Search

Chapter 6. Next steps

download PDF

After you have installed AMQ Broker and created a standalone broker with the default configuration settings, you can configure it to meet your messaging requirements, connect messaging client applications to it, and monitor and manage it. Additional resources are available to help you complete these goals.

Configuring the broker

Use Configuring AMQ Broker to configure the broker to meet your requirements. You can configure:

  • The broker to accept client connections
  • The address space (including point-to-point and publish-subscribe messaging)
  • Message persistence
  • Broker resource consumption (including resource limits, message paging, and large message support)
  • Duplicate message detection
  • Logging
Securing the broker

Use Configuring AMQ Broker to implement any of the following methods to secure the broker:

  • Guest/anonymous access control
  • Basic user and password access control
  • Certificate-based access control
  • LDAP integration
  • Kerberos integration
Setting up clustering and high availability
Use Configuring AMQ Broker to add additional brokers to form a broker cluster and increase messaging throughput. You can also configure high availability to increase messaging reliability.
Creating messaging client applications
Use AMQ Clients Overview to learn about AMQ Clients and how it can help you to create messaging client applications that connect to the broker and produce and consume messages.
Monitoring and managing the broker
Use Managing AMQ Broker to monitor and manage your broker (or brokers) once they are running.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.