IBM BPM, V8.0.1, All platforms > Authoring services in Integration Designer > Services and service-related functions > Access external services with adapters > Configure and using adapters > IBM WebSphere Adapters > Oracle E-Business Suite > Configure the module for deployment > Configure the module for inbound processing

Setting deployment properties and generating the service

After you select and configure the business objects for your module, use the external service wizard to configure properties that the adapter uses to connect to a specific database. The wizard creates a new business integration module where all the artifacts and property values are saved.

This task is performed through the Specify the Service Generation and Deployment Properties and Specify the Location Properties windows of the external service wizard.

The connection properties in this task are initialized to the values that the wizard used to connect to the database. To configure the module to use other values, change the values here.

For example, to use the Oracle JDBC driver at run time instead of the Oracle Thin driver, set the driver information here.


Procedure

  1. In the Specify the Service Generation and Deployment Properties window, click Edit Operations to review the names of operations or add a description for the operations for the business objects you are creating.

  2. In the Deployment Properties area, specify how you want the adapter to get the user name and password at run time.

    • To use a J2C authentication alias, click Using an existing JAAS alias (recommended) and enter the name of the alias in the J2C authentication data entry field. You can specify an existing authentication alias or create one at any time before deploying the module. The name is case-sensitive and includes the node name.

    • To use the managed connection properties, click Using security properties from the managed connection factory and enter values in the User name and Password fields.

    • To administer the user name and password from another mechanism, click Other.

    If you use local connection information to establish the database connection, a security credential is required. You can select either Using an existing JAAS alias (recommended) or Using security properties from the managed connection factory as the security mechanism. If you use an existing data source on the server, the security credential is not required. In this case, you can select Other as the security mechanism. Also, if you set the J2C authentication data entry field or set the User name and Password fields, they override the user name and password in the data source.

  3. In the Deploy connector project field, specify whether to include the adapter files in the module. Select one of the following values:

    • With module for use by single application: With the adapter files embedded in the module, you can deploy the module to any application server. Use an embedded adapter when you have a single module using the adapter or if multiple modules need to run different versions of the adapter. Using an embedded adapter enables you to upgrade the adapter in a single module without the risk of destabilizing other modules by changing their adapter version.

    • On server for use by multiple applications: If you do not include the adapter files in a module, install them as a stand-alone adapter on each application server where you want to run the module. Use a stand-alone adapter when multiple modules can use the same version of the adapter and you want to administer the adapter in a central location. A stand-alone adapter can also reduce the resources required by running a single adapter instance for multiple modules.

  4. If you selected On server for use by multiple adapters in the previous step, specify the connection properties used at run time.

    • If you manually created and configured a managed connection factory or activation specification on the server or if you have already deployed an application that connects to the same database using the same managed connection factory or activation specification properties, you can reuse the managed connection factory or activation specification by specifying the name of its Java™ Naming and Directory Interface (JNDI) data source:

      1. From the Connection settings list, select Use predefined connection properties.

      2. In the JNDI Lookup Name field, type the name of the JNDI data source for an existing managed connection factory or activation specification.

        The following figure displays the typical settings for reusing a managed connection factory or activation specification for a stand-alone deployment of the adapter.

      3. Click Next to complete this task.

    • If this is the first application that connects to the database with a specific user name and password, or if you want to administer the user name and password separately from other applications, select Specify connection properties.

  5. In the Connection Properties area, specify how you want the adapter to establish database connection at run time.

    • To use an existing data source on the server:

      1. From the Database connection information list, select Specify predefined DataSource.

      2. In the Database system connection information area, enter the name of an existing JNDI data source in the DataSource JNDI name field. For more information about this property, see Data source JNDI name (DataSourceJNDIName).

    • To specify the connection information to be saved in the adapter properties:

      1. From the Database connection information list, select Specify database connection information.

      2. In the Database system connection information area, enter values in the Database URL and JDBC driver class name fields. For more information about these properties, see Database URL (DatabaseURL) and JDBC driver class (JDBCDriverClass).

  6. Review and, if necessary, change the values of the required connection properties. The fields are initialized with the connection information you specified when you started the wizard.

    You can change the values to specify a different user name and password at run time. You can also connect to an alternate Oracle database, although the schema names must be the same in both databases. The format of the connection properties is database-specific. For more information about the properties, see Activation specification properties.

  7. Optionally, specify advanced properties by clicking Advanced. Expand each of the advanced sections to review the properties.

    • Processing methods for illegal XML characters

      1. From the Illegal XML character processing drop-down list, select one of the options that correspond to your requirement:

        • Do not validate illegal XML characters, if you want to work with the default adapter behavior.
        • Throw exception if contents in the BO contains illegal XML characters, if you want to proceed after you get an exception message, and log the illegal XML characters in the trace file, at runtime.
        • Discard all illegal XML characters and related logs, if you want the adapter to discard the illegal XML characters, and log the characters in the trace file, at runtime.

    • Event polling configuration

      1. In Interval between polling periods, type the number of milliseconds that the adapter waits between polling periods. See Interval between polling periods (PollPeriod).

      2. In Maximum events in polling period, type the number of events to deliver in each polling period. See Maximum events in polling period (PollQuantity).

      3. In Time between retries in case of case of system connection failure (in milliseconds) , type the number of milliseconds to wait before trying to connect after a connection failure during polling. See Time between retries in case of system connection failure (RetryInterval).

      4. In Maximum number of retries in case of system connection failure, type the number of times to try the connection before reporting a polling error. See Maximum number of retries in case of system connection failure (RetryLimit).

      5. If you want the adapter to stop if polling errors occur, select Stop the adapter when an error is encountered while polling.

        If you do not select this option, the adapter logs an exception but continues to run. See Stop the adapter when an error is encountered while polling (StopPollingOnError).

      6. Select the calendar based scheduling option to create calendar based polling for inbound activities.

        You can schedule your business activities, when you create a new calendar in IBM Integration Designer. The option of working with the calendar based scheduling feature is only possible with IBM Integration Designer as the tooling environment. The following figure helps you to schedule a calendar polling option.

        Figure 1. Polling based on business calendar

        You can either select a blank calendar or create a new calendar for a module or library.

        When you select a blank calendar, you will not be able to set predefined time intervals. You have to define your time intervals. When you create a calendar using a predefined template, you can define time intervals for each template.

        • To select an existing calendar for a module or library, click Browse. In the Select a Business Calendar window, you can search for existing calendar files ( *cal) in the IBM Integration Designer workspace.

          1. In the Filter by name field, type the calendar name or name pattern. The calenders matching the pattern are displayed in the Matching business calendars area.

          2. Select a calendar and click OK to return to the external service wizard.

        • To create a new calendar entry for a module or library, click New. The Create a business calendar window is displayed.

          1. In the Module or library field, click Browse to select an existing calendar module or click New to create a module for the new calendar.

          2. In the Folder field, click Browse to select an existing folder or create a new folder for the calendar.

          3. In the Name field, enter a name for the new calendar.

            • To create a non template calendar, click Finish. Or

            • To generate the calendar based on a predefined template, click Next. In the Use a template window, select the Create a calendar using one of the templates check box and click Finish.

            The new business calendar is created and available in the Business Integration view. Once you complete the wizard, you can view or modify the calendar schedules in the Business Integration view using the Business Calendar Editor. You can modify the intervals and exceptions, or add new entries for these elements. For more details about working with business calendars, see Business calendars.

        You must deploy the Business Calendar module to the same IBM BPM or WebSphere Enterprise Service Bus instance, along with the inbound application. If you do not map these two connections to the same server instance, the inbound application using the business calendar will by default, poll as there is no calendar configured.

      7. Optionally, you can select Retry EIS connection on startup if you want the adapter to try again a failed connection when starting. See Retry EIS connection on startup (RetryConnectionOnStartup)
    • Event delivery configuration

      1. In Type of delivery, select the delivery method. The methods are described in Delivery type (DeliveryType).

      2. If you want to ensure that events are delivered only once and to only one export, select Ensure once-only delivery. This option might reduce performance but does not result in duplicate or missing event delivery. See Ensure once-only event delivery (AssuredOnceDelivery).
      3. By default, the adapter processes all events that it finds when it polls. If you do not want it to process events that have timestamps later than the current time, select Do not process events that have a timestamp in the future. See Do not process events that have a timestamp in the future (FilterFutureEvents).

      4. In Event types to process, type a comma-separated list of the business objects for which you want events delivered. Leave this field blank to receive events for all business object types.

        For example, if you want to receive events only when the Customer and Order tables, but not other tables, are changed in the database, set this field to Customer,Order.

        For more information, see Event types to process (EventTypeFilter).

      5. In Adapter Instance for event filtering, type the connector ID for which you want the events delivered. See Adapter Instance for event filtering (AdapterInstanceEventFilter).

      6. In Retry limit for failed events, specify the number of times to try to deliver an event after a delivery failure. See Retry limit for failed events (FailedEventRetryLimit).
      7. Under Number of connections for event delivery, specify the minimum and maximum number of connections to use to deliver events. See Minimum connections (MinimumConnections) and Maximum connections (MaximumConnections).

    • Additional connection configuration

      1. Set Additional JDBC driver connection properties. See more information about the property in Additional JDBC driver connection properties [name:value;name:value] (JDBCDriverConnectionProperties).
      2. Set SQL query to verify the connection. See more information about the property in SQL query to verify the connection (PingQuery).

      3. In Query timeout, type the length of time, in seconds, that the adapter must wait for a response to a database query. See more information about the property in Query timeout (seconds) (QueryTimeOut).
      4. Set Return business object even when the stored procedure result set is empty. See more information about the property in Return business object even when the stored procedure result set is empty (ReturnDummyBOForSP).
    • Event configuration

      1. In Event order by, indicate the order in which events are retrieved and processed. This is a comma-separated list of column names from the event table, plus the keywords that control the sort order for each column. Use asc for ascending order and desc for descending order. See Event order by (EventOrderBy).

      2. In Event table name, accept the default name of the table that contains the event store, or type a different table name. See Event table name (EventTableName).

      3. In Stored procedure to run before poll, the name of a stored procedure or stored function to run before the actual poll query is called. See Stored procedure to run before polling (SPBeforePoll).

      4. In Stored procedure to run after poll, specify the name of a stored procedure or stored function to run after each polling cycle. See Stored procedure to run after polling (SPAfterPoll).

      5. In Event query type for processing events, select the type of event processing you want to use:

        • To use the standard event processing provided by the adapter, select Standard.

        • To provide your own queries to customize event processing, select User-Defined (Dynamic). If you select this option, complete the additional fields described in the following table.

          Field What to specify For more information
          User-defined delete query The name of the query, stored procedure, or stored function that is run after each event is processed to delete records that can be deleted after the event is delivered. User-defined delete query (CustomDeleteQuery)
          User-defined event query The name of the query, stored procedure, or stored function that performs the polling for events. User-defined event query (CustomEventQuery)
          User-defined update query for failed event delivery The name of the query, stored procedure, or stored function that is run when an event is not delivered successfully. User-defined update query for failed event delivery (CustomUpdateQueryForFailedEvent)
          User-defined update query The name of the query, stored procedure, or stored function that is run after each event is processed to prevent the event from being picked up for processing in a subsequent event cycle. User-defined update query (CustomUpdateQuery)

    • Logging and tracing

      1. If you have multiple instances of the adapter, set Adapter ID to a value that is unique for this instance.

      2. If you want to disguise potentially sensitive user information in log and trace files, select the Disguise user data as “XXX” in log and trace files field.

  8. Click Next.

  9. In the Specify the Location Properties window, specify the name of the module you want to create. This can be a new or existing module.

    • If the module name that you want appears in the Module list, select the name.

      If the module contains an interface or business object with the same name as any you are now configuring, the original interface or business object in the module is replaced by the new version.

    • Otherwise, create a module:

      1. Click New.

      2. In the Select a Business Integration Project Type window, select Create a module project and click Next.

      3. In the Create a Module window, type a name for the module.

        For example, OracleInboundModule.

      4. If you want the service description files (the .export and .wsdl files) to be in the default folder in the module, leave Use default location selected. If you want to specify a different folder in the module, clear the option and then click Browse to specify a different folder in Location.

      5. If you want the module to be automatically opened in the assembly diagram in IBM Integration Designer when the wizard closes, select Open module assembly diagram. Otherwise, clear this option.

      6. Click Finish to create the module.

  10. Specify the namespace you want to use for your business objects.

    • If you want the business objects in the module to use the default namespace, leave Use default namespace selected.

    • To specify a different namespace, clear the option and type a different value in Namespace.

  11. Optionally, specify the folder within the new module where the service description must be saved. In Folder, type the folder name or browse to an existing folder. If you do not specify a folder name, the artifacts (the export, XSD, and WSDL files) are stored in the root folder of the module, that is, the folder with the module name.

  12. In Name, accept the default name of the import or type a different name.

  13. Optionally, if you want to save the business objects in a library where they can be used by other modules, select Save business objects to a library and specify the location of the library in Library.

  14. Optionally, in Description, type a descriptive comment about the module.

  15. When you are finished setting properties, click Finish.

  16. If the Model Changed window is displayed, click Yes.


Results

The wizard exits. The module is created in the project and artifacts are generated.


What to do next

In some instances, you might need to use the assembly editor to complete the configuration. Then you can test or deploy your module.

Configure the module for inbound processing


Previous topic: Setting global properties for operations


Next topic: Completing the configuration


Related concepts:

User authentication