WebSphere Portal V5.0 production deployment and operations guide / Rufus Credle [and others].

This IBM Redbooks publication contains best practices for deployment and operational support of WebSphere Portal V5 in a production environment. It addresses the questions on how to initially deploy WebSphere Portal. After you have deployed WebSphere Portal, you can use the operational best practice...

Full description

Saved in:
Bibliographic Details
Other Authors: Credle, Rufus
Format: eBook
Language:English
Published: [Research Triangle Park, N.C.] : IBM, ©2005.
Edition:1st ed.
Series:IBM redbooks.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Front cover
  • Contents
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Chapter 1. WebSphere Portal operational architecture
  • 1.1 Term definitions
  • 1.2 Deployment units
  • 1.2.1 Dispatcher
  • 1.2.2 Reverse caching proxy
  • 1.2.3 HTTP server
  • 1.2.4 WebSphere Portal
  • 1.2.5 Forward caching proxy
  • 1.2.6 Database server
  • 1.2.7 Directory server
  • 1.3 Building blocks of the Portal
  • 1.3.1 A basic Portal installation
  • 1.3.2 Configuring the Portal to fit into an established environment
  • 1.4 Exploiting network capabilities
  • 1.5 A collaborative Portal
  • 1.6 Enhanced security Portal
  • 1.6.1 Tivoli Access Manager
  • 1.6.2 Netegrity SiteMinder
  • 1.7 Portal clustering
  • 1.7.1 The horizontal Portal cluster
  • 1.7.2 The vertical Portal cluster
  • 1.8 Decoupling from back-end systems
  • 1.9 Example architectures in operation
  • 1.9.1 The elaborated Portal cluster
  • 1.9.2 The elaborated security Portal cluster
  • 1.9.3 The Availability Gold Standard
  • Chapter 2. Installing WebSphere Portal
  • 2.1 Getting ready for the installation
  • 2.1.1 Overview of production Portal architectures
  • 2.2 Suggested roadmap
  • 2.2.1 Planning phase
  • 2.2.2 Installation phase
  • 2.3 Portal documentation
  • Chapter 3. Security management
  • 3.1 Password maintenance
  • 3.1.1 Proxy authentication with Content Access Service
  • 3.1.2 Changing the Portal database username and password
  • 3.2 Credential Vault
  • 3.2.1 How Credential Vault works
  • 3.2.2 Using Credential Vault
  • 3.3 Surfacing an application
  • 3.4 Managing security
  • 3.5 Integrating LDAP
  • 3.5.1 Performance considerations
  • 3.5.2 LDAP architecture and schema layout considerations
  • 3.5.3 Using an LDAP server cluster
  • 3.5.4 Using a single LDAP image
  • 3.5.5 LDAP, WebSphere Portal, and the Q/A environment.
  • 3.5.6 LDAP administration
  • Chapter 4. Solution deployment
  • 4.1 Understanding J2EE
  • 4.2 Understanding a J2EE Portal
  • 4.2.1 Portal structure
  • 4.2.2 Elements of a Portal page
  • 4.3 Portal configuration
  • 4.3.1 Customizing the Portal
  • 4.3.2 Installing the portlet
  • 4.3.3 Updating the portlet
  • 4.3.4 Portlet service
  • 4.3.5 Installing theme and skin
  • Chapter 5. Moving from staging to production
  • 5.1 The Portal staging process
  • 5.2 Deployment and build process
  • 5.2.1 Determining what to move
  • 5.2.2 Using the XMLAccess tool for moving
  • 5.2.3 Object IDs
  • 5.2.4 The Custom Unique Names portlet
  • 5.3 Transferring Portal artifacts using XMLAccess
  • 5.3.1 Transfer process
  • 5.3.2 Exporting a sample page using XMLAccess
  • 5.3.3 Exporting and importing a new page
  • 5.4 A step-by-step guide
  • 5.4.1 Preparing the environment
  • 5.5 Preparing the worksheet
  • 5.5.1 Example worksheet
  • 5.6 Run activities
  • 5.6.1 Verifying the prerequisites
  • 5.6.2 Using XMLAccess to export Portal artifacts
  • 5.6.3 Bundling the supporting files
  • 5.6.4 Transferring the bundle
  • 5.6.5 Distributing the supporting files to a single server
  • 5.6.6 Distributing the supporting files to a cluster
  • 5.6.7 Updating the target configuration
  • 5.7 Post transfer actions
  • 5.7.1 Ensuring that the nodes are synchronized
  • 5.7.2 Restarting the server
  • 5.7.3 Activating the portlets
  • 5.7.4 Making any manual changes
  • 5.8 How does customization and the transfer process work?
  • 5.8.1 World clock scenario
  • 5.9 Troubleshooting and best practices
  • 5.9.1 Plan on a trial run
  • 5.9.2 Problems importing pages
  • 5.9.3 Activate portlets
  • 5.9.4 Synchronize the cluster
  • 5.9.5 Synchronize the nodes without security
  • Chapter 6. Production procedures and administration activities
  • 6.1 Changing the host or domain name
  • 6.1.1 Assumptions.
  • 6.1.2 Step-by-step procedures
  • 6.2 Changing database servers
  • 6.2.1 Assumptions
  • 6.2.2 Moving from a DB2 database to a DB2 database
  • 6.2.3 Moving from an Oracle database to an Oracle database
  • 6.2.4 Moving from an SQLServer database to an SQLServer database
  • 6.3 Changing LDAP servers
  • 6.3.1 Assumptions
  • 6.3.2 Step-by-step procedure
  • 6.4 Backup and recovery
  • 6.4.1 Overview of our approach to backup and recovery
  • 6.4.2 Our approach to backup
  • 6.4.3 Our approach to recovery
  • 6.4.4 Backup and recovery for Windows systems
  • 6.5 Maintaining a healthy Portal environment
  • 6.5.1 Scheduling regular backups
  • 6.5.2 Reviewing log files
  • 6.5.3 Applying fixes
  • 6.5.4 Getting support
  • 6.5.5 Using basic troubleshooting techniques
  • 6.5.6 Using roadmaps
  • 6.6 On Demand clustering solutions
  • 6.6.1 Step-by-step of the On Demand procedure
  • 6.7 Temporarily removing a clustered node to apply maintenance
  • 6.7.1 Step-by-step procedure to temporarily remove a clustered node
  • 6.8 Monitoring the Portal
  • Chapter 7. A high availability illustration
  • 7.1 The sample cluster production environment
  • 7.2 Before you begin the procedure
  • 7.3 Assumptions
  • 7.4 Initial production state
  • 7.5 Remove Site B from cluster
  • 7.6 Maintenance on Site B
  • 7.7 Switch IP traffic from Site A to Site B
  • 7.8 Maintenance on Site A
  • 7.9 Switch IP traffic from Site B to Site A
  • 7.10 Return to Initial Production state
  • Chapter 8. Performance tuning the environment
  • 8.1 Understanding the environment
  • 8.2 Application server tuning
  • 8.2.1 Additional notes for an AIX environment
  • 8.2.2 Application server cloning
  • 8.3 Database server tuning
  • 8.3.1 IBM DB2 Enterprise Edition Database parameter tuning
  • 8.3.2 Oracle Enterprise Edition Database parameter tuning
  • 8.3.3 Other database considerations
  • 8.4 Directory server tuning.
  • 8.4.1 Web server tuning tips
  • 8.4.2 Security filters
  • 8.4.3 Dereferencing aliases
  • 8.5 Operating system specific tuning parameters
  • 8.6 Network tuning
  • 8.6.1 Solaris networking
  • 8.6.2 AIX networking
  • 8.6.3 Windows networking
  • 8.7 WebSphere Portal service properties
  • Appendix A. Operation tools
  • XMLAccess tool
  • Script to synchronize nodes
  • Script to delete portlets
  • Reference documentation
  • Appendix B. Portal installation worksheets and samples
  • Worksheets
  • Silent install sample
  • Verifying Portal installation log files
  • Appendix C. Changing the mode in WebSphere Portal
  • Setting read-only mode
  • Setting read or write mode
  • Appendix D. Switching database servers
  • Changing from a DB2 database to another DB2 database
  • Changing from an Oracle database to another Oracle database
  • Changing from an SQLServer database to another SQLServer database
  • Appendix E. Capacity planning
  • WebSphere Portal V5 or later database
  • Appendix F. A portal manager for WebSphere Portal
  • Wily Portal Manager for IBM WebSphere Portal
  • Appendix G. Additional material
  • Locating the Web material
  • Using the Web material
  • How to use the Web material
  • Abbreviations and acronyms
  • Related publications
  • IBM Redbooks
  • Online resources
  • How to get IBM Redbooks
  • Help from IBM
  • Index
  • Back cover.