We help you to create beautiful home
Java World
Tuesday, April 2, 2019
Thursday, September 22, 2016
Migrating Weblogic Application to Jboss Application
Main objective of this article is to high light the check points when an application deployed in Web logic Server to be migrated to JBoss EAP.
- Identify the server architecture (Nodes,Core,Clustering,Load Balancing)
- Identify the components/frameworks,shared libraries and third party libraries used in the application
- Identify the resources (JNDI,Databases,JMS, external interfaces)
- Identify any proprietary API usage such as Weblogic JMS, Weblogic Servlet etc
Here are the list of areas which needs special attention during the migration
- JMS implementation which uses Weblogic APIs
- Custom Mbeans
- Oracle APIs
- WebLogic JNDI
- WebLogic EJB
- WebLogic Webservice
- WebLogic Security
- WebLogic Servlet annotations
- Bea APIs
- WebLogic Logging API
- WebLogic MDB
- Resource adapter
- WebLogic JSP tag
- WebLogic Transaction Manager
- WebLogic Application lifecycle events usage
- WebLogic EJB Startup annotation
- WebLogic Protocol
- WebLogic JNDI
- WebLogic Singleton Services
- WebLogic security
- Oracle web cache
- Deployment Descriptors
- weblogicejbjar.xml
- ejbjar.xml
- ejbappjms.xml
- weblogic.xml
- weblogicapplication.xml
- weblogicweb.xml
- Weblogic webservice Configurations
- webservice.xml
- weblogicwebservices.xml
- WebLogic datasource Configurations
- WebLogic XA configuration
- weblogiccmprdbmsjar.xml
Apart from this we also need to consider compatibility of third party APIs or frameworks on the target servers such as
- Struts 1.x API/Config
- Spring 2x
- Hibernate 2x
- Hibernate 3.x
- Java 1.4 API
Note : Hibernate 2x and 3x has reported issues on Jboss EAP 7.0
Identifying and re mediating above scenarios and uses case would be mammoth task if there are large number of application, and organisation would often refrain from migration seeing the risk. There are couple of discovery and remediation tools available which mainly helps to identify this vulnerabilities and even to automatically transform the source and configuration which eventually mitigate the risk of migrating.
In the coming blog I would explain more on discovery pattern and using tools
Identifying and re mediating above scenarios and uses case would be mammoth task if there are large number of application, and organisation would often refrain from migration seeing the risk. There are couple of discovery and remediation tools available which mainly helps to identify this vulnerabilities and even to automatically transform the source and configuration which eventually mitigate the risk of migrating.
In the coming blog I would explain more on discovery pattern and using tools
Wednesday, October 23, 2013
Database As Service
I am developing a tool to make any database exposed as a service. Idea is to publish a dynamic service to expose CRUD operation on all/specific tables, which enables user to perform the
operation though web service call. Web service artificats will be generated at run time by just pointing the database, and the tool will identify all the tables and its meta data to create required java classes at and deploy As A Service.
More details to be followed
Monday, March 4, 2013
build own java cache
http://javalandscape.blogspot.in/2009/01/cachingcaching-algorithms-and-caching.html
Good example on volatile usage
http://javarevisited.blogspot.in/2011/06/volatile-keyword-java-example-tutorial.html
Thursday, October 18, 2012
Tuesday, March 22, 2011
Subscribe to:
Posts (Atom)