3 Installation Overview

This chapter provides an overview of the entire Business Transaction Management installation procedure.

Installation Overview

  1. Installation and initial configuration of the central servers:

    1. Optional – Configure security for the central servers. You can also perform the security configuration for the monitors and observers at this time, if you wish.

      See Chapter 4, "Configuring Security."

    2. Ensure that you have a supported web browser installed.

      Web Browser Requirements.

    3. Configure the application servers that will host your central servers.

      See Setting up your WebLogic Environment or Setting up your WebSphere Environment, depending on your application server.

    4. Set up the Business Transaction Management databases.

      See Setting up Business Transaction Management Databases.

    5. Optional – Configure the persistent storage directories.

      See Configuring Persistent Storage Directories.

    6. Deploy the central servers.

      See Deploying the Central Servers.

    7. If needed, remap Business Transaction Management user roles in your application server.

      See Mapping Users to Business Transaction Management Application Roles.

    8. Perform initial configuration of Business Transaction Management.

      After deploying the central servers, you configure them using the browser-based configuration wizard (see Initial Configuration of Business Transaction Management.).

      Alternatively, you can use a command line script (see Chapter 16, "Scripted Configuration of Oracle Business Transaction Management."). For first-time configuration, however, we recommend that you use the browser-based wizard. The wizard produces an XML output file that can be used with the command line script for subsequent configurations.

  2. Installation of monitors and configuration of the Observer Communication policy (see Chapter 8, "Installing Monitors."):

    1. Optional – Configure security for the monitors if you haven't already done so.

      See Chapter 4, "Configuring Security."

    2. Deploy monitors.

    3. Configure monitor-observer communication by way of the Observer Communication policy.

  3. Installation of observers (see Chapter 9, "Installing Observers Overview"):

    1. Optional – Configure security for the observers if you haven't already done so.

      See Chapter 4, "Configuring Security."

    2. Install the observer libraries.

    3. Configure the observers to locate a monitor.