![]() ![]() ![]() ![]() ![]() ![]() |
The following sections describe the parameters that you use to configure the Apache and Microsoft IIS Web server plug-ins:
You enter the parameters for each Web server plug-in in special configuration files. Each Web server has a different name for this configuration file and different rules for formatting the file. For details, see the following sections on each plug-in:
Parameters are case sensitive.
Port at which the WebLogic Server host is listening for connection requests from the plug-in (or from other servers). (If you are using SSL between the plug-in and WebLogic Server, set this parameter to the SSL listen port (see Configuring the SSL Protocol) and set the SecureProxy parameter to
ON ).
|
||
List of WebLogic Servers that can be used for load balancing. The server or cluster list is a list of host:port entries. If a mixed set of clusters and single servers is specified, the dynamic list returned for this parameter will return only the clustered servers.
The method of specifying the parameter, and the required format vary by plug-in. See the examples in:
If you are using SSL between the plug-in and WebLogic Server, set the port number to the SSL listen port (see Configuring the SSL Protocol) and set the SecureProxy parameter to
ON .
The plug-in does a simple round-robin between all available servers. The server list specified in this property is a starting point for the dynamic server list that the server and plug-in maintain. WebLogic Server and the plug-in work together to update the server list automatically with new, failed, and recovered cluster members.
You can disable the use of the dynamic cluster list by setting the DynamicServerList parameter to
OFF
|
||
PathTrim specifies the string trimmed by the plug-in from the {PATH}/{FILENAME} portion of the original URL, before the request is forwarded to WebLogic Server. For example, if the URL
is passed to the plug-in for parsing and if
PathTrim has been set to strip off /weblogic before handing the URL to WebLogic Server, the URL forwarded to WebLogic Server is:
Note that if you are newly converting an existing third-party server to proxy requests to WebLogic Server using the plug-in, you will need to change application paths to
/foo to include weblogic/foo . You can use PathTrim and PathPrepend in combination to change this path.
|
||
PathPrepend specifies the path that the plug-in prepends to the {PATH} portion of the original URL, after PathTrim is trimmed and before the request is forwarded to WebLogic Server.
Note that if you need to append File Name, use DefaultFileName plug-in parameter instead of
PathPrepend .
|
||
Maximum time in seconds that the plug-in should attempt to connect to the WebLogic Server host. Make the value greater than
ConnectRetrySecs. If
ConnectTimeoutSecs expires without a successful connection, even after the appropriate retries (see ConnectRetrySecs ), an HTTP 503/Service Unavailable response is sent to the client.
You can customize the error response by using the ErrorPage parameter.
|
||
Interval in seconds that the plug-in should sleep between attempts to connect to the WebLogic Server host (or all of the servers in a cluster). Make this number less than the
ConnectTimeoutSecs . The number of times the plug-in tries to connect before returning an HTTP 503/Service Unavailable response to the client is calculated by dividing ConnectTimeoutSecs by ConnectRetrySecs .
To specify no retries, set
ConnectRetrySecs equal to ConnectTimeoutSecs . However, the plug-in attempts to connect at least twice.
You can customize the error response by using the
ErrorPage parameter.
|
||
Sets the type of logging performed for debugging operations. The debugging information is written to the
/tmp/wlproxy.log file on UNIX systems and c:\TEMP\wlproxy.log on Windows NT/2000 systems. Override this location and filename by setting the
WLLogFile parameter to a different directory and file. Ensure that the tmp or TEMP directory has write permission assigned to the user who is logged in to the server. Set any of the following logging options (HFC,HTW,HFW , and HTC options may be set in combination by entering them separated by commas, for example “HFC,HTW ”):
|
||
See the
Debug parameter
|
Specifies path and file name for the log file that is generated when the
Debug parameter is set to
ON . You must create this directory before setting this parameter.
|
|
If defined in the proxy configuration, specifies number of seconds interval at which WebLogic Server refreshes DNS name to IP mapping for a server. This can be used in the event that a WebLogic Server instance is migrated to a different IP address, but the DNS name for that server's IP remains the same. In this case, at the specified refresh interval the DNS<->IP mapping will be updated.
|
||
See the
Debug parameter
|
||
Enables the special query parameter “
__WebLogicBridgeConfig ”. Use it to get details about configuration parameters from the plug-in.
For example, if you enable “
__WebLogicBridgeConfig ” by setting DebugConfigInfo and then send a request that includes the query string ?__WebLogicBridgeConfig , then the plug-in gathers the configuration information and run-time statistics and returns the information to the browser. The plug-in does not connect to WebLogic Server in this case.
|
||
If set to
true , the plug-in checks the existence and permissions of the translated path (“Proxy-Path-Translated”) of the request before forwarding the request to WebLogic Server.
If the file does not exist, an
HTTP 404 File Not Found response is returned to the client. If the file exists but is not world-readable, an HTTP 403/Forbidden response is returned to the client. In either case, the default mechanism for the Web server to handle these responses fulfills the body of the response. This option is useful if both the WebLogic Server Web Application and the Web Server have the same document root.
You can customize the error response by using the
ErrorPage parameter.
|
||
Defines the amount of time the plug-in waits for a response to a request from WebLogic Server. The plug-in waits for
HungServerRecoverSecs for the server to respond and then declares that server dead, and fails over to the next server. The value should be set to a very large value. If the value is less than the time the servlets take to process, then you may see unexpected results.
|
||
When set to
ON and if the servers do not respond within WLIOTimeoutSecs (new name for HungServerRecoverSecs), the plug-ins fail over.
|
||
If you change the name of the WebLogic Server session cookie in the WebLogic Server Web application, you need to change the
CookieName parameter in the plug-in to the same value. The name of the WebLogic session cookie is set in the WebLogic-specific deployment descriptor, in the <session-descriptor>element.
|
||
Set the
DefaultFileName to the default welcome page of the Web Application in WebLogic Server to which requests are being proxied. For example, If the DefaultFileName is set to welcome.html , an HTTP request like “http://somehost/weblogic ” becomes “http://somehost/weblogic/welcome.html ”. For this parameter to function, the same file must be specified as a welcome file in all the Web Applications to which requests are directed. For more information, see “
Configuring Welcome Pages”.
|
||
When set to ON, and the size of the POST data in a request is greater than 2048 bytes, the POST data is first read into a temporary file on disk and then forwarded to the WebLogic Server in chunks of 8192 bytes. This preserves the POST data during failover, allowing all necessary data to be repeated to the secondary if the primary goes down.
Note that when FileCaching is ON, any client that tracks the progress of the POST will see that the transfer has completed even though the data is still being transferred between the WebServer and WebLogic. So, if you want the progress bar displayed by a browser during the upload to reflect when the data is actually available on the WebLogic Server, you might not want to have FileCaching ON.
When set to OFF and the size of the POST data in a request is greater than 2048 bytes, the reading of the POST data is postponed until a WebLogic Server cluster member is identified to serve the request. Then the Plugin reads and immediately sends the POST data to the WebLogic Server in chunks of 8192 bytes.
|
||
The values for this parameter are 0 (low), 1 (medium), and 2 (high). The default value is 2. This priority should be put in iisforward.ini file. This property is used to set the priority level for the iisforward.dll filter in IIS. Priority level is used by IIS to decide which filter will be invoked first, in case multiple filters match the incoming request.
|
||
When set to
ON , specifies that the Apache plug-in use (request_rec *)r->the request to pass the query string to WebLogic Server. (For more information, see your Apache documentation.) This behavior is desirable in the following situations: |
||
If a WebLogic Server listed in either the WebLogicCluster parameter or a dynamic cluster list returned from WebLogic Server fails, the failed server is marked as “bad” and the plug-in attempts to connect to the next server in the list.
|
||
When set to
OFF , the plug-in ignores the dynamic cluster list used for load balancing requests proxied from the plug-in and only uses the static list specified with the WebLogicCluster parameter. Normally this parameter should remain set to ON .
|
||
Set this parameter to
ON to maintain SSL communication between the plug-in and WebLogic Server when the following conditions exist:
|
||
Notes: | SCG Certificates are not supported for use with WebLogic Server Proxy Plug-Ins. Non-SCG certificates work appropriately and allow SSL communication between WebLogic Server and the plug-in. |
Note: | KeyStore-related initialization parameters are not supported for use with WebLogic Server Proxy Plug-Ins. |
Parameters are case sensitive.
This parameter closes a security hole which existed with SSL certificate validation where certificate chains with invalid V3 CA certificates would not be properly rejected. This allowed certificate chains with invalid intermediate CA certificates, rooted with a valid CA certificate to be trusted. X509 V3 CA certificates are required to contain the BasicConstraints extension, marked as being a CA, and marked as a critical extension. This checking protects against non-CA certificates masquerading as intermediate CA certificates.
This level entirely disables enforcement and is not recommended. Most current commercial CA certificates should work under the default STRONG setting.
Default. The BasicConstraints for V3 CA certificates are checked and the certificates are verified to be CA certificates.
This level does the same checking as the STRONG level, but in addition it also strictly enforces IETF RFC 2459 which specifies the BasicConstraints for CA certificates also must be marked as "critical". This is not the default setting because a number of current commercially available CA certificates don't conform to RFC 2459 and don't mark the BasicConstraints as critical. Set this if you want to strict conformance to RFC 2459.
|
||
Set this parameter to
ON to enable the use of the SSL protocol for all communication between the plug-in and WebLogic Server. Remember to configure a port on the corresponding WebLogic Server for the SSL protocol before defining this parameter.
This parameter may be set at two levels: in the configuration for the main server and—if you have defined any virtual hosts—in the configuration for the virtual host. The configuration for the virtual host inherits the SSL configuration from the configuration of the main server if the setting is not overridden in the configuration for the virtual host.
|
||
Name of the file that contains the digital certificates for the trusted certificate authorities for the plug-in. This parameter is required if the SecureProxy parameter is set to
ON .
|
||
Determines whether the host name to which the plug-in is connecting must match the Subject Distinguished Name field in the digital certificate of the WebLogic Server to which the proxy plug-in is connecting.
|
||
A property file in a Web application that defines encrypted passwords to access the key store and private key alias when using two-way SSL with a generic proxy servlet. The file contents looks like this:
KeyStorePassword={3DES}i4+50LCKenQO8BBvlsXTrg\=\=
You must use the
weblogic.security.Encrypt command-line utility to encrypt the password. For more information on the Encrypt utility, as well as the
CertGen , and
der2pem utilities, see
Using the WebLogic Server Java Utilities in the WebLogic Server Command Reference.
|
![]() ![]() ![]() |