Solved

Title: Using Apache Tomcat JK2 connector with IIS6

Posted on 2006-06-09
3
338 Views
Last Modified: 2006-11-18
i have a web server with 2 websites running , one website uses asp while the other uses jsp . To make both live
I am trying to use tomcat JK2 connector to run apache tomcat behind iis6  i have gone through all the configuration even tried to the shiftomat.exe file but cant seem to get the iis to process the jsp work please how do i proceed.
here is what i have done
1.  i installed
j2sdk-1_4_2_10-nb-4_1-win-ml
jre-1_5_0_06-windows-i586-p
apache-tomcat-5.5.12

2. edited workers file
[shm:]
info=Scoreboard. Required for reconfiguration and status with multiprocess servers
file=C:\Program Files\Apache Software Foundation\Tomcat 5.5\temp\jk2.shm
size=1048576

[channel.socket:localhost:8009]
info=Ajp13 forwarding over socket
tomcatId=localhost:8009
port=8009
host=localhost

# define the worker
[ajp13:localhost:8009]
worker=ajp13:localhost:8009]
channel=channel.socket:localhost:8009



# Map webapps to the Web server uri space
info=map the whole webapps
[uri:/tomcat-docs/*]
[uri:/wanep/*]
[uri:/*.jsp]

the registry values have been done  and isapi redirector2 installed the status shows the green arrow pointing up
desperate tj
0
Comment
Question by:obiwan570
3 Comments
 
LVL 10

Accepted Solution

by:
sleep_furiously earned 250 total points
ID: 16874564
The first thing to note is that JK2 is unsupported, and has been since November 2004.  Development continues on JK instead, and JK is recommended for production.

Try connecting to port 8009 to check if the AJP listener is active:  telnet localhost 8009

You can also configure your workers2.properties file to get more detailed information.  At the top put:

[logger]
level=DEBUG

Check the logs for more information on what is happening.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Hi, in this article I'm going to teach you how to run your own site, and how to let people in (without IP). I'll talk about and explain each step... :) By the way, everything in this Tutorial is completely free and legal. This article is for …
It is possible to boost certain documents at query time in Solr. Query time boosting can be a powerful resource for finding the most relevant and "best" content. Of course the more information you index, the more fields you will be able to use for y…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question