Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Typical Tomcat administration duties

Posted on 2012-03-28
2
534 Views
Last Modified: 2012-04-11
Hi,
I am providing some gap analysis for a client regarding what tasks should be completed across their infrastructure, and what tasks are actually being performed by their hosting company.

For all the Windows based stuff, i'm on very solid ground, but they have a Tomcat cluster (quite possibly the wrong terminology) running on two of their load balanced IIS server.  I know shamefully little about Tomcat, so was wondering if someone can give me a list of typical tasks that are likely to be required as part of Tomcat administration/maintenance daily, weekly, monthly etc, such as deploy WAR files (???), performance tuning, configuring security etc.

Thanks

M
0
Comment
Question by:lambch0p
  • 2
2 Comments
 

Accepted Solution

by:
lambch0p earned 0 total points
ID: 37777721
FYI - These are tasks that are listed by the hosting provider:

Tasks likely to be encountered during intial setup
Creation of the users/groups required for the service
Installation and configuration of the necessary packages (JVM)
Configuration of the necessary operating system parameters (kernel, libraries, limits)
Configuration of the requires IIS/Apache parameters (ISAPI filters, mod_jk, mod_proxy_ajp)
Installation of the Tomcat application server
Configuration of the service management scripts (start, stop)
Configuration of the service parameters (RAM)
Configuration of the security environment/application of the security policy
Configuration of the caching and concurrency (threads) parameters
Configuration of the database connections and pools (JDBC drivers)
Configuration of the application contexts
Configuration of mail connections
Configuration of additional Java libraries
Configuration of the logs and their rotation
Configuration of a status worker
Clustering configuration

Day-to-day tasks
Management of listeners and valves
Management of virtual servers
Management of contexts
Management of additional drivers and libraries (jar)
Management of database connections
Management of configurations associated with MIME types, execution permission, and access rules
Management of the mod_jk or mod_proxy_ajp parameters
Installation of SSL certificates
Creation of users, changes in permissions, password changes for the manager application
Delivery of a copy of the logs -either detailed or aggregated
Changes in the transaction/url monitors
Management of performance parameters of the application server
Deployment of WARs
0
 

Author Closing Comment

by:lambch0p
ID: 37832433
My own solution.  May or may not be complete or accurate.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Comet channel best practices and HA 6 50
SSh using preshared keys - Connection reset 5 147
need to apply latest fix to websphere 7 2 99
Query on Windows NLB 4 109
-Xmx and -Xms are the two JVM options often used to tune JVM heap size.   Here are some common mistakes made when using them:   Assume BigApp is a java class file for the below examples. 1.         Missing m, M, g or G at the end …
This exercise is about for the following scenario: Dmgr and One node with 2 application server. Each application server contains it owns application. Application server name as follows server1 contains app1 server2 contains app1 Prereq…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question