Jump To Close Expand all Collapse all Table of contents Administration and Configuration Guide 1. Introduction Expand section "1. Introduction" Collapse section "1. Introduction" 1.1. About Red Hat JBoss Enterprise Application Platform 6 1.2. Features of JBoss EAP 6 1.3. About JBoss EAP 6 Operating Modes 1.4. About Standalone Servers 1.5. About Managed Domains 1.6. About the Domain Controller 1.7. About Domain Controller Discovery and Failover 1.8. About Host Controller 1.9. About Server Groups 1.10. About JBoss EAP 6 Profiles 2. Application Server Management Expand section "2. Application Server Management" Collapse section "2. Application Server Management" 2.1. Start and Stop JBoss EAP 6 Expand section "2.1. Start and Stop JBoss EAP 6" Collapse section "2.1. Start and Stop JBoss EAP 6" 2.1.1. Start JBoss EAP 6 2.1.2. Start JBoss EAP 6 as a Standalone Server 2.1.3. Start JBoss EAP 6 as a Managed Domain 2.1.4. Configure the Name of a Host in a Managed Domain 2.1.5. Create Managed Domain on Two Machines 2.1.6. Start JBoss EAP 6 with an Alternative Configuration 2.1.7. Stop JBoss EAP 6 2.1.8. Reference of Switches and Arguments to pass at Server Runtime 2.2. Start and Stop Servers Expand section "2.2. Start and Stop Servers" Collapse section "2.2. Start and Stop Servers" 2.2.1. Start and Stop Servers Using the Management CLI 2.2.2. Start a Server Using the Management Console 2.2.3. Stop a Server Using the Management Console 2.3. Filesystem Paths Expand section "2.3. Filesystem Paths" Collapse section "2.3. Filesystem Paths" 2.3.1. Filesystem Paths 2.4. Configuration Files Expand section "2.4. Configuration Files" Collapse section "2.4. Configuration Files" 2.4.1. About JBoss EAP 6 Configuration Files 2.4.2. Descriptor-based Property Replacement 2.4.3. Enabling/Disabling Descriptor Based Property Replacement 2.4.4. Configuration File History 2.4.5. Start the Server with a Previous Configuration 2.4.6. Save a Configuration Snapshot Using the Management CLI 2.4.7. Load a Configuration Snapshot Using the Management CLI 2.4.8. Delete a Configuration Snapshot Using Management CLI 2.4.9. List All Configuration Snapshots Using Management CLI 3. Management Interfaces Expand section "3. Management Interfaces" Collapse section "3. Management Interfaces" 3.1. Manage the Application Server 3.2. Management Application Programming Interfaces (APIs) 3.3. About the Management Console and Management CLI 3.4. The Management Console Expand section "3.4. The Management Console" Collapse section "3.4. The Management Console" 3.4.1. Management Console 3.4.2. Log in to the Management Console 3.4.3. Change the Language of the Management Console 3.4.4. Analytics in EAP Console 3.4.5. Enable/Disable Google Analytics in EAP Console 3.4.6. Configure a Server Using the Management Console 3.4.7. Add a Deployment in the Management Console 3.4.8. Create a New Server in the Management Console 3.4.9. Change the Default Log Levels Using the Management Console 3.4.10. Create a New Server Group in the Management Console 3.5. The Management CLI Expand section "3.5. The Management CLI" Collapse section "3.5. The Management CLI" 3.5.1. About the Management Command Line Interface (CLI) 3.5.2. Launch the Management CLI 3.5.3. Quit the Management CLI 3.5.4. Connect to a Managed Server Instance Using the Management CLI 3.5.5. Obtain Help with the Management CLI 3.5.6. Use the Management CLI in Batch Mode 3.5.7. CLI Batch Mode Commands 3.5.8. Use Operations and Commands in the Management CLI 3.5.9. Management CLI Configuration Options 3.5.10. Reference of Management CLI Commands 3.5.11. Reference of Management CLI Operations 3.6. Management CLI Operations Expand section "3.6. Management CLI Operations" Collapse section "3.6. Management CLI Operations" 3.6.1. Display the Attributes of a Resource with the Management CLI 3.6.2. Display the Active User in the Management CLI 3.6.3. Display System and Server Information in the Management CLI 3.6.4. Display an Operation Description using the Management CLI 3.6.5. Display the Operation Names using the Management CLI 3.6.6. Display Available Resources using the Management CLI 3.6.7. Display Available Resource Descriptions using the Management CLI 3.6.8. Reload the Application Server using the Management CLI 3.6.9. Shut the Application Server down using the Management CLI 3.6.10. Configure an Attribute with the Management CLI 3.6.11. Configure System Properties Using the Management CLI 3.7. The Management CLI Command History Expand section "3.7. The Management CLI Command History" Collapse section "3.7. The Management CLI Command History" 3.7.1. Use the Management CLI Command History 3.7.2. Show the Management CLI Command history 3.7.3. Clear the Management CLI Command history 3.7.4. Disable the Management CLI Command history 3.7.5. Enable the Management CLI Command history 3.8. Management Interface Audit Logging Expand section "3.8. Management Interface Audit Logging" Collapse section "3.8. Management Interface Audit Logging" 3.8.1. About Management Interface Audit Logging 3.8.2. Enable Management Interface Audit Logging from the Management CLI 3.8.3. About a Management Interface Audit Logging Formatter 3.8.4. About a Management Interface Audit Logging File Handler 3.8.5. About a Management Interface Audit Logging Syslog Handler 3.8.6. Enable Management Interface Audit Logging to a Syslog Server 4. User Management Expand section "4. User Management" Collapse section "4. User Management" 4.1. User Creation Expand section "4.1. User Creation" Collapse section "4.1. User Creation" 4.1.1. Add the User for the Management Interfaces 4.1.2. Pass Arguments to the User Management add-user Script 4.1.3. Add-user Command Arguments 4.1.4. Specify Alternate Properties Files for User Management Information 4.1.5. Add-user Script Command Line Examples 5. Network and Port Configuration Expand section "5. Network and Port Configuration" Collapse section "5. Network and Port Configuration" 5.1. Interfaces Expand section "5.1. Interfaces" Collapse section "5.1. Interfaces" 5.1.1. About Interfaces 5.1.2. Configure Interfaces 5.2. Socket Binding Groups Expand section "5.2. Socket Binding Groups" Collapse section "5.2. Socket Binding Groups" 5.2.1. About Socket Binding Groups 5.2.2. Configure Socket Bindings 5.2.3. Network Ports Used By JBoss EAP 6 5.2.4. About Port Offsets for Socket Binding Groups 5.2.5. Configure Port Offsets 5.2.6. Configuration of Message Size in Remoting 5.3. IPv6 Expand section "5.3. IPv6" Collapse section "5.3. IPv6" 5.3.1. Configure JVM Stack Preferences for IPv6 Networking 5.3.2. Configure the Interface Declarations for IPv6 Networking 5.3.3. Configure JVM Stack Preferences for IPv6 Addresses 6. Datasource Management Expand section "6. Datasource Management" Collapse section "6. Datasource Management" 6.1. Introduction Expand section "6.1. Introduction" Collapse section "6.1. Introduction" 6.1.1. About JDBC 6.1.2. JBoss EAP 6 Supported Databases 6.1.3. Types of Datasources 6.1.4. The Example Datasource 6.1.5. Deployment of -ds.xml files 6.2. JDBC Drivers Expand section "6.2. JDBC Drivers" Collapse section "6.2. JDBC Drivers" 6.2.1. Install a JDBC Driver with the Management Console 6.2.2. Install a JDBC Driver as a Core Module 6.2.3. JDBC Driver Download Locations 6.2.4. Access Vendor Specific Classes 6.3. Non-XA Datasources Expand section "6.3. Non-XA Datasources" Collapse section "6.3. Non-XA Datasources" 6.3.1. Create a Non-XA Datasource with the Management Interfaces 6.3.2. Modify a Non-XA Datasource with the Management Interfaces 6.3.3. Remove a Non-XA Datasource with the Management Interfaces 6.4. XA Datasources Expand section "6.4. XA Datasources" Collapse section "6.4. XA Datasources" 6.4.1. Create an XA Datasource with the Management Interfaces 6.4.2. Modify an XA Datasource with the Management Interfaces 6.4.3. Remove an XA Datasource with the Management Interfaces 6.4.4. XA Recovery 6.5. Datasource Security Expand section "6.5. Datasource Security" Collapse section "6.5. Datasource Security" 6.5.1. About Datasource Security 6.6. Database Connection Validation Expand section "6.6. Database Connection Validation" Collapse section "6.6. Database Connection Validation" 6.6.1. Configure Database Connection Validation Settings 6.7. Datasource Configuration Expand section "6.7. Datasource Configuration" Collapse section "6.7. Datasource Configuration" 6.7.1. Datasource Parameters 6.7.2. Datasource Connection URLs 6.7.3. Datasource Extensions 6.7.4. View Datasource Statistics 6.7.5. Datasource Statistics 6.8. Example Datasources Expand section "6.8. Example Datasources" Collapse section "6.8. Example Datasources" 6.8.1. Example PostgreSQL Datasource 6.8.2. Example PostgreSQL XA Datasource 6.8.3. Example MySQL Datasource 6.8.4. Example MySQL XA Datasource 6.8.5. Example Oracle Datasource 6.8.6. Example Oracle XA Datasource 6.8.7. Example Microsoft SQLServer Datasource 6.8.8. Example Microsoft SQLServer XA Datasource 6.8.9. Example IBM DB2 Datasource 6.8.10. Example IBM DB2 XA Datasource 6.8.11. Example Sybase Datasource 6.8.12. Example Sybase XA Datasource 7. Configuring Modules Expand section "7. Configuring Modules" Collapse section "7. Configuring Modules" 7.1. Introduction Expand section "7.1. Introduction" Collapse section "7.1. Introduction" 7.1.1. Modules 7.1.2. Global Modules 7.1.3. Module Dependencies 7.1.4. Subdeployment Class Loader Isolation 7.2. Disable Subdeployment Module Isolation for All Deployments 7.3. Add a module to all deployments 7.4. Create a Custom Module 7.5. Define an External JBoss Module Directory 7.6. Reference Expand section "7.6. Reference" Collapse section "7.6. Reference" 7.6.1. Included Modules 7.6.2. Dynamic Module Naming 8. Jsvc Expand section "8. Jsvc" Collapse section "8. Jsvc" 8.1. Introduction Expand section "8.1. Introduction" Collapse section "8.1. Introduction" 8.1.1. About Jsvc 8.1.2. Start and Stop JBoss EAP using Jsvc 9. Global Valves Expand section "9. Global Valves" Collapse section "9. Global Valves" 9.1. About Valves 9.2. About Global Valves 9.3. About Authenticator Valves 9.4. Install a Global Valve 9.5. Configure a Global Valve 10. Application Deployment Expand section "10. Application Deployment" Collapse section "10. Application Deployment" 10.1. About Application Deployment 10.2. Deploy with the Management Console Expand section "10.2. Deploy with the Management Console" Collapse section "10.2. Deploy with the Management Console" 10.2.1. Manage Application Deployment in the Management Console 10.2.2. Enable a Deployed Application Using the Management Console 10.2.3. Disable a Deployed Application Using the Management Console 10.2.4. Undeploy an Application Using the Management Console 10.3. Deploy with the Management CLI Expand section "10.3. Deploy with the Management CLI" Collapse section "10.3. Deploy with the Management CLI" 10.3.1. Manage Application Deployment in the Management CLI 10.3.2. Deploy an Application in a Standalone Server Using the Management CLI 10.3.3. Undeploy an Application in a Standalone Server Using the Management CLI 10.3.4. Deploy an Application in a Managed Domain Using the Management CLI 10.3.5. Undeploy an Application in a Managed Domain Using the Management CLI 10.4. Deploy with the HTTP API Expand section "10.4. Deploy with the HTTP API" Collapse section "10.4. Deploy with the HTTP API" 10.4.1. Deploy an application using the HTTP API 10.5. Deploy with the Deployment Scanner Expand section "10.5. Deploy with the Deployment Scanner" Collapse section "10.5. Deploy with the Deployment Scanner" 10.5.1. Manage Application Deployment in the Deployment Scanner 10.5.2. Deploy an Application to a Standalone Server Instance with the Deployment Scanner 10.5.3. Undeploy an Application from a Standalone Server Instance with the Deployment Scanner 10.5.4. Redeploy an Application to a Standalone Server Instance with the Deployment Scanner 10.5.5. Reference for Deployment Scanner Marker Files 10.5.6. Reference for Deployment Scanner Attributes 10.5.7. Configure the Deployment Scanner 10.5.8. Configure the Deployment Scanner with the Management CLI 10.6. Deploy with Maven Expand section "10.6. Deploy with Maven" Collapse section "10.6. Deploy with Maven" 10.6.1. Manage Application Deployment with Maven 10.6.2. Deploy an Application with Maven 10.6.3. Undeploy an Application with Maven 10.7. Control the order of Deployed Applications on JBoss EAP 6 10.8. Deployment Descriptor Overrides 11. Securing JBoss EAP 6 Expand section "11. Securing JBoss EAP 6" Collapse section "11. Securing JBoss EAP 6" 11.1. About the Security Subsystem 11.2. About the Structure of the Security Subsystem 11.3. Configure the Security Subsystem 11.4. About Deep Copy Subject Mode 11.5. Enable Deep Copy Subject Mode 11.6. Security Domains Expand section "11.6. Security Domains" Collapse section "11.6. Security Domains" 11.6.1. About Security Domains 11.6.2. About Picketbox 11.6.3. About Authentication 11.6.4. Configure Authentication in a Security Domain 11.6.5. About Authorization 11.6.6. Configure Authorization in a Security Domain 11.6.7. About Security Auditing 11.6.8. Configure Security Auditing 11.6.9. About the Audit Log 11.6.10. About Security Mapping 11.6.11. Configure Security Mapping in a Security Domain 11.6.12. Use a Security Domain in Your Application 11.6.13. Java Authorization Contract for Containers (JACC) 11.6.14. Java Authentication SPI for Containers (JASPI) 11.7. Securing IIOP Expand section "11.7. Securing IIOP" Collapse section "11.7. Securing IIOP" 11.7.1. About JBoss IIOP 11.7.2. About IOR 11.7.3. IOR Security Parameters 11.8. Management Interface Security Expand section "11.8. Management Interface Security" Collapse section "11.8. Management Interface Security" 11.8.1. Default User Security Configuration 11.8.2. Overview of Advanced Management Interface Configuration 11.8.3. About LDAP 11.8.4. Use LDAP to Authenticate to the Management Interfaces 11.8.5. Disable the HTTP Management Interface 11.8.6. Remove Silent Authentication from the Default Security Realm 11.8.7. Disable Remote Access to the JMX Subsystem 11.8.8. Configure Security Realms for the Management Interfaces 11.9. Securing the Management Interfaces with Role-Based Access Control Expand section "11.9. Securing the Management Interfaces with Role-Based Access Control" Collapse section "11.9. Securing the Management Interfaces with Role-Based Access Control" 11.9.1. About Role-Based Access Control (RBAC) 11.9.2. Role-Based Access Control in the Management Console and CLI 11.9.3. Supported Authentication Schemes 11.9.4. The Standard Roles 11.9.5. About Role Permissions 11.9.6. About Constraints 11.9.7. About JMX and Role-Based Access Control 11.9.8. Configuring Role-Based Access Control 11.9.9. Managing Roles 11.9.10. Configuring Constraints 11.9.11. Constraints Reference 11.10. Network Security Expand section "11.10. Network Security" Collapse section "11.10. Network Security" 11.10.1. Secure the Management Interfaces 11.10.2. Specify Which Network Interface JBoss EAP 6 Uses 11.10.3. Network Ports Used By JBoss EAP 6 11.10.4. Configure Network Firewalls to Work with JBoss EAP 6 11.11. Java Security Manager Expand section "11.11. Java Security Manager" Collapse section "11.11. Java Security Manager" 11.11.1. About the Java Security Manager 11.11.2. Run JBoss EAP 6 Within the Java Security Manager 11.11.3. About Java Security Manager Policies 11.11.4. Write a Java Security Manager Policy 11.11.5. Debug Security Manager Policies 11.12. SSL Encryption Expand section "11.12. SSL Encryption" Collapse section "11.12. SSL Encryption" 11.12.1. Implement SSL Encryption for the JBoss EAP 6 Web Server 11.12.2. Generate a SSL Encryption Key and Certificate 11.12.3. SSL Connector Reference 11.13. Password Vaults for Sensitive Strings Expand section "11.13. Password Vaults for Sensitive Strings" Collapse section "11.13. Password Vaults for Sensitive Strings" 11.13.1. Password Vault System 11.13.2. Create a Java Keystore to Store Sensitive Strings 11.13.3. Mask the Keystore Password and Initialize the Password Vault 11.13.4. Configure JBoss EAP 6 to Use the Password Vault 11.13.5. Configure JBoss EAP 6 to Use a Custom Implementation of the Password Vault 11.13.6. Store and Retrieve Encrypted Sensitive Strings in the Java Keystore 11.13.7. Store and Resolve Sensitive Strings In Your Applications 11.14. FIPS 140-2 Compliant Encryption Expand section "11.14. FIPS 140-2 Compliant Encryption" Collapse section "11.14. FIPS 140-2 Compliant Encryption" 11.14.1. About FIPS 140-2 Compliance 11.14.2. FIPS 140-2 Compliant Passwords 11.14.3. Enable FIPS 140-2 Cryptography for SSL on Red Hat Enterprise Linux 6 11.14.4. Enable FIPS 140-2 Cryptography in Apache HTTP Server 12. Security Administration Reference Expand section "12. Security Administration Reference" Collapse section "12. Security Administration Reference" 12.1. Included Authentication Modules 12.2. Included Authorization Modules 12.3. Included Security Mapping Modules 12.4. Included Security Auditing Provider Modules 13. Subsystem Configuration Expand section "13. Subsystem Configuration" Collapse section "13. Subsystem Configuration" 13.1. Subsystem Configuration Overview 14. The Logging Subsystem Expand section "14. The Logging Subsystem" Collapse section "14. The Logging Subsystem" 14.1. Introduction Expand section "14.1. Introduction" Collapse section "14.1. Introduction" 14.1.1. Overview of Logging 14.1.2. Application Logging Frameworks Supported By JBoss LogManager 14.1.3. Configure Boot Logging 14.1.4. About Garbage Collection Logging 14.1.5. Implicit Logging API Dependencies 14.1.6. Default Log File Locations 14.1.7. Filter Expressions for Logging 14.1.8. About Log Levels 14.1.9. Supported Log Levels 14.1.10. About Log Categories 14.1.11. About the Root Logger 14.1.12. About Log Handlers 14.1.13. Types of Log Handlers 14.1.14. About Log Formatters 14.1.15. Log Formatter Syntax 14.2. Configure Logging in the Management Console 14.3. Logging Configuration in the CLI Expand section "14.3. Logging Configuration in the CLI" Collapse section "14.3. Logging Configuration in the CLI" 14.3.1. Configure the Root Logger with the CLI 14.3.2. Configure a Log Category in the CLI 14.3.3. Configure a Console Log Handler in the CLI 14.3.4. Configure a File Log Handler in the CLI 14.3.5. Configure a Periodic Log Handler in the CLI 14.3.6. Configure a Size Log Handler in the CLI 14.3.7. Configure a Async Log Handler in the CLI 14.3.8. Configure a syslog-handler 14.3.9. Configure a Custom Log Formatter in the CLI 14.4. Per-deployment Logging Expand section "14.4. Per-deployment Logging" Collapse section "14.4. Per-deployment Logging" 14.4.1. About Per-deployment Logging 14.4.2. Disable Per-deployment Logging 14.5. Logging Profiles Expand section "14.5. Logging Profiles" Collapse section "14.5. Logging Profiles" 14.5.1. About Logging Profiles 14.5.2. Create a new Logging Profile using the CLI 14.5.3. Configuring a Logging Profile using the CLI 14.5.4. Specify a Logging Profile in an Application 14.5.5. Example Logging Profile Configuration 14.6. Logging Configuration Properties Expand section "14.6. Logging Configuration Properties" Collapse section "14.6. Logging Configuration Properties" 14.6.1. Root Logger Properties 14.6.2. Log Category Properties 14.6.3. Console Log Handler Properties 14.6.4. File Log Handler Properties 14.6.5. Periodic Log Handler Properties 14.6.6. Size Log Handler Properties 14.6.7. Async Log Handler Properties 14.7. Sample XML Configuration for Logging Expand section "14.7. Sample XML Configuration for Logging" Collapse section "14.7. Sample XML Configuration for Logging" 14.7.1. Sample XML Configuration for the Root Logger 14.7.2. Sample XML Configuration for a Log Category 14.7.3. Sample XML Configuration for a Console Log Handler 14.7.4. Sample XML Configuration for a File Log Handler 14.7.5. Sample XML Configuration for a Periodic Log Handler 14.7.6. Sample XML Configuration for a Size Log Handler 14.7.7. Sample XML Configuration for a Async Log Handler 15. Infinispan Expand section "15. Infinispan" Collapse section "15. Infinispan" 15.1. About Infinispan 15.2. Clustering modes 15.3. Cache Containers 15.4. Cache Stores 15.5. About Infinispan Statistics 15.6. Enable Infinispan Statistics Collection Expand section "15.6. Enable Infinispan Statistics Collection" Collapse section "15.6. Enable Infinispan Statistics Collection" 15.6.1. Enable Infinispan Statistics Collection in the Startup Configuration File 15.6.2. Enable Infinispan Statistics Collection from the Management CLI 15.6.3. Verify Infinispan Statistics Collection is Enabled 15.7. JGroups Expand section "15.7. JGroups" Collapse section "15.7. JGroups" 15.7.1. About JGroups 16. JVM Expand section "16. JVM" Collapse section "16. JVM" 16.1. About JVM Expand section "16.1. About JVM" Collapse section "16.1. About JVM" 16.1.1. About JVM Settings 16.1.2. Display the JVM Status in the Management Console 16.1.3. Configuring JVM 17. Web Subsystem Expand section "17. Web Subsystem" Collapse section "17. Web Subsystem" 17.1. Configure the Web Subsystem 17.2. Replace the Default Welcome Web Application 18. Web Services Subsystem Expand section "18. Web Services Subsystem" Collapse section "18. Web Services Subsystem" 18.1. Configure Web Services Options 19. HTTP Clustering and Load Balancing Expand section "19. HTTP Clustering and Load Balancing" Collapse section "19. HTTP Clustering and Load Balancing" 19.1. Introduction Expand section "19.1. Introduction" Collapse section "19.1. Introduction" 19.1.1. About High-Availability and Load Balancing Clusters 19.1.2. Components Which Can Benefit from High Availability 19.1.3. Overview of HTTP Connectors 19.1.4. Worker Node 19.2. Connector Configuration Expand section "19.2. Connector Configuration" Collapse section "19.2. Connector Configuration" 19.2.1. Define Thread Pools for HTTP Connector in JBoss EAP 6 19.3. Web Server Configuration Expand section "19.3. Web Server Configuration" Collapse section "19.3. Web Server Configuration" 19.3.1. About the Standalone Apache HTTP Server 19.3.2. Install the Apache HTTP Server included with JBoss EAP 6 (Zip) 19.3.3. Install Apache HTTP Server in Red Hat Enterprise Linux (RHEL) 5, 6, and 7 (RPM) 19.3.4. mod_cluster Configuration on httpd 19.3.5. Use an External Web Server as the Web Front-end for JBoss EAP 6 Applications 19.3.6. Configure JBoss EAP 6 to Accept Requests From External Web Servers 19.4. Clustering Expand section "19.4. Clustering" Collapse section "19.4. Clustering" 19.4.1. Use TCP Communication for the Clustering Subsystem 19.4.2. Configure the JGroups Subsystem to Use TCP 19.4.3. Disable Advertising for the mod_cluster Subsystem 19.4.4. Switch UDP to TCP for HornetQ Clustering 19.5. Web, HTTP Connectors, and HTTP Clustering Expand section "19.5. Web, HTTP Connectors, and HTTP Clustering" Collapse section "19.5. Web, HTTP Connectors, and HTTP Clustering" 19.5.1. About the mod_cluster HTTP Connector 19.5.2. Configure the mod_cluster Subsystem 19.5.3. Install the mod_cluster Module Into Apache HTTP Server or JBoss Enterprise Web Server (Zip) 19.5.4. Install the mod_cluster Module Into Apache HTTP Server or JBoss Enterprise Web Server (RPM) 19.5.5. Configure Server Advertisement Properties for Your mod_cluster-enabled Web Server 19.5.6. Configure a mod_cluster Worker Node 19.5.7. Migrate Traffic between Clusters 19.6. Apache mod_jk Expand section "19.6. Apache mod_jk" Collapse section "19.6. Apache mod_jk" 19.6.1. About the Apache mod_jk HTTP Connector 19.6.2. Configure JBoss EAP 6 to Communicate with Apache Mod_jk 19.6.3. Install the mod_jk Module Into the Apache HTTP Server (ZIP) 19.6.4. Install the Mod_jk Module Into the Apache HTTP Server (RPM) 19.6.5. Configuration Reference for Apache Mod_jk Workers 19.7. Apache mod_proxy Expand section "19.7. Apache mod_proxy" Collapse section "19.7. Apache mod_proxy" 19.7.1. About the Apache mod_proxy HTTP Connector 19.7.2. Install the Mod_proxy HTTP Connector into Apache HTTP Server 19.8. Microsoft ISAPI Expand section "19.8. Microsoft ISAPI" Collapse section "19.8. Microsoft ISAPI" 19.8.1. About the Internet Server API (ISAPI) HTTP Connector 19.8.2. Download and Extract Webserver Connector Natives for Microsoft IIS 19.8.3. Configure Microsoft IIS to Use the ISAPI Redirector 19.8.4. Configure the ISAPI Redirector to Send Client Requests to JBoss EAP 6 19.8.5. Configure ISAPI to Balance Client Requests Across Multiple JBoss EAP 6 Servers 19.9. Oracle NSAPI Expand section "19.9. Oracle NSAPI" Collapse section "19.9. Oracle NSAPI" 19.9.1. About the Netscape Server API (NSAPI) HTTP Connector 19.9.2. Configure the NSAPI Connector on Oracle Solaris 19.9.3. Configure NSAPI as a Basic HTTP Connector 19.9.4. Configure NSAPI as a Load-balancing Cluster 20. Messaging Expand section "20. Messaging" Collapse section "20. Messaging" 20.1. Introduction Expand section "20.1. Introduction" Collapse section "20.1. Introduction" 20.1.1. HornetQ 20.1.2. About Java Messaging Service (JMS) 20.1.3. Supported Messaging Styles 20.2. Configuration of Transports Expand section "20.2. Configuration of Transports" Collapse section "20.2. Configuration of Transports" 20.2.1. About Acceptors and Connectors 20.2.2. Configuring Netty TCP 20.2.3. Configuring Netty Secure Sockets Layer (SSL) 20.2.4. Configuring Netty HTTP 20.2.5. Configuring Netty Servlet 20.3. About Java Naming and Directory Interface (JNDI) 20.4. Dead Connection Detection Expand section "20.4. Dead Connection Detection" Collapse section "20.4. Dead Connection Detection" 20.4.1. Closing Dead Connection Resources on the Server 20.4.2. Detecting Client Side Failure 20.5. Work with Large Messages Expand section "20.5. Work with Large Messages" Collapse section "20.5. Work with Large Messages" 20.5.1. Work with Large Messages 20.5.2. Configuring HornetQ Large Messages 20.5.3. Configuring Parameters 20.6. Paging Expand section "20.6. Paging" Collapse section "20.6. Paging" 20.6.1. About Paging 20.6.2. Page Files 20.6.3. Configuration of Paging Folder 20.6.4. Paging Mode 20.7. Diverts Expand section "20.7. Diverts" Collapse section "20.7. Diverts" 20.7.1. Exclusive Divert 20.7.2. Non-exclusive Divert 20.8. Configuration Expand section "20.8. Configuration" Collapse section "20.8. Configuration" 20.8.1. Configure the JMS Server 20.8.2. Configure JMS Address Settings 20.8.3. Configure Messaging with HornetQ 20.8.4. Enable Logging for HornetQ 20.8.5. Configuring HornetQ Core Bridge 20.8.6. Configuring JMS Bridge 20.8.7. Configure Delayed Redelivery 20.8.8. Configure Dead Letter Addresses 20.8.9. Configure Message Expiry Addresses 20.8.10. Reference for HornetQ Configuration Attributes 20.8.11. Set Message Expiry 20.9. Message Grouping Expand section "20.9. Message Grouping" Collapse section "20.9. Message Grouping" 20.9.1. About Message Grouping 20.9.2. Using HornetQ Core API on Client Side 20.9.3. Configuring Server for Java Messaging Service (JMS) Clients 20.9.4. Clustered Grouping 20.9.5. Best Practices for Clustered Grouping 20.10. Duplicate Message Detection Expand section "20.10. Duplicate Message Detection" Collapse section "20.10. Duplicate Message Detection" 20.10.1. About Duplicate Message Detection 20.10.2. Using Duplicate Message Detection for Sending Messages 20.10.3. Configuring Duplicate ID Cache 20.10.4. Using Duplicate Detection with Bridges and Cluster Connections 20.11. JMS Bridges Expand section "20.11. JMS Bridges" Collapse section "20.11. JMS Bridges" 20.11.1. About Bridges 20.11.2. Create a JMS Bridge 20.12. Persistence Expand section "20.12. Persistence" Collapse section "20.12. Persistence" 20.12.1. About Persistence in HornetQ 20.13. HornetQ Clustering Expand section "20.13. HornetQ Clustering" Collapse section "20.13. HornetQ Clustering" 20.13.1. About Server Discovery 20.13.2. Broadcast Groups 20.13.3. Discovery Groups 20.13.4. Server Side Load Balancing 20.14. High Availability Expand section "20.14. High Availability" Collapse section "20.14. High Availability" 20.14.1. High Availability Introduction 20.14.2. About HornetQ Shared Stores 20.14.3. About HornetQ Storage Configurations 20.14.4. About HornetQ Journal Types 20.14.5. Configuring HornetQ for Dedicated Topology with Shared Store 20.14.6. HornetQ Message Replication 20.14.7. Configuring the HornetQ Servers for Replication 20.14.8. About High-availability (HA) Failover 20.14.9. Deployments on HornetQ Backup Servers 21. Transaction Subsystem Expand section "21. Transaction Subsystem" Collapse section "21. Transaction Subsystem" 21.1. Transaction Subsystem Configuration Expand section "21.1. Transaction Subsystem Configuration" Collapse section "21.1. Transaction Subsystem Configuration" 21.1.1. Transactions Configuration Overview 21.1.2. Configure the Transaction Manager 21.1.3. Configure Your Datasource to Use JTA Transaction API 21.1.4. Configure an XA Datasource 21.1.5. About Transaction Log Messages 21.1.6. Configure Logging for the Transaction Subsystem 21.2. Transaction Administration Expand section "21.2. Transaction Administration" Collapse section "21.2. Transaction Administration" 21.2.1. Browse and Manage Transactions 21.3. Transaction References Expand section "21.3. Transaction References" Collapse section "21.3. Transaction References" 21.3.1. JBoss Transactions Errors and Exceptions 21.3.2. Limitations on JTA Transactions 21.4. ORB Configuration Expand section "21.4. ORB Configuration" Collapse section "21.4. ORB Configuration" 21.4.1. About Common Object Request Broker Architecture (CORBA) 21.4.2. Configure the ORB for JTS Transactions 21.5. JDBC Object Store Support Expand section "21.5. JDBC Object Store Support" Collapse section "21.5. JDBC Object Store Support" 21.5.1. JDBC Store for Transactions 22. Mail subsystem Expand section "22. Mail subsystem" Collapse section "22. Mail subsystem" 22.1. Use custom transports in mail subsystem 23. Enterprise JavaBeans Expand section "23. Enterprise JavaBeans" Collapse section "23. Enterprise JavaBeans" 23.1. Introduction Expand section "23.1. Introduction" Collapse section "23.1. Introduction" 23.1.1. Overview of Enterprise JavaBeans 23.1.2. Overview of Enterprise JavaBeans for Administrators 23.1.3. Enterprise Beans 23.1.4. Session Beans 23.1.5. Message-Driven Beans 23.2. Configuring Bean Pools Expand section "23.2. Configuring Bean Pools" Collapse section "23.2. Configuring Bean Pools" 23.2.1. Bean Pools 23.2.2. Create a Bean Pool 23.2.3. Remove a Bean Pool 23.2.4. Edit a Bean Pool 23.2.5. Assign Bean Pools for Session and Message-Driven Beans 23.3. Configuring EJB Thread Pools Expand section "23.3. Configuring EJB Thread Pools" Collapse section "23.3. Configuring EJB Thread Pools" 23.3.1. Enterprise Bean Thread Pools 23.3.2. Create a Thread Pool 23.3.3. Remove a Thread Pool 23.3.4. Edit a Thread Pool 23.4. Configuring Session Beans Expand section "23.4. Configuring Session Beans" Collapse section "23.4. Configuring Session Beans" 23.4.1. Session Bean Access Timeout 23.4.2. Set Default Session Bean Access Timeout Values 23.5. Configuring Message-Driven Beans Expand section "23.5. Configuring Message-Driven Beans" Collapse section "23.5. Configuring Message-Driven Beans" 23.5.1. Set Default Resource Adapter for Message-Driven Beans 23.6. Configuring the EJB3 Timer Service Expand section "23.6. Configuring the EJB3 Timer Service" Collapse section "23.6. Configuring the EJB3 Timer Service" 23.6.1. EJB3 Timer Service 23.6.2. Configure the EJB3 timer Service 23.7. Configuring the EJB Asynchronous Invocation Service Expand section "23.7. Configuring the EJB Asynchronous Invocation Service" Collapse section "23.7. Configuring the EJB Asynchronous Invocation Service" 23.7.1. EJB3 Asynchronous Invocation Service 23.7.2. Configure the EJB3 Asynchronous Invocation Service Thread Pool 23.8. Configuring the EJB3 Remote Invocation Service Expand section "23.8. Configuring the EJB3 Remote Invocation Service" Collapse section "23.8. Configuring the EJB3 Remote Invocation Service" 23.8.1. EJB3 Remote Service 23.8.2. Configure the EJB3 Remote Service 23.9. Configuring EJB 2.x Entity Beans Expand section "23.9. Configuring EJB 2.x Entity Beans" Collapse section "23.9. Configuring EJB 2.x Entity Beans" 23.9.1. EJB Entity Beans 23.9.2. Container-Managed Persistence 23.9.3. Enable EJB 2.x Container-Managed Persistence 23.9.4. Configure EJB 2.x Container-Managed Persistence 23.9.5. CMP Subsystem Properties for HiLo Key Generators 24. Java Connector Architecture (JCA) Expand section "24. Java Connector Architecture (JCA)" Collapse section "24. Java Connector Architecture (JCA)" 24.1. Introduction Expand section "24.1. Introduction" Collapse section "24.1. Introduction" 24.1.1. About the Java EE Connector API (JCA) 24.1.2. Java Connector Architecture (JCA) 24.1.3. Resource Adapters 24.2. Configure the Java Connector Architecture (JCA) Subsystem 24.3. Deploy a Resource Adapter 24.4. Configure a Deployed Resource Adapter 24.5. Resource Adapter Descriptor Reference 24.6. View Defined Connection Statistics 24.7. Resource Adapter Statistics 24.8. Deploy the WebSphere MQ Resource Adapter 24.9. Install JBoss Active MQ Resource Adapter 24.10. Configure a Generic JMS Resource Adapter for Use with a Third-party JMS Provider 25. Deploy JBoss EAP 6 on Amazon EC2 Expand section "25. Deploy JBoss EAP 6 on Amazon EC2" Collapse section "25. Deploy JBoss EAP 6 on Amazon EC2" 25.1. Introduction Expand section "25.1. Introduction" Collapse section "25.1. Introduction" 25.1.1. About Amazon EC2 25.1.2. About Amazon Machine Instances (AMIs) 25.1.3. About JBoss Cloud Access 25.1.4. JBoss Cloud Access Features 25.1.5. Supported Amazon EC2 Instance Types 25.1.6. Supported Red Hat AMIs 25.2. Deploying JBoss EAP 6 on Amazon EC2 Expand section "25.2. Deploying JBoss EAP 6 on Amazon EC2" Collapse section "25.2. Deploying JBoss EAP 6 on Amazon EC2" 25.2.1. Overview of Deploying JBoss EAP 6 on Amazon EC2 25.2.2. Non-clustered JBoss EAP 6 25.2.3. Clustered JBoss EAP 6 25.3. Establishing Monitoring with JBoss Operations Network (JON) Expand section "25.3. Establishing Monitoring with JBoss Operations Network (JON)" Collapse section "25.3. Establishing Monitoring with JBoss Operations Network (JON)" 25.3.1. About AMI Monitoring 25.3.2. About Connectivity Requirements 25.3.3. About Network Address Translation (NAT) 25.3.4. About Amazon EC2 and DNS 25.3.5. About Routing in EC2 25.3.6. About Terminating and Restarting with JON 25.3.7. Configure an Instance to Register with JBoss Operations Network 25.4. User Script Configuration Expand section "25.4. User Script Configuration" Collapse section "25.4. User Script Configuration" 25.4.1. Permanent Configuration Parameters 25.4.2. Custom Script Parameters 25.5. Troubleshooting Expand section "25.5. Troubleshooting" Collapse section "25.5. Troubleshooting" 25.5.1. About Troubleshooting Amazon EC2 25.5.2. Diagnostic Information A. Supplemental References Expand section "A. Supplemental References" Collapse section "A. Supplemental References" A.1. Download Files from the Red Hat Customer Portal A.2. Configure the Default JDK on Red Hat Enterprise Linux B. Revision History Legal Notice Settings Close Language: 日本語 简体中文 Français English Language: 日本語 简体中文 Français English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 简体中文 Français English Language: 日本語 简体中文 Français English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF 23.9.2. Container-Managed Persistence Container-Managed Persistence (CMP) is an application server provided service that provides data persistence for Entity beans. Report a bug Previous Next