected
Threads button to restrict the view.
• Select Columns: Enables you to select the columns in the viewer that you want to
view.
• Export: Exports logs to the local workstation in any of basic, advanced, or binary
(HPEL) formats.
• Copy to Clipboard: Copies the records that are highlighted in the selection area into
the operating system clipboard.
• Server Instance Information: Lists attributes for the selected server instance process.
Use this table to find attributes and corresponding values for the server instance
process environment. These properties are similar to the ones that are found in the
header of basic mode logs.
11-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• You can also use the LogViewer command to view new log and
trace repository entries as the server writes content to them
– logViewer.sh/bat –monitor [interval]
Notes:
The first tool for analyzing HPEL logs is the command-line log viewer. The command-line
log viewer is a simple, intuitive, and fast tool for doing analysis on the logs in problem
determination efforts.
You are no longer required to be aware of whether data is written to the SystemOut.log,
SystemErr.log, or trace.log file. With HPEL, the logs are consolidated, and the log
viewer can be used to view all the data or filtered according to what subset of messages
you need:
• -tail [interval]: Specifies that you want the logViewer to continuously monitor the
repository and output new log record entries as they are created. You can provide an
optional integer argument after this parameter to specify how often you want the
LogViewer tool to query the repository for new records. By default, the LogViewer
queries the repository for new records every 5 seconds. When used with other filtering
options, only those new records that match the filter criteria are listed.
• -monitor [interval]: A synonym for -tail.
• To view the log and trace entries of the most recent server, run:
– logViewer.sh/bat –latestInstance
– With this option, it is no longer necessary to clear log files before restarting a
server
Notes:
To get a listing of available LogViewer options, use the -help option.
LogViewer can be started from the bin directory of a profile without any options, and a
listing of all the entries of a server is shown. If there are multiple servers in a profile, the
user is first prompted to select the server for viewing.
11-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Depending on the nature of your applications, multiple threads within an application server
might be used to handle requests, such as HTTP requests or JMS requests. More than one
application server can handle some requests, such as when one application server makes
a request to another application server for a web services request.
Applications that are built by using distributed architectures, such as service-oriented
architecture, can benefit from XCT, since XCT helps facilitate problem determination across
multiple services on different systems.
Administering XCT
• A server must have HPEL enabled before XCT can be enabled
• Click Troubleshooting > Logs and trace > server_name > Change
log detail levels
• Check Enable log and trace correlation
Notes:
Enable XCT to include request IDs in log and trace files when you want to see which log
and trace entries, in all threads and application server processes, are related to the same
request. Request IDs are recorded only when using HPEL log and trace mode and can be
seen or used for filtering when using the logViewer command.
Enable XCT to create correlation log records when you want to log how requests branch
between threads and processes, and see extra information about each request. Enabling
XCT to create correlation log records might have a significant performance impact on your
system, so it is best suited to test and development environments.
11-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
You can use XCT to augment your log and trace files with correlation information. This
correlation information clarifies which threads and which application server processes
participated in the handling of each request.
Figure 11-28. Use XCT request ID information to track requests WA855 / VA8551.0
Notes:
XCT log records:
• XCT log records are typically added to the logs to:
- Demarcate the beginning and ending of work for a particular request on a particular
thread
- Demarcate when work is transferred to another thread or process, or to indicate
when work returned from another thread or process
- Demarcate when work moves from major component to major component, even if
work continues on the same thread; for example, to show transfer of control from
application server code to application code
• XCT log records are composed of:
- XCT type (BEGIN / END)
- XCT parent correlator ID (for example, 00000000000-cccccccccc2)
- XCT current correlator ID (for example, AAAsirk1Njr-AAAAAAAAAA+)
11-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
11-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
11-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The tasks that are listed on this slide are described in detail in the WebSphere Application
Server V8.5 Information Center. See the articles on troubleshooting.
Notes:
It is often suggested that you have verbose GC enabled permanently in production. The
cost on a reasonably well-tuned JVM is small. The benefits of having it on the first time
something happens are considerable (no necessity to reproduce the problem a second
time after enabling). It is also good to keep an eye on the verbose GC regularly as a way to
monitor the health of the system, even when nothing bad is noticed.
Enabling verbose GC is a decision that each system administrator must make
conscientiously. However, it is no longer “not recommended as a normal production
setting.”
11-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Clicking the Java dumps and cores link opens the panel that is shown in the screen
capture. Use this panel to generate heap dumps, Java cores, or system dumps for a
running process. Select the server and click the appropriate button for Heap dump, Java
core (thread dump), or System dump (JVM core). The files that result from these
operations are placed on the local file system; by default they are written to the profile root
directory, was_root/profiles/profile-name.
• Heap dump: A heap dump is a snapshot of JVM memory. It shows live objects in the
memory and references between them.
• Java core: Use this button to investigate why a server is hanging or to investigate
messages in the logs that indicate a thread did not complete its work in the expected
amount of time.
• System dump: Use this button to generate system native dumps of the server process.
These dumps can be large.
11-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Run the following wsadmin Jacl commands:
set jvm [$AdminControl completeObjectNametype=JVM, process=<SERVER_NAME>,*]
Thread dumps also can be helpful in detecting performance problems. Take a few (at least
three) snapshots of the JVM (about 2–3 minutes apart). Analyze the javacore file to see
what different threads are doing in each snapshot.
For example, a series of snapshots where container threads are in the same method or
waiting on the same monitor or resource is an indication of a bottleneck, hang, or deadlock.
Notes:
IBM Support Assistant includes a tool for inspecting Java memory dumps, called the
Memory Analyzer. You can start it from the IBM Support Assistant workbench “tools” tab.
This tool can analyze several Java heap dump formats, including the standard dump
formats from both the IBM and Sun Java runtime environments, and also z/OS SVC
dumps. It lists and analyzes the data structures in the heap and their relationships, helping
you identify the structures that are most likely responsible for memory leakage.
11-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Application threads can hang for a number of reasons, including infinite loops or deadlocks.
A component that is known as the ThreadMonitor monitors the web container, ORB, and
Async bean thread pools for hung threads. The thread monitor does not try to deal with the
hung threads; it just issues notifications so that the administrator or developer can deal with
the issues.
When a hung thread is detected, three notifications are sent: a JMX notification is sent for
JMX listeners, PMI Thread Pool data is updated for tools like the Tivoli Performance
Viewer, and a message is written to the SystemOut log.
When the thread pool gives work to a thread, it notifies the thread monitor. The thread
monitor notes the thread ID and timestamp. The thread monitor compares active threads to
timestamps.
Threads that are active longer than the time limit are marked “potentially hung.”
Performance impact is minimal (less than 1%).
Notes:
Applications can suffer from performance problems and even “hang” if they do not close
their connections properly. Not properly using the connection.close() method often
causes a leak. To ensure that connections are closed properly, they must be closed in a
finally{} block.
WebSphere eventually times out orphaned connections and returns them to the pool, but
for an application that makes frequent use of database connections, this timeout might not
be enough. New connections can get queued up waiting for the database while old
connections are waiting to be timed out. This behavior can halt the application, and you can
see connectionWaitExceptions.
The connection manager has lower performance impact than connection manager tracing.
When activated, it enables a connection manager wrapper that holds the stack trace of all
getConnection() calls in a throwable object. When an exception is thrown because of
waiting on a full connection pool, it is best to print stack traces of all open connections. This
action enables you to significantly narrow your search area when you look at the
application source code in an attempt to find the responsible code.
11-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Connection leaks are difficult to diagnose because the error messages do not usually
provide enough specific information about the source of the problem. Usually a source
code review is needed to find points in the code where connections are not properly closed.
The connection manager makes this task much easier.
Figure 11-37. Checking version levels and applying APARs WA855 / VA8551.0
Notes:
The versionInfo command generates a report from data that is extracted from XML files
in the properties/version folder. The report includes a list of changed components and
installed or uninstalled maintenance packages.
APAR is an Authorized Program Analysis Report; it tracks software defects that customers
report.
Download suggested fix packs for your version of the product from the WebSphere Support
website.
IBM Installation Manager is a new standard tool for installing fixes.
11-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Problem determination
tools
Notes:
11-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Some tools are separate programs that are shipped with WebSphere
Application Server itself, or shipped as separate products in their own
right
– dumpNameSpace
– versionInfo
– Rational Application Developer
Notes:
In the overall process of problem determination, diagnostic data must be collected or
generated, and the data must be analyzed. Various tools are available to help you collect
and analyze diagnostic data for solving problems that are related to JVM, server and
application configuration, performance, and namespace issues.
• Configuration validation
– Checks for errors in a WebSphere Application Server configuration
• Diagnostic Provider
– Tool for viewing configuration and the current state of individual application
server components
Notes:
The administrative console provides several tools that can be used for troubleshooting and
problem determination. See the WebSphere Application Server V8.5 Information Center for
more details about how to use these tools.
11-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Usage: dumpNameSpace [-keyword value]
If a keyword occurs more than one time with different values, the value that is associated
with the last occurrence is used.
The keywords and associated values are:
• -host myhost.austin.ibm.com: Bootstrap host; it is the WebSphere host whose
namespace you want to dump. It defaults to “localhost.”
• -port nnn: Bootstrap port, defaults to 2809.
• -factory com.ibm.websphere.naming.WsnInitialContextFactory: The initial
context factory that is going to be used to get the JNDI initial context. It defaults as
shown, and normally is not required to be changed.
-root [cell | server | node | host | legacy | tree | default]
11-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
11-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The IBM Support Assistant is a free, stand-alone application that is installed on any
workstation. It can also be enhanced by installing plug-in modules for the IBM products you
use.
Benefits of IBM Support Assistant include:
• Improves your ability to locate IBM support, development, and educational information
through a federated search interface (one search: multiple resources).
• Provides quick access to the IBM Education Assistant and key product education
roadmaps.
• Simplifies access to IBM product home pages, product support pages, and product
forums or newsgroups, through convenient links.
• Saves time in submitting problems to IBM Support by collecting key information, then
electronically creating a problem management record (PMR) from within IBM Support
Assistant. If a PMR must be opened, IBM Support Assistant helps with:
- Gathering support information that is based on problem type
11-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 11-44. IBM Support Assistant workbench home page WA855 / VA8551.0
Notes:
Follow these steps to download and install IBM Support Assistant:
1. Go to http://www.ibm.com/software/support/isa/ and choose IBM Support
Assistant V4. Download the installation package for any platform where you want to
install IBM Support Assistant.
2. Log in with your IBM web identity (the same ID as used for MySupport and
developerWorks).
3. If you do not already have an IBM web identity, complete the free registration process to
obtain one.
4. Download the compressed archive files with the web service proxy.
5. Use a tool such as WinZip to extract the archive file in a temporary directory.
6. The archive contains an installer program and the Installation and troubleshooting
guide. Follow the directions in the Installation and troubleshooting guide to install IBM
Support Assistant.
• You can also narrow your search by selecting specific IBM software
products and versions
Notes:
Search options are provided to help you narrow the scope of your search. The search
location that you choose determines what search options are available. For example, if you
select Google web search, search options do not apply. The IBM developerWorks and IBM
Newsgroups and Forums search locations allow you to narrow your search to specific
product areas.
• The IBM Software Support Documents search location offers the most options. You
can select specific products and versions, and you can select specific types of
documents.
• The online information centers are available only for products that enable this feature.
Not all products have an information center to search.
• The product information component helps you quickly find helpful IBM websites.
• With product information links, you can access support, troubleshooting, and
educational options, including traditional classes, web-based training, CD-ROM
training, and certification.
11-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • Select a link, depending on what type of product information you are looking for.
• Select the Product home page to find introductory information, with descriptions of
features, benefits, and requirements. You can also find links to product literature,
events, news, and success stories.
• Select the Product Support page to search IBM software support documents that
pertain to your product. This page also provides links to support resources such as My
Support, Passport Advantage, and support news flashes.
• Select Product Forums to see and contribute to product discussions.
• Select the Skills Enhancement links to see education-related documents for your
product.
• Select the troubleshooting links to see product-specific troubleshooting information.
• Configuration tools
– Port Scanning Tool: scan system for active and configured ports
– Visual Configuration Explorer: visualize, explore, and analyze configuration
information from diverse sources
– Others
• JVM-based tools
– Thread and Monitor Dump Analyzer: analyze javacore files
– Garbage Collector and Memory Visualizer: analyze verbose GC logs
– Memory Analyzer: analyze heap dumps for leak suspects
– Java Health Center: monitor active JVMs with minimal effect on performance
– Others
Notes:
The tools component is a way to provide support tools to you. These tools can be used
diagnostically to identify problems you are having. Some tools can also be used as a
preventive measure to stop a problem before it occurs.
This component provides a way to use support-related tools to identify problems or
health-checking tools to prevent problems. The Updater component of IBM Support
Assistant is used to install tools. A tool is started in a new window by clicking its name.
11-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• System collectors
– Collect system data information
– Collect network information
– Collect software inventory
– Others
Figure 11-47. IBM Support Assistant: Collect Data component WA855 / VA8551.0
Notes:
Collecting data is optional, but proactive collection of diagnostic data can help you
troubleshoot problems with IBM software and help IBM resolve your service requests
faster. If you are troubleshooting a problem on your own or intend to submit a service
request, collect data first. You can store the collected data in a case (a placeholder for all
the items that are related to a particular issue) in the Case Manager. Using a case helps to
organize your problem determination (PD) efforts and allows you to send it to IBM when
you create a service request.
Figure 11-48. IBM Support Assistant: Collect and send data WA855 / VA8551.0
Notes:
Collect data:
Collecting data is an important part of submitting a problem report because IBM can use it
to resolve your problem report more quickly.
When you click Collect Data, you are asked to select the product for which you would like
to collect data. You are prompted to select a problem type as well.
Depending on the product you select, you might be asked for other information. When you
select a product and provide the required information, click Collect.
For most problem types, IBM Support Assistant collects data for the product you select and
stores it in a JAR file. For some problem types, the information that is collected results in a
report file or a simple message to the user. You can collect data for more than one product
at a time if you want.
Manage problem reports:
To manage problem reports, you must log in. After you are logged in, you can:
11-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
Download IBM Support Assistant 5.0 Beta from:
http://www.ibm.com/software/support/isa
In this Beta release, new problem determination tools are included, and the number of tools
will continue to grow in future releases. Report-generating tools from the technology
preview, along with the new addition of Desktop tools (by using Java Webstart) and
web-based tools, include the following tools:
• Garbage Collection and Memory Visualizer (GCMV) [desktop]
• Garbage Collection and Memory Visualizer (GCMV) [report]
• Health Center
• Memory Analyzer [desktop]
• Memory Analyzer [report]
• Memory Analyzer Web Edition [web]
• Pattern Modeling and Analysis tool for Java Garbage Collector (PMAT)
11-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Figure 11-50. IBM Support Assistant 5.0 Beta: New features WA855 / VA8551.0
Notes:
IBM Support Assistant is provided with two deployment options to meet your needs:
• If you have an existing WebSphere Application Server, you can install IBM Support
Assistant as an enterprise application (EAR) module. Tools are provided as Java
Platform, Enterprise Edition web modules.
• IBM Support Assistant 5.0 Beta is also provided with an embedded server if you are
looking for an all-in-one package that allows you to extract and go.
11-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 11-51. Using the IBM Support Assistant Data Collector (1 of 2) WA855 / VA8551.0
Notes:
The IBM Support Assistant Data Collector for WebSphere Application Server tool focuses
on automatic collection of problem data. It also provides symptom analysis support for the
various categories of problems that IBM software products encounter. Information pertinent
to a type of problem is collected to help identify the origin of the problem under
investigation. The tool assists customers by reducing the amount of time it takes to
reproduce a problem with the correct RAS tracing levels set. Also, the tool helps customers
by reducing the effort that is required to send the appropriate log information to IBM
Support.
Figure 11-52. Using the IBM Support Assistant Data Collector (2 of 2) WA855 / VA8551.0
Notes:
Run the IBM Support Assistant Data Collector tool with the user ID for which you
configured your WebSphere Server instance. Depending on what collection you are
running, you are asked for more information to complete the data collection activities. A
script might ask for more configuration information, information about the sequence of
events that leads up to the problem you are dealing with, or your preferences about how it
completes the collection. At each step, the choices are presented as numbered lists, and
you input the number of your selection and press the Enter key. When input is required,
prompts are displayed at which you enter your response and press the Enter key. You can
find collection details for each WebSphere Application Server problem type in its
corresponding MustGather documents.
11-72 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe a basic approach for problem determination
• List resources for completing a problem investigation
• Locate relevant log files
• Examine log activity
• Enable tracing on specific components
• Enable high performance extensible logging (HPEL) and use the Log
Viewer
• Locate other troubleshooting tools
• Use the IBM Support Assistant
Notes:
Checkpoint questions
1. What are the two approaches for problem determination?
2. In basic mode logging, what are the two types of JVM log files, and
what data do they contain?
4. What are the three major features of the IBM Support Assistant that
are accessible from the Welcome screen?
Notes:
Write your answers here:
1.
2.
3.
4.
5.
11-74 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. What are the two approaches for problem determination?
– Analysis and isolation
2. In basic mode logging, what are the two types of JVM log files, and
what data do they contain?
– The SystemOut.log file contains messages from different server
components. Mostly informational, these messages log events that occur
during the lifetime of the JVM. The SystemErr.log file contains any
exceptions and stack traces that server components throw.
4. What are the three major features of the IBM Support Assistant that
are accessible from the Welcome screen?
– Find Information, Analyze Problem, Collect, and Send Data
Notes:
Exercise 7
Problem determination
Notes:
11-76 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Use the administrative console to configure and view log data
• Enable a server to use HPEL
• Enable tracing on application server components
• Use the HPEL Log Viewer to examine log and trace data
• Enable verbose garbage collection for an application server
• Enable memory leak detection for an application server
• Describe how IBM Support Assistant tools can be used to analyze JVM
memory dumps
Notes:
11-78 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Use wsadmin to enter administrative commands
• Create Jython scripts to run wsadmin commands
• Customize the wsadmin environment with profiles and property files
• Use property file based configurations to modify an environment
• Use IBM Assembly and Deploy Tools for WebSphere Administration
to edit and debug Jython scripts
• Configure and use command assist to develop wsadmin scripts
Notes:
12-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Command-line Web-based
C:\> wsadmin administrative
console
Admin
Admin application
Jython or Jacl services
script Read
Write
Configuration
Application server (XML files)
Notes:
You can use the administrative console or wsadmin tool to manage an application server
and the configuration, application deployment, and server runtime operations.
The administrative console is a graphical interface that allows you to manage your
applications and do system administration tasks for your WebSphere Application Server
environment. The administrative console runs in your web browser.
The wsadmin tool is a command-line client that runs Jython or Jacl scripts that allow you to
manage your applications and do system administration tasks for your WebSphere
Application Server environment.
Your actions that use the administrative console or wsadmin can access (read) and modify
(write) a set of XML configuration files that are used to describe the application server
environment.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Scripting benefits
• Automation of routine administration tasks
Notes:
There are several benefits for using scripting to manage an application server and the
configuration, application deployment, and server runtime operations:
• Automation of routine administration tasks without relying on an operator to run the
administrative console
• Schedule administration tasks to run at times when it might be inconvenient to have an
operator to run the administrative console
• Support changes in production environments, especially with multiple nodes
• Apply configuration changes and updates to all targeted resources in an efficient and
consistent manner
Using wsadmin is safer than using the administrative console in production environments.
12-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
wsadmin
• Provides:
– Scripting capabilities
– Command-line administration
• Support for:
– Python commands through Jython
– Tcl commands through Java Command Language (Jacl)
• Modes:
– Interactive
– Command-line
– Script file
• Examples:
– Start and stop deployment manager, nodes, application servers, enterprise
applications, and clusters
– Configure virtual hosts, JDBC providers, JMS resources
– Create application servers
– Create clusters and add members to a cluster
© Copyright IBM Corporation 2013
Notes:
The WebSphere administrative (wsadmin) scripting program is a powerful, non-graphical
command interpreter environment, enabling you to run administrative operations in a
scripting language. The wsadmin tool is intended for production environments and
unattended operations. The wsadmin tool provides:
• Scripting capabilities
• Command-line administration
The wsadmin tool uses the Bean Scripting Framework (BSF), which supports various
scripting languages to configure and control your WebSphere Application Server
installation. The wsadmin tool provides support for:
• Python commands through Jython
• Tcl commands through Java Command Language (Jacl)
The wsadmin launcher makes administrative objects available through language-specific
interfaces. Scripts use these objects for application management, configuration,
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
wsadmin
-h (help) or -?
-c <command>
-f <script_file_name>
-p <properties_file_name>
-profile <profile_script_name>
-profileName <profile_name>
-lang
-conntype [SOAP | RMI | JSR160RMI | IPC | NONE ]
-host
-user or username
-password
-port
Notes:
There are several wsadmin invocation options available. Use the following command-line
invocation syntax for the wsadmin scripting client:
• -h, -help, -?
Provides syntax help.
• -c <command>
Specifies to run a single command. Multiple -c options can exist on the command line.
They run in the order that you designate. If you start the wsadmin tool with the -c
option, any changes that you make to the configuration are saved automatically.
• -f <script_file_name>
Specifies a script to run. Only one -f option can exist on the command line. You can
use the -f option to run scripts that contain nested Jython scripts. The second level is
the user default, wsadmin.properties, which is in your home directory.
• -p <properties_file_name>
Specifies a properties file. The file that is listed after -p represents a Java properties
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
file that the scripting process reads. Three levels of default properties files load before
the properties file that you specify on the command line.
- The first level is the installation default, wsadmin.properties, which is in the
product properties directory.
- The second level is the user default, wsadmin.properties, which is in your home
directory.
- The third level is the properties file that the environment variable
WSADMIN_PROPERTIES references.
Multiple -p options can exist on the command line. Those options start in the order that
you supply them.
• -profile <profile_script_name>
Specifies a profile script. The profile script runs before other commands, or scripts. If
you specify -c, then the profile script runs before it starts this command. If you specify
-f, then the profile script runs before it runs the script. In interactive mode, you can use
the profile script to do any standard initialization that you want.
You can specify multiple-profile options on the command line, and they start in the order
that you supply them.
• -profileName <profile_name>
Specifies the profile from which the wsadmin tool runs. Specify this option if one of the
following reasons applies:
- You run the wsadmin tool from the <was_root>/bin directory, and you do not have
a default profile, or you want to run in a profile other than the default profile.
- You are currently in a profile bin directory but want to run the wsadmin tool from a
different profile.
• -lang
Specifies the language of the script file, the command, or an interactive shell. The
possible languages include Jacl and Jython. The options for the -lang argument
include jacl and jython.
This option overrides language determinations that are based on a script file name, a
profile script file name, or the com.ibm.ws.scripting.defaultLang property. The
-lang argument has no default value.
If you do not specify the -lang argument but you have the -f <script_file_name>
argument, then the wsadmin tool determines the language, which is based on a target
script file name. If you do not specify the -lang argument and the -f argument, the
wsadmin tool determines the language, which is based on a profile script file name if the
-profile <profile_script_name> argument is specified. If the command line or the
property does not supply the script language, and the wsadmin tool cannot determine it,
then an error message is generated.
12-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • -conntype
Specifies the type of connection to use. This argument consists of a string that
determines the type – for example, SOAP – and the options that are specific to that
connection type. Possible types include:
SOAP
RMI
JSR160RMI
IPC
NONE
For each connection type, you can specify more attributes about the connection.
An example of when NONE can be used is when the application server configuration
files are so corrupted that the application server cannot be started to access the
administrative tasks of the running server.
• -host
Specifies a host name to which wsadmin attempts to connect. The default
wsadmin.properties file that is in the properties directory of each profile provides
localhost as the value of the host property, if this option is not specified.
• -user or -username
Specifies a user name that the connector uses to connect to the server if security is
enabled in the server.
• -password
Specifies a password that the connector uses to connect to the server, if security is
enabled in the server.
• -port
Specifies a port that the connector uses. The default wsadmin.properties file that is
in the properties directory of each application server profile provides a value in the port
property to connect to the local server.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The wsadmin tool supports Jython and Jacl scripting languages.
• Jython scripting language: Jython is an alternative implementation of Python, and is
written entirely in Java.
- The wsadmin tool uses Jython V2.1.
- Jython syntax might seem more natural to Java or C programmers.
- Future investment and strategic direction focus on the Jython language. Jython has
much better support for tools:
• IBM Assembly and Deploy Tool (Jython editor, command completion, debugger)
• Administrative console (console command assistance)
- The product uses a Jython version that does not support Microsoft Windows 2003 or
Windows Vista operating systems.
• Jacl scripting language: Jacl is an alternative implementation of Tcl, and is written
entirely in Java code.
12-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2 Configuration of
WebSphere Application
Cell config
Server installations Node01 config
(repository) Configuration repository
server1 config
server2 config
3 Installed Applications
EAR files installedApps directory
Notes:
WebSphere Application Server system management separates administration functions
into two categories:
• Running objects in WebSphere Application Server installations: The wsadmin tool
can be used to install, uninstall, and manage applications. There are two methods you
can use to install, uninstall, and manage applications.
- You can use the commands for the AdminApp and AdminControl objects to start
operations on your application configuration.
- Alternatively, you can use the AdminApplication and BLAManagement Jython
script libraries to do specific operations to configure your enterprise and
business-level applications.
• Configuration of WebSphere Application Server installations (repository): The
wsadmin tool can be used to configure application servers in your environment.
12-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty - You can use the commands for the AdminConfig and AdminTask objects to
retrieve configuration IDs and start operations on the objects to configure the
application server.
- Alternatively, you can use the script library for specific operations to configure your
application servers.
An application server configuration provides settings that control how an application
server provides services for running applications and their components.
Configuration data is stored in several different XML files, which the server runtime
reads when it starts and responds to the component settings stored there. The
configuration data includes the settings for the runtime, such as Java virtual machine
(JVM) options, thread pool sizes, container settings, and port numbers the server uses.
Other configuration files define Java Platform, Enterprise Edition resources to which the
server connects to obtain data that the application logic needs.
Security settings are stored in a separate document from the server and resource
configuration. Application-specific configurations, such as deployment target lists,
session configuration, and cache settings, are stored in files under the root directory of
each application. When viewing the XML data in the configuration files, you can discern
the relationship between the configuration objects.
For information about the WebSphere Application Server configuration objects, view the
HTML tables in the <was_root>/web/configDocs directory. There are several
subdirectories, one for each configuration package in the model. The index.html file
ties all of the individual configuration packages together in a top-level navigation tree.
Each configuration package lists the supported configuration classes, and each
configuration class lists all of the supported properties. The properties with names that
end with the @ character imply that property is a reference to a different configuration
object within the configuration data. The properties with names that end with the *
character imply that the property is a list of other configuration objects.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
AdminConfig
AdminTask
Resources
Help
Notes:
The wsadmin tool acts as an interface to Java objects by way of scripts to access
resources. The tool uses the same interface (through JMX) as the administrative console to
make configuration changes and control servers.
Five objects are available when you use scripts:
• AdminControl: Use AdminControl to run operational commands, work with “live”
running objects, and do traces or data type conversions.
• AdminConfig: Use AdminConfig to run configuration commands to create or modify
WebSphere Application Server “static” configurational elements.
• AdminApp: Use AdminApp to install, modify, or administer applications.
• AdminTask: Use AdminTask to run administrative commands that are easier to use
and more task-oriented.
• Help: Use Help to obtain general help.
12-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Starting wsadmin
• Interactively wsadmin
Notes:
The wsadmin tool can be started in three ways:
• Interactively: wsadmin
Run wsadmin with an option other than -f or -c or without an option. The wsadmin
tool starts and provides an interactive shell with a wsadmin prompt. From the wsadmin
prompt, enter any Jacl or Jython command. You can also use the AdminControl,
AdminApp, AdminConfig, AdminTask, or Help wsadmin objects to start commands. To
leave an interactive scripting session, use the quit or exit command. The graphic
demonstrates wsadmin in an interactive mode:
<was_root>\profiles\profile1\bin\wsadmin
• Command option: wsadmin -c <command>
Run the wsadmin tool with the noninteractive -c option. The graphic demonstrates
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
wsadmin by using the command option to run the list command for the AdminApp object
that uses Jython.
<was_root>\profiles\profile1\bin\wsadmin -c print(AdminApp.list()) -lang
jython
• Script file: wsadmin -f <script_file>
Run the wsadmin tool with the noninteractive -f option, and place the commands that
you want to run into a script file. The graphic demonstrates wsadmin by using the script
file option to run a Jython script.
<was_root>\profiles\profile1\bin\wsadmin -f c:\Program Files\IBM\
WebSphere\AppServer\profiles\profile1\bin\initialSIBSetup.jy
When running wsadmin with the -f option, you are not required to specify the script
language with the -lang command-line option. The wsadmin command recognizes
the script language by looking at the extension of the file name (.py for Jython and
.jacl for Jacl).
12-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
– Command-line parameters
Notes:
WebSphere Application Server console security is enabled by default.
• If security is enabled, authentication information must be supplied.
• There are several ways to provide authentication information:
- Prompted:
If security is enabled and you do not provide credentials when you start wsadmin,
you are prompted to provide them. The Login at the Target Server window opens.
Two fields, User Identity and User Password, must be entered with valid
credentials before proceeding.
- Command-line parameters:
You can use command-line parameters to pass authentication credentials.
• -user or -username can be used interchangeably to provide a user ID.
• -password is used to provide a password.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
wsadmin properties
• Certain default behaviors for wsadmin can be changed by editing:
<profile_root>\<profile_name>\properties\wsadmin.properties
Notes:
Scripting administration uses several Java properties files. Properties files can be used to
control your system configurations. Before any properties file is specified on the command
line, three levels of default properties files are loaded. These properties files include:
• Installation default file: The first level represents an installation default, which is in the
profile_root/properties directory for each application server profile called
wsadmin.properties.
• User default file: The second level represents a user default, and is in the Java
user.home property. This properties file is also called wsadmin.properties.
• Properties file: The third level is a properties file that is pointed to by the
WSADMIN_PROPERTIES environment variable. This environment variable is defined in the
environment where the wsadmin tool starts.
If one or more of these properties files are present, they are interpreted before any
properties file that is present on the command line. The three levels of properties files load
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
in the order that they are specified. The properties file that is loaded last overrides the ones
that are loaded earlier.
Certain default behaviors for wsadmin can be changed by editing:
<profile_root>\<profile_name>\properties\wsadmin.properties
Examples of properties include:
• com.ibm.com.ws.scripting.connectionType=SOAP
Determines the connector to use. This value can either be SOAP, JSR160RMI, RMI, IPC,
or NONE. The wsadmin.properties file specifies SOAP as the connector.
• com.ibm.com.ws.scripting.port=8880
Specifies the port to use when attempting a connection. The wsadmin.properties file
specifies 8879 as the SOAP port for a single server installation.
• com.ibm.com.ws.scripting.host=localhost
Determines the host to use when attempting a connection. If not specified, the default is
the local host.
• com.ibm.com.ws.scripting.defaultLang=jython
Indicates the language to use when running scripts. The wsadmin.properties file
specifies Jacl as the scripting language. The supported scripting languages are Jacl
and Jython.
If you change this value to Jython, some WebSphere Application Server scripts that
depend on the default language of Jacl fail unless rewritten to call wsadmin with the
-lang jacl command-line option.
• com.ibm.com.ws.scripting.traceFile=
Determines where trace and log output is directed. The wsadmin.properties file
specifies the wsadmin.traceout file that is in the <profile_root>/logs directory of
each application server profile as the value of this property.
• com.ibm.com.ws.scripting.validationOutput=
Determines where the validation reports are directed. The default file is
wsadmin.valout, which is in the <profile_root>/logs directory of each application
server profile.
• com.ibm.com.ws.scripting.traceString=com.ibm.*=all=enabled
Turns on tracing for the scripting process. The default has tracing turned off.
• com.ibm.com.ws.scripting.profiles=
Specifies a list of profile scripts to run automatically before running user commands,
scripts, or an interactive shell.
• com.ibm.com.ws.scripting.emitWarningForCustomSecurityPolicy=true
Controls whether the WASX7207W message is emitted when custom permissions are
found. The possible values are true and false. The default value is true.
12-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • com.ibm.com.ws.scripting.tempdir=
Determines the directory to use for temporary files when installing applications. The
Java virtual machine (JVM) API uses java.io.temp as the default value.
• com.ibm.com.ws.scripting.validationLevel=
Determines the level of validation to use when configuration changes are made from
the scripting interface. Possible values are: NONE, LOW, MEDIUM, HIGH, and HIGHEST.
The default is HIGHEST.
• com.ibm.com.ws.scripting.crossDocumentValidationEnabled=
Determines whether the validation mechanism examines other documents when
changes are made to one document. Possible values are true and false. The default
value is true.
• com.ibm.com.ws.scripting.classpath=
Searches for classes and resources, and is appended to the list of paths.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Profile scripts
• Profile scripts can be used to preload wsadmin with predefined settings
and functions
• Run during wsadmin startup
• Either of the following can call a profile script:
– Using the –profile option on the command line
– Defined in wsadmin.properties com.ibm.ws.scripting.profiles=
Notes:
Profile scripts can be used to preload wsadmin with predefined settings and functions.
Profile scripts are run during wsadmin startup. They can be called in one of two ways:
• Use the -profile option on the command line.
• Use the com.ibm.ws.scripting.profiles= property to define the profile script in
wsadmin.properties.
The profile script runs before other commands, or scripts. If you specify -c, then the profile
script runs before it starts this command. If you specify -f, then the profile script runs
before it runs the script. In interactive mode, you can use the profile script to do any
standard initialization that you want.
You can specify multiple -profile options on the command line, and they start in the
order that you supply them.
12-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty The graphic example identifies a Jython script named global_profile.py with the
following syntax:
#-----------------------------------------------
# Print whereAMI
#-----------------------------------------------
def whereAMI():
#Print cell and node names
print "Cell: " + AdminConfig.showAttribute(AdminConfig.list("Cell"), "name")
print "Node: " + AdminConfig.showAttribute(AdminConfig.list("Node"), "name")
return
#-----------------------------------------------
# Start of main
#-----------------------------------------------
print ""
print "Hello, and welcome to wsadmin using jython"
print ""
print "Running global_profile.py Global definitions and settings could be
added"
print "here. It would also be possible to extend wsadmin by defining new"
print "customized commands and procedures."
print ""
whereAMI()
print ""
The following example output demonstrates that wsadmin started by using the -profile
option to run the global_profile.py script:
C:\Program Files\IBM\WebSphere\AppServer\profiles\profile1\bin\wsadmin
-profile c:\software\wsadmin\global_profile.py
WASX7209I: Connected to process "server1" on node was7host01Node01 using
SOAP connector; The type of process is: UnManagedProcess
Hello, and welcome to wsadmin using jython
Running global_profile.py Global definitions and settings could be added
here. It would also be possible to extend wsadmin by defining new
customized commands and procedures.
Cell: was7host01Node01Cell
Node: was7host01Node01
WASX7031I: For help, enter: "print Help.help()"
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Example:
wsadmin> AdminConfig.list
wsadmin> AdminConfig.list ('Server')
('Server')
'server(cells/was8host01Node01Cell/nodes/was8host01Node01/servers/server1
'server(cells/was8host01Node01Cell/nodes/was8host01Node01/servers/server1
|server.xml#Server_1183122130078
|server.xml#Server_1183122130078
wsadmin>
wsadmin>
Notes:
Management configuration scripts use the AdminConfig object to access the repository
where configuration information is stored.
Here is an example of AdminConfig:
wsadmin>AdminConfig.list ('Server')
You can use the AdminConfig object to:
• List configuration objects and their attributes
• Create configuration objects
• Modify configuration objects
• Remove configuration objects
• Obtain help
12-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Application management scripts use the AdminApp object to manage applications in the
application server configuration.
Here is an example of AdminApp:
wsadmin>AdminApp.view ('ivtApp')
Running the command produces output specific to the application. In the Jython command,
output is easier to read when using the print option:
wsadmin>print AdminApp.view ('ivtApp')
You can use the AdminApp object to:
• Install and uninstall applications
• List installed applications
• Edit application configurations
• Obtain help
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Operation management scripts use the AdminControl object to communicate with the
MBeans that represent running objects.
Here is an example of AdminControl:
wsadmin>AdminControl.getPort()
You can use the AdminControl object to:
• List running objects and their attributes
• Start actions on running objects
• Obtain dynamic information about MBeans that represent running objects
• Obtain help
The number and type of MBeans available to the scripting client depend on the server to
which the client is connected. If the client is connected to a deployment manager, then all
the MBeans running in the deployment manager are visible. All the MBeans running in the
12-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty node agents that are connected to this deployment manager, and all the MBeans running in
the application servers on those nodes, are visible.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The AdminTask object is used to access a set of administrative commands that provide an
alternative and easier way to access configuration commands. AdminTask commands
enable you to run a single command for administrative actions that might otherwise require
multiple commands.
Here are examples of AdminControl:
wsadmin>AdminTask.binaryAuditReader('-interactive')
wsadmin>AdminTask.listServers()
The benefits of using AdminTask include:
• Provides commands that are more task-oriented and easier to use
• Runs simple and complex commands
• Commands are grouped, based on function
• Can be run in batch or interactive mode
• Can be run in connected or local mode
12-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty The administrative commands are discovered dynamically when you start a scripting client.
The set of available administrative commands depends on the edition of WebSphere
Application Server you install. You can use the AdminTask object commands to access
these commands.
Administrative commands are grouped based on their function. You can use administrative
command groups to find related commands. For example, the administrative commands
that are related to server management are grouped into a server management command
group. The administrative commands that are related to the security management are
grouped into a security management command group. An administrative command can be
associated with multiple command groups because it can be useful for multiple areas of
system management. Both administrative commands and administrative command groups
have names that uniquely identify them.
Two run modes are always available for each administrative command, namely the batch
and interactive modes. When you use an administrative command in interactive mode, you
go through a series of steps to collect your input interactively. This process provides users
a text-based wizard and a similar user experience to the wizard in the administrative
console. You can also use the help command to obtain help for any administrative
command and the AdminTask object.
The administrative commands do not replace any existing configuration commands or
running object management commands, but provide a way to access these commands and
organize the inputs. The administrative commands can be available in connected or local
mode. The set of available administrative commands is determined when you start a
scripting client in connected or local mode. If a server is running, do not run the scripting
client in local mode because any configuration changes made in local mode are not
reflected in the running server configuration, and the reverse is also true. If you save a
conflicting configuration, you can corrupt the configuration.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
You can find general help and dynamic online information about the currently running
MBeans with the wsadmin tool. Use the Help object as an aid in writing and running scripts
with the AdminControl object.
Here are examples of commands available for the Help object:
• AdminConfig
Use the AdminConfig command to view a summary of each available method for the
AdminConfig object.
• AdminTask
Use the AdminTask command to view a summary of help commands and ways to start
an administrative command with the AdminTask object.
• AdminControl
Use the AdminControl command to view a summary of the help commands and
ways to start an administrative command.
12-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • AdminApp
Use the AdminApp command to view a summary of each available method for the
AdminApp object.
• help
Use the help command to view a summary of all the available methods for the Help
object.
Here are some Jython examples:
print Help.help()
print Help.AdminConfig()
print Help.AdminTask()
print Help.AdminControl()
print Help.AdminApp()
For complete documentation, see the information center. The information center also
includes a number of examples that demonstrate some useful wsadmin features.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• You can select from three levels of online help for administrative
commands
Notes:
You can select from three levels of online help for administrative commands.
• Top-level help:
Top-level help provides general information for the AdminTask object and associated
commands.
print AdminTask.help()
• Second-level help:
Second-level help provides information about all of the available administrative
commands and command groups.
print AdminTask.help('-commands')
• Third-level help:
Third-level help provides specific help on a command group, a command, or a step.
Command group-specific help provides descriptions for the command group that you
specify and the commands that belong to the associated group. Command-specific help
12-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty provides a description of the specified command, and associated parameters and
steps.
Step-specific help provides a description of the specified step and the associated
parameters. For command and step-specific help, required parameters are marked with
an asterisk in the help output.
print AdminTask.help('listServers')
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Save periodically:
wsadmin>
wsadmin> AdminConfig.save()
AdminConfig.save()
''
''
wsadmin>
wsadmin>
Figure 12-19. Important points to remember when using wsadmin WA855 / VA8551.0
Notes:
When using wsadmin, remember the following important points:
• Commands are case-sensitive.
• Running multiple commands in a script file is faster than running individual commands.
For example, wsadmin -f "script_file_name" is faster than individual commands
with wsadmin -c
• Saving configuration changes is a two-step process:
- The first step validates the changes.
- The second step saves the changes.
• Save periodically in the script file or interactive mode to persist configuration updates to
existing objects.
AdminConfig.save()
12-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
C:\Program
C:\Program Files\IBM\WebSphere\AppServer\profiles\profile1\bin>wsadmin
Files\IBM\WebSphere\AppServer\profiles\profile1\bin>wsadmin –f–f
"C:\software\wsadmin\simple_script.py"
"C:\software\wsadmin\simple_script.py" –username
–username wasadmin
wasadmin –password
–password
********
********
WASX7209I:
WASX7209I: Connected
Connected to
to process
process "server1"
"server1" on
on node
node was8host01Node01
was8host01Node01 using
using
SOAP connector: The type of process is: UnManagedProcess
SOAP connector: The type of process is: UnManagedProcess
Simple
Simple wsadmin
wsadmin scripting
scripting example
example
Cell
Cell name
name is:
is: was8host01Node01Cell
was8host01Node01Cell
Node
Node name
name is:
is: was8host01Node01
was8host01Node01
Notes:
The following is an example of a simple script:
print "Simple wsadmin scripting example."
cell = AdminConfig.list("Cell")
node = AdminConfig.list("Node")
cellName = AdminConfig.showAttribute(cell, "name")
nodeName = AdminConfig.showAttribute(node, "name")
print ""
print "Cell name is: " + cellName
print "Node name is: " + nodeName
An example of the output from this script is:
WASX7209I: Connected to process "server1" on node was7host01Node01 using
SOAP connector; The type of process is: UnManagedProcess
Simple wsadmin scripting example.
Cell name is: was7host01Node01Cell
Node name is: was7host01Node01
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C:\Program
C:\Program Files\IBM\WebSphere\AppServer\profiles\profile1\bin>wsadmin
Files\IBM\WebSphere\AppServer\profiles\profile1\bin>wsadmin –f
–f
"C:\software\wsadmin\simple_script.py"
"C:\software\wsadmin\simple_script.py" –username
–username wasadmin
wasadmin –password
–password
********
********
WASX7209I:
WASX7209I: Connected
Connected to
to process
process "server1"
"server1" on
on node
node was8host01Node01
was8host01Node01 using
using
SOAP
SOAP connector:
connector: The
The type
type of
of process
process is:
is: UnManagedProcess
UnManagedProcess
Simple
Simple loop
loop scripting
scripting example
example
app
app Name:
Name: DefaultApplication
DefaultApplication
app
app Name:
Name: PlantsByWebSphere
PlantsByWebSphere
app
app Name:
Name: ivtApp
ivtApp
app
app Name:
Name: query
query
© Copyright IBM Corporation 2013
Notes:
The following is an example of a looping script:
print "Simple loop script"
print ""
appNames = AdminApp.list()
AppNamesArray = appNames.split('\r\n')
for appName in appNamesArray:
print "App Name: " + appName
Here is an example of the output from these scripts:
WASX7209I: Connected to process "server1" on node was8host01Node01 using
SOAP connector; The type of process is: UnManagedProcess
Simple loop script
App Name: DefaultApplication
App Name: PlantsByWebSphere
App Name: ivtApp
App Name: query
12-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The Jython script library provides a set of procedures to automate the most common
application server administration functions. For example, you can use the script library to
easily configure servers, applications, mail settings, resources, nodes, business-level
applications, clusters, authorization groups, and more. You can run each script procedure
individually, or combine several procedures to quickly develop new scripts.
The Jython script library helps to eliminate the complexities that are associated with
scripting:
• Syntax is complex.
• Incompatible or incorrect parameters are easy to specify.
• Complexity presents a barrier to learning WebSphere.
• Complexity can result in inconsistent and unstable systems that make problem
determination difficult.
• wsadmin provides a low level of abstraction that results in complex mappings between
operations and problems that users are trying to solve.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
– Use the Jython scripting library code as sample syntax to write custom scripts
© Copyright IBM Corporation 2013
Figure 12-23. How to use the Jython script library WA855 / VA8551.0
Notes:
The scripting library provides a set of procedures to automate the most common
application server administration functions. Each script in the script library demonstrates
suggested practices for writing wsadmin scripts.
The script library code is in the <was_root>/scriptLibraries directory. Within this
directory, the scripts are organized into subdirectories according to function, and further
organized according to version. For example, the
<was_root>/scriptLibraries/application/V80 subdirectory contains procedures that
complete application management tasks that are applicable to version 8.0 and later of the
product.
There are three ways to use the Jython script library.
• Interactively:
Run scripts from the Jython script library in interactive mode with the wsadmin tool. You
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
can start the wsadmin tool, and run individual scripts that are included in the script
library:
wsadmin>AdminServerManagement.createApplicationServer("myNode",
"myServer", "default")
• Use a text editor to combine scripts.
Use a text editor to combine several scripts from the Jython script library, as the
following example demonstrates:
#
# My Custom Jython Script - file.py
#
AdminServerManagement.createApplicationServer("profile1", "server1",
"default")
AdminServerManagement.createApplicationServer("profile2", "server2",
"default")
# Use one of them as the first member of a cluster
AdminClusterManagement.createClusterWithFirstMember("cluster1",
"APPLICATION_SERVER", "profile1", "server1")
# Install an application
AdminApplication.installAppWithClusterOption("DefaultApplication",
"..\installableApps\DefaultApplication.ear", "cluster1")
# Start all servers and applications on the node
AdminServerManagement.startAllServers("profile1")
• As sample scripts:
Use the Jython scripting library code as sample syntax to write custom scripts.
12-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
In previous releases of WebSphere Application Server, users used wsadmin, the
administrative console, and Java APIs to query and modify configurator objects. Now users
who work with the WebSphere Application Server configuration repository are confronted
with several issues:
• The repository consists of multiple files in XML and other formats.
• The configuration files are spread across many directories.
• Some files contain complex objects that are associated with the WebSphere Common
Configuration Model.
• Some configuration objects are repeatedly stored in multiple files.
Properties-based file configuration is a tool to help users deal more easily with these
issues. A new set of wsadmin commands is available that can extract and apply properties
files to configuration objects.
The graphic shows JDBCProvider object content from the configuration XML file named
resources.xml.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Using the PropertiesBasedConfiguration command group for the AdminTask object,
you can extract the configuration attributes and values from your environment to properties
files. You can use this feature for various purposes, including:
• To modify your existing configuration in one location, instead of configuring multiple
administrative console panels or running many commands
• To improve the application development lifecycle
Properties file-based configuration offers the following benefits:
• Properties files are more human readable than configuration files, which are in XML or
other formats.
• Properties files consist of a standard name-value pair format.
• The properties file-based configuration decouples configuration data from changes in
the underlying configuration model between releases.
- Automating the configuration process is made easier.
12-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Configuration properties files contain a series of name-value pairs. Each configuration
object is defined in two separate sections:
1. Resource type and identifier
The first section of the example defines a resource type and a resource identifier. The
identifier is often in a format that includes the cell, node, and server names, ending with
a string that contains the resource type and a large number.
In the example, the resource type is JDBC provider.
2. Configuration information
Name-value pairs are used to describe the configuration information.
12-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Properties file-based configuration uses the following five commands:
• extractConfigProperties
The extractConfigProperties command extracts configuration data in the form of a
properties file. The system exports the most commonly used configuration data and
attributes, converts the attributes to properties, and saves the data to a file. You can
specify the resource of interest with the target object or the configData parameter.
Use the configData parameter to specify a server, node, cluster, or application
instance. If no configuration object is specified, the command extracts the profile
configuration data. Here is an example:
AdminTask.extractConfigProperties('-propertiesFileNameserver1.
props -configData Server=server1')
One common scenario for using properties files to work with your configuration is to
extract a properties file, which is based on your current environment. Modify the
extracted file, and then apply the updated properties to your configuration. You can use
any text editor to modify the properties file.
12-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • validateConfigProperties
The validateConfigProperties command verifies that the properties in the
properties file are valid and can be successfully applied to the new configuration. Here
is an example:
AdminTask.validateConfigProperties('-propertiesFileNameserver1.props')
It is a good practice to validate the properties file before applying it to your
configuration. There are two steps to validate a properties file before applying it to the
configuration:
- Use the validateConfigProperties command to validate the properties file.
- Use the applyConfigProperties command and the -validate option to apply
the properties and validate the file simultaneously.
• applyConfigProperties
The applyConfigProperties command applies properties in a specific properties file
to the configuration. The system adds attributes or configuration data to the
configuration if specific properties do not exist. If the properties exist in the
configuration, the system sets the new values for the attributes. Here is an example:
wsadmin>AdminTask.applyConfigProperties('-propertiesFileNameapp.props')
• deleteConfigProperties
The deleteConfigProperties command deletes properties in your configuration as
designated in a properties file. The system removes the attributes or configuration data
that corresponds to each property in the properties file. In the properties file, you must
add the flag DELETE=true to the section that contains the resource identifier for the
object that you want to delete. Then, run the deleteConfigProperties command on
your properties file. Here is an example:
- In the properties file:
#
# SubSection 1.0.1.4 # Thread pools
#
ResourceType=ThreadPool
ImplementingResourceType=Server
ResourceId=Cell=!{cellName}:Node=!{nodeName}:Server=!
{serverName}:ThreadPoolManager=
ID#ThreadPoolManager_1:ThreadPool-myThreadPool
DELETE=true
#
- The command to delete the thread pool would be:
wsadmin>AdminTask.deleteConfigProperties
('-propertiesFileNamethread.props')
If you run the deleteConfigProperties command before you add the DELETE=true
attribute and value to the properties file, the command resets each property to the
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
default value. The system completely removes properties that do not have default
values.
• createPropertiesFileTemplates
Use the createPropertiesFileTemplates command to create template properties
files to use for creating or deleting specific object types. The command stores the
template properties file in the properties file that the propertiesFileName parameter
identifies. Here is an example:
wsadmin>AdminTask.createPropertiesFileTemplates(
'-propertiesFileNameapp.props -configType Application')
There are four different types of properties file templates that you can create with the
createPropertiesFileTemplates command:
- Server
- ServerCluster
- Application
- AuthorizationGroup
The templates are properties files that contain the required parameters to create a
configuration object of a specific type. When you create a template for the application
configuration type, you must provide a resource ID and information about the application
that you are deploying. The properties file template contains comments and instructions for
how to modify and use the template.
12-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Rational
Application
Developer
Assembly and
Deploy
provides:
Figure 12-28. Create, test, and debug Jython scripts WA855 / VA8551.0
Notes:
With the IBM Assembly and Deploy Tool, you can create, test, and debug Jython scripts.
Jython projects and scripts are treated as first-class objects. The Jython editor provides the
same facilities as all other specialized editors, including:
• Full support for Jython projects and sources files
• Ability to create, test, and debug Jython projects and files
• Syntax colored editor, automated formatting, and command completion tools
• A source outline view
• Source-level debugging
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2
Set up debugging
parameters and run
• Enter parameters and
1 click Debug
Select the script and debug option
• Select the menu of the script
• Click Debug As > Administrative Script © Copyright IBM Corporation 2013
Notes:
To start the Jython debugger:
1. Select the script and debug option.
- Highlight the script and right-click to open the menu.
- Click Debug As > Administrative script to open the debugger runtime and security
parameters window.
2. Set up debugging parameters and start the debugger.
- Enter debugging parameters as appropriate. Runtime parameters are categorized
under the following tabs:
• Script
• Arguments
• Classpath
• Source
12-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • Environment
• Common
Debugging a script for the first time requires setup of runtime and security
parameters that are defined under the Script tab:
• Administrative script name
• Scripting runtime environment
• WebSphere profile name
• wsadmin arguments
• Security options include:
- No security on the target server
- As defined in soap.client props or the sas.client.props file
- Specify as user ID and password
Click Debug when parameter input is complete to start the Debug perspective.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Console, Tasks
© Copyright IBM Corporation 2013
Notes:
The Jython debugger perspective is a tool that can help you track the behavior and state of
your Jython scripts and easily pinpoint logic errors. Using the debugger, you can pause the
running script, examine the working code, locate the source of the bug, and locate bugs
that were missed.
The Jython debugger helps to pinpoint logic errors by offering script developers the ability
to do the following functions:
• Trace or highlight code as it is being run
• Inspect and set variables
• Step through Jython script logic
• Set conditional breakpoints
• Show the stack
The debugger perspective is divided into views:
• The Debug view (upper left pane)
12-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Command assistance
• Works in concert with the
administrative console
– Last run commands are made
available to Rational Application
Developer
– Commands can be pasted
directly to Jython scripts
Notes:
Using command assistance, you can see wsadmin scripting commands that correspond to
actions in the administrative console. Seeing these commands might help you develop the
commands necessary to administer WebSphere Application Server from the wsadmin
utility. You can view wsadmin scripting commands in the Jython language for the last action
that runs in the administrative console. Working in concert with the administrative console,
administrative command assistance provides the following capabilities:
• The last commands are made available to Rational Application Developer.
When you do server operations in the administrative console, the administrative
command assistance tool captures and shows the wsadmin commands issued.
• Commands can be pasted directly to Jython scripts.
You can transfer the output from the administrative command view directly to a text
editor, such as the Jython editor, enabling you to develop Jython scripts that are based
on actual console actions.
12-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 12-32. Using command assistance within IBM Assembly and Deploy Tools WA855 / VA8551.0
Notes:
You can use command assistance from IBM Assembly and Deploy Tools, and the
administrative console. To enable command assistance from IBM Assembly and Deploy
Tools, administrative console setup is required.
1. Under Help, click View administrative scripting command for last action.
2. Expand Preferences and enable both preference options.
- Log command assistance commands:
This option logs the command assistance data to a file. A timestamp and the
breadcrumb trail of the panel that produced the command assistance data are
provided with the wsadmin data.
- Enable command assistance notifications:
This option allows command assistance to emit Java Management Extensions
(JMX) notifications. Enablement of the notifications allows integration with product
tools such as the Rational Application Developer Jython editor to assist you in
writing scripts.
12-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Use wsadmin to enter administrative commands
• Create Jython scripts to run wsadmin commands
• Customize the wsadmin environment with profiles and property files
• Use property file based configurations to modify an environment
• Use IBM Assembly and Deploy Tools for WebSphere Administration
to edit and debug Jython scripts
• Configure and use command assist to develop wsadmin scripts
Notes:
12-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. Which of the following is not one of the five Java objects that perform
different operations?
A. AdminConfig
B. AdminControl
C. AdminTask
D. Help
E. AdminStart
Notes:
Write your answers here:
1.
2.
3.
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. Which of the following is not one of the five Java objects that perform
different operations?
E. AdminStart
Notes:
12-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 8
Using wsadmin
Notes:
© Copyright IBM Corp. 2013 Unit 12. Introduction to wsadmin and scripting 12-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise objectives
After completing this exercise, you should be able to:
• Use wsadmin to run administrative commands interactively and with
scripts
• Create a simple administrative script
• Use console command assistance
• Use property file based configuration to modify your settings
Notes:
12-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Describe WebSphere Application Server cell concepts
• Describe and create the deployment manager profile
• Describe and create other profile types
• Describe custom profiles and automatic federation
• Describe the directories and configuration files for profiles
• Add a node by using commands or the administrative console
• Compare the deployment manager administrative console with the
base administrative console
• Compare managed and unmanaged nodes
• Use the administrative console to manage a web server
Notes:
13-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere cells
• A WebSphere cell defines an administrative domain
– Available in WebSphere Application Server Network Deployment
– A deployment manager provides centralized administration for entire cell
– A cell is created as a profile
– Nodes run application components in application servers
Cell
Deployment manager
Node01 Node02
Notes:
A WebSphere cell defines an administrative domain. A cell is a grouping of nodes into a
single administrative domain. A cell can consist of multiple nodes, all administered from a
deployment manager server. When a node becomes part of a cell (a federated node), a
node agent server is created on the node to work with the deployment manager server to
manage the WebSphere Application Server environment on that node. A cell includes the
following characteristics:
• It is available in WebSphere Application Server Network Deployment.
• A deployment manager provides centralized administration for the entire cell.
• A cell is created as a profile.
• Nodes run application components in application servers.
The graphic includes the following cell environment topology:
• A cell encapsulating:
- Deployment manager with connections to the node agents of two nodes
- Node01:
• Node agent with connections to the application servers of the node
• server1
• server2
- Node02:
• Node agent
• server3
• server4
13-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Node agent
– Created and installed when a node is federated into a cell
– Works with the deployment manager to perform administrative activities on the
node
• Deployment manager
– Administers multiple application servers from one centralized manager
– Works with the node agents on each node to manage all the servers in a
distributed topology
– Application server nodes are federated with the deployment manager before the
deployment manager can manage them
Notes:
There are three main types of WebSphere managed processes that make up a cell. These
server types interact to do system administration.
• Application server
- A WebSphere Application Server provides the functions that are required to support
and host user applications.
- An application server runs on only one node, but one node can support many
application servers.
• Node agent
- When a node is federated, a node agent is created and installed on that node.
- The node agent works with the deployment manager to do administrative activities
on the node.
• Deployment manager
- With the deployment manager, you can administer multiple nodes from one
centralized manager.
- The deployment manager works with the node agent on each node to manage all
the servers in a distributed topology.
- Application server nodes are federated with the deployment manager before the
deployment manager manages them.
13-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
server1 server3
Node Node
server2 agent agent server4
Master
configuration
config repository config
Notes:
Deployment manager (dmgr):
• The deployment manager works with the node agent on each node to manage all the
servers in a distributed topology.
• The deployment manager holds the configuration repository for the entire management
domain, called a cell.
• An administrative service runs inside the deployment manager.
• The deployment manager is defined within a profile.
Node:
• A node is a logical group of WebSphere Application Server-managed server processes
that share a common configuration repository.
• A single node agent process manages a node.
• A node is associated with a single WebSphere Application Server profile.
13-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A profile defines the runtime environment for a node. The profile includes all of the files that
the server processes in the runtime environment and that you can change.
A profile defines the application server configuration and runtime environment. The profile
includes all of the files that the server processes in the runtime environment and that you
can change. After installing the core product files for the Network Deployment product, you
must create a profile.
• Profiles represent the nodes:
- Multiple nodes can be installed on a single computer.
- Nodes can contain a single stand-alone application server.
- Nodes can be federated into a cell.
• Each profile uses the same product files regardless of type:
- Cell (deployment manager and a federated application server)
- Management
• Administrative agent
• Deployment manager
• Job manager
- Application server
- Custom profile
- Secure proxy
The graphic includes a diagram that includes:
• WebSphere installation product files (used by all profiles)
• Three sets of profiles (which can be any of seven profile environment types):
- WebSphere profile 1
- WebSphere profile 2
- WebSphere profile 3
• Here is a list of seven profile environment types:
- Cell
- Administrative agent
- Deployment agent
- Job manager
- Application server
- Custom profile
- Secure proxy
13-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Use the application server to make enterprise applications available to the Internet or to an
intranet. Application server profiles provide a base installation.
• Application servers in the Network Deployment product can run as:
- Managed nodes in a deployment manager cell
- Stand-alone application servers
• Multiple application server profiles can be created on a single computer.
• Each application server profile can be federated into a cell.
• Multiple base profiles on a single computer can:
- Be federated into the same cell
- Be federated into different cells
- Remain a stand-alone profile
13-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Can exist on an
independent
Cell
computer
Deployment
• Can exist on a manager
computer with
other profiles
Node01 Node02
• Provides centralized
administration of Node agent Node agent
managed application
server nodes and server1 server2 server2 server3
custom nodes as a
single cell
Notes:
The deployment manager profile provides the necessary configuration files for starting and
managing the deployment manager server that it contains. The profile also provides
everything necessary to configure and manage WebSphere Application Server profiles, or
nodes, that are in the deployment manager cell.
The deployment manager profile contains an application server with a server name of
dmgr. The dmgr application server is a special application server that contains the
deployment manager. The dmgr server contains the Network Deployment administrative
console application and the Network Deployment file transfer application. These
applications enable the distributed management of one or more WebSphere Application
Server profiles, or nodes.
The deployment manager profile:
• Is used to create a deployment manager process (dmgr)
• Can exist on an independent computer
• Can exist on a computer with other profiles
13-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Custom profile
• A custom profile creates a node without an application
• Automatically federated into a cell during profile creation by default
• No application
servers are created Cell
during profile creation
• Use the deployment Deployment
manager
manager administrative
console to create
servers and clusters
on the federated node Node01 Node02
• Consider a custom
profile as a Node agent Node agent
production-ready
shell, ready for server1 server2
customization to
contain your servers Custom
and applications
© Copyright IBM Corporation 2013
Notes:
Use the custom profile, which belongs to a deployment manager cell, to make enterprise
applications available to the Internet or to an intranet under the management of the
deployment manager. A custom profile does not have its own administrative console or
scripting interface. You cannot manage the node directly with the wsadmin scripting facility.
A custom profile does not include default applications or a default server as the application
server profile does. A custom profile is an empty node. Add the node to the deployment
manager cell. Then, you can use the administrative interface of the deployment manager to
customize the managed node by creating clusters and application servers.
In summary:
• A custom profile creates a node without an application.
• A custom profile automatically is federated into a cell during profile creation by default.
In the process, the node agent process is then instantiated on the newly managed
node.
• No application servers are created during profile creation.
• Use the deployment manager administrative console to create servers and clusters on
the federated node.
• Consider a custom profile as a production-ready shell, ready for customization to
contain your servers and applications.
The graphic includes the following cell environment topology:
• A cell encapsulating:
- Deployment manager with connections to two nodes
- Federated Node01:
• Node agent with connections to application servers within the node
• server1
• server2
- Federated Node02 (custom profile):
• Node agent
• No application servers
13-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Creating profiles
Profile Management Tool
• Start menu (Windows only)
• Started from installation wizard
• Launch command-line tool pmt.bat
– <was_root>\bin\ProfileManagement\
– Similar command
exists for UNIX
– Wizard in First steps
console
manageprofiles
• Command-line tool
• Use manageprofiles
-silent option to create
profiles in silent mode
• Other manageprofiles
options include:
-listProfiles -delete © Copyright IBM Corporation 2013
Notes:
You can use the Profile Management Tool or the manageprofiles command to create
profiles.
• Profile Management Tool:
- The tool is started in several ways:
• Start menu (Windows only)
• Started from the installation wizard
• Started with the command-line tool: pmt.bat
- In <was_root>/bin/ProfileManagement/
- A similar command exists for UNIX
• The wizard is available from the First steps console
- The graphic displays the Profile Management Tool Environment Selection window.
Five environments can be selected from the listing:
13-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
2
Create a profile
y Existing
profiles are
shown
y Click Create
© Copyright IBM Corporation 2013
Figure 13-10. Profile Management Tool: Launch and create WA855 / VA8551.0
Notes:
1. To create a profile, launch the Profile Management Tool.
- The tool can be started:
• Following installation, if selected on the installation results window; the Profile
Management Tool welcome window displays
• From Windows Start menu by clicking Start > Programs > IBM WebSphere >
Application Server Network Deployment V8.5 > Profile Management Tool
• From the command line with pmt.bat
- As soon as it is started, click Launch Profile Management Tool to manage profiles.
2. The Profile Management Tool provides a listing of existing profiles and an option to
create a profile.
- The profile list displays existing profiles. In the example, profile1 is shown.
- To begin the process of creating a profile, click Create.
4
Server Type Selection
y Administrative agent
y Deployment manager
y Job manager
Figure 13-11. Profile Management Tool: Environment and server type WA855 / VA8551.0
Notes:
3. The Environment Selection window allows you to choose the type of environment that is
associated with your new profile. A profile is associated with one of seven environment
types.
- Cell (deployment manager and a federated application server)
A cell environment creates two profiles: a management profile with a deployment
manager and an application server profile. The application server is federated to the
cell of the deployment manager.
- Management
A management profile provides the server and services for managing multiple
application server environments. The administrative agent manages application
servers on the same computer. The Network Deployment edition also includes a
deployment manager for tightly coupled management and a job manager for loosely
coupled management of topologies that are distributed over multiple computers.
- Application server
An application server environment runs your enterprise applications. WebSphere
13-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Application Server is managed from its own administrative console and functions
independently from all other application servers.
- Custom profile
A custom profile contains an empty node, which does not contain an administrative
console or servers. The typical use for a custom profile is to federate its node to a
deployment manager. After federating the node, use the deployment manager to
create a server or a cluster of servers within the node.
- Secure proxy (configuration-only)
A secure proxy configuration-only profile is for use with a DMZ secure proxy server.
You cannot start the secure proxy server on the Network Deployment installation.
This configuration-only profile is intended to be used only to configure the profile by
using the administrative console.
4. When you select the management environment, the Server Type Selection window is
displayed. You can select one of three types of management servers to create.
- Administrative agent
An administrative agent provides management capabilities for multiple stand-alone
application servers. An administrative agent can manage only the application
servers that exist within the same installation on one computer.
- Deployment manager
A deployment manager provides management capabilities for multiple federated
nodes. A deployment manager can manage nodes that span multiple systems and
platforms. A single deployment manager can manage a node, and the node must be
federated to the cell of that deployment manager.
- Job manager
A job manager provides management capabilities for multiple stand-alone
application servers, administrative agents, and deployment managers. The job
manager can manage nodes that span multiple systems and platforms. If a job
manager manages a node or nodes, other job managers can also manage those
nodes.
6
Optional Application Deployment
y Deploy the administrative
console
Notes:
5. Configuration values can be assigned based on default configuration values, or you can
specify your own configuration values. The Profile Creation Options window allows you
to choose which option best fits your needs.
- Typical profile creation
This option creates an application server profile that uses default configuration
settings. The Profile Management Tool assigns unique names to the profile, node,
and host. The tool also assigns unique port values.
The administrative console and the default application are installed. You can
optionally select whether to enable administrative security.
The tool might create a system service to run the application server, which depends
on the operating system of your computer and the privileges that are assigned to
your user account.
Typical profile creation is the default.
13-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
7
Profile Name
and Location
8
Node, Host, and
Cell Names
Figure 13-13. Profile Management Tool: Names and location WA855 / VA8551.0
Notes:
7. From the Profile Name and Location window, the profile name and profile directory
path are specified. The directory that is named contains the files for the runtime
environment, such as commands, configuration files, and log files.
- Profile name
The default name can be changed as you choose.
- Profile directory
The default directory can be changed as you choose.
- Depending on the profile that being created, more options can be specified by
selecting the appropriate check box. In this example, a deployment manager profile
has one option.
• Make this profile the default
Each installation of WebSphere Application Server always has one default
profile. Commands that run without referring to a specific profile use the default
profile.
13-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 8. The Node, Host, and Cell Names window allows you to specify:
- Node name
A node name is used for administration. If the node is federated, the name must be
unique within the cell.
- Host name
A host name is the Domain Name System (DNS) name (short or long) or the IP
address of the computer.
- Cell name
A cell name is a logical name for the group of nodes that the deployment manager
manages.
9
Specify Administrative Security
y User name and password
Notes:
9. From the Administrative Security window, choose whether to enable administrative
security. If enabled, the administrative user that is specified is created in a repository
within the application server. After profile creation finishes, you can add more users,
groups, or external repositories.
- Enable administrative security
Check this box to enable administrative security.
- User name
If enabling administrative security, provide a user name for administrative security.
- Password
If enabling administrative security, provide a password. The password that you enter
must be confirmed before proceeding.
13-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
10 Security Certificate
(Part 1)
y Create or import a
default personal
certificate
y Create or import a
root signing
certificate
Notes:
10. From the Security Certificate (Part 1) window, choose whether to create a default
personal certificate and root signing certificate, or import them from keystores. To create
new certificates, proceed to security certificate (part 2) and provide more certificate
information. To import existing certificates from keystores, locate the certificates; then
proceed to security certificate (part 2) and verify the certificate information.
- There are two options for a default personal certificate:
• Click Create a new default personal certificate:
If this option is chosen, you provide certificate information about the Security
Certificate (part 2).
• Click Import an existing default personal certificate and provide the following
details:
- Path
Specify the directory location of the default personal certificate.
- Password
Specify the password for the default personal certificate.
- Keystore type
There are four keystore types to choose from the list:
JKS
JCEKS
PKCS12
CMSKS
- Keystore alias
- There are two options for a root signing certificate:
• Click Create a new root signing certificate:
If this option is chosen, you provide certificate information about the Security
Certificate (part 2) window.
• Click Import an existing root signing certificate and provide the following
details:
- Path
Specify the directory location of the root signing certificate.
- Password
Specify the password for the root signing certificate.
- Keystore type
There are four keystore types to choose from the list:
JKS
JCEKS
PKCS12
CMSKS
13-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
11
Security Certificate
(Part 2)
Notes:
11. On the Security Certificate (Part 2) window, you can modify the certificate information to
create new certificates during profile creation. If you are importing certificates from
keystores, use the information to verify whether the selected certificates contain the
appropriate information.
- The following information must be provided for a default personal certificate (a
personal certificate for this profile, public and private key):
• Issued to distinguished name
The default distinguished name is: cn="computer IP address",
ou="host_name"Node01Cell,ou="host_name"Node01,o=ibm,c=US
• Issued by distinguished name
The default distinguished name is: cn="computer IP address",ou=Root
Certificate,ou="host_name"Node01Cell,ou="host_name"Node01,o=ibm,
c=US
13-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
13
Specify Windows
service option
Figure 13-17. Profile Management Tool: Ports and Windows service WA855 / VA8551.0
Notes:
12. The port values assignment window lists the values of the ports that the application
server uses. The values that define the ports do not conflict with other profiles in the
current installation.
- Three options are available for you to choose ports:
• Manually enter the port value for each port.
• Click Default Port Values to populate the port values with the default port
values.
• Click Recommended Port Values to populate the port values based on
suggested values that the Profile Management Tool calculates.
Another installation of WebSphere Application Server or other programs might use the
same ports. To avoid runtime port conflicts, verify that each port value is unique. If the
Profile Management Tool detects conflicts, a window displays at the top of the window
and list the ports for which activity is detected.
13. From the Windows Service Definition window, choose whether to use a Windows
service to run WebSphere Application Server. Windows services can start and stop
WebSphere Application Server, and configure startup and recovery actions.
- The check box Run the application server process as a Windows service is
selected by default. If you do not want to run the application server as a Windows
service, clear the check box.
- If you are running the application server process as a Windows service, two logon
options are available. The user account that is specified must be able to log on as a
service.
• Log on as a Local system account
• Log on as a specified user account
You must provide a user name and password for this option.
- Select the Startup type:
• Automatic
• Manual
• Disabled
13-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
15
Profile Creation
Complete
y Option to start the
First steps
console
Figure 13-18. Profile Management Tool: Results and exit WA855 / VA8551.0
Notes:
14. When all Profile Management Tool windows are completed, the Profile Creation
Summary window displays.
- The summary information is based on the selections you made previously.
- Review the summary for correctness before proceeding with the profile creation.
15. Review the results that are shown on the Profile Creation Complete window. If you want
to launch the First steps console, click the Launch the First steps console check box.
The First steps console is then started when you click Finish.
The window also displays information that is based on the type of profile that was
created. In the figure above, the window provides information about an application
server.
When you click Finish from the profile creation complete window, you are returned to
the Profile Management tool welcome window. The profile that you created is now
shown in the profile listing. You can continue to create more profiles or exit the tool. To
exit the Profile Management Tool, click File > Exit.
• Delete profiles
manageprofiles –delete –profileName
Notes:
Use the manageprofiles command to create, delete, augment, back up, and restore
profiles, which define runtime environments. The manageprofiles script supports a number
of functions:
Create new stand-alone application server profiles:
• manageprofiles -create
An example is:
manageprofiles -create -profileName profile3 -profilePath "C:\
Program Files\IBM\WebSphere\Appserver\profiles\profile3" -templatePath
"C:\Program Files\IBM\WebSphere\Appserver\profileTemplates\default"
-nodeName was8host01Node03 -cellName washost01Cell03 -hostname was8host01
If successful, the output displays the message: "INSTCONFSUCCESS: Success:
Profile3 now exists."
13-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Installable applications
Installed applications
Logs
Profile
root Properties
System applications
Notes:
The following file paths are default locations. You can install the product and other
components or create profiles in any directory where you have write access. Multiple
installations of WebSphere Application Server products or components require multiple
locations.
• WebSphere Application Server: /usr/IBM/WebSphere/AppServer
• Profile root: <was_root>/profiles/
• Profiles: <was_root>/profiles/profile_name
• System applications: <was_root>/systemApps
• Uninstaller for the product: <was_root>/uninstall
The directory of each profile contains the same standard directories, which include:
• bin
The bin directory holds the profile-specific tools and scripts.
13-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • config
The config directory holds all the configuration files for the profile.
• installableApps
The installableApps directory holds applications that can be associated with the
profile, but are not currently installed.
• installedApps
The installedApps directory holds all installed applications for the profile.
• logs
The logs directory holds all log files that are associated with the profile.
• properties
The properties directory holds properties files that are associated with the profile.
Notes:
WebSphere commands are profile aware. There is a -profileName option on many
WebSphere V8 commands to specify that the profile or the command can be issued from
the appropriate directory without specifying a profile name. For example:
<profile_root>/<profile>/bin
If no profile is specified, the default profile is assumed. Keep in mind that there can be only
one default profile. Unless otherwise manually set, the first profile that is created is the
default profile. It is suggested that you always specify the name of the profile.
Examples of server commands include:
startServer server1 -profileName profile1
startManager -profileName DmgrProfile
stopServer server1
13-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Profile precautions
When multiple profiles are created
on a single computer, be careful:
• Use the correct profile bin
directory to perform:
– startServer
– stopServer
– serverStatus
Notes:
When multiple profiles are created on a single computer, be careful:
• Use the correct profile bin directory for the following commands:
startServer
stopServer
serverStatus
• Be aware of possible port conflicts for node agents and application servers. The graphic
displays a list of ports that are shown in the administrative console for a resource.
• There can be multiple server1 instances on a single computer.
• Ensure that consistent host names within a computer are used.
Be careful when using the Profile Management Tool. It is possible that it preinstalls a
default host name by adding the default DNS suffix to the short machine name, which
can cause problems if other profiles used only the short host name.
It does not matter which form is used (short name or fully qualified name), on the
condition that the name is used consistently. For example, was85host and
was85host.ibm.com are different.
13-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Stand-alone
Deployment manager
• Deployment manager administrative console
has more functions for administration of the
cell
© Copyright IBM Corporation 2013
Figure 13-23. Deployment manager console versus stand-alone console WA855 / VA8551.0
Notes:
The deployment manager administrative console provides more tasks for administration of
a cell that the stand-alone administrative console does not provide. The example
demonstrates a few differences between the deployment manager and stand-alone
administrative consoles.
• Under Servers
The deployment manager provides more server task options for managing clusters,
DataPower, and core groups.
• Under System administration
The deployment manager provides management tasks that are associated with
administering a cell, nodes, node agents, and node groups.
Notes:
Several tools are commonly used in a cell environment. The command-line tools are in
more than one directory:
<was_root>\bin
<profile_root>\<profile_name>\bin
The tools include:
• addNode
The addNode command incorporates an application server installation into a cell.
Depending on the size and location of the new node you incorporate into the cell, this
command can take a few minutes to complete.
• syncNode
The syncNode command forces a configuration synchronization to occur between the
node and the deployment manager for the cell in which the node is configured.
• removeNode
The removeNode command returns a node from a Network Deployment distributed
13-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
The process of adding a node to a cell is known as federation. The process of federation
creates a managed node with an application server and a node agent that belongs to a
deployment manager cell.
A node is added to a cell by using:
• The deployment manager administrative console, or
• The addNode command-line tool
The process of adding a node to a cell includes:
• Creation of a backup of the current configuration
• Connection to the deployment manager
• Configuration of the node agent
• Addition of applications of the node to the cell configuration
After the node is added to the cell, the following commands can be used:
13-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Adding a node
• Deployment manager administrative
console
• Command line
addNode dmgr_host [dmgr_port] [-profileName profilename]
[-conntype type] [-excludesecuritydomains true | false] [-includeapps]
[-startingport portnumber] [-portprops qualified_filename]
[-nodeagentshortname name] [-nodegroupname name]
[-includebuses] [-registerservice] [-serviceusername name]
[-servicepassword password] [-coregroupname name] [-noagent]
[-statusport 1231] [-quiet] [-nowait] [-logfile filename] [-replacelog]
[-trace] [-username uid] [-password pwd] [-localusername localuid]
[-localpassword localpwd] [-help]
© Copyright IBM Corporation 2013
Notes:
A node can be added to a cell by one of two methods:
• Deployment manager administrative console:
- From the navigation tree, expand System administration. Click Nodes > Add
Node.
• Command line:
13-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty - The addNode command is used to add a node to a cell. The command syntax is:
addNode dmgr_host [dmgr_port] [-profileName profilename]
[-conntype type] [-excludesecuritydomains true | false] [-includeapps]
[-startingport portnumber]
[-portprops qualified_filename] [-nodeagentshortname name]
[-nodegroupname name] [-includebuses] [-registerservice]
[-serviceusername name] [-servicepassword password]
[-coregroupname name] [-noagent] [-statusport 1231] [-quiet] [-nowait]
[-logfile filename] [-replacelog] [-trace] [-username uid]
[-password pwd] [-localusername localuid]
[-localpassword localpwd] [-help]
- Here is an example:
• Add profile profile4 to the cell managed by profile dmgr01:
addNode dmgr01 8879 -profileName profile4
Notes:
Nodes can be managed or unmanaged. Both application servers and supported web
servers can be on unmanaged or managed nodes.
• Managed nodes
- Node agent or administrative agent is used to manage its servers
- Application server process runs within the deployment manager cell
• Unmanaged nodes
- Node agent and administrative agent do not manage their servers
- A stand-alone application server is an unmanaged node
- Commonly used for web servers
13-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Cell topology
• Cell topology can be
viewed through the
administrative console
– From
System Administration >
Cell >
Local Topology
Notes:
The deployment manager administrative console can be used to view the topology of a cell.
The topology page is used to set the discovery protocol for an existing cell. A cell is a
configuration concept, a way for an administrator to logically associate nodes according to
whatever criteria make sense in the administrator’s organizational environment.
To view the cell topology, expand System Administration from the navigation tree. Click
Cell > Local Topology.
Configuring synchronization
Notes:
The file synchronization service runs in the deployment manager and node agent. The
service ensures that configuration changes made to the cell repository are propagated to
the appropriate node repositories.
The deployment manager administrative console is used to configure the file
synchronization service. Configuration is set for each node agent.
To configure file synchronization, expand System administration from the navigation tree.
Click Node agents and click the appropriate node agent to set the configuration. Under
Additional Properties, click File synchronization service.
The file synchronization page includes the following properties:
• Enable service at server startup
Specifies whether the server attempts to start the file synchronization service. This
setting does not cause a file synchronization operation to start. This setting is enabled
by default.
13-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
The removeNode command returns a node from a cell to a stand-alone application server
installation. The removeNode command removes the node-specific configuration from the
cell. When a node is removed from a cell, the profile reverts to the configuration it had
before it was federated into a cell. Any applications or configuration changes that were
made while it was part of a cell are lost.
• Restores stand-alone configuration of the node from a backup.
• The node can be removed through the deployment manager administrative console.
Expand System administration. Click Nodes. Select the node to remove and click
Remove Node.
The cleanupNode command cleans up a node configuration from the cell repository.
• The command is used to clean up a node that is defined in the cell configuration, but no
longer exists.
13-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • A node can be cleaned up through the deployment manager administrative console.
Expand System administration. Click Nodes. Select the node to clean up and click
Force Delete.
Synchronization
• Synchronize
– Uses the normal synchronization optimization algorithm
– Node and cell configuration might still be out of synchronization after operation
• Full Resynchronize
– Clears all synchronization optimization settings
– No mismatch between node and cell configuration
Notes:
If you add a managed node or change a managed node configuration, synchronize the
node configuration. Synchronization can be done by selecting the nodes and clicking
Synchronize or Full Resynchronize.
Clicking either option sends a request to the node agent for that node to complete a
configuration synchronization immediately, instead of waiting for the periodic
synchronization to occur. This action is important if automatic configuration synchronization
is disabled. It is also important if the synchronization interval is set to a long time, and a
configuration change is made to the cell repository that must replicate to that node.
Settings for automatic synchronization are on the File Synchronization Service page.
• Synchronize
Synchronize requests that a node synchronization operation processes by using the
normal synchronization optimization algorithm. This operation is fast, but might not fix
problems from manual file edits that occur on the node. It is still possible for the node
and cell configuration to be out of synchronization after this operation is done.
13-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Figure 13-32. Managing a web server: Adding a node to a cell WA855 / VA8551.0
Notes:
An application server works with a web server to handle requests for dynamic content,
such as servlets, from web applications. A web server uses a web server plug-in to
establish and maintain persistent HTTP and HTTPS connections with an application server.
Before beginning work to manage the web server, make sure that the appropriate plug-in
file is installed on your web server.
The first step to establish communication with a web server is to create a node to manage
the web server. Within a cell topology, unmanaged nodes are typically used to manage web
servers.
To create an unmanaged node:
1. From the navigation tree, expand System administration. Click Nodes > Add node.
2. Click Unmanaged node and click Next.
3. From the new node page, provide the general properties for the unmanaged node:
13-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty - Name:
Specifies a logical name for the node. The name must be unique within the cell.
- Host name:
Specifies the host name of the unmanaged node that is added to the configuration.
- Platform type:
Specifies the operating system on which the unmanaged node runs. Valid options
are:
• Windows
• AIX
• HP-UX
• Solaris
• Linux
• OS/400
• z/OS
4. Click OK.
Figure 13-33. Managing a web server: Add the web server WA855 / VA8551.0
Notes:
When a node is created that is used to manage the web server, a web server definition can
be created. The deployment manager administrative console can be used to create the
web server definition. The web server definition adds the web server to the newly created
node.
To create a web server definition: from the navigation tree, expand Servers > Server
Types. Click Web servers > New.
1. The first step is to identify the node and web server.
- Select node:
Identifies the node that manages the web server.
- Server name:
Server name is the logical name of the server. The name must be unique within the
node.
- Type:
Type identifies the web server vendor type.
13-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 2. Select the web server template that you want to correspond to the web server you want
to create. The template is based on the type of web server you chose previously.
3. Enter the properties for the new web server.
- Port:
The port that the web server uses.
- Web server installation location:
The location of the web server installation. It is required for IBM HTTP Server only.
- Service name:
Specifies the Microsoft Windows operating system service name of the web server.
- Plug-in installation location:
The fully qualified path for the location of the plug-in configuration file.
- Application mapping to the web server:
Web server application mapping. The options are:
• All: All applications are automatically mapped to the web server.
• None: No applications are automatically mapped to the web server.
Enter the properties for the IBM Administration Server:
- Administration Server Port
- Username
- Password
1. Generate
plug-in
2. Propagate
plug-in
Figure 13-34. Managing a web server: Plug-in configuration file WA855 / VA8551.0
Notes:
The plug-in configuration file contains routing for all applications that are mapped to the
web server, passing HTTP requests from a web server to WebSphere Application Servers.
The plug-in is regenerated and propagated to the web server after changes that affect
routing are made. The plug-in configuration file is automatically generated by default,
whenever the web server environment changes, with a few exceptions. For example, the
plug-in configuration file is regenerated whenever one of the following activities occurs:
• A new application is deployed on an associated application server.
• The web server definition is saved.
• An application is removed from an associated application server.
• A new virtual host is defined.
13-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty You can manually generate and propagate a plug-in configuration file for a web server from
the deployment manager administrative console. From the navigation tree, expand
Servers > Server Types. Click Web servers.
1. To generate the plug-in configuration file, select the web server whose plug-in
configuration file must be generated. Click Generate Plug-in.
When the generation is complete, a message displays to indicate that the generation
was successful. A message also indicates the directory location and name of the
plug-in configuration file. Here are some example messages:
"PLGC0005I: Plug-in configuration file = C:\Program
Files\IBM\WebSphere\AppServer\profiles\DmgrProfile\config\cells\was8host
01Cell01\nodes\ihsnode\servers\webserver01\plugin-cfg.xml
PLGC0052I: Plug-in configuration file generation is complete for the Web
server was8host01Cell01.ihsnode.webserver01"
2. To propagate the plug-in configuration file, select the web server whose plug-in
configuration file must be propagated. Click Propagate Plug-in.
When the propagation is complete, a message indicates the directory location and the
name of the plug-in configuration file that is used for propagation. The message also
indicates the directory location and name of the plug-in configuration file where the
configuration is propagated to on the web server computer. Here are some example
messages:
"PLGC0062I: The plug-in configuration file is propagated from C:\Program
Files\IBM\WebSphere\AppServer\profiles\DmgrProfile\config\
cells\was8host01Cell01\nodes\ihsnode\servers\webserver01\plugin-cfg.xml
to C:\Program Files\IBM\HTTPServer\Plugins\config\
webserver01\plug-in-cfg.xml on the Web server computer
PLGC0048I: The propagation of the plug-in configuration file is complete
for the Web server was8host01Cell01.ihsnode.webserver01"
Unit summary
Having completed this unit, you should be able to:
• Describe WebSphere Application Server cell concepts
• Describe and create the deployment manager profile
• Describe and create other profile types
• Describe custom profiles and automatic federation
• Describe the directories and configuration files for profiles
• Add a node by using commands or the administrative console
• Compare the deployment manager administrative console with the
base administrative console
• Compare managed and unmanaged nodes
• Use the administrative console to manage a web server
Notes:
13-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. Which managed processes can be part of a cell?
A. Deployment manager
B. Node agent
C. Load balancer
D. Application server
Notes:
Write your answers here:
1.
2.
3.
Checkpoint answers
1. Which managed processes can be part of a cell?
Answer: A, B, and D
A. Deployment manager
B. Node agent
D. Application server
Notes:
13-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 9
Notes:
Exercise objectives
After completing this exercise, you should be able to:
• Create a deployment manager profile
• Back up the deployment manager configuration
• Use the deployment manager administrative console
• Federate a node into the deployment manager cell
• Create a custom profile
• Create an unmanaged web server node
• Use the administrative console to start and stop a web server
• Map an application to a web server
Notes:
13-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Define workload management
• Create clusters and cluster members
• Compare clustered configurations
• Explain how weights are used in workload management
• Describe failover scenarios
• Describe the role of the HTTP plug-in in workload management
• Explain session management
• Configure distributed session management
Notes:
14-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Workload management concepts
• Clusters and cluster members
• Routing concepts and session affinity
• Failover
• Session persistence
Notes:
14-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Workload management
concepts
Notes:
14-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
There are numerous potential definitions for the term workload management. Within the
context of the WebSphere Application Server, what is meant generically is to spread the
work between different hosts. This feature can provide for better performance, scalability,
load balancing, and availability.
HTTP
requests
Plug-in
HTTP server
Load balancer
Plug-in
Notes:
Within a standard application server topology, there are frequently three points where WLM
occurs. The first point is where a load balancer spreads the work among numerous web
servers. The second point is where the web server plug-in spreads work among numerous
application servers, or more specifically, web containers.
14-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere
Web IIOP EJB Application
container container
Server
EJB
requests WebSphere
Web IIOP EJB Application
container container
Server
Java client
Notes:
The third point where work can be spread is between the EJB clients and the EJB
containers. This third point does not usually occur because the EJB client (in most cases,
the web container) is typically in the same JVM as the EJB container. This topology forces
all traffic to stay within the same JVM. The other cases are when a web container is placed
in a different JVM and then the EJB container (not common), and when a stand-alone Java
client is being used (again, not common).
14-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
14-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Clusters
1 Create a cluster by
using an existing
server (or create a
blank cluster)
WebSphere
Application 2 Install applications
Server or make other
changes
Template
3 Create cluster
members
Notes:
Creating more throughput within a cell cannot be done by installing one application on
multiple application servers. This situation can possibly create conflicts with the
namespace and the plug-in. Clusters allow for the same application server to have multiple
copies within a single cell. They provide a single point of management, automatic workload
management, and failover.
• Creation of a cluster
– Can use an existing server to become the first cluster member
– Additional cluster members are created from templates
Notes:
You can create a blank cluster and then install applications in it. It is also possible to have a
cluster that is based on an existing application server. At any point, cluster members can
be created within a cell. These cluster members are actually application servers, but they
are associated with the cluster. At any point, then, more applications or configuration
changes can be made to the cluster, and those changes are pushed out to all of the cluster
members.
14-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Cluster member
HTTP server 1
Cluster
Plug-in
Cluster member
2
Plug-in
configuration
Notes:
Cluster members can be scaled vertically. You can put multiple cluster members on the
same node (or computer). Although this practice might not increase throughput (assuming
that one cluster member uses the computer fully), it does provide process level failover.
Plug-in
Cluster
Notes:
Cluster members can be scaled horizontally. You can put cluster members on different
computers. This method not only increases throughput but also provides system level
failover.
14-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Cluster member
2
HTTP server
Cluster
Computer B
Plug-in
Cluster member
3
Cluster member
4
Node agent
Notes:
Scaling both vertically and horizontally combines both system and process level failover.
Creating a cluster (1 of 4)
• In console, select Servers > Clusters > WebSphere application
server clusters and click New
• Enter cluster
name
• Check options
– Prefer local
– Configure
HTTP session
memory-to-
memory
replication
• Click Next
© Copyright IBM Corporation 2013
Notes:
This diagram shows the first step of the cluster creation wizard.
14-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Creating a cluster (2 of 4)
• Create the first cluster member that is based on:
– A server template
– An existing server
– Converting an existing server
– An empty cluster
• Select node
• Enter weight
• Click Next
Notes:
When creating a cluster, several options must be specified. These options include what to
base the new cluster on (a template, an existing application server, converting an existing
application server) and things like the cluster member name, the weight, the node, and
other items.
Creating a cluster (3 of 4)
Notes:
In this example, the option to create the first cluster member that is based on an existing
server is selected.
14-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Creating a cluster (4 of 4)
1. Enter Member name
2. Select node
1
3. Set weight
2
4. Check options:
3
• Generate unique
HTTP ports 4
(default) 5
5. Click Add Member
6. Repeat to create
other cluster members
7. Click Next
8. Click Finish on Summary
screen
© Copyright IBM Corporation 2013
Notes:
After the first cluster member is created, you can create more members. This screen shows
the options for creating more cluster members.
3. Click Apply
Notes:
This procedure follows the same steps as installing to a base server except:
1. You select a cluster as the target, rather than a server.
2. And possibly map to web servers.
14-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Controlling a cluster
Notes:
If ripplestart is used on a running cluster, each application server in the cluster is stopped
one at a time, and restarted.
The screen capture shows a partially stopped cluster.
Cluster members
• Clusters can also be started (or stopped) by merely starting all
application servers that are members
Notes:
Cluster members can be started individually by starting the application servers.
14-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Modification of clusters
• Use the administrative console or wsadmin
Notes:
Individual cluster member settings include Weight and Prefer local. Applications can be
installed or updated on a cluster. Changes to application server settings must be made to
each cluster member individually.
14-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
14-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Routing
Load table 3
balancer 1 HTTP server 2
Notes:
1. Load balancer:
- The routing decision table is stored internally
- Configured by using the Load Balancer tool
- Multiple intelligent routing options
2. HTTP server plug-in:
- The plugin-cfg.xml file defines routing
- Configured by using administrative console, or wsadmin
- Default is weighted round robin
3. WLM-aware EJB client:
- Includes web container, Java client, EJB
- Name service then supplies routing table
- Configured by using administrative console, or wsadmin
- Options:
• Prefer local: yes or no
14-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
JSESSIONID
cookie HTTP server
Session object
Servlet 123:A
123:A SessionID: 123
requests
Web CustName: Bob
HTTP container ProductID: xyz
Plug-in Cluster member 1
ID - A
Web client
Notes:
HTTP is a stateless protocol.
Sessions allow you to maintain state information across a series of HTTP requests from the
same client (for example, maintaining your shopping cart until checkout).
The Java servlet specification defines the session management process for web
applications.
The session manager stores session information, and sends the client a unique clone ID
and session ID through:
• A cookie in the HTTP header, or
• URL rewriting in a parameter on links or forms
Session affinity
JSESSIONID
cookie
Session object
123:A 123:A
SessionID: 123
Servlet Web CustName: Bob
container ProductID: xyz
requests
Cluster member 1
Web client ID - A
HTTP server
JSESSIONID
HTTP
cookie
Plug-in Session object
345:B 345:B
SessionID: 345
Web CustName: Fred
container ProductID: abc
Cluster member 2
Web client ID - B
Notes:
An application can retain state information for a user’s session in memory. Other servers in
the cluster might not have this information.
The HTTP server plug-in routes subsequent servlet requests consistently to the same
application server after the session is created, by using a clone ID passed with the session
ID in a cookie or URL.
14-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
JSESSIONID cookie
• The JSESSIONID cookie is used to help manage sessions
– The plug-in
uses the data
to find which
clone has
affinity
– The web
container uses
it to find the
right http
session object
HTTP session ID
Notes:
The JSESSIONID cookie includes three main parts:
• The HTTP session ID
• The clone ID and
• The epoch number
The clone ID allows the plug-ins to identify which cluster member (or clone) holds the
session object. The HTTP session object allows the application server to find the object
that is specific to that particular request. And finally, the epoch number allows the web
container to make sure that the cached HTTP session object is not stale.
The format of the cookie can change in certain cases. For example, if memory-to-memory
session replication is used, the format is entirely different. Also, if the session is failed over
to another web container, there can be a list of clone IDs instead of just one.
JSESSIONID=00018320953:123
Web
client HTTP
servlet
requests Cluster member
1
321
321
123 Cluster member
345 2
476 123 Clone ID
HTTP server
Load
plug-in
balancer Cluster member
3
345
321
123
345 Cluster member
476 4
476
HTTP server
plug-in © Copyright IBM Corporation 2013
Notes:
WebSphere session affinity has the following features:
• Session cookie is generated
• Uses clone ID to allow affinity on first hit
• Plug-ins know how to route to correct clone ID
• Can be turned off by removing clone IDs from plug-in file
• Format for the JSESSIONID cookie changes when using memory-to-memory
replication
14-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Plug-in
• Based on the data in the plugin-cfg.xml file, the plug-in is able
to route sticky requests to the correct application server
– If the application server is unavailable, the request is rerouted to the next
application server
– This new application server now has affinity
– The session information that is held within the web container does not fail over
unless session failover is configured
– An unavailable application
server is marked as down HTTP server WebSphere
Application
for a certain amount of time
Server
(default is 2 minutes)
– After that time, the server is
tried again
Plug-in WebSphere
– The plugin-cfg.xml file Application
is checked for updates every Server
60 seconds so new application
servers are automatically
Plug-in configuration
brought into the active list
© Copyright IBM Corporation 2013
Notes:
Based on the data in the plugin-cfg.xml file, the plug-in is able to route sticky requests
to the correct application server. If the application server is unavailable, the request is
rerouted to the next application server; this new application server now has affinity. The
session information that is held within the web container does not fail over unless session
failover is configured. An unavailable application server is marked as down for a certain
amount of time (default is 2 minutes); after that time, the server is tried again. The
plugin-cfg.xml file is checked for updates every 60 seconds; so new application servers
are automatically brought into the active list.
Plugin-cfg.xml (1 of 2)
Notes:
This slide shows the contents of a plugin-cfg.xml file where the CloneID is highlighted.
14-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Plugin-cfg.xml (2 of 2)
Notes:
The slide shows the portion of the contents of a plugin-cfg.xml file that contains
JSESSIONID cookie information.
Notes:
Application requests are mapped to a UriGroup by matching one of the UriGroup’s regular
expressions.
14-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
All of the application requests that are mapped to a UriGroup are routed based on the
information in a Route XML element that corresponds to the UriGroup.
Notes:
The Route XML element determines which ServerCluster element to use for selecting
cluster members to forward the request to.
14-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
After a ServerCluster XML element is determined, a Server in the ServerCluster is chosen
based on algorithm, affinity, and protocol.
HTTP server
Server 1
Weight = 8 x/GCD
Plug-in Routing table initial values*
Server 1 Server 2
Server 2 EJB ORB
Weight = 2 client 4 1
WLM
plug-in
© Copyright IBM Corporation 2013
Notes:
The default routing option for both the plug-in and the ORB is called weighted round robin.
Each server is assigned a weight that is then reduced by dividing all values by the GCD
(greatest common divisor). These new values are then inserted into a table (for both the
plug-in and the ORB) that is used to track the distribution between the available servers.
14-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This algorithm is used for both the plug-in and ORB WLM.
Notes:
This algorithm is used for both the plug-in and ORB WLM.
14-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 14-37. Weighted routing example with counting affinity WA855 / VA8551.0
Notes:
This algorithm is used for both the plug-in and ORB WLM.
Notes:
An alternative to the weighted round robin is random. This attribute can be set in the plug-in
properties (as show in the diagram). Hits that have affinity are still routed to the appropriate
server.
14-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The plug-in can be configured to use Intelligent Management features of WebSphere
Application Server. When Intelligent Management is enabled, the plug-in communicates
with management servers in the cell to obtain the current state of the application servers.
The current state includes server weights that are calculated based on the current
performance characteristics of the application servers. More detail on this topic is included
in the unit on Intelligent Management.
14-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 14.4.Failover
Failover
Notes:
14-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Failover
Name Java
service client
Routing
Load HTTP table 3
balancer 1 server 2
Notes:
The next few slides cover what happens during failures at:
1. The load balancer
2. The web server
3. The web container
Plug-in
Notes:
If a load balancer fails, a standby load balancer can take over. No session information is
lost.
14-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
HTTP server
Load WebSphere
balancer Application
Server
Plug-in
© Copyright IBM Corporation 2013
Notes:
If a web server fails, any other web server can deal with the request since each plug-in is
aware of all of the downstream application servers. If there is affinity to a specific
application server, the request still ends up going to the correct application server (based
on the JSESSIONID cookie) even if a web server is unavailable.
Web EJB
HTTP server container container
HTTP(S)
Memory-memory
Plug-in replication, or
Web IIOP EJB session database
container container
Notes:
If a plug-in detects that a web container is unavailable, it marks that container as down and
does not make more attempts to communicate with it for 2 minutes. After 2 minutes, it
attempts to communicate with that server. If it is still unavailable, it is marked down for 2
minutes again, and the process continues.
This algorithm allows each plug-in to dynamically deal with web containers that either
become unexpectedly unavailable or are taken offline. At the same time, when new cluster
members are added and the plugin-cfg.xml file is generated and propagated, the
plug-in automatically knows about the new containers and dynamically adds them to the
pool.
14-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
When an EJB container fails, the failover depends on the initial type of failure. If the error
was in reaching the EJB container, then WebSphere fails over to another possible EJB
container. However, if the initial call was successful, but the response timed out, then the
programmer must try again.
14-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Session persistence
Notes:
14-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Session persistence
Session objects are cached in server memory by default, and therefore
are lost if server fails
Three methods to enable session persistence:
• Database
– JDBC data source is used to persist session objects
– DB2 included in package for session persistence
• Memory-to-memory replication
– Data Replication Service (DRS) is used to copy sessions to another server
• eXtreme Scale servlet filter
– Entitlement included with WebSphere Application Server
Memory-memory
Session database eXtreme Scale servlet filter
replication
WebSphere eXtreme
WebSphere WebSphere Scale grid
Application
Application Application
Server
Server Server Container
server
WebSphere
WebSphere WebSphere Container
Application
Application Session Application server
Server
Server database Server
© Copyright IBM Corporation 2013
Notes:
If your application cannot tolerate loss of session information, session persistence can be
enabled. The three choices are database, memory-to-memory, and eXtreme Scale. The
database approach has greater cost, but provides persistence to a database.
Memory-to-memory can still fail if all copies of the session are lost. The eXtreme Scale
solution can be more robust.
A number of settings can be used to affect the balance between failover and performance.
This topic is described in upcoming slides.
Notes:
Replication modes:
• Server mode: Stores copies of other WebSphere Application Server sessions and not
to send out copies of any session that are created in that particular server
• Client mode: Broadcasts or sends out copies of the sessions it owns and not to receive
backup copies of sessions from other servers
• Both mode: Simultaneously broadcasts or sends out copies of the sessions it owns
and acts as a backup table for sessions that other WebSphere Application Server
instances own
14-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Single replica means that for every session object, one backup copy is stored on a different
server for failover. It is also possible to back up the sessions on every member of the
domain. This practice does not scale as well because every member must store every
other member’s session objects. However, it means that the chance for a successful
failover is higher.
Depending on the needs of the application and the tolerance for failure, it is possible to
tune the number of members that back up every session object.
Notes:
Database persistence configuration requires specifying a data source. This picture shows
the console database replication and data source configuration settings.
14-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Accesses through
WebSphere Application
Servers >
<servername> >
Session management >
Distributed environment
settings >
Tuning parameter
Notes:
Session persistence can be tuned so that it is more appropriate for failover or for
performance. These settings allow administrators to choose if they want to have greater
failover ability (at the price of performance) or have better performance (at the price of
having failover).
• Deploy application
Notes:
To activate the HTTP servlet filter for WebSphere eXtreme Scale, you must “splice” the
filter into your application. eXtreme Scale includes a script, addObjectGridFilter, to add the
filter to your application. The script takes two parameters: the absolute path to the
application to be spliced, and the location of a file that contains various configuration
properties. The splicer utility modifies the application’s deployment descriptor, web.xml,
with parameters that control how the filter interacts with the WebSphere eXtreme Scale
grid.
Follow the normal procedure to deploy the new application to your application server. The
servlet filter is started as part of the application initialization.
14-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Define workload management
• Create clusters and cluster members
• Compare clustered configurations
• Explain how weights are used in workload management
• Describe failover scenarios
• Describe the role of the HTTP plug-in in workload management
• Explain session management
• Configure distributed session management
Notes:
Checkpoint questions
1. A WebSphere cluster member is what type of process?
A. An application server
B. A web server
C. An edge server
D. A proxy server
Notes:
Write your answers here:
1.
2.
3.
14-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. A WebSphere cluster member is what type of process?
A. An application server
Notes:
Exercise 10
Notes:
14-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Create a cluster and add cluster members
• Map modules to clusters and web servers
• Test load balancing and failover between two cluster members
• Configure a data replication domain for session management
Notes:
14-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe what WebSphere Messaging is and how it is used
• Describe messaging components such as JMS providers, the service
integration bus (SIBus), and messaging engines
• Configure resources to support messaging applications such as
queues, topics, and connection factories
• Implement various clustered messaging engine policies for high
availability and scalability
• Create links to foreign buses and WebSphere MQ
• Describe how JMS and WebSphere MQ use the SIBus to support
application messaging services
Notes:
15-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Overview of messaging concepts
• Messaging engine clustering
• SIBus and messaging engine topologies
• Additional messaging considerations
Notes:
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Overview of messaging
concepts
Notes:
15-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
What is JMS?
• The Java Message Service (JMS) is an API for accessing enterprise
messaging systems
Notes:
JMS defines an API; it is not an implementation.
JMS defines some interfaces for applications to use. It is up to someone else to provide the
implementation under those interfaces.
The implementation is delivered as a JMS provider.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
JMS applications
• The JMS specification defines the interfaces that JMS applications use
• JMS applications do not need to know how the interfaces are
implemented
– Java objects that implement the interface are returned through JNDI lookups
– The implementation objects are vendor-specific
– The implementation objects use vendor-specific properties to access the
messaging resources
Messaging
JMS client provider
resources
JMS
applications Resource
Implementation
object
JNDI
namespace
© Copyright IBM Corporation 2013
Notes:
The application that uses the JMS API is called a JMS client.
The JMS client must get actual Java objects that implement the JMS interfaces. The
objects are stored in JNDI, and have vendor-specific properties and behaviors.
When the object is retrieved from JNDI, the standard JMS APIs can be used to work with
the vendor-specific resources. If the client is deployed to a different JMS provider, the JNDI
lookup remains the same, but the object that is returned is different. The client uses the
same JMS API calls, but the object has different behaviors for working with the different
vendor resources.
15-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
• WebSphere Application Server default messaging provider: This fully featured
messaging provider comes free with WebSphere Application Server. It is a robust and
stable messaging platform that can handle point-to-point queues, topics in a
publish/subscribe environment, and web service endpoints.
• WebSphere MQ messaging provider: WebSphere MQ is the premier messaging
middleware that IBM provides. Use WebSphere MQ when you require advanced
messaging facilities and options. WebSphere MQ existed much earlier than the
WebSphere Application Server default messaging provider and is available on many
platforms, supporting many programming languages. It is fully JMS-compliant and has
a large client base.
• Generic JMS provider: This provider is the catch-all for any external messaging
providers other than WebSphere MQ. Although WebSphere Application Server works
with any JMS-compliant messaging provider (after it is defined to WebSphere), there
can be only limited administrative support in WebSphere. This approach is suggested
only if you have an existing investment in a third-party messaging provider because
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administration
Notes:
Producers send messages to destinations. Consumers get messages from destinations.
Destinations are managed points of communication. Destinations can be JMS queues,
JMS topics (publish/subscribe), or web service endpoints.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Messaging capabilities are fully integrated in the WebSphere Application Server platform.
Messaging is integrated with application server management, including security and high
availability. Default messaging is fully compliant with JMS V1.1.
Default messaging complements and extends WebSphere MQ and WebSphere Application
Server. You can share and extend messaging family capabilities and interoperate with
WebSphere MQ.
Other WebSphere products use default messaging such as WebSphere Enterprise Service
Bus and WebSphere Process Server. Default messaging is supported in tools by
WebSphere Integration Developer.
15-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The SIBus provides the following capabilities:
• Any application can exchange messages with any other application by using a
destination to which one application sends, and from which the other application
receives.
• A message-producing application, that is, a producer, can produce messages for a
destination regardless of which messaging engine the producer uses to connect to the
SIBus.
• A message-consuming application, that is, a consumer, can consume messages from a
destination (whenever that destination is available) regardless of which messaging
engine the consumer uses to connect to the SIBus.
The SIBus supports the following types of messaging:
• Sending messages synchronously (requires the consuming application to be running
and reachable).
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
SIBus members
• SIBus members can be:
– Application servers or clusters
Notes:
SIBus members can be application servers or clusters. When a new bus member is
defined, a messaging engine (ME) is automatically created on the corresponding
application server or cluster. Bus members can be added or removed from the bus, which
effectively adds or removes messaging engines from the servers.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Each ME has a unique identity that is made up of the SIBus name and
the name of the bus member
– For example,
PlantsCluster.000-msgBus, PlantsCluster.001-msgBus
– was85hostNode01.MyServer01-MyBus
• All MEs are visible and accessible from anywhere on the bus, no
matter which ME the client has an actual network connection with
Notes:
One ME is automatically created for the application server or the cluster when defining a
new SIBus member (application server or cluster). Multiple MEs can be running within the
same cluster.
Within an SIBus, each ME has a unique identity, which is made up of the SIBus name and
the bus member name.
15-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Bus member
Messaging
engine
(ME)
SIBus
Notes:
One ME is automatically created for the application server or the cluster when defining a
new SIBus member (application server or cluster). It is possible to have multiple MEs
running within the same cluster.
Within an SIBus, each ME has a unique identity, which is made up of the SIBus name and
the server name.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Message stores
• An ME requires a persistent backing store for storing recoverable
data such as messages
• Multiple MEs can share a database, but each ME has its own schema
within the database (which results in different tables)
Notes:
The message store is a subcomponent of the messaging engine. It is used to buffer in-flight
messages and hold a number of other pieces of information (for example, records of
message delivery when delivering multiple copies of a single message).
A message store can be either persistent or nonpersistent. A persistent message store can
hold both persistent objects and volatile objects. A persistent object is state data that
survives after an engine stops for any reason. A volatile object is state data that does not
survive an ME failure, and might not survive an orderly shutdown of the messaging.
In contrast, a nonpersistent message store can hold only volatile objects; it cannot hold
persistent objects.
ME requires a persistent back-end data store, even for nonpersistent messages (for
example, spilling).
Included is support for persistence by using Derby. DB2, Oracle, and Sybase are also
supported so that customers can use an RDBMS of choice. These databases must also
15-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty offer higher performance than Derby. Starting with version 6.1, a file system data store is
also available.
The data store preserves messages and subscriptions so that they survive if the server or
messaging engine is stopped and restarted. It is also used for the overflow of the
nonpersistent messages in some quality of service (QoS) options.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Bus member
JDBC provider
Data
Messaging source
engine
SIBus
Notes:
A file store or a data store can provide persistent storage.
A file store provides an environment that is easier to manage and has better performance.
In a clustered environment a shared file system must be used so all instances of
messaging engines can have access for failover purposes.
The message store preserves messages and subscriptions so that they survive if the
server or messaging engine is stopped and restarted. It is also used for the overflow of the
nonpersistent messages in some quality of service (QoS) options.
15-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Bus member
File
Messaging system
engine
SIBus
Notes:
A file store or a data store can provide persistent storage.
A file store provides an environment that is easier to manage and has better performance.
In a clustered environment, a shared file system must be used so all instances of
messaging engines can have access for failover purposes.
The data store preserves messages and subscriptions so that they survive if the server or
messaging engine is stopped and restarted. It is also used for the overflow of the
nonpersistent messages in some quality of service (QoS) options.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
A bus destination is a virtual location within an SIBus, which applications (producers,
consumers, or both) use to exchange messages.
SIBus destinations are associated with bus members, therefore associating them with the
corresponding MEs. MEs associated with a destination have a message point for that
destination. This behavior allows the administrator to control which message store is used
for persistence.
15-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
SIBus destinations
• A logical name which applications
use to exchange messages
• Queue
– For point-to-point messaging
• Topic space
– For publish and subscribe messaging
– Represents hierarchies of topics
• Alias
– Provide a level of abstraction
between applications and the target bus destinations that hold messages
• Foreign
– Identifies a destination on another bus
– Applications on one bus can directly access the destination on another bus
• Exception
– Automatically created for each messaging engine
© Copyright IBM Corporation 2013
Notes:
SIBus defines several types of destinations. Alias and foreign destinations represent some
other destination. A chain of alias destinations ultimately must end in a real destination. A
foreign destination must refer directly to a destination on a “foreign” bus and must have the
same name as the destination on that foreign bus.
A topic space is a hierarchy of topics that are used for publish/subscribe messaging. Topics
with the same name can exist in multiple topic spaces.
Alias destinations provide a level of abstraction between applications and the underlying
target bus destinations that hold messages. Applications interact with the alias destination,
so the target bus destination can be changed without changing the application. Each alias
destination identifies a target bus destination and target service integration bus.
Applications can use an alias destination to route messages to a target destination in the
same bus or to another (foreign) bus (including across an MQLink to a queue that
WebSphere MQ provides).
The foreign destination identifies a destination on another bus so that applications on one
bus can directly access the destination on another bus.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Messages are transported through a bus (for example, an SIBus). A bus is a virtual
messaging environment that spans servers. If you want to send or receive messages
through a bus, you must connect to it. Servers (for example, server1) can be added to a
bus, and in doing so, a messaging engine (ME) starts in that server.
SIBus destinations are defined on the bus (rather than on an ME). Queues are localized to
a particular ME (for example, messages sent to that queue are stored in a database on one
particular ME within the bus). Topic spaces (groups of topics) are localized on every ME.
A message point is the general term for the location on a messaging engine where
messages are held for a bus destination. For point-to-point messaging, the administrator
selects one bus member, an application server or cluster, as the assigned bus member that
is to implement the runtime state of a queue destination. This action automatically defines a
queue point for each messaging engine in the assigned bus member. For a queue
destination that is assigned to an application server, the messaging engine of that server
handles all messages sent to that destination, and message order is preserved.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Message points (1 of 2)
• A message point is the physical location on a messaging engine where
messages are held for a bus destination
Messaging engine
Message
point
Bus
destination Service integration bus
Notes:
If the bus member is an application server, a single queue point is created and associated
with the messaging engine on that application server. This messaging engine handles all of
the messages that are sent to the queue destination. In this configuration, message order
is maintained on the queue destination.
If the bus member is a cluster of application servers, a queue point is created and
associated with each messaging engine defined within the bus member. The queue
destination is partitioned across the available messaging engines within the cluster. In this
configuration, message order is not maintained on the queue destination.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Message points (2 of 2)
• A queue point is the message point for a queue destination
Notes:
A publication point is the message point for a topic space. Creating a topic space
destination automatically defines a publication point on each messaging engine within the
bus.
It is not required to specify a bus member to hold messages for a topic space.
15-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
SIBus destinations
• SIBus destinations are associated with one or more MEs
– Queues are explicitly assigned to a bus member
– Topic spaces are associated with all bus members
Bus member
Messaging
engine
JDBC provider
Message Data
point source
SIBus Messages
destination
SIBus
Notes:
A message point is the location on a messaging engine where messages are held for a bus
destination. A message point can be a queue point, a publication point, or a mediation
point.
A queue point is the message point for a queue destination. When creating a queue
destination on a bus, an administrator specifies the bus member that holds the messages
for the queue. This action automatically defines a queue point for each messaging engine
that is associated with the specified bus member.
A publication point is the message point for a topic space. When creating a topic space
destination, an administrator is not required to specify a bus member to hold messages for
the topic space. Creating a topic space destination automatically defines a publication point
on each messaging engine within the bus.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
JMS JMS
producer consumer
application application
SIBus
Notes:
A particular queue destination is associated with one SIBus, and is assigned to one of the
bus members.
If the bus member is an application server, a single ME is responsible for the queue.
If the bus member is a cluster, then each of the MEs in the cluster supports operations on
the queue.
To access the queue, clients do not have to connect to the messaging engine responsible
for the queue.
In this picture, although both the producer and the consumer a connected to different MEs
from the one with the queue destination, both of the applications can access the queue.
15-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
SIBus
© Copyright IBM Corporation 2013
Notes:
Topic space destinations provide support for publish/subscribe messaging.
Every ME on the bus can handle operations for the topic spaces that are defined on the
bus.
Producer applications publish messages to particular topics through a topic space
destination. To publish to a topic, publishers can use any ME that it is connected to.
Subscriber applications create subscriptions on particular topics in a topic space.
A subscription is associated with the ME to which the subscriber application is connected.
Published messages are propagated only to MEs with subscribers.
In this picture, you see that there are two subscriber applications. When a publisher creates
a message to which it is subscribed, the message is sent to the two MEs where there are
subscribers. It is not sent to the ME with no connected subscribers.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
JMS connection factory
Session EJBs use the connection factory to connect to a JMS provider, in this case, to
connect to the SIBus through a messaging engine. The connection factory generates
connection objects. The generated connection object holds details of how to create a
connection: for example, an IP address, port, and SSL configuration.
When it is connected to a messaging engine, the session EJB can access destinations on
the bus. The destination is not required to be associated with the messaging engine to
which it was connected. As soon as it is connected, the session EJB can connect to any
destination on the bus.
JMS ActivationSpec
Message-driven beans use the ActivationSpec to connect to the SIBus. The ActivationSpec
is a resource adapter. It requires the JNDI name of the JMS destination where messages
are consumed. The ActivationSpec invokes the MDB onMessage() method when a
15-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty message becomes available on the destination. An ActivationSpec can be created for a
queue or a topic space destination.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
JMS destinations
• JMS destinations are associated with SIBus destinations
• The SIBus destination implements the JMS destination function
Bus member
Messaging
engine JDBC provider
Notes:
An administrator must create both the JMS destination and the SIBus destination. As
mentioned earlier, the message point is created automatically when the SIBus is created.
15-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
JMS connection
factory JDBC provider
JMS Data
destination source
Messaging
engine
SIBus
destination
(ME)
SIBus
Notes:
Session EJBs can be producers or consumers. The flow is as follows. A session EJB
references a JMS connection factory. With the messaging engine and SIBus destination,
the EJB can access the JMS destination.
Other Java EE components besides session beans can use JMS connection factories
(servlets, for example).
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
JMS ActivationSpec
• Message-driven beans (MDBs) use a JMS ActivationSpec to connect
to the JMS provider (ME)
Bus member
MDB
JMS
JDBC provider
ActivationSpec
JMS Data
destination source
Messaging
engine
SIBus
destination
(ME)
SIBus
Notes:
An MDB is only a consumer of messages, hence the one-way arrows back to the MDB in
the diagram.
15-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
JMS JMS
ConnectionFactory ActivationSpec
JDBC provider
Bus member
JMS Data
destination source
Messaging
engine
SIBus
destination (ME)
SIBus
Figure 15-28. Applications can run outside bus members WA855 / VA8551.0
Notes:
Producers and consumers can also run outside of the server that is hosting the ME.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Messaging engine
clustering
Notes:
15-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The administrative console provides messaging engine policy assistance whenever you
add a cluster as a member of an SIBus. Three predefined policies can be configured: high
availability, scalability, and scalability with high availability. There is also an option to select
a custom policy, but there is no console assistance for this option.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Cluster
Existing
messaging
engine
(arrow
indicates
failover)
© Copyright IBM Corporation 2013
Notes:
By default, only one application server in a cluster has an active messaging engine on a
bus. If the server fails, the messaging engine on another server in the cluster is activated.
This behavior provides failover, but no workload management.
The server with the active messaging engine has local access to the bus, but the rest of the
servers in the cluster access the bus remotely by connecting to the active messaging
engine. Servers accessing the bus remotely can consume asynchronous messages from a
remote messaging engine. However, by default, an instance of a message-driven bean
(MDB) deployed to the cluster can consume only from a local messaging engine.
Because everything is funneled through one messaging engine, performance might still be
an issue.
15-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• No failback
• By default, if the consumer app runs on the same cluster as the bus
member, only MDBs with an active ME get messages from the
destination
– You can configure all MDBs on all cluster members to receive messages
– Configure the activation specification by using the option: always activate MDBs
in all servers
Notes:
The ME runs on only one cluster member; the HA Manager decides which cluster member.
If the host cluster member fails, the ME fails over to another cluster member, which
continues to host the ME even when the original cluster member is running again. There is
no failback.
By default, only MDBs on the host cluster member can get messages from the destination,
but you can configure all consumers on all cluster members to receive messages. You
must enable the option. Always activate MDBs in all servers, on the activation specification.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Existing
messaging
engines:
000 and 001
Notes:
Each cluster member has its own ME. If one cluster member fails, its ME does not fail over
to another cluster member.
15-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Existing messaging
engines
(arrows indicate
failover Æ and
failback Å)
Figure 15-34. Example: Scalability with high availability policy WA855 / VA8551.0
Notes:
Each server in the cluster is able to host two MEs, its own and one for the other cluster
member.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
15-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• A topology that consists of just one cluster bus member by using a high
availability policy is adequate for many applications
– This results in a single ME
Notes:
Messaging engine topologies can have many interconnected buses in a cell or stand-alone
node (single server). A common pattern is to have one SIBus in a stand-alone single
server.
The default topology, which consists of just one ME on a bus, is adequate for many
applications.
Advantages in deploying more than one ME, and linking them together, are:
• Spreading messaging workload across multiple servers
• Placing message processing close to the applications that are using it
• Improving availability in the face of system or link failure
• Accommodating firewalls or other network restrictions that limit the ability of network
hosts all to connect to a single ME
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ME-1 SIBus 1
Server1
ME-2
SIBus 2
Notes:
With a stand-alone server that is not part of a federated environment, there are not many
options for configuring SIBus topology. You can use different buses for different
applications. There is obviously no support for clustered bus members when using a
stand-alone server that is not part of a cell.
15-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
ME-1
• A bus can connect to other
buses, which are known as
foreign buses SIBus link
Notes:
You can also connect the buses between different stand-alone servers.
A bus can connect to other buses, which are referred to as foreign buses. If messaging
engines are on different buses, applications can use those different buses, each with its
own topology and set of resources. The inter-bus links might reflect the distribution of
buses across organizations, across departments within organizations, or perhaps the
separation of test and production facilities. Depending on the type of the foreign bus, you
create either a Service Integration Bus link or a WebSphere MQ link.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ServerD
ServerB SIBus 1
ME
ME
ME
ServerE
ServerA
ME ME
ServerC
SIBus 2 ServerF
ND cell
Figure 15-39. SIBus and MEs in a Network Deployment cell WA855 / VA8551.0
Notes:
A typical WebSphere Application Server configuration is to define a single bus for each
WebSphere cell and to run a default ME in each application server that is a member of this
bus. This configuration serves as the embedded JMS provider, and provides SIBus
capabilities for web service applications.
MEs run inside an application server and alongside Java EE applications and their
containers. You can have multiple MEs running in the same application server. This
behavior is to allow the processing that is related to different sets of messaging
applications, which run within the process that is going to be separated. It also allows for
the different applications to use different buses, each with its own topology and set of
resources. There is no architectural requirement for MEs within the same process to be
members of different buses. It is possible to have two MEs that are part of the same bus
both running in the same process, which can occur under different policy settings for
clustered bus members.
15-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
When you have a bus, every destination on that bus must have a unique name; so to a
certain extent, the bus is a namespace. If you have a second bus, you can have another
destination with the same name as one in the first bus. When you go to the level of the JMS
proxies in the JNDI namespace, a JMS destination specifies only the destination name, not
the bus name. The connection factory specifies the name of the bus to connect to. Thus, to
connect to two different destinations, it would be possible to use the same JMS destination
with two different connection factories that specify different bus names.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
SIBus link
Cell 2
SIBus 1 WebSphere MQ
Queue
MQlink Manager
ME ME
ServerA ServerB
Notes:
Protocol attachment is the only way WebSphere MQ applications can interact with
WebSphere Messaging applications. WebSphere Messaging does not directly support any
WebSphere MQ programming interface, such as the MQI or the AMI. Connectivity between
a messaging engine and a WebSphere MQ queue manager is established by defining a
WebSphere MQ link. One of the primary functions of the WebSphere MQ link is to convert
between the formats and protocols that WebSphere MQ and WebSphere default
messaging use. A component that is called the JS/MQ protocol adapter handles this
conversion.
15-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Additional messaging
considerations
Notes:
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
For a complete configuration of WebSphere Messaging, you might consider quality of
service, mediation, SIBus security, and interoperability with WebSphere MQ.
15-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Select Service integration > Buses > bus_name > Destinations > destination_name.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• EXPRESS_NONPERSISTENT
– Messages are written asynchronously to persistent storage if
memory cache overruns
Performance
Reliability
• RELIABLE_NONPERSISTENT
– Same as EXPRESS_NONPERSISTENT, except you have a
low-level acknowledgement message
• RELIABLE_PERSISTENT
– Messages are written asynchronously to persistent storage
during normal processing
• ASSURED_PERSISTENT
High – Highest degree of reliability where assured delivery is Low
supported
Notes:
You can define quality of service on a destination basis to determine how messages are (or
are not) persisted.
Quality of service is configured through the administrative console in the Service
Integration > Buses > Destinations page.
You can also specify quality of service within the application.
• BEST_EFFORT_NONPERSISTENT
- Messages are never written to disk.
- Throw away messages if the memory cache overruns.
• EXPRESS_NONPERSISTENT
- Messages are written asynchronously to persistent storage if the memory cache
overruns, but are not kept over server restarts.
- No acknowledgment that the ME received the message.
15-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • RELIABLE_NONPERSISTENT
- Same as EXPRESS_NONPERSISTENT, except that you have a low-level
acknowledgment message for which the client code waits before returning to the
application with an OK or not OK response.
• RELIABLE_PERSISTENT
- Messages are written asynchronously to persistent storage during normal
processing, and stay persisted over server restarts.
- If the server fails, messages are lost if they are held in the cache at the time of
failure.
• ASSURED_PERSISTENT
- Highest degree of reliability where assured delivery is supported.
Express nonpersistent and reliable persistent are defaults for nonpersistent and persistent.
In express nonpersistent, messages are sent from a producer to the ME, but there is never
an acknowledgment flow (at the low-level communications layer) to indicate that the ME
has the message. You return to the application immediately and assume that all is well. In
the reliable nonpersistent, you have a low-level acknowledgment message that the client
code waits for before returning to the application with an OK or not OK response. Thus,
express runs faster, but with a slightly lower level of reliability.
Quality of service is configured through the administrative console in the Service
Integration > Buses > Destinations page.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
What is a mediation?
• Mediation: The ability to manipulate a message as it traverses the
messaging bus (destination)
– Transform the message
– Copy or reroute the message to a different destination, or sequence of
destinations
– Allow interaction with nonmessaging resource managers (for example,
databases)
• Mediations are attached administratively to a destination
Destination
Mediation Destination
Notes:
A mediation is a programmable extension to the messaging capabilities of WebSphere
Application Server that can simplify connecting systems, services, applications, or
components that use messaging. A mediation is used to process in-flight messages.
A mediation can do the following types of processing:
• Modifying or transforming a message
• Routing messages (or cloned messages) to other or more destinations
• Allowing or disallowing a message to be delivered based on some conditional logic in
the mediation
15-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
SIBus security
• SIBus security can be enabled when the bus is created
• Authentication:
– Inherit cell level security domain (default)
– Use a selected security domain
Notes:
Several new security panels are provided in the administrative console to help configure
role-based access to bus resources. Previously, the only way to administer the role-based
authorization mechanism was through several commands that were used in wsadmin.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The default messaging provider (service integration) can use a WebSphere MQ link or a
WebSphere MQ server to interoperate with a WebSphere MQ network. Alternatively, you
can use WebSphere MQ as your messaging provider. Each type of connectivity is designed
for different situations and provides different advantages. Choose the most appropriate
interoperation method for each of your messaging applications.
15-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A WebSphere MQ link provides a server-to-server channel connection between a service
integration bus and a WebSphere MQ queue manager or queue-sharing group, which acts
as the gateway to the WebSphere MQ network. When you use a WebSphere MQ link, the
WebSphere MQ network sees the messaging bus as a virtual queue manager, and service
integration sees the WebSphere MQ network as a foreign bus.
A WebSphere MQ link allows WebSphere Application Server applications to send
point-to-point messages to WebSphere MQ queues (defined as destinations in the service
integration bus). Also, a WebSphere MQ link allows WebSphere MQ applications to send
point-to-point messages to destinations in the service integration bus (defined as remote
queues in WebSphere MQ). The link also allows WebSphere Application Server
applications to subscribe to messages that WebSphere MQ applications publish, and
WebSphere MQ applications to subscribe to messages that WebSphere Application Server
applications publish. The link ensures that messages are converted between the formats
that WebSphere Application Server uses and the formats that WebSphere MQ uses.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Describe what WebSphere Messaging is and how it is used
• Describe messaging components such as JMS providers, the service
integration bus (SIBus), and messaging engines
• Configure resources to support messaging applications such as
queues, topics, and connection factories
• Implement various clustered messaging engine policies for high
availability and scalability
• Create links to foreign buses and WebSphere MQ
• Describe how JMS and WebSphere MQ use the SIBus to support
application messaging services
Notes:
15-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. Name two types of JMS destinations.
Notes:
Write your answers here:
1.
2.
3.
4.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. Name two types of JMS destinations.
Queues and topics
Notes:
15-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 11
Notes:
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise objectives
After completing this exercise, you should be able to:
• Explain some of the design decisions that are required to set up a
messaging environment
• Explain how to configure the service integration bus, messaging
engines, and bus destinations in WebSphere Application Server
• Explain how to set up basic SIBus security
• Explain how to configure JMS queues, connection factories, and
activation specifications for message-driven beans
• Explain how to install and test the messaging features of the two
example programs
Notes:
15-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Server1 Server2
Trade
Message
5 processor
sender app
app (MDB)
4 JMS JMS
connection activation
factory JMS spec
destination
queue
Notes:
1. Create and secure an SIBus named msgBus.
2. Add PlantsCluster as a bus member.
3. Create the SIBus destination named TradeQueueDestination.
4. Create the JMS objects that the messaging applications require.
5. Install the messaging applications to the PlantsCluster.
© Copyright IBM Corp. 2013 Unit 15. Introduction to WebSphere Messaging 15-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server ND V8.5 Information Center:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Describe the flexible management topology
• Describe the function of the job manager and the administrative agent
• Configure target hosts for the job manager
• Configure CIM jobs for the job manager
• Submit a job to install the Installation Manager on a remote host
• Monitor the status of a job manager job
Notes:
16-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Flexible management
• Job manager
• Centralized Installation Manager (CIM) in the job manager
Notes:
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
16-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Flexible management
Notes:
16-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Flexible management
• The flexible management model addresses scalability requirements
with the introduction of the job manager
– A single job manager can manage many WebSphere Application Server base
edition and Network Deployment topologies that are registered with it as
managed nodes
Notes:
The flexible management model addresses scalability requirements with the introduction of
the job manager. A single job manager can manage several WebSphere Application Server
Base edition and Network Deployment cell topologies that are registered with it as
managed nodes. In this model, rather than using administrative operations directly against
stand-alone servers and deployment managers, they are instead submitted as
administrative jobs to the job manager. The managed nodes then fetch these
administrative jobs at predefined intervals. A job manager supports configuration and
control (start and stop) operations for servers, clusters, and applications. It also supports
execution of wsadmin scripts as administrative jobs.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Application
server Application Deployment
endpoint Admin Admin server manager
agent agent Dmgr
console console
Master
Master
Application
config
configuration
Local server
repository
repository
configuration
repository
Notes:
This slide shows the topology that is used in a flexible management environment. In this
environment, there can be one or more job manager endpoints, each containing a job
manager process, and running code for a job manager console. There is also a cache of
endpoint information to minimize the time that is needed to fetch some information. If there
are multiple job managers, they are not clones of each other but are independent entities.
The job managers connect through a network to one or more WebSphere Application
Server endpoints. Each of these endpoints contains a WebSphere node. The node
contains a process that is called the administrative agent, which runs code for an
administrative console that is known as the administrative agent console. The node also
contains a local configuration repository and some number of application servers. It is also
possible to have a job manager control one or more deployment managers, as shown in
the lower right section of the slide.
16-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Flexible management environments rely on asynchronous processing of work units (known
as jobs) from the job manager. This approach supports large scaling and can support many
application servers without degrading performance. It also reduces latency and bandwidth
requirements on the network; even dial-up lines to remote sites can work well without
slowing down the overall system. Additionally, configuration information does not exist
beyond the node level, so no bottleneck is associated with accessing a master
configuration repository.
Flexible management is not a replacement for the network deployment model but can be
used as an alternative to it. The two models can be combined by having a job manager
coordinate management actions across multiple deployment managers.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Administrative agent
• New profile type to support flexible management
• Register base application server profiles with the administrative agent
– Reduces application server footprint
– Offloads administrative functions to administrative agent
– Most administrative function is removed from base application servers
– Maintains isolation between base nodes; no master repository or synchronization
• Register base application server profiles with the job manager through
the administrative agent
• Administrative agent polls job manager for jobs on behalf of application
servers
Notes:
An administrative agent provides a single interface to administer multiple unfederated
application server nodes in environments such as development, unit test, or that portion of
a server farm that is on a single machine.
The administrative agent and application servers must be on the same machine, but you
can connect to the machine from a browser or the wsadmin tool on another machine.
You can register an application server node with the administrative agent or federate the
node with a deployment manager, but not both.
16-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative
agent
Notes:
The administrative agent is designed as an option to complement the WebSphere
Application Server base topology, in which the stand-alone application server continues to
serve the application requests. Only administrative services from the server are
consolidated into the administrative agent. For every WebSphere Application Server base
profile registered with the administrative agent, an administrative subsystem is created
within the administrative agent to represent the new administrative entry point for that
profile.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Multiple customers administer application servers in their development, test, and
production environments by federating the application server nodes into a cell and
administering the application servers from the deployment manager. However, if you have
development and unit test environments, then you might prefer to run application servers
whose nodes are not federated. These application servers have some administrative
disadvantages. The application servers lack a common administrative interface. Remote
administration is limited to installing applications and changing application server
configurations. As an alternative, you can register these application servers with an
administrative agent to administer application servers from a single interface and to more
fully administer application servers remotely.
16-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Job manager
• New profile type to support flexible management
• Use administrative agent to register base server profiles with a job
manager
• To manage multiple cells, register deployment managers with job
manager directly
• Use job manager to queue jobs for registered profiles
• Registered profiles retain autonomy and can be managed without the
job manager
• Scales to support large number of registered profiles
Notes:
The job manager is a new server type that is added to support flexible management. It is a
new profile type, and the various tools that can create profiles are modified to support
creation and maintenance of this profile. The job manager is central to flexible
management.
To participate in flexible management, a base server first registers itself with the
administrative agent. The base server must then register with the job manager. If a
deployment manager wants to participate in an environment that a job manager controls,
the deployment manager registers directly with the job manager; no administrative agent is
involved in this case.
The main use of the job manager is to queue jobs to application servers in a flexible
management environment. These queued jobs are pulled from the job manager by the
administrative agent and distributed to the appropriate application server or servers.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Cell A Cell B
Admin Admin
DMgr DMgr
agent agent
Application Application
servers servers
Notes:
The job manager is designed to complement the Network Deployment and Base edition
topologies. Existing nodes are not required to be reconfigured. A single job manager can
manage hundreds of nodes, and multiple job managers can manage a single node. This
model is different from having ownership of a managed node by the deployment manager
in a network deployment topology.
• The topologies that a job manager controls maintain their autonomy, including their
security configuration, and thus they can be directly managed with existing
administrative processes, such as scripts or the administrative console.
• This model allows coordinated management actions across multiple managed nodes
that are defined as a group.
• The asynchronous job submission model facilitates the management of nodes that are
geographically dispersed and reachable only through low-bandwidth, high-latency
networks.
16-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Manage applications
• Run wsadmin script
– Download application EAR
files • Configure properties
– Install or uninstall application
• Inventory
– Start or stop application
– Update application • Status
• Manage offerings
Notes:
Examples of jobs in flexible management are installing an application, creating an
application server, running a wsadmin script on a remote node, and many others.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Status is displayed in a chart with which you can drill down to look at which nodes are
completed under each state. The chart indicates status by color and position in the
summary bar.
When you submit a job, it starts out with incomplete status. When the job is retrieved, the
detailed status shows it as distributed, then in progress. The normal progression of jobs at
that point is for their status to go to successful, partially successful, or failed. It takes at
least two polling cycles to retrieve a job and then return results, and it can take more
cycles, according to how long the job actually takes to process on the node. The polling
cycle time is configurable at the administrative agent or the deployment manager. You
might find that the status summary shows incomplete nodes, but when you drill down, no
nodes show in the list. When you refresh the status summary, you find that the node either
completed or failed in that window of time and is no longer incomplete.
16-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
16-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Job manager
• Two types of job manager
– Stand-alone job manager profile: has a separate administrative console
– Job manager server: Runs within the deployment manager
• The deployment manager administrative console has a Jobs navigation tree
with choices similar to the options in the job manager administrative console
• With each job manager, you can submit administrative jobs
asynchronously for:
– Application servers that are registered to administrative agents
– Deployment managers
– Remote host computers
• Centralized Installation Manager (CIM) tasks can be submitted as jobs
in the job manager
Notes:
The job manager “embedded” within the deployment manager profile is identical to the
stand-alone job manager profile in terms of function.
Here are some additional facts about the “embedded” job manager.
• It runs within the deployment manager process.
• It has no jobs that are defined until you register a target host.
• The jobs available depend on what target hosts are registered. If you register a remote
host with no WebSphere products installed, then you see only the CIM-related job
types. If you register a stand-alone WebSphere node, then you see all the job manager
job types.
• You can register the host machine of the deployment manager as a target.
• You can use an administrative agent to register a stand-alone WebSphere Application
Server node (use administrative host port 9043, not default 9943).
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• You can use the ordinary “Register with job manager” function of the deployment
manager to register the deployment manager itself to its job manager. Use
administrative host port 9043.
16-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 16-16. The deployment manager job manager process WA855 / VA8551.0
Notes:
There is a new link for the job manager under the System administration section. Clicking
the link shows you its configuration and runtime properties. In this screen capture, you can
see that the process ID for the job manager and the deployment manager is the same. The
job manager is part of the deployment manager process. Even though the deployment
manager now has its own job manager that is contained within it, it is still possible to
register the deployment manager to a stand-alone job manager in a flexible management
topology.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
No jobs are defined for the job manager until at least one target host is registered with the
job manager. It is possible to register the host of the job manager as a target.
16-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Registering targets
• Host targets
– Register from job manager
– Jobs > Targets > New Host
• Deployment manager targets
– Register from deployment manager
– System administration >
Deployment manager > Job
managers > Register with Job
Manager
• Base node targets
– Register from administrative agent
– Use registernode command first
– System administration >
Administrative agent > Nodes >
Register with Job Manager
• After registration, jobs can be
submitted to the target © Copyright IBM Corporation 2013
Notes:
Use the panel that is shown in the screen capture to register a new host with the job
manager.
In place of a password, you can also configure public-private key authentication.
You can choose to save security information. If selected, the security properties are saved
with the host and are used as defaults for subsequent job submissions to this host.
For Windows targets, some special configuration is required on the Windows host. See the
information center topic, “Requirements for using Remote Execution and Access (RXA)”,
for details:
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r0/index.jsp?topic=/
com.ibm.websphere.installation.nd.doc/info/ae/ae/
cins_cim_rxa_requirements.html
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The first step in the submit job wizard is to choose a job type. The screen capture on this
slide shows all the available job types.
16-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Inventory
– Refresh data on job types and on managed resources
• Install, update, and uninstall IBM Installation Manager
• Manage offering
– Install, update, uninstall WebSphere Application Server
• Manage profile
– Create, delete, augment, back up, list, and restore profiles on remote hosts
• Run command
– Run command-line utilities such as startServer, wsadmin commands, or
operating system commands on a remote host
• Install SSH public key
• Distribute, collect, and delete file
• Test connection
– Verify access to remote hosts registered with the job manager
© Copyright IBM Corporation 2013
Figure 16-20. Job manager jobs for host targets WA855 / VA8551.0
Notes:
Submit the Run command on a remote host job to run command-line utilities such as
startServer, wsadmin commands, or operating system commands on a remote host. A
WebSphere Application Server installation on the remote host is required to run product
commands, but is not required for non-product commands.
Important note about uninstalling IBM Installation Manager: Before you can uninstall
IBM Installation Manager, you must uninstall all the products that it installed. Because of
this fact, you cannot uninstall the Installation Manager from the host machine of the local
deployment manager.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 16-21. Job manager jobs for WebSphere targets WA855 / VA8551.0
Notes:
The point of this screen capture is to show that the list of job types available to the
stand-alone job manager is different from the list that is seen in the administrative console.
(The list from the administrative console is shown on the previous slide.) The job types
available in the administrative console depend on the kinds of targets that are registered
with the deployment manager.
16-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
You can submit the Install Liberty profile resources job to extract resources in a Liberty
profile image to destination directories relative to a root directory.
Before running the Install Liberty profile resources job, the following conditions must exist:
• The job manager must be running.
• A host computer must be registered with the job manager.
• The image, a compressed .zip file, must contain Liberty profile resources in a
directory structure that satisfies job manager rules.
• The root directory to install the resources on the target host must be defined. At
minimum, set the WLP_WORKING_DIR variable to a valid directory on a target host.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
16-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Centralized Installation
Manager (CIM) in the job
manager
Figure 16-23. Centralized installation manager (CIM) in the job manager WA855 / VA8551.0
Notes:
16-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
IBM IBM
Installation Installation
Manager Manager
installation repository
kits (offerings)
WebSphere core
Deployment manager products
3 Inventory information
© Copyright IBM Corporation 2013
Figure 16-24. Centralized installation manager (CIM) in the job manager WA855 / VA8551.0
Notes:
CIM functionality is now a series of jobs available to the deployment manager’s job
manager. The job manager can store IBM Installation Manager installation kits for different
operating systems in a repository on the local file system. A job can be submitted that
“pushes” the required IBM Installation Manager kit to the target node and does the remote
installation with nothing more than target identification and the required authorizations. No
agents are required on the target host. Installation jobs for WebSphere Application Server
can be configured along with an appropriate response file for the remote target host. When
installed on the target host, the Installation Manager can pull the WebSphere code from an
IBM Installation Manager repository.
You can submit the Inventory job to refresh data on job types and on managed resources
of the job manager. Resources include applications and servers of each target. If you
installed a product that adds job types on a managed target, run the Inventory job to refresh
data on job types and target resources. You can view the refreshed data in the job manager
console.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 16-25. Add IBM Installation Manager installation “kits” WA855 / VA8551.0
Notes:
Click Jobs > Installation Manager installation kits to see a list of the kits currently
available in the local repository. Installation Manager installation kits are required for
application installation jobs. Use this page to specify the location where the Installation
Manager installation kits are stored. The list of Installation Manager installation kits
available from the location that is provided is shown in the screen capture.
Typically you download the kits from an IBM WebSphere site and store the compressed
files in a local file system directory, <profile_root>/dmgr_name/IMKits by default.
This panel allows you to view your Installation Manager installation kits from a centralized
location. For each installation kit, the list includes detailed information about name, size,
version, operating system, and platform. Use the Refresh button to generate a list of the
installation kits in your specified location, and use the Add or Delete button to add or
delete installation kits from your list.
16-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 16-26. Job example: Install IBM Installation Manager WA855 / VA8551.0
Notes:
In a flexible management environment, you can submit the Install IBM Installation Manager
job to install the Installation Manager on registered hosts of the job manager.
Start the job manager and the targets. Ensure that the targets for which you want to install
Installation Manager are registered with the job manager.
To submit jobs, your ID at the job manager must be authorized for the administrator role or
the operator role. When you submit a job, you can specify a user name and password for
authentication and authorization at the target or targets. When you submit a job to multiple
targets, the user name and password or the credentials for the submitter must apply to all
of the job targets.
To run the job against many targets, optionally create a group of targets and submit the job
against the group.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Step 3: Specify
IBM Installation
Manager kit
location on job
manager and
installation
directory on target
© Copyright IBM Corporation 2013
Notes:
• The path and file name of the Installation Manager kit
Specify the fully qualified path and name of the IBM Installation Manager installation kit
on the job manager. If you do not enter any information into this field, the Install IBM
Installation Manager job locates the most recent IBM Installation Manager installation kit
from the repository. The default location is in the $JOB_MANAGER_HOME/IMKits
directory.
• Installation Manager agent data location
Specify the fully qualified path of the Installation Manager agent data location on the
remote host. Leave it empty to use the IBM Installation Manager default agent data
location.
• Installation Manager installation directory
Specify the fully qualified path of the IBM Installation Manager installation location on
the remote host. Leave it empty to use the IBM Installation Manager default installation
location.
16-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Job scheduling
• Step 4: Schedule
the job
• Options
– Email notification
– Job availability
– Job expiration
– Job availability
interval
Notes:
You can specify one or more email addresses where notifications are sent when the job is
done.
Select when the job is available for submission. You can submit the job to be available now,
or specify a time and date that the job is retrieved from the job manager.
Select the job expiration. The job expiration is the time at which the job is no longer
available for nodes to run. You can use the default expiration, specify a time and date for
the job expiration, or specify an amount of time in which the job expires. The default
expiration is defined on the job manager configuration page.
Optionally specify a recurring interval for the job, a start date, and time for the interval, and
an end date and time for the interval.
16-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Job status
• Click Jobs > Job status
• If job status is Incomplete, click the Job ID link for more details
Notes:
All jobs can be monitored in the Job status panel.
A job that is still being processed shows a status of Incomplete. The two jobs that are listed
on the screen capture have a status of Succeeded. The Active state refers to a
configurable time interval over which the job can be resubmitted if it is configured to repeat.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
• Depending on your security setup, you can also specify key ring
credentials to authenticate to the product repository
Notes:
After the job manager successfully completes the installation process on a remote node, it
then deletes the installation image files in the temporary location that you specified during
the installation process. If the installation is unsuccessful, the files remain in the temporary
location for you to use to determine what caused the installation error. However, you can
safely delete the files.
16-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere Application
Server Network
Job Deployment
manager
CIM Installation
manager
1 Manage offerings job
+ response file
washost02
was8host01
© Copyright IBM Corporation 2013
Notes:
When a target host is registered with a job manager and the Installation Manager is also
installed on the target, a manage offerings job can be submitted to the job manager. A
response file must be provided during the job configuration that specifies what product is
going to be installed and how to access the binary files for that product from the IBM
Installation Manager repository.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
A URL or a fully qualified path to the response file on the job manager host is the only
required job parameter.
The response file can be generated with IBM Installation Manager.
16-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Here is an example response file that is used to install WebSphere Application Server V8
on a Windows target host.
<?xml version="1.0" encoding="UTF-8"?>
<!--The "acceptLicense" attribute has been deprecated. Use "-acceptLicense"
command-line option to accept license agreements.-->
<agent-input acceptLicense='true'>
<server>
<repository location='http://was8host01/MyRepository/WAS8'/>
</server>
<profile id='IBM WebSphere Application Server Network Deployment V8.0'
installLocation='C:\Program Files\IBM\WebSphere\AppServer'>
<data key='eclipseLocation' value='C:\Program
Files\IBM\WebSphere\AppServer'/>
<data key='user.import.profile' value='false'/>
<data key='cic.selector.nl' value='en'/>
</profile>
<install modify='false'>
<offering id='com.ibm.websphere.ND.v80' version='8.0.0.20110503_0200'
profile='IBM WebSphere Application Server Network Deployment
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
V8.0'features='core.feature,ejbdeploy,thinclient,embeddablecontainer,com.ib
m.sdk.6_32bit,samples' installFixes='none'/>
</install>
<preference name='com.ibm.cic.common.core.preferences.eclipseCache'
value='C:\Program Files\IBM\IMShared'/>
<preference name='com.ibm.cic.common.core.preferences.connectTimeout'
value='30'/>
<preference name='com.ibm.cic.common.core.preferences.readTimeout'
value='45'/>
<preference
name='com.ibm.cic.common.core.preferences.downloadAutoRetryCount'
value='0'/>
<preference name='offering.service.repositories.areUsed' value='true'/>
<preference name='com.ibm.cic.common.core.preferences.ssl.nonsecureMode'
value='false'/>
<preference
name='com.ibm.cic.common.core.preferences.http.disablePreemptiveAuthenticat
ion' value='false'/>
<preference name='http.ntlm.auth.kind' value='NTLM'/>
<preference name='http.ntlm.auth.enableIntegrated.win32' value='true'/>
<preference
name='com.ibm.cic.common.core.preferences.preserveDownloadedArtifacts'
value='true'/>
<preference name='com.ibm.cic.common.core.preferences.keepFetchedFiles'
value='false'/>
<preference name='PassportAdvantageIsEnabled' value='false'/>
<preference name='com.ibm.cic.common.core.preferences.searchForUpdates'
value='false'/>
<preference name='com.ibm.cic.agent.ui.displayInternalVersion'
value='false'/>
</agent-input>
16-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Command line CIM AdminTask Use the submitJob command of the job
commands manager
© Copyright IBM Corporation 2013
Figure 16-33. Differences between CIM for V 8 and CIM for V 6.1 and 7 WA855 / VA8551.0
Notes:
The version 8.5 centralized installation manager (CIM) can be used to manage version 8.5
and previous versions of WebSphere Application Server. You can use CIM to install or
uninstall version 8.5 and previous versions of WebSphere Application Server on remote
machines and apply maintenance from the administrative console. In version 8.0 and later,
targets can be added outside of the cell. The process for managing version 7 and previous
versions is different from the process for managing version 8, and each process is
documented separately in the information center.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Describe the flexible management topology
• Describe the function of the job manager and the administrative agent
• Configure target hosts for the job manager
• Configure CIM jobs for the job manager
• Submit a job to install the Installation Manager on a remote host
• Monitor the status of a job manager job
Notes:
16-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. True or false: Flexible management is an alternative to the Network
Deployment cell model, not a replacement.
Notes:
Write your answers here:
1.
2.
3.
4.
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. True
3. True
4. True
Notes:
16-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Demonstration
Notes:
These demonstrations can be found online at the following location:
https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/WebS
phere%20Education%20Wiki/page/WebSphere%20Application%20Server%20V8%20Admin
istration%20Course%20Demonstrations
They are also in the following directory of the lab machine.
Linux: /usr/software/demos
© Copyright IBM Corp. 2013 Unit 16. Job manager and centralized installation manager 16-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Demonstration objectives
After viewing these demonstrations, you should be able to:
• Add a target host to the job manager
• Submit a job to install IBM Installation Manager
• Submit a Manage Offerings job to install WebSphere Application
Server V8 on a remote host
• Submit a Manage Profiles job to create a stand-alone server profile on
a remote host
• Register a deployment manager with the job manager
• These demonstrations can be found online at the following location:
https://www.ibm.com/developerworks/community/wikis/h
ome?lang=en#!/wiki/WebSphere%20Education%20Wiki/page
/WebSphere%20Application%20Server%20V8%20Administrat
ion%20Course%20Demonstrations
• Note: These demonstrations are recorded with version 8.0. However,
the functions that they demonstrate are the same in 8.5.5
Notes:
16-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Define Intelligent Management
• Describe virtualization and autonomic computing
• Define intelligent routing
• Describe dynamic workload management
• Describe health management features
• Describe application edition management features
• Describe performance management features
Notes:
17-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Overview of Intelligent Management
• Intelligent Management components
• Health management
• Application edition management
• Performance Management
• Deployment manager high availability
Notes:
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Overview of Intelligent
Management
Notes:
17-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Intelligent Management
• Intelligent management provides application server virtualization,
resource management, and advanced operations
Notes:
Intelligent Management provides a virtualized infrastructure that redefines the traditional
concepts of Java Platform, Enterprise Edition (Java EE) resources and applications and
their relationships with one another. This application infrastructure virtualization facilitates
the ability of the product to automate operations in an optimal manner, increasing the
quality of service. By introducing an automated operating environment with workload
management, you can reduce total cost of ownership by using less hardware to do more
work.
The dynamic operations environment consists of autonomic managers whose purpose is to
use defined business goals to maximize utilization. Dynamic operations allow an
application environment to scale as required by the virtualization of WebSphere resources
and the use of a goals-directed infrastructure. Therefore, you can increase the speed at
which your environment adapts to the business requirements. Using the dynamic
operations features of WebSphere Application Server, you can change the way a typical
WebSphere environment is configured to one that has the following features:
• Improves the utilization of available resources such as processor and memory
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Intelligent Management
App App
version version
1.0 2.0
Intelligent routing
Notes:
Overview of intelligent routing capabilities:
• A routing tier that is aware of what is happening on the application server tier and
reacts; business-critical applications are given priority
• Automatic routing without needing to update configuration files
• A highly scalable routing tier
• Ease of management
• Flexible policy-based routing to control if, when, and where requests are routed
• A highly available deployment manager
Overview of health management capabilities:
• Automatically detect and handle application health problems without requiring
administrator time, expertise, or intervention
• Intelligently handle health issues in a way that maintains continuous availability
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
History
WebSphere Extended
Deployment
WebSphere Virtual
Dynamic clustering Enterprise
Batch processing
WebSphere Compute
Grid
WebSphere
WebSphere WebSphere Application Server
Application Server Application Server V8.5
V7 and earlier V8 and earlier Dynamic clustering
Batch processing
Notes:
The biggest news under the theme of application resiliency is probably the integration of
the features from WebSphere Virtual Enterprise into WebSphere Application Server
Network Deployment. This merge allows a single WebSphere Application Server Network
Deployment installation to deliver the traditional Network Deployment functions, and also
WebSphere Virtual Enterprise functions. The former WebSphere Virtual Enterprise
functions now in Network Deployment V8.5 are characterized as Intelligent Management
features and encompass:
• Intelligent routing
• Application edition management
• Dynamic clustering
• Health management
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Intelligent Management
components
Notes:
17-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Dynamic clusters allow the amount of resources available for application requests to be
adjusted dynamically.
Service policies allow business goals to be used for decision making in how requests are
handled.
Autonomic managers provide information and act to implement intelligent management
functions.
Intelligent routers intelligently dispatch incoming requests to the application server tier.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Dynamic clusters
• A dynamic cluster is a cluster of servers where the number of active
cluster members can change dynamically
• The number of cluster members that are started is based upon current
application demand and service policies
– Cluster member weights and workload management are used to balance
workload of cluster members
Notes:
A dynamic cluster is a server cluster that enables application server virtualization.
Members of a dynamic cluster are:
• Automatically created based on a membership policy
• Automatically updated by using a server template
• Automatically started and stopped based on current demand, available resources, and
service policies
These features allow the application environment to dynamically expand and contract; it
depends on the amount of workload that must be handled at any time.
17-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A dynamic cluster is a virtual cluster of application servers that hosts an application. These
application servers are on groups of nodes that are indicated by using the cluster
membership policy. The membership policy is compared against the nodes in your cell, and
servers are created for the dynamic cluster by using nodes that match the policy. When
new nodes are added to your environment, they are added automatically to the dynamic
cluster if they match the defined membership policy.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Service policies
• Service policies specify how to classify an incoming request using the
request’s attributes
– Such as URI, client name, or HTTP headers
Notes:
A service policy is a user-defined categorization that is assigned to potential work as an
attribute that the application request flow manager (ARFM) reads. You can use a service
policy to classify requests that are based on request attributes. These attributes include the
Uniform Resource Identifier (URI), the client name and address, HTTP headers, query
parameters, cookies, and time of day. By configuring service policies, you apply varying
levels of importance to the actual work. You can use multiple service policies to deliver
differentiated services to different categories of requests.
17-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
With Intelligent Management, you can introduce autonomic capabilities into your
infrastructure at your own pace. Autonomic capabilities are delivered in a set of
components that are known as autonomic managers. Autonomic managers monitor
performance and health statistics through a series of sensors; they optimize system
performance and run traffic shaping.
• Dynamic workload controller
The dynamic workload controller dynamically adjusts server weights to even out and
minimize response times across the cluster. There is one dynamic workload controller
per cluster. The dynamic workload controller maintains a list of active server instances
for each dynamic cluster, and assigns each a routing weight according to observed
performance trends. Requests are then routed to candidate server instances to balance
workloads on the nodes within a dynamic cluster that is based on a weighted least
outstanding requests algorithm.
• The application placement controller
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The application placement controller is responsible for the management of the location
of an application within a node group. A single application placement controller exists in
the cell and is hosted in the deployment manager or in a node agent process. The
application placement controller starts and stops application server instances to
manage HTTP, SIP, JMS, and IIOP traffic. The application placement controller can
dynamically address periods of intense workflow that would otherwise require the
manual intervention of a system administrator.
• The on-demand configuration manager
The on-demand configuration manager maintains cell topology information and keeps
the ARFM and other controllers aware of its environment. It tracks updates in cell
topology and state, including the following changes:
- Applications that are installed and removed
- Servers started and stopped
- Nodes that added and removed
- Classification updates
The on-demand configuration component allows the on demand router to sense its
environment. The on demand router dynamically configures the routing rules at run time
to allow the on demand router to accurately route traffic to those application servers.
17-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 17-13. Intelligent routers: the on demand router (ODR) WA855 / VA8551.0
Notes:
The on demand router classifies incoming HTTP and SIP requests and then works with
other Intelligent Management “decision makers” to route the workload in order. The on
demand router ensures that the highest priority is given to business-critical applications.
Requests are prioritized and routed based on administrator-defined rules, called service
policies, which are used to specify application response time goals.
The on demand router handles the queuing and dispatching of requests according to
operational policy. An on demand router can be defined and started before any service
policies are defined. Operational policies can be defined before the appearance of the work
to which they apply. However, if policies are not defined, the default policies handle the
early work. The on demand router, similar to the web server plug-in for WebSphere
Application Server, uses session affinity to route work requests. After a session is
established on a server, later work requests for the same session go to the original server.
This configuration maximizes cache usage and reduces queries to resources. The on
demand router accepts incoming requests and distributes these requests to the system in
an intelligent manner, reflecting configured business goals. This process is dependent on
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
the characterization of requests so that the relative business importance of each request
can be compared.
17-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Rather than a Java based server, the WebSphere plug-in intelligent router function is
added to an existing supported web server. The WebSphere plug-in intelligent router has
most of the same capabilities as the ODR, although they are implemented differently. Some
benefits of the plug-in intelligent router are that it is DMZ-ready, and it eliminates the extra
processing tier and network hop that the ODR intelligent router introduces.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Intelligent routing can improve the quality of service by ensuring that priority is given to
business-critical applications and users. Requests to applications are prioritized and routed
based on administrator-defined rules. It is easiest to start a discussion of Intelligent
Management by referring to the most visible component, the on demand router (ODR). The
ODR is a specialized, Java based proxy server that classifies incoming requests, and then
dispatches the requests across the application server environment.
17-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Health management
Notes:
17-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Intelligent Management provides a health management feature to monitor the status of
your application servers to sense and respond to problem areas before an outage occurs.
You can manage the health of your application environment with a policy-driven approach
that enables specific actions to occur when monitored criteria are met. For example, when
memory usage exceeds a percentage of the heap size for a specified time, health actions
can run to correct the situation.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Health policies
• Health policies can be defined for common server health conditions
Notes:
WebSphere can monitor servers for common health problems and take corrective action.
Various health conditions can be defined by using health policies. When a health policies
violation is detected, an action plan can be put into effect automatically:
• Notify administrators (including email)
• Capture diagnostics information (Java thread or heap dump)
• Restart server
Application server restarts are done in a way to prevent outage and service policy
violations. WebSphere provides the “First line of defense” for poor application health by
mitigating common health problems and routing around unhealthy servers. IBM Tivoli
Composite Application Manager for WebSphere extends WebSphere health management
by adding in-depth application problem determination capabilities. To find out at a granular
level what went wrong and how to fix it fast, IBM Tivoli Composite Application Manager
gives support teams the diagnostic tools that they need. IBM Tivoli Composite Application
Manager provides Rational and Eclipse developer and test tools with performance data
17-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty captured in production, eliminating the need for attempting problem re-creation. IBM Tivoli
Composite Application Manager integrates with the broader Tivoli Automation portfolio that
enables customers to cost-effectively manage their IT infrastructure.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
You can use the administrative console to view existing health policies and create new
ones. Navigate to Operational policies > Health Policies to view any defined policies.
17-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Health conditions define the variables that you want to monitor in your environment.
Several categories of health policy conditions exist. You can choose from the listing of
predefined health conditions when creating a health policy.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Heath conditions
• Age-based: amount of time the server is running
• Excessive conditions:
– Excessive request timeout: percentage of timed out requests
– Excessive response time: average response time
• Memory conditions:
– Excessive memory usage: percentage of maximum JVM heap size
– Memory leak: JVM heap size after garbage collection
Notes:
• Excessive garbage collection: Triggers when the Java virtual machine (JVM) spends
more than a configured percentage of time when running garbage collections.
• Storm drain: Detects situations where requests are shifted toward a faulty cluster
member that advertises low response times. This condition is triggered when there is a
significant drop in the average response time. This drop must be measured at the on
demand router, for a member of the cluster that is coupled with an increase in the
dynamic weights for the cluster member.
• Workload: Triggers when the members that are associated with this policy serve a
user-defined number of requests. You can use the workload condition on all server
types.
17-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Actions can be taken automatically, or you can have them occur in supervised mode.
Supervised mode requires an operator to confirm the action.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Predefined actions
Notes:
When a health policy violation is detected, an action plan can be put into effect
automatically. Actions to take when a monitored condition is detected are designed to
bypass the problem and help in diagnosis. You can select the following predefined actions:
• Notifying an administrator
• Sending a Simple Network Management Protocol (SNMP) trap
• Restarting a server
• Putting a server into maintenance mode
• Generating Java cores or heap memory dumps for use in diagnosing the problem
17-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administering actions
Notes:
If you chose the Supervise reaction mode, then you receive recommendations to improve
your health conditions. These recommendations are displayed as runtime tasks that you
can accept, deny, or close. To manage runtime tasks, click System administration > Task
management > Runtime tasks in the administrative console. If you chose the Automatic
reaction mode, actions to improve the health of your environment occur automatically.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Maintenance modes
• Allows you to update your environment without disrupting traffic to the
production environment
• Servers or nodes are placed into maintenance mode which stops the
routing from the intelligent routing tier
– Application placement controller also excludes server or node from automatic
application placement
– Health controller uses the maintenance mode
Notes:
Periodic product maintenance is important to ensure that your system environment works
correctly, and to avoid trouble that known issues cause. At some point in time, you might
have a problem with a server and find that diagnostic tests are necessary to troubleshoot a
specific application server. These situations can lead to the disruption of client requests to
servers in your environment.
Using the Intelligent Management feature, you can maintain the environment without
disrupting traffic to the production environment. You can use it to administratively put a
server or node in the cell into maintenance mode.
Node maintenance mode:
You can put a node into maintenance mode when you want to apply operating system
fixes or do WebSphere maintenance. When a node is in maintenance mode, only traffic
with affinity to servers on the node is routed to the server by the on demand router. You
can set a maintenance immediate stop mode that immediately stops the servers on the
node.
17-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
You can define custom conditions for your health policy if the predefined health conditions
do not fit your needs. You define a custom condition as a subexpression that is tested
against metrics in your environment. When you define a custom condition, consider the
cost of collecting the data, analyzing the data, and if needed, enforcing the health policy.
This cost can increase depending on the amount of traffic and the number of servers in
your network. Analyze the performance of your custom health conditions before you use
them in production.
For further information about creating custom conditions, go to the following website:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/topic/
com.ibm.websphere.wve.doc/ae/cwve_hconditionsubex.html
17-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Application edition
management
Notes:
17-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Capabilities include:
– Roll out policies to switch from one edition to another with no loss of service
– Concurrent activation, where multiple editions can be concurrently active for an
extended period
– A validation mode to send selective traffic to verify correct operation
Notes:
Application edition management enables management of interruption-free production
application deployments. Using this feature, you can validate a new edition of an
application in your production environment without affecting users, and upgrade your
applications without incurring user outages. You can also run multiple editions of a single
application concurrently, directing different users to different editions, as the ODR
maintains not only traditional application state (for example, HTTP session) affinity, but also
application version affinity. The ability to queue requests is also employed with the
Intelligent Management application edition function, if you want the following outcomes:
• An “atomic” application update that allows preprovisioning of a new application version
• An “atomic” update of all users from the old application version to the new application
version
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Terminology
• Application editions: represents a unique instance of an application in
the environment
– Defined by the application name and an edition name
– Might be a distinct build version
– Might be the same build version with different deployment bindings (for example,
resource references)
– Might be both
Notes:
Application editions:
An application edition represents a unique instance of an application in the
environment. An application edition encompasses both application versions and
deployment bindings. An application edition is an application that is uniquely identified
as the combination of an application name and an edition name.
Edition names and descriptions:
With the application edition manager, you can install multiple editions of the same
application. Each edition is identified with an application edition name and description.
The edition name is a field in which you can specify a value to uniquely identify one
application edition from other editions of the same application. Create a version number
scheme for naming editions that is meaningful in your environment. Multiple editions of
the same application have the same application name but different edition names.
When deploying an application, you can also specify an edition description next to the
edition name, which gives you the ability to store more information.
17-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Components
• Application edition manager
– Interacts with the intelligent routers, dynamic workload manager, and application
placement manager
Notes:
The application edition manager ensures interruption-free production application
deployments. Interruption-free deployment prevents loss of service when you install an
application update in your environment.
The application edition manager provides an application versioning model that supports
multiple deployments of the same application in the Intelligent Management cell. Each
deployment has a unique edition name. The application edition manager allows you to
select the edition to activate on an Intelligent Management cluster so that you can do a
rollout of an application update or revert to a previous level.
The application edition manager is fully integrated with Intelligent Management, interacting
with the on demand router (ODR), dynamic workload balancing, and the application
placement manager. This integration ensures predictable application behavior when you
apply application updates, and a smooth transition from one application edition to another
while the system continues to manage your application performance goals. You can access
application update processes with the administrative console, including edition activation
across the application servers.
17-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Rollout activation (1 of 2)
• Activates one edition in place of another edition of an application
Notes:
Rollout activation activates one edition in place of another, ensuring an interruption-free
update in the process. Thus, all application requests are serviced during the rollout, and
none are lost. This process ensures continuous application operation from the perspective
of the customers of that application. To do the rollout, the application edition manager
carefully coordinates the activation of the edition and the routing of requests to the
application.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Rollout activation (2 of 2)
Quiesce
and stop Edition 2.0
Restart
Application
requests Edition 1.0
Intelligent
routers
Edition 1.0
Dynamic cluster
Notes:
Replacement of one edition with another in a production environment requires certain
discipline in the evolution of the application. Because edition replacement happens while
application users are potentially accessing the previous application edition, the new edition
must be compatible with earlier versions. Thus, the new edition cannot add or change any
existing application interfaces, including essential behavior. New interfaces can be added.
In addition, existing interfaces can be algorithmically corrected and, in some cases, even
extended and remain compatible with existing application users.
This slide displays an example of a group rollout scenario. In the diagram, a dynamic
cluster is created that consists of three servers. You first must divide the cluster into
groups, which tells the application edition manager how many servers to update at the
same time. If you do a rollout on a group, the servers in each group are upgraded to the
new edition at the same time. Each server in the group is quiesced, stopped, and reset.
As the rollout is run in the diagram on the slide, one server in the cluster is moved from
Edition 1.0 to Edition 2.0. During this time, the server does not receive user requests that
are directed from the on demand router, and the server is stopped. All application requests
17-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty are sent to the servers that are running Edition 1.0. After the server that is running Edition
2.0 is available, the on demand router directs application requests to that server. Any
servers that are still running Edition 1.0 do not serve requests until the edition is updated to
Edition 2.0.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Concurrent activation
Routing Cluster 1
policy
Edition 1.0
Intelligent
routers Edition 2.0
Legends:
Edition 1.0 requests
Cluster 2
Edition 2.0 requests
Notes:
Concurrent activation enables you to activate the same edition on different servers or
clusters. To use multiple editions concurrently, you must distinguish user requests from one
another so that the requests are sent to the application server that hosts the appropriate
edition. For example, if you introduce a new edition of an application, you might want only a
select group of users to test the edition.
17-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Validation mode
Dynamic cluster
Routing DC1
policy
Edition 1.0
Clone
Intelligent
routers Edition 2.0
Legends:
Edition 1.0 requests Dynamic cluster
Edition 2.0 requests DC1-validation
Notes:
Validation activation is a special form of concurrent activation. It activates an edition on a
clone of its original deployment target. The clone is created on activation of the edition.
After the validation rollout to the original deployment target, the clone is removed
automatically. This action allows you to do final preproduction testing of an application
edition in the actual production environment with a selected set of users.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
To use the administrative console to validate the results, click Applications > Edition
Control Center > application_name.
17-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This slide displays editions for the BeenThere application.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Performance Management
Notes:
17-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Dynamic clusters are used to scale up and scale down running cluster
members to meet response time goals
Notes:
The performance management feature provides dynamic cluster capabilities and overload
control. With dynamic clusters, you can automatically scale up and down the number of
running cluster members as needed to meet response time goals for your users. You can
use overload protection to limit the rate at which the on demand router forwards traffic to
application servers. Doing so helps prevent heap exhaustion, processor exhaustion, or
both from occurring.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
17-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
17-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Although it is not required to have a deployment manager that is always running, you might
require highly available administrative capability. This need occurs especially in
environments that have a significant number of new application deployments or updates
and server monitoring. Multiple instances of a deployment manager remove the single
point of failure (SPOF) for cell administration, thus assuring the attainability of the
administrative console, wsadmin, and scripting features to manage your environment.
WebSphere Application Server provides a mechanism for cloning your existing deployment
manager, thus achieving high availability, by employing redundant deployment managers
with a hot-standby model and the use of a shared file system.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Administrative
console Active deployment
On demand
routers manager
Shared
file system
Standby deployment
manager
Notes:
In this paradigm, one of the deployment managers is elected as primary. As primary, it is
considered an active deployment manager that is hosting the cell-wide endpoints for the
administrative functions. Other deployment managers are considered backups; they are
kept in standby mode and are available to take over the active role in case of failure or
termination of the primary manager.
17-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative
console Active deployment
On demand
routers manager
Shared
file system
Standby deployment
manager
Active deployment
manager
© Copyright IBM Corporation 2013
Notes:
A highly available deployment manager component runs in each deployment manager to
control which deployment manager is elected as the active one.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Having completed this unit, you should be able to:
• Define Intelligent Management
• Describe virtualization and autonomic computing
• Define intelligent routing
• Describe dynamic workload management
• Describe health management features
• Describe application edition management features
• Describe performance management features
Notes:
17-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. True or false. WebSphere provides the ability for a hot standby for a
deployment manager to be highly available.
3. True or false. An on demand router can route requests within the cell
only.
Notes:
Write your answers here:
1.
2.
3.
© Copyright IBM Corp. 2013 Unit 17. Overview of Intelligent Management 17-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint answers
1. True. WebSphere provides the ability for a hot standby for a
deployment manager to be highly available, but only when using the
on demand router intelligent router
3. False. An on demand router can route requests within the cell and
can route to multiple cells.
Notes:
17-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Explain basic security concepts
• Describe the WebSphere Application Security architecture
• Describe enhancements to certificate management
• Configure fine-grained administrative security
• Configure application security
• Describe SSL concepts and configuration
• Describe support for multiple security domains
• Describe auditing features and functions
• Describe support for Java Platform, Enterprise Edition 6 (Java EE 6)
security annotations
Notes:
18-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• WebSphere security basics
• WebSphere user registries
• Administrative security
• Application security
• Security domains
• Java 2 security
• SSL basics
• Certificates and certificate authorities
• SSL within a WebSphere cell
• Security auditing
Notes:
18-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
18-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
The client is the This server is the corporate The “apps” are the
customer. The web server. It provides the business logic.
client can be either universal access to the business These applications
a single user PC or logic for the company. It allows have access to the
a whole company. browser access to the corporate databases and
The devices are site. In front of the web server is provide the
specified when the router-access device for the company business
necessary. site. rules.
This firewall is the router to the Internet. An This data is the corporate data. Ultimately, it is
ISP (Internet service provider) typically the information that the company wants to
provides it. This model, however, can apply to share with the customer. This data can be
a corporate intranet. This router separates the centralized or distributed. For this example, the
internal network from the outside network. data is accessed through business logic.
© Copyright IBM Corporation 2013
Notes:
With an e-business application, a general topology must be secured from end to end. This
process involves securing many different parts.
Security APIs
OS security
Network security
Physical security
Notes:
Many levels are involved in securing an environment. WebSphere provides only part of the
total security that must be applied.
Physical security refers to the protection of the hardware itself. Is it kept in a safe and
secure area? Who has physical access to it?
Network security can involve setting up firewalls to protect an intranet or a DMZ where the
web servers are going to run.
Operating system security is the security infrastructure of the underlying operating system.
It provides certain security services to the WebSphere security application. These services
include the file system security support to secure sensitive files in WebSphere product
installation. The WebSphere system administrator can configure the product to obtain
authentication information directly from the operating system user registry; for example, the
NT Security Access Manager (SAM).
File system security is especially a concern about protecting your configuration files and
key ring files.
18-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Security
Service Node agent
Administrator
Security
Node agent service
Configuration
Security
service Application server
Application server Security
Application server
Security service
Security service
service
User
registry Configuration
Configuration
Configuration © Copyright IBM Corporation 2013
Notes:
The security service runs within each of the managed processes so there is not a single
point of failure (other than possibly the user registry, but that is a different topic).
18-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Types of security
• Administrative security
– Protects things such as administrative console, wsadmin, scripts
• Application security
– Protects
access to the
applications
• Java 2 security
– Protects the
local systems
Notes:
Within WebSphere, there are a number of different types of security that can be configured.
These types of security are covered in more detail during this lecture. They include:
• Administrative security
• Application security
• Java 2 security
Administrative security
• Protects administrative console, scripts, wsadmin, and others
• Access can be restricted through:
– Administrative roles
– Fine-grained
access
Notes:
Administrative security allows the administrator to restrict access to the administrative
interfaces, including the administrative console, the administrative scripts, and wsadmin.
18-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Application security
• Enables security for the applications in your environment
• Provides application isolation and requirements for authenticating
application users
– Security constraints protect servlets
– Method permissions protect EJBs
Notes:
Application security allows the administrator to restrict access to the enterprise
applications. This restricted access is done by defining security roles, security constraints,
and method permissions. Then, the security roles are mapped to the users and groups in
the environment.
What
can you
Who are
do?
you?
Authorization
Authentication
User
registry
EAR file © Copyright IBM Corporation 2013
Figure 18-10. Authentication and authorization: What is the difference? WA855 / VA8551.0
Notes:
Authentication information can be found in a user registry. Authorization information can be
found within the EAR file. The WebSphere security service is responsible for making sure
that protected resources are accessible only by authenticated and correctly authorized
users.
18-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Authentication,
credentials
Authentication: tell a server who you are
• Challenge mechanism (how you are
asked) is used to obtain authentication data:
– Basic authentication User
– Certificate-based registry
Notes:
Authentication in its simplest form is rather straightforward.
• A request is made.
• A challenge is returned.
• A user ID and password are sent.
• The server checks a user registry to see whether the information is valid.
Notes:
HTTP basic authentication is not a secure authentication mechanism. Basic authentication
sends user names and passwords over the Internet as text that is Base64 encoded, and
the target server is not authenticated. This form of authentication can expose user names
and passwords. If someone can intercept the transmission, the user name and password
information can easily be decoded. However, when a secure transport mechanism, such as
SSL, or security at the network level, such as the IPSec protocol or VPN strategies, is used
with basic authentication, some of these concerns can be alleviated.
For more information, see:
http://docs.sun.com/app/docs/doc/819-3669/bncbn?l=en&a=view
18-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
2
Redirect to
login page Server
3
Form submitted Security_check
4
Redirect to source ?
error.jsp
Error page is
returned
Notes:
1. A client requests access to a protected resource.
2. If the client is unauthenticated, the server redirects the client to a login page.
3. The client submits the login form to the server.
4. The server attempts to authenticate the user. If authentication succeeds, the
authenticated user’s principal is checked to ensure that it is in a role that is authorized
to access the resource. If the user is authorized, the server redirects the client to the
resource that uses the stored URL path. If authentication fails, the client is forwarded or
redirected to an error page.
Notes:
The challenge type is defined within the EAR. Using Rational Application Developer, it can
be defined within the deployment descriptor. The default type is basic authentication.
18-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
18-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
LDAP 1 LDAP 2
Local OS
Authentication calls authentication
layer
Security
server
Local OS registry
LTPA
Authentication calls authentication
layer
Stand-alone LDAP
Pluggable
Authentication calls custom
authentication
WebSphere provided layer
Custom provider Custom registry
© Copyright IBM Corporation 2013
Notes:
The user registries that are supported include local operating system, stand-alone LDAP,
custom user registry, and federated registry. The federated registry effectively combines
multiple repositories into a single view. It can support multiple LDAP servers, file-based
repository, database repository, and custom repositories.
Notes:
Defining which user registry is used and how it is configured can be done through the
console, through a manual interface, or through a wizard. Generally speaking, the wizard is
considered too simplistic to be used for configuring anything but the simplest
configurations.
18-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
Although the wizard that is used to configure security can set up simple environments, it is
typically used for only the most basic configurations.
This diagram shows step 1 of the security wizard.
18-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This diagram shows step 2 of the security wizard. The user repository is being selected.
Notes:
This diagram shows step 3 of the security wizard and specifies the user name and
password for the primary administrative user.
18-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This diagram shows the summary of the security wizard.
Local OS LDAP
Notes:
Although there are supported LDAP servers, other LDAP servers can also be used by
defining the appropriate schema mappings through the advanced LDAP properties.
Generally, avoid local OS registries, particularly in distributed, non-domain environments.
18-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Federated repositories
Federated File-
• The installation wizard and registry based
profile management tools have
a default of enabling
administrative security
LDAP1 LDAP2
– The default repository type is a
file-based federated repository
• Federated repositories provide for the
use of multiple repositories with WebSphere Application Server
• Can be:
– File-based – Database
– Single LDAP – Multiple LDAPs
– Custom registry – Subtree of an LDAP
• Defined and theoretically combined under a single realm
• All of the user repositories that are configured under the federated
repository are invisible to WebSphere Application Server
© Copyright IBM Corporation 2013
Notes:
This slide covers the federated repositories and what can be used:
• File-based
• Single LDAP
• Custom registry
• Database
• Multiple LDAPs
• Subtree of an LDAP
The VMM (Virtual Member Manager) provides federation capabilities.
Notes:
The custom registry allows custom implementation of user registry.
Some possible implementations include:
• Database
• Flat file
• OS-based, with more custom logic
• Use other, not directly supported, registries
WebSphere provides:
• Base types
- Implementing classes extend the com.ibm.websphere.security.UserRegistry
class
• Working sample implementation: com.ibm.websphere.security.FileRegistrySample
18-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Regardless of what registry type is used, an LTPA token is generated, and then shared with
the client in the form of a cookie. The token, or the information in the token, can be used
throughout WebSphere to pass the user’s identity information around.
ID = client ID = X
client
server1 server2
X can run as:
Option 1. Client
Option 2. Server 1
Notes:
A request for work can pass its security context, which contains its credentials. As the call
proceeds through the servers to its final destination, credentials can be changed. The
options are to keep the client’s credentials, switch to the credentials of the server, or some
other specified identity.
18-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
It is also possible to configure multiple cells to share LTPA tokens, thus creating SSO for
multiple cells.
18-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Administrative security
Notes:
Administrative security protects not only the administrative tools, but also enables a
number of other security features:
• Authentication of HTTP and IIOP clients
• Administrative console security
• Naming security
• Use of SSL transports
• Role-based authorization checks of servlets, EJBs, and MBeans
• Propagation of identities (RunAs)
• The common user registry
18-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Administrative security
Turning on administrative security enables many features, including:
• Authentication of HTTP and IIOP clients
• Administrative console security
• Naming security
• Use of SSL transports
• Role-based authorization checks of servlets, EJBs, and MBeans
• Propagation of identities (RunAs)
• The common user registry
Console and other administrative tools: access is initially restricted to
only the primary user
• You must create your administrative users and groups
• As of version 7, fine-grained access can be defined for console users
– For example, Bob can be configured to have administrative access to application
servers A and B
– Fred can be configured to have operator access to only servers C and D
Notes:
As soon as global security is enabled, there is a security check when the console
application is accessed. The security check makes sure that the accessing user is
authenticated and is mapped to one of the four console security roles. Depending on the
console role to which the user is mapped, different functions are available.
Whichever user ID is used to run the application server process has implicit access as a
console administrator user.
Console security
Defines which roles have access to the administrative tools
• Monitor: least privileged; allows a user to view the WebSphere configuration and
current application server state
• Configurator: monitor privilege plus the ability to change the WebSphere
configuration
• Operator: monitor privilege plus the ability to change runtime state, such as starting
or stopping servers
• Administrator: operator, configurator, and iscadmins privilege, plus more privileges
that are granted solely to the administrator role, such as:
– Modifying the primary administrative user and password
– Mapping users and groups to the administrator role
– Enabling or disabling administrative
Administrator
and Java 2 security
Security
check
Configurator Monitor Operator
Administrative
console
Application
server
C:\> wsadmin
© Copyright IBM Corporation 2013
Notes:
There are more console security roles available; these include iscadmins, deployer, and
AdminSecurityManager.
18-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Deployer
– Allows a user to change configuration and runtime state on applications that use
wsadmin
• And others
Notes:
This graphic shows a representation of the various administrative security roles that are
available, and how they overlap.
Administrative roles
Edit
Administrator * security
Configurator Operator
Deployer
Monitor
iscadmins
Edit
roles
AdminSecurityManager * Auditor *
Edit audit
* = implicitly part of primary administrative user
© Copyright IBM Corporation 2013
Notes:
This diagram shows the creation of users and groups through the administrative console.
18-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 18-34. Console security: Creating users and groups WA855 / VA8551.0
Notes:
This diagram shows the mapping of users to specific console security roles. The interface
for mapping administrative groups is virtually the same.
Figure 18-35. Console security: Mapping users and groups WA855 / VA8551.0
Notes:
18-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Application security
Notes:
Java EE security can provide the rules engine through the WebSphere Application Server.
Alternatively, another authorization service (such as Tivoli Access Manager) can be used.
18-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Authorization
Authorization involves granting trusted principals permission to perform
actions on resources (web pages, servlets, JSPs, and EJB components)
Control access to resources
• Security lookup (by server)
– Determine security privileges for principal
– Access information that is stored in registry
• Rule enforcement (by server)
– Obtain rules from registry
– Given privileges of
principal and rules,
determine access
Decision
opY??? Rules
userX, opY
userX??
client server
© Copyright IBM Corporation 2013
Notes:
Java EE security is concerned with controlling access to application resources, not system
resources.
Notes:
To control who can do what to an application, several XML objects can be added to the
EAR file. It is worth noting that these XML objects do not actually affect the application
code itself.
The first step is to create security roles. These roles are merely XML objects that the
runtime uses to define which users and groups have access to the application. The second
step is to map the security roles to the application code. These mappings are also just XML
objects. These mappings are called security constraints (for web container objects) and
method permissions (for EJBs). Again, these XML objects do not affect the application
code; they are merely part of the deployment descriptors.
18-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
EJB
Manager method
Method
permissions EJB
method
EJB
Teller method
Enterprise
JavaBeans
Security permissions
Servlet
Customer Security
constraints JSP
HTML
Java EE Web
security resources
roles
Notes:
During the deployment process (or afterward), the security roles are mapped to the users in
groups in the environment. This mapping means that the runtime is able to understand
which users and groups in its environment must access the various objects in the
application code.
In this example, the security role that is called Manager is mapped to various application
methods (perhaps the method that is used to create a customer bank account). The actual
user who is called Bob is mapped to the security role Manager during deployment.
Therefore, when a user attempts to access the method for creating a bank account, the
runtime sees that there is a constraint on that method. It checks to make sure that the user
is mapped to the Manager security role. If not, the user gets an authorization failure.
EJB
Manager method
Method
permissions EJB
Bob method
EJB
Mary Teller method
Enterprise
JavaBeans
Alice Security role binding Security permissions
Servlet
Customer Security
constraints JSP
HTML
Clients Java EE
Users and Web
security resources
groups roles
Notes:
The security roles are defined within the EAR. This screen shows the SampAdmin security
role within the PlantsByWebSphere application.
18-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This screen shows the constraints for the PlantsByWebSphere application, which is
mapped to the SampAdmin security role.
Notes:
As soon as the application is deployed, the console can be used to map the security roles
to the actual user and groups that exist within that environment. This mapping can be done
at deployment time or any time thereafter through the security role to user and group
mapping functions.
18-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 18-43. Using the console to map security roles WA855 / VA8551.0
Notes:
18-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Security domains
Notes:
Security domains are a new feature as of WebSphere 7 and allow security to be defined at
multiple levels, not just at the cell level. Previously the security model for the cell was all
that could be defined. Now, with security domains, it is possible to define one set of security
settings for one application server and another set of configurations for a second
application server.
18-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Security domains
• Multiple security domains are supported as of WebSphere Application
Server version 7
– Can create different security configurations and assign them to different
applications
– Can configure different security attributes for both administrative and user
applications within a cell environment
– Can configure different applications to use different security configurations by
assigning the servers, clusters, or service integration buses to the security
domains
• Only users that are assigned to the administrator role can configure
multiple security domains
Notes:
This screen shows a security configuration that is defined at a cell level.
Security configurations
• Traditionally, the security configuration was defined at a cell level
– A side effect was all elements of the cell shared the exact same security
configuration
Security
configuration
DMgr
Cell
Notes:
This screen shows not only a security configuration that is defined at a cell level, but more
configurations for specific scopes. This configuration means that it is possible to define
security behavior specific to certain scopes, which is different from what is configured for
the cell level.
18-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Security domains
• With security domains, it is possible to have a cell level security
configuration, and multiple other security configurations at different
scopes
Cell level security
configuration server2 security
configuration
Cell level security DMgr
Cell
configuration
Notes:
These diagrams show the use of the administrative console to create a security domain.
Notes:
These diagrams show some of the different levels for which security domains can be used.
Examples can include having different user registries for different security domains. It is
also possible to change settings for application security, Java 2, user registries (User
Realm), and others.
18-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
18-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Java 2 security
Notes:
This slide introduces the concept of the Java sandbox and what it can do. Initially, in Java
1.0, it was not possible to have something that ran within the sandbox access anything on
the local system. This restriction was designed to protect the local system from the code
that ran on it (this protection is different from application security, which protects the
running code from clients who might attempt to use it). With Java 1.1, it was possible to
sign code and therefore trust it. This feature allowed the administrator to have code that
was running access certain parts of the local system.
18-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Trusted signed
code
JVM full access to Sandbox restricted JVM full access to Sandbox restricted
resources access resources access
System resources (such as files and System resources (such as files and
network connections) network connections)
© Copyright IBM Corporation 2013
Notes:
Orthogonal to Java EE role-based security, Java 2 security is about protecting system
resources. It is policy-based (several .policy files control it) and provides fine-grained
access control to system resources, such as:
• File I/O
• Sockets
• Properties
To find Java 2 access exceptions, look for the string
java.security.AccessControlExceptions in the SystemOut.log or SystemError.log
file.
Notes:
When Java 2 security is enabled in WebSphere, the security manager component by
default throws a java.security.AccessControl exception when a permission violation
occurs. This exception, if not handled, often causes a runtime failure. This exception is also
logged in the SystemOut.log file.
However, when the JVM com.ibm.websphere.java2secman.norethrow property is set
and has a value of true, the security manager does not throw the AccessControl exception:
it is only logged.
Note: This property is intended for a sandbox or debug environment only since it instructs
the security manager not to throw the AccessControl exception. By not rethrowing the
exception, Java 2 security is not truly enforced. Do not use this property in a production
environment where a relaxed Java 2 security environment weakens the very integrity Java
2 security is intended to produce.
The JVM parameter entered on the command line starts the server, usually in the script
startServer. Enter as: –Dcom.ibm.websphere.java2secman.norethrow=true
18-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Look in the log for the next line to verify that the previous is in place:
SecurityManag W SECJ0381I: Warning, the
com.ibm.websphere.java2secman.norethrow property is true. The WebSphere Java
2 Security Manager is not rethrowing AccessControl exceptions. Do not use
this debug setting in a production environment. See the information center
for Java 2 Security debugging features.
Notes:
18-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
SSL basics
Notes:
SSL (Secure Sockets Layer) provides transport level security between two points, much
like a VPN. It is often used to secure communications between a browser and a web
server.
18-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
What is SSL?
• SSL stands for Secure Sockets Layer
• SSL provides connection security through:
– Communication privacy: the data on the connection can be encrypted
– Communication integrity: the protocol includes a built-in integrity check
– Authentication: the client knows who the server is
• Creates a VPN
– Uses both symmetric and asymmetric key encryption
HTTP
SSL
Notes:
Symmetric key encryption allows two parties to send each other secured messages, but
requires a shared secret. Although this approach has low complexity, the problem with this
approach is that at some point they must share that secret. In an e-business application, it
would be rather difficult.
Plain Encrypted
unencrypted (cipher text)
(clear text)
Notes:
If a server has a public-private set, it can send out its public key (through a signing
certificate; also known as a certificate) to client machines. Those client machines can then
use that public key to encrypt messages that are destined for the server, which then only
the server can decrypt. Unlike symmetric key encryption, this process does not require the
client and server to have a shared secret.
Since the client can validate the certificate of the server, there is one-way authentication.
But the server has no way to authenticate the client. Nor can the server send the client
secured messages.
18-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Public Private
unencrypted encrypted unencrypted
© Copyright IBM Corporation 2013
Notes:
Because the client chooses its own session key, nobody else knows it. It can securely use
the public key of the server to send that session key to the server. Now, nobody but the
client and server know the session key. The session key is then used as a “shared secret”
to switch to the much more efficient symmetric key encryption.
A certificate (or signing certificate) contains information about the server, including the
public key of the server, and the certificate authority digitally signs it.
Client Server
1. Client requests SSL connection
6. HTTPS communications
Notes:
18-72 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
A digital certificate is an electronic document that identifies you, which a certificate
authority then signs. This certificate means that the CA validates that you are who you say
you are and is therefore vouching for you.
The certificate contains not just information about you, but also your public key. It is
important to note that the public key is the counterpart to your private key (which is part of
your personal certificate) which is kept secret.
18-74 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
What is a certificate?
Simple answer:
• It is an electronic document that identifies
you, and a third-party vouches for both you
and the certificate itself CA
• Examples:
– Employee badge (vouched for by your employer)
– Drivers license (vouched for by your state)
– Passport (vouched for by your country)
More information:
• Includes information about you
• Includes public key
• A certificate authority digitally signs it
Notes:
The term “certificate” is sometimes confused since it is used in different ways. Generally
speaking, a certificate contains just a public key and information about you.
A personal certificate is a certificate that contains the private key, which must be kept
private and secret.
A signer certificate is just a regular certificate. In other words, it contains a public key and
information about the owner. What specifically makes it a “signer certificate” is the fact that
the corresponding personal certificate (private key) was used to sign a certificate. This
case occurs for a CA or a chained certificate when some entity (usually a CA, or in the case
of WebSphere, a cell root certificate) signs your certificate. You therefore need that signer
certificate (which contains the signer’s public key) to validate SSL connections.
Types of certificates
There are different types of certificates:
• Certificate
– Contains a public key that is signed
– Contains information about the owner of the certificate
– Contains certificate expiration date
• Personal certificate:
– Typically meant as the certificate along with private key data
• Signer certificate:
– The certificate that corresponds to the private key used to digitally sign another
certificate
Notes:
If a client is going to trust a certificate from a server, the client must be able to validate that
certificate. This validation is possible because a certificate authority generates and signs
certificates with its private key. That means that the browser can use the public key of the
CA to verify the digital signature. The public keys from the standard CAs are built into
browsers. If the browser does not have a copy of the public key of the CA, the user is
prompted.
Public key infrastructure (PKI) is:
• Based on public-private key cryptography
• The whole infrastructure that makes public-key security work:
- Certificate authority (CA)
- Registration authority (RA)
- PKI enabled applications
- Directory (optional)
18-76 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Kate’s
Browser web server
Verifies Kate’s identity
Key ring and signs her certificate
(with the CA private key)
Kate’s
certificate CA
Notes:
Putting it together, Joe’s browser is willing to trust Kate’s server because Kate presented
her certificate to Joe. The question then becomes how does Joe trust that the certificate
really belongs to Kate? The answer is because the CA signed Kate’s certificate, which
means the CA verified that Kate was really Kate. Since Joe trusts the CA, he is therefore
willing to trust Kate.
Notes:
18-78 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
When thinking about SSL within a WebSphere cell, a number of different relationships must
be taken into account. For example, consider the connection between the browser and the
web server. That relationship is understood, and independent from the relationship
between the plug-in and the application server. There are also the SSL connections within
the actual cell (between the managed processes: deployment manager, node agents,
application servers). Additionally, there might be SSL connections to an LDAP server, web
services, external cell, and others.
18-80 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere
Plug- Application
SSL in SSL
Server
Notes:
Each node within a cell gets a node personal certificate (1-year life span). The cell root
certificate signs the node personal certificates (15-year life span). By default, all of the
application servers on a node use the node certificates of that node. The node certificates
are stored in node-specific keystores, and the cell root signer certificate is stored in the cell
truststore. This storage method means that all nodes, through file synchronization, have
access to the cell root signer.
This arrangement has several desirable side effects. First, all of the nodes can securely
communicate with each other after validating themselves. Second, when a personal
certificate is replaced (for example, when it expires), the other nodes still accept the new
certificate. It is accepted because a known signer signed it (a new signer is not required to
be distributed again, as it does when the certificate is self-signed).
Notes:
The plug-in uses a single keystore (or key ring) which is generated for it by WebSphere.
This file contains both the personal certificate for the plug-in and the cell root signer.
The application servers (or nodes) use two different files. A keystore contains the node
personal certificate, and the truststore holds the signer certificates that the node chooses to
trust. By default, that means just the cell root signer certificate.
18-82 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere
Plug- Application
SSL in SSL
Server
Figure 18-67. What are key rings, keystores, and truststores? WA855 / VA8551.0
Notes:
A keystore contains the node personal certificate (which the cell root certificate signs) and
the truststore holds the signer certificates that the node chooses to trust. By default, that
means just the cell root signer certificate.
It is stored in .p12 files within the config directory of the profile:
<profile-root>/config/<cell-name>/nodes/<node-name>/key.p12
<profile-root>/config/<cell-name>/trust.p12
Node certificates
• Each node has a node certificate
– The cell root certificate (a chained certificate) signs the node certificate
– The cell root signer is therefore needed to validate the node certificate
– The application servers, by default, all use the local node certificate
Truststore
AppServer-2
CR-signer Cell root signer
Notes:
The cell default truststore contains the cell root signer certificate. To be able to validate
potential SSL connections, each node needs the cell root signer. This file is made available
to each of the nodes through standard file synchronization.
18-84 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Dmgr
Cell default
Cell truststore
server1 server37
PlantsServer CR-signer
Notes:
This screen shows the initial administrative console page for viewing and managing the
SSL settings and configurations.
• Expiration management
• Keystores
• Trust files
• Certificates
Notes:
This screen shows the administrative console view of a node certificate. It shows the initial
information about not just the node certificate, but also the signer certificate (which in this
case would be the cell root signer). If the link for the certificate is clicked, more details are
displayed.
18-86 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A chained certificate means that the cell root signer signs the node certificate. It is
demonstrated in this screen capture by noting that the “Issued By” information for the node
certificate matches the “Issued To” information for the signer. It is also worth noting that the
“Issued To” and “Issued By” fields of the signer match each other, which indicates that the
signing certificate is actually a self-signed certificate.
Some refer to the cell root signing certificate as a mini-CA since it signs all of the node
certificates within a cell. Logically, it is what a CA does on a larger level.
Node
certificate
Cell root
certificate
Notice: these two are the same
© Copyright IBM Corporation 2013
Notes:
WebSphere is able to automatically manage the expiration of its certificates. By default, the
expiration management thread runs every four weeks (on Sundays at 21:30). If the
certificates are close to expiring, they are renewed. Notification thresholds allow the
administrator to also receive warnings before certificates are renewed.
18-88 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Since the plug-in keystores include the cell root signer, the plug-in is able to complete an
SSL handshake with any of the nodes since the cell root certificate signed all of their
certificates.
Notes:
Propagation of the plug-in keystores is typically done manually since file synchronization is
not available.
18-90 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Web server
• The plug-in key rings must be propagated to the web
server machines
– Similar to copying the plugin-cfg.xml file to web servers
Plug-
in – WebSphere automatically generates the plug-in key rings
Web server
Dmgr
Plug- Cell
in
server1 server37
PlantsServer
Web server
Plug-
in
Notes:
WebSphere automatically generates keystores for defined web server plug-ins. These
keystores then must be copied to the plug-ins. These keystores can be managed through
the administrative console. With IBM HTTP Server, it is also possible to configure
WebSphere to propagate the keystore that WebSphere generates to the web server
plug-in.
• Web server
keystores are
automatically
generated
– Can be managed
from the
administrative
console
Figure 18-76. IBM HTTP Server key ring propagation WA855 / VA8551.0
Notes:
18-92 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Security auditing
Notes:
Security auditing is a new feature in WebSphere Version 7. Auditing can log various
information, including:
• Authentication
• Authorization
• Principal-credential mapping
• Audit policy management
• User registry and identity management
• Delegation
• Administrative configuration management
18-94 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Security auditing
• The security auditing subsystem was introduced in WebSphere
Application Server Version 7 and has two primary goals:
– Confirm the effectiveness and integrity of the existing security configuration
– Identify areas where improvement to the security configuration might be needed
Notes:
Enabling security auditing requires some configuration settings. This diagram shows
security auditing as it is enabled.
• Enabling auditing
Notes:
With security auditing enabled, it is possible to view the security logs as either text files or
as HTML reports (generated through wsadmin).
18-96 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
18-98 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Explain basic security concepts
• Describe the WebSphere Application Security architecture
• Describe enhancements to certificate management
• Configure fine-grained administrative security
• Configure application security
• Describe SSL concepts and configuration
• Describe support for multiple security domains
• Describe auditing features and functions
• Describe support for Java Platform, Enterprise Edition 6 (Java EE 6)
security annotations
Notes:
Checkpoint questions
1. Which type of security restricts access to the application?
A. Administrative security
B. Application security
C. Java 2 security
D. File system security
2. Which type of security restricts access to the operating system?
A. Administrative security
B. Application security
C. Java 2 security
D. File system security
3. Which type of security restricts access to the console?
A. Administrative security
B. Application security
C. Java 2 security
D. File system security
© Copyright IBM Corporation 2013
Notes:
Write your answers here:
1.
2.
3.
18-100 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. Which type of security restricts access to the application?
B. Application security
Notes:
Exercise 12
Notes:
18-102 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Enable WebSphere security
• Configure administrative security by configuring access to
administrative functions
• Configure fine-grained administrative security
Notes:
Exercise 13
Notes:
18-104 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Define Java EE security roles
• Define access for resources in an application
• Enable and verify application security
Notes:
Exercise 14
Notes:
18-106 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Define the certificate life span of a profile
• Use the administrative console to find and view certificates within the
cell
• Configure and run the certificate expiration service
• Propagate the generated plug-in keystore out to the plug-in
• Create a keystore for a web server
• Generate a self-signed key
• Configure IBM HTTP Server to load and use HTTPS
Notes:
18-108 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
IBM Redbooks: WebSphere Application Server V8.5 Concepts,
Planning, and Design Guide, SG24-8022-00, Chapter
4, “An overview of the Liberty profile”
19-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit objectives
After completing this unit, you should be able to:
• Describe the characteristics and architecture of the Liberty profile
• Install the Liberty profile runtime environment
• Create a Liberty profile server by using developer tools and command-
line utilities
• Describe the configuration features for a Liberty profile server
• Use flexible configuration and shared libraries
• Deploy applications by using a monitored directory
• Deploy applications by using developer tools
• Package an application and Liberty profile runtime
• Describe the process for enabling security for a Liberty profile server
• Use the job manager to manage Liberty profile servers
• Describe the characteristics of a Liberty collective
• Describe the characteristics of Liberty profile server clusters
© Copyright IBM Corporation 2013
Notes:
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Topics
• Introduction to the Liberty profile
• Tools, run time, and installation
• Configurations
• Security
• Using the job manager
• Liberty collectives and clusters
Notes:
19-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
19-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The Liberty profile provides an application server runtime environment that is highly
composable, fast to start, and dynamic.
The Liberty profile does not include a Java Runtime Environment (JRE), so you must install
an IBM or Oracle JRE or SDK to support the runtime environment.
A Liberty profile server supports two models of application deployment. You can use the
monitored directory function and deploy an application by dropping the application archive
into the “drop-ins” directory.
You can also deploy an application by storing the application archive in a shareable apps
directory and adding location information for it to the server configuration file.
The Liberty profile supports a subset of the following parts of the full WebSphere
Application Server programming model: web applications, OSGi applications, and the Java
Persistence API (JPA).
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 19-5. What does the Liberty profile provide? WA855 / VA8551.0
Notes:
The Liberty profile provides a lightweight application server, which is focused on the
development and operations experience. When used as a test server, it can have a small
footprint that results in the fastest possible server start.
By dynamically updating a single XML file, server configuration is simplified and achieved.
Configuration data is shareable by “including” common configuration elements. The Liberty
profile is compatible with full-profile WebSphere Application Server editions.
The Liberty profile runtime is free for developers and does not expire. The runtime
environment is focused on web applications and OSGi applications that include Java
persistence, transactions, and security.
19-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
As shown in the graphic, the Liberty profile is built on OSGi technologies. The server
process runs as OSGi bundles and comprises a single Java virtual machine (JVM), the
Liberty profile kernel, and any number of optional features.
A functional server is produced by starting the runtime environment with a configuration
that includes a list of features to use. Features are the units of capability, by which the
runtime environment is defined and controlled. They are the primary mechanism that
makes the server composable. For example, if the servlet feature is specified, the runtime
environment operates as a servlet engine. By default, a server runs no features. You can
use the feature manager to add the features that are needed. The feature manager is one
of the kernel bundles that receive the configuration, resolve each feature to a list of
bundles, install the feature into the framework, and then start the feature. When the
features that are needed are specified, the default configuration of those features provides
a rich environment that is designed to cover most common requirements.
The configuration manager reads the server configuration from persistent files, parses the
configuration into sets of properties, and then uses those sets of properties to populate the
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
OSGi Configuration Admin service. This service maintains the runtime view of the
configuration, and when configuration updates are made, this service injects each set of
properties into the service that “owns” them.
19-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Installation
profiles Configuration
profiles
Notes:
How does the Liberty profile relate to the Application Server and Custom profiles?
The term “profile” is overloaded with an extra meaning in WebSphere V8.5.
The Liberty profile is a type of installation profile. An installation profile refers to which
runtime (or product binary files) is being installed, the WebSphere Application Server Full
Profile or the WebSphere Application Server Liberty Profile.
Traditional profiles such as Deployment Manager, Application Server, and Custom are
types of configuration profiles and relate to which configuration is being used within the full
product installation.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Liberty
profile
WebSphere
Application Server Liberty
profile
Notes:
The WebSphere Application Server family for Version 8.5.5 continues to provide offerings
to fit your needs, which might range from lightweight developer desktop environments to
highly complex and highly available enterprise environments. As more qualities of service
are required in your environment, the WebSphere Application Server family of offerings
continues to meet those requirements on a common code base.
This chart shows each of the different versions of WebSphere Application Server and how
they relate to one another regarding customer needs and capabilities.
WebSphere Application Server Express features reduced acquisition cost and enables fast
deployment of a single application server. The difference between this package and the
WebSphere Application Server “Base” edition is the license. Both editions are virtually the
same, but “Base” includes a license for unlimited processors. Express is limited to two
processors. Both Express and Base editions can support a stand-alone deployment.
WebSphere Application Network Deployment includes all the capabilities of the Base
edition, but also supports high transaction volume, scalability, clustering, high availability,
and failover.
19-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty WebSphere Application Server for z/OS includes all the features of Network Deployment
for the z/OS platform.
WebSphere Application Server for Developers is a no-charge WebSphere Application
Server development runtime for projects that do not warrant the expense of a priced and
supported runtime on the developer desktop. The development time runtime environment
allows developers to test their applications on their desktop before moving the application
into a production runtime environment.
New in version 8.5.5 is WebSphere Application Server Liberty Core. Liberty Core is a highly
composable, fast to start, and ultra lightweight profile of the application server that is
optimized for developer productivity and web application deployment.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Different features are available in the different Liberty editions.
19-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
19-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Each developer tool that is listed on this slide is Eclipse-based and supports the Liberty
profile runtime environment. You can install the runtime and create Liberty profile servers.
The developer tools provide editors that allow you to configure servers with any features
required by the application.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 19-12. Where to get WebSphere Application Server Developer Tools for Eclipse WA855 / VA8551.0
Notes:
The WebSphere Application Server Developer Tools for Eclipse is a free download from the
WASdev community website of the web address that is shown on this slide.
WebSphere Developer Tools is also available from the Eclipse Marketplace, which can be
accessed in Eclipse by clicking Help > Eclipse Marketplace.
WebSphere Developer Tools can also be installed by using the IBM Installation Manager
and accessing the appropriate installation repository.
19-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 19-13. Where to get the Liberty profile runtime environment WA855 / VA8551.0
Notes:
The Liberty profile runtime is available through IBM Installation Manager as part of
WebSphere Application Server V8.5.
The Liberty profile runtime is also available through WebSphere Developer Tools when
creating a server, and as a free download from the WASdev community website.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The Liberty profile runtime environment can be installed by using different tools that include
WebSphere Application Server Developer Tools, IBM Installation Manager, and by
downloading a Liberty profile archive and extracting from the command line.
19-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The server create command is used to create a Liberty profile server from the command
line. After installing the Liberty profile runtime, there is a bin directory from which you can
run a command such as:
Server create <server_name>
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Each of the developer tools provides wizards for creating an instance of a Liberty profile
server. The first step is to select the server type: WebSphere Application Server V8.5
Liberty Profile. In this step, you can also specify a host name and new server name, or
accept the defaults.
19-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This step allows you to add another server name if you want to change the default name.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The Liberty profile server instance is created with a minimal configuration that includes the
jsp-2.2 feature and the default HTTP endpoint settings.
The Servers view has icons that can be clicked to start or stop a server. In addition,
right-clicking the server name brings up a menu with several useful items, such as a
Restart button and a Utilities link.
The Utilities link allows you to select the following actions:
• Create an SSL certificate
• Generate a web server plug-in
• Package server
• Generate a dump for support
19-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 19.3.Configurations
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Configurations
Notes:
19-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Traditional WebSphere
Application Server
Notes:
There is no administrative console or wsadmin scripting interface for configuring a Liberty
profile server. All of the configuration for a server can be contained in a single XML file
called server.xml. This file can be manually updated with a text editor and when the
changes are saved, the server is dynamically updated. No server restart is required. Other
XML configuration files can be accessed by using an include statement in the server.xml
file.
Note: Other files can be used to configure the Liberty profile server. These files include the
bootstrap.properties file, the jvm.options file, and the server.env file.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
<application
<application name="tradelite"
name="tradelite" location="tradelite.war"
location="tradelite.war" />
/>
Instance
<dataSource
<dataSource jndiName="jdbc/TradeDataSource">
jndiName="jdbc/TradeDataSource"> configurations specify
<properties.derby.embedded multiple resources like
<properties.derby.embedded
applications and data
databaseName="${server.config.dir}/tradedb"/>
databaseName="${server.config.dir}/tradedb"/> source definitions
</dataSource>
</dataSource>
</server>
</server> Any of this configuration could be put into a
separate XML file and included in this master
configuration file by using the include element
Notes:
This slide shows an example of a simple server.xml file for a Liberty profile server.
It consists of a feature manager section, a logging element, an application element, and a
data source element.
Liberty profile features control which capabilities (OSGi bundles) are started in the server
JVM.
Singleton configuration elements specify properties for runtime services such as logging
and tracing.
Instance configurations can specify multiple resources like applications and data source
definitions.
Any of these configuration elements can be put into a separate XML file and “included” in
the server.xml file for multiple servers. For example, multiple Liberty profile servers
might share data source definition, so that the configuration of the data source can be
stored in a single shared XML file.
19-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Flexible configuration
• Shareable configuration snippets
server>
...
<include location="http://cfgserver/global.xml/>" />
<include location="${shared.config.dir}/datasource.xml" />
<server>
server.xml
Notes:
This slide shows an example of how to use the include statement to access shareable
configuration in a server.xml file.
A URL or environment variable can be used to point to the shareable XML configuration
files.
Components can be developed for configurations at any level of granularity, from a single
XML file to several files.
It is helpful to use WebSphere Developer Tools to associate configuration snippets with
multiple Liberty profile server configurations. The visualization features of WebSphere
Developer Tools are useful for providing a single logical view. For team development,
flexible configuration is helpful for keeping the application and configuration components
together.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Shared configurations
• With shared configuration and includes, it is possible to create
powerful topologies
– Configuration files can be places in the server configuration directory or the
shared configuration directory (or can be stored anywhere)
shared configuration
global.xml app1.xml app2.xml app3.xml
Notes:
With shared configuration and includes, it is possible to create powerful topologies and
more easily manage multiple server configurations.
As shown in the diagram on this slide, configuration files can be placed in the server
configuration directory, the shared configuration directory, or you can configure any shared
file system location. For example, a global.xml configuration file is shared among all
servers in an environment. But a local configuration file can be used to customize values
that must be unique on the host. For example, the HTTP port numbers must be unique on
the host, and clone IDs must be unique across the environment for workload management.
19-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Application deployment
• Applications are deployed by using:
– Monitored directory (dropins)
– Configuration (server.xml)
– Developer tools
Configured
Configurated
applications go
applications go here
here
(location can be
configured)
Monitored directory
(location can be
configured)
Notes:
The screen capture on this slide shows different folders in the configuration directory of a
Liberty profile server. For application deployment, you can use either the dropins folder,
which is a monitored directory, or the apps folder, which an application configuration
element references in the server.xml file.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Embedded HTTP
• Liberty profile includes Servlets
Server
only those features you JSPs
EJBs
add
– Improved performance Web services Messaging
– Faster server starts engine engine
jpa-2.0
restConnector-1.0
jsp-2.2 appSecurity-1.0
servlet-3.0
App manager
Feature manager http transport
© Copyright IBM Corporation 2013
Figure 19-25. Highly composable runtime that is based on features WA855 / VA8551.0
Notes:
Application servers in the full profile have a JVM shown on the left that includes all services
(features) whether the applications require them or not.
A Liberty profile server JVM starts only those features that you add to its server.xml file.
By default, a server contains only the jsp-2.2 feature to support servlet and JSP
applications. You use the feature manager to add the features that you need.
The building blocks shown in the graphic on this slide show some of the Liberty profile
features that can be defined for the feature manager. These features include JPA, JSP,
servlet, application security, and a remote JMX connector. However, several other features
can be configured for a particular server. In addition to the features, you can add HTTP port
definitions for the HTTP transport, and application definitions for the application manager.
19-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Runtime
zosTransaction-1.0
zWlm-1.0 zosSecurity-1.0
Features are enabled
dynamically for both appSecurity-1.0
the application and localConnector-1.0 restConnector-1.0
runtime.
The application ssl-1.0
server provisions only serverStatus-1.0 monitor-1.0
the features that the
running applications sessionDatabase-1.0
require. jndi-1.0 jdbc-4.0
Notes:
The graphics on this slide show two example feature sets for a Liberty profile server. All
features are dynamically activated when they are saved to the configuration file of the
server. No server restart is required. The application features show services that
applications require and that run on the server such as bean validation, osgi-jpa, and wab
(web application bundle). The runtime features show services that the server runtime itself
requires such as serverStatus, monitor, localConnector, restConnector, and ssl.
Description of some Liberty profile features
The beanvalidation-1.0 feature provides validations for JavaBeans at each layer of an
application. The validation can be applied to all layers of JavaBeans in an application by
using either annotations or a validation.xml deployment descriptor. The osgi.jpa-1.0
feature provides JPA support for OSGi applications on the Liberty profile.
The wab-1.0 feature provides support for web application bundles (WABs) that are inside
enterprise bundles. This feature supports the following resources that are packaged inside
a WAB: static web content and JSPs; HTTP servlets that use the servlet 3.0 specification;
blueprint applications.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The serverStatus-1.0 feature enables Liberty profile servers to automatically publish their
status to WebSphere deployment managers and job managers that are aware of the server
as a resource in their Job configuration. The known states are started and stopped.
The monitor-1.0 feature provides Performance Monitoring Infrastructure (PMI) support.
The localConnector-1.0 feature provides a local JMX connector that is built into the JVM. It
enables local access by JMX clients such as jConsole, or other clients that use the Attach
API.
The restConnector-1.0 feature provides a secure JMX connector that can be used locally
or remotely by using any JDK. It enables remote access by JMX clients through a
REST-based connector and requires SSL and basic user security configuration.
19-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Class visibility
• Full profile server makes runtime classes visible to applications
• Liberty profile hides runtime classes from applications
• Applications can use open source APIs without the runtime interfering
• Three types of API
– spec API: APIs defined by an external standards group ( )
– ibm-api: Value add APIs provided by IBM ( )
– third-party: APIs provided by open source projects
• By default only spec and ibm-api are visible to applications
– third-party can be added by using the classloader element
Web <classloader
application
allowedApiTypes="spec">
OSGi Framework
© Copyright IBM Corporation 2013
Notes:
The Full Profile application server exposes runtime classes to applications, but the Liberty
profile hides runtime classes from applications.
Applications can use open source classes without interference from the runtime.
Three types of API can be enabled through the classloader configuration element:
• An external standards group defines the spec API.
• The ibm-api consists of value-added APIs that IBM provides.
• The third party refers to APIs that open source projects provide.
Use the classloader configuration element and the apiTypeVisibility attribute to
specify the types of API package the classloader is able to see, as a comma-separated list
of any combination of the following APIs: spec, ibm-api, third party.
By default only spec and ibm-api are exposed to applications, but third party can be added.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Shared libraries
• Associated with applications
• Move common libraries out of the WAR files
<library id="libs">
<fileset dir="${shared.resource.dir}/libs"
includes="*.jar"/>
</library>
Notes:
The library configuration element can be used to specify shared libraries of classes. If your
web applications use common libraries, you can remove the classes from the WAR files
and use the fileset attribute to point to the file system location. The first snippet on this slide
shows how to use the library configuration element.
Libraries can also be associated with specific applications by using the classloader feature
in the application configuration element. The second snippet on this slide shows how to use
the commonLibraryRef attribute to share classes between applications. Library class
instances are shared with other class loaders.
The third snippet on this slide shows how to use the privateLibraryRef attribute to
isolate classes in an application. Library class instances are unique to this classloader and
independent of class instances from other class loaders.
19-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A Liberty profile server configuration and its applications can be packaged into an archive
or compressed file. From the WebSphere Development Tools or IBM Assembly and Deploy
Tools, you can select the server_name > Utilities > Package Server to create a
compressed file.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Also, from the command line, you can use the server package <server_name>
command. A compressed file that uses the server name and a .zip extension is created.
In the example on this slide, the compressed file is named server2.zip. The compressed
file contains the Liberty profile runtime directories and the server configuration directory for
the specified server.
19-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
copy
• Removing the file from the dropins directory automatically uninstalls the
application
Figure 19-31. Deploying an application by using the drop-ins directory WA855 / VA8551.0
Notes:
By default, the “drop-ins” directory is automatically monitored. If you drop an application
archive file into this directory, the application is automatically deployed on the server.
Similarly, if the application file is deleted from the directory, the application is automatically
removed from the server. The “drop-ins” directory can be used for applications that do not
require more configuration, such as security role mapping. You do not have to include the
application entry or any relevant information in the server configuration. For applications
that are not in the “drop-ins” directory, you use an application entry in the server
configuration to specify the location. The location can be on the file system, or at a URL.
Three types of dynamic update can be controlled through configuration: changing the
server configuration; adding and removing applications; and updating installed
applications. For all deployed applications, you can configure whether application
monitoring is enabled, and how often to check for updates to applications. For the
“drop-ins” directory, you can also configure the name and location of the directory, and
choose whether to deploy the applications that are in the directory.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
WebSphere
WebSphere
Server Liberty Profile
Liberty Profile
+ Package
JDK
Deploy
JDK Application
image.zip
© Copyright IBM Corporation 2013
Notes:
To create a production image that can be deployed to multiple hosts, you must package the
Liberty runtime, the JDK, server configurations, and application files into a compressed file.
If all of these Liberty profile resources are in a single compressed file, the environment that
you deploy is said to be “self-contained”. The compressed file can be copied to any host
and manually extracted. Alternatively, you can use a job manager to install the Liberty
profile resources to a remote target host.
19-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
WebSphere
Liberty Profile
Deploy
Server
Install
Liberty JDK
Application resources
Notes:
There are multiple scenarios or topologies for deploying Liberty profile resources. In
addition to deploying a “self-contained” topology as described on the previous slide, you
can choose to have the Liberty runtime and JDK preinstalled on the hosts, and then deploy
only the server configurations and applications. Other combinations of “shared topologies”
are possible.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Remote
target hosts
Server1
App
Server2 Deploy
WLP
JDK
Server3
Notes:
The graphic on this slide shows a shared topology where each compressed file contains
only the Liberty profile server definition. Applications are predeployed as read-only and
shared across different servers. Different servers preinstall and share the Liberty profile
and JDK.
The job manager can be used to deploy a shared topology to multiple remote hosts.
19-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 19.4.Security
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Security
Notes:
19-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Feature Description
Notes:
Security in the Liberty profile supports all the servlet 3.0 security features. In addition, it
also secures Java JMX connections. The following server features are applicable to
security in the Liberty profile:
• The appSecurity-1.0 feature enables security for all web resources.
• The ssl-1.0 feature uses HTTPS to enable SSL connections.
• For z/OS platforms, zosSecurity-1.0 includes the support for SAF Registry and
Authorization on the z/OS platform.
• In addition, the restConnector-1.0 feature enables remote access by JMX clients
through a REST-based connector.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Enable SSL
• Add the SSL feature and provide the keystore password
<featureManager>
<feature>ssl-1.0</feature>
</featureManager>
Notes:
To enable SSL for a server, you must add the ssl-1.0 feature to its configuration file. Also,
you must add the keystore configuration element and specify an ID and password. You can
use the security utility from the command line to generate a self-signed certificate and
provide the required configuration data. The screen capture on this slide shows you how to
run the security utility and the output it produces. The security utility requires you to specify
the server name and a password. The utility creates the keystore under the server
configuration directory and provides an encoded version of the password.
19-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Advanced SSL
• Configure per endpoint SSL configuration
<featureManager>
<feature>ssl-1.0</feature>
</featureManager>
<httpEndpoint id="defaultHttpConfig">
<sslOptions sslRef="mySSLConfig"/>
</httpEndpoint>
Notes:
The configuration elements in this example show how to configure secure HTTP.
An HTTP endpoint must have an sslOptions attribute, which specifies the SSL protocol
options. The SSL protocol options in the example use the sslRef attribute, which
specifies the SSL configuration to be used as the default.
The following steps define the SSL configuration.
First, the ssl-1.0 feature is enabled. Then, two keystore elements must be configured. One
is the keystore for the HTTP endpoint named “myKeyStore” in this example. The other is a
truststore for storing certificates of trusted servers named “myTrustStore” in this example.
Both of these configuration elements point to keystore files under the configuration
directory of the server: mykeystore.p12 and mytruststore.p12.
Next, an SSL configuration named mySSLConfig in this example defines a keystoreRef
and a truststoreRef in terms of the keystores that were previously configured.
Finally, and httpEndpoint attribute, sslOptions, defines the sslRef in terms of SSL
configuration, mySSLConfig.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
User registries
• Three types of registry
– Basic XML-based registry (Not for use in production)
– LDAP registry
– SAF registry (SAF is available only for z/OS)
Notes:
The Liberty profile server uses a user registry to authenticate a user and retrieve
information about users and groups to do security-related operations, including
authentication and authorization.
When validating the authentication data of a user, the login modules call the user registry
that is configured to validate the user information. Liberty profile supports both a Basic
XML-based user registry and a more robust LDAP-based repository. For z/OS, a System
Authorization Facility (SAF) registry is also supported.
The Liberty profile supports only one user registry per server.
19-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
<basicRegistry realm="basicRealm">
<user name="bob" password="{xor}CDo9Hgw=" />
<group name ="group1">
<member name = "bob"/>
</group>
</basicRegistry>
</server>
Notes:
A Basic registry is configured in the server.xml file. The appSecurity-1.0 feature must be
enabled. The basicRegistry configuration element is used to define a security realm,
users, and groups. The securityUtilities encode command-line tool is used to encode
passwords for each user. WebSphere Developer Tools automatically encodes passwords.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
<server>
<featureManager>
<feature>appSecurity-1.0</feature>
</featureManager>
<ldapRegistry host="myldapserver.ibm.com"
port="389" baseDN="o=ibm,c=us"
ldapType="IBM Tivoli Directory Server" />
</server>
Notes:
You can use an existing LDAP server for application authentication. To configure an LDAP
registry, you add the appSecurity-1.0 server feature to the server.xml file, and specify in
the server.xml file the configuration information for connecting to the LDAP server.
Use the ldapRegistry configuration element to specify the LDAP server host name,
LDAP port, and base distinguished name (baseDN) for the LDAP directory. The ldapType
specifies the LDAP Server product name. Several types of LDAP servers are listed on this
slide, including IBM Tivoli Directory Server, Microsoft Active Directory, and others.
Note: The example that is shown on this slide is basic. You can use many more attributes
to configure the LDAP registry such as: bindDN, bindPassword, userFilter,
groupFilter, and others. Also, SSL can be enabled by adding the necessary SSL
configuration information.
19-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
<featureManager>
<feature>zosSecurity-1.0</feature>
</featureManager>
<safRegistry id="saf"/>
Notes:
The System Authorization Facility (SAF) registry holds information that is needed to do
security-related functions such as authenticating users and retrieving information about
users, groups, or groups that are associated with users. You activate and configure the
SAF registry through the server.xml file.
Activate the SAF registry service by adding the zosSecurity-1.0 feature to the server.xml
file.
Configure web application security features to use the SAF registry service by adding the
appSecurity-1.0 feature.
Use a safRegistry configuration element to configure the SAF registry.
The safRegistry element has the following attributes: ID and realm. The ID uniquely
identifies this registry instance. The ID can be anything that you want, but must be among
other configured registries such as the basic registry and the LDAP registry.
The realm specifies the security realm that is associated with the SAF registry. If you do not
specify a realm, the default is the plex name (ECVTSPLX).
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Authorization
• Security role mappings are defined in
– Server configuration
– ibm-application-bnd.xml
<application location="secureapp.war">
<application-bnd>
<security-role name="users">
<user name="fred"/>
<group name="userGroup"/>
</security-role>
</application-bnd>
</application>
• SAF
<safAuthorization id="saf" />
Notes:
For application authorization, security role mappings must be defined in the server.xml
file, and the ibm-application-bnd.xml file in the application archive.
As part of an application configuration element, use the application-bnd and
security-role elements to define users and groups.
19-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
There is only one administrator role for the Liberty profile servers, and a single user registry
for both application security and administrative security.
All the JMX methods and MBeans accessed through the REST connector are currently
protected with a single role named “administrator”. To get started quickly, use the
quickStartSecurity element to configure a single user with administrator role and
configure the default SSL configuration. If you require only a single administrative user, you
can use the quickStartSecurity configuration element. The required attributes are a
user name and password.
For authorizing multiple users of administrative functions, use the administratorRole
element in the server.xml file to map the users to the administrator role.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
19-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 19-45. Using the job manager to manage Liberty profile servers WA855 / VA8551.0
Notes:
19-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 19-46. Administering Liberty profiles by using the job manager WA855 / VA8551.0
Notes:
A job manager environment consists of a job manager and the targets that it manages. The
job manager targets can be deployment managers, stand-alone application server nodes
that administrative agents manage, and host computers. Setting up a job manager
environment involves creating a job manager profile and any other profiles that are needed
for the environment. The clocks are synchronized on all environment computers, and then
the targets are registered with the job manager.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
You can submit the Install Liberty profile resources job to extract resources in a Liberty
profile image to destination directories relative to a root directory.
Before running the Install Liberty profile resources job, the following conditions must exist:
• The job manager must be running.
• A host computer must be registered with the job manager.
• The image, a compressed file, must contain Liberty profile resources in a directory
structure that satisfies job manager rules.
• The root directory to install the resources on the target host must be defined. At
minimum, set the WLP_WORKING_DIR variable to a valid directory that is on a target host.
To install the resources to a shared directory on the target host, you must set the
WLP_SHARED_DIR variable to a valid directory.
19-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Remote target
hosts
WebSphere (“loose cluster”)
Liberty Profile
JDK
Job: Install Liberty
resources Deploy
Server
Install Liberty
resources job
Application
Job manager
Topology.zip
© Copyright IBM Corporation 2013
Notes:
The job manager can be used to deploy the self-contained topology to multiple remote
hosts. One advantage of this topology is that no additional resources are required on the
remote hosts.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Liberty profile
server
server1 XML
IBM HTTP
Server
Job manager
Shared apps
XML
Liberty profile
Merged server
plugin-cfg.xml server2 XML
Notes:
When the job manager completes the Generate merged plug-in configuration job, it
generates a plugin-cfg.xml file for each server that is specified and merges these files
into a single file. The merged plugin-cfg.xml file can then be accessed with the HTTP
server plug-in to route requests to the Liberty profile servers.
19-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 19-50. Job type: Generate merged plug-in configuration WA855 / VA8551.0
Notes:
Specify the resource name or resource ID of the server to generate a plug-in. The server or
servers must be started for this job to complete successfully.
This job requires a JMX connector or REST connector configuration in the Liberty profile
server. Add the feature <feature>localConnector-1.0</feature> to the server.xml
file for each server.
The localConnector-1.0 feature provides a local JMX connector that is built into the JVM. It
can be used only on the same host machine by someone who is running under the same
user ID and the same JDK. It enables local access by JMX clients such as jConsole, or
other JMX clients that use the Attach API necessary for generating HTTP plug-in
configuration data.
The remote JMX connector is: <feature>restConnector-1.0</feature>
The restConnector-1.0 feature provides a secure JMX connector that can be used locally
or remotely when using any JDK. It enables remote access by JMX clients through a
REST-based connector and requires SSL and basic user security configuration.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Merged plugin-cfg.xml
<ServerCluster
<ServerCluster CloneSeparatorChange="false"
CloneSeparatorChange="false" GetDWLMTable="false"
GetDWLMTable="false"
IgnoreAffinityRequests="true"
IgnoreAffinityRequests="true" LoadBalance="Round
LoadBalance="Round Robin"
Robin"
Name="Shared_2_Cluster_0"
Name="Shared_2_Cluster_0" PostBufferSize="64"
PostBufferSize="64" PostSizeLimit="-1"
PostSizeLimit="-1"
RemoveSpecialHeaders="true"
RemoveSpecialHeaders="true" RetryInterval="60">
RetryInterval="60">
<Server CloneID="e9da8378-7892-4993-8ce0-7e838e6bf6d2"
<Server CloneID="e9da8378-7892-4993-8ce0-7e838e6bf6d2"
ConnectTimeout="0"
ConnectTimeout="0" ExtendedHandshake="false"
ExtendedHandshake="false"
MaxConnections="-1"
MaxConnections="-1" Name="default_node_defaultServer0_1"
Name="default_node_defaultServer0_1"
ServerIOTimeout="900"
ServerIOTimeout="900" WaitForContinue="false">
WaitForContinue="false">
<Transport
<Transport Hostname="was85host"
Hostname="was85host" Port="9041"
Port="9041" Protocol="http"/>
Protocol="http"/>
</Server>
</Server>
<Server CloneID="306b1428-4119-4b9d-bae0-e7cc0cc5e0a8"
<Server CloneID="306b1428-4119-4b9d-bae0-e7cc0cc5e0a8"
ConnectTimeout="0"
ConnectTimeout="0" ExtendedHandshake="false"
ExtendedHandshake="false"
MaxConnections="-1"
MaxConnections="-1" Name="default_node_defaultServer0_0"
Name="default_node_defaultServer0_0"
ServerIOTimeout="900"
ServerIOTimeout="900" WaitForContinue="false">
WaitForContinue="false">
<Transport
<Transport Hostname="was85host"
Hostname="was85host" Port="9040"
Port="9040" Protocol="http"/>
Protocol="http"/>
</Server>
</Server>
.. .. ..
</ServerCluster>
</ServerCluster>
Notes:
This slide shows a snippet of the merged plugin-cfg.xml file. Notice that it contains the
CLoneIDs for server1 and server2.
19-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
19-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
A Liberty collective is like a traditional WebSphere Application Server cell. A Liberty
collective is more loosely coupled than a traditional cell. There is no central master
configuration.
A Liberty collective controller is like a deployment manager. You can use multiple collective
controllers to manage the same collective.
A Liberty cluster is like a traditional WebSphere Application Server cluster. Liberty cluster
members are loosely associated. Liberty cluster members do not have to run all the same
applications. Liberty profile servers can be added and removed from clusters as needed.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
member1 member1
Collective
member2
member2
member2 Collective
member3 member3
Figure 19-54. Example of server clusters and a Liberty collective WA855 / VA8551.0
Notes:
This diagram demonstrates a collective that has 11 collective members. Among these 11
members, three members belong to the server cluster “ClusterOne”, four of them belong to
the server cluster “ClusterTwo”, and four do not belong to any server cluster.
19-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The Liberty collective was built on five core principles:
1. Administration should be exposed through a standards-based API. All administration for
Liberty is provided through MBeans, which enables a common set of tools to perform
administrative actions.
2. The entities within a collective should be loosely coupled to the collective. Therefore, all
configuration that is related to the collective is isolated and self-contained, facilitating
easily moving servers in and out of the collective.
3. The administrative server, called a collective controller, acts as a distributed cache.
Application servers within the collective publish information to the controller about
themselves, such as which applications are installed, their operational state, and the
available MBeans. The controller also serves as a bidirectional JMX proxy, allowing
MBean operations to be routed to members within the collective.
4. Each member in the Liberty collective owns its own configuration. There is no central,
master repository of configuration as there is in the full profile cell.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5. The administrative server is highly scalable and highly available through a replica
model, allowing multiple instances of controllers to share data and perform the same
operations. The model is agentless, which means a separate agent process is not
required on each host system within the collective.
19-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Collective member
– A Liberty server with the collectiveMember feature enabled
• All Liberty Profile editions
– Sends configuration data and state to one of the collective controllers
– Accepts commands from collective controller servers
Figure 19-56. Liberty profile collective controller and collective members WA855 / VA8551.0
Notes:
To set up a collective, you first need a collective controller. Any Liberty server can act as a
collective controller. Liberty collectives are designed to provide scalable and resilient
administration by supporting multiple controllers within a collective. The replica set of
collective controller servers enables the size of a collective to scale out, and provides a
highly available administrative server environment.
After configuration, a collective member server can be started, and it automatically
publishes information about itself to the collective controller.
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Liberty clusters
• A Liberty profile can be configured into a server cluster for application
high availability and scalability.
Notes:
A Liberty server cluster consists of two or more Liberty servers within a Liberty collective.
Logically grouped servers might have the same applications, be related to the same
business unit, or have the same administrators.
The cluster name is a string value that you define and must be unique within a Liberty
collective. The status of a Liberty server cluster is stored in the collective repository.
19-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Unit summary
Having completed this unit, you should be able to:
• Describe the characteristics and architecture of the Liberty profile
• Install the Liberty profile runtime environment
• Create a Liberty profile server by using developer tools and command-
line utilities
• Describe the configuration features for a Liberty profile server
• Use flexible configuration and shared libraries
• Deploy applications by using a monitored directory
• Deploy applications by using developer tools
• Package an application and Liberty profile runtime
• Describe the process for enabling security for a Liberty profile server
• Use the job manager to manage Liberty profile servers
• Describe the characteristics of a Liberty collective
• Describe the characteristics of Liberty profile server clusters
© Copyright IBM Corporation 2013
Notes:
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint questions
1. (True or false) The Liberty profile is freely available.
2. (True or false) Liberty profile servers support everything that the full
profile WebSphere Application Server supports.
4. (True or false) The job manager can be used to install Liberty profile
resources on remote target hosts.
Notes:
Write your answers here:
1.
2.
3.
4.
19-72 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint answers
1. True: The Liberty profile is freely available for developers.
2. False: Liberty profile servers support only a subset of what the full
WebSphere Application Server supports.
4. True
Notes:
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 15
Notes:
19-74 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise objectives
After completing this exercise, you should be able to:
• Use IBM Assembly and Deploy Tools to install the Liberty Profile
Runtime Environment
• Start and stop a Liberty profile application server by using the
command line and through IBM Assembly and Deploy Tools
• Deploy a simple application by using IBM Assembly and Deploy Tools
• Deploy an application by using the dropins directory
• Deploy an application with a data source
• Configure SSL for a Liberty profile application server
• Configure a user registry for a Liberty profile application server
• Configure application security for a Liberty profile application server
• Use flexible configuration to create shared configurations
• Configure a Liberty profile server to generate a plug-in configuration file
Notes:
© Copyright IBM Corp. 2013 Unit 19. Overview of the Liberty profile 19-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
19-76 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center, Monitoring,
and Tuning Performance:
http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp
Unit objectives
After completing this unit, you should be able to:
• Describe performance monitoring and tuning methods
• Use the Tivoli Performance Viewer to monitor application server
resources
• Use the performance servlet to generate performance data
• Configure the Request Metrics tool to generate performance data about
the end-to-end request flow
• Use Performance Advisors to generate suggested tuning actions
• Enable the performance collectors from IBM Tivoli Composite
Application Manager for WebSphere Application Server
Notes:
20-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Performance tuning and monitoring
• Request metrics
• Performance advisors
• IBM Tivoli Composite Application Manager for WebSphere Application
Server
Notes:
20-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Notes:
20-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 20-4. The need for performance monitoring and tuning WA855 / VA8551.0
Notes:
The goal of performance monitoring is to collect runtime statistics on your application and
its environment to quantify their performance behavior. It allows you to determine whether
your application meets its performance objectives and helps to identify any performance
bottlenecks.
Notes:
Tuning WebSphere Application Server is a critical part of getting the best performance from
your website. But tuning WebSphere Application Server involves analyzing performance
data and determining the optimal server configuration. This determination requires
considerable knowledge about the various components in the application server and their
performance characteristics. The performance advisors encapsulate this knowledge and
analyze the performance data. The advisors provide configuration recommendations to
improve the application server performance. Therefore, the performance advisors provide
a starting point for tuning the application server. Keep in mind the following suggestions:
• Take advantage of performance functions.
• Obtain performance advice from the advisors.
• Tune the environment.
• Troubleshoot performance problems.
20-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Performance terminology
• Response time measures an individual user’s average wait for a
request
• Response time includes:
– Processing time
– Transit time
– Wait time in queues
• Throughput measures activities that are completed in a unit of time
– Example: Website pages that are served per second
• Bottleneck defines a choke point in the system that is manifested as
multiple threads that are waiting for some task to complete
• Bottlenecks result when users are queued waiting for a shared resource
– Processor
– Data source connections
– Disk I/O
• Load is user activity against a website
– Users arriving, logging in, sending requests
– Requests per second, pages per hour
Notes:
Some other performance-related terms are path length, scalability, and capacity.
Path length refers to the number of steps an action takes. Reducing the path length
speeds up a website or application. Path length reduction can be achieved by speeding up
the steps and reducing the number of steps an activity takes.
Scalability defines how easily a site can expand. Sites must expand, sometimes with little
warning, to support increased load. Load can come from many sources: new markets,
normal growth, and extreme peaks in activity.
Capacity describes how much load the site can support. Discovering the website capacity
is the result of performance and load testing.
Notes:
This hot list contains recommendations that improve performance or scalability, or both, for
many applications.
WebSphere Application Server provides several tunable parameters and options to match
the application server environment to the requirements of your application.
• Review the hardware and software requirements.
For correct functionality and performance, it is critical to satisfy the minimum hardware
and software requirements. See the IBM WebSphere Application Server supported
hardware, software, and APIs website, which details hardware and software
requirements.
• Install the most current refresh pack, fix pack, and suggested interim fixes.
The list of suggested updates is maintained on the support site.
• Check hardware configuration and settings.
20-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Verify that network interconnections and hardware configuration are set up for peak
performance.
• Tune the operating systems.
Operating system configuration plays a key role in performance. For example,
adjustments such as TCP/IP parameters might be necessary for your application.
• Set the minimum and maximum Java virtual machine (JVM) heap sizes.
Many applications need a larger heap size than the default for best performance. It is
also advisable to select an appropriate GC policy that is based on the characteristics of
the application.
• Use a type 4 (or pure Java) JDBC driver.
In general, the type 2 JDBC driver is suggested if the database exists on the same
physical machine as the WebSphere instance. However, in the case where the
database is in a different tier, the type 4 JDBC driver offers the fastest performance
since it is pure Java and does not require native implementation.
• Tune WebSphere Application Server JDBC data sources and associated
connection pools.
The JDBC data source configuration might have a significant performance impact. For
example, the connection pool size and prepared statement cache must be sized based
on the number of concurrent requests that are processed and the design of the
application.
• Enable the pass by reference option.
Use applications that can take advantage of the pass by reference option to avoid the
cost of copying parameters to the stack.
• Ensure that the transaction log is assigned to a fast disk.
Some applications generate a high rate of writes to the WebSphere Application Server
transaction log. Locating the transaction log on a fast disk or disk array can improve
response time.
• Tune related components; for example, database.
In many cases, some other component, for example a database, needs adjustments to
achieve higher throughput for your entire configuration.
• Disable functions that are not required.
For example, if your application does not use the web services addressing
(WS-Addressing) support, disabling this function can improve performance. Attention:
Use this property with care because applications might require WS-Addressing MAPs
to function correctly. Setting this property also disables WebSphere Application Server
support for the following specifications, which depend on the WS-Addressing support:
Web Services Atomic Transactions, Web Services Business Agreement, and Web
20-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Performance 3
data
5
4
Notes:
Your application and its runtime environment must also be tuned optimally. This process
entails conducting many iterations of a monitor, tune, and test cycle. In short, monitoring,
performance testing, and tuning are essential tasks for ensuring a well-performing,
application-serving environment.
This process is often iterative because when one bottleneck is removed, some other part of
the system now constrains the performance. For example, replacing slow hard disks with
faster ones might shift the bottleneck to the processor of a system.
Notes:
Begin by choosing a benchmark, a standard set of operations to run. This benchmark
exercises those application functions experiencing performance problems. Complex
systems frequently need a warm-up period to cache objects and optimize code paths.
System performance during the warm-up period is much slower than after the warm-up
period. The benchmark must be able to generate work that warms up the system before
recording the measurements that are used for performance analysis. Depending on the
system complexity, a warm-up period can range from a few thousand transactions to longer
than 30 minutes.
If the performance problem under investigation occurs only when many clients use the
system, then the benchmark must also simulate multiple users. Another key requirement is
that the benchmark must be able to produce repeatable results. If the results vary more
than a few percent from one run to another, consider the possibility that the initial state of
the system might not be the same for each run. It might also be that the measurements are
made during the warm-up period, or that the system is running more workloads.
20-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Several tools facilitate benchmark development. The tools range from tools that merely
invoke a URL to script-based products that can interact with dynamic data that the
application generates. IBM Rational has tools that can generate complex interactions with
the system under test and simulate thousands of users. Producing a useful benchmark
requires effort and must be part of the development process. Do not wait until an
application goes into production to determine how to measure performance.
The benchmark records throughput and response time results in a form to allow graphing
and other analysis techniques. The performance data that WebSphere Application Server
Performance Monitoring Infrastructure (PMI) provides helps to monitor and tune the
application server performance. Request metrics are another source of performance data
that WebSphere Application Server provides. Request metrics allow a request to be timed
at WebSphere Application Server component boundaries, enabling a determination of the
time that is spent in each major component.
• Performance advisors
– Analyze collected performance data and provide configuration
recommendations to improve the application server performance
– Output can be viewed in Tivoli Performance Viewer or in administrative
console runtime messages
Notes:
These tools are explained in greater detail in the subsequent sections.
20-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Performance servlet
– Provides simple retrieval of performance data in XML format
– Accessed through a browser
Notes:
These tools are explained in greater detail in the subsequent topics.
ARM agent
Performance
servlet
WebSphere Application
XML Server
logs
ARM= Application Response Measurement
© Copyright IBM Corporation 2013
Notes:
WebSphere provides integrated tools to monitor and tune system and application
performance:
• Tivoli Performance Viewer
- Gives administrators the ability to monitor the overall health of WebSphere
Application Server
- Accessed from within the administrative console
• Request metrics (tool)
- Gives you the ability to track individual transactions, recording the processing time in
each of the major WebSphere Application Server components
- Output is viewed in standard logs or by using an Application Response
Measurement (ARM)-based tool
• Performance advisors
20-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
PMI architecture
WebSphere PMI interface Partner and
customer API
JMX API
PMI API Deployment
manager
(JMX connector) WebSphere
Web Application
client Server
PMI service
Notes:
The Performance Monitoring Infrastructure (PMI) uses a client/server architecture.
The figure shows the overall PMI architecture. On the right side, the server updates and
keeps PMI data in memory. The left side displays a web client, a Java client, and a JMX
client that retrieves the performance data. This data consists of counters such as servlet
response time and data connection pool usage. The data points are then retrieved by using
a web client, a Java client, or a Java Management Extensions (JMX) client. WebSphere
Application Server contains Tivoli Performance Viewer, a Java client that displays and
monitors performance data.
The server collects performance data from various WebSphere Application Server
components. A client retrieves performance data from one or more servers and processes
the data. WebSphere Application Server supports the Java Platform, Enterprise Edition
(Java EE) Management Reference Implementation (JSR-77).
PMI counters are enabled, based on a monitoring or instrumentation level. The levels are
None, Basic, Extended, All, and Custom. These levels are specified in the PMI module
XML file. Enabling the module at a certain level includes all the counters at that level plus
20-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty counters from levels below that level. So, enabling the module at the extended level
enables all the counters at that level plus all the Basic level counters.
JSR-077 defines a set of statistics for Java EE components as part of the Statistic Provider
interface. The PMI monitoring level of Basic includes all of the JSR-077 specified statistics.
PMI is set to monitor at a Basic level by default.
• You can also view data for other products or customer applications that
implement custom PMI by using the Tivoli Performance Viewer
Notes:
Tivoli Performance Viewer is used to help manage configuration settings by viewing the
various graphs or by using the Tivoli Performance Advisor. For example, by looking at the
summary chart for thread pools, you can determine whether the thread pool size must be
increased or decreased by monitoring the percent usage. After configuration settings are
changed based on the data that is provided, you can determine the effectiveness of the
changes. To help with configuration settings, use the Tivoli Performance Advisor. The
Advisor assesses various data while your application is running, and provides advice about
configuration settings to improve performance.
20-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
PMI uses statistics sets to specify the type and amount of performance data to collect.
PMI counters are enabled, based on a monitoring or instrumentation level. The levels are
None, Basic, Extended, All, and Custom. These levels are specified in the PMI module
XML file. Enabling the module at a certain level includes all the counters at that level plus
counters from levels below that level. So, enabling the module at the extended level
enables all the counters at that level plus all the Basic level counters as well.
Figure 20-16. Using the administrative console to enable PMI WA855 / VA8551.0
Notes:
Click Servers > Server Types > WebSphere Application Servers > <server_name>.
On the Configuration tab, under Performance, click Performance Monitoring
Infrastructure (PMI).
Select the Enable Performance Monitoring Infrastructure (PMI) check box.
20-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Start monitoring
• After enabling PMI, select the server and click Start Monitoring on
the Tivoli Performance Viewer page
– In the administrative console, select Monitoring and Tuning >
Performance Viewer > Current activity
Notes:
• Deprecated feature: Tivoli Performance Viewer displays graphics in either the Scalable
Vector Graphics (SVG) format or as a static image in the JPG format. If you do not have
the Adobe SVG browser plug-in, you are prompted to download and install it. If you
select not to install the plug-in (by selecting Cancel), Tivoli Performance Viewer displays
the static image.
Installing the Adobe SVG plug-in is advantageous for several reasons. First, the SVG
format provides interactive graphics that provide more information when you hover your
mouse over a point, line, or legend item. The SVG format also allows you to click a point
and see details for it. Second, using the SVG format provides a performance benefit
because the work to display the SVG image is done on the client side. When viewing a
static image, the application server must convert the SVG image into a static image,
which is a processor-intensive and memory-intensive operation. If your browser is
Internet Explorer 7, the Adobe SVG installation prompt might be inaccessible. To
resolve the problem, you can reinstall Adobe SVG.
• For users who are migrating from version 7: Beginning with version 8, the Tivoli
Performance Viewer graph uses Dojo technology for plotting the performance activity
rather than the Scalable Vector Graphics (SVG) format. The Dojo format provides a
better user experience and is more processor and memory efficient for the application
server. The SVG format is still supported but is deprecated in version 8 of this product.
To use the SVG format and image format, set the JVM property to false; for example:
com.ibm.websphere.tpv.DojoGraph=false
If the property is set to false, Dojo is disabled, and Tivoli Performance Viewer uses the
SVG format to display interactive graphics; or it uses the JPG format to display
non-interactive graphics.
When you specify to use the SVG format by setting
com.ibm.websphere.tpv.DojoGraph=false, if you do not have the Adobe SVG
browser plug-in, you are prompted to download and install it. If you select not to install
the plug-in (by selecting Cancel), Tivoli Performance Viewer displays the static image. If
your browser is Internet Explorer 7, the Adobe SVG installation prompt might be
inaccessible. To resolve the problem, you can reinstall Adobe SVG. By default, this
property is set to a value of true to use the Dojo format.
20-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The screen capture on this slide shows the navigation tree in Tivoli Performance Viewer
where you can select which components to monitor. In this case, the JVM Runtime module
is selected.
Notes:
Statistics for the selected modules are displayed as a line graph. You can select which
metrics you want to display in the graph, and you can optionally show the legend. In this
example, only the heap size and used memory metrics are displayed for the JVM runtime.
The sawtooth pattern of the used memory graph is typical of a steady state JVM. The
periodic reductions in used memory correspond to JVM garbage collections, which return
unused memory to the heap.
20-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The Reset to zero button sets a new baseline by using the current counter readings at the
instant the button is clicked. Future data points are plotted on the graph relative to their
position at the time Reset to zero is clicked. Data points that are gathered before the time
Reset to zero is clicked are not displayed, although they are still held in the Tivoli
Performance Viewer buffer. If Undo Reset to zero is clicked again, Tivoli Performance
Viewer displays all data that is recorded from the original baseline, not from the Reset to
zero point.
Click Clear Buffer to remove the PMI data from a table or chart.
Notes:
Statistics can also be viewed in a table format, by clicking View Table in the Tivoli
Performance Viewer.
20-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Summary reports
• View a statistics report by selecting one of the summary reports
• Servlets
– Lists all servlets that are running in the current application server
• EJBs
– Lists all EJBs running in the server
– Amount of time that is spent in their methods
– Number of EJB invocations
– Total time that is spent in each EJB
• EJB methods
– Details about methods
• Connection pool
– Lists all data source connections that
are defined in the application server
and show their usage over time
• Thread pool
– Shows the usage of all thread pools
in the application server over time
© Copyright IBM Corporation 2013
Notes:
Servlets:
The servlet summary lists all servlets that are running in the current application server.
Use the servlet summary view to quickly find the most time-intensive servlets and the
applications that use them, and to determine which servlets are used most often. You
can sort the summary table by any of the columns.
Tip: Sort by Average Response Time to find the slowest servlet or JSP page. Sort by
Total Requests to find the servlet or JSP that is used the most. Sort by Total Time to
find the most costly servlet or JSP.
Enterprise JavaBeans:
The Enterprise JavaBeans (EJB) summary lists the following information: all enterprise
beans that are running in the server, the amount of time that is spent in their methods,
the number of EJB invocations, and the total time that is spent in each enterprise bean.
total_time = number_of_invocations * time_in_methods
Sort the various columns to find the most expensive enterprise bean. Also, if the PMI
counters are enabled for individual EJB methods, there is a check box next to the EJB
name that you can select to see statistics for each of the methods.
Tip: Sort by Average Response Time to find the slowest enterprise bean. Sort by
Method Calls to find the enterprise bean that is used the most. Sort by Total Time to
find the most costly enterprise bean.
EJB methods:
The EJB method summary shows statistics for each EJB method. Use the EJB method
summary to find the most costly methods of your enterprise beans.
Tip: Sort by Average Response Time to find the slowest EJB method. Sort by Method
Calls to find the EJB method that is used the most. Sort by Total Time to find the most
costly EJB method.
Connection pools:
The connection pool summary lists all data source connections that are defined in the
application server and shows their usage over time.
When the application is experiencing normal to heavy usage, the pools that the
application uses must be nearly fully used. Low utilization means that resources are
being wasted by maintaining connections or threads that are never used. Consider the
order in which work progresses through the various pools. If the resources near the end
of the pipeline are underused, it might mean that resources near the front are
constrained or that more resources than necessary are allocated near the end of the
pipeline.
Thread pools:
The thread pool summary shows the usage of all thread pools in the application server
over time.
When the application is experiencing normal to heavy usage, the pools that the
application uses must be nearly fully used. Low utilization means that resources are
being wasted by maintaining connections or threads that are never used. Consider the
order in which work progresses through the various pools. If the resources near the end
of the pipeline are underused, it might mean that resources near the front are
constrained or that more resources than necessary are allocated near the end of the
pipeline.
20-32 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
In this screen capture, the servlets report is shown with the total requests column sorted.
You can see which two servlets in the PlantsByWebSphere application are used most
frequently.
Notes:
The servlet provides a way to use an HTTP request to query the performance metrics for
an entire WebSphere Application Server administrative domain. Because the servlet
provides the performance data through HTTP, issues such as firewalls are trivial to resolve.
The PerfServlet provides the performance data output as an XML document, as described
in the provided document type definition (DTD). In the XML structure, the leaves of the
structure provide the actual observations of performance data and the paths to the leaves
that provide the context.
The performance servlet EAR file PerfServletApp.ear is in the
WAS_HOME/installableApps directory, where WAS_HOME is the installation path for
WebSphere Application Server.
20-34 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
This screen capture shows sample output that the performance servlet generates, which is
displayed in a browser. The section that is shown here represents a request to the Snoop
Servlet.
Tip: The PerfServlet is a sample monitoring tool that uses WebSphere Application Server
administration and monitoring interfaces to extract and display performance data. Using
the PerfServlet is not intended for real-time performance monitoring in production
environments or for use in large topologies. For these environments, you might use the
Tivoli Performance Viewer or IBM Tivoli Composite Application Manager for WebSphere
Application Server.
Specific tips for the PerfServlet include the following practices:
• PerfServlet resource usage: The PerfServlet is not designed to run concurrently.
Being a single threaded servlet, it would collect the data sequentially from available
servers. This single threaded operation can cause higher response times when the
PerfServlet is used in larger deployments.
20-36 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Request metrics
Notes:
20-38 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Request metrics allow you to monitor the transaction flow and analyze the response time of
the components that are involved in processing it. This analysis can help you target
performance problem areas and debug resource constraint problems. For example, it can
help determine whether a transaction spends most of its time in the web server plug-in, the
web container, the Enterprise JavaBeans (EJB) container, or the back-end database. The
response time that is collected for each level includes the time that is spent at that level and
the time that is spent in the lower levels. For example, if the total response time for the
servlet is 130 milliseconds, and it includes 38 milliseconds from the enterprise beans and
JDBC calls, then 92 ms can be attributed to the servlet process.
An ARM agent is not included with WebSphere Application Server, but third-party tools can
provide it.
2
Select components Configure filters
3
Select trace level
Note: an ARM agent
4 does not ship with
WebSphere
Choose output
Application Server,
method and third-party
tools supply it
Notes:
In the administrative console, select Monitoring and Tuning > Request Metrics and
select the check box to Prepare Servers for Request metrics collection.
Trace level specifies how much trace data to accumulate for a particular transaction.
Trace level and Components to be instrumented work together to control whether a
request is instrumented or not. The trace level can be set to one of the following values:
• None: No instrumentation.
• Hops: Generates instrumentation information about process boundaries only. When
this setting is selected, you see the data at the application server level, not the level of
individual components such as enterprise beans or servlets.
• Performance_debug: Generates the data at Hops level and the first level of the
intra-process servlet and Enterprise JavaBeans (EJB) call (for example, when an
inbound servlet forwards to a servlet and an inbound EJB calls another EJB). Other
intra-process calls like naming and service integration bus (SIB) are not enabled at this
level.
20-40 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • Debug: Provides detailed instrumentation data, including response times for all
intra-process calls. Note: Requests to servlet filters are only instrumented at this level.
• Standard logs: Enables the request metrics logging feature. Select this check box to
trigger the generation of request metrics logs in the SystemOut.log file. Note: Since
enabling the request metrics logging feature increases processor usage, it is suggested
to use this feature together with filters so that only selected requests are instrumented.
• Application Response Measurement (ARM) agent: Allows request metrics to call an
underlying Application Response Measurement (ARM) agent. Before enabling ARM,
you must install an ARM agent and configure it to the appropriate class path and path,
following the instructions of the ARM provider.
Check to
enable
Click to
assign value
2
Figure 20-29. Isolating performance for specific types of requests WA855 / VA8551.0
Notes:
The request metrics filters are enabled according to your configuration. For example, if you
enabled source IP, only requests whose source IP matches the one specified in the filter
are instrumented.
Note: Filters are only checked for edge transactions. An edge transaction is the transaction
that first enters an instrumented system. For example, if a servlet calls an Enterprise
JavaBeans component, the servlet is the edge transaction. The servlet must not be
instrumented at the web server plug-in, and the URI and SOURCE_IP filters must be
checked for the servlet request. However, when the request comes to the EJB container,
the EJB filter is not checked because it is no longer an edge transaction.
You must regenerate the web server plug-in configuration file after modifying the request
metrics configuration.
20-42 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The example of request metrics data that is shown on this slide detail the use of the
prepared statement cache to make an SQL call. You can trace the steps that are involved
and timings for this database transaction.
20-44 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Performance advisors
Notes:
20-46 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The advisors provide advice on the following application server resources: thread pools,
persisted session sizes, cache sizes, and JVM heap size.
For example, consider the data source statement cache. It optimizes the processing of
prepared statements and callable statements by caching those statements that are not
used in an active connection. (Both statements are SQL statements that essentially run
repeatable tasks without the costs of repeated compilation.) If the cache is full, an old entry
in the cache is discarded to make room for the new one. The best performance is generally
obtained when the cache is large enough to hold all of the statements that are used in the
application. The PMI counter, prepared statement cache discards, indicates the number of
statements that are discarded from the cache.
The performance advisors check this counter and provide recommendations to minimize
the cache discards. Another example is thread or connection pooling. The idea behind
pooling is to use an existing thread or connection from the pool instead of creating an
instance for each request. Because each thread or connection in the pool consumes
memory and increases the context-switching cost, the pool size is an important
configuration parameter. A pool that is too large can hurt performance as much as a pool
that is too small. The performance advisors use PMI information about current pool usage,
minimum or maximum pool size, and the application server processor utilization to suggest
efficient values for the pool sizes.
The advisors can also issue diagnostic advice to help in problem determination and health
monitoring. For example, if your application requires more memory than is available, the
diagnostic adviser tells you to increase the size of the heap for the application server.
20-48 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Diagnostic advice:
– Connection factory
diagnostic messages
– Data source diagnostic messages
Notes:
The Performance and Diagnostic Advisor runs in the Java virtual machine (JVM) process
of the application server; therefore, the performance cost is minimal.
To access the Performance and Diagnostic Advisor Configuration, click Servers > Server
Types > WebSphere application servers > server_name > Performance and
Diagnostic Advisor Configuration.
Notes:
The Performance and Diagnostic Advisor analyzes PMI data and receives notifications
about performance and diagnostic information from components. Use this page to specify
settings for the Performance and Diagnostic Advisor. Performance issues can be related to
memory leaks in the system. Use the Memory Dump Diagnostic for Java tool, a separate
memory leak analysis utility, for detecting memory leaks.
The Performance and Diagnostic Advisor Framework is disabled by default. Each time that
you enable it for an application server, you see the warning message:
Run the Performance and Diagnostic Advisor in the Production Simulation and Test
environment. Performance advice is most applicable during peak load, when the processor
utilization is high.
20-50 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Advice type categorizes the primary indent of a piece of Advice.
Use Advice type for grouping, and then enable or disable sets of advice that is based on
your performance goal. Advice has the following types:
• Performance: Performance advice provides tuning recommendations, or identifies
problems with your configuration from a performance perspective.
• Diagnostic: Diagnostic advice provides automated logic and analysis that relates to
problem identification and analysis. These types of advice are issued when the
application server encounters unexpected circumstances.
Performance impact generalizes the negative effect on performance that an alert might
incur.
The performance impact of a particular piece of advice is highly dependent upon the
scenario that is run and upon the conditions that are met. The performance categorization
of alerts is based on worst case scenario measurements. The performance categorizations
are:
• Low: Advice has minimal negative effect on performance. Advice might be run in test
and production environments. Cumulative negative effect on performance is within
run-to-run variance when all advice of this type is enabled.
• Medium: Advice has measurable but low negative effect on performance. Advice might
be run within test environments, and might be run within production environments if
deemed necessary. Cumulative negative effect on performance is less than 4% when
all advice of this type is enabled.
• High: Advice impact is high or unknown. Advice might be run during problem
determination tests and functional tests. It is not run in production simulation or
production environments unless deemed necessary. Cumulative negative effect on
performance might be significant when all advice of this type is enabled.
20-52 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Tuning advice is provided as messages written to the runtime events. The TUNExxxx
messages are typically at the Warning level.
Examples:
TUNE0201W: The rate of discards from the prepared statement cache is high. Increase the
size of the prepared statement cache for the data source.
TUNE0207W: Utilization of the connection pool is high. Performance might be improved by
increasing the maxPoolSize for data source {DS_name}. Try setting the minimum size to
{value}, and the maximum size to {value}.
TUNE0220W: The Java virtual machine is spending a considerable amount of time in
garbage collection. Consider increasing the heap size.
A complete list is available in the WebSphere Application Server V8 Information Center
under Reference > Messages > TUNE.
Notes:
The message is:
TUNE9001W: Heap utilization patterns indicate that you might have a memory
leak. Additional explanatory data follows. Data values for free memory
between 8/9/11 11:44 AM and 8/9/11 11:46 AM were consistently less than the
minimum required percentage.
Explanation: Over time the amount of free memory seems to be decreasing or there is
consistently insufficient free memory in the heap, indicating that you might have a memory
leak.
User action: Use tools to further analyze your memory usage over time. For more
information about diagnosing out-of-memory errors and Java heap memory leaks, see the
information center.
20-54 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
The performance advisor in Tivoli Performance Viewer provides advice on using collected
Performance Monitoring Infrastructure (PMI) data to help tune systems for optimal
performance and provide recommendations on inefficient settings. Obtain the advice by
selecting the performance advisor in Tivoli Performance Viewer.
In a Network Deployment environment, the performance advisor in Tivoli Performance
Viewer runs within the JVM of the node agent and can provide advice on resources that are
more expensive to monitor and analyze. In a stand-alone application server environment,
the performance advisor in Tivoli Performance Viewer runs within the application server
JVM. The Tivoli Performance Viewer advisor requires that you enable performance
modules, counters, or both.
Notes:
More examples of advice that the performance advisors would give in certain situations
include:
Unbounded thread pools
• Situation: Threads added to an unbounded pool are not pooled
• Advice: If the average number of threads is higher than the pool size, then the pool
must be increased to allow better pooling
Sessions
• Situation: Read/write time or size is too large
• Advice: Warn of application problem
• Situation: The number of live sessions is greater than the session cache, and memory
is available
• Advice: Increase session cache
20-56 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty • Situation: Requests are turned down because there is no room for new sessions
• Advice: There are either too many active sessions, or the cache size is too small
DB2 Performance Configuration wizard
• Situation: A DB2 database is detected in the configuration
• Advice: Use the DB2 Performance wizard to tune the indicated database
Notes:
To view advice messages in Tivoli Performance Viewer, click the Advisor link.
From the list of messages, click a link to see more detail.
20-58 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
In this example, the message suggests enabling servlet caching for better performance.
Servlet caching is a web container setting that is disabled by default. The User Action
section in the advice details provides instructions for enabling servlet caching.
Notes:
When using the performance advisors, processor utilization must rise above 50% before
advice is generated. Typically when running your production level load, you push the
processor usage to 80–100% before turning on one of the performance advisors.
Consider the following when using a performance advisor for tuning:
If the load changes on the system under test, contradictory advice is generated. This
behavior is because the collected PMI data shows a different type of environment, causing
the advice to shift. To avoid this situation, always run the advisors while simulating the load
WebSphere experiences during deployment (peak load).
If the pool size minimum and maximum values are the same, the performance advisor rules
are much more likely to give contradictory advice when load fluctuates.
The amount of processor usage determines the amount of system activity. The advisors do
not consider disk activity, network activity, memory usage, or other factors to get a more
realistic view of system load.
Recommendations are only generated when processor load reaches 50% and higher.
20-60 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty Performance advisors from different application servers might give contradictory advice on
the same node resources. This behavior is because the application servers take into
account only how they are individually employing the resource. In this situation, if the
advice from the different advisors varies greatly, consider the generated advice and decide
what changes to make. However, if all advisors are giving the same recommendations,
then you must seriously consider the suggested changes.
If the performance advisor suggests setting a pool size to X, you must set the minimum
value to X/2 and the maximum value to X.
If the performance advisor suggests setting the prepared statement cache value to a
certain setting, check the amount of memory that is available before setting. The advisors
do not take into account the amount of actual physical memory available on the system.
20-62 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Figure 20-43. IBM Tivoli Composite Application Manager for WebSphere Application Server WA855 / VA8551.0
Notes:
20-64 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
IBM Tivoli Composite Application Manager for Application Diagnostics gives users the
ability to view the health of web applications and servers; then drill down to diagnostic
information for specific application requests to identify the root cause of problems. Some of
the features of IBM Tivoli Composite Application Manager for Application Diagnostics
include:
• Analyze application performance through trending or historical analysis
• Provides key performance metrics to IBM Tivoli Composite Application Manager for
Transactions to sense and isolate potential problems
• View all Java EE transactions that are “in-flight” to uncover the root cause of
bottlenecks and do detailed memory analysis
• Correlates and profiles transactions that span multiple subsystems such as IBM CICS
and IMS
• Software consistency checker compares key system and JVM metrics on working and
non-working systems to help isolate differences that might be causing problems
20-66 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 20-45. IBM Tivoli Composite Application Manager for WebSphere Application Server WA855 / VA8551.0
Notes:
IBM Tivoli Composite Application Manager is enhanced in version 8.0 and can be installed
together with the application server. This integrated monitoring tool allows you to view the
health of web applications and servers, and drill down to diagnostic information for specific
application requests to identify the root cause of problems.
IBM Tivoli Composite Application Manager for WebSphere Application Server can be
configured per server by selecting Monitoring and Tuning > Performance Monitoring
Infrastructure > server_name.
The server must be configured with the IBM Tivoli Composite Application Manager GUI
before you can see the IBM Tivoli Composite Application Manager for WebSphere
Application Server link under Additional Properties on the PMI configuration tab of the
server.
Use this page to enable or disable the IBM Tivoli Composite Application Manager for
WebSphere Application Server Data Collector. Changes take effect after the server is
restarted.
It is a simple upgrade from IBM Tivoli Composite Application Manager for WebSphere
Application Server to IBM Tivoli Composite Application Manager for Application
Diagnostics (no “rip and replace”). After the upgrade, IBM Tivoli Composite Application
Manager data is still visible in Tivoli Performance Viewer as well.
20-68 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 20-46. IBM Tivoli Composite Application Manager for WebSphere Application Server WA855 / VA8551.0
Notes:
To see the IBM Tivoli Composite Application Manager modules and metrics in the Tivoli
Performance Viewer, you are required to enable it by selecting the check box on the
Configuration tab. The next step is to click Start Monitoring on the runtime tab.
Figure 20-47. IBM Tivoli Composite Application Manager metrics in Tivoli Performance Viewer WA855 / VA8551.0
Notes:
IBM Tivoli Composite Application Manager for WebSphere Application Server provides
more request-based response time and processor metrics.
Customer application code is not instrumented in any way.
20-70 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Figure 20-48. IBM Tivoli Composite Application Manager application metrics in Tivoli Performance Viewer WA855 / VA8551.0
Notes:
Several performance metrics are collected and displayed for each component of an
application. This screen capture shows the metrics for the PlantsByWebSphere shopping
servlet after a load test. Clicking or hovering over the question mark (?) for each metric
displays a description of the metric.
Unit summary
Having completed this unit, you should be able to:
• Describe performance monitoring and tuning methods
• Use the Tivoli Performance Viewer to monitor application server
resources
• Use the performance servlet to generate performance data
• Configure the Request Metrics tool to generate performance data about
the end-to-end request flow
• Use Performance Advisors to generate suggested tuning actions
• Enable the performance collectors from IBM Tivoli Composite
Application Manager for WebSphere Application Server
Notes:
20-72 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. What are the two performance data collection technologies in
WebSphere?
Notes:
Write your answers here:
1.
2.
3.
4.
Checkpoint answers
1. What are the two performance data collection technologies in
WebSphere?
– The Performance Monitoring Infrastructure (PMI) and request metrics
provide the data collection mechanisms in WebSphere.
2. Which WebSphere performance tool allows you to monitor overall
system health?
– The Tivoli Performance Viewer allows you to monitor overall system
health.
3. True or False: The Performance Monitoring Infrastructure is enabled
by default.
– True. PMI is enabled by default.
4. True or False: The Tivoli Performance Viewer Advisor tool generates
tuning advice and automatically applies it to the environment.
– False. The performance advisor tools do not automatically tune the
environment. You must tune manually and test the effect of the
changes.
© Copyright IBM Corporation 2013
Notes:
20-74 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Exercise 16
Notes:
Exercise objectives
After completing this exercise, you should be able to:
• Enable various levels of Performance Monitoring Infrastructure (PMI)
statistics for an application server
• Monitor an application server by using Tivoli Performance Viewer
• Configure user settings for Tivoli Performance Viewer
• Examine summary reports and performance modules in Tivoli
Performance Viewer
• View performance messages from the Tivoli Performance Viewer
Advisor
• Enable and configure the Request Metrics tool
• View Request Metrics messages in the standard logs of an application
server
• Configure IBM Tivoli Composite Application Manager for WebSphere
Application Server collector for an application server
• View IBM Tivoli Composite Application Manager application
performance statistics by using Tivoli Performance Viewer
© Copyright IBM Corporation 2013
Notes:
20-76 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
References
WebSphere Application Server V8.5 Information Center
http://publib.boulder.ibm.com/infocenter/wasinfo/v8r5/
index.jsp
Unit objectives
After completing this unit, you should be able to:
• Define WebSphere Batch
• Describe WebSphere Batch architecture and components
• Describe the basic programming model
• Explain Batch workflow
• Define new features in WebSphere Batch
Notes:
21-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Topics
• Overview of WebSphere Batch
• Components
• Additional features
Notes:
21-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Overview of WebSphere
Batch
Notes:
21-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
The challenge
• Application servers traditionally focused on transactional applications
– Applications typically are designed to handle large volumes of relatively small
tasks
– Not all applications fit this type of design
Notes:
WebSphere Application Server and Java Platform, Enterprise Edition servers in general are
classically focused on lightweight transactional work. Typically, an individual request can
be handled in a few seconds of processor time and relatively small amounts of memory.
However, other styles of long-running applications require more resources and different
types of support from the runtime environment. Compute grid provides support within
WebSphere Application Server for long-running applications. Within an enterprise
environment, it is usually preferable to run long-running and transactional work on separate
processors, since running them within the same processor can negatively affect
performance for the application. Long-running work might take hours or even days to
complete and consume large amounts of memory or processing power while it runs.
Compute grid provides the capability to deploy different types of applications within your
environment, and can balance the work that is based on policy information.
Notes:
Batch applications are designed to run long and complex transaction processing that
typically runs computationally intensive work. This type of processing requires more
resources than traditional online transactional processing (OLTP) systems. Batch
applications run as background jobs described by a job control language, and use a
processing model that is based on submit, work, and result actions. The execution of batch
processes can take hours, and the tasks are typically transactional, involving multi-step
processes.
21-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Key features
• Unified batch architecture provides a consistent programming model
and operations model
Notes:
WebSphere Application Server V8.5 with WebSphere Batch supplies a unified batch
architecture. Using XML Job Control Language (xJCL), WebSphere Batch provides
consistent programming and operational models. WebSphere Batch uses a batch
technology that is optimized for Java and supports long-running applications, which ensure
agility, scalability, and cost efficiency for enterprises.
21-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty 21.2.Components
Components
Notes:
21-12 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Batch container
– Provides the batch execution environment, including services such as checkpoint
and restart and job-logging
• Job scheduler
– Job management control point for determining when and where jobs run
• Batch toolkit
– Provides tools for the creating, packaging, and testing batch jobs
• Endpoints
– Application servers that are augmented for running batch applications
© Copyright IBM Corporation 2013
Notes:
A batch job consists of a series of definitions that direct the execution of one or more batch
applications, and specifies their input and output. A batch job processes a specific set of
tasks in a predefined sequence to accomplish specific business functions. Batch job
workloads are executed in a batch container in WebSphere Application Server
environments. This batch container is the main engine responsible for the execution of
batch applications. It runs batch jobs under the control of an asynchronous bean, which
can be thought of as a container-managed thread. The batch container ultimately
processes job definitions and carries out the lifecycle of jobs.
The grid endpoints are application servers that are augmented to provide a special runtime
environment that batch applications need. A product-provided Java EE application, the
batch execution environment, provides this runtime environment. The system deploys this
application automatically when a batch application is installed, and it serves as an interface
between the job scheduler and batch applications. It provides the runtime environment for
both compute-intensive and transactional batch applications.
• Enterprise connectors
– Enables integration to external products for scheduling (such as Tivoli Workload
Scheduler) and monitoring (such as IBM Tivoli Composite Application Manager)
batch workloads
Notes:
An XML dialect called XML Job Control Language (xJCL) is used to describe jobs. This
dialect has constructs for expressing all of the information that is needed for both
compute-intensive and batch jobs, although some elements of xJCL are applicable only to
compute-intensive or batch jobs. The job description identifies which application to run and
its input and output. The xJCL definition of a job is not part of the batch application. This
definition is constructed separately and submitted to the job scheduler to run. The job
scheduler uses information in the xJCL to determine where and when the job runs.
The batch container uses a relational database to store checkpoint information for
transactional batch applications. The database can be any supported WebSphere
Application Server relational database and is accessed by using JDBC. If the batch
container is clustered, the database must be a network database, such as DB2.
21-14 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Batch container
• Batch applications run under the control of the batch controller bean
– It processes the job definition and carries it from start to finish
IBM batch
container classes
Notes:
The batch container is the heart of the batch application support that is provided in
WebSphere Application Server. It runs a batch job under the control of an asynchronous
bean, which can be thought of as a container-managed thread. The batch container
ultimately processes a job definition and carries out the lifecycle of a job.
The batch container provides these services:
• Check pointing, which involves resuming batch work from a selected position
• Result processing, which involves intercepting and processing step and job return
codes
• Batch data stream management, which involves reading, positioning, and repositioning
data streams to files, relational databases, native z/OS data sets, and many other
different types of input and output resources
Batch container
Notes:
The batch programming model consists of four principal interfaces, two of which are
essential to building a batch application, and two that are optional and intended for
advanced scenarios.
The first essential item is the batch job step, which defines the interaction between the
batch container and the batch application. The other essential item is the batch data
stream. The batch data stream abstracts a particular input source or output destination for
a batch application and defines the interaction between the batch container and a concrete
BatchDataStream implementation.
An optional checkpoint policy algorithm defines the interaction between the batch container
and a custom checkpoint policy implementation. A checkpoint policy is used to determine
when the batch container will checkpoint a running batch job to enable a restart to occur
after a planned or unplanned interruption.
WebSphere Application Server includes two ready-to-use checkpoint policies. An optional
results algorithm defines the interaction between the batch container and a custom results
algorithm. The purpose of the results algorithm is to provide the overall return code for a
21-16 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty job. The algorithm has visibility to the return codes from each of the job steps. WebSphere
Application Server includes one ready-to-use results algorithm.
Notes:
The job scheduler provides the job management functions such as submit, cancel, and
restart. It maintains a history of all job activity, including waiting jobs, running jobs, and
completed jobs. The job scheduler is hosted in a WebSphere Application Server or a server
cluster.
Jobs are described by using a job control language called XML Job Control Language
(xJCL), which identifies the batch application to run and the inputs and outputs. The batch
container provides the execution environment for batch jobs. There can be multiple batch
containers in a WebSphere cell. Batch applications are regular WebSphere Java Enterprise
Edition (Java EE) applications, which are deployed as enterprise archive (EAR) files.
21-18 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
• Batch applications
– Completes large amounts of work that are based on repetitive tasks
– Application provides process-one-record logic while container provides iteration
– Container provides transactions, checkpoint, and restart mechanisms
• Compute-intensive applications
– Completes work that requires large amounts of system resources, such as
processor and memory
– Application provides all the logic for performing, including getting the needed
resources
– Container has limited contact with work after it is started
© Copyright IBM Corporation 2013
Notes:
WebSphere runs batch applications that are written in Java and implement a WebSphere
batch programming model. They are packed as EAR files and are deployed to the batch
container hosted in an application server or cluster. Batch applications are executed
non-interactively in the background.
Batch
Job submitter repository
Batch
Notes:
Batch jobs are submitted to the system by using the Job Management Console or
programmatically by way of Enterprise JavaBeans (EJB), Java Message Service (JMS), or
web services. Each job is submitted in the form of an XML Job Control Language (xJCL)
document. The Job Dispatcher then selects the best endpoint application server for job
execution, which is based on several different metrics. The endpoint application server sets
up the jobs in the batch container and executes the batch steps that are based on the
definitions in xJCL. While the job is running, the Job Dispatcher aggregates job logs and
provides lifecycle management functions such as start, stop, and cancel.
21-20 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Additional features
Notes:
21-22 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Parallel batch
• Container-managed parallelization
Notes:
The Parallel Job Manager provides support for building transactional batch applications as
a job, and then divides the job into subordinate jobs. The subordinate jobs can run
independently and in parallel. The Parallel Job Manager is used to submit and manage the
transactional batch jobs.
The Batch programming model is updated to provide APIs for the Parallel Job Manager.
The purpose of the Parameterized API is to divide the top-level job into multiple subjobs.
The Parameterized API determines the number of subjobs to create, and the input
properties that are passed to each subjob.
WebSphere Batch allows the running of parallel jobs and their subjobs in the same JVM if
needed. This capability is especially useful when subjobs are typically short in duration,
and the process of distributing the subjobs across servers is much larger compared to the
actual work completed.
Enterprise integration
• WebSphere includes a special connector for Tivoli Workload Scheduler and
competing workload schedulers
Batch
Tivoli
Workload
Scheduler WebSphere Application Server Application Server
Notes:
WebSphere Application Server V8.5 Batch provides an integration capability with external
workload schedulers, such as Tivoli Workload Scheduler. An integration layer that is known
as WSGrid enables Tivoli Workload Scheduler (and similar products) to dispatch and
monitor batch activities.
Tivoli Workload Scheduler helps you establish an enterprise workload automation
backbone by driving composite workloads according to business policies. It provides
automation capabilities to control the processing of a production workload for an enterprise,
including batch and online services. Tivoli Workload Scheduler functions as an automatic
driver for composite workloads. It extends the scope for integrated applications and
systems management by driving workloads on multiple, heterogeneous platforms and ERP
systems.
For more information about IBM Tivoli Workload Scheduler, see:
http://www.ibm.com/software/tivoli/products/scheduler/
21-24 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
CommandRunner
• CommandRunner is a utility job step which allows shell command lines
to be run as job steps
– Includes shell commands, shell scripts, and compiled programs
– Runs the specified shell command line in an operating system process
– Standard output and standard error streams are captured and written to the job
log
Notes:
The CommandRunner utility adds all job step properties, after substitution, to the process
variable pool for the process in which the specified command line runs.
COBOL support
Notes:
COBOL was the prevalent language to run batch-style workloads in the past, and even
today there is a large existing base of COBOL code. On the z/OS platform, Java batch
adds support to easily call into existing COBOL assets to run modern batch workloads.
With WebSphere Application Server V8.5, COBOL support includes the following key
features:
• In z/OS, you can call standard COBOL modules from Java on the same thread in the
same process.
• Java and COBOL run in the same transaction scope.
• WebSphere managed DB2 connections are shareable with COBOL.
• You can use COBOL working storage isolation per job step or per remote call.
• IBM Rational Application Developer tools are available for Java call stub generation.
The new COBOL container allows COBOL modules to be loaded into the WebSphere
Application Server for z/OS address space and invoked directly. It provides the means of
21-26 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty direct integration of COBOL resources into WebSphere Java processing. The container
itself is implemented as a handful of DLL files and JAR files.
Unit summary
Having completed this unit, you should be able to:
• Define WebSphere Batch
• Describe WebSphere Batch architecture and components
• Describe the basic programming model
• Explain Batch workflow
• Define new features in WebSphere Batch
Notes:
21-28 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Checkpoint questions
1. (True or False) The job scheduler accepts job submissions and
determines where to run them.
3. (True or False) COBOL support allows for Java and COBOL to run
in the same transaction scope.
Notes:
Write your answers here:
1.
2.
3.
Checkpoint answers
1. True.
3. True.
Notes:
21-30 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Unit objectives
After completing this unit, you should be able to:
• Explain how the course met its learning objectives
• Submit an evaluation of the class
• Identify other WebSphere Education courses that are related to this
topic
• Access the WebSphere Education website
• Locate appropriate resources for further study
Notes:
22-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Notes:
Notes:
22-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
Class evaluation
• Your comments about this class are useful to WebSphere Education
• Feedback on the site, curriculum, and instructor tell WebSphere
Education what was good about the class and what can be improved
• Complete the course evaluation on the IBM Training website:
http://www.ibm.com/training/osart
Notes:
Notes:
22-6 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
References (1 of 3)
• Web pages
– WebSphere:
http://www.ibm.com/websphere
– Redbooks:
http://www.ibm.com/redbooks
– Education:
http://www.ibm.com/services/learning
– Training and certification:
http://www.ibm.com/developerworks/websphere/education/
Notes:
References (2 of 3)
• JSR 244 is an “umbrella” specification that references other
specifications
– http://www.jcp.org/en/jsr/detail?id=244
Notes:
22-8 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
Uempty
References (3 of 3)
• WebSphere Application Server V8.5 Concepts, Planning, and Design
Guide
– http://www.redbooks.ibm.com/abstracts/sg248022.html?Open
Notes:
Unit summary
Having completed this unit, you should be able to:
• Explain how the course met its learning objectives
• Submit an evaluation of the class
• Identify other WebSphere Education courses that are related to this
topic
• Access the WebSphere Education website
• Locate appropriate resources for further study
Notes:
22-10 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
Student Notebook
B
BSF Bean Scripting Framework F
FIPS Federal Information Processing Standard
FQDN fully qualified domain name
C FTP File transfer protocol
CA certificate authority
CICS Customer Information Control System
CIM centralized installation manager G
CIP custom installation package GA generally available
CMP container-managed persistence GB gigabyte
CMS Certificate Management System GC garbage collection
CMT Configuration Migration Tool GCD greatest common divisor
CN common name GCMV Garbage Collection and Memory Visualizer
COBOL Common Business-Oriented Language GIF Graphics Interchange Format
CORBA Common Object Request Broker GMT Greenwich Mean Time
Architecture GPS global positioning system
CP caching proxy GSS Generic Security Services
CPU central processing unit GTK GNU GUI Tool Kit
CSIv2 Common Secure Interoperability Protocol GUI graphical user interface
Version 2
CSS Cascading Style Sheets
H
HA high availability or highly available
D HACMP High-Availability Cluster Multi-Processing
DB database HAM high availability manager
DC domain controller HFS Hierarchical File System
DCS Distribution and Consistency Services HPEL High Performance Extensible Logging
DD deployment descriptor HPUX Hewlett Packard UNIX
X-2 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
V
VMM virtual member manager
VPN virtual private network
W
WAR web archive
WLM workload management
WS web services
WS-AT web services atomic transaction
WS-BA web services business activity
WS-COOR web services coordination
WSDL Web Services Description Language
WS-I Web Services Interoperability
WSIF Web Services Invocation Framework
X
XA Extended Architecture
XCT Cross-Component Trace
xJCL XML Job Control Language
XML Extensible Markup Language
XTP extreme transaction processing
Y
Z
zMMT z/OS Migration Management Tool
z/OS zSeries operating system
zPMT z/OS Profile Management Tool
X-4 WebSphere Application Server V8.5.5 Administration © Copyright IBM Corp. 2013
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V8.1
backpg
Back page