Services

JDBC
 Connection Pools
  General
   Name The user-defined name of the connection pool.
   URL This is the URL that you would use in a Java program to open a direct connection to the database.
   Driver Classname The full class name of the JDBC driver you want to use to access the data source.
   Properties key=value Use this field to enter various fields such as user, password, server, and so on. These key=value pairs (e.g., name=oracle) will be passed to the JDBC driver.
   ACLName Name of the access control list.
    PasswordThe password specified in this field will override any password you may have specified in the Properties box as a name=value pair.
  Connections
   Initial Capacity The number of database connections that will be created when the pool is started. Note that if the server is unable to create this number of connections, creation of the connection pool will fail.
   Maximum Capacity An upper limit on the number of connections.
   Capacity Increment The number of new connections that will be created when all the existing connections are occupied.
   Login Delay Seconds Some databases freak out if bombarded by simultaneous requests for connections. Use this property to build in a (brief) delay between new connection requests.
   Refresh Period WebLogic tests the database connections every so often to make sure that they are still in working order. This value sets the number of minutes between tests.
   Supports Local Transaction Set to true if the XA connection pool supports SQL with no global transaction.
   Allow Shrinking Whether or not the number of connections in the pool is permitted to shrink.
   Shrink Period If shrinking is allowed, this is the number of minutes that must elapse between a connection going idle and the connection pool being shrunk. Note also that this comes into play only when the pool has been enlarged beyond its initial capacity.
  Testing
   Test Table Name For databases such as Oracle that do connection testing, enter the test table name here. (DUAL is the test table name for Oracle.)
   Test Reserved Connections By checking this box, you are telling WebLogic to test a connection requested by a client. So doing incurs a slight performance hit but guarantees the client a working connection.
   Test Released Connections By checking this box you are telling WebLogic to check whether connections that have just been released by a client process are still functional.
 Multipools
  In WebLogic 6.x, Multipools are a mechanism for creating pools of pools.
  General
   Name Name of the multipool.
   Algorithm Type “High Availability” or “Load Balancing.”
   ACLName Optional Access Control List.
  Pools
   Pool List The regular pools contained in your multipool.
 Data Sources
  Configuration
   Name Unique name for the data source.
   JNDI Name The data source name under JNDI.
   Pool Name The JDBC connection pool to which the data source will be linked. The pool specified here should already have been created.
   Row Prefetch Enabled When checked, this option improves performance by precaching the number of rows specified by Row Prefetch SIze. It is not necessary to prefetch rows if all processes are running on the same machine.
   Row Prefetch Size When Row Prefetch is enabled, this is the number of rows that will be sent to client processes upon request.
   Stream Chunk Size The size of the batches of data that are sent to the client processes.
  Targets
   Targets-Server The WebLogic server instance for the data source.
  Clusters
   Targets-Cluster The WebLogic cluster instance for the data source.
 Tx Data Sources
 Tx, or transactional, data sources are used by JTA. They are essentially a transaction-aware front end to a JDBC connection pool.
  Configuration
   Name Name of the Tx data source.
   JNDI Name JNDI name of the data source.
   Pool Name Name of the JDBC pool with which this Tx data source is to be associated.
   Enable Two-Phase Commit Two-phase commitment increases recoverability in the case of a disaster at a slight cost to performance.
   Row Prefetch Enabled When checked, this option will download rows to (presumably remote) client processes in batches of the size specified by Row Prefetch Size. Not necessary if client processes are running under the local JVM.
   Row Prefetch Size The number of rows to be prefetched.
   Stream Chunk Size Size, in kilobytes, of the data blocks containing the rows.
JMS
 Connection Factories
  General
   Name A Java identifier for the connection factory. Possibly but not necessarily the same as the JNDI name.
   JNDIName The JNDI identifier as it is known within the JNDI namespace.
   Client ID This field tells WebLogic to deliver all messages on a particular topic to the specified subscriber, regardless of whether or not that subscriber is listening when the message is posted. Such a client is called a durable subscriber. Note that true “durable subscriber”-ness also requires the configuration of a message store.
   Default Priority Default numeric priority assigned to a message. Range is 0 (lowest) to 9 (highest), with a default of 4.
   Default Time To Live Upper limit on a message's existence.Given in milliseconds.
   Default Time To Deliver Specify a number of milliseconds to wait before delivering message.
   Default Delivery Mode “Persistent” (guarantee message delivery but slower) or “Nonpersistent” (faster but no guarantee of delivery).
   Default Redelivery Delay You can use this value to build in a delay between the time messages are rolled back and the time they are redelivered.
   Messages Maximum Upper limit on the number of messages in an asynchronous session that have not been passed to a message listener. –1 = “unlimited.”
   Overrun Policy One of “Keep Old” or “Keep New.”
  Transactions
   Transaction Timeout When transactions are enabled, this value specifies the number of seconds before a timeout.
   User Transactions Enabled When checked, the connection factory will create sessions that are JTA aware.
   XAConnection Factory Enabled Check to create new connections with the transaction-aware connection factory.
 Templates
  General
   Name Name of the template.
   Destination Keys Choose from the supplied list of registered destination keys.
  Thresholds and Quotas
   Bytes Maximum Maximum number of bytes that may be stored in the destination. –1 means unlimited.
   Bytes Threshold High If not set to –1 (unlimited), destination-level bytes paging will begin when this threshold is exceeded.
   Bytes Threshold Low Below this threshold, bytes paging is stopped.
   Bytes Paging Check to enable bytes paging.
   Messages Maximum Upper limit on the number of messages that can be stored in the destination.
   Messages Threshold High Destination-level messages paging starts when this threshold is exceeded.
   Messages Threshold Low Destination-level messages paging is stopped when the number of messages falls below this level.
  Override
   Priority Override When set, all arriving messages will have their priority set to the new value. –1 leaves message priority as set by the originator.
   Time-To-Live Override When set, all arriving messages will have their time-to-live updated to this new value. The default value of –1 leaves the TTL at the value set by the message originator.
   Time-To-Deliver Override When set, all arriving messages will have their time-to-deliver updated to this new value. The default value of –1 leaves the TTL at the value set by the message originator.
   Delivery Mode Override When set, all arriving messages will have their delivery mode updated to this new value. The default value of –1 leaves the TTL at the value set by the message originator.
  Redelivery
   Redelivery Delay Override The number of milliseconds the server will delay before it attempts to redeliver rolled-back messages.
   Redelivery Limit Upper limit on the number of redelivery attempts.
   Error Destination The final resting place for redelivered messages that have exceeded their redelivery limit.
 Destination Keys
  Configuration
   Name The name for the destination key. This is an arbitrary value, but it's best to choose something meaningful.
   Property The property of the message that you will be keying off. Note that in order for this to work, your application developers must be including this property in their message.
   Key Type The type of the key you will be sorting on. One of: Boolean, Byte, Int, Short, Long, Float, Double, String.
   Direction Whether to sort ascending or descending.
 Stores
  Configuration
   Name Name of the JMS backing store.
   Store Connection Pool Connection pool associated with the store.
   Prefix Name Use this prefix to distinguish between multiple backing stores in the same database.
  Servers
   Name Name of the server.
   Store A persistent store from the JMS server. (The store must already exist at creation time.)
   Temporary Template JMS template used to create all temporary destinations.
 XML
  Configuration
   Name Name of the XML registry.
   DocumentBuilder-Factory When left blank, the server will use the default mechanism for generating XML documents.
   SAXParserFactory When left blank, the server will parse documents in the default manner. If a custom value is specified, it should be compatible with the builder specified above.
   Transformer Factory Specify the transformer factory used to apply XSL style sheets to the XML documents.
   When To Cache Cache on reference (for lightly used documents) or cache on initialization (for heavily used documents).
  Targets
   Server Specify a target server.
  Notes
JTA
 Configuration
  General
  Name  Name of the domain.
   Console Enabled When checked, you can manage the domain using the console. Otherwise, management must be done from the command line.
   Console Context Path If you wish to invoke the console from your browser under some name other than console, specify that name here. If you do change it, make sure you don't forget what you change it to.
  JTA
   Timeout Seconds The number of seconds before a transaction is rolled back.
   Abandon Timeout Seconds Number of seconds before a transaction is abandoned.
   BeforeCompletion Iteration Limit Use this value to set an upper limit on the number of times the beforeCompletion() method can be called.
   Max Transactions Upper limit on the number of transactions that may be simultaneously active.
   Max Unique Name Statistics Upper limit on the number of unique names that the server will track performance of.
   Forget Heuristics When checked, the server will not track the completions of transactions that fall outside the domain of the transaction manager.
  SNMP
   Enabled Click to enable the SNMP agent.
   SNMP Port The port over which the SNMP agent will communicate with the SNMP manager.
   MIB Data Refresh Interval The number of seconds between updates to the MIB.
   Server Status Check Interval Factor The factor by which the number of seconds specified in the MIB data refresh interval is multiplied to arrive at an interval between which the Managed servers are polled by the Administration server.
   Community Prefix Use this value to define an SNMP community name; the default is “public.”
   Debug Level 0 is no debugging, 3 is very verbose.
   Targeted Trap Destinations Toggle the trap destinations from the list.
  Logging
   File Name The domain log file.
   Rotation Type Rotate by size, time, or none.
   File Min Size When rotating by size, this value specifies a threshold for log rotation.
   File Time Span When rotating by time, this value specifies the number of hours between rotations.
   Number of Files Limited If checked, logging will stop when the number of log files is exceeded.
   File Count When the number of log files is limited, this is the limit.
  Applications
   Auto Deployed Enabled Uncheck to prevent applications from deploying automatically (the default behavior).
   Auto Update Interval The number of milliseconds between checks for newly deployed applications.
 Security
  General
   Audit Provider Class Click to enable custom security auditing by the specified Java class.
   Guest Disabled Click to disable guest account access.
  Filerealm
   Caching Realm The class that is doing audits for the filerealm.
   Max Users Upper limit on the number of users in the realm.
   Max Groups Upper limit on the number of groups in the realm.
   Max ACLs Upper limit on the number of ACLs in the realm.
  Passwords
   Minimum Password Length Shortest acceptable user password.
   Lockout Enabled When checked, user accounts will be disabled when they exceed the number of failed logins specified by Lockout Threshold.
   Lockout Threshold Upper limit on the number of failed logins, after which the user account will be locked.
   Lockout Duration Number of minutes a user lockout lasts.
   Lockout Reset Duration The number of minutes that must elapse before the “failed lockout” counter is reset.
   Lockout Cache Size The size of the failed lockout cache.
 Proxies
  General
   Name The name of the resource (typically a server) for which the Administration server is serving as a proxy.
   Port The network port over which SNMP communication should occur. Note that this value must be unique; in particular, it should not be the same as the port of the Administration console.
   OID Root The MIB number that designates the top of the OID tree under which the resource is proxied.
   Community The name of the community of which the resource is a member, as understood by the SNMP manager.
   Timeout The number of seconds that must elapse before the resource will be considered to have failed.
 Traps
  Monitors
  Monitors may be of type Gauge, String, or Counter depending on how the attribute that they monitor is displayed. Regardless of the display type, all the general attributes are the same.
  General
   Name Name of the Monitor (not the MBean)
   Monitored MBean Type Type of the MBean containing the monitored atrribute.
   Monitored MBean Name Name of the MBean to monitor.
   Monitored Attribute Name Name of the attribute contained within the MBean to be monitored.
   Polling Interval Number of seconds between checks.
   Threshold High When the monitored value exceeds this threshold, an SNMP trap is generated.
   Threshold Low When the monitored value drops below this threshold, an SNMP trap is generated.
 Log Filters
  General
   Name Name of the log filter.
   Severity Level Threshold of warning level.
   Subsystem Names The name of the subsystem to be monitored.
   User IDs The user IDs to whom notification is sent when a trap is generated.
   Message IDs Use this value if you wish to trap message IDs in the log.
   Message Substring Use this value to specify a text string to look for in the log.
 Attribute Changes
  Configuration
   Name Name of the attribute change to be trapped.
   Attribute MBean Type Type of the MBean to be monitored for attribute changes.
   Attribute MBean Name Name of the MBean to monitor.
   Attribute Name Attribute within the MBean to monitor.
   Enabled Servers Servers enabled with this trap.
 Trap Destinations
  General
   Name Name of the SNMP manager to notify when traps are generated.
   Community The name of the SNMP community to which the trap applies.
   Host The host on which the SNMP manager is running.
   Port The port that the SNMP manager monitors for reports from its agents.
WLEC     
WLEC is a mechanism for creating a pool of connections to Tuxedo CORBA objects.
 Configuration
  General
   Name Name of the WLEC connection pool.
   Primary The addresses for the IIOP listener/handlers that establish a connection between the WLEC connection pool and the WLEC domain.
   Failover The address of failover listener/handlers.
   Domain The name of the WLEC domain to which the pool is connected.
   Minimum Minimum number of IIOP connections in the pool.
   Maximum Maximum number of IIOP connections in the pool.
  Security
   User Name The name of the qualified WLEC user.
   User Password Password for the user specified above.
   User Role Values are application specific. Generally speaking, a valid role as implemented by the developer.
   Application Password The obvious.
   Minimum Lower limit on encryption level.
   Encryption Level 0 = Unencrypted

40 = 40-bit encryption key

56 = 56-bit encryption key

128 = 128-bit encryption key
   Maximum Upper limit on encryption level.
    Encryption Level0 = Unencrypted

40 = 40-bit encryption key

56 = 56-bit encryption key

128 = 128-bit encryption key
   Enable Certificate Authentication Check to use certificate authentication.
   Enable Security Context Check to enable security context.
Jolt
 Configuration
  General
   Name Name of the Jolt connection pool.
   Minimum Pool Size Number of connections created at startup.
   Maximum Pool Size Upper limit on the number of simultaneous connections.
   Recv Timeout Number of seconds to wait for a response from Tuxedo before timing out. The default value of 0 means unlimited.
   Security Context Enabled Enable the security context for the connection pool.
  Addresses
   Primary Addresses Primary IP addresses for the Tuxedo domain.
   Failover Addresses Failover IP addresses for the Tuxedo domain.
  User
   User Name User name.
   User Role Security role.
   User Password The obvious.
   Application Password Ditto.
Virtual Hosts
In the context of WebLogic, a virtual host is a collection of one or more nicknames to which an application may be configured to respond. This is a simple textual link between a configured application and the client processes that may access it.
  General
   Name Name of the virtual host.
   Virtual Host Names The names to which the application will respond.
   Default Web App The applications linked to the virtual host names.
  Logging
   Logging Enabled Check to enable logging by the virtual host.
   Log File Name Name of the file to which virtual host information will be logged.
   Log File Format common = common HTTP log file format, extended = more verbose logging.
   Max Log File Size KBytes If rotation is by size, this is the threshold above which logs will be rotated.
   Log Rotation Type Must be either “by size” or “by date.”
   Log Rotation The number of minutes after which the log.
   Period Mins files will be rotated.
   Log File Flush Secs The number of seconds after which data is flushed from the buffer into the log file.
   Log Rotation Time Begin The time of the first rotation of the log file.
  HTTP
   Default Server Name The name of the local HTTP server, as presented by WebLogic when redirecting requests.
   WAP Enabled Check to shrink the size of the session ID.
   Post Timeout Secs How long the HTTP server will wait between receiving portions of POSTed data before assuming the client process is timed out.
   Max Post Time Secs Upper limit on the number of seconds in any individual POST transaction.
   Max Post Size Upper limit, in kilobytes, of any one POST.
   Keep Alive Enabled Whether the HTTP server will allow a client process to perform multiple requests in a single transaction. (Enable keepalives whenever possible, as they improve performance.)
   Keep Alive Secs Upper limit on a single session, when keepalives are enabled.
   HTTPs Keep Upper limit on the length of secure (SSL).
   Alive Secs keepalive sessions, in seconds.
 Mail
  Configuration
   Name Name of the mail session.
   JNDI Name Properties JNDI name of the mail session.
 File T3
  Configuration
   Name Name of the file T3.
   Path Path to the file T3 component.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.113.193