Solved

building mod_jk2

Posted on 2004-04-11
5
183 Views
Last Modified: 2012-05-04
Hi all,

I'm awarding as many points as EE will let me for help with this. I'll award more too if there is some way that I can.

I downloaded jk2 2.0.4 to connect Tomcat 4.1.30 with Apache2 on a debian box. I have everything installed that I need - jdk1.4.2, Ant 1.6 and my env variables and classpath is correct as well. I have set this up before but it was with mod_jk and Apache 1.3 and it was much easier than jk2. I cannot get this to build at all and I've tried a ton of different things.

I'd really appreciate if someone that has done this recently could list the steps they did to get it to build. Thanks in advance,

-Pat
0
Comment
Question by:pat5star
  • 2
5 Comments
 
LVL 3

Author Comment

by:pat5star
ID: 10803697
Never mind. After working at it some more I finally got it to build correctly. Please close this question.

-Pat
0
 
LVL 1

Expert Comment

by:kalmen
ID: 10804015
I went through that nightmare. I tried jk1.* which worked fine, but this one didn't. Instead I used mod_proxy rewrite rule as recommended in the Tomcat Manual.
See the page: http://jakarta.apache.org/tomcat/tomcat-5.0-doc/proxy-howto.html

Basically, you'd add the lines:
ProxyPass         /myapp  http://localhost:8081/myapp
ProxyPassReverse  /myapp  http://localhost:8081/myapp

and from Tomcat (sorry for using tomcat 5, but its the one i used)
<Connector port="8081" ...
 proxyName="www.mycompany.com"
 proxyPort="80"/>

My conclusion is porbably that there is a bug, but I may be mistaken. But this solution worked perfectly, the only problem is you cannot have JSP files around your site, they have to be in /myapp to work.
0
 
LVL 1

Expert Comment

by:kalmen
ID: 10804018
Can you give me a hint of how the build was performed? Any Catch?
0
 
LVL 1

Accepted Solution

by:
GhostMod earned 0 total points
ID: 11139519
PAQd, 500 points refunded.

GhostMod
Community Support Moderator
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In Solr 4.0 it is possible to atomically (or partially) update individual fields in a document. This article will show the operations possible for atomic updating as well as setting up your Solr instance to be able to perform the actions. One major …
If you are a web developer, you would be aware of the <iframe> tag in HTML. The <iframe> stands for inline frame and is used to embed another document within the current HTML document. The embedded document could be even another website.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now