Olá a todos, está tudo bem? Eu sou novo aqui. Estou instalando o dspace 6.3 no Centos 7.9, não conheço o aplicativo. Fiz funcionar no endereço https://localhost:8080/xmlui
Mas preciso trabalhar na URL mydomain.com na porta 80.
Configurei o servidor Apache 2.4 com proxy reverso habilitando o módulo AJP e o conector em 8009 no Tomcat. Mas ele não acessou o aplicativo e está retornando o erro:
"Service Unavailable
The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later."
Gostaria de saber como configuro e aponto o apache no parâmetro “DocumentRoot”
Como você pode ver, eu defino o DocumentRoot como / dspace / webapps. Mas não sei se está certo.
/etc/httpd/conf.d/mydomain.conf by apache
<VirtualHost *:80>
ServerName rmydomain.com
ServerSignature off
ProxyPass /ignored_path !
ProxyPass "/" ajp://127.0.0.1:8009/
ProxyPassReverse "/" ajp://127.0.0.1:8009/
<Directory /opt/tomcat/>
Options FollowSymlinks
AllowOverride All
Options -Multiviews
</Directory>
#RewriteEngine On
#RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
#RewriteRule .* - [F]
</VirtualHost>
<VirtualHost *:80>
ServerName mydomain1.com
DocumentRoot /dspace/webapps
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
</VirtualHost>
Como vc pode vcs podem ver, meu DocumentRoot esta apontando para /dspace/webapps. Mas não sei se está correto.
/etc/httpd/conf/httpd.conf
<VirtualHost *:443>
ServerName mydomain.com
ServerAlias subdomain.mydomain
ServerSignature off
ProxyPass /ignored_path !
ProxyPass "/" ajp://127.0.0.1:8009/
ProxyPassReverse "/" ajp://127.0.0.1:8009/
<Directory /opt/tomcat/>
Options FollowSymlinks
AllowOverride All
Options -Multiviews
</Directory>
## SSL configuration
SSLEngine on
SSLCACertificateFile /etc/httpd/ssl/mydomain.ca-bundle
SSLCertificateFile /etc/httpd/ssl/mydomain.crt
SSLCertificateKeyFile /etc/httpd/ssl/rmydomain.key
SSLCertificateChainFile /etc/httpd/ssl/mydomain.csr
SSLProtocol ALL -SSLv2 -SSLv3
SSLHonorCipherOrder On
SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AESGCM:RSA+AES:!aNULL:!MD5:!DSS
ErrorLog /var/log/httpd/ssl_error_log
CustomLog /var/log/httpd/ssl_access_log common
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
</VirtualHost>
/opt/tomcat/conf/server.xml
<!-- You should set jvmRoute to support load-balancing via AJP ie :
<Engine name="Catalina" defaultHost="localhost" jvmRoute="jvm1">
-->
<Engine name="Catalina" defaultHost="localhost">
<!--For clustering, please take a look at documentation at:
/docs/cluster-howto.html (simple how to)
/docs/config/cluster.html (reference documentation) -->
<!--
<Cluster className="org.apache.catalina.ha.tcp.SimpleTcpCluster"/>
-->
<!-- Use the LockOutRealm to prevent attempts to guess user passwords
via a brute-force attack -->
<Realm className="org.apache.catalina.realm.LockOutRealm">
<!-- This Realm uses the UserDatabase configured in the global JNDI
resources under the key "UserDatabase". Any edits
that are performed against this UserDatabase are immediately
available for use by the Realm. -->
<Realm className="org.apache.catalina.realm.UserDatabaseRealm"
resourceName="UserDatabase"/>
</Realm>
<Host name="localhost" appBase="webapps"
unpackWARs="true" autoDeploy="true">
<!-- SingleSignOn valve, share authentication between web applications
Documentation at: /docs/config/valve.html -->
<!--
<Valve className="org.apache.catalina.authenticator.SingleSignOn" />
-->
<!-- Access log processes all example.
Documentation at: /docs/config/valve.html
Note: The pattern used is equivalent to using pattern="common" -->
<Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs"
prefix="localhost_access_log" suffix=".txt"
pattern="%h %l %u %t "%r" %s %b" />
</Host>
</Engine>
</Service>
</Server>