OVERVIEW
WildFly takes an aggressive approach to memory management and is based on pluggable subsystems that can be added or removed as needed. The quick boot of WildFly combined with the easy-to-use Arquillian framework allows for test-driven development using the real environment your code will be running in.
GET STARTED
To verify the installation, follow the below instructions
Step 1. Connect to SSH:
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
In the navigation pane, choose Instances.
Select the instance and choose Connect.
Choose SSH Client
Copy the SSH command and paste it into the terminal.
ssh ubuntu@publicIP -i [Path of key pair file]
If it shows an access denied message run the following command, then run the above command again to connect via ssh.
chmod 400 [Path of key pair file]
Once launched in the Amazon EC2 Service, please connect to the instance via an SSH client using the ec2-user with the key pair associated at launch. Once connected as the ec2-user user, you will be able to sudo to the root user
Access and Security
Please update the security group of the target instance to allow the below ports and protocols for access and connectivity.
We need to create a user who can access the WildFly administration console or remotely using the CLI.
1. After login in with SSH.
2. Run it by executing the command:
sudo /opt/wildfly/bin/add-user.sh
3. You will be asked to choose the type of user to add. Since this is the first user, we want to make it admin. So choose a.
4. Enter your desired username for the user
5. Set the password for the user.
6. Press enter and agree to subsequent prompts to finish user creation.
7. Now test by connecting to WildFly Admin Console from the CLI command shown below:
jboss-cli.sh --connect
To add a rule to a security group for inbound SSH traffic over IPv4:
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
From the top navigation bar, select a Region for the security group. Security groups are specific to a Region, so you should select the same Region in which you created your instance.
In the navigation pane, choose Instances.
Select your instance and, in the bottom half of the screen, choose the Security tab. Security groups list the security groups that are associated with the instance. Inbound rules display a list of the inbound rules that are in effect for the instance.
For the security group to which you'll add the new rule, choose the security group ID link to open the security group.
On the Inbound Rules tab, choose Edit inbound rules.
On the Edit inbound rules page, do the following:
Choose Add rule.
For Type, choose SSH, HTTP, Custom TCP
In Custom TCP add in the Port range - 9990 ( For application Dashboard)
For Source, choose Custom and then choose in the CIDR block 0.0.0.0/0
Choose Save rules.
Step 2. Verify the installation
Follow the steps to verify the installation and Login
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
In the navigation pane, choose Instances and select your instance.
The following information is available on the Networking tab: Public IPv4 address
Copy its public IP.
Paste the public IP into a new browser tab (do not hit enter yet)
Append:9990 to the end of the public IP. http://<Public id>:9990
Hit Enter then the WlidFly login page will open.
Write your credentials to interact with the WlidFly dashboard.
9. Enter to sign in then you will interact with the WildFly dashboard :
To monitor and assess application functions:-
Navigate to your Amazon EC2 console and verify that you're in the correct region.
Choose Instances and select your launched instance.
Select the server to display your metadata page and choose the Status checks tab at the bottom of the page to review if your status checks passed or failed
For information about how to use the application, please visit: https://www.baeldung.com/wildfly-server-setup
For detailed information about managing and requesting increased service please visit: https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html
Comments