This book explains how to use the N1™ Service Provisioning System software to perform the following tasks.
Install WebLogic 8 software and configure infrastructure components
Deploy applications to WebLogic
Configure the WebLogic environment
The main audience for the Sun N1 Service Provisioning System User's Guide for BEA WebLogic 8 Plug-In 3.0 includes system administrators and operators of Sun N1 Service Provisioning System software who want to be able to incorporate BEA WebLogic 8 functionality with Sun N1 Service Provisioning System software. These users are expected to be familiar with the following:
The Sun N1 Service Provisioning System product
Standard UNIX® and Windows commands and utilities
The general concepts and management features available in the BEA WebLogic 8 product
If you are not already familiar with using the Sun N1 Service Provisioning System software, read the following books:
Sun N1 Service Provisioning System 5.2 System Administration Guide
Sun N1 Service Provisioning System 5.2 Operation and Provisioning Guide
Chapter 1, Overview of the WebLogic 8 Plug-In provides an overview of the plug-in solution.
Chapter 2, Release Notes for the WebLogic 8 Plug-In describes installation and runtime issues.
Chapter 3, Installing and Configuring the WebLogic 8 Plug-In explains how to install and configure the plug-in.
Chapter 4, Using the WebLogic 8 Plug-In explains how to capture and deploy applications and files through the plug-in and describes the specific component types that are provided with the plug-in.
Third-party URLs are referenced in this document and provide additional, related information.
The BEA WebLogic 8 product documentation can be found at http://e-docs.bea.com/platform/docs81/.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |