Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
...
Ensure that all the prerequisites have been completed before beginning.
Item | Description |
---|---|
Joget DX WAR Deployment | Deploy the Joget DX WAR file to the application servers. Actual steps depend on the specific application server, e.g. for Apache Tomcat the WAR is deployed in the apache-tomcat/webapps directory. The WAR files can be obtained from Downloads or from Enterprise Support. |
Joget DX Java VM Configuration | Ensure that the Java VM configuration is configured according to Deployment and Configuration, with particular attention to the wflow.home directory path and the Java VM memory settings. |
Joget DX Datasource Configuration | Connect to the database server following Setting Up Database. |
Joget DX License Activation | Activate the license following Activate Joget DX License. |
Once Joget DX has been installed, perform these post-installation steps. Actual steps depend on the products used
Item | Description |
---|---|
LDAP / Active Directory Configuration | If applicable, configure integration to LDAP or Active Directory following LDAP Directory Manager or Sync LDAP Directory Manager. |
Backup Configuration | Configure backup procedures to backup the database and file storage on a scheduled basis e.g. Backup, Restore, and Disaster Recovery. |
Monitoring Configuration | Configure monitoring tools to monitor the uptime, resource usage, and performance of the environment. |
Security Hardening | Perform the desired security hardening for all infrastructure components. |
A list of common issues that may arise during Joget DX Platform deployment or operation
Item | Description |
---|---|
Database Credentials | Ensure that the database authentication credentials are correct and that it can be accessed from the application server. |
Database Permissions | Ensure that the database user has full permission to create tables in the database. |
Directory File Permissions | Ensure that the shared file storage has full read and write permissions for the application server OS user. |
Port Conflicts | Ensure that there are no other services already running on ports for the different infrastructure components. |
Network Restrictions | Ensure that there are no network restrictions preventing connections between the different servers. |
Disk I/O and Network Latency | Ensure that there are no network latency or disk I/O issues, especially for the shared file storage and connectivity to the database server. |
Load Balancer or Reverse Proxy Configuration | Ensure that the load balancer or reverse proxy is forwarding requests to the application server transparently without unnecessarily changing the request body or headers. |
Java VM Configuration | Ensure that there is sufficient memory allocated to the Java VM according to planned usage. |
For your convenience, you can download a PDF version of this guide that includes all four checklists mentioned above. Simply click the link below to access the PDF document and have it handy for reference whenever you need it.
...