Menu Search

AMQP Messaging Broker (Java)


Table of Contents

1. Introduction
2. Installation
2.1. Introduction
2.2. Prerequisites
2.2.1. Java Platform
2.2.2. Disk
2.2.3. Memory
2.2.4. Operating System Account
2.3. Download
2.3.1. Broker Release
2.3.2. Optional Dependencies
2.4. Installation on Windows
2.4.1. Setting the working directory
2.4.2. Optional Dependencies
2.5. Installation on UNIX platforms
2.5.1. Setting the working directory
2.5.2. Optional Dependencies
3. Getting Started
3.1. Starting/Stopping the Broker
3.2. Starting/Stopping on Windows
3.3. Starting/Stopping on Unix
3.4. Log file
3.5. Using the command line
4. Concepts
4.1. Virtual Hosts
4.2. Exchanges
4.3. Queues
4.4. Ports
4.5. Protocols
4.6. Authentication Providers
4.7. Other Services
5. Virtual Hosts
6. Exchanges
7. Queues
7.1. Messaging Groups
7.2. Other Queue Types
7.2.1. Introduction
7.2.2. Priority Queues
7.2.3. Sorted Queues
7.2.4. Last Value Queues (LVQ)
7.2.5. Creating a Priority, Sorted or LVQ Queue
7.2.6. Low pre-fetch
8. Stores
8.1. Memory Store
8.1.1. Configuration
8.2. Derby Store
8.2.1. Configuration
8.3. SQL Store
8.4. BDB Store
8.4.1. Oracle BDB JE download
8.4.2. Oracle BDB JE jar installation
8.4.3. Configuration
8.5. High Availability BDB Store
8.5.1. Oracle BDB JE download
8.5.2. Oracle BDB JE jar installation
8.5.3. Configuration
9. Configuring And Managing
9.1. Config Files
9.1.1. Configuration file
9.1.2. Management Configuration
9.1.3. JMX Management Configuration
9.1.4. Management SSL key store configuration
9.1.5. Web Management Configuration
9.2. Web Console
9.3. REST API
9.3.1. REST API Overview
9.4. JMX
9.5. Other Tooling
10. Security
10.1. Users And Groups
10.2. Configuring Group Providers
10.2.1. FileGroupManager
10.3. Authentication Providers
10.3.1. Password File
10.3.2. LDAP
10.3.3. Kerberos
10.3.4. External (SSL Client Certificates)
10.3.5. Anonymous
10.3.6. Configuring multiple Authentication Providers
10.4. Access Control Lists
10.4.1. Enabling ACLs
10.4.2. Writing .acl files
10.4.3. Syntax
10.4.4. Worked Examples
10.5. SSL
10.5.1. Keystore Configuration
10.5.2. Truststore / Client Certificate Authentication
11. Runtime
11.1. Log Files
11.2. Alerts
11.3. Disk Space Management
11.3.1. Producer Flow Control
11.4. Handing Undeliverable Messages
11.4.1. Introduction
11.4.2. Maximum Delivery Count
11.4.3. Dead Letter Queues (DLQ)
11.4.4. Configuration
12. High Availability
12.1. General Introduction
12.2. HA offerings of the Java Broker
12.3. Two Node Cluster
12.3.1. Overview
12.3.2. Depictions of cluster operation
12.4. Multi Node Cluster
12.5. Configuring a Virtual Host to be a node
12.5.1. Passing BDB environment and replication configuration options
12.6. Durability Guarantees
12.6.1. BDB Durability Controls
12.6.2. Coalescing-sync
12.6.3. Default
12.6.4. Examples
12.7. Client failover configuration
12.8. Qpid JMX API for HA
12.9. Monitoring cluster
12.10. Disk space requirements
12.11. Network Requirements
12.12. Security
12.13. Backups
12.14. Migration of a non-HA store to HA
12.15. Disaster Recovery
12.16. Performance
13. Miscellaneous
13.1. JVM Installation verification
13.1.1. Verify JVM on Windows
13.1.2. Verify JVM on Windows

List of Examples

7.1. Configuring a priority queue
7.2. Configuring a priority queue with fewer priorities
7.3. Configuring a sorted queue
7.4. Configuring a LVQ queue
7.5. Configuring a LVQ queue with custom message property name
7.6. Creation of an LVQ using the Qpid extension to JMS
7.7. Creation of a sorted queue using JMX
8.1. Configuring a VirtualHost to use the MemoryMessageStore
8.2. Configuring a VirtualHost to use the DerbyMessageStore
8.3. Configuring a VirtualHost to use the BDBMessageStore
9.1. Management configuration
9.2. Enabling JMX Management and configuring JMX ports
9.3. Management key store configuration
9.4. Enabling web management
9.5. Examples of queue creation using curl:
9.6. Example of binding a queue to an exchange using curl
10.1. Configuring LDAP authentication
10.2. Configuring Kerberos authentication
10.3. Configuring external authentication (SSL client auth)
10.4. Configuring anonymous authentication
10.5. Configuring multiple (per-port) authentication schemes
10.6. Configuring an SSL Keystore
10.7. Configuring an SSL Truststore and client auth
11.1. Configuring a queue depth limit
11.2. Configuring a default queue depth limit on a virtualhost
11.3. Configuring a limit on a store
11.4. Enabling DLQs and maximum delivery count at broker level within config.xml
11.5. Enabling DLQs and maximum delivery count at virtualhost and queue level within virtualhosts.xml
12.1. Configuring a VirtualHost to use the BDBHAMessageStore
12.2. Example of connection URL for the HA Cluster
12.3. Example of java code to get the node state value
12.4. Using DbPing utility for monitoring HA nodes.
12.5. Performing store backup by using BDBBackup class directly
12.6. Performing store backup by using backup.sh bash script
12.7. Enabling replication
12.8. Example of XML configuration for HA message store
12.9. Reseting of replication group with DbResetRepGroup