mod_jk JkMount

Posted on 2009-02-22
Last Modified: 2013-12-14
I'm trying to configure a mod_jk connector. I know there are other new connectors such as mod_proxy but mod_jk is already set up so I'd like to continue with it.

I am trying to figure out how to get the link to work the same as

I may have other directories called WPBL2 or WPBL3 so I can't just use the asterisk after WPBL.
Any thoughts?
LoadModule jk_module modules/

JkWorkersFile "/etc/httpd/conf/"

JkLogFile "/var/log/httpd/mod_jk.log"

JkLogLevel info


JkShmFile     /var/log/httpd/mod_jk.shm

JkLogFile  /var/log/httpd/mod_jk.log

JkLogLevel info

# end additional




     JkMount /jsp-examples/* tomcat

     JkMount /WPBL/* tomcat

     JkMount /tomcat-manager tomcat

     JkMount /tomcat-manager/* tomcat

     JkMount /manager/* tomcat


Open in new window

Question by:Hokester
    LVL 27

    Expert Comment

    What about forcing a redirect to /WPBL/? Wouldn't that be the easiest solution? Like [1]. I don't know, if mod_alias runs prior mod_jk - both are registered as "run middle", so if a redirect could be a solution for you, you may give RedirectMatch a try.
    RedirectMatch 301 ^/(WPBL)$$1/

    Open in new window

    LVL 92

    Expert Comment

    >      JkMount /WPBL/* tomcat

    we use that here for directing all traffic starting with /WPBL to tomcat
    Can you explain your problem further


    Author Comment

    When I type in, I get this:
    Not Found

    The requested URL /WPBL was not found on this server.

    However, when I type in I get my tomcat webapp named WPBL.
    LVL 92

    Expert Comment

    is the not found coming from apache or tomcat?

    LVL 92

    Accepted Solution

    have you tried adding:

         JkMount /WPBL tomcat


    Author Closing Comment

    Oddly, I had tried this. However now in my file I tried
         JkMount /WPBL/* tomcat
         JkMount /WPBL tomcat

    With both of them in there, either works now. Thanks guys for all your help.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    In Solr 4.0 it is possible to atomically (or partially) update individual fields in a document. This article will show the operations possible for atomic updating as well as setting up your Solr instance to be able to perform the actions. One major …
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now