top of page

WildFly Packaged by Ioanyt Innovations - RHEL 8


WildFly takes an aggressive approach to memory management and is based on pluggable subsystems that can be added or removed as needed. The quick boot of WildFly combined with the easy-to-use Arquillian framework allows for test-driven development using the real environment your code will be running in.


To verify the installation, follow the below instructions

Step 1. Connect to SSH:

  1. Open the Amazon EC2 console at

  2. In the navigation pane, choose Instances.

  3. Select the instance and choose Connect.

  4. Choose SSH Client

  5. Copy the SSH command and paste it into the terminal.

ssh ec2-user@publicIP -i [Path of key pair file]

If it shows an access denied message run the following command, then run the above command again to connect via ssh.

chmod 400 [Path of key pair file]

Once launched in the Amazon EC2 Service, please connect to the instance via an SSH client using the ec2-user with the key pair associated at launch. Once connected as the ec2-user user, you will be able to sudo to the root user

Access and Security

Please update the security group of the target instance to allow the below ports and protocols for access and connectivity.

We need to create a user who can access the WildFly administration console or remotely using the CLI.

1. After login in with SSH.

2. Run it by executing the command:

sudo /opt/wildfly/bin/

3. You will be asked to choose the type of user to add. Since this is the first user, we want to make it admin. So choose a.

4. Enter your desired username for the user

5. Set the password for the user.

6. Press enter and agree to subsequent prompts to finish user creation.

7. Now test by connecting to WildFly Admin Console from the CLI command shown below: --connect

To add a rule to a security group for inbound SSH traffic over IPv4:
  1. Open the Amazon EC2 console at

  2. From the top navigation bar, select a Region for the security group. Security groups are specific to a Region, so you should select the same Region in which you created your instance.

  3. In the navigation pane, choose Instances.

  4. Select your instance and, in the bottom half of the screen, choose the Security tab. Security groups list the security groups that are associated with the instance. Inbound rules display a list of the inbound rules that are in effect for the instance.

  5. For the security group to which you'll add the new rule, choose the security group ID link to open the security group.

  6. On the Inbound Rules tab, choose Edit inbound rules.

  7. On the Edit inbound rules page, do the following:

    1. Choose Add rule.

    2. For Type, choose SSH, HTTP, Custom TCP

    3. In Custom TCP add in the Port range - 9990 ( For application Dashboard)

    4. For Source, choose Custom and then choose in the CIDR block

    5. Choose Save rules.

Step 2. Verify the installation

Follow the steps to verify the installation and Login

  1. Open the Amazon EC2 console at

  2. In the navigation pane, choose Instances and select your instance.

  3. The following information is available on the Networking tab: Public IPv4 address

  4. Copy its public IP.

  5. Paste the public IP into a new browser tab (do not hit enter yet)

  6. Append:9990 to the end of the public IP. http://<Public id>:9990

  7. Hit Enter then the WlidFly login page will open.

  8. Write your credentials to interact with the WlidFly dashboard.

9. Enter to sign in then you will interact with the WildFly dashboard :

To monitor and assess application functions:-

Navigate to your Amazon EC2 console and verify that you're in the correct region.

  1. Choose Instances and select your launched instance.

  2. Select the server to display your metadata page and choose the Status checks tab at the bottom of the page to review if your status checks passed or failed



Let’s Work Together

IOanyT Innovations Pvt. Ltd.


  • LinkedIn
  • Facebook

Thanks for submitting!

bottom of page