Solved

Typical Tomcat administration duties

Posted on 2012-03-28
2
535 Views
Last Modified: 2012-04-11
Hi,
I am providing some gap analysis for a client regarding what tasks should be completed across their infrastructure, and what tasks are actually being performed by their hosting company.

For all the Windows based stuff, i'm on very solid ground, but they have a Tomcat cluster (quite possibly the wrong terminology) running on two of their load balanced IIS server.  I know shamefully little about Tomcat, so was wondering if someone can give me a list of typical tasks that are likely to be required as part of Tomcat administration/maintenance daily, weekly, monthly etc, such as deploy WAR files (???), performance tuning, configuring security etc.

Thanks

M
0
Comment
Question by:lambch0p
  • 2
2 Comments
 

Accepted Solution

by:
lambch0p earned 0 total points
ID: 37777721
FYI - These are tasks that are listed by the hosting provider:

Tasks likely to be encountered during intial setup
Creation of the users/groups required for the service
Installation and configuration of the necessary packages (JVM)
Configuration of the necessary operating system parameters (kernel, libraries, limits)
Configuration of the requires IIS/Apache parameters (ISAPI filters, mod_jk, mod_proxy_ajp)
Installation of the Tomcat application server
Configuration of the service management scripts (start, stop)
Configuration of the service parameters (RAM)
Configuration of the security environment/application of the security policy
Configuration of the caching and concurrency (threads) parameters
Configuration of the database connections and pools (JDBC drivers)
Configuration of the application contexts
Configuration of mail connections
Configuration of additional Java libraries
Configuration of the logs and their rotation
Configuration of a status worker
Clustering configuration

Day-to-day tasks
Management of listeners and valves
Management of virtual servers
Management of contexts
Management of additional drivers and libraries (jar)
Management of database connections
Management of configurations associated with MIME types, execution permission, and access rules
Management of the mod_jk or mod_proxy_ajp parameters
Installation of SSL certificates
Creation of users, changes in permissions, password changes for the manager application
Delivery of a copy of the logs -either detailed or aggregated
Changes in the transaction/url monitors
Management of performance parameters of the application server
Deployment of WARs
0
 

Author Closing Comment

by:lambch0p
ID: 37832433
My own solution.  May or may not be complete or accurate.
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Java TXT, RTF, DOC, DOCX to PDF converter 3 465
jersey import error 8 113
reflections, dynamic class loading 3 78
Hosting application in Apache and Tomcat 1 120
Configure Web Service (server application) I. Configure security for Web Services methods First, we need to protect Session bean which implements the service: 1. Open EJB deployment descriptor (ejb-jar.xml) in the EJB project that contains you…
There are numerous questions about how to setup an IBM HTTP Server to be administered from WebSphere Application Server administrative console. I do hope this article will wrap things up and become a reference for this task. You need three things…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question