Using JBoss EAP XP 5.0
For Use with JBoss EAP XP 5.0
Abstract
Making open source more inclusive Copy linkLink copied to clipboard!
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Providing feedback on JBoss EAP documentation Copy linkLink copied to clipboard!
To report an error or to improve our documentation, log in to your Red Hat Jira account and submit an issue. If you do not have a Red Hat Jira account, then you will be prompted to create an account.
Procedure
- Click the following link to create a ticket.
- Enter a brief description of the issue in the Summary.
- Provide a detailed description of the issue or enhancement in the Description. Include a URL to where the issue occurs in the documentation.
- Clicking Submit creates and routes the issue to the appropriate documentation team.
Chapter 1. JBoss EAP XP for the latest MicroProfile capabilities Copy linkLink copied to clipboard!
1.1. Installing JBoss EAP XP 5.0 without a pre-existing JBoss EAP 8.0 server Copy linkLink copied to clipboard!
If you want to install JBoss EAP XP 5.0 without first pre-installing JBoss EAP 8.0 server, follow the procedure below.
Prerequisites
- You have access to the internet.
- You have created an account on the Red Hat customer portal and are logged in.
-
You have downloaded the
jboss-eap-installation-manager.
Use jboss-eap-installation-manager from Update 02 or later. Download the correct version from the JBoss EAP 8.0 patches page on the Red Hat Customer Portal, or update an existing installation by running the following command:
./bin/jboss-eap-installation-manager.sh update perform --self
./bin/jboss-eap-installation-manager.sh update perform --self
Verify the version of your installation manager by running the following command:
./bin/jboss-eap-installation-manager.sh --version
./bin/jboss-eap-installation-manager.sh --version
Procedure
-
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory. Install JBoss EAP XP by running the following command from the
jboss-eap-installation-managerdirectory :./bin/jboss-eap-installation-manager.sh install --profile eap-xp-5.0 --dir eap-xp-5
./bin/jboss-eap-installation-manager.sh install --profile eap-xp-5.0 --dir eap-xp-5Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2. Adding JBoss EAP XP 5.0 feature packs to an existing JBoss EAP 8.0 installation Copy linkLink copied to clipboard!
You can add an additional JBoss EAP XP 5.0 feature pack to an existing JBoss EAP installation using the jboss-eap-installation-manager.
Prerequisites
- You have an account on the Red Hat Customer Portal and are logged in.
- You have reviewed the supported configurations for JBoss EAP XP 5.0.
- You have installed a supported JDK.
-
You have downloaded the
jboss-eap-installation-manager. For more information about downloadingjboss-eap-installation-manager, see the Installation Guide. - You have downloaded or installed JBoss EAP 8.0 using one of the supported methods. For more information about downloading JBoss EAP, see the Installation Guide.
Installing the JBoss EAP XP extension will automatically perform a server update to receive the latest component updates.
Procedure
-
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory. Run this script from the
jboss-eap-installation-managerdirectory to subscribe the server to the JBoss EAP XP channel by executing:./bin/jboss-eap-installation-manager.sh channel add \ --channel-name eap-xp-5.0 \ --repositories=mrrc-ga::https://maven.repository.redhat.com/ga \ --manifest org.jboss.eap.channels:eap-xp-5.0 \ --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh channel add \ --channel-name eap-xp-5.0 \ --repositories=mrrc-ga::https://maven.repository.redhat.com/ga \ --manifest org.jboss.eap.channels:eap-xp-5.0 \ --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow Install JBoss EAP XP extension by executing:
./bin/jboss-eap-installation-manager.sh feature-pack add \ --fpl org.jboss.eap.xp:wildfly-galleon-pack \ --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh feature-pack add \ --fpl org.jboss.eap.xp:wildfly-galleon-pack \ --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.3. Adding JBoss EAP XP 5.0 feature packs to an existing JBoss EAP 8.0 installation offline Copy linkLink copied to clipboard!
You can add additional JBoss EAP XP 5.0 feature pack to an existing JBoss EAP installation offline using the jboss-eap-installation-manager.
Prerequisites
- You have reviewed the supported configurations for JBoss EAP XP 5.0.
- You have installed a supported JDK.
-
You have downloaded the
jboss-eap-installation-manager. For more information about downloadingjboss-eap-installation-manager, see the Installation Guide. - You have downloaded or installed JBoss EAP 8.0 using one of the supported methods. For more information about downloading JBoss EAP, see the Installation Guide.
- You have downloaded and extracted the latest offline repositories for JBoss EAP 8.0 and JBoss EAP XP 5.0.
Procedure
-
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory. -
Run this script from the
jboss-eap-installation-managerdirectory to subscribe the server to the JBoss EAP XP channel by executing:
./bin/jboss-eap-installation-manager.sh channel add \ --channel-name eap-xp-5.0 \ --repositories=mrrc-ga::https://maven.repository.redhat.com/ga \ --manifest org.jboss.eap.channels:eap-xp-5.0 \ --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh channel add \
--channel-name eap-xp-5.0 \
--repositories=mrrc-ga::https://maven.repository.redhat.com/ga \
--manifest org.jboss.eap.channels:eap-xp-5.0 \
--dir eap-xp-5.0
-
Install JBoss EAP XP and use the
--repositories parameterto specify the offline repositories:
./bin/jboss-eap-installation-manager.sh feature-pack add \ --fpl org.jboss.eap.xp:wildfly-galleon-pack \ --dir eap-xp-5.0 \ --repositories <JBOSS_EAP_XP_OFFLINE_REPO_PATH>,<JBOSS_EAP_8.0_OFFLINE_REPO_PATH>
./bin/jboss-eap-installation-manager.sh feature-pack add \
--fpl org.jboss.eap.xp:wildfly-galleon-pack \
--dir eap-xp-5.0 \
--repositories <JBOSS_EAP_XP_OFFLINE_REPO_PATH>,<JBOSS_EAP_8.0_OFFLINE_REPO_PATH>
The feature pack will be added to the JBoss EAP installation passed in the --dir option.
1.4. Updating JBoss EAP XP installation using the jboss-eap-installation-manager Copy linkLink copied to clipboard!
You can update JBoss EAP XP periodically if new updates are available after you have downloaded and installed it.
Prerequisites
- You have access to the internet.
- You have installed a supported JDK.
-
You have downloaded the
jboss-eap-installation-manager. For more information about downloadingjboss-eap-installation-manager, see the Installation Guide. - You have downloaded or installed JBoss EAP 8.0 using one of the supported methods. For more information about downloading JBoss EAP, see the Installation Guide.
Procedure
-
Extract the
jboss-eap-installation-manageryou have downloaded. -
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory you have extracted. Run this script from the
jboss-eap-installation-managerdirectory to check for available updates:./bin/jboss-eap-installation-manager.sh update list --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh update list --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow Update JBoss EAP by running the following command:
Syntax
./bin/jboss-eap-installation-manager.sh update perform --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh update perform --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
./bin/jboss-eap-installation-manager.sh update perform --dir eap-xp-5.0 Updates found: org.wildfly.galleon-plugins:wildfly-galleon-plugins 6.3.1.Final-redhat-00001 ==> 6.3.2.Final-redhat-00001 org.wildfly.wildfly-http-client:wildfly-http-transaction-client 2.0.1.Final-redhat-00001 ==> 2.0.2.Final-redhat-00001
./bin/jboss-eap-installation-manager.sh update perform --dir eap-xp-5.0 Updates found: org.wildfly.galleon-plugins:wildfly-galleon-plugins 6.3.1.Final-redhat-00001 ==> 6.3.2.Final-redhat-00001 org.wildfly.wildfly-http-client:wildfly-http-transaction-client 2.0.1.Final-redhat-00001 ==> 2.0.2.Final-redhat-00001Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.5. Updating JBoss EAP XP installation offline using the jboss-eap-installation-manager Copy linkLink copied to clipboard!
You can use the jboss-eap-installation-manager to update the JBoss EAP XP 5.0 installation offline.
Prerequisites
- You have installed a supported JDK.
-
You have downloaded the
jboss-eap-installation-manager. For more information about downloadingjboss-eap-installation-manager, see the Installation Guide. - You have downloaded or installed JBoss EAP 8.0 using one of the supported methods. For more information about downloading JBoss EAP, see the Installation Guide.
- You have downloaded and extracted the latest offline repositories for JBoss EAP 8.0 and JBoss EAP XP 5.0.
Procedure
- Stop the JBoss EAP server.
-
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory. Run this script from the
jboss-eap-installation-managerdirectory to update the server components:./bin/jboss-eap-installation-manager.sh update perform \ --dir eap-xp-5.0 \ --repositories <JBOSS_EAP_XP_OFFLINE_REPO_PATH>,<FEATURE_PACK_OFFLINE_REPO>,<JBOSS_EAP_8.0_OFFLINE_REPO_PATH>
./bin/jboss-eap-installation-manager.sh update perform \ --dir eap-xp-5.0 \ --repositories <JBOSS_EAP_XP_OFFLINE_REPO_PATH>,<FEATURE_PACK_OFFLINE_REPO>,<JBOSS_EAP_8.0_OFFLINE_REPO_PATH>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Additional resources
- For more information about how you can perform a two phase update operation offline see Updating feature packs on an offline JBoss EAP server.
1.6. Reverting your JBoss EAP XP server to JBoss EAP Copy linkLink copied to clipboard!
You can use the jboss-eap-installation-manager to revert your JBoss EAP XP installation.
Prerequisites
- You have access to the internet.
- You have installed a supported JDK.
-
You have downloaded the
jboss-eap-installation-manager. For more information about downloadingjboss-eap-installation-manager, see the Installation Guide. - You have downloaded or installed JBoss EAP 8.0 using one of the supported methods. For more information about downloading JBoss EAP, see the Installation Guide.
Procedure
-
Open the terminal emulator and navigate to the
jboss-eap-installation-managerdirectory. Run this script from the
jboss-eap-installation-managerdirectory to investigate the history of all feature packs added to your JBoss EAP XP server:./bin/jboss-eap-installation-manager.sh history --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh history --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Stop the JBoss EAP XP server.
Revert your to a version before JBoss EAP XP extension has been added:
./bin/jboss-eap-installation-manager.sh revert perform \ --revision <REVISION_HASH> \ --dir eap-xp-5.0
./bin/jboss-eap-installation-manager.sh revert perform \ --revision <REVISION_HASH> \ --dir eap-xp-5.0Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Additional resources
- For more information about how you can perform a two phase revert operation see Reverting installed feature packs
Chapter 2. Understand MicroProfile Copy linkLink copied to clipboard!
2.1. MicroProfile Config Copy linkLink copied to clipboard!
2.1.1. MicroProfile Config in JBoss EAP Copy linkLink copied to clipboard!
Configuration data can change dynamically and applications need to be able to access the latest configuration information without restarting the server.
MicroProfile Config provides portable externalization of configuration data. This means, you can configure applications and microservices to run in multiple environments without modification or repackaging.
MicroProfile Config functionality is implemented in JBoss EAP using the SmallRye Config component and is provided by the microprofile-config-smallrye subsystem.
MicroProfile Config is only supported in JBoss EAP XP. It is not supported in JBoss EAP.
If you are adding your own Config implementations, you need to use the methods in the latest version of the Config interface.
Additional Resources
2.1.2. MicroProfile Config sources supported in MicroProfile Config Copy linkLink copied to clipboard!
MicroProfile Config configuration properties can come from different locations and can be in different formats. These properties are provided by ConfigSources. ConfigSources are implementations of the org.eclipse.microprofile.config.spi.ConfigSource interface.
The MicroProfile Config specification provides the following default ConfigSource implementations for retrieving configuration values:
-
System.getProperties(). -
System.getenv(). -
All
META-INF/microprofile-config.propertiesfiles on the class path.
The microprofile-config-smallrye subsystem supports additional types of ConfigSource resources for retrieving configuration values. You can also retrieve the configuration values from the following resources:
-
Properties in a
microprofile-config-smallrye/config-sourcemanagement resource - Files in a directory
-
ConfigSourceclass -
ConfigSourceProviderclass
Additional Resources
2.2. MicroProfile Fault Tolerance Copy linkLink copied to clipboard!
2.2.1. About MicroProfile Fault Tolerance specification Copy linkLink copied to clipboard!
The MicroProfile Fault Tolerance specification defines strategies to deal with errors inherent in distributed microservices.
The MicroProfile Fault Tolerance specification defines the following strategies to handle errors:
- Timeout
- Define the amount of time within which an execution must finish. Defining a timeout prevents waiting for an execution indefinitely.
- Retry
- Define the criteria for retrying a failed execution.
- Fallback
- Provide an alternative in the case of a failed execution.
- CircuitBreaker
- Define the number of failed execution attempts before temporarily stopping. You can define the length of the delay before resuming execution.
- Bulkhead
- Isolate failures in part of the system so that the rest of the system can still function.
- Asynchronous
- Execute client request in a separate thread.
Additional Resources
2.2.2. MicroProfile Fault Tolerance in JBoss EAP Copy linkLink copied to clipboard!
The microprofile-fault-tolerance-smallrye subsystem provides support for MicroProfile Fault Tolerance in JBoss EAP. The subsystem is available only in the JBoss EAP XP stream.
The microprofile-fault-tolerance-smallrye subsystem provides the following annotations for interceptor bindings:
-
@Timeout -
@Retry -
@Fallback -
@CircuitBreaker -
@Bulkhead -
@Asynchronous
You can bind these annotations at the class level or at the method level. An annotation bound to a class applies to all of the business methods of that class.
The following rules apply to binding interceptors:
If a component class declares or inherits a class-level interceptor binding, the following restrictions apply:
- The class must not be declared final.
- The class must not contain any static, private, or final methods.
- If a non-static, non-private method of a component class declares a method level interceptor binding, neither the method nor the component class may be declared final.
Fault tolerance operations have the following restrictions:
- Fault tolerance interceptor bindings must be applied to a bean class or bean class method.
- When invoked, the invocation must be the business method invocation as defined in the Jakarta Contexts and Dependency Injection specification.
An operation is not considered fault tolerant if both of the following conditions are true:
- The method itself is not bound to any fault tolerance interceptor.
- The class containing the method is not bound to any fault tolerance interceptor.
The microprofile-fault-tolerance-smallrye subsystem provides the following configuration options, in addition to the configuration options provided by MicroProfile Fault Tolerance:
-
io.smallrye.faulttolerance.mainThreadPoolSize -
io.smallrye.faulttolerance.mainThreadPoolQueueSize
Additional Resources
2.3. MicroProfile Health Copy linkLink copied to clipboard!
2.3.1. MicroProfile Health in JBoss EAP Copy linkLink copied to clipboard!
JBoss EAP includes the SmallRye Health component, which you can use to determine whether the JBoss EAP instance is responding as expected. This capability is enabled by default.
MicroProfile Health is only available when running JBoss EAP as a standalone server.
The MicroProfile Health specification defines the following health checks:
- Readiness
-
Determines whether an application is ready to process requests. The annotation
@Readinessprovides this health check. - Liveness
-
Determines whether an application is running. The annotation
@Livenessprovides this health check. - Startup
-
Determines whether an application has already started. The annotation
@Startupprovides this health check.
The @Health annotation was removed in MicroProfile Health 3.0.
MicroProfile Health 3.1 includes a new Startup health check probe.
For more information about the changes in MicroProfile Health 3.1, see Release Notes for MicroProfile Health 3.1.
The :empty-readiness-checks-status, :empty-liveness-checks-status, and :empty-startup-checks-status management attributes specify the global status when no readiness, liveness, or startup probes are defined.
2.4. MicroProfile JWT Copy linkLink copied to clipboard!
2.4.1. MicroProfile JWT integration in JBoss EAP Copy linkLink copied to clipboard!
The subsystem microprofile-jwt-smallrye provides MicroProfile JWT integration in JBoss EAP.
The following functionalities are provided by the microprofile-jwt-smallrye subsystem:
- Detecting deployments that use MicroProfile JWT security.
- Activating support for MicroProfile JWT.
The subsystem contains no configurable attributes or resources.
In addition to the microprofile-jwt-smallrye subsystem, the org.eclipse.microprofile.jwt.auth.api module provides MicroProfile JWT integration in JBoss EAP.
Additional Resources
2.4.2. Differences between a traditional deployment and an MicroProfile JWT deployment Copy linkLink copied to clipboard!
MicroProfile JWT deployments do not depend on managed SecurityDomain resources like traditional JBoss EAP deployments. Instead, a virtual SecurityDomain is created and used across the MicroProfile JWT deployment.
As the MicroProfile JWT deployment is configured entirely within the MicroProfile Config properties and the microprofile-jwt-smallrye subsystem, the virtual SecurityDomain does not need any other managed configuration for the deployment.
2.4.3. MicroProfile JWT activation in JBoss EAP Copy linkLink copied to clipboard!
MicroProfile JWT is activated for applications based on the presence of an auth-method in the application.
The MicroProfile JWT integration is activated for an application in the following way:
-
As part of the deployment process, JBoss EAP scans the application archive for the presence of an
auth-method. -
If an
auth-methodis present and defined asMP-JWT, the MicroProfile JWT integration is activated.
The auth-method can be specified in either or both of the following files:
-
the file containing the class that extends
javax.ws.rs.core.Application, annotated with the@LoginConfig -
the
web.xmlconfiguration file
If auth-method is defined both in a class, using annotation, and in the web.xml configuration file, the definition in web.xml configuration file is used.
2.4.4. Limitations of MicroProfile JWT in JBoss EAP Copy linkLink copied to clipboard!
The MicroProfile JWT implementation in JBoss EAP has certain limitations.
The following limitations of MicroProfile JWT implementation exist in JBoss EAP:
-
The MicroProfile JWT implementation parses only the first key from the JSON Web Key Set (JWKS) supplied in the
mp.jwt.verify.publickeyproperty. Therefore, if a token claims to be signed by the second key or any key after the second key, the token fails verification and the request containing the token is not authorized. - Base64 encoding of JWKS is not supported.
In both cases, a clear text JWKS can be referenced instead of using the mp.jwt.verify.publickey.location config property.
2.5. MicroProfile OpenAPI Copy linkLink copied to clipboard!
2.5.1. MicroProfile OpenAPI in JBoss EAP Copy linkLink copied to clipboard!
MicroProfile OpenAPI is integrated in JBoss EAP using the microprofile-openapi-smallrye subsystem.
The MicroProfile OpenAPI specification defines an HTTP endpoint that serves an OpenAPI 3.0 document. The OpenAPI 3.0 document describes the REST services for the host. The OpenAPI endpoint is registered using the configured path, for example http://localhost:8080/openapi, local to the root of the host associated with a deployment.
Currently, the OpenAPI endpoint for a virtual host can only document a single deployment. To use OpenAPI with multiple deployments registered with different context paths on the same virtual host, each deployment must use a distinct endpoint path.
The OpenAPI endpoint returns a YAML document by default. You can also request a JSON document using an Accept HTTP header, or a format query parameter.
If the Undertow server or host of a given application defines an HTTPS listener then the OpenAPI document is also available using HTTPS. For example, an endpoint for HTTPS is https://localhost:8443/openapi.
2.6. MicroProfile Telemetry Copy linkLink copied to clipboard!
2.6.1. MicroProfile Telemetry in JBoss EAP Copy linkLink copied to clipboard!
MicroProfile Telemetry provides tracing functionality for applications based on OpenTelemetry. The ability to trace requests across service boundaries is important, especially in a microservices environment where a request can flow through multiple services during its life cycle.
MicroProfile Telemetry expands on the OpenTelemetry subsystem and adds support for MicroProfile Config. This allows users to configure OpenTelemetry using MicroProfile Config.
There are no configurable resources or attributes in the MicroProfile Telemetry subsystem.
2.7. MicroProfile REST Client Copy linkLink copied to clipboard!
2.7.1. MicroProfile REST client Copy linkLink copied to clipboard!
JBoss EAP XP 5.0.0 supports the MicroProfile REST client 2.0 that builds on Jakarta RESTful Web Services 2.1.6 client APIs to provide a type-safe approach to invoke RESTful services over HTTP. The MicroProfile Type Safe REST clients are defined as Java interfaces. With the MicroProfile REST clients, you can write client applications with executable code.
Use the MicroProfile REST client to avail the following capabilities:
- An intuitive syntax
- Programmatic registration of providers
- Declarative registration of providers
- Declarative specification of headers
- Propagation of headers on the server
-
ResponseExceptionMapper - Jakarta Contexts and Dependency Injection integration
- Access to server-sent events (SSE)
2.7.2. The resteasy.original.webapplicationexception.behavior MicroProfile Config property Copy linkLink copied to clipboard!
MicroProfile Config is the name of a specification that developers can use to configure applications and microservices to run in multiple environments without having to modify or repackage those apps. Previously, MicroProfile Config was available for JBoss EAP as a technology preview, but it has since been removed. MicroProfile Config is now available only on JBoss EAP XP.
Defining the resteasy.original.webapplicationexception.behavior MicroProfile Config property
You can set the resteasy.original.webapplicationexception.behavior parameter as either a web.xml servlet property or a system property. Here’s an example of one such servlet property in web.xml:
<context-param>
<param-name>resteasy.original.webapplicationexception.behavior</param-name>
<param-value>true</param-value>
</context-param>
<context-param>
<param-name>resteasy.original.webapplicationexception.behavior</param-name>
<param-value>true</param-value>
</context-param>
You can also use MicroProfile Config to configure any other RESTEasy property.
2.8. MicroProfile Reactive Messaging Copy linkLink copied to clipboard!
2.8.1. MicroProfile Reactive Messaging Copy linkLink copied to clipboard!
When you upgrade to JBoss EAP XP 5.0.0, you can enable the newest version of MicroProfile Reactive Messaging, which includes reactive messaging extensions and subsystems.
A "reactive stream" is a succession of event data, along with processing protocols and standards, that is pushed across an asynchronous boundary (like a scheduler) without any buffering. An "event" might be a scheduled and repeating temperature check in a weather app, for example. The primary benefit of reactive streams is the seamless interoperability of your various applications and implementations.
Reactive messaging provides a framework for building event-driven, data-streaming, and event-sourcing applications. Reactive messaging results in the constant and smooth exchange of event data, the reactive stream, from one app to another. You can use MicroProfile Reactive Messaging for asynchronous messaging through reactive streams so that your application can interact with others, like Apache Kafka, for example.
After you upgrade your instance of MicroProfile Reactive Messaging to the latest version, you can do the following:
- Provision a server with MicroProfile Reactive Messaging for the Apache Kafka data-streaming platform.
- Interact with reactive messaging in-memory and backed by Apache Kafka topics through the latest reactive messaging APIs.
- Use any metric system available to determine the number of messages streamed on a given channel.
2.8.2. MicroProfile Reactive Messaging connectors Copy linkLink copied to clipboard!
You can use connectors to integrate MicroProfile Reactive Messaging with a number of external messaging systems. MicroProfile for JBoss EAP comes with an Apache Kafka connector, and an Advanced Message Queuing Protocol (AMQP) connector. Use the Eclipse MicroProfile Config specification to configure your connectors.
MicroProfile Reactive Messaging connectors and incorporated layers
MicroProfile Reactive Messaging includes the following connectors:
Kafka connector
The
microprofile-reactive-messaging-kafkalayer incorporates the Kafka connector.AMQP connector
The
microprofile-reactive-messaging-amqplayer incorporates the AMQP connector.
Both the connector layers include the microprofile-reactive-messaging Galleon layer. The microprofile-reactive-messaging layer provides the core MicroProfile Reactive Messaging functionality.
| Layer | Definition |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
2.8.3. The Apache Kafka event streaming platform Copy linkLink copied to clipboard!
Apache Kafka is an open source distributed event (data) streaming platform that can publish, subscribe to, store, and process streams of records in real time. It handles event streams from multiple sources and delivers them to multiple consumers, moving large amounts of data from points A to Z and everywhere else, all at the same time. MicroProfile Reactive Messaging uses Apache Kafka to deliver these event records in as few as two microseconds, store them safely in distributed, fault-tolerant clusters, all while making them available across any team-defined zones or geographic regions.
Chapter 3. Administer MicroProfile in JBoss EAP Copy linkLink copied to clipboard!
3.1. MicroProfile Telemetry administration Copy linkLink copied to clipboard!
3.1.1. Add MicroProfile Telemetry subsystem using the management CLI Copy linkLink copied to clipboard!
The MicroProfile Telemetry component is integrated into the default MicroProfile configuration through the microprofile-telemetry subsystem. You can also add the MicroProfile Telemetry subsystem using the management CLI if the subsystem is not included.
Prerequisites
- The OpenTelemetry subsystem must be added to the configuration before adding the MicroProfile Telemetry subsystem. The MicroProfile Telemetry subsystem depends on the OpenTelemetry subsystem.
Procedure
- Open your terminal.
Run the following command:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.1.2. Enable MicroProfile Telemetry subsystem Copy linkLink copied to clipboard!
MicroProfile Telemetry is disabled by default and must be enabled on a per-application basis.
Prerequisites
- The MicroProfile Telemetry subsystem has been added to the configuration.
- The OpenTelemetry subsystem has been added to the configuration.
Procedure
-
Open your
microprofile-config.propertiesfile. Set the
otel.sdk.disabledproperty tofalse:otel.sdk.disabled=false
otel.sdk.disabled=falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow
3.1.3. Override server configuration using MicroProfile Config Copy linkLink copied to clipboard!
You can override server configuration for individual applications in the MicroProfile Telemetry subsystem using MicroProfile Config.
For example, the service name used in exported traces by default is the same as the deployment archive. If the deployment archive is set to my-application-1.0.war, the service name will be the same. To override this configuration, you can change the value of the otel.service.name property in your configuration file:
otel.service.name=My Application
otel.service.name=My Application
3.2. MicroProfile Config configuration Copy linkLink copied to clipboard!
3.2.1. Adding properties in a ConfigSource management resource Copy linkLink copied to clipboard!
You can store properties directly in a config-source subsystem as a management resource.
Procedure
Create a ConfigSource and add a property:
/subsystem=microprofile-config-smallrye/config-source=props:add(properties={"name" = "jim"})/subsystem=microprofile-config-smallrye/config-source=props:add(properties={"name" = "jim"})Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.2.2. Configuring directories as ConfigSources Copy linkLink copied to clipboard!
When a property is stored in a directory as a file, the file-name is the name of a property and the file content is the value of the property.
Procedure
Create a directory where you want to store the files:
mkdir -p ~/config/prop-files/
$ mkdir -p ~/config/prop-files/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Navigate to the directory:
cd ~/config/prop-files/
$ cd ~/config/prop-files/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a file
nameto store the value for the propertyname:touch name
$ touch nameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add the value of the property to the file:
echo "jim" > name
$ echo "jim" > nameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a ConfigSource in which the file name is the property and the file contents the value of the property:
/subsystem=microprofile-config-smallrye/config-source=file-props:add(dir={path=~/config/prop-files})/subsystem=microprofile-config-smallrye/config-source=file-props:add(dir={path=~/config/prop-files})Copy to Clipboard Copied! Toggle word wrap Toggle overflow This results in the following XML configuration:
<subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source name="file-props"> <dir path="/etc/config/prop-files"/> </config-source> </subsystem><subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source name="file-props"> <dir path="/etc/config/prop-files"/> </config-source> </subsystem>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.2.3. Configuring root directories as ConfigSources Copy linkLink copied to clipboard!
You can define a directory as a root directory for multiple MicroProfile ConfigSource directories using the root attribute.
The nested root attribute is part of the dir complex attribute for the /subsystem=microprofile-config-smallrye/config-source=* resource. This eliminates the need to specify multiple ConfigSource directories if they share the same root directory.
Any files directly within the root directory are ignored. They will not be used for configuration. Top-level directories are treated as ConfigSources. Any nested directories will also be ignored.
ConfigSources for top-level directories are assigned the ordinal of the /subsystem=microprofile-config-smallrye/config-source=* resource by default.
If the top-level directory contains a config_ordinal file, the value specified in the file will override the default ordinal value. If two top-level directories with the same ordinal contain the same entry, the names of the directories are sorted alphabetically and the first directory is used.
Prerequisites
-
You have installed the MicroProfile Config extension and enabled the
microprofile-config-smallryesubsystem.
Procedure
- Open your terminal.
Create a directory where you want to store your files:
mkdir -p ~/etc/config/prop-files/
mkdir -p ~/etc/config/prop-files/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Navigate to the directory that you created:
cd ~/etc/config/prop-files/
cd ~/etc/config/prop-files/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a file
nameto store the value for the propertyname:touch name
touch nameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add the value of the property to the file:
echo "jim" > name
echo "jim" > nameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the following command in the CLI to create a ConfigSource in which the filename is the property and the file contains the value of the property:
/subsystem=microprofile-config-smallrye/config-source=prop-files:add(dir={path=/etc/config, root=true})/subsystem=microprofile-config-smallrye/config-source=prop-files:add(dir={path=/etc/config, root=true})Copy to Clipboard Copied! Toggle word wrap Toggle overflow This results in the XML configuration:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.2.4. Obtaining ConfigSource from a ConfigSource class Copy linkLink copied to clipboard!
You can create and configure a custom org.eclipse.microprofile.config.spi.ConfigSource implementation class to provide a source for the configuration values.
Procedure
The following management CLI command creates a
ConfigSourcefor the implementation class namedorg.example.MyConfigSourcethat is provided by a JBoss module namedorg.example.If you want to use a
ConfigSourcefrom theorg.examplemodule, add the<module name="org.eclipse.microprofile.config.api"/>dependency to thepath/to/org/example/main/module.xmlfile./subsystem=microprofile-config-smallrye/config-source=my-config-source:add(class={name=org.example.MyConfigSource, module=org.example})/subsystem=microprofile-config-smallrye/config-source=my-config-source:add(class={name=org.example.MyConfigSource, module=org.example})Copy to Clipboard Copied! Toggle word wrap Toggle overflow This command results in the following XML configuration for the
microprofile-config-smallryesubsystem.<subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source name="my-config-source"> <class name="org.example.MyConfigSource" module="org.example"/> </config-source> </subsystem><subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source name="my-config-source"> <class name="org.example.MyConfigSource" module="org.example"/> </config-source> </subsystem>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Properties provided by the custom org.eclipse.microprofile.config.spi.ConfigSource implementation class are available to any JBoss EAP deployment.
3.2.5. Obtaining ConfigSource configuration from a ConfigSourceProvider class Copy linkLink copied to clipboard!
You can create and configure a custom org.eclipse.microprofile.config.spi.ConfigSourceProvider implementation class that registers implementations for multiple ConfigSource instances.
Procedure
Create a
config-source-provider:/subsystem=microprofile-config-smallrye/config-source-provider=my-config-source-provider:add(class={name=org.example.MyConfigSourceProvider, module=org.example})/subsystem=microprofile-config-smallrye/config-source-provider=my-config-source-provider:add(class={name=org.example.MyConfigSourceProvider, module=org.example})Copy to Clipboard Copied! Toggle word wrap Toggle overflow The command creates a
config-source-providerfor the implementation class namedorg.example.MyConfigSourceProviderthat is provided by a JBoss Module namedorg.example.If you want to use a
config-source-providerfrom theorg.examplemodule, add the<module name="org.eclipse.microprofile.config.api"/>dependency to thepath/to/org/example/main/module.xmlfile.This command results in the following XML configuration for the
microprofile-config-smallryesubsystem:<subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source-provider name="my-config-source-provider"> <class name="org.example.MyConfigSourceProvider" module="org.example"/> </config-source-provider> </subsystem><subsystem xmlns="urn:wildfly:microprofile-config-smallrye:1.0"> <config-source-provider name="my-config-source-provider"> <class name="org.example.MyConfigSourceProvider" module="org.example"/> </config-source-provider> </subsystem>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Properties provided by the ConfigSourceProvider implementation are available to any JBoss EAP deployment.
3.3. MicroProfile Fault Tolerance configuration Copy linkLink copied to clipboard!
3.3.1. Adding the MicroProfile Fault Tolerance extension Copy linkLink copied to clipboard!
The MicroProfile Fault Tolerance extension is included in standalone-microprofile.xml and standalone-microprofile-ha.xml configurations that are provided as part of JBoss EAP XP.
The extension is not included in the standard standalone.xml configuration. To use the extension, you must manually enable it.
Prerequisites
- JBoss EAP 8.0 with JBoss EAP XP 5.0 is installed.
Procedure
Add the MicroProfile Fault Tolerance extension using the following management CLI command:
/extension=org.wildfly.extension.microprofile.fault-tolerance-smallrye:add
/extension=org.wildfly.extension.microprofile.fault-tolerance-smallrye:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
microprofile-fault-tolerance-smallryesubsystem using the following managenent command:/subsystem=microprofile-fault-tolerance-smallrye:add
/subsystem=microprofile-fault-tolerance-smallrye:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server with the following management command:
reload
reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
3.4. MicroProfile Health configuration Copy linkLink copied to clipboard!
3.4.1. Examining health using the management CLI Copy linkLink copied to clipboard!
You can check system health using the management CLI.
Procedure
Examine health:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.4.2. Examining health using the management console Copy linkLink copied to clipboard!
You can check system health using the management console.
A check runtime operation shows the health checks and the global outcome as boolean value.
Procedure
- Navigate to the Runtime tab and select the server.
- In the Monitor column, click MicroProfile Health → View.
3.4.3. Examining health using the HTTP endpoint Copy linkLink copied to clipboard!
Health check is automatically deployed to the health context on JBoss EAP, so you can obtain the current health using the HTTP endpoint.
The default address for the /health endpoint, accessible from the management interface, is http://127.0.0.1:9990/health.
Procedure
To obtain the current health of the server using the HTTP endpoint, use the following URL:.
http://<host>:<port>/health
http://<host>:<port>/healthCopy to Clipboard Copied! Toggle word wrap Toggle overflow Accessing this context displays the health check in JSON format, indicating if the server is healthy.
3.4.4. Enabling authentication for MicroProfile Health Copy linkLink copied to clipboard!
You can configure the health context to require authentication for access.
Procedure
Set the
security-enabledattribute totrueon themicroprofile-health-smallryesubsystem./subsystem=microprofile-health-smallrye:write-attribute(name=security-enabled,value=true)
/subsystem=microprofile-health-smallrye:write-attribute(name=security-enabled,value=true)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server for the changes to take effect.
reload
reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Any subsequent attempt to access the /health endpoint triggers an authentication prompt.
3.4.5. Readiness probes that determine server health and readiness Copy linkLink copied to clipboard!
JBoss EAP XP 5.0.0 supports three readiness probes to determine server health and readiness.
-
server-status- returnsUPwhen the server-state isrunning. -
boot-errors- returnsUPwhen the probe detects no boot errors. -
deployment-status- returnsUPwhen the status for all deployments isOK.
These readiness probes are enabled by default. You can disable the probes using the MicroProfile Config property mp.health.disable-default-procedures.
The following example illustrates the use of the three probes with the check operation:
3.4.6. Global status when probes are not defined Copy linkLink copied to clipboard!
The :empty-readiness-checks-status, :empty-liveness-checks-status, and :empty-startup-checks-status management attributes specify the global status when no readiness, liveness, or startup probes are defined.
These attributes allow applications to report ‘DOWN’ until their probes verify that the application is ready, live, or started up. By default, applications report ‘UP’.
The
:empty-readiness-checks-statusattribute specifies the global status forreadinessprobes if noreadinessprobes have been defined:/subsystem=microprofile-health-smallrye:read-attribute(name=empty-readiness-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_READINESS_CHECKS_STATUS:UP}" }/subsystem=microprofile-health-smallrye:read-attribute(name=empty-readiness-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_READINESS_CHECKS_STATUS:UP}" }Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
:empty-liveness-checks-statusattribute specifies the global status forlivenessprobes if nolivenessprobes have been defined:/subsystem=microprofile-health-smallrye:read-attribute(name=empty-liveness-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_LIVENESS_CHECKS_STATUS:UP}" }/subsystem=microprofile-health-smallrye:read-attribute(name=empty-liveness-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_LIVENESS_CHECKS_STATUS:UP}" }Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
:empty-startup-checks-statusattribute specifies the global status forstartupprobes if nostartupprobes have been defined:/subsystem=microprofile-health-smallrye:read-attribute(name=empty-startup-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_STARTUP_CHECKS_STATUS:UP}" }/subsystem=microprofile-health-smallrye:read-attribute(name=empty-startup-checks-status) { "outcome" => "success", "result" => expression "${env.MP_HEALTH_EMPTY_STARTUP_CHECKS_STATUS:UP}" }Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
/healthHTTP endpoint and the:checkoperation that checkreadiness,liveness, andstartupprobes also take into account these attributes.
You can also modify these attributes as shown in the following example:
3.5. MicroProfile JWT configuration Copy linkLink copied to clipboard!
3.5.1. Enabling microprofile-jwt-smallrye subsystem Copy linkLink copied to clipboard!
The MicroProfile JWT integration is provided by the microprofile-jwt-smallrye subsystem and is included in the default configuration. If the subsystem is not present in the default configuration, you can add it as follows.
Prerequisites
- JBoss EAP 8.0 with JBoss EAP XP 5.0 is installed.
Procedure
Enable the MicroProfile JWT smallrye extension in JBoss EAP:
/extension=org.wildfly.extension.microprofile.jwt-smallrye:add
/extension=org.wildfly.extension.microprofile.jwt-smallrye:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
microprofile-jwt-smallryesubsystem:/subsystem=microprofile-jwt-smallrye:add
/subsystem=microprofile-jwt-smallrye:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server:
reload
reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
The microprofile-jwt-smallrye subsystem is enabled.
3.6. MicroProfile OpenAPI administration Copy linkLink copied to clipboard!
3.6.1. Enabling MicroProfile OpenAPI Copy linkLink copied to clipboard!
The microprofile-openapi-smallrye subsystem is provided in the standalone-microprofile.xml configuration. However, JBoss EAP XP uses the standalone.xml by default. You must include the subsystem in standalone.xml to use it.
Alternatively, you can follow the procedure Updating standalone configurations with MicroProfile subsystems and extensions to update the standalone.xml configuration file.
Procedure
Enable the MicroProfile OpenAPI smallrye extension in JBoss EAP:
/extension=org.wildfly.extension.microprofile.openapi-smallrye:add()
/extension=org.wildfly.extension.microprofile.openapi-smallrye:add()Copy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
microprofile-openapi-smallryesubsystem using the following management command:/subsystem=microprofile-openapi-smallrye:add()
/subsystem=microprofile-openapi-smallrye:add()Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server.
reload
reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
The microprofile-openapi-smallrye subsystem is enabled.
3.6.2. Requesting an MicroProfile OpenAPI document using Accept HTTP header Copy linkLink copied to clipboard!
Request an MicroProfile OpenAPI document, in the JSON format, from a deployment using an Accept HTTP header.
By default, the OpenAPI endpoint returns a YAML document.
Prerequisites
- The deployment being queried is configured to return an MicroProfile OpenAPI document.
Procedure
Issue the following
curlcommand to query the/openapiendpoint of the deployment:curl -v -H'Accept: application/json' http://localhost:8080/openapi < HTTP/1.1 200 OK ... {"openapi": "3.0.1" ... }$ curl -v -H'Accept: application/json' http://localhost:8080/openapi < HTTP/1.1 200 OK ... {"openapi": "3.0.1" ... }Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace http://localhost:8080 with the URL and port of the deployment.
The Accept header indicates that the JSON document is to be returned using the
application/jsonstring.
3.6.3. Requesting an MicroProfile OpenAPI document using an HTTP parameter Copy linkLink copied to clipboard!
Request an MicroProfile OpenAPI document, in the JSON format, from a deployment using a query parameter in an HTTP request.
By default, the OpenAPI endpoint returns a YAML document.
Prerequisites
- The deployment being queried is configured to return an MicroProfile OpenAPI document.
Procedure
Issue the following
curlcommand to query the/openapiendpoint of the deployment:curl -v http://localhost:8080/openapi?format=JSON < HTTP/1.1 200 OK ...
$ curl -v http://localhost:8080/openapi?format=JSON < HTTP/1.1 200 OK ...Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace http://localhost:8080 with the URL and port of the deployment.
The HTTP parameter
format=JSONindicates that JSON document is to be returned.
3.6.4. Configuring JBoss EAP to serve a static OpenAPI document Copy linkLink copied to clipboard!
Configure JBoss EAP to serve a static OpenAPI document that describes the REST services for the host.
When JBoss EAP is configured to serve a static OpenAPI document, the static OpenAPI document is processed before any Jakarta RESTful Web Services and MicroProfile OpenAPI annotations.
In a production environment, disable annotation processing when serving a static document. Disabling annotation processing ensures that an immutable and versioned API contract is available for clients.
Procedure
Create a directory in the application source tree:
mkdir APPLICATION_ROOT/src/main/webapp/META-INF
$ mkdir APPLICATION_ROOT/src/main/webapp/META-INFCopy to Clipboard Copied! Toggle word wrap Toggle overflow APPLICATION_ROOT is the directory containing the
pom.xmlconfiguration file for the application.Query the OpenAPI endpoint, redirecting the output to a file:
curl http://localhost:8080/openapi?format=JSON > src/main/webapp/META-INF/openapi.json
$ curl http://localhost:8080/openapi?format=JSON > src/main/webapp/META-INF/openapi.jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow By default, the endpoint serves a YAML document,
format=JSONspecifies that a JSON document is returned.Configure the application to skip annotation scanning when processing the OpenAPI document model:
echo "mp.openapi.scan.disable=true" > APPLICATION_ROOT/src/main/webapp/META-INF/microprofile-config.properties
$ echo "mp.openapi.scan.disable=true" > APPLICATION_ROOT/src/main/webapp/META-INF/microprofile-config.propertiesCopy to Clipboard Copied! Toggle word wrap Toggle overflow Rebuild the application:
mvn clean install
$ mvn clean installCopy to Clipboard Copied! Toggle word wrap Toggle overflow Deploy the application again using the following management CLI commands:
Undeploy the application:
undeploy microprofile-openapi.war
undeploy microprofile-openapi.warCopy to Clipboard Copied! Toggle word wrap Toggle overflow Deploy the application:
deploy APPLICATION_ROOT/target/microprofile-openapi.war
deploy APPLICATION_ROOT/target/microprofile-openapi.warCopy to Clipboard Copied! Toggle word wrap Toggle overflow
JBoss EAP now serves a static OpenAPI document at the OpenAPI endpoint.
3.6.5. Disabling microprofile-openapi-smallrye Copy linkLink copied to clipboard!
You can disable the microprofile-openapi-smallrye subsystem in JBoss EAP XP using the management CLI.
Procedure
Disable the
microprofile-openapi-smallryesubsystem:/subsystem=microprofile-openapi-smallrye:remove()
/subsystem=microprofile-openapi-smallrye:remove()Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.7. MicroProfile Reactive Messaging administration Copy linkLink copied to clipboard!
3.7.1. Configuring the required MicroProfile reactive messaging extension and subsystem for JBoss EAP Copy linkLink copied to clipboard!
If you want to enable asynchronous reactive messaging to your instance of JBoss EAP, you must add its extension through the JBoss EAP management CLI.
Prerequisites
- You added the Reactive Streams Operators with SmallRye extension and subsystem. For more information, see MicroProfile Reactive Streams Operators Subsystem Configuration: Required Extension.
- You added the Reactive Messaging with SmallRye extension and subsystem.
Procedure
- Open the JBoss EAP management CLI.
- Enter the following code:
If you provision a server using Galleon, either on OpenShift or not, make sure you include the microprofile-reactive-messaging Galleon layer to get the core MicroProfile 2.0.1 and reactive messaging functionality, and to enable the required subsystems and extensions. Note that this configuration does not contain the JBoss EAP modules you need to enable connectors. Use the microprofile-reactive-messaging-kafka layer or the microprofile-reactive-messaging-amqp layer to enable the Kafka connector or the AMQP connector, respectively.
Verification
You have successfully added the required MicroProfile Reactive Messaging extension and subsystem for JBoss EAP if you see success in two places in the resulting code in the management CLI.
If the resulting code says reload-required, you have to reload your server configuration to completely apply all of your changes. To reload, in a standalone server CLI, enter reload.
3.8. Standalone server configuration Copy linkLink copied to clipboard!
3.8.1. Standalone server configuration files Copy linkLink copied to clipboard!
The JBoss EAP XP includes additional standalone server configuration files, standalone-microprofile.xml and standalone-microprofile-ha.xml.
Standard configuration files that are included with JBoss EAP remain unchanged. Note that JBoss EAP XP 5.0.0 does not support the use of domain.xml files or domain mode.
| Configuration File | Purpose | Included capabilities | Excluded capabilities |
|---|---|---|---|
|
| This is the default configuration that is used when you start your standalone server. | Includes information about the server, including subsystems, networking, deployments, socket bindings, and other configurable details. | Excludes subsystems necessary for messaging or high availability. |
|
| This configuration file supports applications that use MicroProfile. | Includes information about the server, including subsystems, networking, deployments, socket bindings, and other configurable details. | Excludes the following capabilities:
|
|
|
Includes default subsystems and adds the | Excludes subsystems necessary for messaging. | |
|
| This standalone file supports applications that use MicroProfile. |
Includes the | Excludes subsystems necessary for messaging. |
|
|
Includes the | ||
|
| Support for every possible subsystem. | Includes subsystems for messaging and high availability in addition to default subsystems. | |
|
| Support for the minimum subsystems necessary to use the built-in mod_cluster front-end load balancer to load balance other JBoss EAP instances. |
By default, starting JBoss EAP as a standalone server uses the standalone.xml file. To start JBoss EAP with a standalone MicroProfile configuration, use the -c argument. For example,
<EAP_HOME>/bin/standalone.sh -c=standalone-microprofile.xml
$ <EAP_HOME>/bin/standalone.sh -c=standalone-microprofile.xml
3.8.2. Updating standalone configurations with MicroProfile subsystems and extensions Copy linkLink copied to clipboard!
You can update standard standalone server configuration files with MicroProfile subsystems and extensions using the docs/examples/enable-microprofile.cli script. The enable-microprofile.cli script is intended as an example script for updating standard standalone server configuration files, not custom configurations.
The enable-microprofile.cli script modifies the existing standalone server configuration and adds the following MicroProfile subsystems and extensions if they do not exist in the standalone configuration file:
-
microprofile-config-smallrye -
microprofile-fault-tolerance-smallrye -
microprofile-health-smallrye -
microprofile-jwt-smallrye -
microprofile-openapi-smallrye
The enable-microprofile.cli script outputs a high-level description of the modifications. The configuration is secured using the elytron subsystem. The security subsystem, if present, is removed from the configuration.
Prerequisites
- JBoss EAP 8.0 with JBoss EAP XP 5.0 is installed.
Procedure
Run the following CLI script to update the default
standalone.xmlserver configuration file:<EAP_HOME>/bin/jboss-cli.sh --file=docs/examples/enable-microprofile.cli
$ <EAP_HOME>/bin/jboss-cli.sh --file=docs/examples/enable-microprofile.cliCopy to Clipboard Copied! Toggle word wrap Toggle overflow Select a standalone server configuration other than the default
standalone.xmlserver configuration file using the following command:<EAP_HOME>/bin/jboss-cli.sh --file=docs/examples/enable-microprofile.cli -Dconfig=<standalone-full.xml|standalone-ha.xml|standalone-full-ha.xml>
$ <EAP_HOME>/bin/jboss-cli.sh --file=docs/examples/enable-microprofile.cli -Dconfig=<standalone-full.xml|standalone-ha.xml|standalone-full-ha.xml>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The specified configuration file now includes MicroProfile subsystems and extensions.
Chapter 4. Develop MicroProfile applications for JBoss EAP Copy linkLink copied to clipboard!
To get started with developing applications that use MicroProfile APIs, create a Maven project and define the required dependencies. Use the JBoss EAP MicroProfile Bill of Materials (BOM) to control the versions of runtime Maven dependencies in the application Project Object Model (POM).
After you create a Maven project, refer to the JBoss EAP XP Quickstarts for information about developing applications for specific MicroProfile APIs. For more information, see JBoss EAP XP Quickstarts.
4.1. Creating a Maven project with maven-archetype-webapp Copy linkLink copied to clipboard!
Use the maven-archetype-webapp archetype to create a Maven project for building applications for JBoss EAP deployment. Maven provides different archetypes for creating projects based on templates specific to project types. The maven-archetype-webapp creates a project with the structure required to develop simple web-applications.
Prerequisites
- You have installed Maven. For more information, see Downloading Apache Maven.
Procedure
Set up a Maven project by using the
mvncommand. The command creates the directory structure for the project and thepom.xmlconfiguration file.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
groupIDuniquely identifies the project.- 2
artifactIDis the name for the generatedjararchive.- 3
archetypeGroupIDis the unique ID formaven-archetype-webapp.- 4
archetypeArtifactIdis the artifact ID formaven-archetype-webapp.- 5
InteractiveModeinstructs Maven to use the supplied parameters rather than starting in interactive mode.
- Navigate to the generated directory.
-
Open the generated
pom.xmlconfiguration file in a text editor. Remove the content inside the
<project>section of thepom.xmlconfiguration file after the<name>helloworld Maven Webapp</name>line.Ensure that the file looks like this:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The content was removed because it is not required for the application.
4.2. Defining properties in a Maven project Copy linkLink copied to clipboard!
You can define properties in a Maven pom.xml configuration file as place holders for values. Define the value for JBoss EAP XP server as a property to use the value consistently in the configuration.
Prerequisites
You have initialized a Maven project.
For more information, see Creating a Maven project with
maven-archetype-webapp.
Procedure
Define a property
<version.bom.microprofile>as the JBoss EAP XP version on which you will deploy the configured application.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.3. Defining the repositories in a Maven project Copy linkLink copied to clipboard!
Define the artifact and plug-in repositories in which Maven looks for artifacts and plug-ins to download.
Prerequisites
You have initialized a Maven project.
For more information, see Creating a Maven project with
maven-archetype-webapp.
Procedure
Define the artifacts repository.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Define the plug-ins repository.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.4. Importing the JBoss EAP MicroProfile BOM as dependency management in a Maven project Copy linkLink copied to clipboard!
Import the JBoss EAP MicroProfile Bill of Materials (BOM) to control the versions of runtime Maven dependencies. When you specify a BOM in the <dependencyManagement> section, you do not need to individually specify the versions of the Maven dependencies defined in the provided scope.
Prerequisites
You have initialized a Maven project.
For more information, see Creating a Maven project with
maven-archetype-webapp.
Procedure
Add a property for the BOM version in the properties section of the
pom.xmlconfiguration file.<properties> ... <version.bom.microprofile>5.0.0.GA-redhat-00009</version.bom.microprofile> </properties><properties> ... <version.bom.microprofile>5.0.0.GA-redhat-00009</version.bom.microprofile> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow The value defined in the property
<version.bom.microprofile>is used as the value for the BOM version.Import the JBoss EAP BOMs dependency management.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Optionally, you can import the JBoss EAP EE with Tools Bill to your project. For more information, see Importing the JBoss EAP BOMs as dependency management in a Maven project.
4.5. Importing the JBoss EAP BOMs as dependency management in a Maven project Copy linkLink copied to clipboard!
You can optionally import the JBoss EAP EE With Tools Bill of materials (BOM). The JBoss EAP BOM provides supported JBoss EAP Java EE APIs plus additional JBoss EAP API JARs and client BOMs. You only need to import this BOM if your application requires Jakarta EE APIs in addition to the Microprofile APIs.
Prerequisites
You have initialized a Maven project.
For more information, see Creating a Maven project with
maven-archetype-webapp.
Procedure
Add a property for the BOM version in the properties section of the
pom.xmlconfiguration file.<properties> .... <version.bom.ee>8.0.0.GA-redhat-00009</version.bom.ee> </properties><properties> .... <version.bom.ee>8.0.0.GA-redhat-00009</version.bom.ee> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Import the JBoss EAP BOMs dependency management.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.6. Adding plug-in management in a Maven project Copy linkLink copied to clipboard!
Add Maven plug-in management section to the pom.xml configuration file to get plug-ins required for Maven CLI commands.
Prerequisites
You have initialized a Maven project.
For more information, see Creating a Maven project with
maven-archetype-webapp.
Procedure
Define the versions for
wildfly-maven-pluginandmaven-war-plugin, in the<properties>section.<properties> ... <version.plugin.wildfly>4.2.1.Final</version.plugin.wildfly> <version.plugin.war>3.3.2</version.plugin.war> </properties><properties> ... <version.plugin.wildfly>4.2.1.Final</version.plugin.wildfly> <version.plugin.war>3.3.2</version.plugin.war> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add
<pluginManagement>in<build>section inside the<project>section.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.7. Verifying a maven project Copy linkLink copied to clipboard!
Verify that the Maven project you configured builds.
Prerequisites
You have defined Maven properties.
For more information, see Defining properties in a Maven project.
You have defined Maven repositories.
For more information, see Defining the repositories in a Maven project.
You have imported the JBoss EAP Bill of materials (BOMs) as dependency management.
For more information, see Importing the JBoss EAP MicroProfile BOM as dependency management in a Maven project.
You have added plug-in management.
For more information, see Adding plugin management in Maven project for a server hello world application.
Procedure
Install the Maven dependencies added in the
pom.xmllocally.mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow You get an output similar to the following:
... [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ ...
... [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ ...Copy to Clipboard Copied! Toggle word wrap Toggle overflow
For more information about developing applications for specific MicroProfile APIs, see JBoss EAP XP Quickstarts.
Chapter 5. Understand Micrometer integration Copy linkLink copied to clipboard!
5.1. Micrometer in JBoss EAP Copy linkLink copied to clipboard!
Micrometer integration in JBoss EAP introduces a vendor-neutral observability layer with a reusable API for registering and tracking performance metrics across applications. This extension integrates with Micrometer, allowing deployed applications to access its API and display application-specific metrics alongside the server metrics provided by the extension.
JBoss EAP uses the existing metrics subsystem. You must manually add and configure this extension.
Chapter 6. Administer Micrometer in JBoss EAP Copy linkLink copied to clipboard!
6.1. Adding Micrometer subsystem using the Management CLI Copy linkLink copied to clipboard!
The Micrometer subsystem enhances monitoring capabilities in JBoss EAP by facilitating comprehensive metrics gathering and publication. However, the org.jboss.extension.micrometer subsystem is available to all standalone configurations within the JBoss EAP distribution, but it must be added manually.
Prerequisites
- JBoss EAP 8.0 with JBoss EAP XP 5.0 is installed.
- You have access to the JBoss EAP management CLI and permissions to make configuration changes.
Procedure
- Open your terminal.
Connect to the server by running the following command:
./jboss-cli.sh --connect
./jboss-cli.sh --connectCopy to Clipboard Copied! Toggle word wrap Toggle overflow Check if the Micrometer extension is already added to the configuration by running the following command:
[standalone@localhost:9990 /] /extension=org.wildfly.extension.micrometer:read-resource
[standalone@localhost:9990 /] /extension=org.wildfly.extension.micrometer:read-resourceCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the Micrometer extension is not available, add it by running the following command:
[standalone@localhost:9990 /] /extension=org.wildfly.extension.micrometer:add
[standalone@localhost:9990 /] /extension=org.wildfly.extension.micrometer:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add the Micrometer subsystem with the required configuration. For example, specify the endpoint URL of the metrics collector by running the following command:
[standalone@localhost:9990 /] /subsystem=micrometer:add(endpoint="http://localhost:4318/v1/metrics")
[standalone@localhost:9990 /] /subsystem=micrometer:add(endpoint="http://localhost:4318/v1/metrics")Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server to apply the changes:
[standalone@localhost:9990 /] reload
[standalone@localhost:9990 /] reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
When the collector is not running or its collector endpoint is unavailable, then a warning message similar to the following is triggered:
11:28:16,581 WARNING [io.micrometer.registry.otlp.OtlpMeterRegistry] (MSC service thread 1-5) Failed to publish metrics to OTLP receiver: java.net.ConnectException: Connection refused
11:28:16,581 WARNING [io.micrometer.registry.otlp.OtlpMeterRegistry] (MSC service thread 1-5) Failed to publish metrics to OTLP receiver: java.net.ConnectException: Connection refused
By following these steps, you can add the Micrometer subsystem to your JBoss EAP server using the management CLI, enabling enhanced monitoring capabilities for your applications.
Chapter 7. Develop Micrometer application for JBoss EAP Copy linkLink copied to clipboard!
7.1. Integrating Micrometer metrics in JBoss EAP Copy linkLink copied to clipboard!
Using Micrometer, you can monitor and collect application metrics in JBoss EAP. Micrometer support provides the exposure of application metrics. The export process is PUSH-based, ensuring that metrics are sent to an OpenTelemetry Collector.
Prerequisites
- You have installed JDK 17.
- You have installed the Maven 3.6 or later version. For more information, see Downloading Apache Maven.
- You have installed Docker. For more information, see Get Docker.
- Optional: You have podman installed on your system. Use the latest podman version available on supported RHEL. For more information, see Red Hat JBoss Enterprise Application Platform 8.0 Supported Configurations.
-
The
configure-micrometer.clifile is available in the application root directory.
The example in this section, including how to use the configure-micrometer.cli file, is based on the Micrometer Quickstart.
Procedure
- Open a terminal.
Start JBoss EAP as a standalone server by using the following script:
<EAP_HOME>/bin/standalone.sh -c standalone-microprofile.xml
$ <EAP_HOME>/bin/standalone.sh -c standalone-microprofile.xmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteFor Windows server, use the
<EAP_HOME>\bin\standalone.batscript.- Open a new terminal.
- Navigate to the application root directory.
Run the following command to configure the server:
<EAP_HOME>/bin/jboss-cli.sh --connect --file=configure-micrometer.cli
$ <EAP_HOME>/bin/jboss-cli.sh --connect --file=configure-micrometer.cliCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteFor Windows server, use the
<EAP_HOME>\bin\jboss-cli.batscript.Replace <EAP_HOME> with the path to your server.
Expected output:
The batch executed successfully process-state: reload-required
The batch executed successfully process-state: reload-requiredCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reload the server with the following management command:
<EAP_HOME>/bin/jboss-cli.sh --connect --commands=reload
$ <EAP_HOME>/bin/jboss-cli.sh --connect --commands=reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a configuration file named
docker-compose.yamlwith the following content:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a configuration file named
otel-collector-config.yamlwith the following content:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Start the collector server instance by running the following command:
docker-compose up
$ docker-compose upCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteYou can also use Podman instead of Docker. If you choose Podman, then use the
$ podman-compose upcommand instead of$ docker-compose up. If Docker or Podman is not supported in your environment, then see Otel Collector documentation for guidance on installing and running the OpenTelemetry Collector.In the
RootResourceclass, see how theMeterRegistryis injected into your class to ensure proper setup before registering the meters.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Inspect the
checkIfPrime()method body to see how to use the registered meters within your application logic. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Navigate to the application root directory.
Syntax
cd <path_to_application_root>/<application_root>
$ cd <path_to_application_root>/<application_root>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example, in reference to the Micrometer Quickstart:
cd ~/quickstarts/micrometer
$ cd ~/quickstarts/micrometerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Compile and deploy the application with the following command:
mvn clean package wildfly:deploy
$ mvn clean package wildfly:deployCopy to Clipboard Copied! Toggle word wrap Toggle overflow
This deploys micrometer/target/micrometer.war to the running server.
Verification
Access the application by using a web browser or you can run the following command.
curl http://localhost:8080/micrometer/prime/13
$ curl http://localhost:8080/micrometer/prime/13Copy to Clipboard Copied! Toggle word wrap Toggle overflow Expected output:
13 is prime.
13 is prime.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 8. Build and run microservices applications on the OpenShift image for JBoss EAP XP Copy linkLink copied to clipboard!
You can build and run your microservices applications on the OpenShift image for JBoss EAP XP.
JBoss EAP XP is supported only on OpenShift 4 and later versions.
Use the following workflow to build and run a microservices application on the OpenShift image for JBoss EAP XP by using the source-to-image (S2I) process.
Default cloud-default-mp-config layer provide a standalone configuration file, which is based on the standalone-microprofile-ha.xml file. For more information about the server configuration files included in JBoss EAP XP, see the Standalone server configuration files section.
This workflow uses the microprofile-config quickstart as an example. The quickstart provides a small, specific working example that can be used as a reference for your own project. See the microprofile-config quickstart that ships with JBoss EAP XP 5.0.0 for more information.
Additional resources
- For more information about the server configuration files included in JBoss EAP XP, see Standalone server configuration files.
8.1. Preparing OpenShift for application deployment Copy linkLink copied to clipboard!
Prepare OpenShift for application deployment.
Prerequisites
You have installed an operational OpenShift instance. For more information, see the Installing and Configuring OpenShift Container Platform Clusters book on Red Hat Customer Portal.
Procedure
-
Log in to your OpenShift instance using the
oc logincommand. Create a new project in OpenShift.
A project allows a group of users to organize and manage content separately from other groups. You can create a project in OpenShift using the following command.
oc new-project PROJECT_NAME
$ oc new-project PROJECT_NAMECopy to Clipboard Copied! Toggle word wrap Toggle overflow For example, for the
microprofile-configquickstart, create a new project namedeap-demousing the following command.oc new-project eap-demo
$ oc new-project eap-demoCopy to Clipboard Copied! Toggle word wrap Toggle overflow
8.2. Building and Deploying JBoss EAP XP Application Images using S2I Copy linkLink copied to clipboard!
Follow the source-to-image (S2I) workflow to build reproducible container images for a JBoss EAP XP application. These generated container images include the application deployment and ready-to-run JBoss EAP XP servers.
The S2I workflow takes source code from a Git repository and injects it into a container that’s based on the language and framework you want to use. After the S2I workflow is completed, the src code is compiled, the application is packaged and is deployed to the JBoss EAP XP server.
Prerequisites
- You have an active Red Hat customer account.
- You have a Registry Service Account. Follow the instructions on the Red Hat Customer Portal to create an authentication token using a registry service account.
- You have downloaded the OpenShift secret YAML file, which you can use to pull images from Red Hat Ecosystem Catalog. For more information, see OpenShift Secret.
-
You used the
oc logincommand to log in to OpenShift. - You have installed Helm. For more information, see Installing Helm.
You have installed the repository for the JBoss EAP Helm charts by entering this command in the management CLI:
helm repo add jboss-eap https://jbossas.github.io/eap-charts/
$ helm repo add jboss-eap https://jbossas.github.io/eap-charts/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Procedure
Create a file named
helm.yamlusing the following YAML content:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the following command to deploy your JBoss EAP XP application on Openshift.
helm install microprofile-config -f helm.yaml jboss-eap/eap-xp5
$ helm install microprofile-config -f helm.yaml jboss-eap/eap-xp5Copy to Clipboard Copied! Toggle word wrap Toggle overflow
This procedure is very similar to Building application images using source-to-image in OpenShift. For more information about that procedure see Using JBoss EAP on OpenShift Container Platform.
Verification
Access the application using
curl.curl https://$(oc get route microprofile-config --template='{{ .spec.host }}')/config/value$ curl https://$(oc get route microprofile-config --template='{{ .spec.host }}')/config/valueCopy to Clipboard Copied! Toggle word wrap Toggle overflow You get the output
MyPropertyFileConfigValueconfirming that the application is deployed.
8.3. Completing post-deployment tasks for JBoss EAP XP source-to-image (S2I) application Copy linkLink copied to clipboard!
Depending on your application, you might need to complete some tasks after your OpenShift application has been built and deployed.
Examples of post-deployment tasks include the following:
- Exposing a service so that the application is viewable from outside of OpenShift.
- Scaling your application to a specific number of replicas.
Procedure
Get the service name of your application using the following command.
oc get service
$ oc get serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: Expose the main service as a route so you can access your application from outside of OpenShift. For example, for the
microprofile-configquickstart, use the following command to expose the required service and port.oc expose service/microprofile-config --port=8080
$ oc expose service/microprofile-config --port=8080Copy to Clipboard Copied! Toggle word wrap Toggle overflow Get the URL of the route.
oc get route
$ oc get routeCopy to Clipboard Copied! Toggle word wrap Toggle overflow Access the application in your web browser using the URL. The URL is the value of the
HOST/PORTfield from previous command’s output.NoteFor JBoss EAP XP 5.0.0 GA distribution, the Microprofile Config quickstart does not reply to HTTPS GET requests to the application’s root context. This enhancement is only available in the {JBossXPShortName101} GA distribution.
For example, to interact with the Microprofile Config application, the URL might be
http://HOST_PORT_Value/config/valuein your browser.If your application does not use the JBoss EAP root context, append the context of the application to the URL. For example, for the
microprofile-configquickstart, the URL might behttp://HOST_PORT_VALUE/microprofile-config/.Optionally, you can scale up the application instance by running the following command. This command increases the number of replicas to 3.
oc scale deploymentconfig DEPLOYMENTCONFIG_NAME --replicas=3
$ oc scale deploymentconfig DEPLOYMENTCONFIG_NAME --replicas=3Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example, for the
microprofile-configquickstart, use the following command to scale up the application.oc scale deployment/microprofile-config --replicas=3
$ oc scale deployment/microprofile-config --replicas=3Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Additional Resources
For more information about JBoss EAP XP Quickstarts, see the Use the Quickstarts section in the Using MicroProfile in JBoss EAP guide.
Chapter 9. Capability trimming Copy linkLink copied to clipboard!
When building a bootable JAR, you can decide which JBoss EAP features and subsystems to include.
Capability trimming is supported only on OpenShift or when building a bootable JAR.
Additional resources
9.1. Available JBoss EAP layers Copy linkLink copied to clipboard!
Red Hat makes available a number of layers to customize provisioning of the JBoss EAP server in OpenShift or a bootable JAR.
Three layers are base layers that provide core functionality. The other layers are decorator layers that enhance the base layers with additional capabilities.
Most decorator layers can be used to build S2I images in JBoss EAP for OpenShift or to build a bootable JAR. A few layers do not support S2I images; the description of the layer notes this limitation.
Only the listed layers are supported. Layers not listed here are not supported.
9.1.1. Base layers Copy linkLink copied to clipboard!
Each base layer includes core functionality for a typical server user case.
datasources-web-server
This layer includes a servlet container and the ability to configure a datasource.
This layer does not include MicroProfile capabilities.
The following Jakarta EE specifications are supported in this layer:
- Jakarta JSON Processing 1.1
- Jakarta JSON Binding 1.0
- Jakarta Servlet 4.0
- Jakarta Expression Language 3.0
- Jakarta Server Pages 2.3
- Jakarta Standard Tag Library 1.2
- Jakarta Concurrency 1.1
- Jakarta Annotations 1.3
- Jakarta XML Binding 2.3
- Jakarta Debugging Support for Other Languages 1.0
- Jakarta Transactions 1.3
- Jakarta Connectors 1.7
jaxrs-server
This layer enhances the datasources-web-server layer with the following JBoss EAP subsystems:
-
jaxrs -
weld -
jpa
This layer also adds Infinispan-based second-level entity caching locally in the container.
The following MicroProfile capability is included in this layer:
- MicroProfile REST Client
The following Jakarta EE specifications are supported in this layer in addition to those supported in the datasources-web-server layer:
- Jakarta Contexts and Dependency Injection 2.0
- Jakarta Bean Validation 2.0
- Jakarta Interceptors 1.2
- Jakarta RESTful Web Services 2.1
- Jakarta Persistence 2.2
cloud-server
This layer enhances the jaxrs-server layer with the following JBoss EAP subsystems:
-
resource-adapters -
messaging-activemq(remote broker messaging, not embedded messaging)
This layer also adds the following observability features to the jaxrs-server layer:
- MicroProfile Health
- MicroProfile Config
The following Jakarta EE specification is supported in this layer in addition to those supported in the jaxrs-server layer:
- Jakarta Security 1.0
cloud-default-mp-config
This layer provisions a server with standalone configuration based on the standalone-microprofile-ha.xml file. The cloud-default-mp-layer is provided by the org.jboss.eap.xp:eap-xp-cloud-galleon-pack and is supported for JBoss EAP XP S2I build, but not for a Bootable JAR. For more information about the server configuration files included in JBoss EAP XP, see the Standalone server configuration files section.
This workflow uses the microprofile-config quickstart as an example. The quickstart provides a small, specific working example that can be used as a reference for your own project. See the microprofile-config quickstart that ships with JBoss EAP XP 5.0.0 for more information.
ee-core-profile-server
The ee-core-profile-server layer provisions a server with the Jakarta EE 10 Core Profile. The Core Profile provides a small, lightweight profile for users that provides both core JBoss EAP server functionality and Jakarta EE APIs. The ee-core-profile-server layer is best suited for smaller runtimes such as cloud-native applications and microservices.
9.1.2. Decorator layers Copy linkLink copied to clipboard!
Decorator layers are not used alone. You can configure one or more decorator layers with a base layer to deliver additional functionality.
ejb-lite
This decorator layer adds a minimal Jakarta Enterprise Beans implementation to the provisioned server. The following support is not included in this layer:
- IIOP integration
- MDB instance pool
- Remote connector resource
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
Jakarta Enterprise Beans
This decorator layer extends the ejb-lite layer. This layer adds the following support to the provisioned server, in addition to the base functionality included in the ejb-lite layer:
- MDB instance pool
- Remote connector resource
Use this layer if you want to use message-driven beans (MDBs) or Jakarta Enterprise Beans remoting capabilities, or both. If you do not need these capabilities, use the ejb-lite layer.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
ejb-local-cache
This decorator layer adds local caching support for Jakarta Enterprise Beans to the provisioned server.
Dependencies: You can only include this layer if you have included the ejb-lite layer or the ejb layer.
This layer is not compatible with the ejb-dist-cache layer. If you include the ejb-dist-cache layer, you cannot include the ejb-local-cache layer. If you include both layers, the resulting build might include an unexpected Jakarta Enterprise Beans configuration.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
ejb-dist-cache
This decorator layer adds distributed caching support for Jakarta Enterprise Beans to the provisioned server.
Dependencies: You can only include this layer if you have included the ejb-lite layer or the ejb layer.
This layer is not compatible with the ejb-local-cache layer. If you include the ejb-dist-cache layer, you cannot include the ejb-local-cache layer. If you include both layers, the resulting build might result in an unexpected configuration.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
jdr
This decorator layer adds the JBoss Diagnostic Reporting (jdr) subsystem to gather diagnostic data when requesting support from Red Hat.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
Jakarta Persistence
This decorator layer adds persistence capabilities for a single-node server. Note that distributed caching only works if the servers are able to form a cluster.
The layer adds Hibernate libraries to the provisioned server, with the following support:
-
Configurations of the
jpasubsystem -
Configurations of the
infinispansubsystem - A local Hibernate cache container
This layer is not compatible with the jpa-distributed layer. If you include the jpa layer, you cannot include the jpa-distributed layer.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
jpa-distributed
This decorator layer adds persistence capabilities for servers operating in a cluster. The layer adds Hibernate libraries to the provisioned server, with the following support:
-
Configurations of the
jpasubsystem -
Configurations of the
infinispansubsystem - A local Hibernate cache container
- Invalidation and replication Hibernate cache containers
-
Configuration of the
jgroupssubsystem
This layer is not compatible with the jpa layer. If you include the jpa layer, you cannot include the jpa-distributed layer.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
Jakarta Server Faces
This decorator layer adds the jsf subsystem to the provisioned server.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
microprofile-platform
This decorator layer adds the following MicroProfile capabilities to the provisioned server:
- MicroProfile Config
- MicroProfile Fault Tolerance
- MicroProfile Health
- MicroProfile JWT
- MicroProfile OpenAPI
This layer includes MicroProfile capabilities that are also included in the observability layer. If you include this layer, you do not need to include the observability layer.
observability
This decorator layer adds the following observability features to the provisioned server:
- MicroProfile Health
- MicroProfile Config
This layer is built in to the cloud-server layer. You do not need to add this layer to the cloud-server layer.
remote-activemq
This decorator layer adds the ability to communicate with a remote ActiveMQ broker to the provisioned server, integrating messaging support.
The pooled connection factory configuration specifies guest as the value for the user and password attributes. You can use a CLI script to change these values at runtime.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
sso
This decorator layer adds Red Hat Single Sign-On integration to the provisioned server.
This layer should only be used when provisioning a server using S2I.
web-console
This decorator layer adds the management console to the provisioned server.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
web-clustering
This decorator layer adds support for distributable web applications by configuring a non-local Infinispan-based container web cache for data session handling suitable to clustering environments.
web-passivation
This decorator layer adds support for distributable web applications by configuring a local Infinispan-based container web cache for data session handling suitable to single node environments.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
webservices
This layer adds web services functionality to the provisioned server, supporting Jakarta web services deployments.
This layer is only supported when building a bootable JAR. This layer is not supported when using S2I.
Additional resources
Chapter 10. Enable MicroProfile application development for JBoss EAP using JBoss Tools Copy linkLink copied to clipboard!
If you want to incorporate MicroProfile capabilities in applications that you develop using JBoss Tools, you must enable MicroProfile support for JBoss EAP in JBoss Tools.
JBoss EAP expansion packs provide support for MicroProfile.
JBoss EAP expansion packs are not supported on JBoss EAP 7.2 and earlier.
Each version of the JBoss EAP expansion pack supports specific patches of JBoss EAP. For details, see the JBoss EAP expansion pack Support and Life Cycle Policies page.
The JBoss EAP XP Quickstarts for Openshift are provided as Technology Preview only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend to use them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
See Technology Preview Features Support Scope on the Red Hat Customer Portal for information about the support scope for Technology Preview features.
10.1. Configuring JBoss Tools to use MicroProfile capabilities Copy linkLink copied to clipboard!
To enable MicroProfile support on JBoss EAP, register a new runtime server for JBoss EAP XP, and then create the new JBoss EAP 8.0 server.
Give the server an appropriate name that helps you recognize that it supports MicroProfile capabilities.
This server uses a newly created JBoss EAP XP runtime that points to the runtime installed previously and uses the standalone-microprofile.xml configuration file.
If you set the Target runtime to 8.0 or a later runtime version in JBoss Tools, your project is compatible with the Jakarta EE 8 specification.
Prerequisites
Procedure
Set up the new server on the
New Serverdialog box.- In the Select server type list, select Red Hat JBoss Enterprise Application Platform 8.0.
- In the Server’s host name field, enter localhost.
- In the Server name field, enter JBoss EAP 8.0 XP.
- Click Next.
Configure the new server.
- In the Home directory field, if you do not want to use the default setting, specify a new directory; for example: home/myname/dev/microprofile/runtimes/jboss-eap-7.4.
- Make sure the Execution Environment is set to JavaSE-1.8.
- Optional: Change the values in the Server base directory and Configuration file fields.
- Click Finish.
Result
You are now ready to begin developing applications using MicroProfile capabilities, or to begin using the MicroProfile quickstarts for JBoss EAP.
10.2. Using MicroProfile quickstarts for JBoss Tools Copy linkLink copied to clipboard!
Enabling the MicroProfile quickstarts makes the simple examples available to run and test on your installed server.
These examples illustrate the following MicroProfile capabilities.
- MicroProfile Config
- MicroProfile Fault Tolerance
- MicroProfile Health
- MicroProfile JWT
- MicroProfile OpenAPI
- MicroProfile REST Client
Procedure
-
Import the
pom.xmlfile from the Quickstart Parent Artifact. If you are using a quickstart that requires environment variables, configure those variables on the launch configuration on the server Overview dialog box.
For example, the
opentelemetry-tracingquickstart uses the following environment variable:-
OTEL_COLLECTOR_HOST
-
Additional resources
About JBoss Enterprise Application Platform expansion pack
Red Hat JBoss Enterprise Application Platform expansion pack Support and Life Cycle Policies
Chapter 11. The bootable JAR Copy linkLink copied to clipboard!
You can build and package a microservices application as a bootable JAR with the JBoss EAP JAR Maven plug-in. You can then run the application on a JBoss EAP bare-metal platform or a JBoss EAP OpenShift platform.
11.1. About the bootable JAR Copy linkLink copied to clipboard!
You can build and package a microservices application as a bootable JAR with the JBoss EAP JAR Maven plug-in.
A bootable JAR contains a server, a packaged application, and the runtime required to launch the server.
The JBoss EAP JAR Maven plug-in uses Galleon trimming capability to reduce the size and memory footprint of the server. Thus, you can configure the server according to your requirements, including only the Galleon layers that provide the capabilities that you need.
The JBoss EAP JAR Maven plug-in supports the execution of JBoss EAP CLI script files to customize your server configuration. A CLI script includes a list of CLI commands for configuring the server.
A bootable JAR is like a standard JBoss EAP server in the following ways:
- It supports JBoss EAP common management CLI commands.
- It can be managed using the JBoss EAP management console.
The following limitations exist when packaging a server in a bootable JAR:
- CLI management operations that require a server restart are not supported.
- The server cannot be restarted in admin-only mode, which is a mode that starts services related to server administration.
- If you shut down the server, updates that you applied to the server are lost.
Additionally, you can provision a hollow bootable JAR. This JAR contains only the server, so you can reuse the server to run a different application.
11.2. JBoss EAP JAR Maven plug-in Copy linkLink copied to clipboard!
You can use the JBoss EAP JAR Maven plug-in to build an application as a bootable JAR.
Check that you have the latest Maven plug-in such as 9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example: 9.0.1.Final-redhat-00009.
In a Maven project, the src directory contains all the source files required to build your application. After the JBoss EAP JAR Maven plug-in builds the bootable JAR, the generated JAR is located in target/<application>-bootable.jar.
The JBoss EAP JAR Maven plug-in also provides the following functionality:
- Allows you to provision JBoss EAP XP server using JBoss EAP channels.
- Applies CLI script commands to the server.
-
Uses the
org.jboss.eap.xp:wildfly-galleon-packGalleon feature pack and some of its layers for customizing the server configuration file. - Supports the addition of extra files into the packaged bootable JAR, such as a keystore file.
- Includes the capability to create a hollow bootable JAR; that is, a bootable JAR that does not contain an application.
After you use the JBoss EAP JAR Maven plug-in to create the bootable JAR, you can start the application by issuing the following command. Replace target/myapp-bootable.jar with the path to your bootable JAR. For example:
java -jar target/myapp-bootable.jar
$ java -jar target/myapp-bootable.jar
To get a list of supported bootable JAR startup commands, append --help to the end of the startup command. For example, java -jar target/myapp-bootable.jar --help.
11.3. Bootable JAR arguments Copy linkLink copied to clipboard!
View the arguments in the following table to learn about supported arguments for use with the bootable JAR.
| Argument | Description |
|---|---|
|
| Displays the help message for the specified command and exit. |
|
| Specifies the path to a JBoss CLI script that executes when starting the bootable JAR. If the path specified is relative, the path is resolved against the working directory of the Java VM instance used to launch the bootable JAR. |
|
| Argument specific to the hollow bootable JAR. Specifies the path to the WAR, JAR, EAR file or exploded directory that contains the application you want to deploy on a server. |
|
| Print the content of the generated Galleon configuration file. |
|
|
By default, the JVM settings are used to create a TEMP directory after the bootable JAR is started. You can use the |
|
| Runs the server with a security manager installed. |
|
|
Set system property |
|
|
Set system property |
|
| Specifies system properties that are set by the server at server runtime. The bootable JAR JVM does not set these system properties. |
|
| Loads system properties from a specified URL. |
|
| Set a security property. |
|
|
Set system property |
|
| Display the application server version and exit. |
11.4. Specifying Galleon layers for your bootable JAR server Copy linkLink copied to clipboard!
You can specify Galleon layers to build a custom configuration for your server. Additionally, you can specify Galleon layers that you want excluded from the server.
Starting with JBoss EAP XP 5.0, it is necessary to configure the JBoss EAP JAR Maven plug-in with the JBoss EAP 8.0 and JBoss EAP XP 5.0 channels to retrieve the server artifacts. For more information about JBoss EAP Channels, see managing JBoss EAP installation channels.
To specify the JBoss EAP and JBoss EAP XP channels for provisioning the latest JBoss EAP XP 5.0 server, follow this example:
Use the <feature-pack-location> element to specify feature pack location. In the Maven plug-in configuration file, the following example specifies org.jboss.eap.xp:wildfly-galleon-pack within the <feature-pack-location> element.
If you need to reference more than one feature pack, list them in the <feature-packs> element. The following example shows the addition of the JBoss EAP datasources feature pack to the <feature-packs> element:
You can combine Galleon layers from multiple feature packs to configure the bootable JAR server to include only the supported Galleon layers that provide the capabilities that you need.
On a bare-metal platform, if you do not specify Galleon layers in your configuration file then the provisioned server contains a configuration identical to that of a default standalone-microprofile.xml configuration.
On an OpenShift platform, after you have added the <cloud/> configuration element in the plug-in configuration and you choose not to specify Galleon layers in your configuration file, the provisioned server contains a configuration that is adjusted for the cloud environment and is similar to a default standalone-microprofile-ha.xml.
Prerequisites
- Maven is installed.
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009.
The examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
Procedure
- Identify the supported JBoss EAP Galleon layers that provide the capabilities that you need to run your application.
Reference a JBoss EAP feature pack location in the
<plugin>element of the Maven projectpom.xmlfile. The following example displays the inclusion of a single feature-pack, which includes thejaxrs-serverbase layer and thejpa-distributedlayer . Thejaxrs-serverbase layer provides additional support for the server.Copy to Clipboard Copied! Toggle word wrap Toggle overflow This example also shows the exclusion of the
jpalayer from the project.NoteIf you include the
jpa-distributedlayer in your project, you must exclude thejpalayer from thejaxrs-serverlayer. Thejpalayer configures a local infinispan hibernate cache, while thejpa-distributedlayer configures a remote infinispan hibernate cache.
11.5. Using a bootable JAR on a JBoss EAP bare-metal platform Copy linkLink copied to clipboard!
You can package an application as a bootable JAR on a JBoss EAP bare-metal platform.
A bootable JAR contains a server, a packaged application, and the runtime required to launch the server.
This procedure demonstrates packaging the MicroProfile Config microservices application as a bootable JAR with the JBoss EAP JAR Maven plug-in. See MicroProfile Config Quickstart.
You can use CLI scripts to configure the server during the packaging of the bootable JAR.
On building a web application that must be packaged inside a bootable JAR, you must specify war in the <packaging> element of your pom.xml file. For example:
<packaging>war</packaging>
<packaging>war</packaging>
This value is required to package the build application as a WAR file and not as the default JAR file.
In a Maven project that is used solely to build a hollow bootable JAR, set the packaging value to pom. For example:
<packaging>pom</packaging>
<packaging>pom</packaging>
You are not limited to using pom packaging when you build a hollow bootable JAR for a Maven project. You can create one by specifying true in the <hollow-jar> element for any type of packaging, such as war. See Creating a hollow bootable JAR on a JBoss EAP bare-metal platform.
Prerequisites
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009. - You have created a Maven project, and added dependencies for creating an MicroProfile application. See MicroProfile Config development.
The examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
Procedure
Add the following content to the
<build>element of thepom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you do not specify Galleon layers in your
pom.xmlfile then the bootable JAR server contains a configuration that is identical to astandalone-microprofile.xmlconfiguration.Package the application as a bootable JAR:
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Start the application:
NAME="foo" java -jar target/microprofile-config-bootable.jar
$ NAME="foo" java -jar target/microprofile-config-bootable.jarCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe example uses
NAMEas the environment variable, but you can choose to usejim, which is the default value.NoteTo view a list of supported bootable JAR arguments, append
--helpto the end of thejava -jar target/microprofile-config-bootable.jarcommand.Specify the following URL in your web browser to access the MicroProfile Config application:
http://localhost:8080/config/json
http://localhost:8080/config/jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verification: Test the application behaves properly by issuing the following command in your terminal:
curl http://localhost:8080/config/json
curl http://localhost:8080/config/jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow The following is the expected output:
{"result":"Hello foo"}{"result":"Hello foo"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow
11.6. Creating a hollow bootable JAR on a JBoss EAP bare-metal platform Copy linkLink copied to clipboard!
You can package an application as a hollow bootable JAR on a JBoss EAP bare-metal platform.
A hollow bootable JAR contains only the JBoss EAP server. The hollow bootable JAR is packaged by the JBoss EAP JAR Maven plug-in. The application is provided at server runtime. The hollow bootable JAR is useful if you need to re-use the server configuration for a different application.
Prerequisites
- You have created a Maven project for MicroProfile Config development. For example: See MicroProfile Config Quickstarts.
-
You have completed the
pom.xmlfile configuration steps outlined in Using a bootable JAR on a JBoss EAP bare-metal platform. -
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009.
Procedure
-
To build a hollow bootable JAR, you must set the
<hollow-jar>plug-in configuration element to true in the projectpom.xmlfile. For example:
By specifying true in the <hollow-jar> element, the JBoss EAP JAR Maven plug-in does not include an application in the JAR.
Build the hollow bootable JAR:
mvn clean package
$ mvn clean packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the hollow bootable JAR:
java -jar target/microprofile-config-bootable.jar --deployment=target/microprofile-config.war
$ java -jar target/microprofile-config-bootable.jar --deployment=target/microprofile-config.warCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantTo specify the path to the WAR file that you want to deploy on the server, use the following argument, where
<PATH_NAME>is the path to your deployment.--deployment=<PATH_NAME>
--deployment=<PATH_NAME>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Access the application:
curl http://localhost:8080/microprofile-config/config/json
$ curl http://localhost:8080/microprofile-config/config/jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteTo register your web application in the root directory, name the application
ROOT.war.
11.7. CLI scripts executed at build time Copy linkLink copied to clipboard!
You can create CLI scripts to configure the server during the packaging of the bootable JAR.
A CLI script is a text file that contains a sequence of CLI commands that you can use to apply additional server configurations. For example, you can create a script to add a new logger to the logging subsystem.
You can also specify more complex operations in a CLI script. For example, you can group security management operations into a single command to enable HTTP authentication for the management HTTP endpoint.
You must define CLI scripts in the <cli-session> element of the plug-in configuration before you package an application as a bootable JAR. This ensures the server configuration settings persist after packaging the bootable JAR.
Although you can combine predefined Galleon layers to configure a server that deploys your application, limitations do exist. For example, you cannot enable the HTTPS undertow listener using Galleon layers when packaging the bootable JAR. Instead, you must use a CLI script.
You must define the CLI scripts in the <cli-session> element of the pom.xml file. The following table shows types of CLI session attributes:
| Argument | Description |
|---|---|
|
| List of paths to script files. |
|
|
Optional attribute that specifies a path to a properties file. This file lists Java properties that scripts can reference by using the |
|
|
Optional attribute that contains a boolean value. Indicates if system properties or expressions are resolved before sending the operation requests to the server. Value is |
-
CLI scripts are started in the order that they are defined in the
<cli-session>element of thepom.xmlfile. - The JBoss EAP JAR Maven plug-in starts the embedded server for each CLI session. Thus, your CLI script does not have to start or stop the embedded server.
11.8. Executing CLI script at runtime Copy linkLink copied to clipboard!
You can apply changes to the server configuration during runtime; this gives you the flexibility to adjust the server with respect to the execution context. However, the preferred way to apply changes to the server is during build time.
Procedure
Launch the bootable JAR, and the
--cli-scriptargument.For Example:
java -jar myapp-bootable.jar --cli-scipt=my-scli-scipt.cli
java -jar myapp-bootable.jar --cli-scipt=my-scli-scipt.cliCopy to Clipboard Copied! Toggle word wrap Toggle overflow
-
The CLI script must be a text file (UTF-8), the file extension if present is meaningless although
.cliextension is advised. - Operations that require your server to restart will terminate your bootable JAR instance.
-
CLI commands such as
connect,reload,shutdown, and any command related to embedded server are not operational. -
CLI commands such as
jdbc-driver-infothat cannot be executed in admin-mode are not supported.
If you restart the server without executing the CLI script, your new server instance will not contain the changes from your previous server instance.
11.9. Using a bootable JAR on a JBoss EAP OpenShift platform Copy linkLink copied to clipboard!
11.9.1. Using oc command to do binary build Copy linkLink copied to clipboard!
After you packaged an application as a bootable JAR, you can run the application on a JBoss EAP OpenShift platform.
On OpenShift, you cannot use the EAP Operator automated transaction recovery feature with your bootable JAR.
Prerequisites
- You have created a Maven project for MicroProfile Config development. For example: See MicroProfile Config Quickstarts.
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009.
The examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
<properties>
<bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version>
</properties>
Procedure
Add the following content to the
<build>element of thepom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteYou must include the
<cloud/>element in the<configuration>element of the plug-in configuration, so the JBoss EAP Maven JAR plug-in can identify that you choose the OpenShift platform.Package the application:
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Log in to your OpenShift instance using the
oc logincommand. Create a new project in OpenShift. For example:
oc new-project bootable-jar-project
$ oc new-project bootable-jar-projectCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the following
occommands to create an application image:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Creates an openshift sub-directory in the target directory. The packaged application is copied into the created sub-directory.
- 2
- Imports the latest OpenJDK 17 imagestream tag and image information into the OpenShift project.
- 3
- Creates a build configuration based on the microprofile-config-app directory and the OpenJDK 17 imagestream.
- 4
- Uses the
target/openshiftsub-directory as the binary input to build the application.
NoteOpenShift applies a set of CLI script commands to the bootable JAR configuration file to adjust it to the cloud environment. You can access this script by opening the
bootable-jar-build-artifacts/generated-cli-script.txtfile in the Maven project/target directory.Verification:
View a list of OpenShift pods available and check the pods build statuses by issuing the following command:
oc get pods
$ oc get podsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify the built application image:
oc get is microprofile-config-app
$ oc get is microprofile-config-appCopy to Clipboard Copied! Toggle word wrap Toggle overflow The output shows the built application image details, such as name and image repository, tag, and so on. For the example in this procedure, the imagestream name and tag output displays
microprofile-config-app:latest.Deploy the application:
oc new-app microprofile-config-app oc expose svc/microprofile-config-app
$ oc new-app microprofile-config-app $ oc expose svc/microprofile-config-appCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantTo provide system properties to the bootable JAR, you must use the
JAVA_OPTS_APPENDenvironment variable. The following example demonstrates usage of theJAVA_OPTS_APPENDenvironment variable:oc new-app <_IMAGESTREAM_> -e JAVA_OPTS_APPEND="-Xlog:gc*:file=/tmp/gc.log:time -Dwildfly.statistics-enabled=true"
$ oc new-app <_IMAGESTREAM_> -e JAVA_OPTS_APPEND="-Xlog:gc*:file=/tmp/gc.log:time -Dwildfly.statistics-enabled=true"Copy to Clipboard Copied! Toggle word wrap Toggle overflow A new application is created and started. The application configuration is exposed as a new service.
Verification: Test the application behaves properly by issuing the following command in your terminal:
curl http://$(oc get route microprofile-config-app --template='{{ .spec.host }}')/config/json$ curl http://$(oc get route microprofile-config-app --template='{{ .spec.host }}')/config/jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow Expected output:
{"result":"Hello jim"}{"result":"Hello jim"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow
11.10. Configure the bootable JAR for OpenShift Copy linkLink copied to clipboard!
Before using your bootable JAR, you can configure JVM settings to ensure that your standalone server operates correctly on JBoss EAP for OpenShift.
Use the JAVA_OPTS_APPEND environment variable to configure JVM settings. Use the JAVA_ARGS command to provide arguments to the bootable JAR.
You can use environment variables to set values for properties. For example, you can use the JAVA_OPTS_APPEND environment variable to set the -Dwildfly.statistics-enabled property to true:
JAVA_OPTS_APPEND="-Xlog:gc*:file=/tmp/gc.log:time -Dwildfly.statistics-enabled=true"
JAVA_OPTS_APPEND="-Xlog:gc*:file=/tmp/gc.log:time -Dwildfly.statistics-enabled=true"
Statistics are now enabled for your server.
Use the JAVA_ARGS environment variable, if you need to provide arguments to the bootable JAR.
JBoss EAP for OpenShift provides a JDK 17 image. To run the application associated with your bootable JAR, you must first import the latest OpenJDK 17 imagestream tag and image information into your OpenShift project. You can then use environment variables to configure the JVM in the imported image.
You can apply the same configuration options for configuring the JVM used for JBoss EAP for OpenShift S2I image, but with the following differences:
-
Optional: The
-Xlogcapability is not available, but you can set garbage collection logging by enabling-Xlog:gc. For example:JAVA_OPTS_APPEND="-Xlog:gc*:file=/tmp/gc.log:time". -
To increase initial metaspace size, you can set the
GC_METASPACE_SIZEenvironment variable. For best metadata capacity performance, set the value to96. -
For better random file generation, use the
JAVA_OPTS_APPENDenvironment variable to setjava.security.egdproperty as-Djava.security.egd=file:/dev/urandom.
These configurations improve the memory settings and garbage collection capability of JVM when running on your imported OpenJDK 17 image.
11.11. Using a ConfigMap in your application on OpenShift Copy linkLink copied to clipboard!
For OpenShift, you can use a deployment controller (dc) to mount the configmap into the pods used to run the application.
A ConfigMap is an OpenShift resource that is used to store non-confidential data in key-value pairs.
After you specify the microprofile-platform Galleon layer to add microprofile-config-smallrye subsystem and any extensions to the server configuration file, you can use a CLI script to add a new ConfigSource to the server configuration. You can save CLI scripts in an accessible directory, such as the /scripts directory, in the root directory of your Maven project.
MicroProfile Config functionality is implemented in JBoss EAP using the SmallRye Config component and is provided by the microprofile-config-smallrye subsystem. This subsystem is included in the microprofile-platform Galleon layer.
Prerequisites
- You have installed Maven.
- You have configured the JBoss EAP Maven repository.
- You have packaged an application as a bootable JAR and you can run the application on a JBoss EAP OpenShift platform. For information about building an application as a bootable JAR on an OpenShift platform, see Using a bootable JAR on a JBoss EAP OpenShift platform.
Procedure
Create a directory named
scriptsat the root directory of your project. For example:mkdir scripts
$ mkdir scriptsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
cli.propertiesfile and save the file in the/scriptsdirectory. Define theconfig.pathand theconfig.ordinalsystem properties in this file. For example:config.path=/etc/config config.ordinal=200
config.path=/etc/config config.ordinal=200Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a CLI script, such as
mp-config.cli, and save it in an accessible directory in the bootable JAR, such as the/scriptsdirectory. The following example shows the contents of themp-config.cliscript:config map /subsystem=microprofile-config-smallrye/config-source=os-map:add(dir={path=${config.path}}, ordinal=${config.ordinal})# config map /subsystem=microprofile-config-smallrye/config-source=os-map:add(dir={path=${config.path}}, ordinal=${config.ordinal})Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
mp-config.cliCLI script creates a newConfigSource, to which ordinal and path values are retrieved from a properties file.-
Save the script in the
/scriptsdirectory, which is located at the root directory of the project. Add the following configuration extract to the existing plug-in
<configuration>element:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Package the application:
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Log in to your OpenShift instance using the
oc logincommand. Optional: If you have not previously created a
target/openshiftsubdirectory, you must create the suddirectory by issuing the following command:mkdir target/openshift
$ mkdir target/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the packaged application into the created subdirectory.
cp target/microprofile-config-bootable.jar target/openshift
$ cp target/microprofile-config-bootable.jar target/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
target/openshiftsubdirectory as the binary input to build the application:oc start-build microprofile-config-app --from-dir target/openshift
$ oc start-build microprofile-config-app --from-dir target/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteOpenShift applies a set of CLI script commands to the bootable JAR configuration file to enable it for the cloud environment. You can access this script by opening the
bootable-jar-build-artifacts/generated-cli-script.txtfile in the Maven project/targetdirectory.Create a
ConfigMap. For example:oc create configmap microprofile-config-map --from-literal=name="Name comes from Openshift ConfigMap"
$ oc create configmap microprofile-config-map --from-literal=name="Name comes from Openshift ConfigMap"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Mount the
ConfigMapinto the application with the dc. For example:oc set volume deployments/microprofile-config-app --add --name=config-volume \ --mount-path=/etc/config \ --type=configmap \ --configmap-name=microprofile-config-map
$ oc set volume deployments/microprofile-config-app --add --name=config-volume \ --mount-path=/etc/config \ --type=configmap \ --configmap-name=microprofile-config-mapCopy to Clipboard Copied! Toggle word wrap Toggle overflow After executing the
oc set volumecommand, the application is re-deployed with the new configuration settings.Test the output:
curl http://$(oc get route microprofile-config-app --template='{{ .spec.host }}')/config/json$ curl http://$(oc get route microprofile-config-app --template='{{ .spec.host }}')/config/jsonCopy to Clipboard Copied! Toggle word wrap Toggle overflow The following is the expected output:
{"result":"Hello Name comes from Openshift ConfigMap"}{"result":"Hello Name comes from Openshift ConfigMap"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow
11.12. Creating a bootable JAR Maven project Copy linkLink copied to clipboard!
Follow the steps in the procedure to create an example Maven project. You must create a Maven project before you can perform the following procedures:
- Enabling JSON logging for your bootable JAR
- Enabling web session data storage for multiple bootable JAR instances
- Enabling HTTP authentication for bootable JAR with a CLI script
- Securing your JBoss EAP bootable JAR application with Red Hat build of Keycloak
In the project pom.xml file, you can configure Maven to retrieve the project artifacts required to build your bootable JAR.
Procedure
Set up the Maven project:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where GROUP_ID is the
groupIdof your project and ARTIFACT_ID is theartifactIdof your project.In the
pom.xmlfile, configure Maven to retrieve the JBoss EAP BOM file from a remote repository.Copy to Clipboard Copied! Toggle word wrap Toggle overflow To configure Maven to automatically manage versions for the Jakarta EE artifacts in the
jboss-eap-eeBOM, add the BOM to the<dependencyManagement>section of the projectpom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the servlet API artifact, which is managed by the BOM, to the
<dependency>section of the projectpom.xmlfile, as shown in the following example:<dependency> <groupId>jakarta.servlet</groupId> <artifactId>jakarta.servlet-api</artifactId> <scope>provided</scope> </dependency><dependency> <groupId>jakarta.servlet</groupId> <artifactId>jakarta.servlet-api</artifactId> <scope>provided</scope> </dependency>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
11.13. Enabling JSON logging for your bootable JAR Copy linkLink copied to clipboard!
You can enable JSON logging for your bootable JAR by configuring the server logging configuration with a CLI script. When you enable JSON logging, you can use the JSON formatter to view log messages in JSON format.
The example in this procedure shows you how to enable JSON logging for your bootable JAR on a bare-metal platform and an OpenShift platform.
Prerequisites
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009. You have created a Maven project, and added dependencies for creating an application. See Creating a bootable JAR Maven project.
ImportantIn the Maven archetype of your Maven project, you must specify the groupID and artifactID that are specific to your project. For example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties><properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Procedure
Add the JBoss Logging and Jakarta RESTful Web Services dependencies, which are managed by the BOM, to the
<dependencies>section of the projectpom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following content to the
<build>element of thepom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the directory to store Java files:
mkdir -p APPLICATION_ROOT/src/main/java/com/example/logging/
$ mkdir -p APPLICATION_ROOT/src/main/java/com/example/logging/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where
APPLICATION_ROOTis the directory containing thepom.xmlconfiguration file for the application.Create a Java file
RestApplication.javawith the following content and save the file in theAPPLICATION_ROOT/src/main/java/com/example/logging/directory:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a Java file
HelloWorldEndpoint.javawith the following content and save the file in theAPPLICATION_ROOT/src/main/java/com/example/logging/directory:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a CLI script, such as
logging.cli, and save it in an accessible directory in the bootable JAR, such as theAPPLICATION_ROOT/scriptsdirectory, whereAPPLICATION_ROOTis the root directory of your Maven project. The script must contain the following commands:/subsystem=logging/logger=com.example.logging:add(level=ALL) /subsystem=logging/json-formatter=json-formatter:add(exception-output-type=formatted, pretty-print=false, meta-data={version="1"}, key-overrides={timestamp="@timestamp"}) /subsystem=logging/console-handler=CONSOLE:write-attribute(name=level,value=ALL) /subsystem=logging/console-handler=CONSOLE:write-attribute(name=named-formatter, value=json-formatter)/subsystem=logging/logger=com.example.logging:add(level=ALL) /subsystem=logging/json-formatter=json-formatter:add(exception-output-type=formatted, pretty-print=false, meta-data={version="1"}, key-overrides={timestamp="@timestamp"}) /subsystem=logging/console-handler=CONSOLE:write-attribute(name=level,value=ALL) /subsystem=logging/console-handler=CONSOLE:write-attribute(name=named-formatter, value=json-formatter)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following configuration extract to the plug-in
<configuration>element:Copy to Clipboard Copied! Toggle word wrap Toggle overflow This example shows the
logging.cliCLI script, which modifies the server logging configuration file to enable JSON logging for your application.Package the application as a bootable JAR.
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: To run the application on a JBoss EAP bare-metal platform, follow the steps outlined in Using a bootable JAR on a JBoss EAP bare-metal platform, but with the following difference:
Start the application:
mvn wildfly-jar:run
mvn wildfly-jar:runCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verification: You can access the application by specifying the following URL in your browser: http://127.0.0.1:8080/hello.
Expected output: You can view the JSON-formatted logs, including the
com.example.logging.HelloWorldEndpointdebug trace, in the application console.
Optional: To run the application on a JBoss EAP OpenShift platform, complete the following steps:
Add the
<cloud/>element to the plug-in configuration. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Rebuild the application:
mvn clean package
$ mvn clean packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Log in to your OpenShift instance using the
oc logincommand. Create a new project in OpenShift. For example:
oc new-project bootable-jar-project
$ oc new-project bootable-jar-projectCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the following
occommands to create an application image:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Creates the
target/openshiftsubdirectory. The packaged application is copied into theopenshiftsubdirectory. - 2
- Imports the latest OpenJDK 17 imagestream tag and image information into the OpenShift project.
- 3
- Creates a build configuration based on the logging directory and the OpenJDK 17 imagestream.
- 4
- Uses the
target/openshiftsubdirectory as the binary input to build the application.
Deploy the application:
oc new-app logging oc expose svc/logging
$ oc new-app logging $ oc expose svc/loggingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Get the URL of the route.
oc get route logging --template='{{ .spec.host }}'$ oc get route logging --template='{{ .spec.host }}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Access the application in your web browser using the URL returned from the previous command. For example:
http://ROUTE_NAME/hello
http://ROUTE_NAME/helloCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verification: Issue the following command to view a list of OpenShift pods available, and to check the pods build statuses:
oc get pods
$ oc get podsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Access a running pod log of your application. Where
APP_POD_NAMEis the name of the running pod logging application.oc logs APP_POD_NAME
$ oc logs APP_POD_NAMECopy to Clipboard Copied! Toggle word wrap Toggle overflow Expected outcome: The pod log is in JSON format and includes the
com.example.logging.HelloWorldEndpointdebug trace.
11.14. Enabling web session data storage for multiple bootable JAR instances Copy linkLink copied to clipboard!
You can build and package a web-clustering application as a bootable JAR.
Prerequisites
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009. You have created a Maven project, and added dependencies for creating a web-clustering application. See Creating a bootable JAR Maven project.
ImportantWhen setting up the Maven project, you must specify values in the Maven archetype configuration. For example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties><properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Procedure
Add the following content to the
<build>element of thepom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThis example makes use of the
web-clusteringGalleon layer to enable web session sharing.Update the
web.xmlfile in thesrc/main/webapp/WEB-INFdirectory with the following configuration:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
<distributable/>tag indicates that this servlet can be distributed across multiple servers.Create the directory to store Java files:
mkdir -p APPLICATION_ROOT /src/main/java/com/example/webclustering/
$ mkdir -p APPLICATION_ROOT /src/main/java/com/example/webclustering/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where
APPLICATION_ROOTis the directory containing thepom.xmlconfiguration file for the application.Create a Java file
MyServlet.javawith the following content and save the file in theAPPLICATION_ROOT/src/main/java/com/example/webclustering/directory.Copy to Clipboard Copied! Toggle word wrap Toggle overflow The content in
MyServlet.javadefines the endpoint to which a client sends an HTTP request.Create a Java file
User.javawith the following content and save the file in theAPPLICATION_ROOT/src/main/java/com/example/webclustering/directory.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Package the application:
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: To run the application on a JBoss EAP bare-metal platform, follow the steps outlined in Using a bootable JAR on a JBoss EAP bare-metal platform, but with the following difference:
On a JBoss EAP bare-metal platform, you can use the
java -jarcommand to run multiple bootable JAR instances, as demonstrated in the following examples:java -jar target/web-clustering-bootable.jar -Djboss.node.name=node1 java -jar target/web-clustering-bootable.jar -Djboss.node.name=node2 -Djboss.socket.binding.port-offset=10
$ java -jar target/web-clustering-bootable.jar -Djboss.node.name=node1 $ java -jar target/web-clustering-bootable.jar -Djboss.node.name=node2 -Djboss.socket.binding.port-offset=10Copy to Clipboard Copied! Toggle word wrap Toggle overflow Verification: You can access the application on the node 1 instance: http://127.0.0.1:8080/clustering. Note the user session ID and the user-creation time.
After you kill this instance, you can access the node 2 instance: http://127.0.0.1:8090/clustering. The user must match the session ID and the user-creation time of the node 1 instance.
Optional: To run the application on a JBoss EAP OpenShift platform, follow the steps outlined in Using a bootable JAR on a JBoss EAP OpenShift platform, but complete the following steps:
Add the
<cloud/>element to the plug-in configuration. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Rebuild the application:
mvn clean package
$ mvn clean packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Log in to your OpenShift instance using the
oc logincommand. Create a new project in OpenShift. For example:
oc new-project bootable-jar-project
$ oc new-project bootable-jar-projectCopy to Clipboard Copied! Toggle word wrap Toggle overflow To run a web-clustering application on a JBoss EAP OpenShift platform, authorization access must be granted for the service account that the pod is running in. The service account can then access the Kubernetes REST API. The following example shows authorization access being granted to a service account:
oc policy add-role-to-user view system:serviceaccount:$(oc project -q):default
$ oc policy add-role-to-user view system:serviceaccount:$(oc project -q):defaultCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the following
occommands to create an application image:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Creates the
target/openshiftsub-directory. The packaged application is copied into theopenshiftsub-directory. - 2
- Imports the latest OpenJDK 17 imagestream tag and image information into the OpenShift project.
- 3
- Creates a build configuration based on the web-clustering directory and the OpenJDK 17 imagestream.
- 4
- Uses the
target/openshiftsub-directory as the binary input to build the application.
Deploy the application:
oc new-app web-clustering -e KUBERNETES_NAMESPACE=$(oc project -q) oc expose svc/web-clustering
$ oc new-app web-clustering -e KUBERNETES_NAMESPACE=$(oc project -q) $ oc expose svc/web-clusteringCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantYou must use the
KUBERNETES_NAMESPACEenvironment variable to view other pods in the current OpenShift namespace; otherwise, the server attempts to retrieve the pods from thedefaultnamespace.Get the URL of the route.
oc get route web-clustering --template='{{ .spec.host }}'$ oc get route web-clustering --template='{{ .spec.host }}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Access the application in your web browser using the URL returned from the previous command. For example:
http://ROUTE_NAME/clustering
http://ROUTE_NAME/clusteringCopy to Clipboard Copied! Toggle word wrap Toggle overflow Note the user session ID and user creation time.
Scale the application to two pods:
oc scale --replicas=2 deployments web-clustering
$ oc scale --replicas=2 deployments web-clusteringCopy to Clipboard Copied! Toggle word wrap Toggle overflow Issue the following command to view a list of OpenShift pods available, and to check the pods build statuses:
oc get pods
$ oc get podsCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Kill the oldest pod using the
oc delete pod web-clustering-POD_NAMEcommand, where POD_NAME is the name of your oldest pod. Access the application again:
http://ROUTE_NAME/clustering
http://ROUTE_NAME/clusteringCopy to Clipboard Copied! Toggle word wrap Toggle overflow Expected outcome: The session ID and the creation time generated by the new pod match those of the of the terminated pod. This indicates that web session data storage is enabled.
11.15. Enabling HTTP authentication for bootable JAR with a CLI script Copy linkLink copied to clipboard!
You can enable HTTP authentication for the bootable JAR with a CLI script. This script adds a security realm and a security domain to your server.
Prerequisites
-
You have checked the latest Maven plug-in version, such as
9.minor.micro.Final-redhat-XXXXX, where 9 is the major version, minor is the minor version, micro micro version and X is the Red Hat build number. For example:9.0.1.Final-redhat-00009. You have created a Maven project, and added dependencies for creating an application that requires HTTP authentication. See Creating a bootable JAR Maven project.
ImportantWhen setting up the Maven project, you must specify HTTP authentication values in the Maven archetype configuration. For example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe examples shown in the procedure specify the following properties:
-
${bootable.jar.maven.plugin.version}for the Maven plug-in version.
You must set these properties in your project. For example:
<properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties><properties> <bootable.jar.maven.plugin.version>9.0.1.Final-redhat-00009</bootable.jar.maven.plugin.version> </properties>Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Procedure
Add the following content to the
<build>element of thepom.xmlfile. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The example shows the inclusion of the
datasources-web-serverGalleon layer that contains theelytronsubsystem.Update the
web.xmlfile in thesrc/main/webapp/WEB-INFdirectory. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the directory to store Java files:
mkdir -p APPLICATION_ROOT/src/main/java/com/example/authentication/
$ mkdir -p APPLICATION_ROOT/src/main/java/com/example/authentication/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where
APPLICATION_ROOTis the root directory of your Maven project.Create a Java file
TestServlet.javawith the following content and save the file in theAPPLICATION_ROOT/src/main/java/com/example/authentication/directory.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a CLI script, such as
authentication.cli, and save it in an accessible directory in the bootable JAR, such as theAPPLICATION_ROOT/scriptsdirectory. The script must contain the following commands:/subsystem=elytron/properties-realm=bootable-realm:add(users-properties={relative-to=jboss.server.config.dir, path=bootable-users.properties, plain-text=true}, groups-properties={relative-to=jboss.server.config.dir, path=bootable-groups.properties}) /subsystem=elytron/security-domain=BootableDomain:add(default-realm=bootable-realm, permission-mapper=default-permission-mapper, realms=[{realm=bootable-realm, role-decoder=groups-to-roles}]) /subsystem=undertow/application-security-domain=other:write-attribute(name=security-domain, value=BootableDomain)/subsystem=elytron/properties-realm=bootable-realm:add(users-properties={relative-to=jboss.server.config.dir, path=bootable-users.properties, plain-text=true}, groups-properties={relative-to=jboss.server.config.dir, path=bootable-groups.properties}) /subsystem=elytron/security-domain=BootableDomain:add(default-realm=bootable-realm, permission-mapper=default-permission-mapper, realms=[{realm=bootable-realm, role-decoder=groups-to-roles}]) /subsystem=undertow/application-security-domain=other:write-attribute(name=security-domain, value=BootableDomain)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following configuration extract to the plug-in
<configuration>element:Copy to Clipboard Copied! Toggle word wrap Toggle overflow This example shows the
authentication.cliCLI script, which configures the defaultundertowsecurity domain to the security domain defined for your server.NoteYou have the option to execute the CLI script at runtime instead of packaging time. To do so, skip this step and proceed to step 10.
In the root directory of your Maven project create a directory to store the properties files that the JBoss EAP JAR Maven plug-in adds to the bootable JAR:
mkdir -p APPLICATION_ROOT/extra-content/standalone/configuration/
$ mkdir -p APPLICATION_ROOT/extra-content/standalone/configuration/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Where
APPLICATION_ROOTis the directory containing thepom.xmlconfiguration file for the application.This directory stores files such as
bootable-users.propertiesandbootable-groups.propertiesfiles.The
bootable-users.propertiesfile contains the following content:testuser=bootable_password
testuser=bootable_passwordCopy to Clipboard Copied! Toggle word wrap Toggle overflow The
bootable-groups.propertiesfile contains the following content:testuser=Users
testuser=UsersCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following
extra-content-content-dirselement to the existing<configuration>element:<extra-server-content-dirs> <extra-content>extra-content</extra-content> </extra-server-content-dirs><extra-server-content-dirs> <extra-content>extra-content</extra-content> </extra-server-content-dirs>Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
extra-contentdirectory contains the properties files.Package the application as a bootable JAR.
mvn package
$ mvn packageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Start the application:
mvn wildfly-jar:run
mvn wildfly-jar:runCopy to Clipboard Copied! Toggle word wrap Toggle overflow If you have chosen to skip step 6 and not execute the CLI script during build, launch the application with the following command:
mvn wildfly-jar:run -Dwildfly.bootable.arguments=--cli-script=scripts/authentication.cli
mvn wildfly-jar:run -Dwildfly.bootable.arguments=--cli-script=scripts/authentication.cliCopy to Clipboard Copied! Toggle word wrap Toggle overflow Call the servlet, but do not specify credentials:
curl -v http://localhost:8080/hello
curl -v http://localhost:8080/helloCopy to Clipboard Copied! Toggle word wrap Toggle overflow Expected output:
HTTP/1.1 401 Unauthorized ... WWW-Authenticate: Basic realm="Example Realm"
HTTP/1.1 401 Unauthorized ... WWW-Authenticate: Basic realm="Example Realm"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Call the server and specify your credentials. For example:
curl -v -u testuser:bootable_password http://localhost:8080/hello
$ curl -v -u testuser:bootable_password http://localhost:8080/helloCopy to Clipboard Copied! Toggle word wrap Toggle overflow A HTTP 200 status is returned that indicates HTTP authentication is enabled for your bootable JAR. For example:
HTTP/1.1 200 OK .... Hello testuser
HTTP/1.1 200 OK .... Hello testuserCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 12. Helm chart use case Copy linkLink copied to clipboard!
Helm is an open source package manager that enables you to build, deploy, and maintain your JBoss EAP XP 5.0 applications on OpenShift.
You can use Helm chart with JBoss EAP XP 5.0 to:
- Build your application from a Maven project hosted on a Git repository using OpenShift Source-to-Image (S2I).
- Deploy an application image on OpenShift with deep integration using an OpenShift cluster (TLS configuration, public route to expose the application, and so on).
- Build your application image with Helm chart and use the JBoss EAP XP operator to deploy the image.
- Build an application image for JBoss EAP XP using other methods and use the Helm chart.
- You can build your Java application with JBoss EAP XP 5.0 to create a Bootable Jar or a Jakarta deployment (similar to JBoss EAP 8.0).
-
If your Java application is a Bootable Jar, the Helm Chart for JBoss EAP XP 5.0 can be used to build the application image (using its default
build.modeset tobootable-jar). -
If your Java application is a Jakarta deployment, you can build the application image using source-to-Image (similarly to JBoss EAP 8.0) by setting the Helm Chart’s
build.modetos2i
12.1. Building and deploying JBoss EAP XP applications using Helm chart Copy linkLink copied to clipboard!
You can build your JBoss EAP XP application using Helm chart by configuring the build and deploy values. You must provide a URL to the Git repository that hosts your application code in your build configuration, the output is an ImageStreamTag resource that contains the built application image. To deploy your application, you must provide an ImageStreamTag resource that contains your built application image. The output is your deployed application and other related resources you can use to access your application from inside and outside OpenShift.
Prerequisites
- You have access to the OpenShift Development Console.
- You have the source code of your JBoss EAP XP application hosted in a Git repository.
- Your application is a Maven project.
-
You have configured your application to use the
org.jboss.eap.plugins:eap-maven-pluginto provision your JBoss EAP XP 5.0 server.
- This procedure focuses only on using the OpenShift Development Console.
- Some form sections are collapsed by default. Click > to expand and view its content.Additionally, you do not need to updated these sections to proceed.
Procedure
Log in to OpenShift Development Console.
- On the dropdown menu, click on Helm.
- On the the top right corner click create and then click on Helm Release.
- Select JBoss EAP XP 5.
- Click create and select configure via YAML view.
Build your application image from the source repository:
build: uri: <git repository URL of your application> mode: s2i
build: uri: <git repository URL of your application> mode: s2iCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: Enter the secret in the
buildsection with thesourceSecretkey:build: uri: <git repository URL of your application> mode: s2i sourceSecret: <name of secret login to your Git repository>
build: uri: <git repository URL of your application> mode: s2i sourceSecret: <name of secret login to your Git repository>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
- If your application has been successfully deployed, you should see a deployed badge next to the Helm release on OpenShift Development Console.
12.1.1. Using Helm chat with Source-to-Image on JBoss EAP XP Copy linkLink copied to clipboard!
Use the eap-maven-plugin from the application pom.xml to provision your JBoss EAP server. Ensure that this plugin is configured in the OpenShift profile, the default profile, or any other active profile, with the OpenShift profile taking precedence over all others.
You must set build.mode to S2I. This is because the default value is bootable-jar for JBoss EAP XP Helm chart.
The build.s2i.featurePacks, build.s2i.galleonLayers and build.s2i.channels fields have been deprecated.
12.1.2. Using Helm chart with Bootable JAR on JBoss EAP XP Copy linkLink copied to clipboard!
In JBoss EAP XP 5.0 you can build your application as a Bootable JAR for more information about how you can do this see The Bootable JAR.
Additionally, in JBoss EAP XP 5.0 you can configure Helms Chart for JBoss EAP XP 5.0 to build an application based on Bootable JAR.
Prerequisites
- You have logged into the OpenShift Development Console.
- You have the source code of your JBoss EAP XP application hosted in a Git repository.
-
Your application is a Maven project. You have configured your application to create a bootable JAR using Maven plugin
org.wildfly.plugins:wildfly-jar-maven-plugin. To learn more see Creating a bootable JAR Maven project.
12.1.2.1. Building your application image using Bootable JAR Copy linkLink copied to clipboard!
You can build your JBoss EAP XP application image with Bootable using Helms chart by configuring the build section on the OpenShift Development Console.
-
If you are building the application with the Helm chart, you must specify the
build.urlfield with the Git URL that references your Git repository. -
You must set the
build.modefield tobootable-jar.
12.2. OpenShift volumes for persistent data storage in Helm chart for JBoss EAP XP Copy linkLink copied to clipboard!
OpenShift volumes enable containers to store and share data from various sources, including cloud storage, network file systems (NFS), or host machines. You can use Helm chart, an OpenShift package manager, to deploy applications in a consistent and reproducible manner. By adding a volume mount to a Helm chart, you can enable your application to persist data across deployments.
12.2.1. Mounting a volume with a Helm chart on JBoss EAP XP Copy linkLink copied to clipboard!
This procedure explains how to mount a secret as a volume using a Helm chart on JBoss EAP XP. Additionally, you can also use it to mount a ConfigMap. This action enables the application to securely access and use the data, protecting it from unauthorized access or tampering. For example, by mounting a secret as a volume, the sensitive data that you store in the secret appears as a file in the POD running the deployment where the secret has been mounted.
Prerequisites
- You have access to the OpenShift Development Console
-
You have created a
secret. For example, you have created a secret namedeap-app-secretthat refers to a file likekeystore.jks. -
You have identified a location where to mount the secret in the container’s file system. For example, the directory
/etc/jgroups-encrypt-secre-secret-volumeis where the secret file, such askeystore.jksis mounted. - The source code of your JBoss EAP XP application hosted in a Git repository.
- Your application is a Maven project.
-
You have configured your application to use the
org.jboss.eap.plugins:eap-maven-pluginto provision your JBoss EAP XP 5.0 server.
Procedure
Log in to OpenShift Development Console.
- On the dropdown menu, click on Helm.
- On the the top right corner click create and then click on Helm Release.
- Select JBoss EAP XP 5.
- Click create and select configure via YAML view.
Edit the YAML file specifying the volume in the
deploy.volumesfield and configure the secret to be used. You must provide the name of the volume and the secretName of the secret:volumes: - name: eap-jgroups-keystore-volume secret: secretName: eap-app-secretvolumes: - name: eap-jgroups-keystore-volume secret: secretName: eap-app-secretCopy to Clipboard Copied! Toggle word wrap Toggle overflow Mount the volume on the file system using the
deploy.volumeMountsin the deployment configuration:volumeMounts: - name: eap-jgroups-keystore-volume mountPath: /etc/jgroups-encrypt-secret-volume readOnly: truevolumeMounts: - name: eap-jgroups-keystore-volume mountPath: /etc/jgroups-encrypt-secret-volume readOnly: trueCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the pod starts, the container mounts the keystore.jks file at
/etc/jgroups-encrypt-secret-volume/keystore.jkslocation.
Chapter 13. Observability in JBoss EAP Copy linkLink copied to clipboard!
If you’re a developer or system administrator, observability is a set of practices and technologies you can use to determine, based on certain signals from your application, the location and source of a problem in your application. The most common signals are metrics, events, and tracing. JBoss EAP uses OpenTelemetry for observability.
13.1. OpenTelemetry in JBoss EAP Copy linkLink copied to clipboard!
OpenTelemetry is a set of tools, application programming interfaces (APIs), and software development kits (SDKs) you can use to instrument, generate, collect, and export telemetry data for your applications. Telemetry data includes metrics, logs, and traces. Analyzing an application’s telemetry data helps you to improve your application’s performance. JBoss EAP provides OpenTelemetry capability through the opentelemetry subsystem.
Red Hat JBoss Enterprise Application Platform 8.0 provides only OpenTelemetry tracing capabilities.
OpenTelemetry is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For more information about the support scope of Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview .
13.2. OpenTelemetry configuration in JBoss EAP Copy linkLink copied to clipboard!
You configure a number of aspects of OpenTelemetry in JBoss EAP using the opentelemetry subsystem. These include exporter, span processor, and sampler.
- exporter
- To analyze and visualize traces, you export them to a collector such as the OpenTelemetry Collector (OTLP). You can configure JBoss EAP to use any collector that supports the OpenTelemetry protocol.
- span processor
- You can configure the span processor to export spans either as they are produced or in batches. You can also configure the number of traces to export.
- sampler
- You can configure the number of traces to record by configuring the sampler.
Example configuration
The following XML is an example of the full OpenTelemetry configuration, including default values. JBoss EAP does not persist the default values when you make changes, so your configuration might look different.
You cannot use an OpenShift route object to connect with a OpenTelemetry Collector endpoint. Instead, use http://<ip_address>:<port> or http://<service_name>:<port>.
13.3. OpenTelemetry tracing in JBoss EAP Copy linkLink copied to clipboard!
JBoss EAP provides OpenTelemetry tracing to help you track the progress of user requests as they pass through different parts of your application. By analyzing traces, you can improve your application’s performance and debug availability issues.
OpenTelemetry tracing consists of the following components:
- Trace
- A collection of operations that a request goes through in an application.
- Span
- A single operation within a trace. It provides request, error, and duration (RED) metrics and contains a span context.
- Span context
- A set of unique identifiers that represents a request that the containing span is a part of.
JBoss EAP automatically traces REST calls to your Jakarta RESTful Web Services applications and container-managed Jakarta RESTful Web Services client invocations. JBoss EAP traces REST calls implicitly as follows:
For each incoming request:
- JBoss EAP extracts the span context from the request.
- JBoss EAP starts a new span, then closes it when the request is completed.
For each outgoing request:
- JBoss EAP injects span context into the request.
- JBoss EAP starts a new span, then closes it when the request is completed.
In addition to implicit tracing, you can create custom spans by injecting a Tracer instance into your application for granular tracing.
13.4. Enabling OpenTelemetry tracing in JBoss EAP Copy linkLink copied to clipboard!
To use OpenTelemetry tracing in JBoss EAP you must first enable the opentelemetry subsystem.
Prerequisites
- JBoss EAP 8.0 with JBoss EAP XP 5.0 is installed.
Procedure
Add the OpenTelemetry extension using the management CLI.
/extension=org.wildfly.extension.opentelemetry:add
/extension=org.wildfly.extension.opentelemetry:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
opentelemetrysubsystem using the management CLI./subsystem=opentelemetry:add
/subsystem=opentelemetry:addCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reload JBoss EAP.
reload
reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow
13.5. Configuring the opentelemetry subsystem Copy linkLink copied to clipboard!
You can configure the opentelemetry subsystem to set different aspects of tracing. Configure these based on the collector you use for observing the traces.
Prerequisites
-
You have enabled the
opentelemetrysubsystem. For more information, see Enabling OpenTelemetry tracing in JBoss EAP.
Procedure
Set the exporter type for the traces.
Syntax
/subsystem=opentelemetry:write-attribute(name=exporter-type, value=<exporter_type>)
/subsystem=opentelemetry:write-attribute(name=exporter-type, value=<exporter_type>)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
/subsystem=opentelemetry:write-attribute(name=exporter-type, value=otlp)
/subsystem=opentelemetry:write-attribute(name=exporter-type, value=otlp)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Set the endpoint at which to export the traces.
Syntax
/subsystem=opentelemetry:write-attribute(name=endpoint, value=<URL:port>)
/subsystem=opentelemetry:write-attribute(name=endpoint, value=<URL:port>)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
/subsystem=opentelemetry:write-attribute(name=endpoint, value=http://localhost:4317)
/subsystem=opentelemetry:write-attribute(name=endpoint, value=http://localhost:4317)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Set the service name under which the traces are exported.
Syntax
/subsystem=opentelemetry:write-attribute(name=service-name, value=<service_name>)
/subsystem=opentelemetry:write-attribute(name=service-name, value=<service_name>)Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
/subsystem=opentelemetry:write-attribute(name=service-name, value=exampleOpenTelemetryService)
/subsystem=opentelemetry:write-attribute(name=service-name, value=exampleOpenTelemetryService)Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 14. Reference Copy linkLink copied to clipboard!
14.1. MicroProfile Config reference Copy linkLink copied to clipboard!
14.1.1. Default MicroProfile Config attributes Copy linkLink copied to clipboard!
The MicroProfile Config specification defines three ConfigSources by default.
ConfigSources are sorted according to their ordinal number. If a configuration must be overwritten for a later deployment, the lower ordinal ConfigSource is overwritten before a higher ordinal ConfigSource.
ConfigSource | Ordinal |
|---|---|
| System properties |
|
| Environment variables |
|
|
Property files |
|
14.1.2. MicroProfile Config SmallRye ConfigSources Copy linkLink copied to clipboard!
The microprofile-config-smallrye project defines more ConfigSources you can use in addition to the default MicroProfile Config ConfigSources.
ConfigSource | Ordinal |
|---|---|
|
|
|
|
|
|
|
|
|
An explicit ordinal is not specified for these ConfigSources. They inherit the default ordinal value found in the MicroProfile Config specification.
14.2. MicroProfile Fault Tolerance reference Copy linkLink copied to clipboard!
14.2.1. MicroProfile Fault Tolerance configuration properties Copy linkLink copied to clipboard!
SmallRye Fault Tolerance specification defines the following properties in addition to the properties defined in the MicroProfile Fault Tolerance specification.
| Property | Default value | Description |
|---|---|---|
|
|
| Maximum number of threads in the thread pool. |
|
|
| Size of the queue that the thread pool should use. |
14.3. MicroProfile JWT reference Copy linkLink copied to clipboard!
14.3.1. MicroProfile Config JWT standard properties Copy linkLink copied to clipboard!
The microprofile-jwt-smallrye subsystem supports the following MicroProfile Config standard properties.
| Property | Default | Description |
|---|---|---|
| mp.jwt.verify.publickey | NONE |
String representation of the public key encoded using one of the supported formats. Do not set if you have set |
| mp.jwt.verify.publickey.location | NONE |
The location of the public key, may be a relative path or URL. Do not be set if you have set |
| mp.jwt.verify.issuer | NONE |
The expected value of any |
Example microprofile-config.properties configuration:
mp.jwt.verify.publickey.location=META-INF/public.pem mp.jwt.verify.issuer=jwt-issuer
mp.jwt.verify.publickey.location=META-INF/public.pem
mp.jwt.verify.issuer=jwt-issuer
14.4. MicroProfile OpenAPI reference Copy linkLink copied to clipboard!
14.4.1. MicroProfile OpenAPI configuration properties Copy linkLink copied to clipboard!
In addition to the standard MicroProfile OpenAPI configuration properties, JBoss EAP supports the following additional MicroProfile OpenAPI properties. These properties can be applied in both the global and the application scope.
| Property | Default value | Description |
|---|---|---|
|
|
| Enables or disables registration of an OpenAPI endpoint.
When set to
You can parameterize this property to selectively enable or disable You can use this property to control which application associated with a given virtual host should generate a MicroProfile OpenAPI model. |
|
|
| You can use this property for generating OpenAPI documentation for multiple applications associated with a virtual host.
Set a distinct |
|
|
| Indicates whether auto-generated server records are absolute or relative to the location of the OpenAPI endpoint. Server records are necessary to ensure, in the presence of a non-root context path, that consumers of an OpenAPI document can construct valid URLs to REST services relative to the host of the OpenAPI endpoint.
The value
When set to |
14.5. MicroProfile Reactive Messaging reference Copy linkLink copied to clipboard!
14.5.1. MicroProfile reactive messaging connectors for integrating with external messaging systems Copy linkLink copied to clipboard!
The following is a list of reactive messaging property key prefixes required by the MicroProfile Config specification:
-
mp.messaging.incoming.[channel-name].[attribute]=[value] -
mp.messaging.outgoing.[channel-name].[attribute]=[value] -
mp.messaging.connector.[connector-name].[attribute]=[value]
Note that channel-name is either the @Incoming.value() or the @Outgoing.value(). For clarification, look at this example of a pair of connector methods:
In this example, the required property prefixes are as follows:
-
mp.messaging.incoming.from. This defines thereceive()method. -
mp.messaging.outgoing.to. This defines thesend()method.
Remember that this is an example. Because different connectors recognize different properties, the prefixes you indicate depend on the connector you want to configure.
14.5.2. Example of the data exchange between reactive messaging streams and user-initialized code Copy linkLink copied to clipboard!
The following is an example of data exchange between reactive messaging streams and code that a user triggered through the @Channel and Emitter constructs:
In-line details:
- 1
- Wraps the constructor-injected publisher.
- 2
- You need this empty constructor to satisfy the Contexts and Dependency Injection (CDI) for Java specification.
- 3
- Subscribe to the delegate.
- 4
- Wrap the delegate in a publisher that can handle multiple subscriptions.
- 5
- The wrapping publisher forwards data from the delegate.
- 6
- Unsubscribe from the reactive messaging-provided publisher.
In this example, MicroProfile Reactive Messaging is listening to the my-stream memory stream, so messages sent through the Emitter are received on this injected publisher. Note, though, that the following conditions must be true for this data exchange to succeed:
-
There must be an active subscription on the channel before you call
Emitter.send(). In this example, notice that thesubscribeAndAllowMultipleSubscriptions()method called by the constructor ensures that there’s an active subscription by the time the bean is available for user code calls. -
You can have only one
Subscriptionon the injectedPublisher. If you want to expose the receiving publisher with a REST call, where each call to thepoll()method results in a new subscription to thedestpublisher, you have to implement your own publisher to broadcast data from the injected to each client.
14.5.3. The Apache Kafka user API Copy linkLink copied to clipboard!
You can use the Apache Kafka user API to get more information about messages Kafka received, and to influence how Kafka handles messages. This API is stored in the io/smallrye/reactive/messaging/kafka/api package, and it consists of the following classes:
IncomingKafkaRecordMetadata. This metadata contains the following information:-
The Kafka record
key, represented by aMessage. -
The Kafka
topicandpartitionused for theMessage, and theoffsetwithin those. -
The
MessagetimestampandtimestampType. -
The
Messageheaders. These are pieces of information that the application can attach on the producing side, and receive on the consuming side.
-
The Kafka record
OutgoingKafkaRecordMetadata. With this metadata, you can specify or override how Kafka handles messages. It contains the following information:-
The
key. which Kafka treats as the message key. -
The
topicyou want Kafka to use. -
The
partition. -
The
timestamp, if you don’t want the one that Kafka generates. -
headers.
-
The
-
KafkaMetadataUtilcontains utility methods to writeOutgoingKafkaRecordMetadatato aMessage, and to readIncomingKafkaRecordMetadatafrom aMessage.
If you write OutgoingKafkaRecordMetadata to a Message sent to a channel that’s not mapped to Kafka, the reactive messaging framework ignores it. Conversely, if you read IncomingKafkaRecordMetadata from a Message from a channel that’s not mapped to Kafka, that message returns as null.
Example of how to write and read a message key
Example of Kafka mapping in a microprofile-config.properties file
You must specify the key.serializer for the outgoing channel and the key.deserializer for the incoming channel.
14.5.4. Example MicroProfile Config properties file for the Kafka connector Copy linkLink copied to clipboard!
This is an example of a simple microprofile-config.properties file for a Kafka connector. Its properties correspond to the properties in the example in "MicroProfile reactive messaging connectors for integrating with external messaging systems."
| Entry | Description |
|---|---|
|
| These are "channels." |
|
| These are "methods."
Note that the |
|
|
This specifies the URL of the Kafka broker that the application must connect to. You can also specify a URL at the channel level, like this: |
|
|
This indicates that you want the
SmallRye reactive messaging is a framework for building applications. Note that the |
|
|
This indicates that you want to send data to a Kafka topic called A Kafka "topic" is a category or feed name that messages are stored on and published to. All Kafka messages are organized into topics. Producer applications write data to topics and consumer applications read data from topics. |
|
|
This tells the connector to use |
|
|
This indicates that you want to use the |
|
|
This indicates that your connector should read data from the Kafka topic called |
|
|
This tells the connector to use |
This list of properties is not comprehensive. See the SmallRye Reactive Messaging Apache Kafka documentation for more information.
Mandatory MicroProfile Reactive Messaging prefixes
The MicroProfile Reactive Messaging specification requires the following method property key prefixes for Kafka:
-
mp.messaging.incoming.[channel-name].[attribute]=[value]` -
mp.messaging.outgoing.[channel-name].[attribute]=[value]` -
mp.messaging.connector.[connector-name].[attribute]=[value]`
Note that channel-name is either the @Incoming.value() or the @Outgoing.value().
Now consider the following method pair example:
In this method pair example, note the following required property prefixes:
-
mp.messaging.incoming.from. This prefix selects the property as your configuration of thereceive()method. -
mp.messaging.outgoing.to. This prefix selects the property as your configuration of thesend()method.
14.5.4.1. Configuring a secure MicroProfile Reactive Messaging Apache Kafka connector Copy linkLink copied to clipboard!
To configure an Apache Kafka connector client using a self-signed certificate, define the client-ssl-context in the microprofile-config.properties file. You can do this on the connector and channel levels.
The following examples demonstrate how to configure an Apache Kafka connector secured with SSL/TLS.
Example of connector level client-ssl-context definition
mp.messaging.incoming.from.security.protocol=SSL mp.messaging.outgoing.to.security.protocol=SSL mp.messaging.connector.smallrye-kafka.wildfly.elytron.ssl.context=exampleSSLContext
mp.messaging.incoming.from.security.protocol=SSL
mp.messaging.outgoing.to.security.protocol=SSL
mp.messaging.connector.smallrye-kafka.wildfly.elytron.ssl.context=exampleSSLContext
The attribute mp.messaging.connector.smallrye-kafka.wildfly.elytron.ssl.context is only required when you use self-signed certificates.
Do not use self-signed certificates in a production environment. Use only the certificates signed by a Certificate Authority (CA).
You can specify the client-ssl-context for a channel as follows:
Example of channel-level client-ssl-context definition
mp.messaging.incoming.from.wildfly.elytron.ssl.context=exampleSSLContext
mp.messaging.incoming.from.wildfly.elytron.ssl.context=exampleSSLContext
In the example, the exampleSSLContext is associated only with the incoming channel from.
| Entry | Description |
|---|---|
|
| This specifies that we want to use a secure incoming channel connection when connecting to the broker. |
|
| This specifies that we want to use a secure outgoing channel connection when connecting to the broker. |
|
| You do not need to specify this attribute if the Kafka broker is secured with a Certificate Authority (CA)-signed certificate. |
If you use a self-signed certificate, specify the SSLContext that is defined in the Elytron subsystem under /subsystem=elytron/client-ssl-context=* in the management model.
Do not use self-signed certificates in a production environment. Use only the certificates signed by a Certificate Authority (CA).
You can define client-ssl-context by using the following management CLI command:
Example
/subsystem=elytron/client-ssl-context=exampleSSLContext:add(key-manager=exampleServerKeyManager,trust-manager=exampleTLSTrustManager)
/subsystem=elytron/client-ssl-context=exampleSSLContext:add(key-manager=exampleServerKeyManager,trust-manager=exampleTLSTrustManager)
When a SSL/TLS connection is used with SCRAM-SHA-512 authentication, the SSL/TLS protocol provides the encryption, but is not used for authentication. To authenticate your connection with SCRAM-SHA-512 protocol, see Configure MicroProfile Reactive Messagaging Kafka connector to use SASL_PLAINTEXT and SASL_SSL authentication protocols.
14.5.4.2. Configuring MicroProfile Reactive Messagaging Kafka connector to use SASL_PLAINTEXT and SASL_SSL authentication protocols Copy linkLink copied to clipboard!
Apache Kafka uses the Simple Authentication and Security Layer (SASL) protocol to authenticate clients that are connecting to Apache Kafka listeners. You can configure listeners to use unencrypted plain type and encrypted tls type communication. Streams for Apache Kafka uses SASL in combination with Salted Challenged Response Authentication Mechanism (SCRAM) protocol (SASL SCRAM-SHA-512) to provide authentication. You must define a Kafka custom resource and KafkaUser custom resource YAML files to configure authentication for both types of listeners.
If SASL is configured on the server, that is, Kafka listeners are configured to use SCRAM-SHA-512 authentication, the client must specify the security protocol. If connecting to a listener encrypted with TLS, this protocol should be SASL_SSL. If the listener is not encrypted, the protocol should be SASL_PLAINTEXT. The client configuration must specify the SASL mechanism by setting it to use SCRAM-SHA-512.
When SCRAM-SHA-512 authentication is used with a SSL/TLS connection, the SSL/TLS protocol provides the encryption, but is not used for authentication. To secure your connection with SSL/TLS, see Configuring a secure MicroProfile Reactive Messaging Apache Kafka connector.
Set up a client authentication for a listener that uses plain type unencrypted communication and SASL SCRAM-SHA-512 authentication.
Prerequisites
Streams for Apache Kafka cluster operator is installed.
NoteThe cluster operator generates a
Secretresource by default. Theusernameandpasswordin the client configuration must match the username and password defined by theSecretresourceFor more information about creating a custom
Secretresource, see Custom password configuration.For more information about
Secretresources generated by operators, see Secrets generated by the operators.
Procedure
Define your Kafka custom resource as a YAML file:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Define your KafkaUser custom resource as a YAML file:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The KafkaUser
.authenticationdefinition should match thelistener.authenticationdefinition.Configure your client in the
microprofile-config.propertiesfile:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
usernameandpasswordmust match the username and password in theSecretresource generated by the cluster operator.
14.5.5. Example MicroProfile Config properties file for the AMQP connector Copy linkLink copied to clipboard!
This is an example of a simple microprofile-config.properties file for an Advanced Message Queuing Protocol (AMQP) connector. Its properties correspond to the properties in the example in MicroProfile reactive messaging connectors for integrating with external messaging systems.
| Entry | Description |
|---|---|
|
| These are "channels." |
|
| These are "methods."
Note that the |
|
|
This specifies the URL of the AMQP broker that the application must connect to. You can also specify a URL at the channel level, like this: |
|
| This specifies the port of the AMQP broker. |
|
| This indicates that you want the channel to send messages to AMQP.
SmallRye reactive messaging is a framework for building applications. Note that the |
|
|
This indicates that you want to send data to an AMQP queue on the address |
|
|
This indicates that you want to use the |
|
|
This indicates that you want to read data from the AMQP queue |
For a complete list of properties supported by the SmallRye Reactive Messaging’s AMQP connector, see SmallRye Reactive Messaging AMQP Connector Configuration Reference.
Connecting to a secure AMQP broker
To connect with an AMQ broker secured with SSL/TLS and Simple Authentication and Security Layer (SASL), define the client-ssl-context to be used for the connection, in the microprofile-config.properties file. You can do this on connector level and also on channel level.
Example of connector level client-ssl-context definition
amqp-use-ssl=true mp.messaging.connector.smallrye-amqp.wildfly.elytron.ssl.context=exampleSSLContext
amqp-use-ssl=true
mp.messaging.connector.smallrye-amqp.wildfly.elytron.ssl.context=exampleSSLContext
The attribute mp.messaging.connector.smallrye-amqp.wildfly.elytron.ssl.context is only required when you use self-signed certificates.
Do not use self-signed certificates in a production environment. Use only the certificates signed by a certificate authority (CA).
You can also specify the client-ssl-context for a channel as follows:
Example of channel-level client-ssl-context definition
mp.messaging.incoming.from.wildfly.elytron.ssl.context=exampleSSLContext
mp.messaging.incoming.from.wildfly.elytron.ssl.context=exampleSSLContext
In the example, the exampleSSLContext is associated only with the incoming channel from.
| Entry | Description |
|---|---|
|
| This specifies that we want to use a secure connection when connecting to the broker. |
|
| You do not need to specify this attribute if the AMQ broker is secured with a Certificate Authority (CA)-signed certificate.
If you use a self-signed certificate, specify the Important Do not use self-signed certificates in a production environment. Use only the certificates signed by a certificate authority (CA).
You can define
/subsystem=elytron/client-ssl-context=exampleSSLContext:add(key-manager=exampleServerKeyManager,trust-manager=exampleTLSTrustManager)
For more information, see Configuring a trust store and a trust manager for client certificates, Configuring a server certificate for two-way SSL/TLS in the Configuring SSL/TLS in JBoss EAP guide. |
14.6. OpenTelemetry reference Copy linkLink copied to clipboard!
14.6.1. OpenTelemetry subsystem attributes Copy linkLink copied to clipboard!
You can modify opentelemetry subsystem attributes to configure its behavior. The attributes are grouped by the aspect they configure: exporter, sampler, and span processor.
| Attribute | Description | Default value |
|---|---|---|
|
| The URL to which OpenTelemetry pushes traces. Set this to the URL where your exporter listens. | |
|
| The exporter to which traces are sent. It can be one of the following:
|
|
| Attribute | Description | Default value |
|---|---|---|
|
|
The ratio of traces to export. The value must be between |
|
| Attribute | Description | Default value |
|---|---|---|
|
|
The interval in milliseconds between two consecutive exports by JBoss EAP. This attribute only takes effect if you set the attribute |
|
|
| The maximum amount of time in milliseconds to allow for an export to complete before being cancelled. |
|
|
|
The maximum number of traces that are published in each batch. This number should be should be lesser or equal to the value of |
|
|
|
The maximum number of traces to queue before exporting. If an application creates more traces, they are not recorded. This attribute only takes effect if you set the attribute |
|
|
| The type of span processor to use. The value can be one of the following:
|
|