D80153GC10 Toc
D80153GC10 Toc
D80153GC10 Toc
Administration II
D80153GC10
Edition 1.0
July 2013
D82808
Authors Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
TJ Palazzolo This document contains proprietary information and is protected by copyright and
Al Saganich other intellectual property laws. You may copy and print this document solely for
your own use in an Oracle training course. The document may not be modified or
altered in any way. Except where your use constitutes "fair use" under copyright
Technical Contributors law, you may not use, share, download, upload, copy, print, display, perform,
reproduce, publish, license, post, transmit, or distribute this document in whole or in
and Reviewers part without the express authorization of Oracle.
Bill Bell
The information contained in this document is subject to change without notice. If
Elio Bonazzi you find any problems in the document, please report them in writing to: Oracle
Tom McGinn University, 500 Oracle Parkway, Redwood Shores, California 94065 USA. This
document is not warranted to be error-free.
Eduardo Moranchel Rosales
Restricted Rights Notice
Will Lyons
David Cabelus If this documentation is delivered to the United States Government or anyone using
the documentation on behalf of the United States Government, the following notice
Greg Stachnick is applicable:
Donna Micozzi
U.S. GOVERNMENT RIGHTS
Jon Patt The U.S. Government’s rights to use, modify, reproduce, release, perform, display,
Matthew Slingsby or disclose these training materials are restricted by the terms of the applicable
Oracle license agreement and/or the applicable U.S. Government contract.
Bill Albert
Trademark Notice
Rich Whalen
Kevin Tate Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other
names may be trademarks of their respective owners.
Serge Moiseev
Takyiu Liu
Angelika Krupp
Viktor Tchemodanov
Diganta Choudhury
Jose Alvarez
Alexander Ryndin
Editors
Aju Kumar
Raj Kumar
Graphic Designers
Rajiv Chandrabhanu
Maheswari Krishnamurthy
Publishers
Nita Brozowski
Srividya Rameshkumar
Contents
1 Course Introduction
Course Objectives 1-2
Target Audience 1-4
Course Prerequisites 1-5
Introductions and Setting Expectations 1-6
Course Schedule 1-7
Course Practices 1-10
Classroom Guidelines 1-11
Facilities in Your Location 1-12
For More Information 1-13
Related Training 1-14
iii
Minor Upgrade 3-6
Major Upgrade 3-7
Quiz 3-8
Agenda 3-9
What Is a Rolling Upgrade? 3-10
Multiple Installation and Domain Locations 3-11
Leverage WebLogic Clusters to Avoid Down Time 3-12
Quiz 3-14
Agenda 3-15
Rolling Upgrade Process: Overview 3-16
Backup 3-17
Shutdown 3-18
Upgrade 3-19
Restart 3-20
Quiz 3-21
Summary 3-22
Practice 3-1 Overview: Performing a Rolling Upgrade 3-23
iv
Creating Windows Start Menu Entries 4-25
Creating an Extension Template 4-26
Using a Custom Template with the Configuration Wizard 4-28
Post Domain Creation Tasks 4-34
Using a Custom Extension Template with the Configuration Wizard 4-35
Summary 4-37
Practice 4-1 Overview: Creating and Using a Custom Domain Template 4-38
v
Variable Declaration 6-8
Conditional Expressions 6-9
Loop Expressions 6-10
I/O Commands 6-11
Exception Handling 6-12
Quiz 6-13
Agenda 6-14
WLST Modes 6-15
WLST Example 6-16
Command-Line History and WLST 6-17
Running WLST Scripts 6-18
WLST Development Tools 6-19
configToScript() 6-20
Script Recording Using the Administration Console 6-21
Oracle Enterprise Pack for Eclipse 6-23
WLST Command Tips 6-24
General WLST Commands 6-25
Offline WLST Commands 6-26
Online WLST Commands 6-27
Quiz 6-28
Agenda 6-29
WebLogic JMX Overview 6-30
Configuration MBeans 6-31
Runtime MBeans 6-32
WebLogic Server MBean Examples 6-33
MBean Properties in the Administration Console 6-34
Browsing MBean Documentation 6-35
Referencing MBeans in WLST 6-37
Quiz 6-38
Agenda 6-39
Creating a Template and a Domain 6-40
Connecting to a Server 6-41
Password Management 6-42
WLST Variables 6-43
Password Management 6-44
Configuring a Server 6-45
Monitoring a Server 6-46
Adding a Server to a Cluster 6-47
Creating a Data Source 6-48
Monitoring a Data Source 6-50
Creating an LDAP Authentication Provider 6-51
vi
Modifying a Domain Offline 6-52
Deploying an Application 6-53
Quiz 6-54
Agenda 6-55
Some FMW Commands 6-56
Summary 6-57
Practice 6-1 Overview: Creating and Modifying a Domain with WLST 6-58
Practice 6-2 Overview: Monitoring a Domain with WLST 6-59
vii
Summary 7-37
Practice 7-1 Overview: Setting Up SSL 7-38
viii
Managing Deployment Plans 8-50
Summary 8-51
Practice 8-1 Overview: Creating and Using a Deployment Plan 8-52
10 Production Redeployment
Objectives 10-2
Agenda 10-3
HTTP Sessions and Redeployment 10-4
Agenda 10-5
Redeployment Strategies 10-6
Agenda 10-7
Application Availability 10-8
What Is Production Redeployment? 10-9
Advantages of Production Redeployment 10-11
Production Redeployment Process 10-12
Application Retirement 10-14
Review: Administration Channel 10-15
Administration Mode 10-16
Distributing a Versioned Application 10-17
Deploying in Administration Mode 10-18
ix
Rolling Back to the Previous Version 10-19
Quiz 10-20
Agenda 10-22
Redeployment Process: Overview 10-23
Configuring Application Deployment Versioning 10-24
Deploying a New Version of an Application 10-26
Distributing and Starting a Versioned Application in Administration Mode 10-30
Transitioning a Versioned Application from Administration Mode to Active 10-33
Rolling Back a Versioned Application to a Previous Version 10-35
Quiz 10-36
Agenda 10-37
Requirements and Restrictions 10-38
Summary 10-39
Practice 10-1 Overview: Using Production Redeployment 10-40
x
Summary 11-26
Practice 11-1 Overview: Creating and Using Work Managers 11-27
xi
How WebLogic Resources Are Protected 13-8
Examples of WebLogic Resources to Protect 13-9
Users and Groups 13-10
Group Membership 13-11
Roles 13-12
Policies 13-13
Configuring New Users 13-14
Configuring New Groups 13-15
Configuring Group Memberships 13-16
Configuring New Roles 13-17
What Is Role Mapping? 13-18
Configuring Role Mapping 13-19
Configuring Roles Using WLST 13-20
Configuring New Policies 13-21
Configuring Policies Using WLST 13-22
Security Configuration Sources 13-23
Configuring Sources Using WLST and weblogic.Deployer 13-24
Deployment Descriptor Security Example: weblogic.xml 13-25
Deployment Descriptor Security Example: web.xml 13-26
Embedded LDAP Server 13-27
Configuring the Embedded LDAP Server 13-28
Quiz 13-30
Practice 13-1 Overview: Creating Users, Groups, Roles, and Policies 13-31
Agenda 13-32
Auditing 13-33
Sample Auditing Output 13-34
Security Audit Events 13-35
WebLogic Auditing Architecture 13-36
Custom Versus Default Auditing Provider 13-37
Creating the Default Auditing Provider 13-38
Configuring the Default Auditing Provider 13-39
Configuration Auditing 13-41
Quiz 13-43
Summary 13-44
Practice 13-2 Overview: Configuring WebLogic Auditing 13-45
xii
Recommended Architecture 14-7
General Best Practices 14-8
Hosts File: Example 14-9
Quiz 14-10
Agenda 14-11
Administration Server Review 14-12
Impact of Administration Server Failure 14-13
Backing Up a Domain Configuration 14-14
Recovery of the Administration Server Configuration 14-15
Restarting an Administration Server on a New Computer 14-16
Quiz 14-17
Agenda 14-18
Java Transaction API (JTA) Review 14-19
What Is Service Migration? 14-20
Service Migration Prerequisites 14-21
Service Migration Architecture: Database Leasing 14-22
Service Migration Architecture: Consensus Leasing 14-23
What Is a Migratable Target? 14-24
Service Migration Policy Options 14-25
Configuration Roadmap 14-26
JTA Service Migration: Before Failure 14-27
JTA Service Migration: After Failure 14-28
Configuring JTA Service Migration 14-29
Set Up Automatic JTA Service-Level Migration 14-30
Quiz 14-31
Practice 14-1 Overview: Configuring JTA Service-Level Migration 14-34
Agenda 14-35
Whole-Server Migration 14-36
Automatic Server Migration Architecture: No Failure 14-37
Automatic Server Migration Architecture: Machine Failure 14-38
Configuration: Overview 14-39
Quiz 14-40
Summary 14-41
15 Diagnostic Framework
Objectives 15-2
Agenda 15-3
WebLogic Diagnostics Framework (WLDF) 15-4
WLDF Architecture 15-5
Diagnostic Archives 15-6
Configuring Server Diagnostic Archives 15-7
xiii
Diagnostic Modules 15-8
Dynamic Diagnostic Modules 15-10
Resource Descriptors 15-11
Creating a Diagnostic Module 15-12
WLST: Example 15-13
WLST Commands for WLDF 15-14
Quiz 15-15
Agenda 15-16
What Is a Diagnostic Image? 15-17
Capturing a Server Diagnostic Image 15-18
WLST: Example 15-19
Quiz 15-20
Agenda 15-21
What Is a Harvester? 15-22
Metric Collectors 15-23
Configuring a Metric Collector 15-24
WLST: Example 15-25
Quiz 15-26
Agenda 15-27
Watches and Notifications 15-28
Configuring a Watch 15-29
Quiz 15-31
Summary 15-32
Practice 15-1 Overview: Using a Built-in Diagnostic Module 15-33
xiv
Coherence Application Deployment on WebLogic 16-18
Coherence Container: Benefits 16-19
Coherence Cluster 16-20
Managed Coherence Server 16-21
Quiz 16-23
Summary 16-24
Practice 16-2 Overview: Configuring Managed Coherence Servers 16-25
xv