
Mastering JBoss Enterprise Application Platform 7
Beschreibung
Alles über E-Books | Antworten auf Fragen rund um E-Books, Kopierschutz und Dateiformate finden Sie in unserem Info- & Hilfebereich.
Alle Preise
Weitere Details
Weitere Ausgaben
Inhalt
- Cover
- Copyright
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Table of Contents
- Preface
- Chapter 1: Installation and Configuration
- What's new in EAP 7?
- Installing EAP 7
- Installing from the ZIP file
- Installing EAP from RPM
- Installing from the JAR installer
- Installing from the source
- Other installation options
- Starting the application server
- Stopping the application server
- Basic server administration
- EAP 7 basic configuration
- Standalone configuration
- Domain configuration
- Application server core building blocks
- Extensions
- Paths
- Interfaces
- Socket bindings and socket binding groups
- System properties
- Profiles and subsystems
- Summary
- Chapter 2: The CLI Management Tool
- Connecting to the CLI
- Using the CLI
- Basic operations
- Managing server state
- Deploying and undeploying an application using CLI
- Creating a configuration snapshot
- Features of the CLI
- Batch mode
- Commands in batch mode
- Scripting in the CLI
- Using the CLI in offline mode
- Using the CLI in graphical mode
- Summary
- Chapter 3: Managing EAP in Domain Mode
- Domain mode breakdown
- Domain physical components
- Domain logical components
- Handy domain properties
- Electing the domain controller
- Creating an advanced domain
- Building up your domain
- Configuring host controllers
- Connecting other host controllers
- Tweaking the domain settings
- Domain controller failover
- Basic solution - building a watchdog procedure
- Using domain start up options to allow host controller restart
- Using domain discovery to elect a new domain controller
- Using a centralized store for your server configurations
- Additional EAP 7 features
- Connecting EAP 6 host controllers to an EAP 7 domain controller
- Hierarchical profiles
- Profile cloning
- Summary
- Chapter 4: Deploying Applications
- Overview of deployments
- Deployment in standalone mode
- Automatic deployment
- Deployment triggered by the user
- Deploying using the CLI
- Deploying using the web console
- Deployment in domain mode
- Deployment using the CLI
- Deployment using the web console
- Advanced deployment strategies
- Deployment overlays
- Summary
- Chapter 5: Load Balancing
- The need for balancing
- Load balancing with mod_cluster
- Configuring EAP 7 as load balancer
- Configuring the frontend server
- Advantages of an all-in-one solution
- Configuring mod_cluster with Apache
- Installing mod_cluster on the Apache web server
- Testing mod_cluster
- Troubleshooting mod_cluster
- Security checks
- Network checking
- Network checks for non-Linux machines
- Configuring mod_cluster to use TCP transport
- Determining the optimal load configuration between Apache and JBoss
- Configuring balancing groups
- Why use balancing groups?
- Configuring mod_cluster balancing factors
- Adding custom mod_cluster metrics
- Using other balancing solutions
- Configuring mod_jk
- Configuring mod_proxy
- Configuring Nginx load balancer
- Summary
- Chapter 6: Clustering EAP 7
- Clustering overview and misconceptions
- Clustering in standalone mode
- Testing in standalone mode
- Clustering from a network point of view
- Clustering in domain mode
- Server-group configuration
- Testing in domain mode
- Advanced topics
- Clustering using TCP
- EJBs in a clustered environment
- Testing clustered EJB
- Summary
- Chapter 7: Logging
- The basics of logging
- Default log file locations
- Configuring handlers
- Console handler
- Periodic log handlers
- Size handlers
- Combining size and periodic log files
- Adding asynchronous behavior
- Custom handlers
- JBoss SyslogHandler
- Filtering logs
- Configuring loggers
- Defining new loggers
- Managing your application logging
- Per-deployment logging
- Logging profiles
- Reading logs with management interfaces
- Reading logs from the CLI
- Streaming logging through HTTP
- Building a centralized logging system
- Summary
- Chapter 8: Configuring Database Connectivity
- Introduction to datasources
- Datasource overview
- Prerequisites
- Adding a JDBC 4 driver module
- Configuring a JDBC 4-compliant driver
- Defining a new datasource
- Connection pool for a datasource
- Flushing a pool's connections
- Validating pool's connection
- Defining an XA-datasource
- Connection pool for an XA-datasource
- Difference between XA and non-XA datasource
- Hardening datasource configuration
- Password encryption
- Password protection using the vault
- Summary
- Chapter 9: Configuring EAP 7 for Java EE Applications
- Configuring the EJB container
- Configuring the stateless EJB pool
- Configuring the message driven bean pool
- Configuring the stateful EJB cache
- Controlling the amount of stateful beans in the cache
- Configuring the web server
- Undertow core server configuration
- Configuring Undertow connectors
- Configuring the pool of threads used by Undertow
- Migrating from web configurations
- Migrating Valve components
- Configuring Undertow to serve static content
- Undertow servlet container
- Monitoring your applications
- Using JConsole to display graphical attributes
- Data mining using the ELK stack
- Using Byteman to trace your application
- Summary
- Chapter 10: Messaging Administration
- Introduction to Artemis MQ
- Configuring broker transport
- Configuring persistence
- Configuring destinations
- Routing messages to other destinations
- Diverting messages to other destinations
- Creating a bridge between two ActiveMQ Artemis servers
- ActiveMQ Artemis source configuration
- ActiveMQ Artemis target configuration
- Bridging messages to another JMS broker
- Clustering
- Configuring server discovery
- Broadcast groups
- Discovery groups
- Configuring high availability
- HA with shared-store
- Restoring the master node
- HA with data replication
- Shared-store versus replication
- Summary
- Chapter 11: Securing the Application Server
- Creating security domains
- Internal based login modules
- External based login modules
- Database login module
- Troubleshooting security domains
- Hardening the database login modules
- Creating a Kerberos security domain
- Basic Kerberos configuration
- Running the Kerberos server
- Testing the Kerberos login against management interfaces
- Using Kerberos to provide SSO
- Securing the management interfaces with LDAP
- Setting up LDAP authentication
- HA LDAP
- Configuring RBAC
- Mapping individual users
- Mapping groups to roles
- Mapping groups with property files
- Mapping groups with LDAP
- Scoped roles
- Generating certificates
- Creating an SSL realm
- Securing the management interfaces
- Summary
- Chapter 12: New Security Features of EAP 7
- EAP 7 new security model
- Introducing elytron
- Elytron building blocks
- An overview of the elytron subsystem
- Creating a FileSystem security realm
- Developing a JDBC realm
- Developing an LDAP realm
- Introducing Red Hat SSO
- Installing Red Hat SSO server
- Creating a new realm
- Configuring client applications
- Installing the client template on the server
- Summary
- Chapter 13: Using EAP 7 with Docker
- Getting to grips with Docker
- Basic components of containers
- Installing Docker
- Running your first container
- Creating your Docker images
- Building our image
- Inspecting the server logs
- Managing the server storage
- Mounting a volume from the host machine
- Troubleshooting mounting volumes from the host machine
- Using a data container
- Managing multiple containers
- Using Docker compose
- Composing EAP 7 with a Database
- Composing a cluster of EAP 7 nodes
- Summary
- Chapter 14: Running EAP 7 on the Cloud Using OpenShift
- Introducing OpenShift
- OpenShift Online
- Developing and deploying your first OpenShift application in the cloud
- Summary
- Index
Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.
Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.