Book description
This IBM® Redbooks® publication focuses on operational and managerial aspects for DataPower® appliance deployments.
DataPower appliances provide functionality that crosses both functional and organizational boundaries, which introduces unique management and operational challenges. For example, a DataPower appliance can provide network functionality, such as load balancing, and at the same time, provide enterprise service bus (ESB) capabilities, such as transformation and intelligent content-based routing.
This IBM Redbooks publication provides guidance at both a general and technical level for individuals who are responsible for planning, installation, development, and deployment. It is not intended to be a "how-to" guide, but rather to help educate you about the various options and methodologies that apply to DataPower appliances. In addition, many chapters provide a list of suggestions.
Table of contents
- Front cover
- Contact an IBM Software Services Sales Specialist
- Notices
- Preface
- Chapter 1. Securing user access
-
Chapter 2. Networking
- 2.1 Overview
- 2.2 Benefits
-
2.3 Usage
- 2.3.1 Network interface configuration and routing
- 2.3.2 VLAN sub-interfaces
- 2.3.3 Network settings
- 2.3.4 Host alias, static hosts, and domain name system
- 2.3.5 Routing
- 2.3.6 Load balancing a back-end destination
- 2.3.7 Intelligent Load Distribution
- 2.3.8 Self-Balancing services
- 2.3.9 Load balancer health checking
- 2.3.10 Standby Control and high availability
-
2.4 Preferred practices
- 2.4.1 Avoid using 0.0.0.0 as a listener
- 2.4.2 Separating management traffic
- 2.4.3 Specify port values less than 10,000
- 2.4.4 Persistent timeout consideration
- 2.4.5 Disable chained persistent connections
- 2.4.6 Configure network settings to be portable
- 2.4.7 Multiple default gateways will create multiple default routes
- 2.4.8 Standby Control preferred practices
- 2.4.9 Management interface and default route
- 2.4.10 Enabling “No Delay Ack†to avoid latency with other systems
- 2.4.11 Streaming large messages and flow control
-
2.5 Examples
- 2.5.1 Externalizing endpoints in a metadata document
- 2.5.2 Disabling chained persistent connections for points of a service
- 2.5.3 Port speed mismatch
- 2.5.4 Sample DNS workaround using static host
- 2.5.5 Sample CLI commands to capture DNS server responses
- 2.5.6 Verifying that Rapid Spanning Tree deployed properly for DataPower Standby Control
- 2.5.7 Example of deleting routes
- 2.5.8 Sample XSLT for adding DataPower transaction ID to an HTTP header for outgoing traffic
- Chapter 3. Domains
- Chapter 4. Simple Network Management Protocol monitoring
-
Chapter 5. IBM Tivoli Monitoring
- 5.1 IBM Tivoli Monitoring environment architecture
- 5.2 Monitoring DataPower appliances
- 5.3 Tivoli Composite Application Manager for SOA architecture
- 5.4 Monitoring DataPower service objects
- 5.5 Tivoli Composite Application Manager for SOA deployment scenarios
- 5.6 IBM Tivoli Composite Application Manager for SOA and DataPower’s built-in SLM
-
Chapter 6. Logging
- 6.1 Overview
- 6.2 Benefits
- 6.3 Usage
- 6.4 Event logging
- 6.5 Transaction logging
- 6.6 Usage considerations
-
6.7 Preferred practices
- 6.7.1 Set log priority levels higher in production environments
- 6.7.2 Use the default domain for device-wide logging
- 6.7.3 Suppress repeated log messages
- 6.7.4 Employ a load balancer for critical log targets
- 6.7.5 Select the appropriate syslog server
- 6.7.6 Test production logging capacity before deployment
- 6.7.7 Plan for confidentiality
- 6.7.8 Manage multiple-log target feedback loops
- Chapter 7. B2B configuration and administration
- Chapter 8. Development life cycle
- Chapter 9. Configuration management and deployment
-
Chapter 10. Appliance management and automation
- 10.1 Task automation
- 10.2 Security considerations for automation
- 10.3 XML management interface
- 10.4 WebSphere Appliance Management Toolkit API
- 10.5 Command-line interface automation
- 10.6 WebSphere Application Server Network Deployment Appliance Manager Version 7
- 10.7 IBM WebSphere Appliance Management Center
- 10.8 Summary
- Appendix A. Custom Role-Based Management authentication and credential mapping
- Appendix B. Additional material
- Related publications
- Back cover
Product information
- Title: DataPower SOA Appliance Administration, Deployment, and Best Practices
- Author(s):
- Release date: June 2011
- Publisher(s): IBM Redbooks
- ISBN: 9780738435701
You might also like
book
DataPower SOA Appliance Service Planning, Implementation, and Best Practices
This IBM® Redbooks® publication will help you to better understand the effective use of the WebSphere® …
book
SOA Policy, Service Gateway, and SLA Management
This IBM® Redbooks® publication teaches you how to automate your runtime policy by using a centralized …
book
Set Up Security and Integration with the DataPower XI50z for zEnterprise
This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that …
book
IBM WebSphere Application Server 8.0 Administration Guide
With your C++ skills and our writers’ know-how, you’re well on your way to using the …