Solved

Configuring Quartz scheduler for failover in Weblogic Cluster

Posted on 2010-11-08
4
2,980 Views
Last Modified: 2013-12-10
How do I configure my quartz schedular to run in weblogic cluster, that is the schedular should be running only on a single node and should get migrated to another node up on failover.

I have gone through the below link but still i am not sure of its behaivour.

http://java-x.blogspot.com/2006/12/using-quartz-scheduler-in-cluster.html

Regars
Suresh.
0
Comment
Question by:pkoivula
  • 3
4 Comments
 

Author Comment

by:pkoivula
ID: 34090416
Can any one reply to my question
0
 
LVL 19

Accepted Solution

by:
ramazanyich earned 500 total points
ID: 34090888
actually quartz is using it's own clustering mechanism. It does high-availability and load balancing itself.
It is nicely described in official documentation at http://quartz-scheduler.org/docs/configuration/ConfigJDBCJobStoreClustering.html

Main points are:
1. you must use JDBC JObStore with the same JDBC connection parameters on all your weblogic managed servers in the cluster.
2. time on all servers must be synchronized
0
 

Author Comment

by:pkoivula
ID: 34091517
I have also gone throught the official link and configured based on it, I have attached the quartz.properties.

The only difference I have is I am using org.quartz.jobStore.driverDelegateClass = org.quartz.impl.jdbcjobstore.WebLogicDelegate where as the document uses  org.quartz.jobStore.driverDelegateClass =org.quartz.impl.jdbcjobstore.oracle.OracleDelegate  will this make any difference.
I am using MSSQL as my dadabase.
I have configured all my managed server in a single domain ( single box) which will not have time synchroniz issue.
 
Regards
Suresh
 
 

quartz.txt
0
 

Author Closing Comment

by:pkoivula
ID: 34109652
none
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using BigFix Actions 7 115
Allow Firefox to use Java 6 plugin? 15 47
Filemaker 14 vs Delphi Embarcadero 7 200
Windows Server Backup - behind the scenes management algorithm 8 74
Preface   In the first 100 days of the Macintosh release in January 1984, Apple sold 72,000 of the computers. Relatively cheap, easy-to-use personal computer with a graphical operating system. I've never seen this model. I did see this one:   …
Verbose logging is used to diagnose garbage collector problems. By default, -verbose:gc output is written to either native_stderr.log or native_stdout.log.   It is also possible to redirect the logs to a user-specified file. This article will de…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question