Explanation: B: To proxy requests by path, use the Location block and the SetHandler statement.
When to use
Use to apply directives to content that lives outside the filesystem. For content that lives in the filesystem, use and . An exception is , which is an easy way to apply a configuration to the entire server.
For all origin (non-proxy) requests, the URL to be matched is a URL-path of the form /path/. No scheme, hostname, port, or query string may be included. For proxy requests, the URL to be matched is of the form scheme://servername/path, and you must include the prefix.
E: Add an IfModule block that defines one of the following:
For a non-clustered WebLogic Server instance:
The WebLogicHost and WebLogicPort parameters.
For a cluster of WebLogic Servers instances:
The WebLogicCluster parameter.
If you are proxying requests by MIME type to a cluster of WebLogic Servers, use the WebLogicCluster parameter.
For example:
WebLogicCluster w1s1.com:7001,w1s2.com:7001,w1s3.com:7001
Note #1: The ... section is used to mark directives that are conditional on the presence of a specific module. The directives within an section are only processed if the test is true. If test is false, everything between the start and end markers is ignored.
The test in the section directive can be one of two forms:
module name
!module name
Note #2:
Directive
Description:Applies the enclosed directives only to matching URLs
Syntax: ...
Context:server config, virtual host
Status:Core
Module:core
The directive limits the scope of the enclosed directives by URL. It is similar to the directive, and starts a subsection which is terminated with a directive. sections are processed in the order they appear in the configuration file, after the sections and .htaccess files are read, and after the sections.
sections operate completely outside the filesystem. This has several consequences. Most importantly, directives should not be used to control access to filesystem locations. Since several different URLs may map to the same filesystem location, such access controls may by circumvented.