Appendix A. Administration Console Reference

This Appendix is provided to supplement the online help provided with the WebLogic server distribution. Though the built-in documentation (accessible by clicking on the "?" icon next to each field) is complete, it is not always as informative as one might hope.

< Your Domain Name >

 

Configuration

   

General

     

Name

Name of the WebLogic server domain, which should be distinct from any NT or DNS domain names .

     

Console Enabled

     

Console Context Path

   

JTA

     

Timeout Seconds

How long a transaction will be allowed to run before the system assumes it has erred and forces a rollback.

     

Abandon Timeout Seconds

The number of seconds a transaction coordinator will attempt to complete a transaction.

     

Before Completion Iteration

How many beforeCompletion call backs will be processed before a rollback is forced.

     

Max Transactions

Limit on the number of transactions that may be simultaneously active on a system.

     

Max Unique Name Statistics

The number of named transactions that the system can handle simultaneously.

     

Forget Heuristics

If checked, the transaction manager will tell the resources it controls to forget any transaction with a heuristic outcome.

   

SNMP

     

Enabled

Check to tell the server to act as a Simple Network Management Protocol (SNMP) agent.

     

SNMP Port

The network port used for SNMP communication.

     

MIB Data Refresh Interval

How often the WebLogic SNMP agent needs to re-sample the system attributes that it monitors .

     

Server Status Check Interval

This number is multiplied by the MIB Data Refresh Interval. The resulting number is how often (in seconds) the SNMP agent will check to see whether Managed servers are active.

     

Community Prefix

The community name as sent by the SNMP manager to the SNMP agent.May be of the form prefix@server for information on an individual server or prefix@domain for information on the full domain.

     

Debug Level

0 to 3, with 0 generating no debug messages and 3 generating a flood.

     

Targeted Trap Destinations

1

   

Logging

     

File Name

File to which log information is written.

     

Rotation Type

One of: "None" (no log rotation), "By size" (logs are rotated when they reach a size threshold), or "By time" (logs are rotated at specified time intervals).

     

File Min Size

If rotation type is "By size," the log file will be rotated when it equals or exceeds the number of kilobytes specified in this field.

     

File Time Span

If rotation type is "By time," the log file will be rotated when the number of hours specified in this field have passed.

     

Number of Files Limited

If logs are being rotated, check this box to limit the number of old log files that will be stored.

     

File Count

If the Number of Files Limited box is checked, this is where the file count is specified.

   

Applications

     

Auto Deployed Enabled

Check to enable auto deployment of applications.

     

Auto Update Interval

If "Auto Deployed Enabled" is checked, this is the number of seconds in the application update interval.

 

Security

   

General

     

Audit Provider Class

Specify a Java class that will provide security audits in this field.

     

Guest Disabled

Enable or disable guest logins.

   

Filerealm

     

Caching Realm

Select the caching realm you are auditing from the drop-down list.

     

Max Users

count 10,000.

     

Max Groups

count 10,000.

     

Max ACLs

count 10,000.

   

Passwords

     

Minimum Password Length

Minimum number of characters in a password. May be more than 8; must not be less.

     

Lockout Enabled

Check if you want users to be locked out after a specified number of failed login attempts.

     

Lockout Threshold

If Lockout Enabled is checked, users will be locked out after they have failed to log in the number of times specified in this field.

     

Lockout Duration

The number of minutes a user lockout lasts.

     

Lockout Reset Duration

The number of minutes after which the lockout counter will be reset.

     

Lockout Cache Size

The number of bad login attempts that are cached.

   

Advanced

     

Connection Filter

Select your connection filter from the drop-down list.

     

Results Batch Size

The size of the batch results stored.

     

Log All Checks

All checks logged if checked.

Servers

 

Configuration

   

General

     

Name

The name of the server.

     

Machine

The machine on which the server is running.

     

Listen Port

The port which the server monitors for SSL messages.

     

Listen Address

The IP address that the server is to monitor.

     

External DNSName

On servers that are in clusters located between address translation firewalls and plug-ins to Web server front ends, this value should be set to the address the plug-in uses to communicate with the server.

   

Cluster

     

Cluster

The name of the cluster.

     

Replication Group

The name of the replication group of the cluster. A replication group is a list of clustered instances to be given preference when replicating clustered data.

     

Preferred Secondary Group

The group that the cluster will replicate to (and, by extension, fail over to) in the event that both the original server instance and all members of the replication group fail.

     

Cluster Weight

The percentage of the cluster's work to be performed by this machine.

     

Interface Address

The IP address for the interface with the cluster.

   

HTTP

     

Default Web Application

The name of the default Web application running on this server.

     

Default Server Name

The server name returned to the HTTP client. Note that this value may be distinct from the server name as understood by WebLogic. This variable is used to trick HTTP clients into thinking their requests are being handled by a single server when in fact they are being serviced by a pool.

     

WAP Enabled

Check this box if you do not want to include JVM information in the session ID.

     

Send Server Header Enabled

When not checked, the server will not send header information. Useful when interacting with wireless clients, where space is at a premium.

     

Post Timeout Secs

The number of seconds that the server will wait for data in an HTTP post area.

     

Max Post Time

Set an upper limit on the time of an HTTP post request.

     

Max Post Size

Set an upper limit (in bytes) on the size of an HTTP post request.

     

Duration

The amount of time an idle connection between an HTTP server and a WebLogic server will be maintained .

   

SSL

   

This screen is used to set the values used in Secure Socket Layer connections with a client browser. SSL connections, unlike regular HTTP connections, are encrypted. They have become the standard for the transmission of sensitive data (such as credit card information) across the Internet. The certificate referred to is a pair of numbers purchased from an independent certificate provider that the client can use to verify that you are who you say you are. One number, the public key, is transmitted to the client and used by the client to encrypt messages sent to the server. The second, the private key, is kept secret, as it is used by the server to decrypt messages encrypted with the public key.

     

Enabled

Whether or not the server can use SSL connections.

     

Listen Port

The IP port across which the SSL connection is made, typically 7002. Note that this must be distinct from the IP port used for non-SSL connections, typically 7001.

     

Server Key File Name

The location of the file containing the private key that the server uses to decrypt client transmissions made with the public key.

     

Server Certificate File Name

The location of the file containing the public key transmitted to the client.

     

Trusted CAFile Name

The path to the file containing the certificate of the certificate authority from whom you purchased your certificate.

     

Cert Authenticator

The Java class used to implement the CertAuthenticator interface.

   

Tuning

     

Socket Readers

Percentage of the Execute threads to be made available as socket readers. In general, the default value of 33 is fine, but if you are using native Java socket readers, this value may need to be adjusted. See Chapter 5 for details.

     

Login Timeout

The number of seconds the server will wait before timing out on a login screen.

     

Accept Backlog

Sets a limit on the number of backlog connections that the server will accept.

     

Reverse DNS Allowed

Whether or not the server will permit reverse DNS (IP to domain name) lookups.

     

Enable Native IO

Is native I/O allowed on the server?

     

Show only Workspace User Keys

Whether user keys will be displayed.

     

Enable Tunneling

Whether IP tunneling will be enabled on this server.

     

Tunneling Client Ping

The number of seconds the server will wait before pinging the client.

     

Tunneling Client Timeout

The number of seconds the server will wait before timing out a tunneling client.

     

J2EE12Only Mode Enabled

Click to limit the server to those features available in J2EE version 1.2.

     

J2EE13Warning Enabled

Click to display a warning to the effect that "This server is running J2EE version 1.3."

   

Protocols

     

Default Protocol

The default network protocol used by the server, typically T3.

     

Default Secure Protocol

The default secure network protocol used by the server, typically T3s.

     

T3 Max Message Size

Upper limit, in bytes, on the size of an individual T3 message. Note that when transmitting across the Internet at large, this value may be overruled by the MTU value of some server across which your packets are sent.

     

T3 Message Timeout

Upper limit (in seconds) on idle time for T3 connections.

     

HTTP Max Message Size

Maximum size, in bytes, of an HTTP message.

     

HTTP Message Timeout

Upper limit, in seconds, on the idle time for HTTP connections.

     

Enable IIOP

Whether this server will use the Internet Inter-ORB Protocol. IIOP is used with CORBA. The best advice I can give you here is that if you need to use this, you already know it.

     

IIOP Max Message Size

The obvious, in bytes.

     

IIOP Message Timeout

Also obvious, this time in seconds.

     

Default IIOPPassword

Password used in establishing IIOP connections.

     

Default IIOPUser

Default user for establishing IIOP connections.

   

Compilers

     

Java Compiler

The path to the Java compiler.

     

Prepend to Classpath

An optional string containing paths to Java class directories. If used, this string will be prepended to the classpath, effectively superseding any identically named classes that may occur after it in the path.

     

Append to Classpath

An optional string containing paths to Java class directories. If used, this string will be tacked onto the end of the Java CLASSPATH variable, effectively adding another set of classes to Java.

     

Extra rmic Options

This directive specifies remote method invocation options.

   

Remote Start

   

The values under this tab apply to servers that you want to start remotely using Node Manager. See the discussion on the Node Manager utility in Chapter 3 for further information on Remote Start. Also recall that only Managed servers can be started remotely.

     

BEA Home

The root directory for all BEA products on this server.

     

Root Directory

The root directory for WebLogic server, typically a subdirectory of BEA Home.

     

Class Path

Search path on the local machine used by Java to locate the classes used in starting WebLogic Server.

     

Arguments

Arguments passed to Java for use in starting the local server.

     

Security Policy File

Path to the security policy file in effect on the Managed server.

   

General

     

State

The state of the server. Ideally this is "running."

     

Activation Time

The date and time the server was started.

     

Monitor all Active Queues

Hyperlink to information about active queues.

     

Monitor all Connections

Hyperlink to information about connection

     

Monitor all Active Sockets

Hyperlink to information about sockets.

   

Performance

     

Idle Threads

The number of Execute threads currently idle.

     

Oldest Pending Request

The start time of the oldest request.

   

Security

     

Total Users Locked Out

This field shows the total number of users locked out of the server.

     

Invalid Logins Total

A count of all the failed login attempts made by all users.

     

Total Login Attempts while Locked

A count of all the login attempts made to locked user accounts.

     

Total Users Unlocked

A count of the previously locked user accounts that are now unlocked.

     

Locked Users

A count of the number of users whose login accounts are locked.

   

JMS

     

Connections

The number of JMS connections currently active on this server.

     

Connections High

The maximum number of simultaneous connections on this server.

     

Connections Total

A running count of the number of connections to this server.

     

Servers

The number of JMS servers currently active on this server.

     

Servers High

The maximum number of JMS servers simultaneously active.

     

Servers Total

A running count of the number of JMS servers since start.

   

JTA

     

Total Transactions

Running count of processed transactions.

     

Total Committed

Count of transactions that completed successfully.

     

Total Rolled Back

Count of transactions that were abortedan aggregate of Timeout, Resource, Application and System Rollbacks.

     

Timeout Rollbacks

Count of transactions that timed out before committing.

     

Resource Rollbacks

Count of transactions that were rolled out due to resource (e.g., table) unavailability.

     

Application Rollbacks

Count of transactions that were rolled back due to an error within the application.

     

System Rollbacks

Count of transactions rolled back due to a system error.

     

Transaction Abandoned Total Count

Count of transactions that were abandoned prior to committing.

     

Average Commit Time

The average time it took a transaction to occur.

   

Versions

     

WebLogic Version

Detailed information about the version, including build date and compilation number.

     

JDK Vendor

Vendor of the Java Development Kit.

     

JDK Version

Version number for the JDK in use by WebLogic.

     

Operating System

The OS of the machine Weblogic is running on.

     

OS Version

The version of the OS WebLogic is running on.

 

Logging

   

General

     

File Name

The path to the file in which log messages are written.

     

Log to Stdout

Check if you want error messages to go to the screen rather than to a log file.

     

Debug to Stdout

Check if you want debugging messages directed to the screen.

     

Stdout Severity Threshold

There are seven possible values: Info, Warning, Error, Notice, Critical, Alert, and Emergency. If you set the threshold too low ( Info or Warning would most likely qualify as "too low"), you can fill up your disk or filesystem with garbage. Too high, and you risk missing something important. A value of "Error" or "Notice" is probably correct for most environments.

   

Rotation

     

Rotation Type

Log files may be rotated based on the time they were in service or the file size.

     

File Min Size

If Rotation Type is set to "by Size," then the minimum size for rotating the log is set here.

     

File Time Span

If Rotation Type is set to "by Time," this is the length of time (in hours) that any given file will be used before rotation.

     

Number of Files Limited

If you wish to place a limit on the number of log files in use, check this box.

     

File Count

If you checked "Number of Files Limited," this is where you set the limit.

   

Domain

     

Log to Domain Logfile

Check to send log messages to the Domain log file.

   

HTTP

     

Enable Logging

Check this box if you want to perform HTTP logging. This box must be checked in order for the rest of this screen to have any meaning.

     

Logfile Name

Path to the log file. This may be either absolute or relative to the WebLogic home directory.

     

Format

Common or extended.

     

Log Buffer Size

Size, in kilobytes, of the buffer that needs to be filled before writing to the log file.

     

Max Log File Size KBytes

Use to set an upper limit on the size of the log file. A value of 0 means unlimited.

     

Rotation Type

Log files must be rotated periodically to keep from filling up their host filesystem. Rotation may be by file size or date.

     

Rotation Period Flush Every

How many minutes between log rotations . How long to wait between buffer flushes.

     

Rotation Time

Use this to set a time of day at which the log will be rotated.

   

JDBC

     

Enable JDBC Logging

Check to enable logging.

     

JDBC Logfile

Name the file in which database log messages are stored.

   

JTA

     

Transaction Log File Prefix

The location in the directory tree where the JTA log file is stored.

   

Debugging

     

Log Remote Exceptions

Check if you want your Administration servers to record the exceptions of Managed servers in the local log.

     

Instrument Stack Trace

Check to include a stack trace with the exception messages.

 

Deployments

   

EJB

     

Choose EJBs for This Server

Assign the available EJBs to servers on this screen.

   

Web Applications

     

Web App Component

Assign Web applications on this screen.

   

JCA

     

Connector Component

Activate connector components on this screen.

   

Startup and Shutdown

     

Startup Class

Assign classes that will be invoked at startup time.

     

Shutdown Class

Assign classes that will be invoked at shutdown time.

 

Services

   

JDBC

     

JDBC Connection Pools

Activate JDBC connection pools.

   

JMS

     

Enable Default JMS Connection Factories

Click to enable.

     

JMS Thread Pool Size

The size of JMS thread pools.

   

XML

     

XMLRegistry

Select an XML registry as defined under the Services XML tab.

     

Cache Memory Size

RAM used for XML caching, in kilobytes.

     

Cache Disk Size

Disk space used for caching, in megabytes.

     

Cache Timeout Interval

Timeout interval, in seconds.

   

WLEC

     

WLECConnection Pool

Activate WebLogic Enterprise Connectivity connection pools. These are connection pools to Tuxedo CORBA objects.

   

Jolt

     

Jolt Connection Pools

Activate Jolt connection pools. Jolt is a tool for interacting with BEA Tuxedo.

   

File T3

     

File T3

File T3 is a mechanism for interacting with the native operating system files.

   

Virtual Hosts

     

Virtual Hosts

In the context of WebLogic, "virtual host" is a pseudonym applied to an application. Virtual hosts are created under the Services tab but invoked here.



BEA WebLogic Server Administration Kit
BEA WebLogic Server Administration Kit (Prentice Hall PTR Advanced Web Development)
ISBN: 0130463868
EAN: 2147483647
Year: 2002
Pages: 134
Authors: Scott Hawkins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net