Table of contents:
................................................................. ................................................................. .............11
Starting the WEBLOGIC Management Server................................................ ................................................................. ......12
Password usage when starting the WebLogic server............................. .................................................12
Starting the WebLogic Management Server from the Start menu............................. .............................12
Starting and stopping the WebLogic server as a Windows service...................... ........................13
Starting the WebLogic Management Server from the command line........................................ .................................................13
Starting the management server using a script........................................ ................................................................. ............15
Restarting the management server while a managed server is running............................. .............................16
Restart the management server on the same machine............................. ................................................................. .....16
Restarting the management server on other machines............................. ................................................................. ....17
JOIN WEBLOGIC MANAGED SERVER TO DOMAIN........................................ .............................................17
STARTING WEBLOGIC MANAGED SERVER........................................ ................................................................. .......17
Starting WEBLOGIC managed servers via script........................................ .............................19
Upgrading from an older version of WEBLOGIC server........................................ ................................................................. 20
Terminating WEBLOGIC Server from the Management Console........................................ .................................................20
Stopping the server from the command line........................................ ................................................................. .............20
Pausing and resuming managed servers........................................ ................................................................. ...............twenty one
Set up the
WEBLOGIC server as a WINDOWS service........................................ ...................................twenty one
DELETE WEBLOGIC SERVER IN WINDOWS SERVICE FORM...................................... ...............................twenty two
Changing the password of a server installed as a Windows service................................ ........................................twenty two
Registering startup and termination classes........................................ ................................................................. ......................twenty two
Chapter 3:................................................ ..................................Configuring WEBLOGIC Server and Cluster 29
Server and cluster configuration overview................................................ ................................................................. ............29
The role of the management server........................................ ................................................................. .............29
Starting the management console........................................ ................................................................. .............................30
How dynamic configuration works........................................ ................................................................. .............31
Cluster configuration planning................................................ ................................................................. .............................31
Server configuration task list................................................ ................................................................. .............32
Cluster configuration list................................................ ................................................................. .............................34
Create a new domain........................................ ................................................................. .............................34
Chapter 4:................................................ ................................................................. ...monitoring WEBLOGIC domains 35
Overview................................................ ................................................................. ........................................36
Monitoring Server........................................ ................................................................. .............................36
Terminating or pausing the server........................................ ................................................................. .............37
performance................................................. ................................................................. ........................................37
Cluster data................................................ ................................................................. .............................38
Server security........................................ ................................................................. .............................38
JMS................................................ ................................................................. ........................................38
WebLogic Administration Guide
- 2 -
JTA................................................ ................................................................. ........................................39
Monitoring JDBC connection pool........................................ ................................................................. .............................39
List of MONITORING pages of the management console............................................. .............................39
Chapter 5:................................................ ..................Manage WEBLOGIC Server with Log Messages 42
Logging subsystem overview................................................ ................................................................. .............................42
Local server log files........................................ ................................................................. ............43
Startup log................................................ ................................................................. .............................44
Client log................................................ ................................................................. .............................44
Log file format........................................ ................................................................. ........................44
Message properties................................................ ................................................................. .............................45
Message Catalog................................................ ................................................................. .............................45
Severity level of the message........................................ ................................................................. .............................45
Message debugging................................................ ................................................................. .............................46
Browsing log files................................................ ................................................................. .............................46
View log................................................ ................................................................. .............................46
Create a domain log filter........................................ ................................................................. .............47
Chapter 6:................................................ ................................................................. .............................Distributing Applications 48
Dynamic Distribution........................................ ................................................................. .............................53
Enabling and disabling automatic distribution........................................ ................................................................. .............53
Application of dynamically distributed extended directory format........................................ ................................................................. ....53
Dynamically uninstall or redistribute apps........................................ ................................................................. .......53
Distributing applications using the management console........................................ ................................................................. .............48
Chapter 7:................................................ .............................Configuring WEB components of WEBLOGIC server 55
Overview................................................ ................................................................. ........................................55
HTTP parameters................................................ ................................................................. .............................55
Configuring the listening port................................................ ................................................................. .............................56
WEB Application........................................ ................................................................. .............................56
Web Applications and Clusters........................................ ................................................................. .............................57
Specify the default web application........................................ ................................................................. .............57
Configuring virtual hosts................................................ ................................................................. .............................58
Virtual Host and Default Web Application........................................ ................................................................. .............58
Setting up a virtual host................................................ ................................................................. .............................59
Setting up HTTP access logs........................................ ................................................................. .............61
Log Wraparound................................................ ................................................................. .............................61
Setting up HTTP access logs using the administrative console............................. .............................................61
Common log format................................................ ................................................................. .............................62
Using the extended log format........................................ ................................................................. .............63
Preventing "POST Denial of Service" Attacks........................................ ................................................................. ......67
Setting up the HTTP tunnel for the WEBLOGIC server........................................ .............................................67
Configuring HTTP Tunnel Connection........................................ ................................................................. .............68
Establishing a connection between the client and the
WEBLOGIC server................................ ..................................68
Serving static files using local I/O (WINDOWS only)................................ ............................69
Chapter 8:................................................ ................................................................. ...distribution and configuration WEB application error! Undefined bookmark overview................................................ ................................................................. ............mistake! Bookmark not defined.
Steps to Distribute WEB Applications........................................ ....................................mistake! Bookmark not defined.
WebLogic Administration Guide
- 3 -
Directory structure........................................ ................................................................. ...mistake! Bookmark not defined.
Distribution and redistribution of WEB applications........................................ ..............................mistake! Bookmark not defined.
Modify components in the web application........................................ ..................................mistake! Bookmark not defined.
Distributing Web Applications in Enterprise Applications........................................ ...................mistake! Bookmark not defined.
URIS and WEB applications................................................ ..........................................mistake! Bookmark not defined.
Configuring SERVLETS................................................ ............................................mistake! Bookmark not defined.
Servlet mapping................................................ .................................................mistake ! Bookmark not defined.
Servlet initialization parameters................................................ .......................................mistake! Bookmark not defined.
Configuring JSP................................................ ................................................................. .....mistake! Bookmark not defined.
Configuring JSP tag library................................................ .............................................mistake! Bookmark not defined.
Configuring the welcome page................................................ ..............................................mistake! Bookmark not defined.
Set default SERVLET............................................. .....................................mistake! Bookmark not defined.
How the WEBLOGIC server parses HTTP requests........................................ .............................60
Customizing HTTP error responses................................................ .....................................mistake! Bookmark not defined.
USING CGI IN WEBLOGIC SERVER........................................ ....................mistake! Bookmark not defined.
CGI related configuration...................................... ............................................mistake! Bookmark not defined.
Requesting a CGI script................................................ ...............................................mistake! Bookmark not defined.
Redirect the request to another HTTP server........................................ .................................................70
Setting up the proxy for the slave server........................................ ................................................................. .............70
Example of Distribution Descriptor for Proxy Servlet........................................ ................................................................. .....71
Redirect requests to the WEBLOGIC cluster................................................ ................................................................. .72
Setting up HttpClusterServlet................................................ ................................................................. ............72
Distribution descriptor example for HttpClusterServlet........................................ .............................73
Configuring WEB application security........................................ ................................................................. .............75
Setting up authorization for web applications........................................ ................................................................. ............75
Multiple Web Applications, Cookies and Authentication........................................ ................................................................. .76
Restricting access to web application resources........................................ ................................................................. .........76
Using users and roles in servlets........................................ ................................................................. .........78
Configuring external resources for WEB applications........................................ ................................................................. .......79
Reference EJBS in WEB applications........................................ ................................................................. ............80
Configuring session management................................................ ................................................................. .............................80
HTTP session properties................................................ ................................................................. ............................81
Session timeout................................................ ................................................................. .............................81
Configuring session cookies................................................ ................................................................. .............................81
Using long-lasting cookies................................................ ................................................................. .............................82
Configuring persistent sessions................................................ ................................................................. .............................82
Common properties................................................ ................................................................. ..................................82
Using memory-based, single-server, non-replicated persistent storage............................. .............................83
Using file-based persistent storage........................................ ................................................................. .......83
Using database-based persistent storage........................................ ................................................................. .......83
Using URL rewriting........................................ ................................................................. .............................85
Coding Guidelines for URL Rewriting........................................ ................................................................. .............85
URL Rewriting and Wireless Access Protocol (WAP)........................................ ................................................................. ....86
Using character sets with POST data........................................ ................................................................. .............86
Chapter 9:................................................ .............Configuring the APACHE-WEBLOGIC server plug-in 87
Overview................................................ ................................................................. ........................................87
Platform support................................................ ................................................................. .............................87
WebLogic Administration Guide
- 4 -
Installation library................................................ ................................................................. .............................88
Configuring the HTTPD.CONF file................................................ ................................................................. .............89
Via URL proxy........................................ ................................................................. .............................89
Proxy via MIME file types........................................ ................................................................. .......90
Parameters of APACHE-WEBLOGIC SERVER plug-in........................................ .................................................90
Using SSL protocol........................................ ................................................................. .............................92
Issues related to SSL-APACHE configuration................................ ................................................................. ...93
HTTPD.CONF file example................................................ ................................................................. .............93
Configuration file example................................................ ................................................................. ............................94
Example of using WebLogic cluster........................................ ................................................................. .........94
Example without using WebLogic cluster........................................ ................................................................. ......94
Example of configuring a virtual host........................................ ................................................................. .............95
Distributing the APACHE-WEBLOGIC SERVER plug-in........................................ ........................................95
Chapter 10:................................................ ........................................Configuring MICROSOFT-IIS plug-in 96
Overview................................................ ................................................................. ........................................96
Connection Pooling and Keep-Alive........................................ ................................................................. .......96
Installation library................................................ ................................................................. .................................97
Update IIS settings to forward requests to WEBLOGIC........................................ .................................................97
Creating the IISPROXY.INI file................................................ ................................................................. .............98
File extension mode request proxy........................................ ................................................................. ......101
Path-based request proxy........................................ ................................................................. ............101
.ini file example................................................ ................................................................. .............................101
Using SSL........................................ ................................................................. .............................102
Transfer the SERVLETS request to the
WEBLOGIC server for processing............................. .............................103
Installation test................................................ ................................................................. .............................103
Chapter 11:................................................ ................................................................. ..Configuring NETSCAPE plug-in 105
Overview................................................ ................................................................. .............................105
Connection pooling and keepalives........................................ ................................................................. .............105
Plug-in configuration................................................ ................................................................. .............................106
Step 1: Copy the library........................................ ................................................................. .............106
Step 2: Set up the obj.conf file........................................ ................................................................. .......106
Step 3: Change the MIME.types file........................................ ................................................................. ....109
Step 4: Distribute and test the NSAPI plug-in........................................ ................................................................. .110
parameter................................................. ................................................................. .............................110
Using SSL protocol........................................ ................................................................. .............................112
Notes on failed transfer of WEBLOGIC server cluster............................. ............................113
0BJ.CONF file example (without using WEBLOGIC cluster)............................. .............113
OBJ.CONF file (when using WEBLOGIC cluster)...................................... .............................114
Chapter 12:................................................ ................................................................. .............................Safety 117
Security Configuration Overview................................................ ................................................................. ............................117
Setting up the JAVA security manager................................................ ................................................................. .............142
Changing system password................................................ ................................................................. ............................118
Specify a security domain........................................ ................................................................. .............119
Configuring cache domains................................................ ................................................................. .............................120
Configuring LDAP security domain........................................ ................................................................. .............122
Configuring the Windows NT security domain........................................ ................................................................. .......125
WebLogic Administration Guide
- 5 -
Configuring UNIX security domain........................................ ................................................................. .............127
Configuring RDBMS security domain........................................ ................................................................. .............128
Installing a customer security domain........................................ ................................................................. ............129
Testing alternate security domains and custom security domains........................ ................................................................. ...130
Migrating security domains................................................ ................................................................. .............................130
Define users........................................ ................................................................. .............................131
Defining groups........................................ ................................................................. .............................132
Defining groups for virtual machines........................................ ................................................................. ............................133
Define ACL........................................ ................................................................. .............................133
Configuring SSL protocol................................................ ................................................................. .............................134
Obtain private key and digital certificate........................................ ................................................................. .............134
Saving private keys and digital signatures........................................ ................................................................. .............136
Define Trust Signature Authorization........................................ ................................................................. .............137
Define the configuration fields of the SSL protocol........................................ ................................................................. .......138
Configuring two-way authentication................................................ ................................................................. ............................139
CONFIGURING RMI OVER IIOP OVER SSL........................................ .............................140
Protect password................................................ ................................................................. .............................140
Installing the audit provider................................................ ................................................................. .............141
Installing the connection filter........................................ ................................................................. .............142
Configuring security context propagation........................................ ................................................................. .............144
Chapter 13:................................................ ................................................................. .............................Management Affairs 147
Transaction Management Overview................................................ ................................................................. ............................147
Configuration transactions................................................ ................................................................. .............................148
Transaction monitoring and logging........................................ ................................................................. .............148
Migrating the server to another machine................................ ................................................................. ....149
Chapter 14:................................................ ................................................................. ............Manage JDBC connections 150
Managing JDBC using the management console........................................ ................................................................. .......150
JDBC Configuration Guide................................................ ................................................................. ............................150
JDBC configuration overview................................................ ................................................................. ............................150
Configuring the JDBC driver................................................ ................................................................. .............151
Connection pool................................................ ................................................................. .............................156
Set up connection pool................................................ ................................................................. .............................156
Managing connection pools................................................ ................................................................. .............................156
Multiple pools........................................ ................................................................. .................................................157
Create multiple pools................................................ ................................................................. .............................157
Managing multiple pools................................................ ................................................................. .............................157
Data source................................................ ................................................................. .............................157
Create data source................................................ ................................................................. .............................158
Data source management................................................ ................................................................. .............................158
Chapter 15:................................................ ................................................................. .............................Managing JMS 159
Configuring JMS................................................ ................................................................. .............................159
Configuring the connection factory................................................ ................................................................. ............................160
Configuration template................................................ ................................................................. .............................160
Configuring the Destination Key...................................... .................................................161
Configuring the repository................................................ ................................................................. .............................161
Configuring the JMS server................................................ ................................................................. .............162
WebLogic Administration Guide
- 6 -
Configuring recipients........................................ ................................................................. .............................163
Configuring the session pool................................................ ................................................................. .............................163
Configuring the connection user........................................ ................................................................. .............164
Monitoring JMS................................................ ................................................................. .............................164
Recovering from
WEBLOGIC server failure: .................................. .................................................165
Restart or replace the WebLogic server........................................ ................................................................. ...165
Programming considerations................................................ ................................................................. .............................166
Chapter 16:................................................ ................................................................. ..................Manage JNDI 167
Loading objects into the JNDI tree........................................ ................................................................. ............167
Viewing the JNDI tree................................................ ................................................................. .............................167
Chapter 17:................................................ .....................Manage WEBLOGIC Server License 174
INSTALLING WEBLOGIC LICENSE........................................ ................................................................. ............174
Modify license........................................ ................................................................. ............................