- Introduction to High Availability Services
- HTTP Services
- Subsystem Support
- Configuration example
- Use Cases
- Configuration Example
- Use Cases
- Clustered Web Sessions
- Clustered SSO
- Load Balancing
- Load balancing with Apache + mod_jk
- Load balancing with Apache + mod_cluster
- EJB Services
- Related Issues
- Changes From Previous Versions
- WildFly 8 Domain Cluster Howto
- Preparation & Scenario
- Download WildFly 8
- Domain Configuration
- Cluster Configuration
- Special Thanks
- WildFly 8 LB HA Standalone Cluster Howto
- All WildFly 8 documentation
WildFly's High Availability services are used to guarantee availability of a deployed Java EE application.
Deploying critical applications on a single node suffers from two potential problems:
- loss of application availability when the node hosting the application crashes (single point of failure)
- loss of application availability in the form of extreme delays in response time during high volumes of requests (overwhelmed server)
WildFly supports two features which ensure high availability of critical Java EE applications:
- fail-over: allows a client interacting with a Java EE application to have uninterrupted access to that application, even in the presence of node failures
- load balancing: allows a client to have timely responses from the application, even in the presence of high-volumes of requests
|These two independent high availability services can very effectively inter-operate when making use of mod_cluster for load balancing!|
Taking advantage of WildFly's high availability services is easy, and simply involves deploying WildFly on a cluster of nodes, making a small number of application configuration changes, and then deploying the application in the cluster.
We now take a brief look at what these services can guarantee.
Fail-over allows a client interacting with a Java EE application to have uninterrupted access to that application, even in the presence of node failures. For example, consider a Java EE application which makes use of the following features:
- session-oriented servlets to provide user interaction
- session-oriented EJBs to perform state-dependent business computation
- EJB entity beans to store critical data in a persistent store (e.g. database)
- SSO login to the application
If the application makes use of WildFly's fail-over services, a client interacting with an instance of that application will not be interrupted even when the node on which that instance executes crashes. Behind the scenes, WildFly makes sure that all of the user data that the application make use of (HTTP session data, EJB SFSB sessions, EJB entities and SSO credentials) are available at other nodes in the cluster, so that when a failure occurs and the client is redirected to that new node for continuation of processing (i.e. the client "fails over" to the new node), the user's data is available and processing can continue.
The Infinispan and JGroups subsystems are instrumental in providing these data availability guarantees and will be discussed in detail later in the guide.
Load balancing enables the application to respond to client requests in a timely fashion, even when subjected to a high-volume of requests. Using a load balancer as a front-end, each incoming HTTP request can be directed to one node in the cluster for processing. In this way, the cluster acts as a pool of processing nodes and the load is "balanced" over the pool, achieving scalability and, as a consequence, availability. Requests involving session-oriented servlets are directed to the the same application instance in the pool for efficiency of processing (sticky sessions). Using mod_cluster has the advantage that changes in cluster topology (scaling the pool up or down, servers crashing) are communicated back to the load balancer and used to update in real time the load balancing activity and avoid requests being directed to application instances which are no longer available.
The mod_cluster subsystem is instrumental in providing support for this High Availability feature of WildFly and will be discussed in detail later in this guide.
This guide aims to:
- provide a description of the high-availability features available in WildFly and the services they depend on
- show how the various high availability services can be configured for particular application use cases
- identify default behavior for features relating to high-availability/clustering
As high availability features and their configuration depend on the particular component they affect (e.g. HTTP sessions, EJB SFSB sessions, Hibernate), we organize the discussion around those Java EE features. We strive to make each section as self-contained as possible. Also, when discussing a feature, we will introduce any WildFly subsystems upon which the feature depends.
This section summarises the HTTP-based clustering features.
This section describes the key clustering subsystems, JGroups and Infinispan. Say a few words about how they work together.
The JGroups subsystem provides group communication support for HA services in the form of JGroups channels.
Named channel instances permit application peers in a cluster to communicate as a group and in such a way that the communication satisfies defined properties (e.g. reliable, ordered, failure-sensitive). Communication properties are configurable for each channel and are defined by the protocol stack used to create the channel. Protocol stacks consist of a base transport layer (used to transport messages around the cluster) together with a user-defined, ordered stack of protocol layers, where each protocol layer supports a given communication property.
The JGroups subsystem provides the following features:
- allows definition of named protocol stacks
- view run-time metrics associated with channels
- specify a default stack for general use
In the following sections, we describe the JGroups subsystem.
|JGroups channels are created transparently as part of the clustering functionality (e.g. on clustered application deployment, channels will be created behind the scenes to support clustered features such as session replication or transmission of SSO contexts around the cluster).|
What follows is a sample JGroups subsystem configuration showing all of the possible elements and attributes which may be configured. We shall use this example to explain the meaning of the various elements and attributes.
|The schema for the subsystem, describing all valid elements and attributes, can be found in the Wildfly distribution, in the docs/schema directory.|
This element is used to configure the subsystem within a Wildfly system profile.
- xmlns This attribute specifies the XML namespace of the JGroups subsystem and, in particular, its version.
- default-stack This attribute is used to specify a default stack for the JGroups subsystem. This default stack will be used whenever a stack is required but no stack is specified.
This element is used to configure a JGroups protocol stack.
- name This attribute is used to specify the name of the stack.
This element is used to configure the transport layer (required) of the protocol stack.
- type This attribute specifies the transport type (e.g. UDP, TCP, TCPGOSSIP)
- socket-binding This attribute references a defined socket binding in the server profile. It is used when JGroups needs to create general sockets internally.
- diagnostics-socket-binding This attribute references a defined socket binding in the server profile. It is used when JGroups needs to create sockets for use with the diagnostics program. For more about the use of diagnostics, see the JGroups documentation for probe.sh.
- default-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks to handle incoming JGroups messages.
- oob-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks to handle incoming JGroups OOB (out-of-bound) messages.
- timer-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable timer-related tasks.
- shared This attribute indicates whether or not this transport is shared amongst several JGroups stacks or not.
- thread-factory This attribute references a defined thread factory in the threads subsystem. It governs the allocation of threads for running tasks which are not handled by the executors above.
- site This attribute defines a site (data centre) id for this node.
- rack This attribute defines a rack (server rack) id for this node.
- machine This attribute defines a machine (host) is for this node.
|site, rack and machine ids are used by the Infinispan topology-aware consistent hash function, which when using dist mode, prevents dist mode replicas from being stored on the same host, rack or site|
This element is used to configure a transport property.
- name This attribute specifies the name of the protocol property. The value is provided as text for the property element.
This element is used to configure a (non-transport) protocol layer in the JGroups stack. Protocol layers are ordered within the stack.
- type This attribute specifies the name of the JGroups protocol implementation (e.g. MPING, pbcast.GMS), with the package prefix org.jgroups.protocols removed.
- socket-binding This attribute references a defined socket binding in the server profile. It is used when JGroups needs to create general sockets internally for this protocol instance.
This element is used to configure a protocol property.
- name This attribute specifies the name of the protocol property. The value is provided as text for the property element.
This element is used to configure the RELAY protocol for a JGroups stack. RELAY is a protocol which provides cross-site replication between defined sites (data centres). In the RELAY protocol, defined sites specify the names of remote sites (backup sites) to which their data should be backed up. Channels are defined between sites to permit the RELAY protocol to transport the data from the current site to a backup site.
- site This attribute specifies the name of the current site. Site names can be referenced elsewhere (e.g. in the JGroups remote-site configuration elements, as well as backup configuration elements in the Infinispan subsystem)
This element is used to configure a remote site for the RELAY protocol.
- name This attribute specifies the name of the remote site to which this configuration applies.
- stack This attribute specifies a JGroups protocol stack to use for communication between this site and the remote site.
- cluster This attribute specifies the name of the JGroups channel to use for communication between this site and the remote site.
In many cases, channels will be configured via XML as in the example above, so that the channels will be available upon server startup. However, channels may also be added, removed or have their configurations changed in a running server by making use of the Wildfly management API command-line interface (CLI). In this section, we present some key use cases for the JGroups management API.
The key use cases covered are:
- adding a stack
- adding a protocol to an existing stack
- adding a property to a protocol
|The Wildfly management API command-line interface (CLI) itself can be used to provide extensive information on the attributes and commands available in the JGroups subsystem interface used in these examples.|
The Infinispan subsystem provides caching support for HA services in the form of Infinispan caches: high-performance, transactional caches which can operate in both non-distributed and distributed scenarios. Distributed caching support is used in the provision of many key HA services. For example, the failover of a session-oriented client HTTP request from a failing node to a new (failover) node depends on session data for the client being available on the new node. In other words, the client session data needs to be replicated across nodes in the cluster. This is effectively achieved via a distributed Infinispan cache. This approach to providing fail-over also applies to EJB SFSB sessions. Over and above providing support for fail-over, an underlying cache is also required when providing second-level caching for entity beans using Hibernate, and this case is also handled through the use of an Infinispan cache.
The Infinispan subsystem provides the following features:
In the following sections, we describe the Infinispan subsystem.
In this section, we provide an example XML configuration of the infinispan subsystem and review the configuration elements and attributes.
This element is used to configure a cache container.
- name This attribute is used to specify the name of the cache container.
- default-cache This attribute configures the default cache to be used, when no cache is otherwise specified.
- listener-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks in the replication queue.
- eviction-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks to handle evictions.
- replication-queue-executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks to handle asynchronous cache operations.
- jndi-name This attribute is used to assign a name for the cache container in the JNDI name service.
- module This attribute configures the module whose class loader should be used when building this cache container's configuration.
- start This attribute configures the cache container start mode, which can be EAGER (immediate start) or LAZY (on-demand start).
- aliases This attribute is used to define aliases for the cache container name.
- statistics-enabled This attribute configures statistics collection. If true, statistics on this cache container will be gathered and available via JMX. Cache-level statistics must be enabled on a per-cache basis. For more information, see the Infinispan JMX documentation.
This element has the following child elements: <transport>, <local-cache>, <invalidation-cache>, <replicated-cache>, and <distributed-cache>.
This element is used to configure the JGroups transport used by the cache container, when required.
- stack This attribute configures the JGroups stack to be used for the transport. If none is specified, the default-stack for the JGroups subsystem is used.
- cluster This attribute configures the name of the group communication cluster. This is the name which will be seen in debugging logs.
- executor This attribute references a defined thread pool executor in the threads subsystem. It governs the allocation and execution of runnable tasks to handle ?<fill me in>?.
- lock-timeout This attribute configures the time-out to be used when obtaining locks for the transport.
- site This attribute configures the site id of the cache container.
- rack This attribute configures the rack id of the cache container.
- machine This attribute configures the machine id of the cache container.
The presence of the transport element is required when operating in clustered mode
The remaining child elements of <cache-container>, namely <local-cache>, <invalidation-cache>, <replicated-cache> and <distributed-cache>, each configures one of four key cache types or classifications.
|These cache-related elements are actually part of an xsd hierarchy with abstract complexTypes cache, clustered-cache, and shared-cache. In order to simplify the presentation, we notate these as pseudo-elements <abstract cache>, <abstract clustered-cache> and <abstract shared-cache>. In what follows, we first describe the extension hierarchy of base elements, and then show how the cache type elements relate to them.|
This abstract base element defines the attributes and child elements common to all non-clustered caches.
- name This attribute configures the name of the cache. This name may be referenced by other subsystems.
- start This attribute configures the cache start mode, which can be EAGER (immediate start) or LAZY (on-demand start).
- batching This attribute configures batching. If enabled, the invocation batching API will be made available for this cache.
- indexing This attribute configures indexing. If enabled, entries will be indexed when they are added to the cache. Indexes will be updated as entries change or are removed.
- jndi-name This attribute is used to assign a name for the cache in the JNDI name service.
- module This attribute configures the module whose class loader should be used when building this cache container's configuration.
- statistics-enabled This attribute configures statistics collection. If true, statistics on this cache will be gathered and available via JMX. For more information, see the Infinispan JMX documentation.
The <abstract cache> abstract base element has the following child elements: <indexing-properties>, <locking>, <transaction>, <eviction>, <expiration>, <store>, <file-store>, <string-keyed-jdbc-store>, <binary-keyed-jdbc-store>, <mixed-keyed-jdbc-store>, <remote-store>.
This child element defines properties to control indexing behaviour.
This child element configures the locking behaviour of the cache.
- isolation This attribute the cache locking isolation level. Allowable values are NONE, SERIALIZABLE, REPEATABLE_READ, READ_COMMITTED, READ_UNCOMMITTED.
- striping If true, a pool of shared locks is maintained for all entries that need to be locked. Otherwise, a lock is created per entry in the cache. Lock striping helps control memory footprint but may reduce concurrency in the system.
- acquire-timeout This attribute configures the maximum time to attempt a particular lock acquisition.
- concurrency-level This attribute is used to configure the concurrency level. Adjust this value according to the number of concurrent threads interacting with Infinispan.
This child element configures the transactional behaviour of the cache.
- mode This attribute configures the transaction mode, setting the cache transaction mode to one of NONE, NON_XA, NON_DURABLE_XA, FULL_XA.
- stop-timeout If there are any ongoing transactions when a cache is stopped, Infinispan waits for ongoing remote and local transactions to finish. The amount of time to wait for is defined by the cache stop timeout.
- locking This attribute configures the locking mode for this cache, one of OPTIMISTIC or PESSIMISTIC.
This child element configures the eviction behaviour of the cache.
- strategy This attribute configures the cache eviction strategy. Available options are 'UNORDERED', 'FIFO', 'LRU', 'LIRS' and 'NONE' (to disable eviction).
- max-entries This attribute configures the maximum number of entries in a cache instance. If selected value is not a power of two the actual value will default to the least power of two larger than selected value. -1 means no limit.
This child element configures the expiration behaviour of the cache.
- max-idle This attribute configures the maximum idle time a cache entry will be maintained in the cache, in milliseconds. If the idle time is exceeded, the entry will be expired cluster-wide. -1 means the entries never expire.
- lifespan This attribute configures the maximum lifespan of a cache entry, after which the entry is expired cluster-wide, in milliseconds. -1 means the entries never expire.
- interval This attribute specifies the interval (in ms) between subsequent runs to purge expired entries from memory and any cache stores. If you wish to disable the periodic eviction process altogether, set wakeupInterval to -1.
The remaining child elements of the abstract base element <cache>, namely <store>, <file-store>, <remote-store>, <string-keyed-jdbc-store>, <binary-keyed-jdbc-store> and <mixed-keyed-jdbc-store>, each configures one of six key cache store types.
|These cache store-related elements are actually part of an xsd extension hierarchy with abstract complexTypes base-store and base-jdbc-store. As before, in order to simplify the presentation, we notate these as pseudo-elements <abstract base-store> and <abstract base-jdbc-store>. In what follows, we first describe the extension hierarchy of base elements, and then show how the cache store elements relate to them.|
This abstract base element defines the attributes and child elements common to all cache stores.
- shared This attribute should be set to true when multiple cache instances share the same cache store (e.g. multiple nodes in a cluster using a JDBC-based CacheStore pointing to the same, shared database) Setting this to true avoids multiple cache instances writing the same modification multiple times. If enabled, only the node where the modification originated will write to the cache store. If disabled, each individual cache reacts to a potential remote update by storing the data to the cache store.
- preload This attribute configures whether or not, when the cache starts, data stored in the cache loader will be pre-loaded into memory. This is particularly useful when data in the cache loader is needed immediately after start-up and you want to avoid cache operations being delayed as a result of loading this data lazily. Can be used to provide a 'warm-cache' on start-up, however there is a performance penalty as start-up time is affected by this process. Note that pre-loading is done in a local fashion, so any data loaded is only stored locally in the node. No replication or distribution of the preloaded data happens. Also, Infinispan only pre-loads up to the maximum configured number of entries in eviction.
- passivation If true, data is only written to the cache store when it is evicted from memory, a phenomenon known as passivation. Next time the data is requested, it will be 'activated' which means that data will be brought back to memory and removed from the persistent store. If false, the cache store contains a copy of the cache contents in memory, so writes to cache result in cache store writes. This essentially gives you a 'write-through' configuration.
- fetch-state This attribute, if true, causes persistent state to be fetched when joining a cluster. If multiple cache stores are chained, only one of them can have this property enabled.
- purge This attribute configures whether the cache store is purged upon start-up.
- singleton This attribute configures whether or not the singleton store cache store is enabled. SingletonStore is a delegating cache store used for situations when only one instance in a cluster should interact with the underlying store.
- class This attribute configures a custom store implementation class to use for this cache store.
- properties This attribute is used to configure a list of cache store properties.
The abstract base element has one child element: <write-behind>
This element is used to configure a cache store as write-behind instead of write-through. In write-through mode, writes to the cache are also synchronously written to the cache store, whereas in write-behind mode, writes to the cache are followed by asynchronous writes to the cache store.
- flush-lock-timeout This attribute configures the time-out for acquiring the lock which guards the state to be flushed to the cache store periodically.
- modification-queue-size This attribute configures the maximum number of entries in the asynchronous queue. When the queue is full, the store becomes write-through until it can accept new entries.
- shutdown-timeout This attribute configures the time-out (in ms) to stop the cache store.
- thread-pool This attribute is used to configure the size of the thread pool whose threads are responsible for applying the modifications to the cache store.
This abstract base element defines the attributes and child elements common to all JDBC-based cache stores.
- datasource This attribute configures the datasource for the JDBC-based cache store.
- entry-table This attribute configures the database table used to store cache entries.
- bucket-table This attribute configures the database table used to store binary cache entries.
This child element is used to configure a file-based cache store. This requires specifying the name of the file to be used as backing storage for the cache store.
- relative-to This attribute optionally configures a relative path prefix for the file store path. Can be null.
- path This attribute configures an absolute path to a file if relative-to is null; configures a relative path to the file, in relation to the value for relative-to, otherwise.
This child element of cache is used to configure a remote cache store. It has a child <remote-servers>.
- cache This attribute configures the name of the remote cache to use for this remote store.
- tcp-nodelay This attribute configures a TCP_NODELAY value for communication with the remote cache.
- socket-timeout This attribute configures a socket time-out for communication with the remote cache.
This child element of cache configures a list of remote servers for this cache store.
This element configures a remote server. A remote server is defined completely by a locally defined outbound socket binding, through which communication is made with the server.
- outbound-socket-binding This attribute configures an outbound socket binding for a remote server.
This element configures a local cache.
This abstract base element defines the attributes and child elements common to all clustered caches. A clustered cache is a cache which spans multiple nodes in a cluster. It inherits from <cache>, so that all attributes and elements of <cache> are also defined for <clustered-cache>.
- async-marshalling This attribute configures async marshalling. If enabled, this will cause marshalling of entries to be performed asynchronously.
- mode This attribute configures the clustered cache mode, ASYNC for asynchronous operation, or SYNC for synchronous operation.
- queue-size In ASYNC mode, this attribute can be used to trigger flushing of the queue when it reaches a specific threshold.
- queue-flush-interval In ASYNC mode, this attribute controls how often the asynchronous thread used to flush the replication queue runs. This should be a positive integer which represents thread wakeup time in milliseconds.
- remote-timeout In SYNC mode, this attribute (in ms) used to wait for an acknowledgement when making a remote call, after which the call is aborted and an exception is thrown.
This element configures an invalidation cache.
This abstract base element defines the attributes and child elements common to all shared caches. A shared cache is a clustered cache which shares state with its cache peers in the cluster. It inherits from <clustered-cache>, so that all attributes and elements of <clustered-cache> are also defined for <shared-cache>.
- enabled If enabled, this will cause the cache to ask neighbouring caches for state when it starts up, so the cache starts 'warm', although it will impact start-up time.
- timeout This attribute configures the maximum amount of time (ms) to wait for state from neighbouring caches, before throwing an exception and aborting start-up.
- chunk-size This attribute configures the size, in bytes, in which to batch the transfer of cache entries.
- strategy This attribute configures the backup strategy for this cache. Allowable values are SYNC, ASYNC.
- failure-policy This attribute configures the policy to follow when connectivity to the backup site fails. Allowable values are IGNORE, WARN, FAIL, CUSTOM.
- enabled This attribute configures whether or not this backup is enabled. If enabled, data will be sent to the backup site; otherwise, the backup site will be effectively ignored.
- timeout This attribute configures the time-out for replicating to the backup site.
- after-failures This attribute configures the number of failures after which this backup site should go off-line.
- min-wait This attribute configures the minimum time (in milliseconds) to wait after the max number of failures is reached, after which this backup site should go off-line.
- remote-cache This attribute configures the name of the remote cache for which this cache acts as a backup.
- remote-site This attribute configures the site of the remote cache for which this cache acts as a backup.
This element configures a replicated cache. With a replicated cache, all contents (key-value pairs) of the cache are replicated on all nodes in the cluster.
This element configures a distributed cache. With a distributed cache, contents of the cache are selectively replicated on nodes in the cluster, according to the number of owners specified.
- owners This attribute configures the number of cluster-wide replicas for each cache entry.
- segments This attribute configures the number of hash space segments which is the granularity for key distribution in the cluster. Value must be strictly positive.
- l1-lifespan This attribute configures the maximum lifespan of an entry placed in the L1 cache. Configures the L1 cache behaviour in 'distributed' caches instances. In any other cache modes, this element is ignored.
In many cases, cache containers and caches will be configured via XML as in the example above, so that they will be available upon server start-up. However, cache containers and caches may also be added, removed or have their configurations changed in a running server by making use of the Wildfly management API command-line interface (CLI). In this section, we present some key use cases for the Infinispan management API.
The key use cases covered are:
- adding a cache container
- adding a cache to an existing cache container
- configuring the transaction subsystem of a cache
The Wildfly management API command-line interface (CLI) can be used to provide extensive information on the attributes and commands available in the Infinispan subsystem interface used in these examples.
This section describes load balancing via Apache + mod_jk and Apache + mod_cluster.
Describe load balancing with Apache using mod_jk.
Describe load balancing with Apache using mod_cluster.
The mod_cluster integration is done via the modcluster subsystem it requires mod_cluster-1.1.x.or mod_cluster-1.2.x (since 7.1.0)
The modcluster subsystem supports several operations:The operations specific to the modcluster subsystem are divided in 3 categories the ones that affects the configuration and require a restart of the subsystem, the one that just modify the behaviour temporarily and the ones that display information from the httpd part.
There are 2 operations that display how Apache httpd sees the node:
Send a DUMP message to all Apache httpd the node is connected to and display the message received from Apache httpd.
Send a INFO message to all Apache httpd the node is connected to and display the message received from Apache httpd.
there are 3 operation that could be used to manipulate the list of Apache httpd the node is connected too.
Displays the httpd that are connected to the node. The httpd could be discovered via the Advertise protocol or via the proxy-list attribute.
Remove a proxy from the discovered proxies or temporarily from the proxy-list attribute.
Add a proxy to the discovered proxies or temporarily to the proxy-list attribute.
Those operations allow to send context related commands to Apache httpd. They are send automatically when deploying or undeploying webapps.
Tell Apache httpd that the context is ready receive requests.
Tell Apache httpd that it shouldn't send new session requests to the context of the virtualhost.
Tell Apache httpd that it shouldn't send requests to the context of the virtualhost.
Those operations are like the context operation but they apply to all webapps running on the node and operation that affect the whole node.
Refresh the node by sending a new CONFIG message to Apache httpd.
reset the connection between Apache httpd and the node
There are 4 metric operations corresponding to add and remove load metrics to the dynamic-load-provider. Note that when nothing is defined a simple-load-provider is use with a fixed load factor of one.
that corresponds to the following configuration:
Add a metric to the dynamic-load-provider, the dynamic-load-provider in configuration is created if needed.
Remove a metric from the dynamic-load-provider.
like the add-metric and remove-metric except they require a class parameter instead the type. Usually they needed additional properties which can be specified
which corresponds the following in the xml configuration file:
If you want to use your own JVM route instead of automatically generated one you can insert the following property:
This chapter explains how clustering of EJBs works in WildFly 8.
WildFly 8 allows clustering of stateful session beans. A stateful session bean can be marked with @org.jboss.ejb3.annotation.Clustered annotation or be marked as clustered using the jboss-ejb3.xml's <clustered> element.
Clustering support is available in the HA profiles of WildFly 8. In this chapter we'll be using the standalone server for explaining the details. However, the same applies to servers in a domain mode. Starting the standalone server with HA capabilities enabled, involves starting it with the standalone-ha.xml (or even standalone-full-ha.xml):
This will start a single instance of the server with HA capabilities. Deploying the EJBs to this instance doesn't involve anything special and is the same as explained in the application deployment chapter.
Obviously, to be able to see the benefits of clustering, you'll need more than one instance of the server. So let's start another server with HA capabilities. That another instance of the server can either be on the same machine or on some other machine. If it's on the same machine, the two things you have to make sure is that you pass the port offset for the second instance and also make sure that each of the server instances have a unique jboss.node.name system property. You can do that by passing the following two system properties to the startup command:
Follow whichever approach you feel comfortable with for deploying the EJB deployment to this instance too.
|Deploying the application on just one node of a standalone instance of a clustered server does not mean that it will be automatically deployed to the other clustered instance. You will have to do deploy it explicitly on the other standalone clustered instance too. Or you can start the servers in domain mode so that the deployment can be deployed to all the server within a server group. See the admin guide for more details on domain setup.|
Now that you have deployed an application with clustered EJBs on both the instances, the EJBs are now capable of making use of the clustering features.
Clustered EJBs have failover capability. The state of the @Stateful @Clustered EJBs is replicated across the cluster nodes so that if one of the nodes in the cluster goes down, some other node will be able to take over the invocations. Let's see how it's implemented in WildFly 8. In the next few sections we'll see how it works for remote (standalone) clients and for clients in another remote WildFly server instance. Although, there isn't a difference in how it works in both these cases, we'll still explain it separately so as to make sure there aren't any unanswered questions.
In this section we'll consider a remote standalone client (i.e. a client which runs in a separate JVM and isn't running within another WildFly 8 instance). Let's consider that we have 2 servers, server X and server Y which we started earlier. Each of these servers has the clustered EJB deployment. A standalone remote client can use either the JNDI approach or native JBoss EJB client APIs to communicate with the servers. The important thing to note is that when you are invoking clustered EJB deployments, you do not have to list all the servers within the cluster (which obviously wouldn't have been feasible due the dynamic nature of cluster node additions within a cluster).
The remote client just has to list only one of the servers with the clustering capability. In this case, we can either list server X (in jboss-ejb-client.properties) or server Y. This server will act as the starting point for cluster topology communication between the client and the clustered nodes.
Note that you have to configure the ejb cluster in the jboss-ejb-client.properties configuration file, like so:
When a client connects to a server, the JBoss EJB client implementation (internally) communicates with the server for cluster topology information, if the server had clustering capability. In our example above, let's assume we listed server X as the initial server to connect to. When the client connects to server X, the server will send back an (asynchronous) cluster topology message to the client. This topology message consists of the cluster name(s) and the information of the nodes that belong to the cluster. The node information includes the node address and port number to connect to (whenever necessary). So in this example, the server X will send back the cluster topology consisting of the other server Y which belongs to the cluster.
In case of stateful (clustered) EJBs, a typical invocation flow involves creating of a session for the stateful bean, which happens when you do a JNDI lookup for that bean, and then invoking on the returned proxy. The lookup for stateful bean, internally, triggers a (synchronous) session creation request from the client to the server. In this case, the session creation request goes to server X since that's the initial connection that we have configured in our jboss-ejb-client.properties. Since server X is clustered, it will return back a session id and along with send back an "affinity" of that session. In case of clustered servers, the affinity equals to the name of the cluster to which the stateful bean belongs on the server side. For non-clustered beans, the affinity is just the node name on which the session was created. This affinity will later help the EJB client to route the invocations on the proxy, appropriately to either a node within a cluster (for clustered beans) or to a specific node (for non-clustered beans). While this session creation request is going on, the server X will also send back an asynchronous message which contains the cluster topology. The JBoss EJB client implementation will take note of this topology information and will later use it for connection creation to nodes within the cluster and routing invocations to those nodes, whenever necessary.
Now that we know how the cluster topology information is communicated from the server to the client, let see how failover works. Let's continue with the example of server X being our starting point and a client application looking up a stateful bean and invoking on it. During these invocations, the client side will have collected the cluster topology information from the server. Now let's assume for some reason, server X goes down and the client application subsequent invokes on the proxy. The JBoss EJB client implementation, at this stage will be aware of the affinity and in this case it's a cluster affinity. Because of the cluster topology information it has, it knows that the cluster has two nodes server X and server Y. When the invocation now arrives, it sees that the server X is down. So it uses a selector to fetch a suitable node from among the cluster nodes. The selector itself is configurable, but we'll leave it from discussion for now. When the selector returns a node from among the cluster, the JBoss EJB client implementation creates a connection to that node (if not already created earlier) and creates a EJB receiver out of it. Since in our example, the only other node in the cluster is server Y, the selector will return that node and the JBoss EJB client implementation will use it to create a EJB receiver out of it and use that receiver to pass on the invocation on the proxy. Effectively, the invocation has now failed over to a different node within the cluster.
So far we discussed remote standalone clients which typically use either the EJB client API or the jboss-ejb-client.properties based approach to configure and communicate with the servers where the clustered beans are deployed. Now let's consider the case where the client is an application deployed another AS7 instance and it wants to invoke on a clustered stateful bean which is deployed on another instance of WildFly 8. In this example let's consider a case where we have 3 servers involved. Server X and Server Y both belong to a cluster and have clustered EJB deployed on them. Let's consider another server instance Server C (which may or may not have clustering capability) which acts as a client on which there's a deployment which wants to invoke on the clustered beans deployed on server X and Y and achieve failover.
The configurations required to achieve this are explained in this chapter. As you can see the configurations are done in a jboss-ejb-client.xml which points to a remote outbound connection to the other server. This jboss-ejb-client.xml goes in the deployment of server C (since that's our client). As explained eariler, the client configuration need not point to all clustered nodes. Instead it just has to point to one of them which will act as a start point for communication. So in this case, we can create a remote outbound connection on server C to server X and use server X as our starting point for communication. Just like in the case of remote standalone clients, when the application on server C (client) looks up a stateful bean, a session creation request will be sent to server X which will send back a session id and the cluster affinity for it. Furthermore, server X asynchronously send back a message to server C (client) containing the cluster topology. This topology information will include the node information of server Y (since that belongs to the cluster along with server X). Subsequent invocations on the proxy will be routed appropriately to the nodes in the cluster. If server X goes down, as explained earlier, a different node from the cluster will be selected and the invocation will be forwarded to that node.
As can be seen both remote standalone client and remote clients on another WildFly 8 instance act similar in terms of failover.
We have testcases in WildFly 8 testsuite which test that whatever is explained above works as expected. The RemoteEJBClientStatefulBeanFailoverTestCase tests the case where a stateful EJB uses @Clustered annotation to mark itself as clustered. We also have RemoteEJBClientDDBasedSFSBFailoverTestCase which uses jboss-ejb3.xml to mark a stateful EJB as clustered. Both these testcases test that when a node goes down in a cluster, the client invocation is routed to a different node in the cluster.
This section describes additional issues related to the clustering subsystems.
Describe classloading and monitoring framework as it affects clustering applications.
Describe resources available for monitoring clustered applications.
Describe here key changes between releases.
In this article, I would like to document how to set up a load balanced high availability standalone cluster.
For domain cluster refer to WildFly 8 Clustering Howto
We need to prepare two hosts for this. We will assume that the following conditions are satisfied
- Two Nodes with *Nix installed
- Make sure that they are in same local network
- Make sure that they can access each other via different TCP/UDP ports(better turn off firewall and disable SELinux during the experiment or they will cause network problems).
- We are going to install 2 standalone instances of WildFly - Let's call them Server One and Server Two
- Both servers execute the full-ha profile
- Apache httpd will be run on Server One and in httpd we will enable the mod_cluster module. The WildFly 8 on both the servers will form a cluster and discovered by httpd.
First we should download WildFly 8 from the website:
Next untar the downloaded zip
The above command will untar the package in to the wildfly directory
On changing to the wildfly directory and listing the directory structure, you should see the below structure
Starting the wildfly instance can be done using the below command on Unix on both the servers
Here the -c option specifies the configuration file to use. We are going to use the High-Availability setup
The -u option describes the multicast address. It is using this IP both servers communicate.
For ease of setup, I have included the $HOSTNAME in the nodename and start up options
|For windows User, replace the $HOSTNAME with %COMPUTERNAME%|
|Please note that you should be in wildfy/bin when you execute the above command|
You should observer similar output
Get the httpd from the JBoss downlode site:
This version is pre-configured with all set up necessary to run mod_cluster out of the box and connect with JBoss
If you already have HTTPD installed, then, please get the following archive and untar
|The httpd and it's associated configuration assumes that the server will be installed in /opt/jboss/httpd.|
If you do not follow this path structure, then the configurations do not work.
On *nix, you can use the ln command to create a symbolic link to /opt/jboss/httpd and configure as needed
Sample as listed below
The main configuration for the server would be under the
Ensure the Listen directive is setup appropriately.
At the end of the file ensure that the mod_cluster directive are appropriately setup
Save and exit.
Now, execute Apache via the following command
Verify by opening the url: http://<IP>:6666/mod_cluster_manager in your browser
You should see something similar to this:
There are several guides in the WildFly 8 documentation series. This list gives an overview of each of the guides:
*Getting Started Guide - Explains how to download and start WildFly 8.
*Getting Started Developing Applications Guide - Talks you through developing your first applications on WildFly 8, and introduces you to JBoss Tools and how to deploy your applications.
*JavaEE 6 Tutorial - A Java EE 6 Tutorial.
*Admin Guide - Tells you how to configure and manage your WildFly 8 instances.
*Developer Guide - Contains concepts that you need to be aware of when developing applications for WildFly 8. Classloading is explained in depth.
*High Availability Guide - Reference guide for how to set up clustered WildFly 8 instances.
*Extending WildFly 8 - A guide to adding new functionality to WildFly 8.