You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,31 +45,31 @@ The Oracle WebLogic Server Deploy Tooling is designed to support a wide range of
45
45
- The differences between WLST online and WLST offline for working with folders and attributes
46
46
47
47
### Supported WebLogic Server Versions
48
-
The following table specifies the supported WebLogic Server versions, along with the JDK versions that must be used to run the WDT tool. You must set the `JAVA_HOME` environment variable to specify a JDK version different than the system default version.
48
+
The following table specifies the supported WebLogic Server versions, along with the JDK versions, that must be used to run the WDT tool. You must set the `JAVA_HOME` environment variable to specify a JDK version different from the system default version.
49
49
50
-
To create a domain with the proper JDK (particularly if the `JAVA_HOME` is different than the one which will be used by the target domain), set the domain `JavaHome` attribute in the domain model.
51
-
52
-
Note that the WDT Encryption tool used to encrypt and decrypt clear text passwords in the model and variable file, requires WDT to run with a minimum JDK version of 1.8.
50
+
To create a domain with the proper JDK (particularly if the `JAVA_HOME` is different from the one which will be used by the target domain), set the domain `JavaHome` attribute in the domain model.
53
51
54
-
| WebLogic Server Versions | Tool JDK Versions |
52
+
Note that the WDT Encryption Model Tool used to encrypt and decrypt clear text passwords in the model and variable files, requires WDT to run with a minimum JDK version of 1.8.
***1*** First release dynamic clusters are supported
68
68
***2*** First release Coherence clusters are supported
69
69
***3*** First release WLS roles are supported
70
70
***4*** First release multitenancy is supported
71
71
***5*** Last release multitenancy is supported
72
-
72
+
73
73
### Metadata model
74
74
The metadata model, described in detail in the next section, is WebLogic Server version and WLST mode independent. As such, a metadata model written for an earlier version of WebLogic Server is designed to work with a newer version. There is no need to port your metadata model as part of the upgrade process. Of course, you may wish to add data to your metadata model to take advantage of new features in newer versions of WebLogic Server.
75
75
@@ -213,7 +213,7 @@ The file `/home/me/dbcs1.txt` would then contain this single line:
213
213
```yaml
214
214
password#123
215
215
```
216
-
As the model is processed, the value for the `PasswordEncrypted` would resolve to `password#123`. It is also possible to combine file placeholders with other types of tokens, to allow for variations in the name and location of the file, such as:
216
+
As the model is processed, the value for the `PasswordEncrypted` would resolve to `password#123`. It is also possible to combine file placeholders with other types of tokens, to allow for variations in the name and location of the file, such as:
@@ -231,14 +231,14 @@ The root directories are configured as a comma-separated list of directories, us
231
231
```
232
232
/etc/my-secrets/secrets/the-secret
233
233
/etc/your-secrets/secrets/the-secret
234
-
```
234
+
```
235
235
If either of these files is found, the secret is read from that file and substituted in the model.
236
236
237
-
The second method for locating the Kubernetes secret file is to use the environment variable `WDT_MODEL_SECRETS_NAME_DIR_PAIRS` to map `<name>` values to specific directory locations. For example, if `WDT_MODEL_SECRETS_NAME_DIR_PAIRS` is set to `my-root=/etc/my-secrets,your-root=/etc/your-secrets`, then the token `@@SECRET:your-root:the-secret@@` will look for the secrets file at:
237
+
The second method for locating the Kubernetes secret file is to use the environment variable `WDT_MODEL_SECRETS_NAME_DIR_PAIRS` to map `<name>` values to specific directory locations. For example, if `WDT_MODEL_SECRETS_NAME_DIR_PAIRS` is set to `my-root=/etc/my-secrets,your-root=/etc/your-secrets`, then the token `@@SECRET:your-root:the-secret@@` will look for the secrets file at:
238
238
```
239
239
/etc/your-secrets/the-secret
240
240
```
241
-
If the `<name>` value has a corresponding mapped directory in `WDT_MODEL_SECRETS_NAME_DIR_PAIRS`, then that directory will take precedence over any roots specified in `WDT_MODEL_SECRETS_DIRS`.
241
+
If the `<name>` value has a corresponding mapped directory in `WDT_MODEL_SECRETS_NAME_DIR_PAIRS`, then that directory will take precedence over any roots specified in `WDT_MODEL_SECRETS_DIRS`.
242
242
243
243
NOTE: It is important that the secrets directories contain only secrets files, because those files are examined to create a list of available name/key pairs.
244
244
@@ -341,7 +341,7 @@ For example, if Model 1 looks like:
341
341
topology:
342
342
Server:
343
343
m1:
344
-
ListenPort: 7000
344
+
ListenPort: 7000
345
345
Notes: "Server 1"
346
346
m2:
347
347
ListenPort: 9000
@@ -379,7 +379,7 @@ A named element using [delete notation](#declaring-named-mbeans-to-delete) will
0 commit comments