Jump To Close Expand all Collapse all Table of contents Data Grid Server Guide Red Hat Data Grid Expand section "Red Hat Data Grid" Collapse section "Red Hat Data Grid" Data Grid documentation Data Grid downloads Making open source more inclusive Providing feedback on Red Hat documentation 1. Getting started with Data Grid Server Expand section "1. Getting started with Data Grid Server" Collapse section "1. Getting started with Data Grid Server" 1.1. Data Grid Server requirements 1.2. Downloading Data Grid Server distributions 1.3. Installing Data Grid Server 1.4. Starting Data Grid Server 1.5. Passing Data Grid Server configuration at startup 1.6. Creating Data Grid users Expand section "1.6. Creating Data Grid users" Collapse section "1.6. Creating Data Grid users" 1.6.1. Granting roles to users 1.6.2. Adding users to groups 1.6.3. Data Grid user roles and permissions 1.7. Verifying cluster views 1.8. Shutting down Data Grid Server Expand section "1.8. Shutting down Data Grid Server" Collapse section "1.8. Shutting down Data Grid Server" 1.8.1. Shutdown and restart of Data Grid clusters 1.9. Data Grid Server installation directory structure Expand section "1.9. Data Grid Server installation directory structure" Collapse section "1.9. Data Grid Server installation directory structure" 1.9.1. Server root directory 2. Network interfaces and socket bindings Expand section "2. Network interfaces and socket bindings" Collapse section "2. Network interfaces and socket bindings" 2.1. Network interfaces Expand section "2.1. Network interfaces" Collapse section "2.1. Network interfaces" 2.1.1. Match and fallback strategies 2.2. Socket bindings 2.3. Changing the bind address for Data Grid Server Expand section "2.3. Changing the bind address for Data Grid Server" Collapse section "2.3. Changing the bind address for Data Grid Server" 2.3.1. Listening on all addresses 2.4. Data Grid Server ports and protocols Expand section "2.4. Data Grid Server ports and protocols" Collapse section "2.4. Data Grid Server ports and protocols" 2.4.1. Configuring network firewalls for Data Grid traffic 2.5. Specifying port offsets 3. Data Grid Server endpoints Expand section "3. Data Grid Server endpoints" Collapse section "3. Data Grid Server endpoints" 3.1. Data Grid Server endpoints Expand section "3.1. Data Grid Server endpoints" Collapse section "3.1. Data Grid Server endpoints" 3.1.1. Hot Rod 3.1.2. REST 3.1.3. Memcached 3.1.4. Comparison of endpoint protocols 3.1.5. Hot Rod client compatibility with Data Grid Server 3.2. Configuring Data Grid Server endpoints 3.3. Endpoint connectors 3.4. Endpoint IP address filtering rules 3.5. Inspecting and modifying rules for filtering IP addresses 4. Endpoint authentication mechanisms Expand section "4. Endpoint authentication mechanisms" Collapse section "4. Endpoint authentication mechanisms" 4.1. Data Grid Server authentication 4.2. Configuring Data Grid Server authentication mechanisms Expand section "4.2. Configuring Data Grid Server authentication mechanisms" Collapse section "4.2. Configuring Data Grid Server authentication mechanisms" 4.2.1. Disabling authentication 4.3. Data Grid Server authentication mechanisms Expand section "4.3. Data Grid Server authentication mechanisms" Collapse section "4.3. Data Grid Server authentication mechanisms" 4.3.1. SASL authentication mechanisms 4.3.2. SASL quality of protection (QoP) 4.3.3. SASL policies 4.3.4. HTTP authentication mechanisms 5. Security realms Expand section "5. Security realms" Collapse section "5. Security realms" 5.1. Creating security realms 5.2. Setting up Kerberos identities 5.3. Property realms 5.4. LDAP realms Expand section "5.4. LDAP realms" Collapse section "5.4. LDAP realms" 5.4.1. LDAP realm principal re-writing 5.5. Token realms 5.6. Trust store realms 5.7. Distributed security realms 6. Configuring TLS/SSL encryption Expand section "6. Configuring TLS/SSL encryption" Collapse section "6. Configuring TLS/SSL encryption" 6.1. Configuring Data Grid Server keystores Expand section "6.1. Configuring Data Grid Server keystores" Collapse section "6.1. Configuring Data Grid Server keystores" 6.1.1. Generating Data Grid Server keystores 6.1.2. Configuring TLS versions and cipher suites 6.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography Expand section "6.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography" Collapse section "6.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography" 6.2.1. Configuring the PKCS11 cryptographic provider 6.2.2. Configuring the Bouncy Castle FIPS cryptographic provider 6.3. Configuring client certificate authentication 6.4. Configuring authorization with client certificates 7. Storing Data Grid Server credentials in keystores Expand section "7. Storing Data Grid Server credentials in keystores" Collapse section "7. Storing Data Grid Server credentials in keystores" 7.1. Setting up credential keystores 7.2. Securing passwords for credential keystores 7.3. Credential keystore configuration 7.4. Credential keystore references 8. Security authorization with role-based access control Expand section "8. Security authorization with role-based access control" Collapse section "8. Security authorization with role-based access control" 8.1. Data Grid user roles and permissions Expand section "8.1. Data Grid user roles and permissions" Collapse section "8.1. Data Grid user roles and permissions" 8.1.1. Permissions 8.1.2. Role and permission mappers 8.1.3. Configuring role mappers 8.2. Configuring caches with security authorization 9. Enabling and configuring Data Grid statistics and JMX monitoring Expand section "9. Enabling and configuring Data Grid statistics and JMX monitoring" Collapse section "9. Enabling and configuring Data Grid statistics and JMX monitoring" 9.1. Enabling statistics in remote caches 9.2. Enabling Hot Rod client statistics 9.3. Configuring Data Grid metrics 9.4. Registering JMX MBeans Expand section "9.4. Registering JMX MBeans" Collapse section "9.4. Registering JMX MBeans" 9.4.1. Enabling JMX remote ports 9.4.2. Data Grid MBeans 9.4.3. Registering MBeans in custom MBean servers 9.5. Exporting metrics during a state transfer operation 9.6. Monitoring the status of cross-site replication 10. Adding managed datasources to Data Grid Server Expand section "10. Adding managed datasources to Data Grid Server" Collapse section "10. Adding managed datasources to Data Grid Server" 10.1. Configuring managed datasources 10.2. Configuring caches with JNDI names 10.3. Connection pool tuning properties 11. Setting up Data Grid cluster transport Expand section "11. Setting up Data Grid cluster transport" Collapse section "11. Setting up Data Grid cluster transport" 11.1. Default JGroups stacks 11.2. Cluster discovery protocols Expand section "11.2. Cluster discovery protocols" Collapse section "11.2. Cluster discovery protocols" 11.2.1. PING 11.2.2. TCPPING 11.2.3. MPING 11.2.4. TCPGOSSIP 11.2.5. JDBC_PING 11.2.6. DNS_PING 11.2.7. Cloud discovery protocols 11.3. Using the default JGroups stacks 11.4. Customizing JGroups stacks Expand section "11.4. Customizing JGroups stacks" Collapse section "11.4. Customizing JGroups stacks" 11.4.1. Inheritance attributes 11.5. Using JGroups system properties Expand section "11.5. Using JGroups system properties" Collapse section "11.5. Using JGroups system properties" 11.5.1. Cluster transport properties 11.5.2. System properties for cloud discovery protocols Expand section "11.5.2. System properties for cloud discovery protocols" Collapse section "11.5.2. System properties for cloud discovery protocols" 11.5.2.1. Amazon EC2 11.5.2.2. Google Cloud Platform 11.5.2.3. Azure 11.5.2.4. OpenShift 11.6. Using inline JGroups stacks 11.7. Using external JGroups stacks 11.8. Encrypting cluster transport Expand section "11.8. Encrypting cluster transport" Collapse section "11.8. Encrypting cluster transport" 11.8.1. Securing cluster transport with TLS identities 11.8.2. JGroups encryption protocols 11.8.3. Securing cluster transport with asymmetric encryption 11.8.4. Securing cluster transport with symmetric encryption 11.9. TCP and UDP ports for cluster traffic 12. Creating remote caches Expand section "12. Creating remote caches" Collapse section "12. Creating remote caches" 12.1. Default Cache Manager 12.2. Creating caches with Data Grid Console 12.3. Creating remote caches with the Data Grid CLI 12.4. Creating remote caches from Hot Rod clients 12.5. Creating remote caches with the REST API 13. Running scripts and tasks on Data Grid Server Expand section "13. Running scripts and tasks on Data Grid Server" Collapse section "13. Running scripts and tasks on Data Grid Server" 13.1. Adding tasks to Data Grid Server deployments Expand section "13.1. Adding tasks to Data Grid Server deployments" Collapse section "13.1. Adding tasks to Data Grid Server deployments" 13.1.1. Data Grid Server tasks 13.2. Adding scripts to Data Grid Server deployments Expand section "13.2. Adding scripts to Data Grid Server deployments" Collapse section "13.2. Adding scripts to Data Grid Server deployments" 13.2.1. Data Grid Server scripts Expand section "13.2.1. Data Grid Server scripts" Collapse section "13.2.1. Data Grid Server scripts" 13.2.1.1. Script metadata 13.2.1.2. Script bindings 13.2.1.3. Script parameters 13.2.2. Programmatically Creating Scripts 13.3. Running scripts and tasks 14. Configuring Data Grid Server logging Expand section "14. Configuring Data Grid Server logging" Collapse section "14. Configuring Data Grid Server logging" 14.1. Data Grid Server log files Expand section "14.1. Data Grid Server log files" Collapse section "14.1. Data Grid Server log files" 14.1.1. Configuring Data Grid Server logs 14.1.2. Log levels 14.1.3. Data Grid logging categories 14.1.4. Log appenders 14.1.5. Log pattern formatters 14.1.6. Enabling the JSON log handler 14.2. Access logs Expand section "14.2. Access logs" Collapse section "14.2. Access logs" 14.2.1. Enabling access logs 14.2.2. Access log properties 14.3. Audit logs Expand section "14.3. Audit logs" Collapse section "14.3. Audit logs" 14.3.1. Enabling audit logging 14.3.2. Configuring audit logging appenders 14.3.3. Using custom audit logging implementations 15. Performing rolling upgrades for Data Grid Server clusters Expand section "15. Performing rolling upgrades for Data Grid Server clusters" Collapse section "15. Performing rolling upgrades for Data Grid Server clusters" 15.1. Setting up target Data Grid clusters 15.2. Synchronizing data to target clusters 16. Troubleshooting Data Grid Server deployments Expand section "16. Troubleshooting Data Grid Server deployments" Collapse section "16. Troubleshooting Data Grid Server deployments" 16.1. Getting diagnostic reports from Data Grid Server 16.2. Changing Data Grid Server logging configuration at runtime 16.3. Gathering resource statistics from the CLI 16.4. Accessing cluster health via REST 16.5. Accessing cluster health via JMX 17. Reference Expand section "17. Reference" Collapse section "17. Reference" 17.1. Data Grid Server 8.4.2 Readme Expand section "17.1. Data Grid Server 8.4.2 Readme" Collapse section "17.1. Data Grid Server 8.4.2 Readme" 17.1.1. Requirements 17.1.2. Starting servers 17.1.3. Stopping servers 17.1.4. Configuration 17.1.5. Bind address 17.1.6. Bind port 17.1.7. Clustering address 17.1.8. Cluster stacks 17.1.9. Authentication 17.1.10. Server home directory 17.1.11. Server root directory 17.1.12. Logging Legal Notice Settings Close Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Data Grid Server Guide Red Hat Data Grid 8.4Deploy, secure, and manage Data Grid Server deploymentsRed Hat Customer Content ServicesLegal NoticeAbstract Install and configure Data Grid Server deployments. Next