Go to main content
1/47
Contents
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide?
New and Changed Features for Oracle Fusion Middleware 11g Release 1 (11.1.1.9)
New and Changed Features for Oracle Fusion Middleware 11
g
Release 1 (11.1.1.7)
Part I Understanding Oracle Fusion Middleware
1
Introduction to Oracle Fusion Middleware
1.1
What Is Oracle Fusion Middleware?
1.2
Oracle Fusion Middleware Components
2
Understanding Oracle Fusion Middleware Concepts
2.1
Understanding Key Oracle Fusion Middleware Concepts
2.2
What Is an Oracle WebLogic Server Domain?
2.2.1
What Is the Administration Server?
2.2.2
Understanding Managed Servers and Managed Server Clusters
2.2.3
What Is Node Manager?
2.3
What Is an Oracle Instance?
2.4
What Is a Middleware Home?
2.5
What Is a WebLogic Server Home?
2.6
What Is an Oracle Home and the Oracle Common Home?
2.7
What Is the Oracle Metadata Repository?
Part II Basic Administration
3
Getting Started Managing Oracle Fusion Middleware
3.1
Setting Up Environment Variables
3.2
Overview of Oracle Fusion Middleware Administration Tools
3.3
Getting Started Using Oracle Enterprise Manager Fusion Middleware Control
3.3.1
Displaying Fusion Middleware Control
3.3.2
Using Fusion Middleware Control Help
3.3.3
Navigating Within Fusion Middleware Control
3.3.4
Understanding Users and Roles for Fusion Middleware Control
3.3.5
Viewing and Managing the Farm
3.3.6
Viewing and Managing Components
3.3.7
Viewing the Status of Applications
3.4
Getting Started Using Oracle WebLogic Server Administration Console
3.4.1
Displaying the Oracle WebLogic Server Administration Console
3.4.2
Locking the WebLogic Server Configuration
3.5
Getting Started Using Command-Line Tools
3.5.1
Getting Started Using the Oracle WebLogic Scripting Tool (WLST)
3.5.1.1
Using Custom WLST Commands
3.5.1.2
Using WLST Commands for System Components
3.5.2
Getting Started Using Oracle Process Manager and Notification Server
3.6
Getting Started Using the Fusion Middleware Control MBean Browsers
3.6.1
Using the System MBean Browser
3.6.2
Using the MBeans for a Selected Application
3.7
Managing Components
3.8
Changing the Administrative User Password
3.8.1
Changing the Administrative User Password Using the Command Line
3.8.2
Changing the Administrative User Password Using the Administration Console
3.9
Basic Tasks for Configuring and Managing Oracle Fusion Middleware
4
Starting and Stopping Oracle Fusion Middleware
4.1
Overview of Starting and Stopping Procedures
4.2
Starting and Stopping Oracle WebLogic Server Instances
4.2.1
Configuring Node Manager to Start Managed Servers
4.2.2
Starting and Stopping Administration Servers
4.2.3
Starting and Stopping Managed Servers
4.2.3.1
Starting and Stopping Managed Servers Using Fusion Middleware Control
4.2.3.2
Starting and Stopping Managed Servers Using WLST
4.2.4
Enabling Servers to Start Without Supplying Credentials
4.2.5
Setting Up an Oracle WebLogic Server as a Windows Service
4.3
Starting and Stopping Components
4.3.1
Starting and Stopping Components Using Fusion Middleware Control
4.3.2
Starting and Stopping Components Using the Command Line
4.4
Starting and Stopping Fusion Middleware Control
4.5
Starting and Stopping Oracle Management Agent
4.6
Starting and Stopping Applications
4.6.1
Starting and Stopping Java EE Applications Using Fusion Middleware Control
4.6.2
Starting and Stopping Java EE Applications Using WLST
4.7
Starting and Stopping Your Oracle Fusion Middleware Environment
4.7.1
Starting an Oracle Fusion Middleware Environment
4.7.2
Stopping an Oracle Fusion Middleware Environment
4.8
Starting and Stopping: Special Topics
4.8.1
Starting and Stopping in High Availability Environments
4.8.2
Forcing a Shutdown of Oracle Database
5
Managing Ports
5.1
About Managing Ports
5.2
Viewing Port Numbers
5.2.1
Viewing Port Numbers Using the Command Line
5.2.2
Viewing Port Numbers Using Fusion Middleware Control
5.3
Changing the Port Numbers Used by Oracle Fusion Middleware
5.3.1
Changing the Oracle WebLogic Server Listen Ports
5.3.1.1
Changing the Oracle WebLogic Server Listen Ports Using the Administration Console
5.3.1.2
Changing the Oracle WebLogic Server Listen Ports Using WLST
5.3.2
Changing the Oracle HTTP Server Listen Ports
5.3.2.1
Enabling Oracle HTTP Server to Run as Root for Ports Set to Less Than 1024 (UNIX Only)
5.3.2.2
Changing the Oracle HTTP Server Non-SSL Listen Port
5.3.2.3
Changing the Oracle HTTP Server SSL Listen Port
5.3.3
Changing Oracle Web Cache Ports
5.3.4
Changing OPMN Ports (ONS Local and Remote)
5.3.5
Changing Oracle Portal Ports
5.3.5.1
Changing the Oracle Portal Midtier Port
5.3.5.2
Changing the Oracle Web Cache Invalidation Port for Oracle Portal
5.3.5.3
Changing the Oracle Internet Directory Port for Oracle Portal
5.3.5.4
Changing the PPE Loopback Port
5.3.5.5
Changing Oracle Portal SQL*Net Listener Port
5.3.5.6
Restarting WLS_PORTAL Managed Server
5.3.6
Changing the Oracle Database Net Listener Port
5.3.6.1
Changing the KEY Value for an IPC Listener
Part III Secure Sockets Layer
6
Configuring SSL in Oracle Fusion Middleware
6.1
How SSL Works
6.1.1
What SSL Provides
6.1.2
About Private and Public Key Cryptography
6.1.3
Keystores and Wallets
6.1.4
How SSL Sessions Are Conducted
6.2
About SSL in Oracle Fusion Middleware
6.2.1
SSL in the Oracle Fusion Middleware Architecture
6.2.2
Keystores and Oracle Wallets
6.2.3
Authentication Modes
6.2.4
Tools for SSL Configuration
6.3
Configuring SSL for Configuration Tools
6.3.1
Oracle Enterprise Manager Fusion Middleware Control
6.3.2
Oracle WebLogic Server Administration Console
6.3.3
WLST Command-Line Tool
6.4
Configuring SSL for the Web Tier
6.4.1
Configuring Load Balancers
6.4.2
Enabling SSL for Oracle Web Cache Endpoints
6.4.2.1
Enable Inbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.2
Enable Inbound SSL for Oracle Web Cache Using WLST
6.4.2.3
Enable Outbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.4
Specify the Wallet for Outbound SSL from Oracle Web Cache Using WLST
6.4.3
Enabling SSL for Oracle HTTP Server Virtual Hosts
6.4.3.1
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using Fusion Middleware Control
6.4.3.2
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using WLST
6.4.3.3
Enable SSL for Outbound Requests from Oracle HTTP Server
6.5
Configuring SSL for the Middle Tier
6.5.1
Configuring SSL for Oracle WebLogic Server
6.5.1.1
Inbound SSL to Oracle WebLogic Server
6.5.1.2
Outbound SSL from Oracle WebLogic Server
6.5.1.2.1
Outbound SSL from Oracle Platform Security Services to LDAP
6.5.1.2.2
Outbound SSL from Oracle Platform Security Services to Oracle Database
6.5.1.2.3
Outbound SSL from LDAP Authenticator to LDAP
6.5.1.2.4
Outbound SSL to Database
6.5.2
Configuring SSL for Oracle SOA Suite
6.5.3
Configuring SSL for Oracle WebCenter Portal
6.5.4
Configuring SSL for Oracle Identity and Access Management
6.5.4.1
Configuring SSL for Oracle Directory Integration Platform
6.5.4.2
Configuring SSL for Oracle Identity Federation
6.5.4.3
Configuring SSL for Oracle Directory Services Manager
6.5.5
SSL-Enable Oracle Reports, Forms, Discoverer, and Portal
6.5.5.1
SSL for Oracle Reports
6.5.5.2
SSL for Oracle Forms
6.5.5.3
SSL for Oracle Discoverer
6.5.5.4
SSL for Oracle Portal
6.5.6
Client-Side SSL for Applications
6.6
Configuring SSL for the Data Tier
6.6.1
Enabling SSL on Oracle Internet Directory Listeners
6.6.1.1
Enable Inbound SSL on an Oracle Internet Directory Listener Using Fusion Middleware Control
6.6.1.2
Enabling Inbound SSL on an Oracle Internet Directory Listener Using WLST
6.6.1.3
Enabling Outbound SSL from Oracle Internet Directory to Oracle Database
6.6.2
Enabling SSL on Oracle Virtual Directory Listeners
6.6.2.1
Enable SSL for Oracle Virtual Directory Using Fusion Middleware Control
6.6.2.2
Enabling SSL on an Oracle Virtual Directory Listener Using WLST
6.6.3
Configuring SSL for the Database
6.6.3.1
SSL-Enable Oracle Database
6.6.3.2
SSL-Enable a Data Source
6.7
Advanced SSL Scenarios
6.7.1
Hardware Security Modules and Accelerators
6.7.2
CRL Integration with SSL
6.7.2.1
Configuring CRL Validation for a Component
6.7.2.2
Manage CRLs on the File System
6.7.2.3
Test a Component Configured for CRL Validation
6.8
Best Practices for SSL
6.8.1
Best Practices for Administrators
6.8.2
Best Practices for Application Developers
6.9
WLST Reference for SSL
6.9.1
addCertificateRequest
6.9.1.1
Description
6.9.1.2
Syntax
6.9.1.3
Example
6.9.2
addSelfSignedCertificate
6.9.2.1
Description
6.9.2.2
Syntax
6.9.2.3
Example
6.9.3
changeKeyStorePassword
6.9.3.1
Description
6.9.3.2
Syntax
6.9.3.3
Example
6.9.4
changeWalletPassword
6.9.4.1
Description
6.9.4.2
Syntax
6.9.4.3
Example
6.9.5
configureSSL
6.9.5.1
Description
6.9.5.2
Syntax
6.9.5.3
Examples
6.9.6
createKeyStore
6.9.6.1
Description
6.9.6.2
Syntax
6.9.6.3
Example
6.9.7
createWallet
6.9.7.1
Description
6.9.7.2
Syntax
6.9.7.3
Examples
6.9.8
deleteKeyStore
6.9.8.1
Description
6.9.8.2
Syntax
6.9.8.3
Example
6.9.9
deleteWallet
6.9.9.1
Description
6.9.9.2
Syntax
6.9.9.3
Example
6.9.10
exportKeyStore
6.9.10.1
Description
6.9.10.2
Syntax
6.9.10.3
Example
6.9.11
exportKeyStoreObject
6.9.11.1
Description
6.9.11.2
Syntax
6.9.11.3
Examples
6.9.12
exportWallet
6.9.12.1
Description
6.9.12.2
Syntax
6.9.12.3
Examples
6.9.13
exportWalletObject
6.9.13.1
Description
6.9.13.2
Syntax
6.9.13.3
Examples
6.9.14
generateKey
6.9.14.1
Description
6.9.14.2
Syntax
6.9.14.3
Examples
6.9.15
getKeyStoreObject
6.9.15.1
Description
6.9.15.2
Syntax
6.9.15.3
Examples
6.9.16
getSSL
6.9.16.1
Description
6.9.16.2
Syntax
6.9.16.3
Example
6.9.17
getWalletObject
6.9.17.1
Description
6.9.17.2
Syntax
6.9.17.3
Examples
6.9.18
importKeyStore
6.9.18.1
Description
6.9.18.2
Syntax
6.9.18.3
Example
6.9.19
importKeyStoreObject
6.9.19.1
Description
6.9.19.2
Syntax
6.9.19.3
Examples
6.9.20
importWallet
6.9.20.1
Description
6.9.20.2
Syntax
6.9.20.3
Examples
6.9.21
importWalletObject
6.9.21.1
Description
6.9.21.2
Syntax
6.9.21.3
Examples
6.9.22
listKeyStoreObjects
6.9.22.1
Description
6.9.22.2
Syntax
6.9.22.3
Examples
6.9.23
listKeyStores
6.9.23.1
Description
6.9.23.2
Syntax
6.9.23.3
Example
6.9.24
listWalletObjects
6.9.24.1
Description
6.9.24.2
Syntax
6.9.24.3
Examples
6.9.25
listWallets
6.9.25.1
Description
6.9.25.2
Syntax
6.9.25.3
Example
6.9.26
removeKeyStoreObject
6.9.26.1
Description
6.9.26.2
Syntax
6.9.26.3
Examples
6.9.27
removeWalletObject
6.9.27.1
Description
6.9.27.2
Syntax
6.9.27.3
Examples
6.9.28
Properties Files for SSL
6.9.28.1
Structure of Properties Files
6.9.28.2
Examples of Properties Files
7
Using the SSL Automation Tool
7.1
Introduction to the SSL Automation Tool
7.2
Prerequisites
7.2.1
Setting up Oracle Fusion Middleware Environment
7.2.2
Assembling Required Information
7.3
Generating the CA Certificate
7.3.1
Example: Generating a Certificate
7.4
Configuring a Component Server
7.4.1
Example: Configuring a WebLogic Server and Java EE Components
7.4.2
Example: Configuring an Oracle Internet Directory Server Component
7.4.3
Example: Configuring an Oracle Virtual Directory Server Component
7.4.4
Example: Configuring an Oracle Access Manager 10g Server Component
7.5
Configuring a Client
7.5.1
Example: Downloading the CA Certificate for SSL Clients
7.5.2
Example: Downloading the Certificate and Configuring a WebLogic Client
7.5.3
Example: Downloading the Certificate and Configuring a WebGate Client
8
Managing Keystores, Wallets, and Certificates
8.1
Key and Certificate Storage in Oracle Fusion Middleware
8.1.1
Types of Keystores
8.1.1.1
JKS Keystore and Truststore
8.1.1.2
Oracle Wallet
8.1.2
Keystore Management Tools
8.1.2.1
About Importing DER-encoded Certificates
8.1.2.2
Using a Keystore Not Created with WLST or Fusion Middleware Control
8.1.2.3
Copying Keystores to File System is Not Supported
8.1.2.4
About Using Oracle Wallet Manager in a Stand-alone Environment
8.1.2.5
Additional Information about Keystore Management
8.2
Command-Line Interface for Keystores and Wallets
8.3
JKS Keystore Management
8.3.1
About Keystores and Certificates
8.3.1.1
Sharing Keystores Across Instances
8.3.1.2
Keystore Naming Conventions
8.3.2
Managing the Keystore Life Cycle
8.3.3
Common Keystore Operations
8.3.3.1
Creating a Keystore Using Fusion Middleware Control
8.3.3.2
Creating a Keystore Using WLST
8.3.3.3
Exporting a Keystore Using Fusion Middleware Control
8.3.3.4
Exporting a Keystore Using WLST
8.3.3.5
Deleting a Keystore Using Fusion Middleware Control
8.3.3.6
Deleting a Keystore Using WLST
8.3.3.7
Importing a Keystore Using Fusion Middleware Control
8.3.3.8
Importing a Keystore Using WLST
8.3.3.9
Changing the Keystore Password Using Fusion Middleware Control
8.3.3.10
Changing the Keystore Password Using WLST
8.3.4
Managing the Certificate Life Cycle
8.3.5
Common Certificate Operations
8.3.5.1
Generating a New Key for the Keystore Using Fusion Middleware Control
8.3.5.2
Generating a New Key for the Keystore Using WLST
8.3.5.3
Generating a Certificate Signing Request Using Fusion Middleware Control
8.3.5.4
Generating a Certificate Signing Request Using WLST
8.3.5.5
Importing a Certificate or Trusted Certificate into a Keystore Using Fusion Middleware Control
8.3.5.6
Importing a Certificate or Trusted Certificate into a Keystore Using WLST
8.3.5.7
Exporting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
8.3.5.8
Exporting a Certificate or Trusted Certificate from the Keystore Using WLST
8.3.5.9
Deleting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
8.3.5.10
Deleting a Certificate or Trusted Certificate from the Keystore Using WLST
8.3.5.11
Converting a Self-Signed Certificate to a Third-Party Certificate Using Fusion Middleware Control
8.3.5.12
Converting a Self-Signed Certificate to a Third-Party Certificate Using WLST
8.3.6
Keystore and Certificate Maintenance
8.3.6.1
Location of Keystores
8.3.6.2
Replacing Expiring Certificates
8.3.6.3
Effect of Host Name Change on Keystores
8.4
Wallet Management
8.4.1
About Wallets and Certificates
8.4.1.1
Password-Protected and Autologin Wallets
8.4.1.2
Self-Signed and Third-Party Wallets
8.4.1.3
Sharing Wallets Across Instances
8.4.1.4
Wallet Naming Conventions
8.4.2
Accessing the Wallet Management Page in Fusion Middleware Control
8.4.3
Managing the Wallet Life Cycle
8.4.4
Common Wallet Operations
8.4.4.1
Creating a Wallet Using Fusion Middleware Control
8.4.4.2
Creating a Wallet Using WLST
8.4.4.3
Creating a Self-Signed Wallet Using Fusion Middleware Control
8.4.4.4
Creating a Self-Signed Wallet Using WLST
8.4.4.5
Changing a Self-Signed Wallet to a Third-Party Wallet Using Fusion Middleware Control
8.4.4.6
Changing a Self-Signed Wallet to a Third-Party Wallet Using WLST
8.4.4.7
Exporting a Wallet Using Fusion Middleware Control
8.4.4.8
Exporting a Wallet Using WLST
8.4.4.9
Importing a Wallet Using Fusion Middleware Control
8.4.4.10
Importing a Wallet Using WLST
8.4.4.11
Deleting a Wallet Using Fusion Middleware Control
8.4.4.12
Deleting a Wallet Using WLST
8.4.5
Managing the Certificate Life Cycle
8.4.6
Accessing the Certificate Management Page for Wallets in Fusion Middleware Control
8.4.7
Common Certificate Operations
8.4.7.1
Adding a Certificate Request Using Fusion Middleware Control
8.4.7.2
Adding a Certificate Request Using WLST
8.4.7.3
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using Fusion Middleware Control
8.4.7.4
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using WLST
8.4.7.5
Importing a Certificate or a Trusted Certificate Using Fusion Middleware Control
8.4.7.6
Importing a Certificate or a Trusted Certificate Using WLST
8.4.7.7
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using Fusion Middleware Control
8.4.7.8
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using WLST
8.4.7.9
Converting a Self-Signed Certificate into a Third-Party Certificate Using Fusion Middleware Control
8.4.7.10
Converting a Self-Signed Certificate into a Third-Party Certificate Using WLST
8.4.8
Wallet and Certificate Maintenance
8.4.8.1
Location of Wallets
8.4.8.2
Effect of Host Name Change on a Wallet
8.4.8.3
Changing a Self-Signed Wallet to a Third-Party Wallet
8.4.8.4
Replacing an Expiring Certificate in a Wallet
9
FIPS 140 Support in Oracle Fusion Middleware
9.1
About the FIPS Standard
9.2
About FIPS 140 in Oracle Fusion Middleware Release 11g (11.1.1.9)
9.3
Components with FIPS 140 Support
9.4
Common Scenarios for an Operational FIPS 140 Environment
9.5
Troubleshooting FIPS 140 Issues
9.5.1
FIPS 140 Troubleshooting for Stand-alone WebLogic Server
9.5.2
FIPS 140 Troubleshooting for Oracle Platform Security Services
9.5.3
FIPS 140 Troubleshooting for Oracle Web Services Manager
Part IV Deploying Applications
10
Understanding the Deployment Process
10.1
What Is a Deployer?
10.2
General Procedures for Moving from Application Design to Production Deployment
10.2.1
Designing and Developing an Application
10.2.2
Deploying an Application to Managed Servers
10.2.3
Automating the Migration of an Application to Other Environments
10.3
Diagnosing Typical Problems
11
Deploying Applications
11.1
Overview of Deploying Applications
11.1.1
What Types of Applications Can You Deploy?
11.1.2
Understanding Deployment, Redeployment, and Undeployment
11.2
Understanding and Managing Data Sources
11.2.1
Understanding Data Sources
11.2.2
Creating and Managing JDBC Data Sources
11.2.2.1
Creating a JDBC Data Source Using Fusion Middleware Control
11.2.2.2
Editing a JDBC Data Source Using Fusion Middleware Control
11.2.2.3
Monitoring a JDBC Data Source Using Fusion Middleware Control
11.2.2.4
Controlling a JDBC Data Source Using Fusion Middleware Control
11.2.2.5
Creating a GridLink Data Source Using Fusion Middleware Control
11.3
Deploying, Undeploying, and Redeploying Java EE Applications
11.3.1
Deploying Java EE Applications
11.3.1.1
Deploying Java EE Applications Using Fusion Middleware Control
11.3.1.2
Deploying Java EE Applications Using WLST
11.3.2
Undeploying Java EE Applications
11.3.2.1
Undeploying Java EE Applications Using Fusion Middleware Control
11.3.2.2
Undeploying Java EE Applications Using WLST
11.3.3
Redeploying Java EE Applications
11.3.3.1
Redeploying Java EE Applications Using Fusion Middleware Control
11.3.3.2
Redeploying Java EE Applications Using WLST
11.4
Deploying, Undeploying, and Redeploying Oracle ADF Applications
11.4.1
Deploying Oracle ADF Applications
11.4.1.1
Deploying ADF Applications Using Fusion Middleware Control
11.4.1.2
Deploying ADF Applications Using WLST or the Administration Console
11.4.2
Undeploying Oracle ADF Applications
11.4.3
Redeploying Oracle ADF Applications
11.5
Deploying, Undeploying, and Redeploying SOA Composite Applications
11.5.1
Deploying SOA Composite Applications
11.5.2
Undeploying SOA Composite Applications
11.5.3
Redeploying SOA Composite Applications
11.6
Deploying, Undeploying, and Redeploying WebCenter Portal Applications
11.6.1
Deploying WebCenter Portal Applications
11.6.2
Undeploying WebCenter Portal Applications
11.6.3
Redeploying WebCenter Portal Applications
11.7
Managing Deployment Plans
11.8
About the Common Deployment Tasks in Fusion Middleware Control
11.9
Changing MDS Configuration Attributes for Deployed Applications
11.9.1
Changing the MDS Configuration Attributes Using Fusion Middleware Control
11.9.2
Changing the MDS Configuration Using WLST
11.9.3
Restoring the Original MDS Configuration for an Application
Part V Monitoring Oracle Fusion Middleware
12
Monitoring Oracle Fusion Middleware
12.1
Monitoring the Status of Oracle Fusion Middleware
12.1.1
Viewing General Information
12.1.2
Monitoring an Oracle WebLogic Server Domain
12.1.3
Monitoring an Oracle WebLogic Server Administration or Managed Server
12.1.4
Monitoring a Cluster
12.1.5
Monitoring a Java Component
12.1.6
Monitoring a System Component
12.1.7
Monitoring Java EE Applications
12.1.8
Monitoring ADF Applications
12.1.9
Monitoring SOA Composite Applications
12.1.10
Monitoring Oracle WebCenter Portal and Portal Framework Applications
12.1.11
Monitoring Applications Deployed to a Cluster
12.2
Viewing the Performance of Oracle Fusion Middleware
13
Managing Log Files and Diagnostic Data
13.1
Overview of Oracle Fusion Middleware Logging
13.2
Understanding ODL Messages and ODL Log Files
13.3
Viewing and Searching Log Files
13.3.1
Viewing Log Files and Their Messages
13.3.1.1
Viewing Log Files and Their Messages Using Fusion Middleware Control
13.3.1.2
Viewing Log Files and Their Messages Using WLST
13.3.2
Searching Log Files
13.3.2.1
Searching Log Files Using Fusion Middleware Control
13.3.2.1.1
Searching Log Files: Basic Searches
13.3.2.1.2
Searching Log Files: Advanced Searches
13.3.2.2
Searching Log Files Using WLST
13.3.3
Downloading Log Files
13.3.3.1
Downloading Log Files Using Fusion Middleware Control
13.3.3.2
Downloading Log Files Using WLST
13.4
Configuring Settings for Log Files
13.4.1
Changing Log File Locations
13.4.1.1
Changing Log File Locations Using Fusion Middleware Control
13.4.1.2
Changing Log File Locations Using WLST
13.4.2
Configuring Log File Rotation
13.4.2.1
Specifying Log File Rotation Using Fusion Middleware Control
13.4.2.2
Specifying Log File Rotation Using WLST
13.4.3
Setting the Level of Information Written to Log Files
13.4.3.1
Configuring Message Levels Using Fusion Middleware Control
13.4.3.2
Configuring Message Levels Using WLST
13.4.4
Specifying the Log File Format
13.4.4.1
Specifying the Log File Format Using Fusion Middleware Control
13.4.4.2
Specifying the Log File Format Using WLST
13.4.5
Specifying the Log File Locale
13.4.5.1
Specifying the Log File Encoding Using WLST
13.4.5.2
Specifying the Log File Encoding in logging.xml
13.5
Correlating Messages Across Log Files and Components
13.6
Configuring Tracing
13.6.1
Configuring and Using QuickTrace
13.6.1.1
Configuring QuickTrace Using Fusion Middleware Control
13.6.1.1.1
Configuring QuickTrace Using Fusion Middleware Control
13.6.1.1.2
Writing the Trace Messages to a File Using Fusion Middleware Control
13.6.1.2
Configuring QuickTrace Using WLST
13.6.1.2.1
Configuring QuickTrace Using WLST
13.6.1.2.2
Writing the Trace Messages to a File Using WLST
13.6.1.2.3
Disabling QuickTrace Using WLST
13.6.2
Configuring and Using Selective Tracing
13.6.2.1
Configuring Selective Tracing Using Fusion Middleware Control
13.6.2.1.1
Configuring Selective Tracing Using Fusion Middleware Control
13.6.2.1.2
Viewing Selective Traces Using Fusion Middleware Control
13.6.2.1.3
Disabling Selective Tracing Using Fusion Middleware Control
13.6.2.2
Configuring Selective Tracing Using WLST
13.6.2.2.1
Configuring Selective Tracing Using WLST
13.6.2.2.2
Viewing Selective Traces Using WLST
13.6.2.2.3
Disabling Selective Traces Using WLST
14
Diagnosing Problems
14.1
Understanding the Diagnostic Framework
14.1.1
About Incidents and Problems
14.1.1.1
Incident Flood Control
14.1.2
Diagnostic Framework Components
14.1.2.1
Automatic Diagnostic Repository
14.1.2.2
Diagnostic Dumps
14.1.2.3
Management MBeans
14.1.2.4
WLST Commands for Diagnostic Framework
14.1.2.5
ADRCI Command-Line Utility
14.2
How the Diagnostic Framework Works
14.3
Configuring the Diagnostic Framework
14.3.1
Configuring Diagnostic Framework Settings
14.3.2
Configuring Custom Diagnostic Rules
14.3.3
Configuring Problem Suppression
14.3.4
Configuring WLDF Watch and Notification for the Diagnostic Framework
14.4
Investigating, Reporting, and Solving a Problem
14.4.1
Roadmap—Investigating, Reporting, and Resolving a Problem
14.4.2
Viewing Problems and Incidents
14.4.2.1
Viewing Problems
14.4.2.2
Viewing Incidents
14.4.3
Analyzing Specific Problem Keys
14.4.4
Working with Diagnostic Dumps
14.4.4.1
Listing Diagnostic Dumps
14.4.4.2
Viewing a Description of a Diagnostic Dump
14.4.4.3
Executing Dumps
14.4.5
Configuring and Using Diagnostic Dump Sampling
14.4.5.1
Understanding Diagnostic Dump Sampling
14.4.5.2
Configuring Dump Sampling
14.4.5.2.1
Creating Dump Samplings
14.4.5.2.2
Modifying Dump Sampling Settings
14.4.5.2.3
Removing Dump Samplings
14.4.5.2.4
Enabling or Disabling All Dump Sampling
14.4.5.3
Listing Dump Samplings
14.4.5.4
Retrieving the Dump Sampling Output
14.4.5.4.1
Retrieving Dump Samples Using the executeDump Command
14.4.5.4.2
Retrieving Dump Samples Using the getSamplingArchives Command
14.4.6
Managing Incidents
14.4.6.1
Creating an Incident Manually
14.4.6.2
Packaging an Incident
14.4.6.3
Purging Incidents
14.4.7
Generating an RDA Report
14.5
Managing and Running the Health Test Framework
14.5.1
Understanding the Health Test Framework
14.5.2
Understanding the Health Test Framework File Repository
14.5.3
Using the Health Test Framework Command Line
14.5.3.1
dfwhealthtestadminctl.sh Command Line
14.5.3.1.1
help
14.5.3.1.2
register
14.5.3.1.3
index
14.5.3.2
dfwhealthtestctl.sh Command Line
14.5.3.2.1
desctest
14.5.3.2.2
help
14.5.3.2.3
listrun
14.5.3.2.4
listtest
14.5.3.2.5
report
14.5.3.2.6
run
14.5.3.2.7
status
14.5.4
Managing the Health Test Framework
14.5.4.1
Creating a Repository and Registering Health Test Framework Tests
14.5.4.2
Rebuilding the Health Test Framework Indexes
14.5.5
Running Health Test Framework Diagnostic Tests
14.5.6
Searching for Health Test Framework Diagnostic Tests
14.5.7
Retrieving a Description of a Health Test Framework Test
14.5.8
Listing Health Test Framework Test Runs
14.5.9
Generating Health Test Framework Reports
Part VI Advanced Administration
15
Managing the Metadata Repository
15.1
Understanding a Metadata Repository
15.2
Creating a Database-Based Metadata Repository
15.3
Managing the MDS Repository
15.3.1
Understanding the MDS Repository
15.3.1.1
Databases Supported by MDS
15.3.1.2
Understanding MDS Operations
15.3.2
Registering and Deregistering a Database-Based MDS Repository
15.3.2.1
Registering a Database-Based MDS Repository
15.3.2.1.1
Registering a Database-Based MDS Repository Using Fusion Middleware Control
15.3.2.1.2
Registering a Database-Based MDS Repository Using WLST
15.3.2.2
Adding or Removing Servers Targeted to the MDS Repository
15.3.2.3
Deregistering a Database-Based MDS Repository
15.3.2.3.1
Deregistering a Database-Based MDS Repository Using Fusion Middleware Control
15.3.2.3.2
Deregistering a Database-Based MDS Repository Using WLST
15.3.3
Registering and Deregistering a File-Based MDS Repository
15.3.3.1
Creating and Registering a File-Based MDS Repository
15.3.3.2
Deregistering a File-Based MDS Repository
15.3.4
Changing the System Data Source
15.3.5
Using System MBeans to Manage an MDS Repository
15.3.6
Viewing Information About an MDS Repository
15.3.6.1
Viewing Information About an MDS Repository Using Fusion Middleware Control
15.3.6.2
Viewing Information About an MDS Repository Using System MBeans
15.3.7
Configuring an Application to Use a Different MDS Repository or Partition
15.3.7.1
Cloning a Partition
15.3.7.2
Creating a New Partition and Reassociating the Application to It
15.3.8
Moving Metadata from a Source System to a Target System
15.3.8.1
Transferring Metadata Using Fusion Middleware Control
15.3.8.2
Transferring Metadata using WLST
15.3.9
Moving from a File-Based Repository to a Database-Based Repository
15.3.10
Deleting a Metadata Partition from a Repository
15.3.10.1
Deleting a Metadata Partition Using Fusion Middleware Control
15.3.10.2
Deleting a Metadata Partition Using WLST
15.3.11
Purging Metadata Version History
15.3.11.1
Purging Metadata Version History Using Fusion Middleware Control
15.3.11.2
Purging Metadata Version History Using WLST
15.3.11.3
Enabling Auto-Purge
15.3.12
Managing Metadata Labels in the MDS Repository
15.3.12.1
Creating Metadata Labels
15.3.12.2
Listing Metadata Labels
15.3.12.3
Promoting Metadata Labels
15.3.12.4
Purging Metadata Labels
15.3.12.4.1
Purging Metadata Labels Using Fusion Middleware Control
15.3.12.4.2
Purging Metadata Labels Using WLST
15.3.12.5
Deleting Metadata Labels
15.4
Managing Metadata Repository Schemas
15.4.1
Changing Metadata Repository Schema Passwords
15.4.2
Changing the Character Set of the Metadata Repository
15.5
Purging Data
15.5.1
Purging Oracle Infrastructure Web Services Data
15.5.2
Purging Oracle WebCenter Portal Data
15.5.2.1
Purging Oracle WebCenter Portal's Activity Stream Data
15.5.2.2
Purging Oracle WebCenter Portal's Analytics Data
15.5.2.2.1
Loading the Oracle WebCenter Portal Purge Package
15.5.2.2.2
Running the Oracle WebCenter Portal Purge Script
15.5.2.3
Partitioning Oracle WebCenter Portal's Analytics Data
16
Changing Network Configurations
16.1
Changing the Network Configuration of Oracle Fusion Middleware
16.1.1
Overview of Support for Changing Network Configuration of Components
16.1.2
Changing the Network Configuration of an Administration Server
16.1.3
Changing the Network Configuration of a Managed Server
16.1.4
Changing the Network Configuration of Web Tier Components
16.2
Changing the Network Configuration of a Database
16.3
Moving Between On-Network and Off-Network
16.3.1
Moving from Off-Network to On-Network (Static IP Address)
16.3.2
Moving from Off-Network to On-Network (DHCP)
16.3.3
Moving from On-Network to Off-Network (Static IP Address)
16.4
Changing Between a Static IP Address and DHCP
16.4.1
Changing from a Static IP Address to DHCP
16.4.2
Changing from DHCP to a Static IP Address
16.5
Using IPv6
16.5.1
Supported Topologies for IPv6 Network Protocols
16.5.2
Configuring Oracle HTTP Server for IPv6
16.5.3
Using Dual Stack with Oracle SOA Suite and Fusion Middleware Control
16.5.4
Disabling IPv6 Support for Oracle Web Cache
16.5.5
Configuring Oracle Single Sign-On to Use Oracle HTTP Server with IPv6
16.5.6
Configuring Oracle Access Manager 11
g
Support for IPv6
16.5.6.1
Prerequisites
16.5.6.2
Introduction to Oracle Access Manager and IPv6
16.5.6.2.1
Configuring IPv6 with Oracle Access Manager and Challenge Redirect
16.5.6.2.2
Considerations
16.5.6.3
Configuring IPv6: Separate Proxy for Oracle Access Manager and Webgates
16.5.7
Configuring Oracle Access Manager 10
g
Support for IPv6
16.5.7.1
Simple Authentication with IPv6
16.5.7.2
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
16.5.7.3
Considerations
16.5.7.4
Prerequisites
16.5.7.5
Configuring IPv6 with Simple Authentication
16.5.7.6
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
16.5.7.7
Configuring IPv6: Separate Proxy for Authentication and Resource WebGates
Part VII Advanced Administration: Backup and Recovery
17
Introducing Backup and Recovery
17.1
Understanding Oracle Fusion Middleware Backup and Recovery
17.1.1
Impact of Administration Server Failure
17.1.2
Managed Server Independence (MSI) Mode
17.1.3
Configuration Changes in Managed Servers
17.2
Oracle Fusion Middleware Directory Structure
17.3
Overview of the Backup Strategies
17.3.1
Types of Backups
17.3.2
Backup Artifacts
17.3.3
Recommended Backup Strategy
17.4
Overview of Recovery Strategies
17.4.1
Types of Recovery
17.4.2
Recommended Recovery Strategies
17.5
Backup and Recovery Recommendations for Oracle Fusion Middleware Components
17.5.1
Backup and Recovery Recommendations for Oracle WebLogic Server
17.5.1.1
Backup and Recovery Recommendations for Oracle WebLogic Server
17.5.1.2
Backup and Recovery Recommendations for Oracle WebLogic Server JMS
17.5.2
Backup and Recovery Recommendations for Oracle Identity Management
17.5.2.1
Backup and Recovery Recommendations for Oracle Internet Directory
17.5.2.2
Backup and Recovery Recommendations for Oracle Virtual Directory
17.5.2.3
Backup and Recovery Recommendations for Oracle Directory Integration Platform
17.5.2.4
Backup and Recovery Recommendations for Oracle Directory Services Manager
17.5.2.5
Backup and Recovery Recommendations for Oracle Identity Federation
17.5.2.6
Backup and Recovery Recommendations for Oracle Access Manager
17.5.2.7
Backup and Recovery Recommendations for Oracle Adaptive Access Manager
17.5.2.8
Backup and Recovery Recommendations for Oracle Identity Manager
17.5.2.9
Backup and Recovery Recommendations for Oracle Identity Navigator
17.5.3
Backup and Recovery Recommendations for Oracle SOA Suite
17.5.3.1
Backup and Recovery Recommendations for Oracle BPEL Process Manager
17.5.3.2
Backup and Recovery Recommendations for Oracle Business Activity Monitoring
17.5.3.3
Backup and Recovery Recommendations for Oracle B2B
17.5.3.4
Backup and Recovery Recommendations for Oracle Service Bus
17.5.3.5
Backup and Recovery Recommendations for Oracle Mediator
17.5.3.6
Backup and Recovery Recommendations for Oracle Business Rules
17.5.3.7
Backup and Recovery Recommendations for Oracle Business Process Management
17.5.4
Backup and Recovery Recommendations for Oracle WebCenter Portal
17.5.4.1
Backup and Recovery Recommendations for Oracle WebCenter Portal
17.5.4.2
Backup and Recovery Recommendations for Oracle WebCenter Portal's Portlet Producer
17.5.4.3
Backup and Recovery Recommendations for Oracle WebCenter Portal's Discussion Server
17.5.4.4
Backup and Recovery Recommendations for Oracle WebCenter Portal's Activity Graph
17.5.4.5
Backup and Recovery Recommendations for Oracle WebCenter Portal's Analytics
17.5.4.6
Backup and Recovery Recommendations for Content Server
17.5.5
Backup and Recovery Recommendations for Oracle JRF Installations
17.5.5.1
Backup and Recovery Recommendations for Oracle Web Services Manager
17.5.5.2
Backup and Recovery Recommendations for Oracle Platform Security Services
17.5.6
Backup and Recovery Recommendations for Web Tier Installations
17.5.6.1
Backup and Recovery Recommendations for Oracle HTTP Server
17.5.6.2
Backup and Recovery Recommendations for Oracle Web Cache
17.5.7
Backup and Recovery Recommendations for Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle BI Discoverer Installations
17.5.7.1
Backup and Recovery Recommendations for Oracle Portal
17.5.7.2
Backup and Recovery Recommendations for Oracle Forms Services
17.5.7.3
Backup and Recovery Recommendations for Oracle Reports
17.5.7.4
Backup and Recovery Recommendations for Oracle Business Intelligence Discoverer
17.5.8
Backup and Recovery Recommendations for Oracle Business Intelligence
17.5.8.1
Backup and Recovery Recommendations for Oracle BI Enterprise Edition
17.5.8.2
Backup and Recovery Recommendations for Oracle Business Intelligence Publisher
17.5.8.3
Backup and Recovery Recommendations for Oracle Real-Time Decisions
17.5.9
Backup and Recovery Recommendations for Oracle Hyperion Enterprise Performance Management System
17.5.9.1
Backup and Recovery Recommendations for Oracle Essbase
17.5.9.2
Backup and Recovery Recommendations for Oracle Hyperion Calculation Manager
17.5.9.3
Backup and Recovery Recommendations for Oracle Hyperion Financial Reporting
17.5.9.4
Backup and Recovery Recommendations for Oracle Hyperion Smart View
17.5.10
Backup and Recovery Recommendations for Oracle Data Integrator
17.5.11
Backup and Recovery Recommendations for Oracle WebCenter Content
17.5.11.1
Backup and Recovery Recommendations for Oracle Information Rights Management
17.5.11.2
Backup and Recovery Recommendations for Oracle WebCenter Content: Imaging
17.5.11.3
Backup and Recovery Recommendations for Oracle WebCenter Content
17.5.11.4
Backup and Recovery Recommendations for Oracle WebCenter Content: Records
17.6
Assumptions and Restrictions
18
Backing Up Your Environment
18.1
Overview of Backing Up Your Environment
18.2
Limitations and Restrictions for Backing Up Data
18.3
Performing a Backup
18.3.1
Performing a Full Offline Backup
18.3.2
Performing an Online Backup of Run-Time Artifacts
18.3.3
Backing Up Windows Registry Entries
18.4
Creating a Record of Your Oracle Fusion Middleware Configuration
19
Recovering Your Environment
19.1
Overview of Recovering Your Environment
19.2
Recovering After Data Loss, Corruption, Media Failure, or Application Malfunction
19.2.1
Recovering a Middleware Home
19.2.2
Recovering an Oracle WebLogic Server Domain
19.2.3
Recovering an Oracle Home
19.2.4
Recovering an Oracle Instance Home
19.2.4.1
Recovering After Oracle Instance Home Deleted from File System
19.2.4.2
Recovering After Oracle Instance Home Deregistered
19.2.5
Recovering the Administration Server Configuration
19.2.6
Recovering a Managed Server
19.2.6.1
Recovering a Managed Server When It Cannot Be Started
19.2.6.2
Recovering a Managed Server When It Does Not Function Correctly
19.2.6.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
19.2.7
Recovering Components
19.2.7.1
Recovering a Component That Is Not Functioning Properly
19.2.7.2
Recovering a Component After Cluster Configuration Change
19.2.7.3
Recovering Oracle Identity Manager
19.2.7.4
Recovering Oracle Identity Navigator
19.2.7.5
Recovering Oracle Access Manager
19.2.7.6
Recovering Oracle Adaptive Access Manager
19.2.7.7
Recovering Oracle Business Process Management
19.2.7.8
Recovering Oracle WebCenter Portal's Activity Graph
19.2.7.9
Recovering Oracle WebCenter Portal's Analytics Data
19.2.7.10
Recovering Oracle BI Enterprise Edition
19.2.7.10.1
Recovering Oracle BI Enterprise Edition in a Non-Clustered Environment
19.2.7.10.2
Recovering Oracle BI Enterprise Edition in a Clustered Environment
19.2.7.10.3
Reconciling the LDAP Database with RPD
19.2.7.11
Recovering Oracle Business Intelligence Publisher
19.2.7.12
Recovering Oracle Real-Time Decisions
19.2.7.13
Recovering Oracle Essbase
19.2.7.14
Recovering Oracle Hyperion Calculation Manager
19.2.7.15
Recovering Oracle Hyperion Financial Reporting
19.2.7.16
Recovering Oracle Hyperion Smart View
19.2.7.17
Recovering Oracle Data Integrator
19.2.7.18
Recovering Oracle Information Rights Management
19.2.7.19
Recovering Oracle WebCenter Content: Imaging
19.2.7.20
Recovering Oracle WebCenter Content
19.2.7.21
Recovering Oracle WebCenter Content: Records
19.2.8
Recovering a Cluster
19.2.8.1
Recovering a Cluster After Deletion or Cluster-Level Configuration Changes
19.2.8.2
Recovering a Cluster After Membership Is Mistakenly Modified
19.2.9
Recovering Applications
19.2.9.1
Recovering Application Artifacts
19.2.9.2
Recovering a Redeployed Application That Is No Longer Functional
19.2.9.3
Recovering an Undeployed Application
19.2.9.4
Recovering a Composite Application
19.2.10
Recovering a Database
19.3
Recovering After Loss of Host
19.3.1
Recovering After Loss of Oracle WebLogic Server Domain Host
19.3.2
Recovering After Loss of Administration Server Host
19.3.2.1
Recovering the Administration Server to the Same Host
19.3.2.2
Recovering the Administration Server to a Different Host
19.3.3
Recovering After Loss of Managed Server Host
19.3.3.1
Recovering a Managed Server to the Same Host
19.3.3.2
Recovering a Managed Server to a Different Host
19.3.3.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
19.3.4
Recovering After Loss of Component Host
19.3.4.1
Recovering a Java Component to the Same Host
19.3.4.2
Recovering a Java Component to a Different Host
19.3.4.3
Recovering a System Component to the Same Host
19.3.4.4
Recovering a System Component to a Different Host
19.3.4.5
Recovering Identity Management Components to a Different Host
19.3.4.5.1
Recovering Oracle Internet Directory to a Different Host
19.3.4.5.2
Recovering Oracle Virtual Directory to a Different Host
19.3.4.5.3
Recovering Oracle Directory Integration Platform to a Different Host
19.3.4.5.4
Recovering Oracle Identity Federation to a Different Host
19.3.4.5.5
Recovering Oracle Identity Manager to a Different Host
19.3.4.5.6
Recovering Oracle Identity Navigator to a Different Host
19.3.4.5.7
Recovering Oracle Access Manager to a Different Host
19.3.4.5.8
Recovering Oracle Adaptive Access Manager to a Different Host
19.3.4.6
Recovering Oracle SOA Suite After Loss of Host
19.3.4.7
Recovering Web Tier Components to a Different Host
19.3.4.7.1
Recovering Oracle HTTP Server to a Different Host
19.3.4.7.2
Recovering Oracle Web Cache to a Different Host
19.3.4.8
Recovering Oracle Portal, Oracle Reports, Oracle Forms Services, and Oracle Business Intelligence Discoverer to a Different Host
19.3.4.8.1
Recovering Oracle Portal to a Different Host
19.3.4.8.2
Recovering Oracle Forms Services to a Different Host
19.3.4.8.3
Recovering Oracle Reports to a Different Host
19.3.4.8.4
Recovering Oracle Business Intelligence Discoverer to a Different Host
19.3.4.9
Recovering Oracle BI Enterprise Edition to a Different Host
19.3.4.9.1
Recovering Oracle BI EE to a Different Host in a Non-Clustered Environment
19.3.4.9.2
Recovering Oracle BI EE to a Different Host in a Clustered Environment
19.3.4.9.3
Additional Steps for Recovering Oracle BI EE
19.3.4.9.4
Importing Oracle BI EE Registry Entries
19.3.4.10
Recovering Oracle Business Intelligence Publisher to a Different Host
19.3.4.11
Recovering Oracle Real-Time Decisions to a Different Host
19.3.4.12
Recovering Oracle Essbase After Loss of Host
19.3.4.13
Recovering Oracle Hyperion Calculation Manager After Loss of Host
19.3.4.14
Recovering Oracle Hyperion Financial Reporting After Loss of Host
19.3.4.15
Recovering Oracle Data Integrator to a Different Host
19.3.4.16
Recovering Oracle WebCenter Content to a Different Host
19.3.4.16.1
Recovering Oracle WebCenter Content to a Different Host
19.3.4.16.2
Recovering Oracle WebCenter Content: Records After Loss of Host
19.3.5
Additional Actions for Recovering Entities After Loss of Host
19.3.5.1
Recovering Fusion Middleware Control to a Different Host
19.3.5.2
Changing the Host Name in the targets.xml File for Fusion Middleware Control
19.3.5.3
Recovering Oracle Management Agent When Components Are Recovered to a Different Host
19.3.5.4
Modifying the mod_wl_ohs.conf File
19.3.5.5
Creating a New Machine for Certain Components
19.3.5.6
Reassociating Users to Groups for Certain Identity Management Components
19.3.5.7
Updating Oracle Inventory
19.3.5.8
Recovering the Windows Registry
19.3.6
Recovering After Loss of Database Host
Part VIII Advanced Administration: Expanding Your Environment
20
Scaling Your Environment
20.1
Overview of Scaling Your Environment
20.2
Extending a Domain to Support Additional Components
20.3
Adding Additional Managed Servers to a Domain
20.3.1
Applying Oracle JRF Template to a Managed Server or Cluster
20.4
Creating Additional Oracle Instances and System Components
20.4.1
Creating an Oracle Instance Using a Non-Secure Port
20.4.2
Creating an Oracle Instance Using a Secure Port
20.4.3
Disabling a System Component
20.5
Creating Clusters
20.6
Copying a Middleware Home or Component
21
Moving from a Test to a Production Environment
21.1
Introduction to Moving Oracle Fusion Middleware Components
21.2
Introduction to the Movement Scripts
21.3
Overview of Procedures for Moving from a Source to a Target Environment
21.4
Common Procedures for Moving to a Target Environment
21.4.1
Preparing the Source Environment
21.4.2
Preparing the Target Environment
21.4.3
Installing the Database on the Target Environment
21.4.3.1
Installing a New Database on the Target Environment
21.4.3.2
Duplicating a Database on the Target Environment
21.4.4
Moving the Middleware Home and the Binary Files
21.4.5
Moving the Configuration of Java Components
21.4.6
Moving the Configuration of Oracle Instances and System Components
21.4.6.1
Moving an Oracle Instance and All of Its System Components
21.4.6.2
Moving an Individual System Component
21.4.7
Configuring Users and Groups
21.5
Moving Oracle Fusion Middleware Components
21.5.1
Moving Identity Management Components to a Target Environment
21.5.1.1
Moving Identity Management to a New Target Environment
21.5.1.2
Moving Identity Management to an Existing Target Environment
21.5.2
Moving Oracle SOA Suite to a Target Environment
21.5.2.1
Moving Oracle SOA Suite to a New Target Environment
21.5.2.2
Moving Oracle SOA Suite to an Existing Target Environment
21.5.3
Moving Oracle WebCenter Portal to a Target Environment
21.5.3.1
Moving Oracle WebCenter Portal to a New Target Environment
21.5.3.2
Moving Oracle WebCenter Portal to an Existing Target Environment
21.5.4
Moving Oracle WebCenter Content to a Target Environment
21.5.4.1
Moving Oracle WebCenter Content to a New Target Environment
21.5.4.2
Moving Oracle WebCenter Content to an Existing Target Environment
21.5.5
Moving Oracle Hyperion Enterprise Performance Management System to a Target Environment
21.5.6
Moving the Web Tier to a Target Environment
21.5.6.1
Moving the Web Tier to a New Target Environment
21.5.6.1.1
Moving Oracle HTTP Server to a New Target Environment
21.5.6.1.2
Moving Oracle Web Cache to a New Target Environment
21.5.6.2
Moving the Web Tier to an Existing Target Environment
21.5.6.2.1
Moving Oracle HTTP Server to an Existing Target Environment
21.5.7
Moving Oracle Business Intelligence to a Target Environment
21.5.7.1
Moving Oracle Business Intelligence to a New Target Environment
21.5.7.2
Moving Oracle Business Intelligence to an Existing Target Environment When There Are Few Patches to Apply
21.5.7.3
Moving Oracle Business Intelligence Components to an Existing Target Environment When There are Many Patches to Apply
21.5.7.3.1
Moving Oracle BI EE to an Existing Target Environment When New Hardware Is Available
21.5.7.3.2
Moving Oracle BI EE to an Existing Target Environment When New Hardware Is Not Available
21.5.8
Moving Oracle Real-Time Decisions to a Target Environment
21.5.8.1
Moving Oracle Real-Time Decisions to a New Target Environment
21.5.8.2
Moving Oracle Real-Time Decisions to an Existing Target Environment
21.5.9
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle BI Discoverer to a Target Environment
21.5.9.1
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle Business Intelligence Discoverer to a New Target Environment
21.5.9.2
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle Business Intelligence Discoverer to an Existing Target Environment
21.5.10
Moving Oracle Data Integrator to a Target Environment
21.5.10.1
Moving Oracle Data Integrator to a New Target Environment
21.5.10.2
Moving Oracle Data Integrator to an Existing Target Environment
21.6
Considerations in Moving to and from Multihost Environments
21.7
Considerations in Moving to and from an Oracle RAC Environment
21.8
Limitations in Moving from Source to Target
21.9
Recovering from Test to Production Errors
21.10
A Case Study: Moving Oracle SOA Suite and the Fusion Order Demo to a New Target Environment
Part IX Appendixes
A
Using the Movement Scripts
A.1
Introduction to the Movement Scripts
A.2
Movement Scripts
A.2.1
Movement Scripts Syntax
A.2.1.1
copyBinary Script
A.2.1.2
pasteBinary Script
A.2.1.3
copyConfig Script for Java Components
A.2.1.4
copyConfig Script for Oracle Instances
A.2.1.5
copyConfig Script for System Components
A.2.1.6
copyConfig Script for Node Manager
A.2.1.7
extractMovePlan Script
A.2.1.8
pasteConfig Script for Java Components
A.2.1.9
pasteConfig Script for Oracle Instances
A.2.1.10
pasteConfig Script for System Components
A.2.1.11
pasteConfig Script for Node Manager
A.2.1.12
obfuscatePassword Script
A.3
Modifying Move Plans
A.3.1
Locating configGroup Elements
A.3.2
Move Plan Properties
B
Oracle Fusion Middleware Command-Line Tools
C
URLs for Components
D
Port Numbers
D.1
Port Numbers by Component
D.2
Port Numbers (Sorted by Number)
E
Metadata Repository Schemas
E.1
Metadata Repository Schema Descriptions
E.2
Metadata Repository Schemas, Tablespaces, and Data Files
F
Using Oracle Fusion Middleware Accessibility Options
F.1
Install and Configure Java Access Bridge (Windows Only)
F.2
Enabling Fusion Middleware Control Accessibility Mode
F.2.1
Making HTML Pages More Accessible
F.2.2
Viewing Text Descriptions of Fusion Middleware Control Charts
F.3
Fusion Middleware Control Keyboard Navigation
G
Examples of Administrative Changes
G.1
How to Use This Appendix
G.2
Examples of Administrative Changes (by Component)
H
Viewing Release Numbers
H.1
Release Number Format
H.2
Viewing the Software Inventory and Release Numbers
H.2.1
Viewing Oracle Fusion Middleware Installation Release Numbers
H.2.2
Viewing Oracle WebLogic Server Release Numbers
H.2.3
Viewing Component Release Numbers
H.2.4
Viewing Oracle Internet Directory Release Numbers
H.2.5
Viewing Metadata Repository Release Numbers
H.2.6
Viewing Schema Release Numbers
I
Oracle Wallet Manager and orapki
I.1
New orapki Features
I.1.1
orapki Usage Examples
I.1.2
New CRL Management Features
I.1.3
New Version 3 Certificate Support
I.1.4
Trust Chain Export
I.1.5
Wallet Password Change
I.1.6
Converting Between Oracle Wallet and JKS Keystore
I.2
Using the orapki Utility for Certificate Validation and CRL Management
I.2.1
orapki Overview
I.2.1.1
orapki Syntax
I.2.1.2
Environment Setup for orapki
I.2.2
Displaying orapki Help
I.2.3
Creating Signed Certificates for Testing Purposes
I.2.4
Managing Oracle Wallets with the orapki Utility
I.2.4.1
Creating and Viewing Oracle Wallets with orapki
I.2.4.2
Adding Certificates and Certificate Requests to Oracle Wallets with orapki
I.2.4.3
Adding an ECC Certificate to an Oracle Wallet with orapki
I.2.4.4
Exporting Certificates and Certificate Requests from Oracle Wallets with orapki
I.2.5
Managing Certificate Revocation Lists (CRLs) with orapki Utility
I.2.5.1
About Certificate Validation with Certificate Revocation Lists
I.2.5.1.1
What CRLs Should You Use?
I.2.5.1.2
How CRL Checking Works
I.2.5.2
Certificate Revocation List Management
I.2.5.2.1
Renaming CRLs with a Hash Value for Certificate Validation
I.2.5.2.2
Uploading CRLs to Oracle Internet Directory
I.2.5.2.3
Listing CRLs Stored in Oracle Internet Directory
I.2.5.2.4
Viewing CRLs in Oracle Internet Directory
I.2.5.2.5
Deleting CRLs from Oracle Internet Directory
I.2.6
orapki Utility Commands Summary
I.2.6.1
orapki cert create
I.2.6.1.1
Purpose
I.2.6.1.2
Syntax
I.2.6.2
orapki cert display
I.2.6.2.1
Purpose
I.2.6.2.2
Syntax
I.2.6.3
orapki crl create
I.2.6.3.1
Purpose
I.2.6.3.2
Syntax
I.2.6.4
orapki crl delete
I.2.6.4.1
Purpose
I.2.6.4.2
Syntax
I.2.6.5
orapki crl display
I.2.6.5.1
Purpose
I.2.6.5.2
Syntax
I.2.6.6
orapki crl hash
I.2.6.6.1
Purpose
I.2.6.6.2
Syntax
I.2.6.7
orapki crl list
I.2.6.7.1
Purpose
I.2.6.7.2
Syntax
I.2.6.8
orapki crl revoke
I.2.6.8.1
Purpose
I.2.6.8.2
Syntax
I.2.6.9
orapki crl status
I.2.6.9.1
Purpose
I.2.6.9.2
Syntax
I.2.6.10
orapki crl upload
I.2.6.10.1
Purpose
I.2.6.10.2
Syntax
I.2.6.11
orapki crl verify
I.2.6.11.1
Purpose
I.2.6.11.2
Syntax
I.2.6.12
orapki wallet add
I.2.6.12.1
Purpose
I.2.6.12.2
Syntax
I.2.6.13
orapki wallet change_pwd
I.2.6.13.1
Purpose
I.2.6.13.2
Syntax
I.2.6.14
orapki wallet create
I.2.6.14.1
Purpose
I.2.6.14.2
Syntax
I.2.6.15
orapki wallet display
I.2.6.15.1
Purpose
I.2.6.15.2
Syntax
I.2.6.16
orapki wallet export
I.2.6.16.1
Purpose
I.2.6.16.2
Syntax
I.2.6.17
orapki wallet export_trust_chain
I.2.6.17.1
Purpose
I.2.6.17.2
Syntax
I.3
Equivalent Features for Oracle Wallet Manager
I.4
Equivalent Features for orapki
I.5
Equivalent Features for the SSL Configuration Tool
J
Troubleshooting Oracle Fusion Middleware
J.1
Diagnosing Oracle Fusion Middleware Problems
J.2
Common Problems and Solutions
J.2.1
Running out of Data Source Connections
J.2.2
Using a Different Version of Spring
J.2.3
ClassNotFound Errors When Starting Managed Servers
J.3
Troubleshooting Fusion Middleware Control
J.3.1
Troubleshooting the Display of Performance Metrics and Charts in Fusion Middleware Control
J.3.1.1
What Are Agent-Monitored Targets?
J.3.1.2
Setting Monitoring Credentials for All Agent-Monitored Targets in a Farm
J.3.1.3
Changing the Monitoring Credentials for a Specific Agent-Monitored Target
J.3.1.4
Verifying or Changing the Oracle Management Agent URL
J.3.2
Securing the Connection from Fusion Middleware Control to Oracle WebLogic Server Administration Console
J.3.3
Configuring Fusion Middleware Control for Windows Native Authentication
J.4
Troubleshooting SSL
J.4.1
Components May Enable All Supported Ciphers
J.4.2
Replacement User Certificates for Oracle Wallets
J.4.3
keyUsage Extension Required for Certificates in JDK7
J.5
Need More Help?
J.5.1
Using Remote Diagnostic Agent
Index
Scripting on this page enhances content navigation, but does not change the content in any way.