1.nio 線程池配置
<Connector port="8080"
protocol="org.apache.coyote.http11.Http11NioProtocol" //nio網絡模型connectionTimeout="30000" //30秒沒有返回數據鏈接超時
URIEncoding="UTF-8" //防止get請求亂碼
executor="tomcatThreadPool" //使用下面配置的線程池
redirectPort="8443" /> //默認https重定向端口,可以不配置
<Executor name="tomcatThreadPool" //線程池名稱,被其他組件引用
namePrefix="catalina-exec-" //日誌中的前綴
maxThreads="850" //最大線程數
minSpareThreads="50"//最小空閒線程數,
maxQueueSize="50"//阻塞隊列中最多可以放入的任務
maxIdleTime="60000"//假如1分鐘內,有空閒線程,就進行銷燬,達到50後停止
prestartminSpareThreads="true" />//是否開啓最小空閒線程數
2.nio ssl 配置
<Executor name="tomcatThreadPool" namePrefix="catalina-exec-" maxThreads="200" minSpareThreads="10" maxQueueSize="10" maxIdleTime="60000" prestartminSpareThreads="true" />
<Connector port="80" protocol="org.apache.coyote.http11.Http11NioProtocol" redirectPort="443" />
<Connector port="443" protocol="org.apache.coyote.http11.Http11NioProtocol" connectionTimeout="20000" SSLEnabled="true"
scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS"
keystoreFile="f:\wo\mykeystore.keystore"
keystorePass="123456"/>
//證書相關參考加密解密藝術 或者 tomcat架構解析
https://www.cnblogs.com/xhw123xhw/p/5412539.html
HttpSession安全性考慮,防止客戶端腳本讀取Session Cookie內容進行諸如CSRF/XSS惡意http攻擊,可在tomcat6的
<Context useHttpOnly="true">
//session相關
<session-config>