没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
NOTICE
YOU AGREE THAT THE REFERENCES, SAMPLES AND PROGRAM(S) ARE PROVIDED AS-IS, WITHOUT WARRANTY OF ANY
KIND (EITHER EXPRESS OR IMPLIED). ACCORDINGLY, TOTAL TRANSACTION MANAGEMENT, LLC (TTM) MAKES NO
WARRANTIES, REPRESENTATIONS OR GUARANTEES, EITHER EXPRESS OR IMPLIED, AND DISCLAIMS ALL SUCH
WARRANTIES, REPRESENTATIONS OR GUARANTEES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR ANY PARTICULAR PURPOSE, AS TO:
(A) THE FUNCTIONALITY OR NONINFRINGEMENT OF PROGRAM, ANY MODIFICATION, A COMBINED WORK OR AN
AGGREGATE WORK; OR
(B) THE RESULTS OF ANY PROJECT UNDERTAKEN USING THE PROGRAM, ANY MODIFICATION, A COMBINED WORK
OR AN AGGREGATE WORK.
IN NO EVENT SHALL TTM OR ANY OF THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, CONSEQUENTIAL OR ANY OTHER DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SAMPLES AND PROGRAMS, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. YOU HEREBY WAIVE ANY CLAIMS FOR DAMAGES OF ANY KIND AGAINST TTM OR ANY
OF THE CONTRIBUTORS WHICH MAY RESULT FROM YOUR USE OF THE REFERENCES, SAMPLES, AND PROGRAM(S).
January 7, 2010 ActiveMQ Reference Guide
i
Table of Contents
1 INTRODUCTION ............................................................................................................................................... 1
1.1 WHAT IS ACTIVEMQ? .................................................................................................................................... 2
1.2 WHAT IS MOM? ............................................................................................................................................. 2
1.3 WHY USE ACTIVEMQ? .................................................................................................................................. 3
1.4 WHEN AND WHERE TO USE ACTIVEMQ ......................................................................................................... 4
1.4.1 Where ..................................................................................................................................................... 4
1.4.2 When ...................................................................................................................................................... 4
1.5 DOWNLOADING AND INSTALLING ACTIVEMQ ................................................................................................ 4
2 ACTIVEMQ COMPONENTS ........................................................................................................................... 5
3 CONNECTORS ................................................................................................................................................... 8
3.1 CONNECTOR URIS ........................................................................................................................................ 10
3.2 LOW-LEVEL CONNECTORS ........................................................................................................................... 12
3.2.1 VM ....................................................................................................................................................... 13
3.2.2 Peer ...................................................................................................................................................... 16
3.2.3 TCP ...................................................................................................................................................... 17
3.2.4 NIO ...................................................................................................................................................... 18
3.2.5 SSL ....................................................................................................................................................... 19
3.2.5.1 Setting up the SSL Key and Trust Stores ......................................................................................................... 19
3.2.5.2 Starting the SSL-enabled Broker...................................................................................................................... 20
3.2.5.3 Starting the SSL-enabled Client ....................................................................................................................... 20
3.2.6 HTTP/HTTPS ....................................................................................................................................... 21
3.2.7 Multicast .............................................................................................................................................. 22
3.2.8 Rendezvous .......................................................................................................................................... 23
3.3 COMPOSITE CONNECTORS ............................................................................................................................ 24
3.3.1 Static .................................................................................................................................................... 25
3.3.2 Failover ............................................................................................................................................... 25
3.3.3 Discovery ............................................................................................................................................. 27
3.3.4 Fanout .................................................................................................................................................. 28
3.4 MONITORING A TRANSPORT CONNECTOR ..................................................................................................... 30
4 WILDCARDS .................................................................................................................................................... 31
5 CLIENT CONFIGURATION .......................................................................................................................... 31
5.1 THE JNDI.PROPERTIES FILE ........................................................................................................................... 31
5.2 THE LDAP-BASED JNDI .............................................................................................................................. 37
5.2.1 Environment Properties Hashtable ...................................................................................................... 39
5.2.2 The jndi.properties File ....................................................................................................................... 39
5.2.3 System Properties ................................................................................................................................ 40
5.2.4 JNDI Operations .................................................................................................................................. 40
5.3 TOMCAT ....................................................................................................................................................... 42
5.4 SPRING.......................................................................................................................................................... 44
6 BROKER CONFIGURATION ........................................................................................................................ 44
6.1 SPECIFYING THE BROKER‟S XML CONFIGURATION FILE .............................................................................. 44
6.2 THE BROKER‟S XML CONFIGURATION FILE ................................................................................................. 45
6.2.1 broker ................................................................................................................................................... 47
6.2.2 transportConnector .............................................................................................................................. 48
6.2.3 networkConnector ................................................................................................................................ 50
January 7, 2010 ActiveMQ Reference Guide
ii
6.2.4 systemUsage ........................................................................................................................................ 53
6.2.4.1 sendFailIfNoSpace ........................................................................................................................................... 55
6.2.5 persistenceAdapter............................................................................................................................... 56
6.2.6 destinations .......................................................................................................................................... 56
6.2.7 destinationPolicy ................................................................................................................................. 57
6.3 USEDEDICATEDTASKRUNNER ...................................................................................................................... 58
7 WIRE PROTOCOLS ........................................................................................................................................ 58
8 NETWORK OF BROKERS ............................................................................................................................. 60
8.1 STORE AND FORWARD .................................................................................................................................. 60
8.2 HIGH AVAILABILITY ..................................................................................................................................... 62
8.2.1 Master/Slave Broker Configurations ................................................................................................... 62
8.2.1.1 Pure Master Slave ............................................................................................................................................ 62
8.2.1.2 Shared File System Master Slave ..................................................................................................................... 66
8.2.1.3 JDBC Master Slave .......................................................................................................................................... 68
8.3 ISOLATING YOUR BROKER FROM OTHER BROKERS ..................................................................................... 68
9 ADVISORY MESSAGING ............................................................................................................................... 69
10 ACTIVEMQ MONITOR (AMON) .............................................................................................................. 72
10.1 MONLET CONTAINER .................................................................................................................................... 72
10.2 SNMP AGENT .............................................................................................................................................. 72
11 ADMINISTRATION ..................................................................................................................................... 72
11.1 COMMAND LINE TOOLS ................................................................................................................................ 72
11.2 JCONSOLE .................................................................................................................................................... 75
11.2.1 Configuration ....................................................................................................................................... 75
11.2.2 Connection ........................................................................................................................................... 76
11.2.3 Operation ............................................................................................................................................. 77
11.3 WEB CONSOLE ............................................................................................................................................. 79
11.3.1 Securing Access to the Web Console ................................................................................................... 83
11.4 DESTINATIONSOURCE ................................................................................................................................... 83
12 LOGGING ...................................................................................................................................................... 84
12.1 COMMONS-LOGGING ..................................................................................................................................... 84
12.2 LOG4J ........................................................................................................................................................... 84
12.3 JAVA.UTIL.LOGGING ...................................................................................................................................... 85
12.4 CONTROLLING LOGGING WITH JCONSOLE ..................................................................................................... 86
12.5 CLIENT LOGGING .......................................................................................................................................... 87
13 CONSUMER OPTIONS ............................................................................................................................... 87
13.1 PREFETCH LIMITS ......................................................................................................................................... 88
13.2 SLOW CONSUMERS FOR NON-DURABLE TOPICS ........................................................................................... 90
13.3 ASYNCHRONOUS DISPATCH (DISPATCHASYNC) ............................................................................................ 94
13.4 RETROACTIVE CONSUMERS .......................................................................................................................... 95
13.5 EXCLUSIVE CONSUMERS .............................................................................................................................. 97
13.6 PRIORITIZED CONSUMERS ............................................................................................................................. 98
13.7 DEAD LETTER QUEUE (DLQ) ....................................................................................................................... 98
13.7.1 individualDeadLetterStrategy .............................................................................................................. 99
13.7.2 sharedDeadLetterStrategy ................................................................................................................. 100
13.7.3 DiscardingDLQBroker ...................................................................................................................... 101
13.7.4 What Happens To Expired Messages?............................................................................................... 101
14 ADVANCED FEATURES .......................................................................................................................... 102
14.1 ASYNCHRONOUS SENDS ............................................................................................................................. 102
14.2 PRODUCER FLOW CONTROL (PFC) ............................................................................................................. 103
14.2.1 Producer Flow Control and Queues .................................................................................................. 103
January 7, 2010 ActiveMQ Reference Guide
iii
14.2.2 Producer Flow Control and Topics ................................................................................................... 104
14.2.3 Synchronous Sends ............................................................................................................................ 105
14.2.4 Asynchronous Sends .......................................................................................................................... 106
14.3 MESSAGE GROUPS ...................................................................................................................................... 107
14.3.1 Message Groups vs Selectors ............................................................................................................. 108
14.4 TOPIC MESSAGE ORDERING ........................................................................................................................ 109
14.5 BINARY LARGE OBJECTS (BLOBS) ............................................................................................................ 110
14.5.1 Sending a BLOB ................................................................................................................................ 111
14.5.2 Receiving a BLOB .............................................................................................................................. 114
14.6 ACTIVEMQ STREAMS ................................................................................................................................. 115
14.7 COMPOSITE DESTINATIONS ......................................................................................................................... 115
14.7.1 Client-Side Composite Destinations .................................................................................................. 115
14.7.2 Broker-Side Composite Destinations ................................................................................................. 117
14.7.3 Selecting Composite Destinations ...................................................................................................... 117
14.8 VIRTUAL TOPICS ......................................................................................................................................... 118
14.8.1 Virtual Topics vs. Composite Destinations ........................................................................................ 122
14.9 MIRRORED QUEUES .................................................................................................................................... 122
14.10 MESSAGE TRANSFORMERS ..................................................................................................................... 123
14.11 CONNECTION POOLING ........................................................................................................................... 124
14.12 SPRING SUPPORT .................................................................................................................................... 124
14.13 MESSAGE CURSORS ................................................................................................................................ 125
14.14 ENTERPRISE INTEGRATION PATTERNS .................................................................................................... 125
14.15 INDIVIDUAL ACKNOWLEDGE................................................................................................................... 125
14.16 PRIORITIZING MESSAGES ........................................................................................................................ 126
15 EXTENDING ACTIVEMQ’S FUNCTIONALITY .................................................................................. 126
16 AUTHENTICATION AND AUTHORIZATION SERVICES................................................................. 129
16.1 AUTHENTICATION ....................................................................................................................................... 130
16.1.1 Authentication and Authorization between Message Brokers ........................................................... 132
16.2 AUTHORIZATION ......................................................................................................................................... 133
16.2.1 Controlling Access to Temporary Destinations ................................................................................. 135
16.3 CAMEL ........................................................................................................................................................ 135
16.4 TTM‟S SECURITY PLUGINS ........................................................................................................................ 136
16.4.1 File-Based Security Plugin ................................................................................................................ 136
16.4.2 LDAP and JDBC Based Security Plugins .......................................................................................... 137
17 PERFORMANCE AND SCALING ........................................................................................................... 137
17.1 PERSISTENT VS. TRANSIENT MESSAGES ...................................................................................................... 137
17.1.1 Asynchronous Sends .......................................................................................................................... 138
17.1.2 Transactions ...................................................................................................................................... 138
17.2 TCP TRANSPORT ........................................................................................................................................ 138
17.3 PREFETCH LIMIT ......................................................................................................................................... 138
17.4 THREADS, THREAD POOLING, AND SCALING .............................................................................................. 140
17.4.1 Blocking vs. Non-Blocking I/O .......................................................................................................... 140
17.4.2 Thread Pooling .................................................................................................................................. 141
17.4.2.1 UseDedicatedTaskRunner ......................................................................................................................... 141
17.4.2.2 optimizedDispatch ..................................................................................................................................... 141
17.4.3 Asynchronous Dispatch (dispatchAsync) ........................................................................................... 141
17.4.4 Asynchronous Session Dispatch (alwaysSessionAsync) .................................................................... 141
17.4.5 The KahaDB Message Store .............................................................................................................. 142
17.5 DUPS_OK_ACKNOWLEDGE................................................................................................................. 143
17.6 CONSUMER CLUSTERING ............................................................................................................................ 143
17.7 EMBEDDED BROKERS ................................................................................................................................. 143
17.8 MESSAGE COPY .......................................................................................................................................... 144
17.9 OPENWIRE LOOSE ENCODING .................................................................................................................... 144
17.10 MEMORY UTILIZATION ........................................................................................................................... 144
剩余160页未读,继续阅读
资源评论
- superhg86022013-06-14资料不多,收了
- rui3052013-06-04还可以,是英文的
joyork
- 粉丝: 0
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功