Java™ Composite Application Platform Suite Deployment Guide: Sun Seebeyond
Java™ Composite Application Platform Suite Deployment Guide: Sun Seebeyond
Java™ Composite Application Platform Suite Deployment Guide: Sun Seebeyond
Copyright 2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Sun
Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents
listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in
other countries. U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc.
standard license agreement and applicable provisions of the FAR and its supplements. Use is subject to license terms. This
distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo, Java, Sun Java Composite
Application Platform Suite, SeeBeyond, eGate, eInsight, eVision, eTL, eXchange, eView, eIndex, eBAM, eWay, and JMS are
trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used
under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries.
Products bearing SPARC trademarks are based upon architecture developed by Sun Microsystems, Inc. UNIX is a registered
trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. This product is covered and
controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile,
chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited.
Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but
not limited to, the denied persons and specially designated nationals lists is strictly prohibited.
Copyright 2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, Etats-Unis. Tous droits rservs.
Sun Microsystems, Inc. dtient les droits de proprit intellectuels relatifs la technologie incorpore dans le produit qui est
dcrit dans ce document. En particulier, et ce sans limitation, ces droits de proprit intellectuels peuvent inclure un ou plus
des brevets amricains lists l'adresse http://www.sun.com/patents et un ou les brevets supplmentaires ou les
applications de brevet en attente aux Etats - Unis et dans les autres pays. L'utilisation est soumise aux termes de la Licence.
Cette distribution peut comprendre des composants dvelopps par des tierces parties. Sun, Sun Microsystems, le logo Sun,
Java, Sun Java Composite Application Platform Suite, Sun, SeeBeyond, eGate, eInsight, eVision, eTL, eXchange, eView, eIndex,
eBAM et eWay sont des marques de fabrique ou des marques dposes de Sun Microsystems, Inc. aux Etats-Unis et dans
d'autres pays. Toutes les marques SPARC sont utilises sous licence et sont des marques de fabrique ou des marques dposes
de SPARC International, Inc. aux Etats-Unis et dans d'autres pays. Les produits portant les marques SPARC sont bass sur une
architecture dveloppe par Sun Microsystems, Inc. UNIX est une marque dpose aux Etats-Unis et dans d'autres pays et
licencie exclusivement par X/Open Company, Ltd. Ce produit est couvert la lgislation amricaine en matire de contrle
des exportations et peut tre soumis la rglementation en vigueur dans d'autres pays dans le domaine des exportations et
importations. Les utilisations, ou utilisateurs finaux, pour des armes nuclaires, des missiles, des armes biologiques et
chimiques ou du nuclaire maritime, directement ou indirectement, sont strictement interdites. Les exportations ou
rexportations vers les pays sous embargo amricain, ou vers des entits figurant sur les listes d'exclusion d'exportation
amricaines, y compris, mais de manire non exhaustive, la liste de personnes qui font objet d'un ordre de ne pas participer,
d'une faon directe ou indirecte, aux exportations des produits ou des services qui sont rgis par la lgislation amricaine en
matire de contrle des exportations et la liste de ressortissants spcifiquement dsigns, sont rigoureusement interdites.
Part Number: 819-7563-10
Version 20061003173213
Contents
Contents
List of Figures
List of Tables
Chapter 1
Introduction
10
10
10
10
11
11
11
12
Related Documents
12
12
Documentation Feedback
13
Chapter 2
15
Integration Model
User Interfaces
Enterprise Designer
Enterprise Manager
System Architecture
15
15
15
15
15
16
16
17
18
18
Contents
18
18
Chapter 3
20
Introduction
20
Requirements Analysis
22
System-Specific Needs
Operation and Performance Needs
Personnel and Training Needs
Business Planning Needs
22
23
24
24
Deployment Planning
25
26
27
27
27
27
27
28
28
29
29
30
Chapter 4
32
Introduction
32
Service-Oriented Architecture
33
Overview
Architecture Layers
Existing Systems
Elemental Business Services
Composed Business Services
Composite Applications
Core Technologies
33
34
35
35
36
36
37
System Design
37
37
38
38
System Development
38
Creating Users
Naming Conventions
Prefixes
Suffixes
38
39
39
41
Contents
41
41
41
42
43
43
44
44
45
45
46
46
47
47
48
48
48
49
49
49
49
49
50
Chapter 5
51
Introduction
51
Pre-Transition Testing
53
Testing Methodology
Test Plan
Type of Data To Use
Testing the Output
Responsibility for Testing
Unit Testing
Integration Testing
Partial Integration Testing
Complete System Testing
Performance Testing
Acceptance Testing
Troubleshooting
Enterprise Manager
Log Files
Alert Agent
SNMP Agent
53
53
54
54
54
54
55
55
55
55
56
56
56
57
57
57
Transition to Production
57
Post-Transition Maintenance
58
58
58
Contents
Log Files
Repository Backup
Implementing Changes
58
59
59
Summary
59
Chapter 6
60
60
Initial Considerations
60
Estimating Requirements
61
Factors
Guidelines
General Considerations
Minimum System Requirements
61
62
62
63
Chapter 7
66
67
71
Chapter 8
75
75
76
Overview
Requirements
Creating the Cluster Group
Creating a Physical Disk Resource
Creating an IP Address Resource
Creating a Network Name Resource
Installing the Repository as a Windows Service
Duplicating the Registry Keys
Creating a Generic Service Resource
Using the Repository in a Windows Clustering Environment
76
76
77
77
79
80
81
81
82
83
84
84
84
84
Contents
85
85
86
87
87
87
87
88
88
Chapter 9
90
90
Configuring Failover
90
Index
92
List of Figures
List of Figures
Figure 1
Java CAPS
14
Figure 2
16
Figure 3
17
Figure 4
Deployment Phases
21
Figure 5
25
Figure 6
33
Figure 7
34
Figure 8
Architecture Layers
35
Figure 9
Naming Subprojects
40
Figure 10
43
Figure 11
45
Figure 12
46
Figure 13
52
Figure 14
53
Figure 15
67
Figure 16
68
Figure 17
69
Figure 18
72
Figure 19
73
Figure 20
75
Figure 21
78
Figure 22
78
Figure 23
79
Figure 24
80
Figure 25
81
Figure 26
82
Figure 27
83
List of Tables
List of Tables
Table 1
Text Conventions
11
Table 2
28
Table 3
29
Table 4
30
Table 5
30
Table 6
Core Technologies
37
Table 7
39
Table 8
40
Table 9
Testing Types
53
Table 10
General Considerations
63
Table 11
63
Table 12
63
Table 13
64
Table 14
64
Table 15
64
Table 16
64
Table 17
68
Table 18
72
Chapter 1
Introduction
This chapter provides an overview of this Sun Java Composite Application Platform
Suite document.
Whats in This Chapter
Whats New in This Release on page 10
About This Document on page 10
Related Documents on page 12
Sun Microsystems, Inc. Web Site on page 12
Documentation Feedback on page 12
1.1
configuration to the General tab of the Business Process Properties dialog box.
This change provides added flexibility. If a Project has multiple Business Processes,
then you can configure each Business Process to have a different number of
maximum concurrent instances.
1.2
1.2.1
scope, its organization, and writing conventions. It also provides sources of related
documentation and information.
Chapter 2 Overview of the Sun Java Composite Application Platform Suite
10
Chapter 1
Introduction
Section 1.2
About This Document
describes how to configure failover support for the Repository and the Logical Host
using Sun Cluster 3.1.
Chapter 8 Configuring Failover Support in a Windows Clustering
Environment describes how to configure failover support for the Repository and
the Logical Host using Windows Server 2003 clustering technologies.
Chapter 9 eInsight Load Balancing and Failover describes how to configure Sun
SeeBeyond eInsight Business Process Manager for load balancing and failover.
1.2.2
Scope
This guide provides deployment planning guidelines and deployment strategies for
Java CAPS.
1.2.3
Intended Audience
This guide is designed for management, system administrators, and others who are
tasked with deployment of Java CAPS.
1.2.4
Text Conventions
The following conventions are observed throughout this document.
Table 1 Text Conventions
Text Convention
Used For
Examples
Bold
Click OK.
On the File menu, click Exit.
Select the eGate.sar file.
Monospaced
bold italic
Blue bold
11
Chapter 1
Introduction
Section 1.3
Related Documents
1.2.5
Used For
Examples
http://www.sun.com
Screenshots
Depending on what products you have installed, and how they are configured, the
screenshots in this document may differ from what you see on your system.
1.3
Related Documents
For more information about Java CAPS, see the following documents:
Java Composite Application Platform Suite Installation Guide
Java Composite Application Platform Suite Primer
Sun SeeBeyond eBAM Studio Users Guide
Sun SeeBeyond eGate Integrator JMS Reference Guide
Sun SeeBeyond eGate Integrator System Administration Guide
Sun SeeBeyond eGate Integrator Users Guide
Sun SeeBeyond eGate Tutorial
Sun SeeBeyond eIndex Single Patient Identifier Users Guide
Sun SeeBeyond eInsight Business Process Manager Users Guide
Sun SeeBeyond eTL Integrator Users Guide
Sun SeeBeyond eView Studio Users Guide
Sun SeeBeyond eVision Studio Users Guide
Sun SeeBeyond eXchange Integrator Users Guide
1.4
12
Chapter 1
Introduction
1.5
Section 1.5
Documentation Feedback
Documentation Feedback
We appreciate your feedback. Please send any comments or suggestions regarding this
document to:
[email protected]
13
Chapter 2
14
Chapter 2
Overview of the Sun Java Composite Application Platform Suite
Section 2.1
Sun SeeBeyond eGate Integrator
2.1
2.1.1
Integration Model
eGate Integrator addresses application integration by means of a Project, which
contains the business logic required to solve the specific problem. The Project contains
the various logical components and supporting information required to perform the
routing, processing, and caching of messages containing the relevant data from one
application to another. Project information is stored in the Repository.
2.1.2
User Interfaces
The main user interfaces are Enterprise Designer and Enterprise Manager.
Enterprise Designer
Enterprise Designer is used to create and configure the logical components and
physical resources of a Project. Through this interface, you can develop Projects to
process and route data through an eGate Integrator system. Enterprise Designer is also
used by other components of Java CAPS.
Enterprise Manager
Enterprise Manager is a web-based application that is used to deploy and monitor
runtime components.
2.1.3
System Architecture
eGate Integrator employs a versatile architecture that is ideally suited to distributed
computing environments. As a result, the various components of an eGate Integrator
system can reside on the same hardware platform (assuming adequate system
resources), or be distributed across several different hardware platforms in the
enterprise network.
15
Chapter 2
Overview of the Sun Java Composite Application Platform Suite
2.2
Section 2.2
Sun SeeBeyond eInsight Business Process Manager
process is deployed.
The runtime phase refers to the tasks that you perform after the business process is
deployed.
Figure 2 shows an example of a business process model created with eInsight Business
Process Manager.
Figure 2 Business Process Model Example
2.3
users to participate in business processes. The users perform workflow tasks with
eVision Studio web pages that are tailored for specific organizational roles.
eVision Studio can provide the login pages in which users enter their user name and
16
Chapter 2
Overview of the Sun Java Composite Application Platform Suite
Section 2.4
Sun SeeBeyond eTL Integrator
Figure 3 shows an example of a Page Layout created with eVision Studio. The runtime
data is retrieved dynamically from back-end systems.
Figure 3 Page Layout Example
eVision Studio enables you to create a JSR 168-compliant portlet for use in JSR 168compliant portals, such as Sun Java System Portal Server. The Portal Server provides
a new level of enterprise productivity, enabling users and groups to work together
easily and securely within the requirements of a dynamic organizational structure.
2.4
17
Chapter 2
Overview of the Sun Java Composite Application Platform Suite
2.5
Section 2.5
Sun SeeBeyond eXchange Integrator
2.6
2.7
2.8
18
Chapter 2
Overview of the Sun Java Composite Application Platform Suite
Section 2.8
Sun SeeBeyond eBAM Studio
Notifications are triggered according to preset threshold limits set by the designer.
eBAM Studio generates alerts when KPIs fall below or exceed a specified threshold.
The alerts can be used to send email messages and to launch other processes.
19
Chapter 3
3.1
Introduction
Deploying Java CAPS consists of the following phases:
1 Requirements analysis
2 Deployment planning
3 System design and development
4 Pre-transition testing
5 Transition to production
6 Post-transition maintenance
Note: In a typical deployment, some of the phases overlap with each other. For example,
unit and integration testing is usually performed during the system design and
development phase.
Figure 4 shows a diagram of these phases.
20
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.1
Introduction
Phase 2:
Deployment Planning
Phase 3:
System Design and Development
Phase 4:
Pre-Transition Testing
Phase 5:
Transition to Production
Phase 6:
Post-Transition Maintenance
Java CAPS. First, to use a road map, you have to know where you are (analysis) and
where you are going (planning). In other words, find out everything you can about
your information system setup and business processes. Then, you can decide what
information systems and business process needs you want Java CAPS to meet.
Deployment planning: Deployment begins when you plan and schedule how, in
view of your analysis and allocated resources, you want to implement your Java
CAPS environment. During this phase, you set up the operation procedure and
schedule for the entire deployment project.
The first two phases lay a foundation for the entire deployment project. Poor analysis
and planning can cause major problems during the later phases. Thorough,
comprehensive analysis and planning can make the deployment project easier, more
efficient, and less costly.
21
Chapter 3
Requirements Analysis and Deployment Planning
3.2
Section 3.2
Requirements Analysis
Requirements Analysis
In gathering and analyzing information on your Java CAPS needs, you must first know
what type of information you need. Java CAPS links your current networks, business
systems, and applications together into a single, seamless information system. The
purpose of this system is to facilitate your current and future business process needs. In
as much detail as possible, find out where you are and what you need.
During the requirements analysis phase, you examine your needs and define the
properties that the system must possess to meet those needs. Also, you identify system
constraints and performance requirements. Define what functions you want the
deployed system to perform, but not how the functions work (this task occurs during
the system design and development phase).
This section describes the information that you need to gather to facilitate your
deployment, by posing a series of relevant questions. The questions are divided into the
following categories:
System-specific
Operation and performance
Personnel and training
Business planning
The examples in this section are general and are only meant to start you thinking in the
right direction. You must begin by assembling general information on your needs,
categorizing the information, and adding the necessary details.
3.2.1
System-Specific Needs
These needs are the basic information systems, network, and database-related
requirements that you want the Java CAPS system to meet. Determine your systemspecific needs by asking the following questions:
What existing systems do we need to connect?
Create a complete picture of your current information system setup. Include
applications, networks, systems, platforms, and outside information pathways.
How do we want to do the connecting?
Find out how you want your various systems to talk to each other (communication
protocols), which systems must be linked, and the direction of communication.
Example: We have systems A, B, C, and D. Systems A, B, and C need to communicate
with all of the other systems. System D needs to communicate only with system A. All
of the communication is two way.
22
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.2
Requirements Analysis
23
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.2
Requirements Analysis
Example: All data passing through our system must be validated as thoroughly as
possible. To facilitate this process, we compiled a complete list of all different data types
that require validation.
3.2.3
3.2.4
24
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.3
Deployment Planning
Business
Planning
SystemSpecific Concerns
Operation and
Performance
Personnel and
Training
As you continue the analysis process, allow the results to feed back into your overall
analysis. If necessary, repeat the process to fine-tune the information that you have
gathered. This approach helps to ensure the accuracy and usability of the requirements
that you collect.
Once we have the information, what do we do with it?
Complete the process of documenting and organizing your information as correctly
and comprehensively as possible. When you finish the requirements analysis phase,
you use this information to help you with the next phase: deployment planning. Much
of the information will be added to the planning documents.
3.3
Deployment Planning
The deployment planning phase is the second phase in your deployment project. In this
phase, you create a road map of what the deployment will look like. You include such
criteria as resources, schedules, goals, and objectives. The main purpose of this phase is
25
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.3
Deployment Planning
to initiate the project, define the integrated system to be developed, create top-level
design documents, and create a formal project plan or road map.
In creating your road map, you provide a detailed description of the integrated system
to be developed. This plan serves the following purposes:
Designing what your future system looks like
Showing you the resource allocation needed to implement the design
Planning enables you to find out where you want to go and how to get there. When
necessary, you can obtain help from Sun Services and other Sun representatives.
Thorough, comprehensive planning helps to ensure a successful deployment project.
The major steps in deployment planning are:
Determining overall objectives
Initiation steps
Creating the planning documents
3.3.1
information, and match this information against the scope of the project as
stated in the Approved Proposal.
If necessary, resolve any differences between the Approved Proposal scope and
26
Chapter 3
Requirements Analysis and Deployment Planning
3.3.2
Section 3.3
Deployment Planning
Initiation Steps
The deployment project begins in earnest with the following tasks.
checklist is updated to identify what items were completed and to document any
outstanding issues that prevented items from being completed.
The hardware, software, and network requirements (current and planned) are
that communications are set up correctly and systems are exchanging messages
correctly according to the communication protocol being invoked.
Any communication with other businesses or trading partners are tested in the
same way.
For detailed installation instructions, see the Java Composite Application Platform Suite
Installation Guide.
27
Chapter 3
Requirements Analysis and Deployment Planning
3.3.3
Section 3.3
Deployment Planning
Description
Scope of work
Project organization
Delivery schedule
Estimates
Overall schedule
Resource requirements
Organizational interfaces
28
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.3
Deployment Planning
Description
Statement of requirements
Proposed architecture
Proposed directory
structure and messages
that trigger processing
Exception processing
Constraints
Interface diagrams
Hardware/software
diagrams
The general design model provided by this document forms the basis of the system
design and development phase.
29
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.3
Deployment Planning
Description
Hardware/software model
Additional requirements
Description
Test plan
Test phases
Test approach
Organization
Schedule
Defines the system availability for test data and system resources
needed for the different test phases.
Resource requirements
Defines system, individual, and team resources needed for the test
phases.
Going Forward
When the members of your management and deployment project team agree that these
objectives have been met, you have finished the deployment planning phase. You have
created a complete deployment road map (the deployment project plan), as well as
some general designs for your completed system.
The next chapters in this guide describe the following topics:
System Design and Development: For a discussion of the next deployment phase,
30
Chapter 3
Requirements Analysis and Deployment Planning
Section 3.3
Deployment Planning
31
Chapter 4
4.1
Introduction
When the requirements analysis and deployment planning phases have been
completed, your next major step is the system design and development phase. During
this phase, you work on the essential system architecture that implements your
business plans and processes.
This phase requires a series of successive refinements applied to your initial summary
plan (the functional requirements specification). Your design starts with the broadest
view of the system and then proceeds to the details. This top-down approach results in
the most effective application of the technology to the integration of your existing
systems and applications.
The system design and development phase includes the following steps:
Planning general hardware configuration
System design methodology
Software development
System optimization
32
Chapter 4
System Design and Development
Section 4.2
Service-Oriented Architecture
Figure 6 shows where the system design and development phase fits into the overall
Java CAPS deployment.
Figure 6 System Design and Development Phase
Phase 1:
Requirements Analysis
Phase 2:
Deployment Planning
Phase 3:
System Design and Development
Phase 4:
Pre-Transition Testing
Phase 5:
Transition to Production
Phase 6:
Post-Transition Maintenance
4.2
Service-Oriented Architecture
Java CAPS enables you to develop composite applications on top of a service-oriented
architecture.
4.2.1
Overview
In a service-oriented architecture, a group of software components offers functionality
to other components. A service consumer makes a request, and a service provider sends
a response. Some services are high level (for example, verify the insurance eligibility of
a patient). Other services are more technical (for example, transform a message from an
external format to an internal format).
33
Chapter 4
System Design and Development
Section 4.2
Service-Oriented Architecture
The service provider publishes an interface that service consumers interact with. The
implementation details are hidden from the consumers.
In Java CAPS, you can create various types of services, including:
Java Collaborations
Business Processes
Page Flows
eTL Collaborations
These services are created independently in Enterprise Designer and stored in the
Repository. You then use a Connectivity Map to link the services and other component
types (such as topics and external applications) together.
Figure 7 shows a simple Connectivity Map that contains two services, both of which are
Java Collaborations.
Figure 7 Connectivity Map with Two Services
Architecture Layers
Figure 8 shows the four layers of the service-oriented architecture in Java CAPS.
34
Chapter 4
System Design and Development
Section 4.2
Service-Oriented Architecture
John Smith
Date of Birth:
1/1/1970
Insurance Plan:
Composite Applications
PPO
Composed
Business Services
Java
Java
XSLT
XSLT
Java
Elemental
Business Services
IB M
Existing Systems
The following subsections describe each layer, starting with the lowest layer and
moving upward.
Existing Systems
The Existing Systems layer consists of back-end programs, such as databases, packaged
applications, external trading partners, and legacy systems.
The back-end programs might use technologies that are incompatible with each other.
For example, information about a customer might be located in an Oracle database
(used by one company division) and in an IBM DB2 database (used by another
company division).
eGate Integrator enables you to define these services, which can be based on Java or
XSL Transformations (XSLT). Object Type Definitions (OTDs) define the various
formats of messages that the services process.
35
Chapter 4
System Design and Development
Section 4.2
Service-Oriented Architecture
eTL Integrator enables you to extract, transform, and load bulk data between files and
databases.
eView Studio provides methods that you can use in Java Collaborations to specify how
data is processed into the master index database.
eWay Adapters enable the services to interact with the different technologies in the
Existing Systems layer. Thus, the adapters shield the incompatibilities between backend programs from this layer.
Composite Applications
The Composite Applications layer contains applications that are based on the services
in the lower layers.
The information that appears in the user interface might be combined from multiple
back-end systems. Without the composite application, the user would need to obtain
the desired information by accessing each system independently.
eVision Studio enables you to create web-based user interfaces for composite
applications.
eBAM Studio enables you to create dashboards that illustrate Key Performance
Indicators (KPIs). These dashboards can help users to visualize the current state of the
enterprise.
36
Chapter 4
System Design and Development
Section 4.3
System Design
eIndex Single Patient View enables you to create a single view of person information
across an enterprise.
4.2.3
Core Technologies
Table 6 describes various technologies that Java CAPS uses to implement a serviceoriented architecture.
Table 6 Core Technologies
Standard
Description
4.3
System Design
The three basic steps in designing a Java CAPS deployment are:
Identify all of the external systems to be connected
Define the configuration of Java CAPS components
Define the configuration of hardware and network connections
4.3.1
37
Chapter 4
System Design and Development
4.3.2
Section 4.4
System Development
4.3.3
4.4
System Development
This section describes a variety of system development topics, including user
management, naming conventions, and project teams with multiple developers.
4.4.1
Creating Users
Java CAPS users are divided into the following categories:
Repository
Logical Host
Enterprise Manager
Repository users can use Enterprise Designer to create the necessary Project and
Environment components for a Java CAPS solution.
Java CAPS has one predefined Repository user: Administrator. The Administrator user
has unlimited power to create other users. Each user has one or more roles, which
specify the tasks that the user can perform. Every user has the predefined all role. The
predefined administration role enables the user to perform uploads in the Java CAPS
Installer and to create Repository branches.
38
Chapter 4
System Design and Development
Section 4.4
System Development
When creating a user, the Administrator user should not give the user a more powerful
role than necessary.
If your organization stores information about the project team members in an LDAP
server, you can integrate with the LDAP server. The following LDAP servers are
supported: Sun Java System Directory Server, Microsofts Active Directory, and
OpenLDAP.
Logical Host users can access Java CAPS applications that are running in a Logical
Host.
Enterprise Manager users can monitor running Java CAPS applications.
For detailed information about managing users of the Repository, Logical Host, and
Enterprise Manager, see the Sun SeeBeyond eGate Integrator System Administration Guide.
4.4.2
Naming Conventions
Create a set of naming conventions early in the system design and development phase.
Naming conventions help to ensure readability and maintainability. Consider using the
prefixes and suffixes described in this section. Additional standards might include:
Start the main portion of a Service name with a verb
Include the data format or external system in an Object Type Definition name.
Prefixes
Add a prefix to each component name to identify the component type. For example,
you could use the prefix prj as an identifier for Projects.
Table 7 contains suggested prefixes for Project components.
Table 7 Suggested Prefixes for Project Components
Component
Prefix
Examples
Project
prj
prjFileTransfer
prjWebOrder
Business Process
bp
bpProvideQuote
bpOrderToInvoice
Collaboration Definition
(Java)
jcd
jcdOrderIn
jcdCheckInventory
jcdOrderOut
Collaboration Definition
(XSLT)
xcd
xcdOrderIn
xcdCheckInventory
xcdOrderOut
Connectivity Map
cm
cmProvideQuote
cmWebOrder
Deployment Profile
dp
dpWebOrderDev
dpWebOrderTest
dpWebOrderProd
39
Chapter 4
System Design and Development
Section 4.4
System Development
Prefix
Examples
External Application
ea
eaFileIn
eaFileOut
otd
otdEmployeeInfo
otdOraOrders
Page Flow
pf
pfVacationRequest
Page Layout
pg
pgCredit
Page Link
pl
plMortgage
Queue
que
queOraOrders
Scheduler
sch
schNightRun
Service
svc
svcTransfer
svcReadFromFile
svcWriteToFile
Topic
tpc
tpcRequest
wsd
wsdStockQuote
xsd
xsdWarehouseOrder
If you create subprojects as an organizational aid (for example, as the container for a
large number of Collaboration Definitions or Object Type Definitions), then you can
omit the prj prefix.
Figure 9 Naming Subprojects
subprojects
Prefix
Examples
Environment
env
envWebOrderDev
envWebOrderTest
envWebOrderProd
Logical Host
lh
lhWebOrderDev
lhWebOrderTest
lhWebOrderProd
40
Chapter 4
System Design and Development
Section 4.4
System Development
Prefix
Examples
is
isWebOrderDev
isWebOrderTest
isWebOrderProd
ms
msClaimData
External System
es
esOraIn
esOraOut
Suffixes
You might want to add a suffix to components that have development, test, and
production versions. In Table 7, the examples for the Deployment Profile use this
convention. In Table 8, the examples for the Environment, Logical Host, and Integration
Server use this convention.
You can also use suffixes to indicate whether External Applications and External
Systems are inbound or outbound.
4.4.3
When using the first approach, the developers must consider the order in which
components are created. For example, assume that a Collaboration Definition called
jcdCheckInventory is used by two subprojects. The developers might want to work on
this Collaboration Definition before working on Collaboration Definitions that are not
used by multiple subprojects.
41
Chapter 4
System Design and Development
Section 4.4
System Development
Important: More than one person concurrently using the same user name will circumvent the
version control system, and one persons work can be overwritten by another.
Ensure that all personnel using Enterprise Designer use unique names.
ACLs become more important as the size of a Project grows, or when you divide the
work as described in Subprojects and Multiple Projects. They enable you to control
which users have read only or read/write access to a component, and thus reduce the
possibility of deliberate or accidental changes.
Ensure that the development team fully understands how the version control system
and ACLs work. The Sun SeeBeyond eGate Integrator Users Guide describes how to use
the version control system. The Sun SeeBeyond eGate Integrator System Administration
Guide describes how to create and modify ACLs.
Logical Hosts
Ideally, each developer installs and uses a Logical Host on the same computer as
Enterprise Designer. Thus, developers can run the Logical Host without interfering
with the work of other developers.
If a development computer does not have enough resources to run a Logical Host, you
can try other approaches.
Note: Typically, the amount of system resources used by a developers Logical Host is less
than the amount of system resources used by a Logical Host in the test and
production environments. Chapter 6 Determining System Requirements
lists the minimum system requirements for the Logical Host on various operating
systems.
One approach is to share Logical Hosts. For example, assume that there are two
Projects, each of which has two developers. Rather than creating four Logical Hosts
(one for each developer), the teams could create two Logical Hosts:
Logical Host 1 is shared by developer 1 from the first Project and developer 1 from
42
Chapter 4
System Design and Development
Section 4.4
System Development
Project 1
Project 2
Dev 1
Dev 1
Dev 2
Logical Host 1
4.4.4
Dev 2
Logical Host 2
Error Handling
In the requirements analysis and deployment planning phases, you define the
requirements for processing errors and exceptions.
In the system design and development phase, you use various Java CAPS features to
implement these requirements. For example:
When creating a business process in eInsight, you can configure the process to catch
all exceptions or certain exceptions that you specify. In addition, eInsight provides a
Compensation Handler element, which enables you to add sophisticated rollback
logic to Straight Through Processing (STP), fast processes, and long-running
transactions.
eVision enables you to return preconfigured web pages if a requested page cannot
43
Chapter 4
System Design and Development
Section 4.4
System Development
Multiple Environments
Create separate Environments for the development, test, and production phases.
Each Environment should have a corresponding Deployment Profile:
The development Deployment Profile maps Project components to the
development Environment.
The test Deployment Profile maps Project components to the test Environment.
The production Deployment Profile maps Project components to the production
Environment.
4.4.7
44
Chapter 4
System Design and Development
4.4.8
Section 4.4
System Development
If you plan to run more than one Logical Host domain at the same time, be sure to
configure the port numbers so that they do not conflict with each other. For example, do
not set the administration port number for both domains to 18000.
4.4.9
45
Chapter 4
System Design and Development
Section 4.5
Optimizing Your System
Repository
Dev
Enterprise
Manager Server
(Development)
Enterprise
Manager Server
(Production)
Logical Host
(Development)
Logical Host
(Production)
Sys
Admin
Because the Repository is not needed during the production phase, Figure 12 shows
only one Repository installation.
4.5
4.5.1
46
Chapter 4
System Design and Development
Section 4.5
Optimizing Your System
might use all of the ephemeral ports. Try decreasing the value, so that TCP can release
closed connections more quickly.
Note: You can add the MaxUserPort registry parameter to increase the number of
ephemeral ports.
4.5.2
47
Chapter 4
System Design and Development
Section 4.5
Optimizing Your System
the engine receives another request, then the new request is placed into a waiting
state. This parameter defines how long the request can be in the waiting state. After
this duration, a timeout occurs and the incoming request thread is returned.
If a Business Process is defined with correlation, it is possible that the instance to be
correlated for the incoming request has not been created. In this situation, the
incoming request is placed into a waiting state for the Receive Timeout period.
When the correlating instance is available, this request is picked up. If a timeout
occurs before the correlating instance is available, then the incoming request thread
is returned.
If a Project has multiple Receive Activities and the request for the second Receive
Activity arrives before the request for the first Receive Activity, then the request for
the second Receive Activity is placed into a waiting state for the Receive Timeout
period. The request is notified as soon as the Business Process instance is created for
the first Receive Activity.
If the eInsight Engine has not completely started and an incoming request arrives,
then the request is placed into a waiting state for the Receive Timeout period.
The default value is 15 seconds. The suggested range is from 1 second to as needed. Be
sure to enter the value in milliseconds, rather than seconds.
48
Chapter 4
System Design and Development
Section 4.5
Optimizing Your System
The processing needs of the partner might require you to enter a value that is lower
than the highest suggested value. Alternately, the partner could increase its pool size
limit.
49
Chapter 4
System Design and Development
4.5.3
Section 4.5
Optimizing Your System
50
Chapter 5
5.1
Introduction
The final three phases of deploying Java CAPS are:
Pre-transition testing: The system must be fully tested before it is transitioned to a
production environment. This phase includes unit testing, integration testing, and
acceptance testing.
Transition to production: After the system is fully tested, it must be migrated to the
production environment. This chapter covers the procedures and considerations for
performing the transition to production.
Post-transition maintenance: Once the system has been migrated to the production
51
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.1
Introduction
Figure 13 shows where these phases fit into the overall Java CAPS deployment.
Figure 13 Testing, Transition to Production, and Maintenance Phases
Phase 1:
Requirements Analysis
Phase 2:
Deployment Planning
Phase 3:
System Design and Development
Phase 4:
Pre-Transition Testing
Phase 5:
Transition to Production
Phase 6:
Post-Transition Maintenance
52
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.2
Pre-Transition Testing
Development
Performance
Monitoring
Testing
Go-Live!
Pre-Transition Testing
5.2
Description
Unit testing
Integration testing
Acceptance testing
For the most part, unit and integration testing are done in the development phase,
while acceptance testing is done as a final check before putting the system into
production.
5.2.1
Testing Methodology
While how a system is tested varies, depending on the particulars of the specific
system, certain methodologies apply to all system testing.
In general, you test the individual parts of the system before testing the entire system.
Similarly, you test individual components in isolation before testing them in a broader
context.
5.2.2
Test Plan
Planning for system testing begins with a careful examination of the requirements of
the system. An initial test plan is created in the deployment planning phase. The test
53
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.2
Pre-Transition Testing
plan specifies how the system is tested and what requirements the system must meet
before it is put into production.
The initial test plan can be enhanced during the system design and development phase.
The functional and technical requirements specifications outline the procedures used to
conduct the tests, both at a component level and at an integrated system level. These
specifications include:
Type of data to use
Expected output
Who is responsible for the test
Unit Testing
Unit testing checks the individual parts of a larger system for correct functioning prior
to integration testing.
Each component used in the system must be unit-tested and its functionality must be
verified before the component can be used in the integrated system.
54
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.2
Pre-Transition Testing
Unit testing is done as part of the development phase by the developer responsible for
creating the component. If the functional or technical requirements specifications
include a procedure for testing the component, then this procedure must be followed. If
the functional and technical requirements specifications do not include a procedure for
testing the component, then at a minimum the test must verify that the component
performs as outlined in the specifications.
The tools used to test each part are different, depending on what the part is designed to
do in the system. In addition, though all are designed to verify correct functioning, the
methods employed vary, depending on the component being tested.
Take advantage of the validation tools in various Java CAPS products. For example:
Enterprise Designer includes a Java Debugger that enables you to debug Java-based
Collaboration Definitions.
eInsight Business Process Manager includes a validation tool that enables you to
Integration Testing
Integration testing verifies how well the new components work together and with the
existing Java CAPS infrastructure.
If the system is large and complex, you can break the integration testing into pieces
designed to test a self-contained portion of the system.
Performance Testing
Performance testing tests whether the system works fast enough. This type of testing
must be done once a component or system is functioning correctly and transforming
the data properly.
Many factors in combination affect performance. Speeding up one component might
not speed up the performance of the entire system if the bottleneck is located elsewhere.
55
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.2
Pre-Transition Testing
The exact requirement or goal in terms of the systems performance must be specified
in the test plan. Whether you meet the goal determines whether you pass the test.
An additional goal in performance testing is to find the bottlenecks in the system.
Uncovering these bottlenecks enables additional system resources to be allocated
intelligently in order to improve processing.
Speed Testing
This operation tests whether the system processes data fast enough. Ensure that the
logging is set to the levels that will be used in production before doing a speed test.
Higher-than-normal levels of logging can seriously degrade system performance and
slow processing speed.
Stress Testing
This operation tests whether the system can handle the expected load. This type of
testing attempts to overload the system with data to see whether or how it could fail.
Effective stress tests include large volumes of messages, large-sized messages, and
multiple concurrent connections. Many times, network bottlenecks can be uncovered
this way. The test plan describes the methodology to use for stress testing.
5.2.5
Acceptance Testing
Acceptance testing is done before moving the system into production. This type of
testing serves as a final check to prove to end users that the system performs according
to plan.
Acceptance testing can be done for part of a system or for a complete system. If the
entire system is not going into production at the same time, then you can test the
portion of the system that is going into production.
The test plan specifies all conditions that the system has to meet before being put into
production. In addition, the test plan specifies the people who must approve the system
and who must be involved in the test.
5.2.6
Troubleshooting
The following tools are available for finding and correcting errors:
Enterprise Manager
Log files created by individual components
Alert Agent
SNMP Agent
Enterprise Manager
Enterprise Manager gives you control over the components in a Project. Enterprise
Manager alerts you to the status of components (for example, whether they are
running) and enables you to send commands to them (such as start or shut down).
For more information on using Enterprise Manager, see the following documents:
56
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.3
Transition to Production
Log Files
To gain additional information, use the log files created by any component that fails.
When a component or system is not working, errors are written to the log file to help
you diagnose the problem. In a normally functioning system, only the most serious
errors (such as a shut-down component) are written to the log, because each entry
written to the log uses system resources and slows processing. To learn more about a
malfunctioning component, you can enable the system to log more information.
For more information on log files, see the Sun SeeBeyond eGate Integrator System
Administration Guide.
Alert Agent
The Alert Agent enables you to send a specified category of alerts to one or more
destinations as the alerts occur. For detailed information, see the Sun SeeBeyond Alert
Agent Users Guide.
SNMP Agent
The SNMP Agent enables you to forward alerts as SNMP version 2 traps to a thirdparty SNMP management system. For detailed information, see the Sun SeeBeyond
SNMP Agent Users Guide.
5.3
Transition to Production
After verifying the performance and reliability of the system, the next step is to
transition the system to the live production environment.
This phase consists of the following steps:
1 Create a production version of the Deployment Profile
2 Build the EAR file
3 Deploy the EAR file
The Sun SeeBeyond eGate Integrator Users Guide describes the first two steps. The Sun
SeeBeyond eGate Integrator System Administration Guide describes the third step.
57
Chapter 5
Testing, Transition to Production, and Maintenance
5.4
Section 5.4
Post-Transition Maintenance
Post-Transition Maintenance
With your project up and running, it is important to monitor system activity, check for
errors, and make any needed changes.
Figure 14 on page 53 shows the steps to take when changes are required. You must put
changes through the same high scrutiny as the original system design.
5.4.1
Enterprise Manager
Enterprise Manager provides visual cues to let you know when a component needs
attention.
Note: By default, Enterprise Manager is timed out after three hours. You can disable the
timeout.
If you configure the Alert Agent or SNMP Agent, you can avoid having to run the
Enterprise Manager continuously. The agent notifies you when the specified problem
occurs.
Log Files
On a daily basis, review the runtime log files and examine any messages that indicate a
major problem.
If you are using the Sun SeeBeyond Integration Server, then the server log file is the
main log file. This log file uses the Java Logging API.
Note: You can specify the minimum severity level that a logger outputs to the
corresponding log file. Do not use the FINE, FINER, or FINEST levels during
production.
Many of the log files (such as repository.log) are configured to behave as a recirculating
stack. Each file has a maximum size, and the oldest file is reused when the maximum
number of files is reached. Java CAPS includes configuration files that enable you to
change the maximum file size and the maximum number of files.
The other log files (such as connection.log) do not have configuration files. On a
regular basis, check the size of these log files. If a file has grown too large, you can
rename the file, delete the file, or move the file to a separate disk or computer.
58
Chapter 5
Testing, Transition to Production, and Maintenance
Section 5.5
Summary
Repository Backup
On a regular basis, back up the Repository. The frequency will vary depending on the
project. One scenario is to back up the Repository once a week at a time of low system
activity.
5.4.2
Implementing Changes
After a period of time, you may need to make changes to your project. Changes are
common as the needs of your end users evolve and as additional external systems are
added.
Implement changes by using the same process that was originally used to deploy your
project. Consider the change management process illustrated in Figure 14 on page 53.
Applying this same process of planning, configuration, testing, migration, monitoring,
and re-evaluation helps to ensure a successful deployment.
5.5
Summary
The proper use of a lab environment provides an excellent opportunity to verify and
refine the system configuration that was implemented earlier in the deployment
process. Focusing on the deployment plan helps to ensure the smoothest possible
deployment.
By thoroughly unit testing and system testing the system in the lab, costly errors can be
avoided and the end users are more satisfied with the final results.
Going Forward
When the management team, the deployment project team, and the end users agree
that the system is up and running according to plan, you have successfully finished the
deployment.
If you have any questions about further system operation and maintenance, see the
appropriate documents listed in Related Documents on page 12 or contact Sun
Microsystems.
59
Chapter 6
6.1
There are many factors to consider in order to determine the hardware requirements for
your particular system. This discussion is limited to issues as they relate directly to Java
CAPS.
This chapter does not consider networking topology, and does not address such issues
as shared applications, how resources are distributed throughout a network, and how
many workstations are included in the network. For databases, this chapter assumes
that each database management system is installed on a separate host.
6.2
Initial Considerations
Depending on the number of external connections, the type of data being processed,
and how the data is processed, the required resources can vary. Consider the following
points as you begin estimating your hardware requirements:
Each deployment of Java CAPS is different. The configuration of each deployment
60
Chapter 6
Determining System Requirements
Section 6.3
Estimating Requirements
6.3
Estimating Requirements
This section lists some of the factors that affect performance, and then provides
guidelines for estimating requirements.
6.3.1
Factors
Because Java CAPS is a general-purpose toolkit that is flexible in its deployment and
configuration, estimating the processor requirements is a challenge. There are infinite
possibilities and numerous factors with complex interactions that affect the estimates.
Some factors are more critical than others, depending on the circumstances.
Factors that affect performance include:
CPU type and architecture
CPU speed
Presence of a CPU cache and its size
Number of CPUs
Physical memory size
Swap size
Disk subsystem (that is, bandwidth, latency, block size, RPM, seek time, and the
acknowledgements
Complexity and amount of processing to be performed by each component
61
Chapter 6
Determining System Requirements
Section 6.3
Estimating Requirements
expressions
Bundling of messages (that is, more than one logical record in one physical record)
Number of transitions between components for a given message (for example,
Guidelines
Start with a good base configuration as a development system and use that
configuration to predict the processor requirements for a production system for your
unique implementation.
The recommended methodology is to:
1 Implement a representative number of interfaces (that exercise a good sample of the
various data transformations and communication requirements of the
implementation) on this system.
2 Run representative data files through the system.
3 Record the CPU load.
From these measures, you can project what the final production load will be and,
therefore, the CPU requirement. The architecture can be tuned to achieve more
efficiency using this same technique.
One advantage of the suites distributed and scalable architecture is that hardware does
not need to be replaced but can be included in a multi-system implementation.
Therefore, as processing requirements grow, you can add new hardware.
General Considerations
When estimating resource requirements, certain general considerations exist.
Table 10 lists the RAM and disk space considerations for the Repository, Logical Host,
and Enterprise Designer computers.
62
Chapter 6
Determining System Requirements
Section 6.3
Estimating Requirements
RAM
Disk Space
Repository
Enterprise Designer
Logical Host
The number of
Collaborations and other
deployed modules increases.
The size and complexity of
messages increase.
CPU
RAM
Disk Space
Enterprise Designer
768 MB
250 MB
Repository
240 MB
1.2 GB
Enterprise Manager
400 MB
170 MB
Logical Host
270 MB
250 MB
CPU
RAM
Disk Space
Repository
667 MHz
380 MB
1000 MB
Enterprise Manager
667 MHz
400 MB
150 MB
63
Chapter 6
Determining System Requirements
Section 6.3
Estimating Requirements
CPU
Logical Host
RAM
667 MHz
320 MB
Disk Space
350 MB
CPU
RAM
Disk Space
Repository
540 MHz
280 MB
1150 MB
Enterprise Manager
540 MHz
400 MB
400 MB
Logical Host
540 MHz
450 MB
500 MB
CPU
RAM
Disk Space
Repository
450 MHz
180 MB
900 MB
Enterprise Manager
450 MHz
400 MB
180 MB
Logical Host
450 MHz
300 MB
450 MB
CPU
RAM
Disk Space
Repository
1.2 GHz
240 MB
900 MB
Enterprise Manager
1.2 GHz
400 MB
180 MB
Logical Host
1.2 GHz
360 MB
350 MB
CPU
RAM
Disk Space
Repository
400 MHz
240 MB
850 MB
Enterprise Manager
400 MHz
400 MB
210 MB
Logical Host
400 MHz
360 MB
400 MB
The Java Composite Application Platform Suite Installation Guide contains additional
information about the system requirements. The Java CAPS Readme file contains the
most up-to-date system requirements.
Additional Sun Solaris Requirements
If you want to run the Sun SeeBeyond Integration Server on Sun Solaris in 64-bit mode,
then you must do the following:
1 Use Sun Solaris 9 or 10.
2 Go to http://<IS-host>:<port-number>.
3 Login to the Configuration Agent.
4 Click Configuration.
64
Chapter 6
Determining System Requirements
Section 6.3
Estimating Requirements
5 Click the JVM Settings tab, and then click on JVM options.
6 Add new JVM option and provide -d64.
7 Check the box and save.
8 Restart the Integration Server. The Integration Server will start in 64-bit mode.
Note: The Integration Server can be configured by editing the domain.xml file.
Important: You cannot run the Integration Server on Sun Solaris 8 in 64-bit mode.
65
Chapter 7
7.1
66
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.2
Configuring Support for Repository Failover
If the primary and secondary are active at the same time, then the configuration is
termed as active/active. If the primary is active and the secondary is passive, then the
configuration is termed as active/passive.
Resource types are public to the cluster. Resources are instances of resource types.
Resource type enfolds an application, such that the application can run in a clustered
environment. Resource Group Manager controls the clustered environment, and thus
also the application running in it.
7.2
67
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.2
Configuring Support for Repository Failover
Description
Vendor Name
Application Name
Working Directory
</global/JavaCAPS51/myRT>
You specify the working
directory.
Scalable/Failover
Select Failover
68
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.2
Configuring Support for Repository Failover
Description
Network Aware
Enabled by default
Select ksh.
Output Log
3 Click Create.
Step 2 of SunPlex Agent Builder appears.
Figure 17 SunPlex Agent Builder - Configure Screen
4 Click Browse to enter the full path of the start, stop, and probe scripts for the
Repository. The probe command is optional. The paths of the scripts are:
Start Script
<Sun_JavaCAPS51_install_dir>/Repository/startserv.bat
For example, C:\JavaCAPS51\repository\startserv.bat
Stop Script
<Sun_JavaCAPS51_install_dir>/Repository/stopserv.bat
For example, C:\JavaCAPS51\repository\stopserv.bat
Probe Script
69
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.2
Configuring Support for Repository Failover
70
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.3
Configuring Support for Logical Host Failover
11 Type # scrgadm -a -j <Application Name> -res -g <Application Name> <Resource Group Name> -t <Vendor Name>.<Application Name> -y
Scalable=False to add a resource for Repository of the resource type. For example:
# scrgadm -a -j Repos -res -g Repos -RG -t SUN.Repos -y Scalable=False
12 Type # scswitch -Z -g <Application Name> -<Resource Group> to enable
Repository resource. This command also brings it online. For example:
# scswitch -Z -g Repos -RG
13 Access the http://<Logicalhostname>:<portnumber> URL to view the application
installed in the cluster environment. For example:
http://sunJavaCAPS51cluster:12000
7.3
71
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.3
Configuring Support for Logical Host Failover
Description
Vendor Name
Application Name
Working Directory
</global/JavaCAPS51/myRT>
You specify the working
directory.
Scalable/Failover
Select Failover
Network Aware
Enabled by default
Select ksh.
Output Log
3 Click Create.
Step 2 of SunPlex Agent Builder appears.
72
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.3
Configuring Support for Logical Host Failover
4 Click Browse to enter the full path of the start, stop, and probe scripts for the
Logical Host. The probe command is optional. The paths of the scripts are:
Start Script
<Sun_JavaCAPS51_install_dir>/logicalhost/is/domains/<domain name>/bin/
startserv.bat
Stop Script
<Sun_JavaCAPS51_install_dir>/logicalhost/is/domains/<domain name>/bin/
stopserv.bat
Probe Script
<Sun_JavaCAPS51_install_dir>/logicalhost/util/scripts/pingis.bat
Note: The start, stop, and probe scripts are available in the domain where the clustered
application is created. Fault monitor constantly checks the data service to ensure
that everything is running properly and the clients are served. Actions are taken
based on the message sent by the probes.
5 Click Configure to create the resource type as a Solaris package in the <working
directory>/<vendor+application name>/pkg directory.
Note: A new folder is created in the specified working directory. The name of the folder is
the concatenated string of vendor and application name. The pkg folder is created
under the newly created folder. This pkg folder location is the package location
where the resource types are installed. For example, /global/JavaCAPS51/myRT/
SUNLogicalHost/pkg.
6 Type # pkgadd -d <Package Location> to install the resource type on the nodes.
Run this command separately in every node of the cluster.
73
Chapter 7
Configuring Failover Support in a Sun Clustering Environment
Section 7.3
Configuring Support for Logical Host Failover
74
Chapter 8
8.1
SCSI
Cable
Host 1
SCSI
Cable
Shared Disk
Drive
Host 2
75
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
8.2
Section 8.2
Configuring Support for Repository Failover
8.2.1
Overview
In the Repository failover environment, one node is active and the other node(s) is
passive. This configuration is called active/passive.
During the configuration process, you use Microsofts Cluster Administrator tool to
create a group that contains the following resources:
Shared disk drive
IP address
Network name
The Repository
In addition, you must install the Repository on the shared disk drive.
The active node is the owner of the group. If one of the resources fails, the group is
automatically moved to another node and started on that node. This process is called
failover. The new node now becomes the active node.
The Repository is not cluster aware. When a failover is completed, the Repository does
not remember the state that existed before the failover. This limitation could affect the
users. For example,
If an Enterprise Designer user is saving objects to the Repository during the
failover, then the save will not succeed. Once the failover is completed, the user will
need to save the objects again. If an Enterprise Designer user is not saving objects
during the failover, then the failover will be transparent to the user.
When the failover begins, the browser session of all Enterprise Manager users will
expire. Once the failover is completed, the users will need to login to Enterprise
Manager again.
8.2.2
Requirements
Before you perform the procedures, you must have the following:
A functional active/passive cluster that consists of two or more nodes. The nodes
76
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
A cluster shared drive that is available for the Repository installation. The shared
version 5.2.
8.2.3
8.2.4
77
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
2 Enter a name for the resource (for example, CAPS Shared Drive).
3 Enter a description for the resource.
4 Set the resource type to Physical Disk.
5 Set the group to the CAPS Cluster Group. When finished, click Next.
The Possible Owners dialog box appears.
Figure 22 Possible Owners Dialog Box
6 Move the nodes that will be part of the cluster to the Possible Owners list. Click
Next.
The Dependencies dialog box appears.
78
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
7 The Physical Disk resource is not dependent on other resources. Therefore, click
Next.
The Disk Parameters dialog box then appears.
8 Choose the shared disk. Click Finish.
9 To ensure that the Physical Disk resource is accessible from each node, move the
CAPS Cluster Group into each nodes Active Groups folder, and verify that the
group can be brought online at each node.
8.2.5
79
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
8 Enter the IP address and subnet mask of the cluster. Choose the network card.
Click Finish.
9 To ensure that the IP Address resource is accessible from each node, move the
CAPS Cluster Group into each nodes Active Groups folder and verify that the
group can be brought online at each node.
8.2.6
80
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
the GUI installation program, do this by selecting the Run repository as Windows
Service check box in the Repository Configuration dialog box.
Note: For detailed instructions on installing the Repository, see the Sun Java Composite
Application Platform Suite Installation Guide.
8.2.8
Important: The drive letter must be the same on each cluster node.
The steps to be followed are:
1 From the Cluster Administrator, move the CAPS Cluster Group to a node on which
the Repository was not installed.
81
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
8 In the Service name field, enter the Repository name. Leave the Start parameters
field blank. Click Next.
82
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.2
Configuring Support for Repository Failover
9 Click Finish.
10 To ensure that the Generic Service resource is accessible from each node, move the
CAPS Cluster Group into each nodes Active Groups folder and verify that the
group can be brought online at each node.
8.2.10
83
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
8.3
Section 8.3
Configuring Support for Logical Host Failover
8.3.1
Overview
In the Logical Host failover environment, one node is active and the other node(s) is
passive. This configuration is called active/passive.
During the configuration process, you use Microsofts Cluster Administrator tool to
create a group that contains the following resources:
Shared disk drive
IP address
Network name
The Logical Host itself
In addition, you must install the Logical Host on the shared disk drive.
The active node is the owner of the group. If one of the resources fails, the group is
automatically moved to another node and started on that node. This process is called
failover. The new node becomes the active node.
8.3.2
Requirements
Before you perform the following procedures, you must have the following:
A functional active/passive cluster that consists of two or more nodes. The nodes
version 5.2..
8.3.3
84
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.3
Configuring Support for Logical Host Failover
8.3.5
85
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.3
Configuring Support for Logical Host Failover
86
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.3
Configuring Support for Logical Host Failover
6 To ensure that the Network Name resource is accessible from each node, move the
CAPS Cluster Group into each nodes Active Groups folder and verify that the
group can be brought online at each node.
8.3.7
Creating Domains
To deploy applications to the Sun SeeBeyond Integration Server, you must first create a
domain.
A domain is an instance of a Logical Host. You create a domain using the Domain
Manager.
87
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.3
Configuring Support for Logical Host Failover
8.3.10
88
Chapter 8
Configuring Failover Support in a Windows Clustering Environment
Section 8.3
Configuring Support for Logical Host Failover
Note: The context menu also contains an item called Initiate Failure. You can choose this
item for testing purposes to simulate a failover.
Important: When configuring a Windows clustering environment, it is highly recommended
not to manage the processes outside of the cluster sofware.
89
Chapter 9
9.1
9.2
Configuring Failover
When your Business Process is configured for load balancing, eInsights failover
capabilities ensure throughput of running Business Process instances. When Business
Process instances encounter an engine failure, eInsight load balances those instances
across all available engines. As with load balancing, eInsights failover capabilities are
limited to non-correlated messages.
To configure failover
1 In the eInsight Engine Properties, set Engine Expiry Interval (sec) so that it
registers itself as alive frequently enough to meet the demands of your system.
Optimizing this property setting might require some testing. This property also
applies to the interval for the recovery of dangling instances. The default setting is
120.
90
Chapter 9
eInsight Load Balancing and Failover
Section 9.2
Configuring Failover
2 In the eInsight Engine Properties, set Failover Grace Period (sec) for the optimal
elapsed time period before moving running Business Process instances from an
unavailable engine to an available engine. Optimizing this property setting might
require some testing.
91
Index
Index
D
Database Connection Max Idle Time property 49
Database Connection Pool Size property 49
Database Connection Retries property 49
Database Connection Retry Interval property 49
Database Connection Steady Pool Size property 49
deadlock
avoiding 48
debugging 55
deployment planning
checklist 27
documents 28
objectives 26
overview 21, 25
deployment project plan 28
developerWorks 50
directory structure
multiple Logical Hosts 45
disk space requirements
HP Tru64 63
HP-UX 64
IBM AIX 64
Red Hat Linux 64
Sun Solaris 64
Windows 63
documentation
related 12
standards 27
Numerics
64-bit mode
Sun Solaris requirement 64
A
acceptance testing 26, 56
ACLs
guideline 41
active/active cluster
defined 75
active/passive cluster
defined 75
Administrator user 38
Alert Agent
troubleshooting with 57
architecture
functional requirements 29
availability 30
B
bottlenecks 56
BPEL4WS 37
business activity monitoring 18
business process management 16
Business Processes
memory requirements 47
E
eBAM Studio
overview 18
eGate Integrator
overview 15
eIndex
overview 18
eInsight
Engine 47
error handling 43
failover 90
load balancing 90
overview 16
persistence 49
work items 47
Elemental Business Services layer 35
Enterprise Designer
disk space 63
C
change management 27, 52, 59
clustering
Sun 66
Windows 75
Composed Business Services layer 36
Composite Applications layer 36
constants 43
constraints 29
conventions, text 11
CPU requirements
HP Tru64 63
HP-UX 64
IBM AIX 64
92
Index
overview 15
RAM 63
Enterprise Manager
overview 15
troubleshooting with 56
Environment 44
ephemeral ports 46
error handling 23, 43
eTL Integrator
overview 17
eView Studio
overview 18
eVision Studio
error handling 43
overview 16
eWay Adapters 29, 36
examples
business process model 16
Page Layout 17
eXchange Integrator
overview 18
Existing Systems layer 35
extraction, transform, and load 17
failover
Logical Host 84
Repository 76
functional requirements specification 29
IBM AIX
system requirements
CPU 64
disk space 64
RAM 64
troubleshooting 50
tuning 50
Integration Server
naming convention 41
scalability of 44
Sun Solaris requirement 64
integration testing 55
interfaces 26, 28, 29
Invocation Allocation Ratio property 48
invoke activities
eInsight 47
isolating Projects 44
J
JVM Args property 64
L
location transparency 34
log files
troubleshooting with 57
logging
effect on performance 56
Logical Host
disk space 63
failover 84
multiple on single computer 45
naming convention 40
RAM 63
sharing 42
loose coupling 34
G
general model 26
H
hardware
determining requirements 60
high volume 46
HP Tru64
system requirements
CPU 63
disk space 63
RAM 63
HP-UX
system requirements
CPU 64
disk space 64
RAM 64
M
maintenance 58
master indexes 18
Max Concurrent Instances property 47
Maximum Pool Size property 46
MaxUserPort registry parameter 47
milestones 28
93
Index
naming conventions 39
scalability 44
scheduling
deployment project plan 28
test plan 30
screenshots 12
security
requirements 23, 30
service-oriented architecture
layers 34
overview 33
technologies 37
SNMP Agent
troubleshooting with 57
SOAP 37
speed testing 56
stress testing 56
subprojects
large development team 41
naming conventions 40
suffixes 41
Sun clustering
Logical Host 71
overview 66
Repository 67
Sun Solaris
64-bit mode 64
system requirements
CPU 64
disk space 64
RAM 64
system requirements
determining 60
minimum 63
system testing 55
O
Object Type Definition
naming convention 40
organization
test team 30
P
performance
eInsight Engine 47
high-volume scenarios 46
requirements 23
testing 55
port numbers 45
prefixes 39
production, transition to 57
professional services 24, 26
project manager 27
project plan 28
R
RAM requirements
HP Tru64 63
HP-UX 64
IBM AIX 64
Red Hat Linux 64
Sun Solaris 64
Windows 63
Receive Activity 48
Receive Timeout property 48
Red Hat Linux
system requirements
CPU 64
disk space 64
RAM 64
Repository
disk space 63
failover 76
RAM 63
requirements 30
requirements analysis
business planning needs 24
operation and performance needs 23
overview 21, 22
personnel and training needs 24
system-specific needs 22
reusability 34
risks 28
T
TcpTimedWaitDelay 46
technical requirements specification 29
test plan 30, 53
testing
acceptance testing 56
integration testing 55
performance testing 55
speed testing 56
stress testing 56
system testing 55
test plan 53
unit testing 54
text conventions 11
threading 47
trading partners 18
94
Index
training 24
transition to production 57
troubleshooting
pre-transition testing phase 56
tuning
eInsight Engine 47
high-volume scenarios 46
U
UDDI 37
unit testing 54
V
variables 43
version control 41
W
Windows
CPU requirements 63
disk space requirements 63
RAM requirements 63
registry settings 46
Windows clustering
Logical Host 84
overview 75
Repository 76
work breakdown structure 28
Work Item Submit Limit property 48
work items
eInsight 47
workflow tasks 16
WSDL 37
X
XML 37
XSLT 37
95