This chapter showed you details about the main settings and configuration procedures. You learned a lot about deployments and the deployment scanner that uses file marks and how to easily control the deployment and find out about its status.
This chapter has shown us the importance of the logging subsystems and discussed the possibility of segregating logs of applications in different files or just increasing or decreasing the level of detail of the log. It also addressed datasource configuration and how to keep your database password secure from being accessed by a third party.