![]() |
![]() ![]() |
![]() |
![]() ![]() |
![]() |
![]() ![]() |
![]() |
Pre-installation ConsiderationsFor a list of Portal patches that are obsoleted by this patch, and any patches you must install prior to installing this patch, refer to the included patch README. This patch is not a standalone installation and does not include Portal Server 6.3. Portal Server 6.3 must be installed prior to patch installation. It is important that this patch, as with any other, be tested thoroughly on a staging or pre-deployment system prior to being put in to production. Additionally, special attention should be given to JSP files you may have customised that must be modified by the patch installer in order to fix defects, and/or for the product to continue functioning normally. Installation InstructionsIf the Portal Server installation contains more than one node including any mixture of platform nodes, Portal proxy nodes, and gateway nodes, then this patch should be applied on the platform nodes first, followed by all remaining nodes. Running different release levels on different nodes is not supported. Each node must be upgraded to the same revision.
Template ModificationsEvery attempt is made by the patch installer to both preserve customized template information. However, since the contents of the files cannot be accurately predetermined, any modified template files are backed up in the same directory as their updated counterparts with the patch name postfixed to the template name. For example, when a patch is installed on the Solaris platform: Check the patch README.118264-14 file for the full list of files modified by this patch. Tips for Customizing TemplatesBecause the Portal Server itself is so customizable, you should follow some precautions to ensure that any customizations made to the Portal Server are preserved after a product upgrade. First, set up a customized template directory if you have not already done so. While this directory could be an entire subset of the default template directory, it is advisable to only copy over those template files that you will be customizing. This particular scheme would then use the default directory as a 'base' for all templates and would help insure that customized templates are not accidentally overwritten when the default templates are modified. NOTE: Files in the default template directory should never be customized. To create a customized template directory:
As a general rule of thumb, avoid modifying templates that have only a functional purpose rather than a look and feel purpose. One example of a template that should not need modifications is the NetletProvider/display.template. This template contains only JavaScript necessary for the launching of the Netlet. The contents of the Netlet Pop-up window should instead be customized by modifying the associated .properties file. The reason for this is that there could be a functional change in the product that would overwrite a customization done specifically to that particular template file. This example also exhibits why it is important to only keep customized files in the customized template directory. Configuring the Network Socket Timeout Between the Gateway and the Netlet ProxyThis patch includes a new option to configure a fixed timeout for the network socket that is opened between the Gateway and Netlet Proxy if the Netlet Proxy is in use. This option was included to reduce socket depletion resulting from sockets on the Netlet Proxy node remaining indefinitely in an ESTABLISHED state. For example, prior to this fix, if a Telnet session was opened via the Netlet and there was no activity for 2-4 minutes, the Telnet session would timeout as a result of the idle timout being reached. However, the socket opened between Gateway and Netlet Proxy would remain in an ESTABLISHED state. The same behavior would result from a user explicitly exiting the Telnet session as well. The new option included with this patch gives portal administrators the ability to explicitly set a timeout for how long the abandoned socket should remain open. The default value of this timeout is 10 minutes. So, if there is no activity between the Gateway and Netlet Proxy socket for 10 minutes, the socket will be closed. If this value needs to be changed, an entry for gateway.netletproxy.socket.timeout can be added to the platform.conf file on the Gateway with the new value specifi ed in milliseconds.
Example:
NOTE: If the socket timeout is set too high, the socket depletion could be significant enough to cause Netlet connections to hang. Configuring Portal Server to Work with a Load Balancer that Performs SSL TerminationSome links on the Portal Server Desktop are generated using the server's port/host/protocol values. If a load balancer sitting in front of the Portal Server has been configured to perform SSL termination, there will be a port/protocol mismatch between LB and Portal Server. Due to which some links created on the desktop will be broken. To resolve this problem, the following properties needs to be added to the desktopconfig.properties file located at /etc/opt/SUNWps/desktop/desktopconfig.properties on a Solaris machine and at /etc/opt/sun/portal/desktop/desktopconfig.properties on Linux.
lbHosts=<list of LB Host> To enable switching of protocol and port depending on the client, its necessary to make the authlessanonymous desktop cache free. To do that, set the refreshTime property as zero for JSPTabContainer in authlessanonymous' desktop. Configuring Portal Server & Gateway when PS and IS are on seperate machines behind a load balancerIf PS (Portal Server) and IS (Identity Server) are installed on seperate machines and either of these machines are behind a load balancer then the following needs to be done. If IS is behind a load balancer, then the URL of the load balancer needs to be added to the Platform Profile list in IS Admin Console and gateway.ignoreServerList=true should be set in the platform.conf file of the Gateway instance. If PS is behind a load balancer, then the URL of the load balancer needs to be added to the Gateway Profile Portal Server list under the IS Admin Console for the gateway instance. The above steps are needed only when PS and IS are on seperate machines and either PS or IS is behind a load balancer. Eliminating the Specific Portal Server Requirement During Gateway FailoverBy default, the Gateway requires a specific instance of Portal Server and a specific instance of Identity Server to be available when the Gateway starts up (although on systems where Portal and Identity have not been seperated, these will be one and the same). This creates single points of failure for each Gateway instance that prevent it from properly restarting should either the Portal or Identity Server be temporarily unavailable. To provide an additional level of redundancy, it is now possible to specify additional Portal and Identity Servers for each Gateway to use during startup should the defaults be unavailable by adding them to the /etc/opt/SUNWps/platform.conf.<gateway_instance> file. Additional Portal Servers are specified by adding additional gateway.dsame.agent.? entries, each numbered sequentially. The first entry (which will already exist) must be numbered 0.
gateway.dsame.agent.0=http://portalserver1:80/portal/RemoteConfigServlet Additional Identity Servers are specified by adding additional gateway.identity.server.? entries, each also numbered sequentially from 0.
gateway.identity.server.0=http://identityserver1:80/ Additional Identity Server instances must also be added to the /opt/SUNWam/lib/AMConfig.properties file, by changing: com.iplanet.am.naming.url=http://identityserver1:80/amserver/namingservice to: com.iplanet.am.naming.url=http://identityserver1:80/amserver/namingservice http://identityserver2:80/amserver/namingservice and: com.iplanet.am.notification.url=http://identityserver1:80/amserver/notificationservice to:
com.iplanet.am.notification.url=http://identityserver1:80/amserver/notificationservice http://identityserver2:80/amserver/notificationservice It is necessary to specify all available Portal/Identity server instances in all the locations specified above to achieve redundancy. If the Portal and Identity servers have not been seperated, the set of instances given for gateway.dsame.agent.?, gateway.identity.server.? and in AMConfig.properties should be the same. Configuring a List of URL Paths for the Gateway to IgnoreUnder certain circumstances, IE can generate spontaneous requests for content. One example is when Microsoft Office is installed and the Disussion bar is enabled in IE. As these requests have not been rewritten, the gateway mistakes them for authentication requests, which can invalidate the user's session. To avoid this, it is now possible to configure the gateway to ignore certain URL paths, responding to any request for one of these paths with a 404 (File Not Found) response. The URI ignore list is configured by adding the following entry to the platform.conf.<instance> file located in /etc/opt/SUNWps (Solaris) or /etc/opt/sun (Linux) and restarting the gateway: gateway.ignoreURIList=<comma separated list of URL paths> eg. To ignore the requests from IE when Microsoft Office is installed and the Discussion Bar is enabled add: gateway.ignoreURIList=/MSOffice/cltreq.asp,/_vti_bin/owssvr.dll Fixing problems with portlet applications
Patch 118264-14 fixes issues of title value for the portlet channel.
eg:
For this patch to get effective, its essential to redeploy the portlets.
|