SG 247732
SG 247732
SG 247732
WebSphere Business
Process Management V6.2
Production Topologies
Building and extending WebSphere
Process Server topologies
Incorporating WebSphere
Business Services Fabric
Integrating WebSphere
Business Monitor
Martin Keen
Naveen Balani
Addison Goering
Sila Kissuu
Leon Matthews
Thomas McManus
Catherine Rivi
Mohamed ShamsEldin Salem
Jim Thorpe
Srinivasa Vadlamudi
ibm.com/redbooks
International Technical Support Organization
June 2009
SG24-7732-00
Note: Before using this information and the product it supports, read the information in
“Notices” on page xiii.
This edition applies to Version 6.2 of WebSphere Process Server, WebSphere Business Services
Fabric, and WebSphere Business Monitor.
© Copyright International Business Machines Corporation 2009. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP
Schedule Contract with IBM Corp.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Part 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Contents v
6.2.1 Creating a deployment environment . . . . . . . . . . . . . . . . . . . . . . . . 138
6.2.2 Creating the event database tables . . . . . . . . . . . . . . . . . . . . . . . . 151
6.2.3 Checking the database connectivity . . . . . . . . . . . . . . . . . . . . . . . . 152
6.2.4 Installing a Web server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
6.2.5 Completing the deployment environment configuration . . . . . . . . . 155
6.2.6 Completing and verifying the configuration . . . . . . . . . . . . . . . . . . . 155
6.3 Post-creation configuration and verification . . . . . . . . . . . . . . . . . . . . . . 156
6.3.1 Configuring CEI logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
6.3.2 Configuring shared transaction logging. . . . . . . . . . . . . . . . . . . . . . 156
6.3.3 Installing the sample application . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Contents vii
Chapter 13. Using Business Space powered by WebSphere and Lotus
Forms Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
13.1 Configuring Business Space powered by WebSphere . . . . . . . . . . . . . 357
13.1.1 Create the Business Space database . . . . . . . . . . . . . . . . . . . . . . 357
13.1.2 Create the Business Space database tables . . . . . . . . . . . . . . . . 357
13.1.3 Configure Business Space as part of Deployment Environment wizard
358
13.1.4 Configure Business Space using Integrated Solutions Console . . 359
13.2 Lotus Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
13.2.1 Install Lotus Forms Designer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
13.2.2 Install Lotus Forms Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
13.2.3 Install Lotus Forms Server API . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
13.2.4 Create a human task form. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
13.2.5 Make simple form adjustments . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Part 3. Extending the Remote Message and Remote Support topology . . . . . . . . . . . . . 383
Contents ix
Chapter 16. Creating a WebSphere Dynamic Process Edition production
topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
16.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
16.2 Preparing the machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
16.3 Installing WebSphere Process Server. . . . . . . . . . . . . . . . . . . . . . . . . . 515
16.4 Installing WebSphere Business Monitor . . . . . . . . . . . . . . . . . . . . . . . . 515
16.5 Installing WebSphere Business Services Fabric. . . . . . . . . . . . . . . . . . 516
16.6 Creating databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
16.7 Creating the Deployment Manager profile. . . . . . . . . . . . . . . . . . . . . . . 519
16.7.1 Augmenting the Deployment Manager profile with WebSphere
Business Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
16.7.2 Augmenting the Deployment Manager profile with WebSphere
Business Services Fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
16.7.3 Starting the Deployment Manager . . . . . . . . . . . . . . . . . . . . . . . . 522
16.7.4 Enabling security to use federated repository . . . . . . . . . . . . . . . . 524
16.8 Creating nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
16.8.1 Creating a Custom WebSphere Process Server node . . . . . . . . . 533
16.8.2 Augmenting with WebSphere Business Monitor . . . . . . . . . . . . . . 535
16.8.3 Augmenting with WebSphere Business Services Fabric . . . . . . . 536
16.8.4 Verifying that all nodes appear via WebSphere Admin Console. . 537
16.9 Creating clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
16.9.1 Creating the Application Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . 538
16.9.2 Creating the Support Cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
16.9.3 Creating the Messaging Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . 542
16.9.4 Creating the Web Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
16.9.5 Verifying clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
16.10 Configuring and deploying CEI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
16.11 Configuring Service Component Architecture . . . . . . . . . . . . . . . . . . . 552
16.12 Configuring Common Event Destination for Web Cluster . . . . . . . . . . 557
16.13 Configuring BPC Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
16.14 Configuring Business Rules Manager . . . . . . . . . . . . . . . . . . . . . . . . . 570
16.15 Configuring Business Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
16.16 Using WebSphere Business Monitor Configuration Wizard . . . . . . . . 575
16.16.1 Configuring the Messaging Engine . . . . . . . . . . . . . . . . . . . . . . . 576
16.16.2 Configuring the Event Emitter Factory . . . . . . . . . . . . . . . . . . . . 577
16.16.3 Configuring the REST API service . . . . . . . . . . . . . . . . . . . . . . . 577
16.16.4 Configuring Action Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
16.16.5 Configuring the Data Services Scheduler . . . . . . . . . . . . . . . . . . 578
16.16.6 Configuring the Dashboard for mobile devices . . . . . . . . . . . . . . 578
16.17 Installing Monitor’s Emitter Service . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
16.18 Verifying Monitor Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
16.19 Configuring Fabric’s Messaging Engine . . . . . . . . . . . . . . . . . . . . . . . 583
16.20 Configuring Fabric applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Contents xi
xii WebSphere Business Process Management V6.2 Production Topologies
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information about the products and services currently available in your
area. Any reference to an IBM product, program, or service is not intended to state or imply that only that
IBM product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
FileNet, and the FileNet logo are registered trademarks of FileNet Corporation in the United States, other
countries or both.
SUSE, the Novell logo, and the N logo are registered trademarks of Novell, Inc. in the United States and
other countries.
Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation
and/or its affiliates.
JBoss, and the Shadowman logo are trademarks or registered trademarks of Red Hat, Inc. in the U.S. and
other countries.
SAP NetWeaver, SAP, and SAP logos are trademarks or registered trademarks of SAP AG in Germany and
in several other countries.
EJB, Enterprise JavaBeans, J2EE, J2ME, Java, JavaBeans, JavaServer, JDBC, JMX, JSP, JVM, Solaris,
and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other
countries, or both.
Excel, Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United
States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
Finally, Part 4, “Four Cluster production topology” on page 507, describes how to
build a complete WebSphere Dynamic Process Edition production topology from
the ground up using the new Four Cluster production topology.
Figure 1 From left to right: Addison, Sila, Leon, Srini, and Martin
Naveen Balani works as a Software Architect with IBM India Software Labs
(ISL). He leads the design and development activities for the WebSphere
Business Service Fabric product out of ISL. He likes to research new
technologies and is a regular contributor to IBM developerWorks®, having written
about Web services, ESB, JMS, service-oriented architecture (SOA),
architectures, open source frameworks, semantic Web, J2ME™, pervasive
computing, and Spring, Ajax, and various IBM products. He is also a coauthor of
Beginning Spring Framework 2 and Getting Started with IBM WebSphere
Business Services Fabric V6.1, SG24-7614.
Sila Kissuu is a Senior SOA Solutions Architect with IBM Software Group -
Application and Integration Middleware Software. He has over 10 years of
experience in architecture and development of enterprise BPM solutions. Sila
Leon Matthews is an Advisory Software Engineer with the IBM Software Group
in the USA. He has 10 years of experience in development of enterprise-ready
transformation products and consultancy and project management of customer
applications. His areas of expertise include WebSphere Process Server and
WebSphere Transformation Extender.
Catherine Rivi is a Technical Writer and Software Tester on the ISSW for IBM
team. She has over 15 years of experience in testing and documentation of
WebSphere products. In addition to testing internal IBM applications and new
product releases, she edits articles and tutorials on BPM and other topics. She is
an IBM Certified System Administrator - WebSphere Application Server Network
Deployment.
Preface xvii
Special thanks to the authors of WebSphere Business Process Management
V6.1.2 Production Topologies, SG24-7665: Peter Daly, Ryan Malynn, Thomas
McManus, Karen Poyer, Julia Reder, Mohamed Shamseldin Salem, Kevin Senior,
Jeffrey Slone, and Vignesh Velusamyravindran.
Eric Herness
IBM BPM Cheif Architect
Jim Pailistrant
Worldwide Tivoli Pre-Sales Technical Enablement Engineer
Vincent Belfoure, Paul Pacholski, Josh Bock, Julie Reese, Dennis Miller, Jared
Michalec, Christopher Walk, Michael Steele, Stuart Jones, Birgit Schwarz,
Manfred Haas, Kurt Fleckenstein, and Shyam Nagarajan
IBM Worldwide BPM Technical Sales
John Alcorn, Richard Johnson, Dave Enyeart, Luis Sanchez, Phil Piper, and
Varadarajan (Varad) Ramamoorthy
IBM WebSphere Business Monitor Development
Marilza Maia
SOA Advanced Technology, IBM Software Group
Bobby Pham
IBM Business Partner Technical Strategy and Enablement (BPTSE)
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you will develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
Preface xix
xx WebSphere Business Process Management V6.2 Production Topologies
Part 1
Part 1 Overview
Foundational Offerings
IBM WebSphere IBM FileNet Active Content Edition
Dynamic Process Edition FileNet Business Process Manager
WebSphere Business Modeler FileNet Business Activity Monitor
WebSphere Business Services Fabric FileNet eForms
WebSphere Business Monitor FileNet Business Process Framework
Figure 1-1 The IBM BPM Suite and its two foundation offerings
IBM FileNet Active Content Edition supports process optimization where content
is core to your processes or you have integrated compliance requirements.
FileNet Active Content Edition can manage the full life cycle of complex business
processes dealing with unstructured information assets in areas such as human
resources, accounts payable and invoice processing, and contract life cycle
management.
WebSphere
Integration Developer
Business
objects (XSD)
WebSphere
Business Monitor
Development Toolkit
SCA applications
Semantic data Monitor models
with BPEL processes
Business services (EAR)
and ESB flows
Monitored
application
events
Figure 1-2 Using IBM products throughout the BPM life cycle
New in V6.2 is a direct-deploy scenario that allows you to directly deploy models
into the WebSphere Process Server run time. V6.2 also introduces the
Interactive Process Design tool for defining and testing a complete BPM solution
in a sandbox environment prior to deployment. It includes a test server for
deploying the process and a preconfigured test business space for validating
process and monitoring logic.
Business analysts can model a process, browse for pre-built business services,
create forms through editors, and then test these processes on a server. The
testing is not emulation. It is testing on a server to see how the process will run
on the server when deployed. A preconfigured Business Space is generated as
part of this testing.
WebSphere Process Server V6.2 provides enhanced flexibility and control over
process instances, and a new direct-deploy scenario that allows you to directly
deploy modules from WebSphere Business Modeler into the WebSphere
Process Server run time. It also offers new widgets for Business Space, and a
new explorer-style Web application for browsing the service integration bus.
WebSphere Business Services Fabric enables the assembly of existing and new
business services into CBAs. These policy-driven CBAs are adapted at run time
based on semantic knowledge to provide the correct business service
functionality. The functionality is delivered through a preferred communication
channel based on the business context, content, and contract of the service
request. These constraints prescribe variations in the business service,
dynamically altering the process behavior or end-point routing.
WebSphere Business Monitor V6.2 now includes the ability to view historical KPI
data over time to see trends and to predict future behavior. It also provides a new
feature for creating alerts at runtime. Monitored data can now be viewed in
Excel®, Lotus SameTime, Lotus Notes®, and on Apple iPhones. Version 6.2 also
includes industry content (monitor models, customized dashboards, and sample
events) related to the insurance, banking, health care, and other industries.
You can use Business Space to assemble integrated interfaces that access a
variety of data sources through REpresentational State Transfer (REST) APIs.
The capabilities include:
Managing and monitoring from mobile devices
Modifying rules, policies, and processes
Reviewing KPIs, and managing task lists and staff productivity
Analyzing metrics, and optimizing process models and dashboards
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.jsp?topic
=/com.ibm.bspace.620.help.framework.doc/welcome/dochome.html
When integrated with WebSphere Services Registry and Repository, ITCAM for
SOA can provide important run time governance solutions. For example, it can
help you to identify rogue services in your environment, show you the impact to a
business process when services degrade, and dynamically affect routing
decisions made by WebSphere Enterprise Service Bus. The routing decisions
are based on real-time performance monitoring information that indicates the
health and suitability of a service endpoint.
Cells
A WebSphere cell is a logical grouping of nodes that are centrally managed and
have access to shared resources. Nodes within a cell typically run one or more
application servers. Each application server hosts one or more applications that
are similar in terms of business requirements or non-functional requirements.
Nodes
A WebSphere node is a managed container for one or more application servers.
Typically, a single node corresponds to a single machine. A node consists of a
node agent, by which the node is controlled, and the application servers hosted
on that node.
Node agents
The WebSphere node agent is an architectural component that enables the
deployment manager for the cell to remotely manage the node, its application
servers, and their applications.
Deployment manager
A WebSphere deployment manager is an application server whose only task is
the management and configuration of the cell in which it exists. The deployment
manager runs a single application, a Web-based configuration front-end known
as the Integrated Solutions Console (or administrative console), through which
you can perform nearly all management tasks.
Administration Administrative
App A App B Console
Services
(Integrated Solutions
Console)
wsadmin
EAR Files Configuration
(XML Files)
Node A Deployment
Manager
Administration Administration
Services Application
Application Server 1
Node agent
App A App B
Master
Administration
Services
Application Server 2 Configuration
(XML Files)
App C App D
EAR Files
Node B
Clusters
A WebSphere cluster is a logical collection of application servers configured to
perform the same task as a team. The member application servers can be
distributed across one or more nodes in any configuration.
Profiles
A profile is a specific instance of a WebSphere Application Server run time
environment. The WebSphere Application Server installation program places the
files that it creates into one of two separate environments. It installs the core
product files in one location, and in a separate location it creates an initial profile,
which is a run time execution environment that includes configuration files, the
default location for deployed applications, logs, and other data. All profiles on a
machine can share the same core product files, which they cannot modify. There
are different types of profiles, for example, deployment manager profile and
custom profile, each supporting a specific functional environment for the user.
1.5.2 Clusters
A cluster is a grouping of one or more fundamentally identical units that perform
one task. WebSphere Application Server Network Deployment application
servers are clustered to allow for higher throughput, to achieve higher levels of
resiliency, or both.
Cell 1
Application Server 1
App A App B
Cluster 1
Application Server 2
App A App B
Application Server 3
App C
Cell 1
Deployment Manager
Cluster 1
Cell 1
Deployment Manager
Cluster 1
Application Server 2 Application Server 5
Load balancer
1.5.4 Failover
Clustering of application servers enables an environment to achieve higher
throughput by distributing the load among a collection of application servers. By
sharing data, a cluster of servers can all work on a single transaction should
different requests arrive at different servers. However, transactions are usually
passed to the same server to reduce the need for inter-server communication.
Cell 1
Deployment Manager
Cluster 1
Application Server 2 Application Server 5
Load balancer
This section describes what the application does, its input data, and the required
software to build and deploy it. It also describes how to obtain the project and
EAR files for replication in your environment.
Typically, a monitor model would also be defined to track the vehicle loan
process, although for simplicity we did not define a monitor model in this chapter.
Note: In the WebSphere Process Server version of this process the credit
verification step is implemented as a human task using a Lotus Forms user
interface.
Table 2-2 Interest rate based on the rating score and customer type
Credit rating Customer type Annual rate of interest
($%)
You can also extend your topology to include WebSphere Business Monitor V6.2
for real-time monitoring of business events for the vehicle loan application, as
discussed in Chapter 15, “Incorporating WebSphere Business Monitor into a
production topology” on page 433.
To download the vehicle loan application project and Enterprise Archive (EAR)
files, refer to the instructions in Appendix A, “Additional material” on page 597.
The directory named \Scenarios contains two subdirectories, one for each
runtime. The EAR subdirectory contains a deployable version of the vehicle loan
process for the appropriate runtime environment.
Change Management
Business Space
WBSF Governance
BSLM Change Metadata
Change Set Approval Management Deploy Deploy
Repository
Change Set Publishing
Runtime Reference
A business process modeler then points the WebSphere Business Modeler tool
to the repository to import artifacts created in the Business Space. After further
refinement the process modeler hands off the business process models to the
integration developer, who uses WebSphere Integration Developer, who adds
execution semantics to create technical models that can be deployed on
WebSphere Business Services Fabric, WebSphere Process Server, and
WebSphere Business Monitor.
3. In the Business Service space the analyst adds business services and
policies required to support the vehicle loan process.
Figure 2-3 Conceptual application flow for the vehicle loan process
After adding business services and application policies for the ITSOBank loan
application, application details will look as shown in Figure 2-4.
Figure 2-4 Business Space application setup for the ITSOBank loan process
The vehicle loan process with WebSphere Business Services Fabric is shown in
Figure 2-6.
Figure 2-6 The vehicle loan process model in WebSphere Business Services Fabric
4. The integration developer visually composes how the vehicle loan process
should execute these reusable service components in a process flow.
5. The vehicle loan process application is assembled and packaged into an
enterprise archive file for deployment to WebSphere Process Server.
The chapter also includes recommendations and guidelines for how to select a
production topology that best meets your requirements.
Typically, WebSphere Process Server uses CEI to get business event information
to WebSphere Business Monitor.
There are several methods that you can use to generate a deployment
environment:
Create the deployment environment when you install the software, using the
installation wizard or silent installation.
Install the software on the host systems. Use the Profile Management Tool or
manageprofiles command to create the deployment environment.
Install the software on the host systems. Use the Profile Management Tool or
manageprofiles command to create deployment manager and custom
profiles. Create the deployment environment using the Integrated Solutions
Console of the deployment manager.
Install the software on the host systems. Use the Profile Management Tool or
manageprofiles command to create deployment manager and custom
profiles. Create the deployment environment using the wsadmin utility.
The third method was used to create the topology used in the lab environment for
this publication. Regardless of which method you use to create the deployment
environment, you can still manage some aspects of the deployment environment
through the Integrated Solutions Console (for example, add more nodes to the
deployment environment).
Any changes made to a specific resource after generation (for example, a data
source) will not be reflected in the deployment environment descriptor.
BPC Bus
SCA.SYSTEM Bus
SCA.APP Bus
CEI Bus
Member 1 Member 2 Member 3
(WebSphere (WebSphere (WebSphere
Process Server) Process Server) Process Server)
Business Business Business
Process Process Process
Choreographer Choreographer Choreographer
(HTM and BFM) (HTM and BFM) (HTM and BFM)
Common Common Common
Application Target Cluster
Event Event Event
(AppTarget)
Infrastructure Infrastructure Infrastructure
BPC Observer BPC Observer BPC Observer
BPC Explorer BPC Explorer BPC Explorer
Business Business Business
Rules Manager Rules Manager Rules Manager
Business Space Business Space Business Space
SCA APP SCA SYS CEI BPC
ME ME ME ME
When the messaging engines and the applications are co-located in a Single
Cluster, the default behavior is for message producers and consumers to always
use a local active messaging engine (if one is available). For example, assume
that you have two applications deployed to each cluster member needed to
communicate asynchronously. Once each message producer places messages
in the queues, the message consumer on the machine where the engine is local
consumes all of the messages produced. Thus, the consuming application only
processes messages on the server with the local messaging engine and
messages can be stranded.
The fact that messaging engines read and write locally also creates a unique set
of issues if you attempt to partition the destinations. When you create more than
one active set of messaging engines, partitioning results. Each server’s active
messaging engines contain a portion of the queues assigned to that engine.
Thus, you can attain additional throughput if there are active messaging engines
on each server. However, this configuration can create issues for your
applications.
If you partition destinations when the applications and messaging engines are in
the same cluster, you will no longer have the ability to maintain message order.
This is true even if you attempt to enable event sequencing in WebSphere
Process Server. Partitioned destinations can create unpredictable behavior if one
or more messaging engines fails in a Single Cluster topology. If you are prepared
to endure possible unpredictable behavior and the loss of message order,
partitioning the destinations in a Single Cluster topology may be acceptable.
However, this configuration is discouraged.
BPC Bus
SCA.SYSTEM Bus
SCA.APP Bus
CEI Bus
SCA APP SCA SYS CEI BPC
ME ME ME ME Messaging Cluster
(Messaging)
Member 1 (WAS) Member 2 (WAS) Member 3 (WAS)
If a single bus has more than one messaging engine created in a cluster, its
destinations are partitioned across all messaging engines in that cluster. Each
messaging engine deals with a subset of the messages that the destination
handles. Each server’s active messaging engines contain a portion of the queues
BPC Bus
SCA.SYSTEM Bus
CEI Bus
SCA.APP Bus
SCA APP SCA SYS CEI BPC
ME ME ME ME Messaging Cluster
(Messaging)
Member 1 (WAS) Member 2 (WAS) Member 3 (WAS)
You should note that the behavior of the messaging engines in a Remote
Messaging and Remote Support topology is identical to the behavior discussed
in the Remote Messaging topology description. If you partition destinations when
the applications and messaging engines are in separate clusters, you will no
longer have the ability to maintain message order. Any time that you partition
destinations you lose the message order. This is true even if you attempt to
enable event sequencing in WebSphere Process Server.
This list of possibilities is not meant to be exhaustive. There are many other
possible reasons for creating custom deployment environments, including
extending the Remote Messaging and Remote Support topology by adding
additional clusters. Chapter 11, “Advanced production topologies” on page 269,
describes how to manually extend the Remote Messaging and Remote Support
topology. The principles discussed in that chapter also apply to the creation of
custom topology patterns.
Member 1 Member 1
Business Space Business Space
AlphaBlox AlphaBlox
Mobile Dashboards Mobile Dashboards BPM Web Cluster
REST API Services
REST API Services
BPC tools
(Monitor/WPS/Fabric)
BPC tools
BRM BRM
Member 2 Member 2
CEI CEI
Action Services Action Services BPM Support Cluster
Data services scheduler Data services scheduler (Monitor/WPS/Fabric)
Monitor Emitter Service Monitor Emitter Service
Member 3 Member 3
BPEL Applications BPEL Applications
Monitor Applications Monitor Applications BPMAppTargetCluster
BPC BPC (Monitor/WPS/Fabric)
(HTM and BFM) (HTM and BFM)
SCA.SYSTEM Bus
BPC Bus
SCA.APP Bus
CEI Bus
Monitor bus
Fabric
SCA SYS CEI Fabric
ME ME ME
BPM Messaging Cluster
SCA APP BPC Mon (WAS)
ME ME ME
Member 4 Member 4
wbijgt1 wbijgt6
As you plan for your production environment, you should consider carefully the
advantages and disadvantages of each of the common topology patterns.
In the Remote Messaging topology, the supporting applications and the CEI
components are still part of the application target cluster. Thus, for environments
that make extensive use of CEI, the Remote Messaging topology may not be
ideal either. For small to medium-sized businesses, or for businesses without
extensive monitoring or auditing requirements, this topology is generally suitable.
The scalability options for the Remote Messaging topology are as straightforward
as the options for the Single Cluster topology. Because the messaging engines
are subject to one of n policies (each messaging engine is active on only one
server), adding additional members to the messaging cluster has little effect.
Spreading the messaging engines across server members using policies can
allow you to split the messaging burden across a maximum of three servers (the
SCA.SYSTEM and SCA.APPLICATION engines should be active on the same
server). Thus, adding more than three cluster members to the messaging cluster
has no effect on the processing capability of the messaging infrastructure.
Scaling the application target cluster is relatively easy. If you need additional
processing capability for your applications or for the supporting infrastructure,
you can simply add additional nodes and members to the application target
cluster.
Creating three clusters, each with its own functions and applications, creates an
additional administrative burden. As you add clusters and cluster members, your
As with the Remote Messaging topology, the Remote Messaging and Remote
Support topology provide an ideal environment for long-running business
processes, state machines, human tasks, and asynchronous interactions
(including JMS and MQ/JMS bindings). Because the application target cluster is
only responsible for running your business integration applications, performance
tuning and diagnostics are much simpler than in the previous topologies where
the application target cluster had additional responsibilities. The Remote
Messaging and Remote Support topology is also ideal for environments that
make extensive use of CEI for monitoring and auditing (including environments
with WebSphere Business Monitor). Separating the support infrastructure into its
own cluster provides you with a dedicated set of cluster members for CEI and for
the supporting applications like BPC Explorer and Business Space.
Aside from giving you the ability to precisely control the individual components
deployed in your environment, the advantages of custom topologies are similar to
Aside from giving you the ability to precisely control the individual components
deployed in your environment, the advantages of the Four Cluster topology are
similar to those in the Remote Messaging and Remote Support topology. The
disadvantages are also similar but with one limitation: This topology cannot be
built using the Deployment Environment Topology wizard.
Number of clusters One cluster for all One cluster for One cluster for One cluster for
to maintain components applications and applications applications
for the support
infrastructure One cluster for the One cluster for Web
support interfaces
One cluster for infrastructure
messaging One cluster for
One cluster for support
messaging infrastructure
Asynchronous Use should be Use must be Ideal environment for Ideal environment for
interactions minimal balanced against asynchronous asynchronous
resource interactions interactions
availability
Long-running Use should be Use must be Ideal environment for Ideal environment for
processes, state minimal balanced against interruptible interruptible
machines, and resource processes, state processes, state
human tasks availability machines, and machines, and
human tasks human tasks
Heavy CEI activity Not recommended Not recommended Ideal environment for Ideal environment for
(Light CEI use (Light CEI use heavy CEI use heavy CEI use
should be should be
balanced against balanced against
resource usage.) resource usage.)
Fabric Bus
BPC Bus
CEI Bus
SCA.SYSTEM Bus
SCA.APP Bus
SCA APP SCA SYS CEI BPC Fabric
ME ME ME ME ME Messaging Cluster
(Messaging)
Member 1 (WAS) Member 2 (WAS) Member 3 (WAS)
BPC Bus
SCA.SYSTEM Bus
CEI Bus
SCA.APP Bus
Monitor bus
Member 1 (WPS) Member 2 (WPS)
CEI CEI Support Cluster
BPC Tools BPC Tools (Support)
BRM BRM
CEI
ME
Messaging Cluster
SCA APP SCA SYS BPC Mon
ME ME ME ME (Messaging)
Member 1 Member 2
Business Spaces Business Spaces Business Spaces Cluster
AlphaBlox AlphaBlox (Monitor)
REST API Services REST API Services
Member 1 Member 2
Event Processing Cluster
Monitor Monitor
Application Application (Monitor)
Regardless of the topology that you select, there are multiple ways in which to
scale WebSphere Business Monitor as your needs grow:
Add an additional cluster to which monitor models could be deployed.
Add additional members to the cluster where Monitor models are deployed.
Furthermore, if you define core groups, you could pin specific monitor models
to particular members. For failover purposes, you can specify another
member.
Application security
WS-Security
EJB
JSP
Servlets
Administrative Java2
security security
Operating system
security
For an in-depth look into WebSphere Application Server security, refer to IBM
Redbooks publication IBM WebSphere Application Server V6.1 Security
Handbook, SG24-6316.
Security roles are logical and declared at development time. These logical roles
are mapped to real users/groups at deployment time. Security roles allow for
access control and are associated with J2EE artifacts such as servlets, JSPs,
and EJBs.
Table 4-1 Sample table of roles and group/user mapping for a retail/banking application
Description of role Security role runAs role Administrator
assigned users or
groups
Important: The Network Deployment environment does not support the local
operating system registry.
Authentication mechanisms
WebSphere Application Server uses Lightweight Third Party Authentication
(LTPA) as the default authentication mechanism. LTPA supports forwardable
credentials. For security reasons, a configurable expiration time is set on the
credentials. The use of LTPA allows you to enable single sign-on (SSO) for your
security domain.
One use case for WebSphere Application Server integrates Web applications
with backend Enterprise Information Systems (EISs). WebSEAL, which is a part
of Tivoli Access Manager, can front the Web application and perform
authentication on its behalf.
You can configure WebSEAL for trust association with downstream servers, such
as WebSphere Application Server. Trust association between two processes
means that they have authenticated with each other and trust messages from
each other. With trust association, one server can authenticate clients and
forward the authenticated context to trusted servers. The trusted servers do not
need to authenticate the request again. Figure 4-2 illustrates a trust association
between WebSEAL and WebSphere Process Server that is established using
SSL.
DMZ
HTTP
Webseal WebSphere
or EIS
SSL Application Server
Firewall
Firewall
WebService
Client
Important: Trust should be limited. When building the SSL infrastructure, limit
the number of signer certificates to those that are used for your connections.
This limits the clients that can complete the SSL handshake.
If the target Enterprise Information System has its own user registry, you can
map the identity from the request to an identity in the target system. By default,
WebSphere Application Server supports many-to-one credential mapping. You
Transport layer security is a function that provides both privacy and data integrity
between two communicating applications. The protection occurs in a layer of
software on top of the base transport protocol (for example, on top of TCP/IP).
These may sound familiar because they are often discussed together. Most of
the encryption protocols provide both data confidentiality and integrity.
WebSphere Application Server provides support infrastructure for confidentiality
and integrity with SSL and WS-Security.
The most commonly known encryption protocol is Secured Sockets Layer (SSL).
SSL is also referred to as Transport Layer Security (TLS). SSL provides security
over the communications link through encryption technology, ensuring the
integrity of messages in a network. Because communications are encrypted
between two parties, a third party cannot tamper with messages. SSL also
provides confidentiality (ensuring the message content cannot be read), replay
detection, and out-of-sequence detection.
The IBM Redbooks publication IBM WebSphere Application Server V6.1 Security
Handbook, SG24-6316, reviews the messaging roles and destinations and how
they can be secured on the bus.
BPC adds a third component called BPC runtime to the application security
component of WebSphere Application Server, as shown in Figure 4-3.
Application security
Administrative Java2
security security
Operating system
security
WebSphere Process Server makes extensive use of the service integration bus
to send and receive messages. Asynchronous invocation in Service Component
Architecture (SCA) is implemented using messages that are sent and received
over the bus. The integration environment is not secure if you do not secure the
bus.
The bus can hold messages until a consumer is ready to consume the message.
The bus can store messages either in a database or on disk. Storing in a
database is more secure. If you decide to let the bus store messages on a disk,
the disk must be protected with operating system security.
The service integration bus supports authentication for connecting to the bus and
role-based access control for accessing the destinations and sending, receiving,
and browsing messages. Default access control grants permissions to all
authenticated users. For a more secure environment, grant permissions only to a
limited set of users or groups.
Data is potentially sent over the network between a remote client, such as an
adapter and a messaging engine, and between two messaging engines (on
From the Security hyperlink in the Integrated Solutions Console, there are two
ways to modify the aliases:
Click Security → Business Integration Security.
Click Security→ Secure administration, applications, and infrastructure
→ Java Authentication and Authorization Service → J2C authentication
data.
The WebSphere Process Server runtime also has supporting applications that
should also be more closely governed than the defaults. Review the roles
available for each container and the supporting applications so that you can
understand what access you will want to grant to certain groups in your
organization.
To allow the SCA buses to talk to one another, the user ID for the bus will need to
be part of the bus connector role. By default, the SCA_Auth_Alias ID is added to
the bus connector role. The security role for the failed event manager is shown in
Table 4-3.
The BPC runtime is installed as an Enterprise Application Archive (EAR) file with
security roles that must have users and groups assigned (Table 4-5 on page 78).
At a minimum, all of the APIUser roles should be all authenticated. You may wish
to restrict this even more based on what the development staff has created with
these APIs.
The CEI runtime is enabled as a service with security roles that must have users
and groups assigned, as shown in Table 4-7. For greater detail about the uses for
each role, refer to the Information Center article Security and the Common Event
Infrastructure, available at the following Web page:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com.ibm.
websphere.cei.620.doc/doc/ccei_security.html
During the installation, you can assign users to roles using any of the following
choices:
Everyone
This is equivalent to no security.
All authenticated
Every authenticated user is a member of the role.
Mapped User
Individual users are added.
Mapped Groups
In a real-world enterprise, the administrator should use groups defined in your
federated repositories instead of individual users.
The decision about which people directory provider to use depends on the
support that you need from people resolution. To exploit all of the people
assignment features offered by BPC, use the virtual member manager.
For more information about the overall usage of people directories refer to the
developerWorks article Authorization and staff resolution in Business Process
Choreographer: Part 1: Understanding the concepts and components of staff
resolution, available at the following Web page:
http://www.ibm.com/developerworks/websphere/techjournal/0710_lind/0710_
lind.html
Instance-based roles
Instance-based roles are valid for individual task and escalation instances, or the
templates that are used to create task or escalation instances. Role-based
authorization requires that administration and application security is enabled for
the application server.
The following roles are associated with only one user and are assigned as the
result of a task action:
Originator
Starter
Owner
For a complete list, refer to the Information Center article Instance-based roles
for business processes and activities, available at the following Web page:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com.ibm.
websphere.bpc.620.doc/doc/bpc/c6bpel_auth_instance.html
Table 4-9 WebSphere Business Services Fabric security roles: FabricTools and Fabric Catalog
Security role Default permission Notes
Monitor Data Security always has a root resource group defined. All resource
groups other than root are considered children of root. All resources are visible to
the root resource group. By default, all resources are deployed to the root
resource group.
A resource can be a member of only one resource group. The roles that can be
assigned to a user or group within a resource group are defined by WebSphere
Business Monitor. Table 4-11 indicates the roles and the actions that can be
completed for each role.
More information about this topic can be found in the in the Information Center
article Exchanging signer certificates, available at the following Web page:
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com
.ibm.websphere.express.doc/info/exp/ae/tsec_sslexchangesigncerts.html
Synchronous communications
The synchronous communication configuration closely resembles an EJB client
application. The consuming cell looks up the module in the namespace of the
producing cell, then binds to the bootstrap port of the producing cell. The lookup
call can be done in two ways:
Programatically
You can look up a remote Java Naming and Directory Interface (JNDI)
namespace using a provider URL like corbaloc::<hostname>:<port>. This
gives the developer control, but it is not a flexible solution. These values can
also be looked up from a properties file, which will provide more flexibility but
is not a centrally managed solution.
Declarative
Instead of creating name space bindings from a program, you can configure
them with the Integrated Solutions Console. Name servers add these
configured bindings to the name space view by reading the configuration data
for the bindings. Configured bindings are created each time that a server
starts, even when the binding is created in a transient partition of the name
space. One use of configured bindings is to provide fixed qualified names for
server application objects. The required steps to create name space bindings
are provided in the Information Center article Configuring name space
bindings, available at the following Web page:
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic
=/com.ibm.websphere.nd.doc/info/ae/ae/tnam_view_bindings.html
When building the name space binding, use Common Object Request Broker
Architecture (CORBA) object binding settings. Your lookup string would look like
Example 4-2.
Because you are in a trusted cell and you are authenticated, your user identity
flows to the provider cell. The user must have permissions to execute the
For a more detailed explanation of configuring SCA cross-cell review the article
Instructions for configuring SCA cross-cell communications, available on the
following Web page:
http://www.ibm.com/support/docview.wss?uid=swg21216929
For defining JMS SIB security and problem determination, review the IBM
Redpaper publication WebSphere Application Server V6.1: JMS Problem
Determination, REDP-4330.
From reading the previous sections, you are aware of the numerous roles and
authentication aliases that you must manage. If security is simple, the system
can be easily compromised. There are, however, several practices that can make
your job easier. These practices might reduce your flexibility, so you must weigh
their benefits against your needs and corporate security policies.
The groups listed in Table 4-13 and Table 4-14 on page 96 are used to
administer different aspects of your BPM environment.
wsadmin passw0rd
tom passw0rd
gates passw0rd
mohamed passw0rd
cath passw0rd
The LDIF file used for this environment is included in the additional materials
supplied with this book in Appendix A, “Additional material” on page 597.
Note: The version of the update installer used in this book is available at the
following Web page:
ftp://ftp.software.ibm.com/software/websphere/appserv/support/tools/
UpdateInstaller/7.0.x/LinuxIA32/7.0.0.1-WS-UPDI-LinuxIA32.zip
Note: Silent installation of the IBM HTTP Server is covered in the Information
Center article available from the following Web page:
http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic
=/com.ibm.websphere.ihs.doc/info/ihs/ihs/tihs_silentinstall.html
Table 5-1 Database details including owner, database name and schema
Instance Database Schema name Comments
(owner) name
In DB2 the (UNIX®) login user is the same as the instance owner. The instance
owner manages a number of databases. Each database can have different
To create all the databases, you must copy scripts to the DB2 system. These
scripts are located in <install_root>/dbscripts. For example, on Linux they can be
found in /opt/ibm/WebSphere/ProcServer/dbscripts. We recommend that you
copy the entire folder to the DB2 system under the instance owner directory.
In this edition of the book, the databases are created before profile creation.
Consequently, some of the files must be edited to insert schema names. You can
defer table creation until after the deployment topology is generated and the
default database scripts are used to generate valid SQL scripts with the schema
names already embedded. You can then run these scripts directly.
################################
# DB_NAME will be replaced
################################
DB_NAME=WPRCSDB
################################
# DB_USER will be replaced
################################
USER_NAME=db2inst1
b. Edit the file createDBTables.sh. Look for the line db2 set current
schema=$DB_USERID and change this to the value for the schema name. In
this example this line becomes db2 set current schema=COMMONDB.
c. Edit the file insertTable_CommonDB.sql and for each of the insert
statements change the values as follows:
• #MajorVersion#: 6
• #MinorVersion#: 2
• #RefreshPackLevel#: 0
• #FixpackLevel#: 0
Before and after examples are shown in Example 5-5 and Example 5-6.
Example 5-7 Output of ‘db2 list tables for schema COMMONDB’ (the output is truncated)
db2 list tables for schema COMMONDB
Table/View Schema
APPTIMESTAMP COMMONDB
BYTESTORE COMMONDB
BYTESTOREOVERFLOW COMMONDB
CUSTPROPERTIES COMMONDB
FAILEDEVENTBOTYPES COMMONDB
FAILEDEVENTDETAIL COMMONDB
FAILEDEVENTMESSAGE COMMONDB
FAILEDEVENTS COMMONDB
MEDIATION_TICKETS COMMONDB
PERSISTENTLOCK COMMONDB
RELN_METADATA_T COMMONDB
SCHEMAVERSIONINFO COMMONDB
WSCH_LMGR COMMONDB
WSCH_LMPR COMMONDB
WSCH_TASK COMMONDB
WSCH_TREG COMMONDB
Log in to the DB2 system as the instance owner, then run these commands:
db2 "CREATE DATABASE MEDB USING CODESET UTF-8 TERRITORY en-us"
db2 connect to MEDB USER db2inst1 using 'passw0rd'
db2 -tf SCAAPP.ddl
db2 -tf SCASYS.ddl
db2 -tf CEIME.ddl
db2 -tf BPCME.ddl
db2 connect reset
10.In the Administrative Security window, clear the Enable administrative security
check box and click Next. Security will be added to the topology later.
11.In the Port Values Assignment window, accept the default values and click
Next.
12.In the Linux Service Definition window, leave the default value (cleared) for
the Run the deployment manager process as a Linux service check box. Click
Next.
There are some changes needed for the deployment to be accurate because a
schema name of COMMONDB was used. By default, the WPRCSDB database
does not have a schema name. It uses the instance owner. Perform the following
steps to make these changes:
1. Navigate to Resources → JDBC → JDBC Providers. There is only one
provider in the scope (Cell:WPSCell01). Click this provider.
2. Under Additional Properties click Data sources and you will see the following
two data sources defined:
– ESBLoggingMediationDataSource
– WBI_DataSource
3. Click WBI_DataSource.
4. Scroll down and under Authentication alias for XA recovery, click the Use
component-managed authentication alias radio button. Click OK.
Important: Before starting node creation you must ensure that the system
time on the deployment manager and the system time on the nodes is within 5
minutes of each other.
Before you begin to create the nodes make sure that the deployment manager is
running, because you will federate the nodes as part of the creation process.
Note that many of the windows in this process are similar to the windows for
deployment manager creation, so the different windows are shown here.
1. Log in to the first node (itsonode1) as the root user.
2. Navigate to:
/opt/ibm/WebSphere/ProcServer/bin/ProfileManagement
3. Run the profile management tool:
./pmt.sh
4. After a splash window is displayed, the Welcome to the Profile Management
tool window is displayed. Click Next. The Environment Selection window is
displayed.
Figure 5-10 The Profile Type Selection window with a custom profile selected
7. Click Advanced profile creation and click Next. The Profile Name and
Location window is displayed.
8. Leave the profile name and profile directory values at their defaults. Click
Next. The Node and Host Names window is displayed.
9. Enter wpsNode1 for the node name, accept the default for the host name, and
click Next. The Federation window is displayed.
Note: You may elect to select to federate this node later if you wish to
federate all nodes to the deployment manager after all nodes are created
and the deployment manager is started. If you select Federate this node
later, you must manually federate each node with the addNode command.
12.In the Choose the database product used on the deployment manager
drop-down menu, click DB2 Universal. Leave the other value at the default
and click Next. The Profile Creation Summary window is displayed.
13.Check the values and click Create. This takes some time to complete. A
Profile Creation Progress window is displayed. When profile creation is
complete, the Profile Creation Complete window is displayed.
14.Ensure that the profile creation was successful. Clear the Launch the First
steps console radio button. Click Finish.
In case of failure: If the process creation fails the most likely causes are:
No connectivity between your node and the deployment manager.
Time synchronization between the node and the deployment manager
must be within 5 minutes of one another.
You can now log in to the other node and perform the same series of steps to
create a custom profile there. In the Profile Name and Location window, you may
wish to change the profile name to Custom02. Similarly, change the Profile
directory to end in Custom02 and on the Node and Host name window use
wpsNode02 as the Node name. These should be the only changes.
# Cell configuration
dmgrName=itsodmgr # Host name or IP
dmgrPort=8879 # SOAP Connector port
cellName=WPSCell01 # Cell Name
The values should be self-explanatory. This file will be read by the other files
used for creating a deployment manager and node profiles.
Once you have inspected this file, you can run it with the default values by
executing the sh ./createDmgr.sh command.
After a short time, the deployment manager will be created. The output is shown
in Example 5-12.
Note: The script and properties file assumes there are no port conflicts. The
properties file uses the default ports when creating a deployment manager.
You can specify different ports using the -startingPort value (for example,
-startingPort 20000) or using the -portsFile option (for example, -portsFile
Myports.props), and list the ports explicitly in the given file.
These steps are performed using a Jython script named changeDmgr.py based
on the toolkit library, also provided in the additional materials of this book. Edit
the file called changeDmgr.py. You should edit the SCA_Auth_Alias password (the
Verify that the deployment manager is stopped. Run this script as follows on the
deployment manager:
/opt/ibm/WebSphere/ProcServer/profiles/Dmgr01/bin/wsadmin.sh -lang
jython -conntype NONE -f changeDmgr.py
Note: The first time that you run wsadmin.sh, the system will process many
JAR files leading to many lines of output. This only happens once, and the
output is not shown in this example.
Before starting node creation: You must ensure that the system time on the
deployment manager and the system time on the nodes is within 5 minutes of
each other.
Before creating the nodes, make sure that the deployment manager is running
because you will federate the nodes as part of the creation process. You will
create the first profile silently using a script named createNode.sh. This script
can be found in the associated zip file referenced in Appendix A, “Additional
material” on page 597.
Inspect the createNode.sh file. Make sure that it is in the same folder as the
location of the properties.sh file.
Once you have created this file, you can run it by executing the following
command:
./createNode.sh Custom01 wpsNode01
After a short time, your node will be created and federated into the cell.
Federating the node automatically starts the node agent. The output is shown in
Example 5-14.
For additional nodes, edit this file and change the values of profName and
nodeName, but because these are parameters to the script, you can create the
second node with the following command:
./createNode.sh Custom02 wpsNode02
After a short time, your node will be created and federated into the cell.
The first task is to copy these scripts to the DB2 system under the instance
owner. The steps below assume that you have copied the files into the home
folder of the instance owner.
1. Log in to the DB2 System as the instance owner.
2. Change the directory to the scripts just copied, then run the following
command:
echo “db2inst1:passw0rd” | ./dbConfigureCr.sh 1 | tee output.log
In this command, replace db2inst1 with the instance owner and passw0rd
with your chosen password. This creates the database and tables.
3. The database and tables will be created. Check the file output.log for any
messages.
Or:
SQL20189W The buffer pool operation (CREATE/ALTER) will not take
effect until the next database startup due to insufficient
memory. SQLSTATE=01657
After you run this script. the Web server should appear under Servers → Web
servers within the administrative console. It allows you to start and stop the Web
server and generate and propagate the plug-in. You must ensure that the IBM
HTTP Server admin server is running to use this functionality.
Refer to Table 5-1 on page 104 for details on database name and schema.
Use the instructions in 5.2.2, “Common database” on page 105, to create the
common database (WPRCSDB).
Use the instructions in 5.2.6, “Event database” on page 112, to create the
EVENT database.
Use the instructions in 5.2.7, “Business Space database” on page 112, to create
the Business Space database (BSPCDB).
Note: You cannot use the Profile Management Tool to create or augment
profiles on 64-bit platforms (except for i5/OS®) or on the Linux on System
z® platform. To create profiles on these platforms, you must use the
manageprofiles command. See more information about the
manageprofiles command at:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com
.ibm.websphere.wps.620.doc/doc/tins_manageprofiles_create.html
You will now see an 8-step process outlined beginning with select nodes. Our
topology consists of just two nodes, so we use both of them, but in a larger
environment you can select a sub-set of the entire node list.
Figure 6-4 Clusters window, where one can choose the distribution of servers
The next window shows the distribution of the clusters. The messaging,
application deployment target, and application support functions are
contained in a single cluster. You will be creating one cluster with two servers
in the cluster and one server per node.
The REST implementation allows for easy-to-use HTTP services that are
language-independent and platform-independent, stateless, scalable, and
easily parseable. The REST APIs are extremely useful for creating
AJAX-style Web applications, in the same vein as the Business Space
dashboards. Business Space dashboards enable a business user to visualize
business performance data using various widgets. An illustration of Business
Space powered by WebSphere can be found in more detail in the Chapter 13,
“Using Business Space powered by WebSphere and Lotus Forms Client” on
page 355.
EVENT Event server data source This database does not exist yet.
We create it after deployment of
the topology. Note that this does
not support a schema name.
17.Under Additional Properties, on the right side of the window, you can click
Deployment Topology to see that the nodes are running but the clusters are
not configured. Click Cancel to return to the Deployment Environments
Configuration window.
18.Under Related Items, on the right side of the window, you can click Data
Sources to show the database, schema and JNDI names that have been
20.When complete, click Save Changes. The environment will now have a
status of stopped (Figure 6-12).
The first task is to copy these scripts over to the DB2 system under the instance
owner. The steps below assume that you have copied the files across into the
home folder of the instance owner.
1. Log in to the DB2 System as the instance owner.
2. Change the directory to the scripts just copied, then run the following
command:
./cr_event_db2.sh 2>&1 | tee output.log
3. Enter 1 for a server connection because we are on the DB2 system itself.
4. Enter the instance owner name.
5. Enter the instance owner password.
6. The database and tables will be created. Check the file output.log for any
messages. If the script ran without any errors, you should see the messages
shown in Example 6-1.
connect reset
DB20000I The SQL command completed successfully.
Or:
SQL20189W The buffer pool operation (CREATE/ALTER) will not take
effect until the next database startup due to insufficient
memory. SQLSTATE=01657
Note: This may expire your login to the Integrated Solutions Console, so
you may be required to log back in.
Note: If you do not see this, make sure that the scope at the top of the
page is set to All Scopes.
7. Under Additional Properties, click Data sources. You will see one data
source for each of the schemas that we created earlier. In each case, we must
make sure that the authentication alias is correctly set before we click Test
connection.
8. Click Business Process Choreographer ME data source and scroll down
the page until you reach a heading of Component-managed authentication
alias. Select BPCME_00_Auth_Alias from the drop-down list. Under
Authentication alias for XA recovery, select the Use component-managed
authentication alias radio button, and click OK.
9. Save and synchronize the changes. Once saved, you should be returned to
the Data sources page. You can now check the connectivity by selecting the
Business Process Choreographer ME data source check box and clicking
Test connection.
10.Perform the same actions for the other three data sources using the values
shown in Table 6-2.
To keep the transaction logs highly available and to enable transaction peer
recovery, you must place the recovery logs on a highly available file system, such
as IBM SAN FS or NAS, for all the application servers within the same cluster to
access. All application servers must be able to read from and write to the logs. In
For more details on high-availability considerations for the transaction logs, refer
to the IBM Redbooks publication WebSphere Application Server Network
Deployment V6: High Availability Solutions, SG24-6688.
Each server must be able to access the log directories of other servers in the
same cluster. For this reason, do not leave this setting unset. If you do not set a
directory, the application server assumes a default location within the appropriate
profile directory, which might not be accessible to other servers in the cluster.
Each server in the cluster must also have a unique transaction log directory, to
avoid attempts by multiple servers to access the same log file. For example, you
could use the name of each server as part of the log directory name for that
server.
Tip: If you are using NFS, it is advisable to use the hard option in the NFS
mount command (mount -o hard) to avoid data corruption.
Click OK.
8. Save the changes to the master configuration.
9. Wait for automatic synchronization to complete and click OK, or manually
synchronize the nodes.
10.Copy the existing transaction logs to the shared file system. Make sure that
the location and file permissions are correct.
Click OK.
4. Save the changes to the master configuration.
5. Wait for automatic synchronization to complete and click OK, or manually
synchronize the nodes.
6. Start the cluster.
A one of n policy means that only one server in a cluster can run the transaction
manager service at any given time. If the running transaction manager service
fails, the default transaction manager policy, called Clustered TM Policy,
specifies that the service can fail over to another cluster member. The default
policy also enforces failback. If the failed transaction manager becomes
available, the transaction manager service will fail back to it.
If you are using automated failover, the default transaction manager policy is
likely sufficient for your needs. To examine the default transaction manager
policy:
1. In the administrative console, expand Servers → Core groups.
2. Click the Core group settings link.
3. Click the DefaultCoreGroup link.
4. In the Additional Properties section, click the Policies link.
5. Click the link for Clustered TM Policy. See Figure 6-18.
7. Click Cancel.
You can check that the Web server plug-in file is correctly updated:
1. Navigate to Servers → Web servers and click webserver1.
2. Under Additional Properties, click Plug-in properties.
3. Under Plug-in properties, click the View button.
4. Scroll down the page and you should see the lines shown in Example 6-2.
5. Navigate to Servers → Web servers. Select the webserver1 check box and
click Propagate Plug-in.
6. Navigate to Applications → Enterprise Applications. Select the ITSOApp
and ITSO_implApp check boxes, and click Start.
7. Log in to the Business Process Choreographer console. In our environment
we used the following URL:
http://itsodmgr/bpc
8. Click My Process Templates, select New Loan Process, and click Start
Instance. Provide some test input data and click Submit. This should launch
the business process. If the environment is working correctly, it returns a
response.
To uninstall this or any other enterprise application from the server, issue the
following commands:
cd /opt/IBM/WebSphere/ProcServer/ProcessChoreographer/admin
These clusters are configured over two nodes, and each node has a single
cluster member.
Furthermore, you can create the topology using two distinct methods:
Through the administrative console and template guided activities
Using wsadmin scripting
Refer to Table 5-1 on page 104 for details on database name and schema.
Use the instructions in 5.2.2, “Common database” on page 105, to create the
common database (WPRCSDB).
Use the instructions in 5.2.6, “Event database” on page 112, to create the CEI
database (EVENT).
Use the instructions in 5.2.7, “Business Space database” on page 112, to create
the Business Space database (BSPCDB).
You will now see an 8-stage process outlined beginning with select nodes. Our
topology consists of just two nodes, so you will use both of them, but, in a
larger environment, you can select a sub-set of the entire node list.
Figure 7-4 Clusters window, where you can map the nodes within the clusters
This window shows the distribution of the clusters. The Remote Messaging
and Remote Support topology has three clusters:
– Application Deployment Target is the cluster for WebSphere Process
Server applications.
– Messaging Infrastructure is the cluster for messaging engines.
– Supporting Infrastructure is the cluster for CEI and other services.
In this example, you create three clusters with one server in each cluster and
one server per node.
The REST implementation allows for easy-to-use HTTP services that are
language-independent and platform-independent, stateless, scalable, and
easily parseable. The REST APIs are extremely useful for creating
AJAX-style Web applications, in the same vein as the Business Space
dashboards. Business Space dashboards enable a business user to visualize
business performance data using various widgets. An illustration of Business
Space powered by WebSphere can be found in Chapter 13, “Using Business
Space powered by WebSphere and Lotus Forms Client” on page 355.
EVENT Event server data source This database does not exist yet.
We create it after deployment of
the topology. Note that this does
not support a schema name.
Note: New in WebSphere Process Server 6.2, you can use the Integrated
Solutions Console to configure the cleanup service to schedule jobs that
periodically delete eligible instances. For more information about the
cleanup service go to:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/co
m.ibm.websphere.bpc.620.doc/doc/bpc/tadmin_cleanup.html
11.Clear the Enable e-mail service check box in the Human Task Manager Mail
Session section because we will not be using human tasks with e-mail
escalations. If you require this, you must also provide the other details. Click
Next. The Business Rules Manager window appears.
12.Click Next. The Summary window is displayed.
13.On the Summary panel, check your settings and click Finish.
14.Click the RMSgold link to display the Configuration window (Figure 7-9). This
window shows the status of the three clusters that you just defined, all of
which are currently not configured.
The first task is to copy these scripts over to the DB2 system under the instance
owner. The steps below assume that you have copied the files across into the
home folder of the instance owner.
1. Log in to the DB2 System as the instance owner.
2. Change the directory to the scripts just copied, then run the following
command:
./cr_event_db2.sh 2>&1 | tee output.log
3. Enter 1 for a server connection, because we are on the DB2 system itself.
4. Enter the instance owner name.
5. Enter the instance owner password.
6. The database and tables will be created. Check the file output.log for any
messages.
Note: When checking database connectivity, if you do not see the desired
provider, make sure that the scope at the top of the page is set to All
Scopes.
8. Under Additional Properties, click Data sources, select the check box of the
data sources, and click Test connection.
9. Navigate to Resources → JDBC → JDBC Providers. Click the provider link
at the scope Cluster=RMSgold.AppTarget.
10.Under Additional Properties, click Data sources, select the check box (there
is only one), and click Test connection.
5. Navigate to Servers → Clusters and you will see that the status of each
server cluster is Partial Start (Figure 7-15).
6. Wait until all the clusters are in Started State. The arrows will be solid green.
To keep the transaction logs highly available and to enable transaction peer
recovery, it is necessary to place the recovery logs on a highly available file
system, such as IBM SAN FS or NAS, for all the application servers within the
same cluster to access. All application servers must be able to read from and
write to the logs. In addition to configuring a highly available file system, you must
decide whether to use automated or manual peer recovery for the transaction
manager. In either case transaction manager policies must also exist.
For more details on high availability considerations for the transaction logs, refer
to the IBM Redbooks publication WebSphere Application Server Network
Deployment V6: High Availability Solutions, SG24-6688.
Each server must be able to access the log directories of other servers in the
same cluster. For this reason, do not leave this setting unset. If you do not set a
directory, the application server assumes a default location within the appropriate
profile directory, which might not be accessible to other servers in the cluster.
Each server in the cluster must also have a unique transaction log directory to
avoid attempts by multiple servers to access the same log file. For example, you
could use the name of each server as part of the log directory name for that
server.
Tip: If you are using NFS, we recommend using the hard option in the NFS
mount command (mount -o hard) to avoid data corruption.
8. Click OK.
9. Save the changes to the master configuration.
A one of n policy means that only one server in a cluster can run the transaction
manager service at any given time. If the running transaction manager service
fails, the default transaction manager policy, called Clustered TM Policy,
specifies that the service can fail over to another cluster member. The default
policy also enforces failback. If the failed transaction manager becomes
available, the transaction manager service will fail back to it.
If you are using automated failover, the default transaction manager policy is
likely sufficient for your needs. To examine the default transaction manager
policy:
1. In the administrative console, expand Servers → Core groups.
2. Click the Core group settings link.
3. Click the DefaultCoreGroup link.
4. In the Additional Properties section, click the Policies link.
7. Click Cancel.
5. Navigate to Servers → Web servers. Select the webserver1 check box and
click Propagate Plug-in.
6. Navigate to Applications → Enterprise Applications. Select the ITSOApp
and ITSO_implApp check boxes, then click Start.
7. Log in to Business Process Choreographer console. In our environment we
used the following URL:
http://slesvmsv:9080/bpc
To uninstall this or any other enterprise application from the server, issue the
following commands:
cd /opt/IBM/WebSphere/ProcServer/ProcessChoreographer/admin
These clusters are configured over two nodes, so each cluster has two members.
You are not using the CEI, so the event database, the observer database, and
the schema for CEI in the messaging database are not required.
Use the instructions in 5.2.2, “Common database” on page 105, to create the
common database (WPRCSDB).
5. In the Summary window click Finish. The new cluster will be created.
6. Repeat these steps to create a cluster called Messaging and a cluster called
Support, each with two members. Save and synchronize your changes.
6. Add all three clusters to each of the configurations. First, add the clusters to
the messaging configuration:
a. Click the Messaging tab on the lower half of the window, then select all
three clusters in the upper part of the window.
8. Click the Common Event Infrastructure tab. Select all three clusters and
select Common Event Infrastructure Unit 1 as the unit.
Note: At the time of writing it is not possible to start the custom environment
from the Servers → Deployment Environments window. You must start the
clusters from Servers → Clusters in this order:
1. Messaging
2. Support
3. AppTarget
This window enables you to start and stop existing environments. The New and
Remove buttons enable you to build a new environment based on a pattern or
remove an existing environment. The Export button creates a backup of
configuration patterns and Import generates environments based on previously
configured environments.
From the Deployment Environments window, you can perform the following
tasks, described in the sections that follow:
“Creating a new deployment environment” on page 216
“Starting and stopping deployment environments” on page 220
“Reviewing and changing deployment environments” on page 221
“Exporting and importing deployment environments” on page 226
6. Click Finish to save the environment definition, or click Finish and Generate
to generate the entire deployment environment.
iv. Click OK and click Save after changes have been made.
v. Generate and restart the environment for these changes to be
propagated.
Important: The hostName text box will be changed automatically for you
during the import. The host name will be derived from the federated nodes
into the new RMSUAT cell.
4. Perform the following steps to edit RMSUAT.xml to match the new environment.
a. Open the XML file in an editor.
b. Delete the name value pairs of deferredConfigTime and
deferredConfigUser from the RMSUAT.xml code shown in Example 9-1.
This is the audit message displayed when you clicked Configuration
Done in the Deferred Configuration window.
f. Verify that the userName, serverName, and port are correct for the new
environment. Examine the rest of the file for other values that must be
changed.
g. Save the file.
5. Move it to a location where you will run the Integrated Solutions Console.
6. From the Integrated Solutions Console, click Server → Deployment
Environments and then click Import.
7. Click Browse.
8. Locate the RMSUAT.xml file.
Using compensation
This function is enabled by default. To verify that the Compensation Service is
enabled:
1. Click Servers → Application Servers →
RMSGold.AppTarget.wpsNode01.0.
2. Click Container Services → Compensation Service.
3. Enable service at server startup should be selected.
Note: This service is enabled at the server level, not the cluster level.
However, this can be done using clusters and two database IDs. You will want to
work with the database administrator to create two database IDs that can be
used to access the same tables with the same privileges. The trick is to stagger
the database user IDs’ password expiration. If you have a requirement to change
the password once per month, then one ID should expire on the first day of the
month and the other on the fifteenth.
For this demonstration, let us call the users First and Fifteenth. You bring the
system up on January 1st and the authentication alias is set to the user First. You
now have 30 days to change the database password. On January 15th,
Fifteenth’s password gets changed by the database administrator. Some time
between January 15th and February 1st, the WebSphere Process Server
administrator should change the authentication alias from First to Fifteenth. Once
the authentication aliases are changed, the administrator should issue a ripple
start of the cluster using the database. This is issued by checking the cluster by
clicking the Ripplestart button from the Servers → Clusters window in the
Integrated Solutions Console shown in Figure 9-14 on page 234.
This stops one server in the cluster at a time. When the server stops it quiesces
the incoming work and completes it before stopping. When the server restarts, it
uses the Fifteenth user ID to make database calls. This server takes on new work
while the next cluster member is quiescing work to restart. This happens until all
cluster members are restarted.
Every system based on business processes contains events. There are always
processes and events that fail. The expectation is that a well-developed
application is designed by business knowledgeable people and the business
should know how to best handle failed events and process. The application’s
exception and fault handling code is responsible for handling business failures.
Most system level failures appear as a communication issue. There are two types
of communication:
Synchronous
Synchronous communication is blocking. A call is initiated and the thread
waits for a response before processing further. In case of failure, the invoking
application is responsible for failure capture and retry logic. There is no
administrative action available for a WebSphere Process Server
administrator.
Asynchronous
Asynchronous communication is not blocking. The call is initiated and the
event is placed on a queue. The receiving process is listening on the queue to
process the event and reply to the calling process. If there is business
exception or fault in the receiving process, the application is responsible for
failure capture and retry logic. There is no administrative action available for a
WebSphere Process Server administrator.
The Failed Event Manager (Figure 9-15) allows you to search for failed events.
There are seven default searches and one custom search. If there is a system
failure, you may narrow your desired result set by either destination or date.
Once your search is complete, you may need to take some action. Administrators
and operators are allowed to take action on the Failed Event Manager. If you are
in another role, then you will not see the buttons shown in Figure 9-16.
The Failed Event Manager shows you information about the failed event so that
you can take some action on it.
Note: Actions taken on failed events are business related. For example, the
resubmission of a failed event might result in a financial transaction of some
time (such as money being spent). Therefore, system administrators need
business and application knowledge to act on failed events.
If the destination module was stopped and this was the reason that the event
failed, you should resubmit the event as follows:
1. Check the box in the select column next to the event that you wish to
resubmit.
2. Click Resubmit.
3. Click Refresh.
Important: You cannot resubmit an event that has expired. If the event has
not expired, you can edit the expiration date prior to resubmitting.
When a failed event has expired or you do not wish to resubmit it, then you delete
this event. There are three options in the Failed Event Manager window to do
this:
Delete
Click this button to delete a specific event.
Delete expired events
Click this button to delete any events with an expired date.
Clear all on server
Click this button to delete all events in the Failed Event Manager.
This is a good start. You will need to adapt this configuration to your company’s
security policies and current infrastructure. This includes encrypting
communications with processes external to your WebSphere Process Server
cell, configuring your company’s user repositories, and mapping groups to
administrative roles.
For more information about the new SSL central management feature refer to the
IBM WebSphere Developer Technical Journal article SSL, certificate, and key
management enhancements for even stronger security in WebSphere
Application Server V6.1, available at the following Web page:
http://www.ibm.com/developerworks/websphere/techjournal/0612_birk/0612_
birk.html
For a BPM configuration, you will want to use federated repositories. A federated
repository allows you to search multiple providers with one query.
Federated repositories still give you the flexibility to use LDAP, a custom registry,
or both. WebSphere Business Monitor requires the use of federated repositories,
so you will be configuring federated repositories using LDAP rather than a
standalone LDAP registry.
Important: Any time that you are using more that one machine, the local
operating system user account registry is not supported.
14.To summarize at this point, we have now changed our security such that
instead of using a file-based repository, we are now using LDAP. When we
first created our deployment manager profile and set administrative security,
we specified a user ID of admin with a password of admin. Now what we have
done is changed such that we will now use user ID wps with password
passw0rd when signing into the Integrated Solutions Console in the future.
Figure 10-9 List of authentication aliases created after creating a deployment manager profile
Important: Make sure that all of your nodes are currently running in the
cell, otherwise the synchronize changes with nodes will only synchronize
with running federated nodes. If your nodes are out of synchronization,
there is a command-line tool called synchNode that must be executed from
the profiles directory and the node must be stopped.
5. Review the configuration. Ensure that the Restrict the use of defined
transport channel chains to those protected by SSL radio button is
selected (to restrict non-SSL channel chains).
6. Click OK and Save.
7. Click Buses → Security for bus BPC.<Cell Name>.Bus.
10.Click OK.
Once this is complete, the group wpsuser has been added to the BPEAPIUser
role. These are the same steps that you would use for each set of roles below.
BPEAPIUser wpsusers
WebClientUser wpsusers
JMSAPIUser jmsapi
TaskAPIUser wpsusers
EscalationUser escalation
eventCreator admins
catalogAdministrator admins
catalogReader admins
Note: You will see that there are users and groups already populated. This
occurred during the initial configuration through the wizard.
Note: You can also navigate to the mapping window for the container
application by clicking Applications → SCA Modules → TaskContainer
<deployment_environment>.AppTarget → Security role to user/group
mapping.
To do this:
a. Click Applications → Enterprise Applications →
BusinessSpaceManager_<deployment_environment>.AppTarget.
b. Under Default Properties click Security role to user/group mapping.
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.jsp
?topic=/com.ibm.websphere.bpc.620.doc/doc/bpc/c2observer.html
Perform the following steps to check the web.xml file of the Business Rule
Manager Web application to verify what resources these roles are securing:
1. Click Applications → Enterprise Applications →
BusinessRulesManager_<Support_Cluster_Name>.
2. Under Default Properties click Security role to user/group mapping.
3. Refer to Table 10-2 on page 260 to map your groups to the roles.
For more information about how this manager works, refer to the Information
Center article How the business rules manager works, available at the
following Web page:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.jsp?
topic=/com.ibm.websphere.wps.620.doc/doc/cbre_busiru_overview.html
Figure 10-24 shows a single WBIOperator role. Users assigned this role will be
able to use the application.
While this chapter only discusses extending the Remote Messaging and Remote
Support topology, the principles discussed here apply to the other supported
topologies as well.
With this topology, when querying the BPCDB (for example, to claim a
human task), the result would only show tasks from within a single
BPCDB. While this may not be an issue, based on a pure isolation
application model, it is worth considering when deciding how to grow
your topology.
Growth
With an increase in applications comes the possibility of an increase in
messaging engine destinations. More applications deployed on a single
Application Cluster increases the possibility of memory utilization issues on
the application target, increases failover for messaging engines, and
increases startup times for both messaging engines and application targets.
Similarly, if new versions of applications are being deployed, the number of
destinations will increase further.
This is not an exhaustive list of methods for extending the Remote Messaging
and Remote Support topology. It represents the more common methods of
adding processing capability that are discussed in this chapter.
RMS.AppTarget
ITSO1Node01.0 ITSO2Node02.0
RMS.Support
ITSO1Node01.0 ITSO2Node02.0
SCA.SYSTEM Bus
CEI Bus
SCA.APPLICATION Bus
BPC Bus
SCA.SYSTEM Bus
SCA.APPLICATION Bus
BPC Bus
CEI Bus
ME ME ME ME ME ME ME ME
ITSO2Node02.0 RMS.Messaging
ITSO1Node01.0
ITSO1Node01 ITSO2Node02
This topology was created using the Deployment Environments window in the
Integrated Solutions Console. This environment contains two machines:
ITSO1
ITSO2
Later in this chapter this environment is expanded by adding nodes, servers, and
clusters.
There are a number of reasons why you may wish to add additional cluster
members to the application target cluster, such as:
To increase application processing capability
To create additional capacity for migration or application updates
To provide adequate failover capability
Node 5 Node 6
Member 1 Support
Member 2
Cluster
SCA.SYSTEM Bus
SCA.APPLICATION Bus
BPC Bus
CEI Bus
Node 7 Node 8 Node 9
ME ME ME ME Messaging
Member 1 Member 2 Member 3 Cluster
RMS.AppTarget
ITSO1Node01.0 ITSO2Node02.0 ITSO2Node03.0
RMS.Support
ITSO1Node01.0 ITSO2Node02.0
BPC Bus
SCA.SYSTEM Bus
SCA.APPLICATION Bus
CEI Bus
ME ME ME ME
ITSO1Node01.0 ITSO2Node02.0 ITSO2Node03.0 RMS.Messaging
Figure 11-3 Remote Messaging and Remote Support topology with additional nodes and cluster members
Note: These steps (and the naming conventions used) assume that you
created your initial Remote Messaging and Remote Support environment
using the template-driven deployment process.
1. Use the profile management tool to create a new custom profile on a new
machine that you are including in the topology (if you need additional
hardware) or on an existing machine that is already part of the topology (if you
just need additional processing capability and the existing hardware supports
it). In our lab, a new custom profile was created on machine ITSO2.
2. Federate the node.
3. In the Integrated Solutions Console, expand Servers and click the
Deployment Environments link (Figure 11-4).
6. Click the Existing node radio button and select the newly federated node
from the drop-down list. In our lab, the newly federated node was named
ITSO2Node03 (Figure 11-7).
9. Click OK.
10.Click the Save link to save your changes to the master configuration.
11.If you have automatic synchronization enabled, when the synchronization
process is complete, you should see the message The configuration
synchronization complete for cell. Click OK. Otherwise, manually
synchronize the changes.
14.In the Additional properties section, click the Cluster members link
(Figure 11-10).
15.In the cluster members table, click the check box for the newly added cluster
member and click Start (Figure 11-11).
16.Verify that the new cluster member starts without error by checking
SystemOut.log for exceptions.
17.Repeat the previous steps to start the new messaging cluster member,
RMS.Messaging.ITSO2Node03.0.
When you deploy applications to two separate application target clusters without
modifying the messaging cluster, all the destinations for the applications in both
application clusters are deployed to the messaging cluster, just as they would be
BPC.CellName.Bus
SCA.SYSTEM.CellName.Bus
SCA.APPLICATION.CellName.Bus
CommonEventInfrastructure_Bus
SCA APP SCA SYS CEI BPC
ME ME ME ME RMS.Messaging
ITSO1Node01.0 ITSO2Node02.0 ITSO2Node03.0
In a topology where you have two application clusters and two messaging
clusters, both messaging clusters are members of the SCA.SYSTEM,
SCA.APPLICATION, and BPC buses. Currently, creating duplicate buses is not
supported. When you add additional application and messaging clusters, there
are still only four service integration buses in your topology.
The default behavior of the messaging infrastructure when there are two
application clusters and two messaging clusters is depicted in Figure 11-15.
BPC.CellName.Bus
SCA.SYSTEM.CellName.Bus
SCA.APPLICATION.CellName.Bus
CommonEventInfrastructure_Bus
Node 4 Node 5
WLM
Node 6 Node 7
ME ME Bus Member 2
Member 1 Member 2
Messaging Cluster 2
Figure 11-15 Messaging behavior with two application clusters and two messaging clusters
When you have two application clusters and two messaging clusters, as you
deploy applications to the application target clusters, you identify which
messaging cluster will hold the destinations used by the applications for
asynchronous communication. When an application needs access to a
destination, it connects to the appropriate bus and then to the messaging engine
in the cluster where the destinations are housed.
If the messaging engine in the cluster that houses the application’s destinations
is down, a condition called store-and-forward results. In Figure 11-16 on
page 286, an application in WPS Cluster 2 needs access to a destination that
was created in messaging cluster 2. However, the applicable messaging engine
in that cluster is down. Because the application cannot place the message in the
appropriate destination, the workload manager will connect the application to the
messaging engine in messaging cluster 1. Because the message is intended for
a destination in the other messaging cluster, the messaging engine on
messaging cluster 1 will create a temporary queue for the message and will
deliver it to the messaging engine on messaging cluster 2 when the messaging
engine becomes available.
BPC.CellName.Bus
SCA.SYSTEM.CellName.Bus
SCA.APPLICATION.CellName.Bus
CommonEventInfrastructure_Bus
Node 4 Node 5
Node 6 Node 7
ME ME Bus Member 2
Member 1 Member 2
Messaging Cluster 2
BPC.CellName.Bus
SCA.SYSTEM.CellName.Bus
SCA.APPLICATION.CellName.Bus
CommonEventInfrastructure_Bus
Node 4 Node 5
Node 6 Node 7
ME ME Bus Member 2
Member 1 Member 2
Messaging Cluster 2
In Figure 11-17, each application target cluster uses a specific set of messaging
engines in a specific messaging cluster. For SCA messaging and BPC
messaging, WPS cluster 1 will use the messaging engines on messaging cluster
1. For SCA and BPC messaging, WPS cluster 2 will use messaging cluster 2.
The target significance property for the activation specifications and connection
factories determines this behavior. Because the CEI resources are defined at the
cell level, both application target clusters will use messaging cluster 1 for CEI
message traffic.
BPC.CellName.Bus
SCA.SYSTEM.CellName.Bus
SCA.APPLICATION.CellName.Bus
CommonEventInfrastructure_Bus
SCA APP SCA SYS BPC
ME ME ME RMS.Messaging2
ITSO1Node01.0 ITSO2Node03.0
Figure 11-18 Gold topology with two application clusters and messaging clusters
Note: Adjust the directory paths for your operating system. Because the
our lab machine was on Windows®, the \ character was used.
Once the new database is created, the next step is to create the second
application target cluster.
2. In the server clusters window, click New. This opens the Step 1: Enter basic
cluster information window.
Click Next. The Step 2: Create first cluster member window opens.
4. Perform the following steps to create the first cluster member (Figure 11-22):
a. Enter the name of the first cluster member in the Member name text box.
In our lab, we used the name RMS.AppTarget2.ITSO1Node01.0 to keep
the naming conventions in line with the names generated during
template-driven topology creation.
b. Choose the appropriate node from the Select node drop-down list. In our
lab, this value was ITSO1Node01.
c. In the Select basis for first cluster member section, click the Create the
member using an application server template radio button and choose
defaultProcessServer from the drop-down list.
5. Click Next. The Step 3: Create additional cluster members window opens.
6. Perform the following steps to create additional cluster members
(Figure 11-23):
a. Enter the name of the additional cluster member in the Member name text
box. In our lab, we used the name RMS.AppTarget2.ITSO2Node02.0 to
keep the naming conventions in line with the names generated during
template-driven topology creation.
b. Choose the appropriate node from the Select node drop-down list. In our
lab, this value was ITSO2Node02.
7. Click the Add Member button. The name of the additional cluster member
should appear in the table.
4. In the General Properties section, click the Support the Service Component
Architecture components check box (Figure 11-28).
When you select the remote messaging cluster, the System bus member and
Application bus member sections should be populated with the same
information used to enable SCA in the first application target cluster
(Figure 11-30).
Click OK.
6. Click Save.
7. If you have automatic synchronization enabled, you should see the following
message when the synchronization process is complete:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes when you are done
creating policies.
You should be returned to the Server clusters window, and you should see
your newly created cluster. Do not start the cluster at this time. You will
configure the remaining options before you start the cluster.
configSCAJMSForCluster
Use this command to configure the messaging cluster to support
asynchronous communication for SCA applications using the
SCA.APPLICATION bus.
Note: Full syntax for configSCAJMSForCluster can be found within the 6.2
Infocenter:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.jsp
?topic=/com.ibm.websphere.wps.620.doc/doc/rref_cfgscajmsclustercmd
.html
7. In the State Observers section, if your applications produce CEI events, select
the Business Flow Manager or the Human Task Manager check box (or
both if you wish to monitor human tasks and business processes) for the
Common Event Infrastructure Logging row. This is shown in Figure 11-36.
Audit logging can also be used to persist business-relevant data for auditing
purposes. Because of the performance implications, you should carefully
consider using both audit logging and CEI logging.
9. In the Bus section, clear the Use the default configuration check box. If you
leave this option selected, the BPC bus and the BPC messaging engine are
created in the RMS.AppCluster2 cluster. See Figure 11-38.
10.In the Bus Member Location section, click the Remote radio button and select
the remote messaging cluster, RMS.Messaging, from the drop-down list
(Figure 11-39). When the remote messaging cluster is selected, you should
see the database properties for the BPC bus that were configured during
template-driven deployment. Because both application target clusters will be
using the same remote messaging cluster, these properties are the same for
both application clusters.
4. In the General Properties section, select the CEI destination radio button
defined at the cell scope. In our lab, this value was
cell/clusters/RMS.Support/com/ibm/events/configuration/emitter/Default
(Figure 11-42).
Click OK.
5. Click the Save link to save changes to the master configuration.
6. If you have automatic synchronization enabled, when the synchronization
process is complete, you should see the following message:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes.
7. With the additional application target cluster configured, start the cluster.
8. Verify that the cluster members start without error by checking each member’s
SystemOut.log for exceptions.
Once the data store is created, the schemas and tables required are created the
first time that the messaging engines connect to the database. Alternately, you
may create the messaging engine database and use the sibDDLGenerator
command to create the messaging engine schemas and tables.
When you create the new data store for the second set of messaging engines in
the cell, you can create new schemas in the existing MEDB or you can create a
new database. The option that you choose ultimately depends upon the
database system that you are using and the performance tuning required. For
example, in DB2, creating a new database improves performance.
Click Next. The Step 2: Create first cluster member window opens.
Click Next. The Step 3: Create additional cluster members window opens.
6. Click Add Member. The name of the additional cluster member should
appear in the table below.
Note: Adding members during cluster creation is not required. You may
create the cluster with one member first and verify the cluster configuration
before adding more members. For demonstration purposes, all cluster
members were added at the same time in this example.
Because the current cluster that you are configuring will be used as the
messaging engine cluster for your SCA components, the Bus Member
Location is considered local.
Click OK.
7. Click the Save link at the top of the window to save your changes to the
master configuration.
8. If you have automatic synchronization enabled, when the synchronization
process is complete, you should see the following message:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes.
ii. In the Target text box, enter the name of the SCA.APPLICATION bus
messaging engine that you want the application to use.
In our lab, the application was deployed to the RMS.AppTarget cluster
(not RMS.AppTarget2), so the value used here
(RMS.Messaging.000-SCA.APPLICATION.Bus) was the name of the
SCA.APPLICATION messaging engine used by the RMS.Messaging
cluster. This establishes an affinity between the application in
RMS.AppTarget and the engine in the RMS.Messaging cluster.
If you had deployed the application to RMS.AppTarget2, you could use
the name of the SCA.APPLICATION messaging engine used by
RMS.Messaging2 instead. Establishing target significance in this
manner is not required. It was configured this way for convenience. You
RMS.AppTarget
ITSO1Node01.0 ITSO2Node02.0
RMS.Support
ITSO1Node01.0 ITSO2Node02.0
SCA.SYSTEM Bus
CEI Bus
SCA.APPLICATION Bus
BPC Bus
SCA.SYSTEM Bus
SCA.APPLICATION Bus
BPC Bus
CEI Bus
ME ME ME ME ME ME ME ME
ITSO2Node02.0 RMS.Messaging
ITSO1Node01.0
ITSO1Node01 ITSO2Node02
When you create the policies, you configure the preferred servers list to reflect
which cluster member should run each messaging engine.
In production, you may wish to do this to ensure that the most robust machine
available is always the preferred messaging server for the most heavily used
messaging engine (usually 000-SCA.SYSTEM or 000-BPC). This configuration
also allows you to use different servers to run each of the messaging engines.
For example, you may wish to create a policy to run the SCA.SYSTEM and
SCA.APPLICATION engines on one server, and two additional policies to run the
CEI and BPC engines on other servers. As a best practice, you should not
separate the SCA.APPLICATION and SCA.SYSTEM engines. Because they
interact, you should keep these two engines on the same server.
In the lab used for this publication, the original Remote Messaging and Remote
Support topology was extended from two nodes to three. The third node contains
a third member of the RMS.Messaging cluster, which was created using the
WebSphere Application Server template. To distribute the messaging engines
across these three cluster members, four messaging engine policies were
created:
The first policy identified messaging cluster member one (ITSO1Node01.0 on
node one) as the server used to run the SCA.SYSTEM engine.
The second policy also identified cluster member one as the server used to
run the SCA.APPLICATION engine.
The third policy identified messaging cluster member two (ITSO2Node02.0 on
node two) as the server used to run the CEI engine.
The fourth policy identified messaging cluster member 3 (ITSO2Node03.0 on
node three) as the server used to run the BPC engine.
SCA.SYSTEM.CellName.Bus
CommonEventInfrastructure_Bus
BPC.CellName.Bus
SCA.APPLICATION.CellName.Bus
RMS.Messaging
RMS.Messaging. RMS.Messaging. RMS.Messaging.
ITSO1Node01.0 ITSO2Node02.0 ITSO2Node03.0
ME ME ME ME
The first policy that you should create is the SCA.SYSTEM messaging engine
policy. This messaging engine supports asynchronous communication between
SCA components and applications. It also support asynchronous communication
with WebSphere (JCA) adapters.
3. In the Additional Properties section, click the Policies link (Figure 11-57).
5. In the General Properties section, for the Policies text box, select One of N
policy from the drop-down list (Figure 11-59).
Click Next.
Click OK.
10.At the Match criteria window, click the New button.
Click OK.
12.When you are returned to the Match criteria window, click the New button.
Click OK.
14.In the Match criteria window, click the New button.
Click OK. In the match criteria window, you should see all four of the criteria
that you created (Figure 11-67).
Because this policy now has a match weight factor of four (because you
specified four match criteria), it should override the default service integration
bus policy with its match weight factor of one (type = WSAF_SIB). When
multiple policies apply to the same processes, the policy with the highest
17.In the Additional Properties section, click the Preferred servers link.
18.In the Core group servers section, select the first preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO1Node01/RMS.Messaging.ITSO1Node01.0. This
is shown in Figure 11-69.
19.In the Core group servers section, select the second preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO2Node02/RMS.Messaging.ITSO2Node02.0).
This is shown in Figure 11-70.
20.In the Core group servers section, select the third preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add
Adding the servers to the Preferred servers list in this order should force the
SCA.SYSTEM messaging engine to always start on
RMS.Messaging.ITSO1Node01.0.
If this cluster member is unavailable, the high availability manager should
start the messaging engine on RMS.Messaging.ITSO2Node02.0. If that
server is unavailable, the high availability manager should start the
messaging engine on RMS.Messaging.ITSO2Node03.0. Because you
selected the Preferred servers only option, only the three servers listed can
run the SCA.SYSTEM messaging engine.
Click OK.
21.Click the Save link at the top of the window (Figure 11-72).
This policy should match the one that you create for the SCA.SYSTEM
messaging engine. Because the two engines interact, you should keep them on
the same server. To create the policy used to implement the topology used in this
publication:
1. In the Policies window, click the New button.
2. In the General Properties section, for the Policies text box, select One of N
policy from the drop-down list and click Next.
3. In the General Properties section, perform the following steps:
a. For name, enter SCAAppME000 (ME zero zero zero).
b. Ensure that the policy type is set to One of N policy.
c. Leave the Is alive timer set to 0.
d. Select the Preferred servers only check box.
Click OK. You should be returned to the core groups window with the
following message at the top of the window.
The policy must have at least one match criteria defined
4. In the Additional Properties section, click the Match Criteria link.
5. Follow the steps in 11.5.1, “Create the SCA.SYSTEM messaging engine
policy” on page 320, to create the match criteria shown in Table 11-1.
type WSAF_SIB
IBM_hc RMS.Messaging
WSAF_SIB_MESSAGING_EN <ClusterName>.000-SCA.APPLICATION.<CellNa
GINE me>.Bus (for example,
RMS.Messaging.000-SCA.APPLICATION.ITSO1C
ell01.Bus)
6. Click the SCAAppME000 link in the breadcrumb trail at the top of the core
groups window.
7. In the Additional Properties section, click the Preferred servers link.
8. In the Core group servers section, select the first preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO1Node01/RMS.Messaging.ITSO1Node01.0.
9. In the Core group servers section, select the second preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO2Node02/RMS.Messaging.ITSO2Node02.0.
10.In the Core group servers section, select the third preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO2Node03/RMS.Messaging.ITSO2Node03.0.
About the order in which you add servers: Adding the servers to the
Preferred servers list in this order should force the SCA.APPLICATION
messaging engine to always start on RMS.Messaging.ITSO1Node01.0
(the same server as the SCA.SYSTEM messaging engine). If this cluster
member is unavailable, the high availability manager should start the
messaging engine on RMS.Messaging.ITSO2Node02.0. If this cluster
member is unavailable, the high availability manager should start the
messaging engine on RMS.Messaging.ITSO2Node03.0. Because you
selected the Preferred servers only option, only the three servers listed can
run the SCA.APPLICATION messaging engine.
Click OK.
11.Click the Save link at the top of the window.
12.If you have automatic synchronization enabled, when the synchronization
process is complete, you should see the following message:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes when you are done
creating policies.
You will be returned to the Policies window and see your newly created policy.
To create the CEI messaging engine policy used to implement the topology used
in this publication:
1. In the Policies window, click the New button.
2. In the General Properties section, for the Policies text box, select One of N
policy from the drop-down list and click Next.
3. In the General Properties section, perform the following steps:
a. For name, enter CEI_ME000 (ME zero zero zero).
b. Ensure that the policy type is automatically set to One of N policy.
c. Leave the Is alive timer set to 0.
d. Select the Preferred servers only check box.
Click OK. You should be returned to the core groups window with the
following message at the top of the window:
The policy must have at least one match criteria defined
4. In the Additional Properties section, click the Match Criteria link.
5. Follow the steps in 11.5.2, “Create the SCA.APPLICATION messaging engine
policy” on page 331, to create the match criteria shown in Table 11-2.
type WSAF_SIB
IBM_hc RMS.Messaging
WSAF_SIB_BUS CommonEventInfrastructure_Bus
WSAF_SIB_MESSAGING_EN <ClusterName>.000-CommonEventInfrastructure_
GINE Bus (for example,
RMS.Messaging.000-CommonEventInfrastructure_
Bus)
6. Click the CEI_ME000 link in the breadcrumb trail at the top of the core groups
window.
7. In the Additional Properties section, click the Preferred servers link.
Note about the order in which you add servers: Adding servers in this
order forces the messaging engine to start on
RMS.Messaging.ITSO2Node02.0. If this cluster member is unavailable, the
high availability manager starts the messaging engine on
RMS.Messaging.ITSO1Node01.0. If this cluster member is unavailable, the
high availability manager starts the messaging engine on
RMS.Messaging.ITSO2Node03.0. Because you selected the Preferred
servers only option, only the three servers listed can run the CEI
messaging engine.
Click OK.
11.Click the Save link at the top of the window. If you have automatic
synchronization enabled, when the synchronization process is complete, you
should see the following message:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes when you are done
creating policies.
12.You will be returned to the Policies window and see your newly created policy.
To create the BPC messaging engine policy used to implement the topology
used in this publication, perform the following steps:
1. In the Policies window, click the New button.
Table 11-3 Business Process Choreographer messaging engine policy match criteria
Criteria name Value
type WSAF_SIB
IBM_hc RMS.Messaging
6. Click the BPC_ME000 link in the breadcrumb trail at the top of the core
groups window.
7. In the Additional Properties section, click the Preferred servers link.
8. In the Core group servers section, select the first preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO2Node03/RMS.Messaging.ITSO2Node03.0.
9. In the Core group servers section, select the second preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO1Node01/RMS.Messaging.ITSO1Node01.0.
10.In the Core group servers section, select the third preferred server
<HostNameNodeName>/<MessagingClusterMember> and click Add. In
our lab, this value was ITSO2Node02/RMS.Messaging.ITSO2Node02.0.
Click OK.
11.Click the Save link at the top of the window.
12.If you have automatic synchronization enabled, when the synchronization
process is complete, you should see the following message:
The configuration synchronization complete for cell.
Click OK. Otherwise, manually synchronize the changes when you are done
creating policies.
13.You should be returned to the Policies window and you should see your newly
created policy.
14.Once all four policies have been created, perform the following steps:
a. Stop the clusters.
b. Stop the deployment manager.
c. Start the deployment manager.
d. Restart the node agents.
e. Restart the clusters.
SCA.SYSTEM
SCA.APP
BPC
WPRCSDB MEDB
BPEDB BPEDB2
ME_member1
MECluster
ME ME ME ME
ATC_member1
AppTargetCluster
BPC/HTM/SCA
ME2_member1
MECluster
ME ME ME
This pattern simply does not work. A single process server or ESB deployment
target can only configure its destinations on a single member of an SIBus. This
means that in a deployment with a single application target but multiple
messaging engines, you cannot choose to put half of the destinations on one
messaging target.
Even if the possibility arose to force this configuration, you would have distinct
issues uninstalling or installing an application (you would have to reconfigure the
specification for the location of the destinations each time). This ultimately
becomes impossible to manage.
SCA.SYSTEM
SCA.APP
BPC
WPRCSDB MEDB
BPEDB MEDB2
ATC_member1
AppTargetCluster
BPC/HTM/SCA
ME_member1
MECluster
ME ME ME ME
ATC2_member1
AppTargetCluster2
BPC/HTM/SCA
http://www.ibm.com/developerworks/websphere/library/techarticles/0901
_herness/0901_herness.html
To demonstrate the capabilities of these products, the Web services deployed for
the vehicle loan application are enabled for service management and viewed
through Tivoli Enterprise Portal. Refer to Chapter 2, “Sample business
application scenario used in topologies” on page 23, for a discussion of the
application.
http://publib.boulder.ibm.com/infocenter/tivihelp/v15r1/index.jsp?toc=/
com.ibm.itm.doc/toc.xml
Refer to the following IBM Redbooks publications for a more detailed discussion
of the subject:
Best Practices for SOA Management, REDP-4233
Patterns: SOA Foundation Service Creation Scenario, SG24-7240
ITCAM for
SOA V7.1
Services
atomic and composite
Service Components
Service Provider
Linux
z/OS WPS WBSF DB2 LDAP
Windows
blade41.itso.ibm.com wxpsp2.itso.ibm.com
Tivoli Enterprise
Managing Agent
(TEMA) 6.2
Data
Collector
ITSOBank
WPS
Vehicle Loan
WBSF
Application
Developer workstation ITCAM for SOA Tools - Eclipse-based Web services Navigator
In addition to the DA, other elements of interest to the monitoring solution include
the database, operating systems, transactions, and many more. Each of these
elements can be configured accordingly the ITCAM for SOA concept of
situations. A situation is a condition in which a set of attributes (measurements)
ITCAM for SOA also provides facilities to extend these situations or design
custom situations.
Where e is the numeric designation for the target application server and
WPS_HOME is the installation root directory for WebSphere Process Server. For
this lab we ran the following command:
C:\ibm\ITM\TMAITM6\KD4\bin>KD4configDC.bat -enable -env 1 c:\"Program
Files"\IBM\WebSphere\ProcServer
Figure 12-7 Service Invocation Summary for the ITSOBank loan application
2. Under the heading Transaction ID, click a transaction to view its respective
invocation report.
Figure 12-8 Performance report for the high risk loan provider endpoint
For more details on the Performance Manager visit the WebSphere Business
Services Fabric V6.2 Information Center found at:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com.ibm.
ws.fabric.tools.doc/pm/concept/c_pmoverview.html
Lotus Forms consists of a design tool for creating user interfaces (forms) for
human tasks and runtime components for viewing the forms. This chapter
demonstrates how Lotus Forms can be integrated with WebSphere Integration
Developer to generate a user interface for human tasks for later deployment on
WebSphere Process Server. It shows how to use the Forms Designer to create
and modify the properties of a form.
Log in to the DB2 system as the instance owner, then run the following
commands:
db2 "CREATE DATABASE BSPCDB USING CODESET UTF-8 TERRITORY en-us"
db2 connect to BSPCDB USER db2inst1 using 'dbpass'
db2 connect reset
Now that the database is created successfully, you can create the Business
Space database tables.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 357
3. Run the SQL commands against the BSPCDB database:
db2 connect to BSPCDB
db2 -tf createTable_BusinessSpace.sql
db2 connect reset
Once the database setup is complete, you can log off the database server.
Figure 13-1 System REST Service Endpoints for Business Space window
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 359
6. In the Database schema name box, type the name of the database schema
that you want to use for Business Space, as shown in Figure 13-3.
Note: If you do not see an existing data source that you want to use, you
must cancel the Business Space Configuration page, set up the database
and the data source that you want to use, and then restart the Business
Space Configuration page to complete the configuration.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 361
On the Welcome to Business Space page, you can use the learning resources to
tour Business Space and create your own space. Figure 13-4 shows a sample
Business Space Manager window.
For this example, we created a Business Space named ITSO Single Cluster
from the Solution Management template. This template contains the following
widgets:
Business Calendar Manager
Health Monitor
Security Manager
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 363
13.2 Lotus Forms
This section describes how to install and use Lotus Forms to create a form for a
Human Task and then deploy the form to WebSphere Process Server. The
instructions assume that you have WebSphere Integration Developer V6.2
installed and have imported the ITSOLoanProcess_PI.zip file under the directory
/Scenarios/WPS/HTM. Lotus Forms consists of the following products:
Lotus Forms Designer, which is the tool used to create the user interfaces for
human tasks.
The Lotus Forms Viewer and Server API are runtime components. The Lotus
Forms Viewer can be used as a standalone application, but is more typically
used as a Web browser plug-in to allow Lotus Forms to be displayed within
Web pages.
The Server API is a set of applications that are required by WebSphere
Process Server to interact with deployed Lotus Forms.
Note: WebSphere Process Server only function with Lotus Forms 3.0.x.
If you install Lotus Forms as a standalone application, you cannot create Human
Task forms because Lotus Forms will not be available within WebSphere
Integration Developer. In this example, Designer is integrated with Integration
Developer.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 365
2. On the Add Designer to an existing IBM package window, click Change and
navigate to the WebSphere Integration Developer installation directory
(Figure 13-7).
Click Next.
3. On the Summary window, click Install to initiate the installation.
Note: Complete installation instructions for the viewer can be found here:
http://publib.boulder.ibm.com/infocenter/forms/v3r5m0/index.jsp?topic
=/com.ibm.form.viewer.installing.doc/toc.html
Note: The Lotus Forms Server API on Solaris requires the libstdc++.so.6
library to be installed.
The Lotus Forms Server API on AIX is required to have Version 8 of the XL C
runtime installed. This can be found at:
http://www-01.ibm.com/support/docview.wss?uid=swg21215669
All installations can be run from a graphical installer, but you are required to be
running from an X-Windows client do so.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 367
To perform the installation, perform the following:
1. During installation, choose the Runtime configuration. On the next panel, the
installer asks you whether the Server API should be installed into an existing
WebSphere Process Server deployment, as seen in Figure 13-8.
3. Click Next to view the Summary panel. Click Install to begin the installation.
4. To complete the Lotus Forms integration (in a standalone WebSphere
Process Server deployment), use these manual steps. See Step 5 if you are
using a clustered deployment.
– On Windows:
i. Update the System variable PATH environment variable to include
<Server API Location>\Server\3.5\API\redist\msc32.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 369
ii. Amend the PureEdgeAPI.ini file (Figure 13-10) to point to the API
PureEdge libraries. If you automatically integrated with WPS, this file
will already exist in the \WINDOWS directory. Otherwise, this file must
be created.
Note: The entry starts with ‘*=’ to indicate the path for all PureEdge
API calls. If you need to have multiple APIs installed, enter the
version number instead of an asterisk (*). For example, Lotus Forms
3.0 has an API version of 7.5 and Lotus Forms 3.5 has an API
version of 7.6.
iii. Amend the prefs.config file if required. In most situations this file
needs no amendment.
http://publib.boulder.ibm.com/infocenter/forms/v3r5m0/index.
jsp?topic=/com.ibm.form.api.configuring.doc/api_configuring_
windows_prefsconfig.html
iv. Register the COM dynamic link library (DLL) by opening a DOS shell or
command prompt and executing regsvr32 <path_to_pe_file>.
– On UNIX:
i. Update the library path for the Server API directories. These directories
are <Forms API Directory>/redist/<platform> and <Forms API
Directory>/redist/<platform>/PureEdge/76/system.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 371
h. In the WebSphere Integrated Solutions Console, open Environment →
Shared Libraries and change the scope by selecting the node where you
wish to add the shared libraries entry. This should be the same node that
you selected in step b.
i. Click New and enter a name of LFS_API_LIB (Classic), as seen in
Figure 13-12 or lFS_STREAMING (Streaming API).
j. In the CLASSPATH field add the following files:
• ${LFS_API_LIB_DIR}/pe_api.jar
• ${LFS_API_LIB_DIR}/pe_api_native.jar
Note: If you are using the Streaming API then just add the single jar
file:
${LFS_API_STREAM_LIB_DIR}/StreamingAPI.jar
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 373
Figure 13-14 Generate a human task user interface
3. Enter the name of the external Web project (in our example ITSOHTaskUI) for
the Lotus Forms UI.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 375
4. Specify whether the module and the UI will reside on the same (local) or
different (remote) servers and select the style, as seen in Figure 13-16. Two
styles are provided:
– IBM Style
– Cool Blue™ Style
Other style sheets (CSS) can be added to generate different themes. After
filling out the options, click Next.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 377
6. The Lotus Form UI has now been generated but has not yet been associated
with the human task. To do this, double-click the human task within your BPEL
process. This opens the task window, as seen in Figure 13-18. Click the add
definitions icon in the User Interface section and select Lotus Forms from the
pull-down menu.
7. Click the Lotus Form that was just added and select the Properties view.
Change Select where to store your Lotus Form from Module to Web Project.
A new section, as shown in Figure 13-19, will appear, allowing you to browse
to the newly created Web project. Open the listed Web project, and open the
tree to find the .xfdl file, which is the generated Lotus Form. Click OK and
then Save, and the form is ready to be deployed.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 379
To make these changes:
1. Once the form has been generated, switch to the Advanced Forms Designer
Perspective by clicking Window → Open Perspective → Advanced Lotus
Forms Designer.
2. In the Navigator view, expand the ITSOHTaskUI project and navigate to
WebContent → forms → VerifyCustomer.xfdl and open the file. The xfdl
file should be displayed in Designer.
3. Click the text field adjacent to the CustomerIdentificationNumber label and
select the Properties tab. There are a myriad of options for this field, but to
make it read-only, we simply change the read-only option to on, as seen in
Figure 13-21.
Chapter 13. Using Business Space powered by WebSphere and Lotus Forms Client 381
URL supplied above, the entries will now have the amended characteristics.
Input values are shown in Figure 13-23 and the claimed task with amended
values can be seen in Figure 13-24.
Figure 14-1 shows the Remote Messaging and Remote Support (RMRS)
topology pattern, and shows where WebSphere Business Services Fabric
components are added to it.
Deployment
Manager
(Fabric ND Profile)
WPS
COMMON
Messaging
Messaging 1 Cluster Messaging 2
SCA Bus SCA Bus FABRICDB +
Fabric Bus Fabric Bus Messaging
Application
Application 3 Cluster Application 4 BPEDB
SCA/BPC Container SCA/BPC Container /MEDB/EV
Fabric EARS Fabric EARS ENT/OBS
VRDB
Support
Support 5 Cluster Support 6
CEI CEI
BRM BRM
Business Space Business Space
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 387
Fabric adds the following components to the RMRS topology:
A service integration bus for Fabric is added to the cell.
A bus member for the new bus is created using the Messaging cluster.
The Fabric database is added to the topology. The Fabric database contains
performance manager data.
The messaging tables required for Fabric bus are added to the Messaging
Engine database (MEDB).
The Fabric application EAR files (Fabric_Tools, Fabric_Catalog,
Fabric_Engine, Fabric_Rest_Service, and Tools_Help) are added to the
deployment manager profile.
The Fabric application EAR files are deployed to the application cluster.
Fabric events are configured to be emitted to the JMS destinations present in
the support cluster.
You will receive a message indicating that the deployment manager stop was
completed.
You will receive a message indicating that the nodeagent stop was completed.
Complete this step for each node in the cell.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 389
5. At the Systems Prerequisites check window, click Next.
6. At the WPS Installation Location window, select or enter
/opt/ibm/WebSphere/ProcServer and click Next (Figure 14-2).
7. At the Installation Types window, select Files Only and click Next
(Figure 14-3).
USER_INPUT_RESULTS=\”\”,\”\”,\”Files Only\”
USER_INPUT_RESULTS_1=
USER_INPUT_RESULTS_2=
USER_INPUT_RESULTS_3=Files Only
USER_INPUT_RESULTS_BOOLEAN_1=0
USER_INPUT_RESULTS_BOOLEAN_2=0
USER_INPUT_RESULTS_BOOLEAN_3=1
#USER_INPUT_RESULTS=\”\”,\”\”,\”Typical Installation\”
#USER_INPUT_RESULTS_1=Typical Installation
#USER_INPUT_RESULTS_2=
#USER_INPUT_RESULTS_3=
#USER_INPUT_RESULTS_BOOLEAN_1=1
#USER_INPUT_RESULTS_BOOLEAN_2=0
#USER_INPUT_RESULTS_BOOLEAN_3=0
#USER_INPUT_RESULTS=\”\”,\”\”,\”Advanced Installation\”
#USER_INPUT_RESULTS_1=
#USER_INPUT_RESULTS_2=Advanced Installation
#USER_INPUT_RESULTS_3=
#USER_INPUT_RESULTS_BOOLEAN_1=0
#USER_INPUT_RESULTS_BOOLEAN_2=1
#USER_INPUT_RESULTS_BOOLEAN_3=0
USER_INSTALL_DIR=/opt/ibm/WebSphere/Fabric/FoundationPack
WPS_HOME=/opt/ibm/WebSphere/ProcServer
DD_CHOICE_SELECTED=/opt/ibm/WebSphere/ProcServer
#WPS_PROFILE=wbsFabric
#WPS_USER=admin
#WPS_PASSWORD=passw0rd
#JDBC_PASSWORD=passw0rd
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 391
4. Run the following command:
./install_fabric_lnx -i silent -f fabric.foundation.properties
You should see output similar to Figure 14-5, which indicates a successful
installation.
5. You can also verify the installation by navigating to the installation root, in this
case, /opt/ibm/WebSphere/Fabric/FoundationPack. Locate the file named
IBM_WebSphere_Business_Services_Fabric_Foundation_Pack_v6_2_InstallL
og.log and find the Summary section. There should be zero warnings,
NonFatalErrors, or FatalErrors (Figure 14-6).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 393
7. Review the Pre-Installation Summary window and click Install.
8. Verify that you receive a message indicating that iFix 001 was successfully
installed to /opt/ibm/WebSphere/Fabric/FoundationPack. Click Done.
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.js
p?topic=/com.ibm.ws.fabric.install.doc/fpi/task/t_setting_up_db_
distributed.html
If you are using a remote database server, copy the fabric database script
to the remote database server and execute the script manually. The Fabric
database script can be found at
<$FABRIC_INSTALL>/configuration/database/db2/db2.
Note: The DB2 server port does not need to be 50001. This setting was
used in this publication for demonstration purposes.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 395
11.Once the profile augmentation is complete, uncheck Launch the First steps
console. Click Finish.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 397
/opt/ibm/WebSphere/ProcServer/universalDriver_wbi/lib
-fabricDbDriverType 4 -fabricDbCreateNew true
3. After running this command, you should receive the following message:
INSTCONFSUCCESS: Profile augmentation succeeded.
Verify that the deployment manager has been started successfully. If you have
multiple custom profiles, you must repeat these steps for each custom profile.
Note: If the augmentation fails, be sure to check the log file located in
/opt/ibm/WebSphere/ProcServer/logs/manageprofiles. The log file name
is <profile_name>_augment.log, which is different from the log file
indicated in the failure message.
10.Once the profile augmentation is complete, uncheck Launch the First steps
console. Click Finish.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 399
Parameter Description
Note: Make sure that the deployment manager and any nodes is in a started
state. The last steps of the scripts synchronize the deployment manager with
the nodes in the cell.
1. The script is in
/opt/ibm/WebSphere/ProcServer/profileTemplates/dmgr.wbsfabric/action
s/scripts/cluster and the file name is fabricSIBConfig.py.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 401
Verify creation of Fabric bus and resources
If the fabricSIBConfig.py script ran successfully, there are a number of resources
created. It is a good practice to verify that these resources do indeed exist and
function properly.
1. Navigate to Service integration → Buses. You should see a bus named
Fabric.<cell_name>.Bus in the list (Figure 14-8).
2. The bus member’s target is the messaging cluster that was selected when
running the script. Click the bus. Select Topology → Bus members
(Figure 14-9).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 403
4. The security settings for the bus were configured when you ran the script. The
authentication alias for the Fabric bus is the same as the SCA System bus
because you selected the SCA System bus settings when you ran the script.
Click the bus. Select Additional Properties → Security, as shown in
Figure 14-11.
Figure 14-12 Users and groups in the bus connector role for the Fabric bus
6. A messaging engine is configured for the Fabric bus. Click the bus. Select
Topologies → Messaging engines (Figure 14-13).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 405
7. The Fabric messaging engine uses the message store type as the SCA
System bus. Click the messaging engine. Select Additional properties →
Message store. The properties of the Fabric messaging engine data store
was created with the setting shown in Figure 14-14.
8. A Fabric Bus messaging engine data source was created as well. The
properties are identical to that of the SCA messaging engine data source.
Navigate to Resources → JDBC → Data sources. Locate the data source
shown in Figure 14-15.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 407
To verify that the application deploy script was successful, perform the following:
1. The enterprise applications shown in Figure 14-16 were deployed.
4. The hub request queue was created to queue requests to the hub, not the
Dynamic Assembler. The scope for this queue is the application cluster.
Select Resources → JMS → Queues (Figure 14-19).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 409
5. The DA Event topic was created to publish requests to the Dynamic
Assembler. The scope for this resource is the application cluster. Select
Resources → JMS → Topics (Figure 14-20).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 411
7. There are two name space bindings created at the application cluster level.
Select Environment → Naming → Name Space Bindings (Figure 14-22).
8. A replication domain was created for context replication targeted to the entire
domain. Select Environment → Replication domains (Figure 14-23).
10.The details for the Fabric Context Cache show that the cache replication is
enabled with the replication targeted to the Fabric DA replication domain
(Figure on page 414).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 413
Note: The Fabric Context Cache can be further tuned using WebSphere
Process Server’s Integrated Solutions Console.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 415
14.2.9 Verify installation of interim fix 31376
To do this:
1. Start the deployment manager, any custom nodes, and clusters.
2. Stop the applications named BusinessSpaceManager and
IBM_BSPACE_WIDGETS. Verify that the applications are stopped properly
on all of the servers or clusters before proceeding. See Figure 14-27.
7. At Step 3: Summary, verify the selections you made and click Finish.
8. Make sure that the update completes without errors. Save changes to the
configuration.
9. Select the IBM_BSPACE_WIDGETS application and click Update.
10.In the path for the application, enter or browse to
/opt/ibm/WebSphere/ProcServer/installableApps/BSpaceWidgets.ear. Click
Next.
11.At Step 1: Select installation options, accept all the defaults and click Next.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 417
12.At Step 2: Map modules to servers, verify that the Map modules to servers
section shows the correct mapping for the IBM_BSPACE_WIDGETS
application. The mapping should be to the clusters where you configured
Business Space. The widgets are mapped to the Support Cluster. Click Next
(Figure 14-29).
13.At Step 3: Summary, verify the selections that you made and click Finish.
14.Save the application to the master configuration. Allow time for the save
process to complete for the 60 MB file. Do not select any links until the save
process completes.
15.Synchronize the nodes. Allow time for the data (about 80 MB) to synchronize
across all nodes.
16.Start the BusinessSpaceManager application and then start
IBM_BSPACE_WIDGETS. Verify that no errors are returned during
application startup.
17.Check that the Business Space console starts properly. Open a browser and
enter http://<host_name>/9080:BusinessSpace.
18.You should be presented with the login page for the Business Space.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 419
– String value:
cell/clusters/default.Support/com/ibm/events/configuration/emitte
r/Default
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 421
3. Verify that FABRIC_JDBC_AUTH is located in the list (Figure 14-31).
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 423
To verify that the Fabric enterprise application is successfully installed:
1. From the Integrated Solutions Console, select Applications → Enterprise
Applications.
2. Verify that the following EARs are deployed and started successfully, as
shown in Figure 15-7:
– Fabric Catalog
– Fabric Tools
– Fabric Engine
– Fabric Tools Help
– Fabric REST Services
3. Type the following URL in the browser. In this example, the URL is
http://localhost:9080/fabric.
http://<host_name>:<cluster_member_port#>/fabric
4. You should be presented with the login window for WebSphere Business
Services Fabric. Enter the credentials for logging in. In this example, user wps
and password passw0rd were used.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 425
14.4 Deploying and testing the vehicle loan application
The vehicle loan application described in Chapter 2, “Sample business
application scenario used in topologies” on page 23, can be deployed to
WebSphere Business Services Fabric.
The sample application described in this section is supplied with the additional
material provided with this book. Refer to the \Scenarios sub directory in the
additional material supplied with this book. See Appendix A, “Additional material”
on page 597, to obtain it.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 427
14.4.4 Integrating the LDAP repository
Note: This security setup assumes that LDAP is installed and configured as
discussed in Chapter 10, “Securing a production topology” on page 239.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 429
14.4.5 Manage enrollments and subscriptions
The organization ITSOBankOrg is defined in WebSphere Business Services
Fabric to represent the ITSOBank organizational structure. Ensure that the
ITSOBank is enrolled for the business services provided by the composite
business application:
1. Log into the WebSphere Business Services Fabric console and navigate to
the Subscriber Manager twisty in the left pane. Collapse the twisty by clicking
the [+] icon, then click Manage Subscribers.
2. Click ITSOBankOrg, then click Enrollments. The page displays a list of
available business services. Ensure that the check box next to the business
service LoanProcessBS is checked. If it is not, click the check box then click
Save Enrollments.
3. Click Manage Subscriptions in the left pane. Click the radio button to select
ITSOBank.
4. In the Search For box enter the first one or two letters of a user’s last name.
Click Search. WebSphere Business Services Fabric will contact the LDAP
repository and conduct a wildcard search.
5. From the list of users returned click the target user. Click the icon with the
right-facing arrow to add the user to the Selected Users list.
6. Click the check box for ITSOBankLoanApp. This action also selects the
nested business service named LoanProcessBS and the channel Loan Portal
Channel.
7. Click Subscribe Users to complete the subscription of the selected user to
the LoanProcessBS business service.
4. Click Start Instance. This results in a page with a form to be populated with
input parameters for the process, as shown in Figure 14-39.
Chapter 14. Incorporating WebSphere Business Services Fabric into a Remote Messaging and Remote Support topology 431
5. Click Submit. On successful completion you will get a panel similar to the one
shown in Figure 14-40.
BPC Bus
SCA.SYSTEM Bus
CEI Bus
SCA.APP Bus
Monitor bus
Member 1 (WPS) Member 2 (WPS)
CEI CEI Support Cluster
BPC Tools BPC Tools (Support)
BRM BRM
CEI
ME
Messaging Cluster
SCA APP SCA SYS BPC Mon
ME ME ME ME (Messaging)
Member 1 Member 2
Business Spaces Business Spaces Business Spaces Cluster
AlphaBlox AlphaBlox (Monitor)
REST API Services REST API Services
Member 1 Member 2
Event Processing Cluster
Monitor Monitor
Application Application (Monitor)
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 435
WebSphere Process Server. The topology described in this chapter used the
following versions:
WebSphere Application Server V6.1.0.21
WebSphere Process Server V6.2
DB2 UDB ESE V8.2 fix pack 8 OR V9.1 fix pack 5 OR V9.5 fix pack 1
IBM Tivoli Directory Server V6.0 or V6.1
http://www-01.ibm.com/software/integration/wbimonitor/requirements/
Note: In this chapter, the WebSphere Business Monitor clusters are installed
into the same cell as WebSphere Process Server. This single cell topology
ensures that a cross link between a WebSphere Process Server cell and
WebSphere Business Monitor cell is not required.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 437
3. Run <media install root >/WBM/install:
a. Click Next.
b. Select I accept both the IBM and the non IBM terms.
c. Click Next → Next.
d. Select Advanced Installation, deselect Information Center, and then click
Next.
e. Use the existing version of WebSphere Application Server Network
Deployment. The value should be /opt/ibm/WebSphere/ProcServer. Click
Next.
f. Select None and click Next.
g. Click Yes to the pop-up warning about not creating a profile.
h. Verify your Installation Summary and click Next, then click Finish.
4. Run versionInfo.sh to verify your installation for the deployment manager, as
shown in Example 15-1.
Installed Product
Name WebServices Feature Pack
Version 6.1.0.21
ID WEBSERVICES
Build Level cf210844.03
Build Date 11/6/08
Installed Product
Name IBM WebSphere Process Server
Version 6.2.0.0
ID WBI
Build Level of0847.11
Build Date 11/26/08
Installed Product
Name IBM WebSphere Business Monitor
Version 6.2.0.0
Note: The user must be the DB2 instance owner or have the SYSADM
privilege to create a new database.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 439
3. Bind the command-line interface to the Monitor database using the following
commands:
db2 connect to MONITOR
db2 bind /home/db2inst1/sqllib/bnd/@db2cli.lst blocking all grant
public
db2 connect reset
4. The result of the bind command should be as shown in Example 15-2.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 441
4. Select WebSphere Business Monitor deployment manger, as shown in
Figure 15-2. Click Next.
8. On Database Configuration panel (Part 2), enter the values in Table 15-2.
Table 15-2 values for Database Config part 2
Name Value
Password passw0rd
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 443
Name Value
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 445
10.Verify that the augmentation is successful. The Profile Augmentation
Complete Panel should be successful. The panel should resemble
Figure 15-7.
11.Keep the Launch the WebSphere Business Monitor first steps box
checked. Click Finish. This launches the First steps panel.
12.Click Install verification. This launches a command window to verify the
installation/augmentation of the deployment manager.
a. You are prompted for the user name (wps) and password (passw0rd). The
output window produces the text shown in Example 15-3.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 447
Notes: Creating and federating clusters members:
You cannot create custom WebSphere Process Server nodes with
WebSphere Business Monitor and use them with the deployment
environments wizard.
It is a mandatory that the timing between any node machine and the
deployment manager machine be less than 5 minutes. If the timing is
greater than 5 minutes, the federation of the profile to the deployment
manager fails.
7. Enter a node name and a host name. Accept the defaults, as shown in
Figure 15-10. Click Next.
Note: We recommend using the fully qualified domain name as the host
name.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 449
8. In the Federation Panel, enter the values shown in Table 15-3.
Table 15-3 Values for Federation Panel
Name Value
Password passw0rd
Create a second custom profile. Repeat the previous steps, but make sure to
change the profile name and node name in steps 6 and 7.
a. From a terminal window you can issue --> ps -elf | grep nodeagent.
This should produce two Java processes. These are the nodes that you
just created and are federated to the deployment manager.
b. Open a Web browser to access the Integrated Solutions Console:
http://svslesvm:9060/admin
c. Enter the username wps and password passw0rd. Click login.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 451
d. Expand System Administration and click Nodes. Figure 15-13 should
show five entries with a status of synchronized:
• CellManager01
• monNode01
• monNode02
• wpsNode01
• wpsNode02
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 453
5. Create a cluster member named WBMSupportMember01 on the monNode01
using server template default_defaultWBM. Click Next (Figure 15-15).
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 455
Note: If you do not click the AddMember button after you enter the second
cluster member, your cluster will only have one cluster member. See
Figure 15-17.
8. Repeat the prior steps using the values from Table 15-5 to create the Event
Processing Cluster.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 457
Repeat the prior steps using the values from Table 15-6 to create the Business
Space Cluster.
Once the three clusters are completed, the main panel of the Integrated
Solutions Console’s cluster panel should look like Figure 15-19.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 459
4. Select the Remote radio button in the Common Event Infrastructure Bus
Member location box and select Cluster=RMSgold.Messaging. The panel
should resemble Figure 15-20.
User ID db2inst1
Password passw0rd
Component-mana CellManager01/
ged authentication Monitor ME
alias and XA AuthAlias
recovery
authentication alias
e. Select the Select an existing JDBC Provider radio button and DB2
Universal JDBC Driver Provider from the drop-down list box. Click Next.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 461
f. Enter the values in Table 15-9. Click Next.
Table 15-9 Database-specific properties
Name Value
Driver type 4
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 463
2. Click the Message engine link under the component column of the panel.
This launches the messaging engine wizard shown in Figure 15-23. Click
Configure the Messaging Engine button.
6. Click the Next Review panel, as shown in Figure 7 on page 466, before
clicking Next.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 465
7. Review the summary shown in Figure 15-26. Click Finish.
4. You should get a success message that looks like Figure 15-29.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 467
15.7 Installing WebSphere Business Monitor support
applications
The section describes how to do the following support applications:
Deploy action services.
Deploy Data services scheduler.
Deploy REST API Service.
Deploy monitor event emitter service (optional).
This should show you the success message shown in Figure 15-34.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 469
Note: If deployment fails, verify that you have properly configured your
/etc/security/limits.conf on your deployment manager machine. The nofile
should be configured to * soft nofile 10240 and * hard nofile 10240. These
should be set on all machines on which WebSphere Business Monitor is
installed.
Perform the following instructions for each member in the Monitor support
cluster:
1. Go to Application servers → WBMSupportMember01 → Server
security → CSIv2 inbound authentication.
2. In the Basic authentication area, select the Supported option.
3. In the Client certificate authentication area, select the Supported
option.
4. Ensure that the Identity assertion option is checked.
5. Ensure that the Stateful sessions option is checked.
3. Select WBM.Support in the Deploy Data services scheduler list box. Click
the Deploy Data Services Scheduler button, as shown in Figure 15-36.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 471
c. Click WebSphere Business Monitor configuration.
2. Click the REST API service link on the configuration panel, as shown in
Figure 15-38.
3. Select WBM.BusSpace in the Deploy REST API service list box. Click the
Deploy REST API service button, as shown in Figure 15-39.
This should show you a success message like that shown in Figure 15-40.
Note: These services are deployed, but they are not running. Expand
Applications → Enterprise Applications, then check the service to start.
Click the Start button
If you are going to provide people with the option of viewing the dashboard via
their mobile device then you will need to deploy the Dashboard application for
Mobile devices on the business space cluster. You must follow the same steps.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 473
15.8 Business Space considerations
When considering where to deploy Business Space, you must consider the cell
configuration:
Is Business Space already deployed on the RMSgold.Support cluster?
Has the schema been created and used?
Will you be using Alphablox dimension and report widgets for Monitor
dashboards?
In Table 15-11, the first and last option would leave Business Space on the
RMSgold.Support cluster. In the second and third options, you would deploy
Business Space Manger to the WBM.BusSpace cluster.
15.8.1 Alphablox
You must install Alphablox software on all machines in the cluster where
Business Space Manager is to be deployed.
Note: It has been our experience that you should install Alphablox on one
cluster member in the cluster and configure that first. Then proceed to install
Alphablox on a second cluster member.
Install Alphablox
To install:
1. Stop all Monitor clusters before installing Alphablox.
2. Run the Alphablox installer located in the <Monitor
install>/installableApps.wbm/installer/Alphablox directory.
3. Provide the following input:
a. In Choose Locale field select English.
b. Accept the licence agreement.
c. Enter a destination directory of /opt/ibm/WebSphere/MonServer/ABX.
d. Accept the default server instance name of AlphabloxAnalytics.
e. Select an installation set of Typical.
f. Select the application server to use with Alphablox as WebSphere.
Ensure that the WebSphere server is stopped at this point.
g. Enter a WebSphere root directory of /opt/ibm/WebSphere/MonServer.
h. Select the node and server to install Alphablox on the required profile.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 475
i. Accept the default values for HTTP Port and SOAP Connector Port.
j. Provide a WebSphere Administrator user name and password.
k. Accept the default values for the Telnet console port and server log file
name.
l. Set the Console Message Level to 3.
m. Accept the SMTP Server and Java Directory default values.
n. Enter Y to enable additional drivers for IBM Alphablox.
o. Enter the location of the driver as
/opt/ibm/WebSphere/MonServer/universalDriver.wbm/lib and confirm
that this drive is a DB2 Type 4 driver.
p. Select DB2 as the database repository.
q. Set the database server to svslesvm, the port to 50001, and the alias to
MONITOR. This alias is the name of the database that will be used as an
Alphablox repository, and can share the same name with the Monitor
database.
r. Specify a user name of db2inst1 and password of passw0rd.
s. The installer then runs a database connection test. Check that the test
runs successfully. You will see an error that the tables shown in
Example 15-4 are not found. They will be created when the Alphablox
server is started for the first time.
t. Enter 1 to configure clustering and accept the default values for cluster
port number and cluster subnet mask. The cluster port number should be
identical for all Alphablox server instances in the cluster.
u. Select the conversion operation Copy.
v. Set Move Server Properties to All.
w. Select No for the User defined DDL schema file.
CLUSTERING: Enabled:
Port:: 7855
Subnet Mask:: 255.255.255.0
When Alphablox completes its installation, you should see the IBM Alphablox
successfully installed on your system! message.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 477
4. Start the WebSphere Business Monitor deployment manager and clusters.
6. In Step 3: Map Virtual hosts to web modules, keep the defaults and click
Next.
7. Click Finish.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 479
8. You should see the successful message, as shown in Figure 15-43. Click
Save. Click OK.
6. Click OK.
7. Repeat these steps for the AlphabloxStudio application.
Post-installation configuration
For WebSphere vertical clusters, you must perform the following post-installation
configuration to properly configure the server-specific JVM™ parameter to
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 481
identify the Java Management Extensions (JMX™) communication port that
Alphablox should use and set the server log name.
Note: A vertical cluster has cluster members on the same node. A horizontal
cluster has cluster members on multiple nodes. You can configure either type
of cluster or have a combination of vertical and horizontal clusters.
After properly installing DB2 Alphablox, the WebSphere Business Monitor data
sources must be using the DB2 Alphablox administration page. Complete the
following steps to create the required data sources:
1. Open the DB2 Alphablox Admin Console. In our environment the URL for the
DB2 Alphablox Admin Console is:
http://clustrm:9084/AlphabloxAdmin
2. Go to the Administration tab and click Data Sources.
3. Click Create and perform the following steps:
a. Enter MONITOR in the Data Source Name text box.
b. Select Application Server Data Source from the Adapter list.
After creating monitor data sources, you should configure monitor themes for
Alphablox. For more information refer to the monitor information center:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com.ibm.
btools.help.monitor.install.doc/install/abx_theme_manual.html
Note: You must restart the server for the created data sources to be reflected
on other cluster members.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 483
4. Click OK. Review the message shown in Figure 15-47 prior to clicking Save.
2. Document the Business Space Manager Datasource and schema for the
existing Business Space Manager configuration:
a. Expand Resources → JDBC → Datasources.
b. Set the scope to cluster = RMSgold.support.
c. Click Business Space Manager Datasource.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 485
d. Make note of the values in the panel shown in Figure 15-49.
Note: Another way to find the schema name is to review the generated
script createTable_BusinessSpace.sql from the initial deployment under
the deployment manager profile.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 487
b. Check Install Business Space service in the panel shown in
Figure 15-50.
c. Enter the values provided in Table 15-13. The data source that you select
determines on which database you will create the schema. Select the
existing datasource and schema.
Table 15-13 Vlaues for business space service properties
Name Value
Since you are using the existing database and schema, you do not have to
take the additional steps to create the database tables.
e. After migrating the Business Space to WBM.BusSpace cluster, you must
activate monitor ABX widgets by following the instructions in at the
following link:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/
com.ibm.btools.help.monitor.install.doc/install/alpha_inst.html
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 489
To configure WebSphere Business Monitor dashboards on Business Space for
each cluster member:
1. Create the BusinessSpace/registryData directory on all the nodes of the
Business Space cluster in the following path:
<WebSphere_Process_Server_installation>\profiles\<Monitor_profile
_name>\BusinessSpace\registryData
2. To register WebSphere Business Monitor widgets, create a copy of the
monitorWidgets.xml file and then edit this file. Locate the element
<tns:Widget> for all the widgets that you would like to administer. Add the
action attribute to the <tns:Widget> element as shown below:
– <tns:Widget action=“addUpdate”> (This is the default.)
– <tns:Widget action=“add”> (Adds a new widget to the registry.)
– <tns:Widget action=“update”> (Updates the widget to the registry.)
– <tns:Widget action= “delete”> (Deletes the widget from the registry.)
Example 15-6 is an example of an edited monitorWidgets.xml file.
<tns:widgetEndpointId>{com.ibm.wbimonitor}monitorWidgetRootId</tns:w
idgetEndpointId>
<tns:viewUrl>_Instances/jsp/html/InstancesView.jsp</tns:viewUrl>
<tns:editUrl>_Instances/jsp/html/InstancesEdit.jsp</tns:editUrl>
<tns:helpUrl>dash/help_instances.html</tns:helpUrl>
<tns:iconUrl>img/Instances.gif</tns:iconUrl>
<!-- <tns:previewUrl>TBD</tns:previewUrl> -->
<tns:owner>IBM</tns:owner>
<tns:email>TBD</tns:email>
<tns:serviceEndpointRef>
<tns:name>serviceUrlRoot</tns:name>
<tns:refId>{com.ibm.wbimonitor}monitorServiceRootId</tns:refId>
<tns:refVersion>1.0.0.0</tns:refVersion>
<tns:Endpoint action="addUpdate">
<tns:id>{com.ibm.wbimonitor}monitorServiceRootId</tns:id>
<tns:version>1.0.0.0</tns:version>
<tns:description>Location of backing services for Monitor
widgets</tns:description>
</tns:Endpoint>
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 491
</tns:BusinessSpaceRegistry>
<!-- END NON-TRANSLATABLE -->
<tns:Endpoint action="addUpdate">
<tns:id>{com.ibm.wbimonitor}monitorABXServiceRootId</tns:id>
<tns:version>1.0.0.0</tns:version>
<tns:url>http://rest_services_hostname:port_number/rest/</tns:url>
<tns:description>Location of backing services for Monitor
widgets</tns:description>
</tns:Endpoint>
</tns:BusinessSpaceRegistry>
<!-- END NON-TRANSLATABLE -->
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 493
2. Generate the corresponding monitor model from the created business
process, as shown in Figure 15-53.
Figure 15-53 Generate the monitor model from the BPEL process
Upon finishing implementation of the monitor model you should generate the
corresponding J2EE applications from the monitor model in WebSphere
Integration Developer. There will be three projects created:
Monitor model enterprise application project
Monitor model logic part project
Monitor model moderator part project
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 495
By exporting the EAR file from any of above projects, you are exporting the
monitor model application that you should deploy on WebSphere Business
Monitor Server.
Figure 15-56 Monitor model deployment wizard Step 2: Map modules to servers
7. Keep selecting defaults and click Next. If any warning appears, click
Continue.
8. In Step 12: Select monitor model CEI option, accept the defaults and click
Next.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 497
Note: In step 12 you can select which event group you want to use and the
mode of the monitor model (inactive and active (monitor model
queue-based)) after installation, as shown in Figure 15-57 on page 498.
For more information about how to deploy a monitor model, refer to the following
link for the WebSphere Business Monitor information Center:
http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/topic/com.ibm.
btools.monitor.admin.doc/admin/admin_deploy.html
To check that the events are emitted correctly from the started instance:
1. Log in to Business Process Choreographer (BPC) Explorer.
2. Click Process Templates.
3. Check on the corresponding BPEL process and click the Start Instance
button, as shown in Figure 15-58.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 499
4. There should be some events generated and emitted now. You can check the
emitted events in Integration Application → Common Base Event
Browser (CBE), as shown in Figure 15-59.
Note: If you are using a remote CEI as an event source, you also must check
that events are transmitted correctly to the WebSphere Business Monitor
server side. You can perform this by doing the following:
Check that the SIB link is in running state.
Stop the corresponding monitor model.
Emit events at the remote CEI (event source)
Check the events in the CBE browser at the monitor side.
You can access the business space dashboards using the following URL:
http:\\[hostname]:9080\BusinessSpace
There are eleven dashboard widgets. The following are steps describe how to
configure one of these widgets, the configuring instance view widget, as an
example:
1. Log in to Business Space.
2. Go to Business Space Manager by clicking Welcome → Manage Business
Spaces.
3. Click the Create new business space icon.
4. Enter the business space name, as shown in Figure 15-60.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 501
6. Enter the page name as shown in Figure 15-61.
9. Select the Instances widget and drag an drop it onto the empty page.
11.In Configuration view, select the monitor model, select the monitor model
context, and then select the required columns to be displayed, as shown in
Figure 15-64.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 503
Note: If this is the first time that you have configured the instance view,
click the Set as default button to keep these settings as the default
configuration.
Configure access to the monitor model resources using Monitor Data Security in
the Integrated Solutions Console. For WebSphere Application Server instances
that run the WebSphere Business Monitor server, you must configure them to
use the federated repository only. They cannot use a local operating system,
stand-alone LDAP registry, or stand-alone custom registry directly.
Chapter 15. Incorporating WebSphere Business Monitor into a production topology 505
Run the command RUNSTATS after a significant amount of data has been
processed.
The disk that is used to perform logging to should not be the same disk used
to store data.
One of the main reasons for introducing the Web cluster is to recognize that with
WebSphere Business Monitor, the event filtering will make heavy usage of the
CEI server. It is because of this concern that the Web Cluster is introduced and
Business Space, for example, which would have been distributed by default to
the Support cluster (when using the Deployment Environments wizard), will now
be moved to the Web Cluster.
It is important to also point out that the Deployment Environments wizard cannot
be used to generate this topology. The reason is that the Deployment
Environments wizard is not able to deal with custom nodes that are augmented
with WebSphere Business Monitor.
Note: Even it you alter the deployment environment descriptor to support four
clusters, it will fail. The deployment environments wizard only expects three
clusters.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 511
This chapter describes the necessary steps to build this production topology
manually. Figure 16-1 illustrates the Four Cluster topology.
Member 1 Member 1
Business Space Business Space
AlphaBlox AlphaBlox
Mobile Dashboards Mobile Dashboards BPM Web Cluster
REST API Services
REST API Services
BPC tools
(Monitor/WPS/Fabric)
BPC tools
BRM BRM
Member 2 Member 2
CEI CEI
Action Services Action Services BPM Support Cluster
Data services scheduler Data services scheduler (Monitor/WPS/Fabric)
Monitor Emitter Service Monitor Emitter Service
Member 3 Member 3
BPEL Applications BPEL Applications
Monitor Applications Monitor Applications BPMAppTargetCluster
BPC BPC (Monitor/WPS/Fabric)
(HTM and BFM) (HTM and BFM)
SCA.SYSTEM Bus
BPC Bus
SCA.APP Bus
CEI Bus
Monitor bus
Fabric
Member 4 Member 4
wbijgt1 wbijgt6
wbijgt3Cell01
WPSTest.AppTarget
Member 1 Member 1
Application Target Cluster
WPSTest.Support
Member 2 Member 2
Support Cluster
WPSTest.Messaging
Member 3 Member 3
Messaging Engine Cluster
WPSTest.Web
Member 4 Member 4
Web Cluster
DMgr01
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 513
16.2 Preparing the machines
There are two specific tasks that must be done on any Linux or UNIX system
such as the AIX Operating System prior to installing any of the products in this
topology.
Check the setting for the maximum number of open files by examining the
etc/security/limits file on an AIX operating system. There should be a line
for each user ID or a default value. Look for nofiles and ensure that it is set to
10240. Example 16-1 shows how this value should be set for the root user ID.
If root is not the user ID being used for installation, make sure that whatever
user ID is being used has nofiles set properly.
Note: The IBM HTTP Server can be installed at anytime. For information
about how to install the IBM HTTP Server, refer to 5.1.3, “Add a Web server”
on page 103.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 515
created. Refer to Chapter 15, “Incorporating WebSphere Business Monitor into a
production topology” on page 433.
Note: It is important to make sure that the mandatory iFix JR31349 has been
installed immediately after the product binaries have been installed. This is
described in 14.2.2, “Install interim fix” on page 392.
There is also an interim fix 31376 that is needed for the Fabric widgets. This is
described in 14.2.8, “Apply interim fix 31376” on page 414.
Note: In the topology illustrated in this chapter, separate databases are used.
It is possible to combine databases as long as unique schemas are used.
However, it is also important to point out that the databases for MONITOR,
FABRIC, and Business Space should not be combined with other WebSphere
Process Server databases. The reason for this is that as your needs grow,
different options exist on how to scale your topology. Some recommendations
call for creating a second WPRCSDB database as example.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 517
Here we list how to create these databases:
For information about creating the WPRCSDB, MEDB, EVENT, OBSRVRDB,
and BPEDB databases refer to 5.2, “Database creation” on page 103.
Creating WebSphere Business Monitor Database.
In this topology, we name our database MONITOR and use the schema name
MONITOR. Refer 15.3.2, “Creating the WebSphere Business Monitor
databases” on page 439, for information about how to create the database.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 519
Note: When creating the deployment manager profile, be sure to enable
administrative security and specify a user ID and password. (In our example,
we use a user ID admin with a password of admin, as shown in Figure 16-3.)
Experience has shown that it is easier to set up security from the beginning
once the deployment manager profile has been created and augmented.
Create a deployment manager profile for the WebSphere Process Server. The
steps to accomplish this task are detailed in 5.3.1, “Deployment manager profile”
on page 113.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 521
e. Set JDBC driver type to 4.
f. Set Database server host name or IP Address to
wbijgt3.rtp.raleigh.ibm.com.
g. Set Database TCP/IP service port or listener port to 55567. (This is the
port used in our topology. Your value may be different.) Click Next.
h. On the Profile Augmentation Summary panel, click Augment.
i. Once the profile management tool completes, a message should appear
indicating that the tool has augmented the profile successfully. At this
point, uncheck the Launch the WebSphere Business Monitor first steps
check box.
j. Click Finish.
/monwas/ProcServer/profiles/Dmgr01/logs/dmgr/startServer.log
ADMU0128I: Starting tool with the Dmgr01 profile
ADMU3100I: Reading configuration for server: dmgr
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server dmgr open for e-business; process id is 589846
#
Figure 16-5 List of JDBC resources after creating the Deployment Manager profile
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 523
16.7.4 Enabling security to use federated repository
In this sample topology, this would be the ideal point to enable our LDAP security
since it is a little easier to make the change now rather than later. To enable the
use of federated repository:
1. Start the deployment manager.
2. Sign in to the Integration Solutions Console using the user ID admin and the
password admin.
3. Click Security → Secure administration, applications, and infrastructure.
4. On the Secure administration, applications, and infrastructure panel, look
under User account repository and click Configure, as shown in Figure 16-6.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 525
6. On the Manage repositories panel, there should be one entry for the file
Internal file repository that is used by default. (See Figure 16-8.)
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 527
At this point, we should now see two federated repositories listed, as shown in
Figure 16-10.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 529
12.There is one more resource monitor change to make in order to finish
enabling the use of LDAP security. Click the bread crumb to get to the
Federated repositories panel. The panel shown in Figure 16-13 should now
appear. Change the following:
a. Set Realm name to be wbi602a.raleigh.ibm.com.
b. Set Primary administrative user name to be wps.
c. Click OK.
d. Click Save to save your configuration changes.
13.To summarize at this point, we have now changed our security such that
instead of using a file-based repository, we are now using LDAP. When we
first created our deployment manager profile and set administrative security,
we specified a user ID of admin with a password of admin. Now what we have
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 531
c. Expand Java Authentication and Authorization Service and then click
J2C authentication data. The list of authentication aliases appears as
shown in Figure 16-14.
Figure 16-14 List of authentication aliases created after creating a deployment manager
profile
d. Examine all user ID values looking for admin and change them to wps. The
password should be passw0rd. (Be careful not to change any JNDI
references.)
e. Save all changes made.
Note: The order here is important. You must create the WebSphere Process
Server custom node first and then augment it with Monitor. There are two
reasons for this:
You cannot augment a federated node with WebSphere Process Server.
Monitor forces you to federate when creating a custom node.
Node01 wbijgt1.rtp.raleigh.ibm.co
m
Node02 wbijgt6.rtp.raleigh.ibm.co
m
For each of the nodes defined in the above table, perform the steps outlined in
the 16.8.1, “Creating a Custom WebSphere Process Server node” on page 533,
through 16.8.3, “Augmenting with WebSphere Business Services Fabric” on
page 536.
Note: Be sure that the deployment manager has been started first.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 533
8. On the Profile Name and Location panel:
a. Set Profile Name to Node01.
b. Set Profile Directory to /monwas/ProcServer/profiles/Node01.
c. Click Next.
9. On the Node and Host Names panel:
a. Set Node name to Node01.
b. The host name should be correct by default.
c. Click Next.
10.On the Federation panel:
a. Set Deployment manager host name or IP Address to
wbijgt3.rtp.raleigh.ibm.com.
b. The Deployment manager SOAP port number default value is correct.
c. In our sample topology, we are using a federated repository (which is using
LDAP).
a. Set User Name to wps.
b. Set Password to passw0rd.
c. Click Next.
11.On the Port Value Assignment panel, leave the values unchanged and click
Next.
12.In our sample topology, we are using DB2 as a database vendor, so on the
Database Configuration panel:
a. Click DB2 Universal on Choose the database product used on the
deployment manager.
b. The Location (directory) of JDBC driver classpath files should be set to
/monwas/ProcServer/universalDriver_wbi/lib.
c. Click Next.
d. A Profile Creation Summary panel will appear. Click Create.
13.The profile creation will take some time to complete. When the Profile
Creation Complete panel comes up, uncheck Launch the First steps console
and click Finish.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 535
16.8.3 Augmenting with WebSphere Business Services Fabric
The next task is to augment the profile with WebSphere Business Services
Fabric:
1. Type ./pmt.sh to start the Profile Management Tool (PMT). (Tip: If you are
following these directions, the PMT is most likely still up, and if this is the
case, start at the next step.
2. Click Augment.
3. Click Next on the Welcome Panel.
4. On the Select the profile to augment panel, under Profiles, click the profile
that you wish to augment (for example, Node01). Click Next.
5. On the Augment Selection panel, under Augments, click WebSphere
Business Services Fabric and then click Next.
6. On the next panel, click Advanced profile augmentation, then click Next.
7. On the Federation panel:
a. Set Deployment manager host name or IP Address to
wbijgt3.rtp.raleigh.ibm.com.
b. The Deployment manager SOAP port number default value is correct.
c. In our sample topology, we use a federated repository (which is using
LDAP).
a. Set User Name to wps.
b. Set Password to passw0rd.
c. Click Next.
8. In our sample topology, we use DB2 as a database vendor, so on the
Database Configuration panel:
a. Click DB2 Universal on Choose the database product used on the
deployment manager.
b. The Location (directory) of JDBC driver classpath files should be set to
/monwas/ProcServer/universalDriver_wbi/lib.
c. Click Next.
9. On the Profile Augmentation Summary panel, click Augment.
10.The profile augmentation step does not take a lot of time to complete.
11.A panel should come up indicating that The Profile Management Tool
augmented the profile successfully.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 537
16.9.1 Creating the Application Cluster
The first cluster to create is the application cluster. Table 16-3 provides the name
of the cluster and what members make up the cluster.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 539
8. Click Next. The Summary panel should be reviewed to ensure that Node1
and Node2 were the nodes to be added and that they are using the proper
clone template (Figure 16-18).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 541
16.9.3 Creating the Messaging Cluster
The next cluster to create is our Messaging Cluster. Follow the same steps that
appear in 16.9.1, “Creating the Application Cluster” on page 538, but use
WPSTest.Messaging for the name of the cluster. For illustration purposes, we
have included the summary panel for this cluster creation as a guide. (See
Table 16-5 and Figure 16-20 on page 543.)
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 543
16.9.4 Creating the Web Cluster
The next cluster to create is our Web Cluster. Follow the same steps that appear
in 16.9.1, “Creating the Application Cluster” on page 538, but use WPSTest.Web
for the name of the cluster. For illustration purposes, we included the summary
panel for this cluster creation as a guide (see Table 16-6 and Table 16-6).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 545
3. Start the deployment manager.
4. Once the deployment manager has come up, start all node agents.
5. Sign in to the Integrated Solutions console.
6. Click Servers → Clusters.
7. Check all check boxes to select all of our clusters and click Start.
8. The amount of time that it will take for the clusters to start will vary.
9. At some point, all the cluster should have started. (See Figure 16-22.)
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 547
7. Notice the section of the panel Common Event Infrastructure Bus Members
Location. Click Remote since our bus member will be on the messaging
cluster. Click New (Figure 16-24).
8. On the Browse Deployment targets panel that pops up, click the radio button
for the deployment target that says Cluster=WPSTest.Messaging
(Figure 16-25).
9. Click the Select radio button. Notice that we are now indicating that our bus
member for CEI will be on our messaging cluster (Figure 16-26).
Click OK.
12.When the configuration completes, a message indicating that the common
event infrastructure server is configured successfully. Click Save to save the
configuration changes.
13.When the save completes, you will now be on the Server Clusters panel.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 549
14.Click WPSTest.Support cluster.
15.Expand Common Event Infrastructure → Common Event Infrastructure
Server. The message shown in Figure 16-28 will appear.
Figure 16-30 Changing default user ID and password for JMS authentication alias
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 551
22.Under Cluster Messaging, click Messaging Engines and verify that there is a
messaging engine for CEI, as shown in Figure 16-31.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 553
5. Configure the SCA Bus member to be on the Messaging cluster. Click
Remote, then click New (Figure 16-33).
6. On the Browse deployment target panel, click the radio button for
WPSTest.Messaging and then click Select (Figure 16-34).
8. Once the configuration has completed, you will be asked to save your
changes. Click Save to save the configuration changes.
9. Once the changes have been saved, you are returned back to the Server
Clusters panel. To verify that the Service Component Architecture component
has been deployed to the WPSTest.AppTarget cluster, click
WPSTest.AppTarget → Service Component Architecture. A message
should appear at the top of the panel indicating that the Service Component
Architecture has been configured.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 555
There is one remaining step to perform. If you were to click the Test Connection
button on either of our datasources, they would fail. The message would indicate
something like a null userid is not supported. What this essentially means is
that the JDBC resource that was created does not have any authentication alias
defined. To resolve this:
1. Sign in to the Integrated System Console.
2. Click Resources → JDBC → Data Sources.
3. Click the Name link and SCA System Bus ME data source link.
4. Notice that the Component-managed authentication alias and the
Authentication alias for XA recovery both say None. Change these values to
point to SCASYSME00 Auth Alias.
5. Click OK.
6. Click SCA Application Bus ME data source.
7. Notice that the Component-managed authentication alias and the
Authentication alias for XA recovery both say None. Change these values to
point to SCAAPPME00 Auth Alias. Click OK.
8. Save all configuration changes made.
9. Go back to Resources → JDBC → Data Sources and select both SCA
System Bus ME data source and SCA Application Bus ME data source.
Click Test Connection to verify that the connection is valid.
10.From the Integration System Console, click Servers → Clusters and click
WPSTest.Messaging cluster.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 557
4. Click Common Event Infrastructure Destination (Figure 16-37).
5. On the Common Event Infrastructure Destination panel, check the check box
Enable service at server startup. (Note that this may already be checked
and that is fine.)
Click OK.
7. Click Save to save your configuration changes.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 559
4. Under Business Integration expand Business Process Choreographer
(Figure 16-39).
8. Under Human Task Manager Mail Session, leave the Enable e-mail service
box checkmarked (Figure 16-41).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 561
9. Under the Security section, ensure that both the users and passwords are set
to websphere (Figure 16-42).
13.On the Browse deployment target panel, click the WPSTest.Messaging radio
button selection (Figure 16-45).
14.Click Select.
15.The configuration should indicate that the bus member is remote and that it is
on the Messaging cluster. In our topology, set Database instance to use MEDB
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 563
and set Schema Name to be BPCME. Since this database was created
previously, be sure to uncheck Create Tables (Figure 16-46).
17.At this point, it is necessary to correct the data source connected to the
Business Process Choreographer ME data source.
a. Sign in to the Integrated System Console.
b. Click Resources → JDBC → Data Sources.
c. Click the Business Process Choreographer ME data source link.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 565
d. Notice that the Component-managed authentication alias and the
Authentication alias for XA recovery both say None. Change these values
to point to BPCME_00_Auth Alias.
e. Click OK and then click Save to save all configuration changes made.
f. Go back to Resources → JDBC → Data Sources and select the check
box Business Process Choreographer ME data source. Click Test
Connection to verify that the connection is valid.
18.Go to click Servers → Application Servers → Clusters.
19.Select the WPSTest.AppTarget cluster.
20.Click Stop to stop this cluster. The amount of time that it will take to stop
varies. Once it has stopped, select the WPSTest.Web cluster and click Start.
21.To further verify that there are no problems, go back to the Integrated System
Console.
22.Click Servers → Clusters, then click WPSTest.AppTarget.
23.Under Business Integration expand Business Process Choreographer.
24.Click Business Process Choreographer Containers. At the top of the page
there should be two messages indicating that both the Business Flow
Manager and the Human Task Manager are currently installed.
25.Click Resources → JDBC → Data sources. For both data sources, click the
Test Connection button to ensure that connections can be successfully
made.
26.Stop the WPSTest.Messaging and WPSTest.AppTarget clusters and then
restart them.
27.Click Servers → Clusters, then click WPSTest.Messaging.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 567
4. Under Business Integration click Business Process Choreographer
(Figure 16-49).
Click OK.
8. Click Save Changes to save your configuration changes.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 569
9. On the following panel, click Start to start the BPC Explorer application and
make sure that the Application Status shows that it has started
(Figure 16-51).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 571
6. Check the Install business rules manager check box (Figure 16-53).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 573
5. On the Business Space Configuration panel (Figure 16-55):
a. Check the Install Business Space service check box.
Note: It is a good idea to make certain that the ulimit setting is correct. Refer
to 16.2, “Preparing the machines” on page 514.
There is a new feature in WebSphere Business Monitor for v6.2, which is called
the WebSphere Business Monitor configuration wizard. It makes the task of
configuring topologies easier. Complete the following steps:
1. Go to the Integrated Solutions Console and log in.
2. In the navigation pane, click Servers → WebSphere Business Monitor
configuration.
3. A checklist style interface indicates what components have or have not been
configured (Figure 16-57).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 575
16.16.1 Configuring the Messaging Engine
To do this:
1. On the WebSphere Business Monitor configuration panel, click Messaging
Engine.
2. Click Configure the Message Engine.
3. On Select a bus member, click Cluster, and then select
WPSTest.Messaging. Click Next.
4. On Select the type of messaging store, click Data store, then click Next.
5. On Provide the message store properties, click Use existing data source.
6. Set Data source JNDI Name to jdbc/wbm/MonitorMEDatabase.
7. Leave the schema name that is the default.
8. Uncheck the check mark for Create Tables.
9. The authentication alias should be set to Monitor_JDBC_Alias. Click Next.
10.A summary panel appears next. Click Finish (Figure 16-58).
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 577
16.16.4 Configuring Action Services
To do this:
1. Click Action Services.
2. Select WPSTest.Support for the cluster to deploy to.
3. Click Deploy Action Services.
4. When this configuration task completes, a message will appear.
5. Click the bread crumb WebSphere Business Monitor configuration.
6. Notice that there is a green check mark next to Action Services.
One final comment to make is that the Alphablox component is grayed out. This
is because at this point in time, the Alphablox product has not yet been installed
and configured.
One additional question check is to ensure that the Monitor Messaging Engine
was created. To verify this, complete the following steps:
1. Go to the Integrated Solutions Console.
2. Click Servers → Clusters.
3. Click WPSTest.Messaging.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 579
4. Click Messaging Engines and verify that the Monitor messaging engine
appears as shown in Figure 16-60.
Figure 16-61 Mapping the Monitor Event Emitter Service to the Support cluster
Note: If you wish to ensure that not just the Monitor applications, but all the
(Process Server related) applications are starting properly, we recommend
that you stop and restart all clusters now.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 581
4. Click Enterprise Applications and make certain that the Monitor
applications have started, as shown in Figure 16-62.
Note: The deployment manager must be started as well as the node agents
prior to running the following steps.
1. Open a command window on the AIX system where the deployment manager
is running. In our topology, this is wbijgt3.rtp.raleigh.ibm.com.
2. Type cd /monwas/ProcServer/profiles/Dmgr01/bin.
3. Type:
./wsadmin.sh -lang jython -f
/monwas/ProcServer/profileTemplates/dmgr.wbsfabric/actions/scripts/c
luster/fabricSIBConfig.py
4. A pop-up window will appear prompting you for a user ID and password. Use
wps for the user ID and passw0rd for the password. Click OK.
5. You will be asked to select the messaging engine cluster. Be sure to type the
number associated with the WPSTest.Messaging cluster.
6. Press Enter for the next question. (The Fabric messaging engine will use the
SCA Authentication Alias.)
7. Press Enter for the next question to accept the default schema name for the
Fabric database.
8. When the script has finished running, control will be returned to the command
prompt. Your console output should look similar to Example 16-4.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 583
Fabric Messaging engine can use the SCA System Bus settings for
security and ME database.Hit enter to use default value or enter N
to supply the values.
Enter the Fabric Messaging schema name.Hit enter to use default
value of FABRICME for Messaging schema or enter N to supply the
value.
Creating Fabric Bus :- Fabric.wbijgt3Cell01.Bus
Created Fabric Bus.
Synchronizing changes with all the nodes in cluster.
Done with synchronization for node Node01
Done with synchronization for node Node02
#
Note: The deployment manager must be started as well as the node agents
prior to running the following steps.
1. Open a command window on the AIX system where the deployment manager
is running. In our topology, this is wbijgt3.rtp.raleigh.ibm.com.
2. Type cd /monwas/ProcServer/profiles/Dmgr01/bin.
3. Type:
./wsadmin.sh -lang jython -f
/monwas/ProcServer/profileTemplates/dmgr.wbsfabric/actions/scripts/c
luster/fabricAppDeploy.py
4. A pop-up window will appear prompting you for a user ID and password. Use
wps for the user ID and passw0rd for the password. Click OK.
5. You will be asked to select the cluster to which to deploy the Fabric
applications. Be sure to type the number associated with the WPSTest.Web
cluster. The next question asks you to enter the user ID that would have
access to the Fabric Administration console. Type wsadmin and press Enter.
6. The next question asks you to enter the directory of the dmgr.fabric profile
template. Type /monwas/ProcServer/profileTemplates/WBSFabric and press
Enter.
7. Numerous messages will be displayed in the console window. Keep a watch
out for any error information.
8. When the script has finished processing, control will be returned to the
command prompt.
9. Sign in to the Integrated Systems Console.
10.Click Applications → Enterprise Applications.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 585
11.Check the check box for each of the fabric applications shown in Figure 12
and then click Start.
12.Make sure that the fabric applications status turns to started. The amount of
time it will take to start varies.
There is a very good tech note called “Guide to properly setting up SSL within the
IBM HTTP Server,” available at the following URL:
http://www-01.ibm.com/support/docview.wss?uid=swg21179559
There is a very good tech note that discusses the details about how to exchange
certificates, available at:
http://www-01.ibm.com/support/docview.wss?uid=swg21264477
Since security is enabled in the topology, SSL must also be enabled on the IBM
HTTP Server. This essentially means adding the following lines to the
configuration. See Example 16-5 for what was added to the HTTP configuration.
Listen 443
<VirtualHost wbijgt3.rtp.raleigh.ibm.com:443>
ServerName wbijgt3.rtp.raleigh.ibm.com
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 587
4. On the right-hand side of the panel, under Business Integration, click System
REST Service Endpoints. The panel that comes up is illustrated in
Figure 16-65.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 589
16.23.1 Widget Endpoint configuration
For any widgets that you wish to enable, there is an XML file containing the
endpoint information. The file naming convention is such that the file name ends
with Endpoints. In this topology, Example 16-6 shows how the
monitorEndpoints.xml would be modified to support our use of the HTTP server.
Notice that the https is specified and that our host name is pointing to our HTTP
Server. It is not necessary to specify the port number, but if one were specified, it
would be port 443 given how the HTTP server was configured.
<tns:Endpoint>
<tns:id>{com.ibm.wbimonitor}monitorServiceRootId</tns:id>
<tns:type>{com.ibm.wbimonitor}monitorServiceRootId</tns:type>
<tns:version>1.0.0.0</tns:version>
<tns:url>https://wbijgt3.rtp.raleigh.ibm.com/rest/</tns:url>
<tns:description>Location of backing services for Monitor
widgets</tns:description>
</tns:Endpoint>
</tns:BusinessSpaceRegistry>
To configure:
1. In this topology, the /monwas/ProcServer/BusinessSpace/registryData
directory contains the following endpoint files:
– bcmEndpoints.xml
– bpcEndpoints.xml
– fabricEndpoints.xml
– hmEndpoints.xml
– monitorABXEndpoints.xml
– monitorEndpoints.xml
– pubserverEndpoints.xml
– smEndpoints.xml
– visualStepEndpoints.xml
– wpsEndpoints.xml
– wsumEndpoints.xml
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 591
16.23.2 Logging in to Business Space
Once the HTTP Server has been configured and the REST Services Endpoints
have been configured to point to our HTTP server, the next test is to ensure that
we can sign in to Business Space. In our topology, we point our browser to the
URL https://wbijgt3.rtp.raleigh.ibm.com/BusinessSpace, and the window
shown in Figure 16-67 should appear.
Chapter 16. Creating a WebSphere Dynamic Process Edition production topology 593
594 WebSphere Business Process Management V6.2 Production Topologies
Part 5
Part 5 Appendixes
Alternatively, you can go to the IBM Redbooks publication Web site at:
ibm.com/redbooks
Select Additional materials and open the directory that corresponds with the
IBM Redbooks publication form number, SG247732.
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this book.
WebSphere Business
Process Management V6.2
Production Topologies ®