- Introduction to WebLogic:
------------------------------ -
- WebLogic Server Domains
- Directory Structures
- Install WebLogic Server
- The Configuration Wizard
- The Configuration Wizard: Creating A New Domain
- Starting The Administrative Server
- The Administration Console
- Administrative Tasks
- Setting the Domain Environment
- Automatically Starting Admin Servers
- Managed Servers
- Password boot.properties.
- Examining Server Status.
- Shutting Down Servers.
- Start Scripts.
- config.xml.
- WLST:
-------
- The WLST
- MBeans And JMX Administration
- MBeans And WLST
- Starting WLST
- Simple WLST Commands
- WLST Is Hierarchical
- Navigating WLST
- MBean Operations
- Other WLST Commands
- Scripting With WLST
- Recording WLST Scripts
- Sample Recorded Script
- WebLogic Logging:
----------------------
- Introduction
- WebLogic Logging Services
- Java Logging API
- Log4j
- Specifying the Logging Implementation
- Message Severity
- WebLogic Server Logs
- HTTP Access Log
- JMS Log
- Domain Log
- Viewing Logs
- Application Structure:
--------------------------
- Java Web Application Architecture
- J2EE Architecture
- Web Application Programming Model MVC
- An MVC Example
- What is Application Assembly?
- Web Module
- EJB Modules
- Enterprise Application Modules
- Accessing Web Applications
- Deployment:
---------------
- The Process
- Deployment Overview
- Archive Vs Expanded Directory
- Default Deployment Names
- Deployment Methods
- Starting/testing/Monitoring/
Updating/stopping/Deleting an Application - Editing Deployment Descriptors
- Deployment Modes:
-----------------------
- Using Command Line Deployment
- T3 Protocol Overview
- wldeploy Ant Task
- WebLogic Scripting Tool (WLST)
- Deployment Plans
- JDBC:
-------
- Types of JDBC Drivers
- Working with a Database via JDBC (Client side)
- The Need for Connection Pooling
- Connection Pooling and Data Sources
- Connecting with Data Source
- Steps in using Connection Pooling
- Admin Tasks for Connection Pools and Data Sources
- JDBC Driver Support in WebLogic Server
- Database Access Using WebLogic
- Working with Data Sources
- Creating a Data Source
- Editing Data Source Properties
- Monitoring Data Source and Connection Pools.
- JMS:
-----
- The Trouble with RMI/IIOP
- Messaging to the Rescue
- Messaging Features
- Publish/Subscribe
- Point-to-Point
- Java Messaging Service
- Terminology
- Durable Subscription
- Deployment Descriptor Entry
- Binding the Queue or Topic
- Transactions & Guaranteed Delivery
- WebLogic JMS Server
- Creating a JMS Server
- Creating a Connection Factory
- Creating a Topic
- Threshold and Quota
- Configuring Threshold and Quota
- Creating a Distributed Topic/Queue
- Creating a Distributed Topic
- Monitoring JMS in WebLogic
- Messaging Bridge
- NodeManager:
------------
- Node Manager Overview
- Node Manager Functionality & Configuration
- Starting/Restarting/shutting an Administration Server from Node Manager
- Starting/Restarting/shutting a Managed Server from Node Manager
- Creating a Machine
- Adding Server Instances To a Machine
- Starting The Node Manager.
- Monitoring Managed Servers
- Node Manager Logs and Configuration Files.
- Security:
---------
- WebLogic Server Security
- Authentication / Authorization
- Resources That Can Be Secured
- Authentication Mechanisms
- Overview: Security Tasks For Securing Resources
- WebLogic Security Realms
- Configuring A User Registry
- The Embedded LDAP Server
- Managing Users/Groups
- User Lockout
- Managing Roles
- Securing A Resource
- WebLogic Server Policies
- Specifying A Policy Condition
- Policies And Roles
- Creating A Scoped Role
- Declarative Security
- Example: Securing A Web Resource
- Example: Securing A Web Resource Specifying Roles
- Example: Securing A Web Resource Specifying Constraints
- Example: Securing A Web Resource Specifying Constraints
- Example: Securing A Web Resource Auth Method
- Example: Securing A Web Resource Auth Method
- Example: Securing A Web Resource Map Roles
- Encryption
- SSL
- Public Key / Private Key Encryption
- Secure Communication Over The Web - SSL
- SSL And WebLogic Server
- Creating A Digital Certificate
- Dealing With A CA
- Configuring WebLogic Server SSL: Keystores
- Configure WebLogic SSL Settings
- Clustering:
-----------
- What Is Clustering?
- What Components Can Be Clustered?
- Basic Cluster Diagrams
- The Load Balancer
- Web Container Load Balancing
- Horizontal Vs. Vertical Clustering
- Clustering WebLogic Server
- WebLogic Cluster Requirements
- Create A Cluster
- Multicasting vs. Unicasting
- Configure Application Resources
- Deploy Applications To The Cluster
- Configure A Load Balancer
- Load Balancer Options
- Hardware Load Balancers
- Proxy Plug In Load Balancers
- HttpClusterServlet Load Balancer
- Session State
- Clustered Session State
- Session State Strategies
- In-Memory Replication
- Configuring Session State Replication
- JDBC Session Persistence
- JDBC Multi Data Sources
- Creating A Multi Data Source
- Performance Tuning:
-------------------
- Response Time
- The significance of throughput
- Response Time Curve
- Think time
- Saturation
- Response time at system saturation
- Basic Tuning Methodology
- Areas To Tune
- Tuning Hardware
- Tune The Operating System
- Tune The JVM
- JVM Choices
- Memory Performance Concerns
- Client or Server VM
- The Heap
- Configure The Heap Size
- Allocation Failure
- Garbage Collection
- Analyzing Verbose GC - Sun
- Verbose GC - JRockit
- Thread Local Heap (TLH)
- Memory Tuning Goals
- Effect of Initial Heap Size on GC
- Controlling the GC Timings
- Optimizing GC
- Self Optimizing Throughput Collector
- JRockit Management Console
- JRA Recording
- Tuning WebLogic Server
- Thread Settings
- Monitoring Threads
- Connection BackLog
- Tuning The Back End
No comments:
Post a Comment