Professional Documents
Culture Documents
Provides the infrastructure for running applications that run your business.
Common environment and programming model for your applications.
Platform for developing and Deploying web services and SOA based apps
Secure, Scalable, reliable transaction engine for ERP
IBM WebSphere is architected to enable you to build business-critical applications
for the Web
WebSphere includes a wide range of products that help you develop and serve
Web applications.
They are designed to make it easier for clients to build, deploy, and manage
dynamic Web sites more productively
WAS implements J2EE specification
WebSphere Application Server provides the environment to run your Web-enabled ebusiness applications. An application server functions as Web middleware or a middle
tier in a three-tier e-business environment. The first tier is the HTTP server that
handles requests from the browser client. The third tier is the business database (for
example, DB2 UDB for iSeries) and the business logic (for example, traditional
business applications, such as order processing). The middle tier is WebSphere
Application Server, which provides a framework for a consistent and architected link
between the HTTP requests and the business data and logic.
With the Base and Express packages, you are limited to single application server
environments. The Network Deployment package allows you to extend this
Web container receives the request and, based on the URL, dispatches it to
the proper servlet.
6. If the servlet class is not loaded, the dynamic class loader loads the servlet
(servlet init(), then doGet() or doPost()).
7. JNDI is used for lookup of either datasources or EJBs required by the servlet.
8. Depending upon whether a datasource is specified or an EJB is requested,
the JNDI directs the servlet:
To the corresponding database and gets a connection from its connection
pool in the case of a data source.
To the corresponding EJB container, which then instantiates the EJB when
an EJB is requested.
9. If the EJB request involves an SQL transaction, it goes back to the JNDI to
look up the datasource.
10.The SQL statement is executed and the retrieved data is sent back either to
the servlet or to the EJB.
11.Data beans are created and handed off to JSPs in the case of EJBs.
12.The servlet sends data to JSPs.
13.The JSP generates the HTML that is sent back through the plug-in to the Web
server.
14.The Web server sends the output page (output HTML) to the browser.
Functionality of WAS
WebSphere Application Server supports asynchronous messaging through the use
of a JMS provider and its related messaging system.(JMS 1.1 Messaging
Provider)
WebSphere Application Server provides authentication and authorization
capabilities to secure administrative functions and applications, using LDAP
WebSphere Application Server works with a Web server (such as the IBM HTTP
Server) to route requests from browsers to the applications that run in
WebSphere Application Server. Web server plug-ins are provided for
installation with supported Web browsers. The plug-ins direct requests to the
appropriate application server and perform workload balancing among servers
in a cluster.
Web services enable businesses to connect applications to other business
applications, deliver business functions to a broader set of clients and
partners, interact with marketplaces more efficiently, and create new business
models dynamically.
Delivers a high performance and extremely scalable transaction engine for
dynamic e-business applications
Packaging
WebSphere Application Server is available in multiple packaging options.
All V6 application servers have the same core and base functionality
WebSphere Application Server - Express V6 node can be upgraded to a WebSphere
Application Server V6 node(.Can be done without any software upgrades .Only a
paper license upgrade is required)
WebSphere Application Server- Express V6 and WebSphere Application Server V6
node can be federated into a WebSphere Application Server - Network Deployment
V6 cell (Can be done without any software upgrades .Only a paper license upgrade is
required)
external Web server and Web server plug-in as a front-end to a Web container is more
appropriate for a production environment.
_
Session management
Support is provided for the javax.servlet.http.HttpSession interface as described in
the Servlet application program interface (API) specification.
_
Web services engine
Web services are provided as a set of APIs in cooperation with the J2EE applications.
Web services engines are provided to support Simple Object Access Protocol (SOAP).
EJB Container
The Enterprise JavaBeans (EJB) container provides all the runtime services that are
needed to deploy and manage enterprise beans. It is a server process that handles
requests for both session and entity beans.
The enterprise beans, packaged in EJB modules, installed in an application server
do not communicate directly with the server. Instead, the EJB container provides an
interface between the enterprise beans and the server. Together, the container and
the server provide the enterprise bean runtime environment.
The container provides many low-level services, including threading and
transaction support. From an administrative viewpoint, the container manages data
storage and retrieval for the contained enterprise beans. A single container can host
more than one EJB Java archive (JAR) file.
WAS Services
J2EE Connector Architecture services
Transaction service
Dynamic cache service
Message listener service
Object Request Broker service
Administrative service (Java Management Extensions)
Diagnostic trace service
Debugging service
Name service (Java Naming Directory Interface)
Performance Monitoring Interface service
Security service (JAAS and Java 2 security)
Service Integration Bus service
The Web server:
A Web server handles the HTTP protocol. When the Web server receives an HTTP
request, it responds with an HTTP response, such as sending back an HTML page. To
process a request, a Web server may respond with a static HTML page or image, send
a redirect, or delegate the dynamic response generation to some other program such
as CGI scripts, JSPs (JavaServer Pages), servlets, ASPs (Active Server Pages), server-
side JavaScripts, or some other server-side technology. Whatever their purpose, such
server-side programs generate a response, most often in HTML, for viewing in a Web
browser.
Understand that a Web server's delegation model is fairly simple. When a request
comes into the Web server, the Web server simply passes the request to the program
best able to handle it. The Web server doesn't provide any functionality beyond
simply providing an environment in which the server-side program can execute and
pass back the generated responses. The server-side program usually provides for
itself such functions as transaction processing, database connectivity, and
messaging.
While a Web server may not itself support transactions or database connection
pooling, it may employ various strategies for fault tolerance and scalability such as
load balancing, caching, and clusteringfeatures oftentimes erroneously assigned as
features reserved only for application servers.
Eg: Apache HTTP Server, Sun ONE Web Server, iPlanet Web Server
The application server:
As for the application server, according to our definition, an application server
exposes business logic to client applications through various protocols, possibly
including HTTP. While a Web server mainly deals with sending HTML for display in a
Web browser, an application server provides access to business logic for use by client
application programs. The application program can use this logic just as it would call
a method on an object (or a function in the procedural world).
Such application server clients can include GUIs (graphical user interface) running on
a PC, a Web server, or even other application servers. The information traveling back
and forth between an application server and its client is not restricted to simple
display markup. Instead, the information is program logic. Since the logic takes the
form of data and method calls and not static HTML, the client can employ the
exposed business logic however it wants.
In most cases, the server exposes this business logic through a component API, such
as the EJB (Enterprise JavaBean) component model found on J2EE (Java 2 Platform,
Enterprise Edition) application servers. Moreover, the application server manages its
own resources. Such gate-keeping duties include security, transaction processing,
resource pooling, and messaging.
Like a Web server, an application server may also employ various scalability and
fault-tolerance techniques.
Difference between AppServer and a Web server :
(1) Webserver serves pages for viewing in web browser, application server provides
exposes businness logic for client applications through various protocols
In J2EE application modules are packaged as EAR, JAR and WAR based on their
functionality .These files are simply zipped files using java jar tool. These files are
created for different purposes.
.jar files:
JAR files (Java ARchive) allows aggregating many files into one, it is usually used to
hold Java classes in a library. i.e. Math.jar These files are with the .jar extension.
The .jar files contain the libraries, resources and accessories files like property files.
.war files:
WAR files (Web Application aRchive) stores XML, java classes, and JavaServer pages
for Web Application purposes. These files are with the .war extension. The war file
contains the web application that can be deployed on the any servlet/jsp container.
The .war file contains jsp, html, javascript and other files for necessary for the
development of web applications.
.ear files:
EAR files (Enterprise ARchive) combines JAR and WAR files to make a combined
archive for Enterprise Applications. The .ear file contains the EJB modules of the
applications
1.
2.
3.
Explain
Session affinity:
Most servers use the term "Session Affinity" to indicate that within a
cluster of servers, requests from the same client always get routed back to the same
server. (or) In a clustered environment, any HTTP requests associated with an HTTP
session must be routed to the same Web application in the same JVM.
Session Persistance:
You use session persistence to permanently store data from an HTTP
session object to enable failover and load balancing across a cluster of WebSphere
Applicaiton Servers.
Sessiontracking:
Session tracking enables you to track a user's progress over multiple
servlets or HTML pages, which, by nature, are stateless.
How do you set session time out :
You can specify an interval of time after which HTTP sessions expire.
click Servers > Application servers > server_name > Web container
settings > Session management > Session Timeout
What are the different levels at which session timeout can be set
application level, web module level, server level
5.
How do you upgrade WAS
GUI Upgrade
Silent Upgrade
Logs files and their paths for both
6.
Back Ups
7.
corbaname::myhost1:9812/NameServiceServerRoot#ejb/webbank/Account
Complex names
Compound name/remote/complex
Applications that do not run in the same server cannot use simple
name lookup because the simple name is not local to the application. Instead, an
application of this type must look the object up directly from the name server. Each
application server contains a name server. System artifacts such as EJB homes are
bound relative to the server root context in that name server. The fully qualified
(compound name) JNDI name is always guaranteed to work.
Here is an example of a compound name:
cell/nodes/node1/servers/server1/ejb/webbank/Account
When do you use dumpNameSpace.sh
Run the dumpNameSpace command against any bootstrap port to
get a listing of the names bound with that provider URL.
11.
from the pool then return it when finished using the connection. Connection pooling
enhances performance by eliminating the costly task of creating database
connections for the application.
Each data source that you configure contains a pool of database
connections that are created when the data source instance is created-when it is
deployed or targeted, or at server startup.
Connection Timeout
This value indicates the number of seconds a request for a connection
waits when there are no connections available in the free pool and no new
connections can be created.
Max Connections
Specifies the maximum number of physical connections that you can create in
this pool.
Min Connections
Specifies the minimum number of physical connections that you can create in
this pool.
Reap Time
Specifies the interval in seconds between runs of pool maintenance thread.
Unused Timeout
Specifies the interval in seconds after which an idle or unused connection is
discarded.
Aged Timeout
Specifies the interval in seconds before a physical connection is discarded.
Which one should be the highest and which one should be the lowest in
the reap/unused/aged timeouts.
Aged timeout should be the highest and Reap timeout should be
lowest.
Purge Policy
Specifies how to purge connections when a stale connections or fatal
connection error is detected.
What are stale connection exceptions
When an application receives a stale connection exception on a
database operation, it indicates that the connection currently held is no longer valid.
(or)
Whenever a troubled connection is encountered, a
staleConnectionException is raised. (A troubled connection is an inconsitent
connection object in a connection pool)
12.
13. How would you go about when a new application comes into ur
environment (resources, settings, heaps etc)
14.
15.
17.
VerboseGC
application with the minimum heap size that it needs. When it starts up, the
Garbage Collector will run often and, because the heap is small, it runs efficiently.
Whats the max heap allowed by AIX
Minimum heap size allowed
AIX:
4 MB
LINUX:
4 MB
WINDOWS:
4 MB
Maximum heap size allowed
AIX: Half the available memory with a minimum of 16 MB and a maximum of
512 MB
LINUX:
Half the available memory with a minimum of 16 MB and a
maximum of 512 MB
WINDOWS: Half the real (physical or RAM) memory with a minimum of 16 MB
and a maximum of 2 GB
What are the effects of large initial heap/max heap
The time between garbage collections will increase, but the garbage
collection will take longer, which indirectly effects the turn-around-time of the
applicaiton performance.
(or)
Because it delays the start of garbage collection until the heap
is full. The first time that the Garbage Collector runs, therefore, becomes a very
expensive operation. Also, the heap is more likely to be fragmented and require a
heap compaction. Again this is a very expensive operation.
20.
generate a heapdump, you must first enable signal-based heapdumps by setting the
IBM_HEAPDUMP=TRUE and IBM_NOSIGHANDLER=TRUE environmental variables and
through wsadmin follow the below process:
>set myheap_dm [$AdminControl queryNames type=JVM,process=server1,*]
>$AdminControl invoke $myheap_dm generateHeapDump
How to generate core dump/thread dump both WAS 5/6
Through wsadmin
>set mythread_dm [$AdminControl completeObjectName
type=JVM,process=server1,*]
>$AdminControl invoke $mythread_dm dumpThreads
21.
What is a PMR and explain how you worked with IBM on a PMR
PMR: Problem Management Record ---- PMR is created wehn a customer
submits a request to fix a software problem via ESR. A PMR number is assigned to
track the request. You can attach files to your PMR to provide the IBM engineer more
information to better assist you.
ESR: Electronic Service Request -------25. What all parameters did you tune in WAS (other than JDBC connection
pool and heap sizes)
We can tune some of these other aspects such as
1. Application server (parameter : )
2. JVM tunings (parameter : )
3. Applications (parameter : )
4. Database (parameter : )
5. JMS (parameter : )
6. Security
7. Hardware capacity and settings (parameter : )
8. Operating System (parameter : )
9. Web Servers (parameter : )
26. What other connection pools do you know in WAS other than JDBC
connection pool
J2C connection pool
MQ connection pool
Thread pool
27.
OS)
2. Configure Authentication mechanisms (LTPA)
3. Configure Authorization (if there is any)
and then check Enable global security.
What is SSL
Secure Socket Layer is the technology to establish secure
communication along with data integrity and encryption over the network or between
the nodes (machines)
29.
30.
What is the utility that comes with WAS / IHS to manage certificates
ikeyman.sh
31.
32.
C:\WebSphere\profiles\dmgr\config\cells\dmgr_cell\nodes\dmgr_node\serviceindex.xm
l (dmgr starts but cannot open the admin console because the port hasn't been
changed in virtual host xml file)
C:\WebSphere\profiles\dmgr\config\cells\dmgr_cell\virtualhosts.xml
33.
When the request comes to a webserver how does the webserver know
the JVM that is capable of handling that request.
The webserver first takes the request and if it can't serve, it
forwards the request to the plugin config file . The plugin config file routes the
request
to the appropriate application server (or cluster member or jvm)
If changes are made to the config file should the webserver be restarted
Yes. The webserver must to restarted so the changes made to the config file
become effective.
What changes are made to this config file (automatically) during plugin
installation on the webserver
The plugin's binary module file (.dll) path and the plugin's
configuration file (plugin-cfg.xml) path will be copied to the httpd.conf file
automatically.
38.
Will it work??
We can federate it to the same DM. This works.
If it doesnt, how will you make it work
40.
Unix commands
How do you create a JDBC resource
type.
Step 3: Select the implementation type. Choose a supported implementation
type.
Step 4: Apply
Step5: Now create the required Data Sources
To view this administrative console page, click Resources > JDBC Providers
> JDBC_provider > Data sources > New
44. What is the difference between webserver handling in WAS 5 and 6
45. New features in WAS 6
46.
48.
50.
8) What is the use of SOAP Connector port and what is the default soap port number
for DMGR profile.
Client Applications like wsadmin uses Simple Object Access Protocol and
that is listening to the port 8879. If we want federate a profile by using
SOAP protocol and SOAP connector port number, we can federate a profile.
9) What is the default Http transport port number for Application Server profile and
what is the use.
9080, (if ssl was enabled 9443) If we want to invoke applications running on
AppServer we are using HTTP transport port
10) What is the default Bootstrap port number in App.Serv profile and what is the
use.
2809. To access the EJBs, JNDI use bootstrap port to obtain initial context
root.
11) Installation was successful and when I am trying to start server it is giving
Invocation Target Exception why you will get this issue and how you are trouble
shooting this issue.
May be the problem with hostnames, hostnames are mismatched. Add the
host name in etc/hosts file which you had given at the time of installation.
12) What are different profile templates in WAS 6.0?
Dmgr, default and managed
13) Write the complete command to create an App.Serv profile through command
line.
C:\IBM\WebSphere\AppServer\bin>wasprofile.bat -create -profileName
AppSrv04 -profilePath "C:\IBM\WebSphere\AppServer\profiles\AppSrv04"
-template Path "C:\IBM\WebSphere\AppServer\profileTemplates\default"
-nodeName app_node04 -cellName cell04 -hostName krishamurthy
14) Write a complete command to delete a profile.
C:\IBM\WebSphere\AppServer\profiles\AppSrv01\bin>wasprofile.bat -delete
-profileName AppSrv01
15) If you get a problem before creating a logs directory at the time of installation, at
that time where you can check the status of installation
tmp/log.txt
16) What is the difference between managed node and unmanaged node
Manged Node contains node agent, we can administer federated profiles
servers and applications from dmgr admin console. For unmanaged the will
be no nodeagent.
17) What is the impact for the federated profile servers, if DMGR is down.
No impact on servers and applications
18) In which xml file, we can change the port numbers.
Serverindex.xml
19) What is a server.
Server provides a runtime environment for your web apps Or Enterprise
applications.
Server receives user request, process that request and execute that
request and response will be generated to the end users.
20) If we stop the nodeagent, what will be the impact for end users.
There is no impact for end users
21) How to take backup with out stopping servers.
./backupConfig.sh nostop
22) What are the different user registries under global security in 6.0 and 6.1.
Local OS, Custom, LDAP. Federated repository was added in 6.1
23) What is the necessity of global security?
To provide security for the admin console.
24) What is the port number for LDAP server with SSL and without SSL?
389 and 636
25) How to disable Global Security
./wsadmin.sh -conntype NONE
Securityoff exit
26) How to know how many profiles are available.
/AppServer/bin>./wasprofile.sh listProfiles
27) What are the advantages and disadvantages of Local OS,Custom and LDAP user
registries?
Global Security: In 6.0 we have 3 ways to provide security for admin
console.
1) Local os user registry.
2) Custom user registry.
3) LDAP (Light Weight Directory Access Protocol) user registry.
a) Custom user registry: Here we have to create two files named:
Users. Registry
Groups. Registry
We can create this file any where but we have to configure this absolute path to the
application servers.
b) LDAP: It is a mechanism & not a server. Here we are integrating seperate directory
servers.
if SSL is enabled the port number is 636, if it is not enabled 389.
-> In local os user registry we have to create user accounts and that user
accounts have to configure to websphere application servers.
where as in the custom user registry specifying user names and passwords in
a normal file and we are specifying the absolute path of that file into the websphere
application server. whenever we are going for LDAP user registry we have to specify
user id & password & type of directory server, port number (default is 389), if SSL is
enabled we have to specify port number as 636 and we have to specify Base
distinguished name which indicates authentication for users and we have to specify
Bind distinguished name and Bind password which specify authorization for user and
we have to select "Advanced Light Weight Directory Access Protocol user registry
settings" there we have to specify user filter classes and group filter classes
(automatically it will be there) and finally we have to restart the server.
28)What is the full form of JDBC.
JDBC (java Database Connectivity) is an API (Applicationprogram Interfaces), that is
useful to write a java program to connect any database, and retrieve the data form
the database and utilize the data in the java program.
Making a connection to a database
Creating SQL or MySQL statements
Executing that SQL or MySQL queries in the database
Viewing & Modifying the resulting records
We have 2 types of JDBC drivers in was. Those are Type2(Thick) and
Type4(Thin/Native Protocol) jdbc drivers.Type2 JDBC drivers require the database
client software on the client node to connect to the database server.Type4 JDBC
drivers connect directly to the database server.
29) What is the full form of JAR and what a jar file contains?
An EJB module which contains enterprise java beans class files and EJB
deployment descriptors are packed as JAR files with .jar extension.
30)Write the name of the jar file necessary to configure Oracle 9i & Oracle 10g
Database.
In oracle 10g & 9i We have only one jar file i.e OJDBC14.JAR (for log) & Class12.jar
(for 9i) and In DB2 we have 3 or more jar files. i.e
DB2JCC.JAR,DB2JCC_LICENSE_C4.JAR, DB2JCC_LICENCE_CIS42.JAR.
-> The .jar file is nothing but a collection of .class files. It is necessary to
communicate with the database. So we should configure this jar files with database.
31) What is a connection pool?
Connection pooling is a place where a set of connections are kept and are used by
the different programmers with out creating connections to the database(it means
there is a ready made connection available for the programmers where he can use).
After using the connection he can send back that connection to the connection pool.
Number of connections in connection pool may vary.
32) What is meant by Federation
33) What are the different types of console roles available and explain about each
role?
34) what is your goal and role in was?
Goal a. Goal is to provide infrastructure for the demands
b. goal is to provide stable environment
c. goal is to provide high availability
what is the use of it? its the central repository and depending access polices agency
wide authorized and authenticated *users* can access documents.
ex.,
u have prepared a document on ur environment. u need a place to put that document
so that ur team can access it, ur manager can access it. above that, another team
who wants to read that document can access that, above that, some infrastructure
team can access it, above that datacom people can access it and so on.
what is the best place to put it?
on ur desk top? or attach to mail? or dump it in a shared location.
if its a shared location, what that could be? will you dump it in a zunkyard shared
location or in a proper shared location? first | < previous | next > | last
report spam reply
49) TYPES OF SEVERIATIES?
Severities will be of different types like Severity 1, 2, 3, 4, 5.
Depending upon the type of issue it will be classified.
50) WHAT TYPE OF ISSUE'S CONTAIN SEVERIATY1 TICKET'S?
Severity 1 tickets are the most rare tickets which will get and
which we have to get in our administration.
If our process is not running smooth, that means your application not responding,
application server is not responding or entire environment falls then we will get
severity 1 ticket.
51.WHAT IS THE DIFF B/W COREDUMP & THREAD DUMP?
there is not much difference between these two.
In thread dump we can find, what are the active threads that are there at that
particular time. Where as core dump contains information about dead locks,
hang threads also
52.WHEN THE SERVER HUNG HOW WILL IDENTIFY IN SYSOUT.LOG?
Its very simple in systemout.log we will find a particular thread is hung from this
many milli seconds will be found. The thread name will be WSVR****
53. HOW TO TAKE BACKUP THE APPLICATION?
Taking backup of the application can be done by using export option
in the admin console or directly from the directory location.
54. WHAT'S THE RELATION B/W WIILY INTROSCOPE & WAS(LIKE AGENT/AGENTLESS)?
Wily introscope is a third party tool which is used to monitor the server environments,
not only WAS anything.
55) Difference between Websphere 5.1, 6.1 and 7.0
Profiles
WebSphere 5.1:No Concepts of profile ,there are 4 types of Installation
-Express,Base ,Network Deployment and Enterprise.
Websphere 6.1:Cell Profile,Deployment Manager profile,Application Server
profile,Custom Profile
Websphere 7.0 Cell(DeploymentManager and managed
node),Management,Application Server,Custom profile,Secure Proxy.
//Refrence of JVM
objectName=AdminControl.queryNames('type=JVM,process=WebSphere_Portal,*')
wsadmin>print objectName
WebSphere:name=JVM,process=WebSphere_Portal,platform=dynamicproxy,node=ah
dp2csmwas78,j2eeType=JVM,J2EEServer=WebSphere_Portal,version=6.0.2.21,type=J
VM,mbeanIdentifier=JVM,cell=wpcell
//genrate heapdump
wsadmin>AdminControl.invoke(objectName, "generateHeapDump")
Posted by TechnoTips at 4:24 AM 0 comments
Reactions:
use). After using the connection he can send back that connection to the connection
pool. Number of connections in connection pool may vary.
1)How many JDBC drivers are there ?
A) 2
B) 4
C) 3
D) 1
2)Which of the following is false for the Type 1 JDBC bridge driver?
A) A Type 1 driver is a JDBC-ODBC bridge driver
B) This type of driver enables a client to connect to an ODBC database via Java calls
and JDBC
C) Both the database and middle tier need to be Java compliant.
D) ODBC binary code must be installed on each client machine that uses this driver.
Explanation: Neither the database nor the middle tier needs to be java compliant.
3)Which of the following statement is true for the Type 2 JDBC driver?
A) A Type 2 driver converts JDBC calls into calls for a specific database.
B) This driver is referred to as a "native-API, partly Java driver."
C) As with the Type 1 driver, some binary code may be required on the client
machine, which means this type of driver is not suitable for downloading over a
network to a client.
D) All of the above
4)What is the difference between EAR, JAR and WAR file
Answered by Jey on 2005-05-08 11:23:41: In J2EE application modules are packaged
as EAR, JAR and WAR based on their functionality
JAR:
EJB modules which contains enterprise java beans class files and EJB deployment
descriptor are packed as JAR files with .jar extenstion
WAR
Web modules which contains Servlet class files,JSP FIles,supporting files, GIF and
HTML files are packaged as JAR file with .war( web achive) extension
EAR
All above files(.jar and .war) are packaged as JAR file with .ear ( enterprise archive)
extension and deployed into Application Server.
5)Full form of java jar file?
In: JAVA Programming [Edit categories]
JAR = Java ARchive
6)Re: URL of Oracle thin driver.
Topic: JDBC
Luigi Viggiano PREMIUM, Jun 4, 2001 [replies:1]
briefly: jdbc:oracle:thin:@hostname:port:oracle-sid
1. in green the Oracle sub-protocol (can be oracle:oci7:@, oracle:oci8:@,
racle:thin:@, etc...) is related on the driver you are unsign and the protocol to
communicate with server.
2. in red the network machine name, or its ip address, to locate the server where
oracle is running.
3. in blue the port (it is complementary to the address to select the specific oracle
service)
4. in magenta the sid, select on wich database you want to connect.
Web sphere edge server is used to improve the performance of web based systems.
It can be used as forward or proxy server. Basically four components are present in
the web sphere they are Network dispatcher, Caching proxy, Content distribution and
application service at the edge.
6) Explain about extended deployment?
Web sphere application server extended deployment increases the functionality of
the server in two main areas they are manageability and performance. Dynamic
virtualization between servers is possible with the help of XD. A stand alone
distributed cache was added to it under the performance header, it is known as
Object Grid.
7) Explain about the security features present in WAS?
Security model for web sphere is primarily based on JAVA EE security model. It also
depends upon the operating system. User authentication and authorization
mechanisms are also provided in WAS. Light weight third party authentication
mechanism is the main security feature present in WAS.
8) Explain about asymmetric clustering?
Asymmetric clustering applications are primarily used in electronic trading systems
employed in banks. Some of the features are, partitions can be declared during run
time and are usually run on a single cluster at a time. Work specific to a particular
can be routed to that cluster.
9) Explain the various Administrator benefits using Web sphere?
Web sphere almost reduces the work of server administrator as he can manage load
on servers efficiently without any hassles. It also gives him flexibility to divide the
load and applications among different server farms. He can also predict about the
incoming load on servers. Email alerts, restart options, memory leak detection, etc.
10) Explain about caching proxy of IBM Web sphere Edge sphere?
A caching proxy can be configured in forward direction or as a proxy. Content
requested by the user is cached by edge before sending or adhering to the query.
Page fragments arising from JSP or servlets are cached by Edge and the caching
process is slow. Performance and scalability of J2EE applications can be increased by
edge.
11) Explain about the network deployment feature present in WAS?
Managing singletons will be a thing of the past and it also provides hot recovery of
singletons which makes you forget about your GC collected singletons. Transaction
logs can stored on a shared file system. For clustering run time operations
deployment manager`s role was eliminated. J2EE failover support and cell
configuration support is also present.
12) Explain about IBM web sphere integration developer?
Web sphere integration developer provides an IDE to build applications based on
service oriented architecture. Web sphere process server and web sphere ESB were
built with WID. WID was built with RAD Eclipse based technology.
him about all your interests and passion without going into detail, if asked state him
about it in detail.
3) Why did you choose this specific course or stream of study when there are these
many options available to you?
When answering this question explain to him about why you choose this course or
stream of study. What made you to choose this course, it would be an added
advantage if you speak about the different projects you did. Also state or explain
about your goal and higher education pursuits.
4) What will be the future of this industry?
You need to explain the current trend of the industry and then explain to him about
future developments. This is very important because it shows you that you are going
hand in hand on the developments of the industry.
5) Explain specifically why we need to hire you?
Explain to the interviewer about the necessary skills you have which were mentioned
in the job requirement and also tell him about your team playing skills, soft skills, etc
which can fetch you the job. If you have interest in pursuing higher studies then do
explain about that.
6) Explain us about your previous project and its benefits
As the question states you need to explain to him about your project and its benefits.
Do remember a project is done by a team and it has features such as Environment,
team members, technical descriptions, usage, etc. This is very important as he will
mention to the technical HR about your project.
7) What was the reason you left your previous job?
While explaining this question you need to make sure that you dont speak about the
negative features of your previous job which made you to leave the company instead
explain about those negative features in a convincing manner and you can state that
those reasons are hindering your growth.
8) What is your goal and what do you like to achieve in the near future?
Explain to him about the goal which you would like to pursue in the near future and
how the company can help you achieve that goal. Have a goal which is reasonable
and achievable because it gives you a feeling of accomplishment.
9) What was your biggest job or project accomplishment?
For this question you would be explaining to him about the most challenging project
you undertook and the benefits you obtained by completing it within the deadline.
This will explain to the interviewer about your necessary skills, management skills
and team play.
10) Can you go to tours often?
When answering this question have it in mind that your answer will be kept in the
record. If you cannot take tours due to various reasons state them in a pleasant tone.
The answer which you give will be kept in the record. Also make it a habit to take
small tours or travelling because every job demands that.
Security. You can digitally sign the contents of a JAR file. Tools that recognize your
signature can then optionally grant your software security privileges it wouldn't
otherwise have, and detect if the code has been tampered with.
Decreased download time. If an applet is bundled in a JAR file, the applet's class files
and associated resources can be downloaded by a browser in a single HTTP
transaction, instead of opening a new connection for each file.
Compression. The JAR format allows you to compress your files for efficient storage.
Package sealing. Packages stored in JAR files can be optionally sealed to enforce
version consistency and security. Sealing a package means that all classes defined in
that package must be found in the same JAR file.
Package versioning. A JAR file can hold data about the files it contains, such as
vendor and version information.
Portability. The mechanism for handling JAR files is a standard part of the Java
platform's core API.
Compressed and uncompressed JARs
The jar tool (see The jar tool for details) compresses files by default. Uncompressed
JAR files can generally be loaded more quickly than compressed JAR files, because
the need to decompress the files during loading is eliminated, but download time
over a network may be longer for uncompressed files.
The META-INF directory
Most JAR files contain a META-INF directory, which is used to store package and
extension configuration data, such as security and versioning information. The
following files or directories in the META-INF directory are recognized and interpreted
by the Java 2 platform for configuring applications, extensions, and class loaders:
MANIFEST.MF. The manifest file defines the extension- and package-related data.
INDEX.LIST. This file is generated by the new -i option of the jar tool and contains
location information for packages defined in an application or extension. It is part of
the JarIndex implementation and used by class loaders to speed up the class loading
process.
xxx.SF. This is the signature file for the JAR file. The placeholder xxx identifies the
signer.
xxx.DSA. The signature block file associated with the signature file stores the public
signature used to sign the JAR file.
The jar tool
To perform basic tasks with JAR files, you use the Java Archive Tool (jar tool) provided
as part of the Java Development Kit. You invoke the jar tool with the jar command.
Table 1 shows some common applications:
Table 1. Common usages of the jar tool
Function
Command
Creating a JAR file from individual files
jar cf jar-file input-file...
Creating a JAR file from a directory
jar cf jar-file dir-name
Creating an uncompressed JAR file
jar cf0 jar-file dir-name
Updating a JAR file
jar uf jar-file input-file...
Viewing the contents of a JAR file
jar tf jar-file
Extracting the contents of a JAR file
jar xf jar-file
Extracting specific files from a JAR file
jar xf jar-file archived-file...
Running an application packaged as an executable JAR file
java -jar app.jar
-------------------------------------------------------------------------------what is a connection pool?
Connection pooling is a technique used for sharing server resources among
requesting clients. This article focuses on support for connection pooling of both
database resources and non-database resources in a J2EE environment. Siva
examines the JDBC 2.0, JMS 1.02, JNDI 1.2 Standard Extension APIs with regard to
connection pooling and looks at some existing vendor implementations of those APIs.
He then looks at the upcoming J2EE Connector Architecture 1.0 that would support a
vendor-independent/pluggable approach to managing resource connections.
-> The .jar file is nothing but a collection of .class files. It is necessary to
communicate with the database. So we should configure this jar files with database.
JDBC: providers create connection between web application server & database server
for communication.But data source provide communication for applications inside
WAS with particular database inside the DB server.
->We can say HTTP Servers as web servers also.
The responsibility of http servers is to serve static content only. It will give
quick response to static content than app servers.
To communicate between http servers & app servers we have a concept called
"PLUG-INS".(it is a intermediatory component)
By using round robin algorithm (default), here we have a concept routing
table, which is taken care by the http server.
-> Plug-ins contain Plugin-cfg.xml contains complete information about
application server environment i.e how many clusters are there, how may cluster
environments are there, weight of cluster etc.
Virtual Host: Here we will have wc-default host port number also. We can create or
change this ports by using Virtual hosts concepts. All applications and application
servers has to listen to this ports.
->If we want to access an application under multiple domains, or by using
multiple ports, (simply multiple domains,multiple ports). After following all the steps
we have to restart the server.
->multiple domain names can access the same application.
->All the applications will go through the http server only at the time of
trouble shooting we can by pass this http server for some purposes.
Clusters: A logical group of related components is a "Cluster".
->Here, if server1 fails to deploy one application servers will take care of that,
which is called as clustering but this will not supported by Base & Express.
Q)What is high availability, why we have to go for clusters?
At any cost the application should be available at all times, it should not go
down. To overcome this problems we go for clusters.
->We have 2 types of clusters:
1) Vertical Clusters.
2) Horizontal clusters.
1) Vertical Clusters: Here we are deploying app1 through cluster, so if server1
fails we can access through server2. But if the host i.e, the total physical machine get
crashed then we can not access. This is the disadvantage with the vertical clusters.
2) Horizontal clusters: Here we are deploying apps in multple hosts or physical
boxes. Here if one host gets crashes, the end user can access.
Hence, to achieve high availability we are going for clusters.
-> coming to performance, vertical cluster gives more performance than the
horizontal because transmission of response takes time.
-> vertical is preferred in development, test environment.Horizantal is used in
production environment.
-> Here if the application is not running under server2 we have to add the
server2 ports into the virtual hosts.
Plugin-cfg.xml: The plugin-cfg.xml contains information about application server
environment like how many clusters, how may cluster members, application uri, port
numbers, routing algorithms, weight of cluster members.
-> An application contains:
What is the error HTTP 403 indicates and how to solve these issues?
This is due to SSL certificate or some security settings in the server might have
issues.
Introduction
Your Web server thinks that the HTTP data stream sent by the client (e.g. your Web
browser or our CheckUpDown robot) was correct, but access to the resource
identified by the URL is forbidden for some reason.
This indicates a fundamental access problem, which may be difficult to resolve
because the HTTP protocol allows the Web server to give this response without
providing any reason at all. So the 403 error is equivalent to a blanket 'NO' by your
Web server - with no further discussion allowed.
By far the most common reason for this error is that directory browsing is forbidden
for the Web site. Most Web sites want you to navigate using the URLs in the Web
pages for that site. They do not often allow you to browse the file directory structure
of the site. For example try the following URL (then hit the 'Back' button in your
browser to return to this page):
This URL should fail with a 403 error saying "Forbidden: You don't have permission
to access /accounts/grpb/B1394343/ on this server". This is because our
CheckUpDown Web site deliberately does not want you to browse directories - you
have to navigate from one specific Web page to another using the hyperlinks in those
Web pages. This is true for most Web sites on the Internet - their Web server has
"Allow directory browsing" set OFF.
403 errors in the HTTP cycle
Any client (e.g. your Web browser or our CheckUpDown robot) goes through the
following cycle:
Obtain an IP address from the IP name of your site (your site URL without the
leading 'http://'). This lookup (conversion of IP name to IP address) is provided
by domain name servers (DNSs).
behaviour a total stranger would get if they surfed the Internet to your Web page
URL.
If this type of browser check indicates no authority problems, then it is possible that
your Web server (or surrounding systems) have been configured to disallow certain
patterns of HTTP traffic. In other words, HTTP communication from a well-known Web
browser is allowed, but automated communication from other systems is rejected
with an 403 error code. This is unusual, but may indicate a very defensive security
policy around your Web server.
Fixing 403 errors - CheckUpDown
The first question is whether the Web page for your URL is freely available to
everyone on the Internet. If this is not the case, then you may need to provide two
items 2. Web Site User ID and 3. Web Site Password for your CheckUpDown
account - but only if your site uses HTTP Basic Authentication. The Web Master or
other IT support people at your site will know what security and authentication is
used.
If however your Web page is open to all customers and there have been no
fundamental changes recently to how your Web site is hosted and accessed, then an
403 message should only appear if your Web server objects to some aspect of the
access we are trying to get to your Web site. Because it indicates a fundamental
authority problem, we can only resolve this by negotiation with the personnel
responsible for security on and around your Web site. These discussions
unfortunately may take some time, but can often be amicably resolved. You can
assist by endorsing our service to your security personnel. Please contact us (email
preferred) if you see persistent 403 errors, so that we can agree the best way to
resolve them.
If the page cant display error comes then what you will do in the
production system?
a)
There must be some network issue or server not receiving the request.
Need to check the server availability.
What is the error HTTP 404 indicates and how to solve these issues?
The 404 or Not Found error message is an HTTP standard response code indicating
that the client was able to communicate with the server but the server could not find
what was requested..
What is the difference between page not found and HTTP 404? How to solve
these issues?
a)
The Page not found error is, the request is not reaching the server. HTTP 404
errors is request is reaching to server but whatever it is expecting its not found at
expected location
What is meant by ear expander utility?
EAR Expander utility is used to expand the application binaries into any path,
normally we will use this to expand it in other than the default path.
Once expanded we will update the same app binaries from WAS admin console to
update WAS.
The EARExpander expands Ear files into the format desired by the application server
runtime, as described in the application installation instructions. EARExpander can
also collapse the expanded format back to a normal Ear (.jar or .zip) format.
Invoking the tool
The tool is located in the following directory:
product_installation_root/bin/EARExpander.bat
To view syntax, open a command line and invoke the tool without arguments. Here is
a typical result. The line breaks have been changed for better formatting in this
documentation.
C:\seaa0122.02\bin>EARExpander.bat IBM WebSphere Application Server,
Release 4.0 J2EE
J2EE Application Expansion Tool, Version 1.0
Copyright IBM Corp., 1997-2001
Required Argument Missing:ear
Usage: java com.ibm.websphere.install.commands.EARExpander
-ear -expandDir -operation [expansionFlags]
ExpansionFlags indicate whether you want every JAR file expanded, or just the
contained WAR files within the EAR file. The default is all.
Expanding files
The following example command expands the file my.ear into the
product_installation_root/bin/myEAR directory:
EARExpander -ear my.ear -expandDir product_installation_root/bin/myEAR
-operation expand
Collapsing files
Using the collapse -operation reverses the format to normal.
EARExpander -ear my.ear -expandDir product_installation_root/bin/myEAR
-operation collapse
Type each of the above commands on a single line, despite their appearance in this
documentation.
What is meant by JAVA Script?
Java script is a scripting tool to developed web applications.
What is meant by Heap in Java process and what information will be
available in heap file?
a)
Heap is used to collect the garbage for java applications; the Heap file
contains the garbage collected from java process.
SSL mean secured socket layer. This is to secure the WebSphere environment.
SSL provides connection security through
-Communication privacy the data on the connection is encrypted
-Communication integritythe protocol includes a built-in integrity check
-Authenticationthe client knows who the server is
-SSL creates a VPN, securing the data using a combination os symmetric and
asymmetric encryption.
Symmetric key encryption:
Symmetric or secret key technology is a model in which two parties have a
shared secret
The same key is used for both encryption and decryption
Note: The trouble with this approach is that at some point the secret needs to
be shared. In an e-business application, this would be rather difficult.
Asymmetric key encryption:
Public key cryptography:
-two keys that are cryptographically related
-Public key (can be shared with every one)
Private key ( Must never be shared; possession is proof)
-Keys are asymmetric
Given message is encrypted with one key and decrypted with the other
Note : - If a server has public- private set, it can send out its public
key( through a signing certificate also known simply as a certificate ) to
client machine. Those client machines can then use that public key to encrypt
messages designed for the server which then only the server can decrypt.
Unlike symmetric key encryption, this process does not require the client and
server to have a shared secret.
Since the client can validate the servers certificate, there is one way to
authentication. But the server has no way (at this point) to authenticate the
client. Nor can the server send the client secured messages.
How does SSL works ?
SSL uses a combination of asymmetric and symmetric encryption to create a
session between the client and server.
-Asymmetric encryption is used to negotiate a session key (shared secret)
--asymmetric encryption is slow but does not require a shared secret.
-Symmetric encryption os used to transfer data between the client and server
-- symmetric encryption is fast but require a shared secret
SSL Working Mechanisam:
1) Client request SSL connection
2) Server presents certificate
3) Client verifies server certificate
4) Client generate a session key, encrypts it with the servers public key
5) Using the session key, client and server swith to asymmetric key
encryption
6) HTTPS communications
Note : Because the client chooses its own session key, nobody else
knows it. It can securely send that session key to the server using the
servers public key. Now nobody but client and server knew the session
key. The session key is then used as shared secret to switch to much
more efficient symmetric key encryption.
Certificate (signing certificate) contains information about the server,
including the servers public key, and is digitally signed by the certificate
authority.
Configuration of SSL in WebSphere :
SSL configuration can be achived in three different ways
1) From Admin console:
Once we get the certificate from CA (Certificate Authority) then we will import
into trust store. To enable security between IHS and Application server we
need to export defaut personal certificates of all nodes and import the same
to the trust store of the IHS.
2) Command line :
By using gsk7cmd command we can achive the SSL configuration.
Gsk7cmd provides the otions like import ,export,list,create options for
certificates
Gsk7cmd cert create db plugin-key.kdb pw password label websphere
pluginkey -dn
3) ikeyman:
By using ikeyman we can open the KDB(key data base) and add the
certificates to the key database.
What is the difference between round robin and random load balancing?
a)
Round robin load balance is nothing but symmetric clustering and random
load balancing nothing but asymmetric clustering
What is the activity log and what it is useful?
The application server creates the activity.log file from the activity of the various
WebSphere Application Server components. you cannot read this log with a text
reader. You ca use this script called, showlog under appserver root.
Ex.,
./WAS_INST_ROOT/bin/showlog PATH_TOACTIVITY_LOG/activity.log
like this
websphe: /software/opt/IBM/WebSphere/AppServer/bin
$ ./showlog ../profiles/AppSrv*/logs/activity.log
This displays ur activity log something like this, just as a sample:
ExtendedMessage:
What are the different roles available in the WAS?
a)
In WAS we have the following roles
Monitor: Least privileged; allows a user to view the WebSphere
configuration and current application server state.
Configuration: Monitor privileges plus the ability to change the
WebSphere configuration.
Operator: Monitor privileges plus ability to change runtime state, such as
starting or stopping servers.
Administrator: Operator, Configuration, and iscadmins privileges, plus
additional privileges granted solely to the administrator role, such as
Modifying the primary administrative users and passwords.
Mapping users and groups to the administrator role
Enabling or disabling administrative and java 2 security
Additional console security roles :
Iscadmins (Integrated solutions console) :
Only available for administration console users
Allows a user to manage users and groups in the federated repository.
Deployer :
Only available for wsadmin users(not for administration console)
Allows a user to change configuration and runtime state on application using
wsadmin
Admin Security Manager:
1) Only available for wsadmin users
2) Allows a user to map users to administrative roles using wsadmin
3) When restricted access to resource authentication data is in effect, users
can also manage authorisation groups.
How many levels we can enable the trace file?
a)
If memory leakage is there in then where (in which file) we get this
information?
a)
Memory leakage information can get in the process logs ( Native_stdout and
Native_stderrer logs)
How many ways we can federate the Node?
Ans
Before federating any Node we must make sure
Application server should be started on the Node to be added
We need to find the SOAP connector for DMGR( we can find this in
communication section in the detailed page for the application
server(DMGR) default is 8879 )
From the Admin Console:
If we give heap size value same for both min and max then what are the
advantages and what are the disadvantages?
a)
The Java heap parameters influence the behavior of garbage collection.
Increasing the heap size supports more object creation. Because a large heap takes
longer to fill, the application runs longer before a garbage collection occurs. However,
a larger heap also takes longer to compact and causes garbage collection to take
longer.
The JVM has thresholds it uses to manage the JVM's storage. When the thresholds are
reached, the garbage collector gets invoked to free up unused storage. Therefore,
garbage collection can cause significant degradation of Java performance. Before
changing the initial and maximum heap sizes, you should consider the following
information:
In the majority of cases you should set the maximum JVM heap size to
value higher than the initial JVM heap size. This allows for the JVM to
operate efficiently during normal, steady state periods within the
confines of the initial heap but also to operate effectively during
periods of high transaction volume by expanding the heap up to the
maximum JVM heap size.
In some rare cases where absolute optimal performance is required
you might want to specify the same value for both the initial and
maximum heap size. This will eliminate some overhead that occurs
when the JVM needs to expand or contract the size of the JVM heap.
Make sure the region is large enough to hold the specified JVM heap.
Beware of making the Initial Heap Size too large. While a large heap size initially
improves performance by delaying garbage collection, a large heap size ultimately
affects response time when garbage collection eventually kicks in because the
collection process takes more time.
What is FFDC?
a)
The first failure data capture (FFDC) log file saves information that is
generated from a processing failure. These files are deleted after a maximum
number of days has passed .
There are two artifacts which are produced by FFDC, the information can be located
in the <Install Root>/logs/FFDC directory:
* Exception Logs:<ServerName>_Exception.log
* Incident
Stream:<ServerName>_<threadid>_<timeStamp>_<SequenceNumber>.txt
Exception Log
row elements
The exception logs contains all of the exception paths which have been encountered
since the server has started. Due to optimizations in the data collection, the table
was created to give an over view of the exceptions which have been encountered in
the server. A entry in the table look like this :
For demonstration purposes, the start, run and stop time have been included in the
exception log..
Incident Stream
The incident stream contains more details about exceptions which have been
encountered during the running of the server. Depending on the configuration of the
property files, the content of the incident streams will vary.
The default settings of the property files, the incident stream will not contain
exception information for exceptions which were encountered during the start of the
server (due to the Level=1 in the ffdcStart.properties). But where the server does to
ready, and new exeception which is encountered will be processed.
The incident stream files should be used in conjunction of the exception log. The
values which are contained in the exception log, in most instances will have a
corresponding entry in the incident stream. The relationship between the exception
log and the incident stream is the hash code which is made up of the exception type,
the source Id, and the probe Id. The simpliest way to look at this information is to
use the grep command. The information is not all contained on the same line, if you
need to know the exact file containing the value, you can use a compound grep
command.
file content
The file contains information on exception which have been encountered. Each
exception will contain information which corresponds to the information (exception
name, source Id and the probe Id) contained in the exception table (documented
above). If the catch of the exception is a non-static method, the content of the this
pointer. In some instances, if there is a diagnostic module which corresponds to the
current execution, the DM will write the information about the state of the object to
the incident stream.
The call stack will also be written to the incident stream.
In some instances, there may be an exception which was encountered while the
server is running which will not produce a call stack. This is because the exception
was encountered during the start of the server, and since the server started, the
exception is considered to be a normal path exception. All of the exception can be
seen by either looking at all of the runtime exceptions, or looking at all of the
exceptions.
How many SSL Certificate authorities available in todays market ?
There might be many SSL CAs. Some of the SSL CAs are
Etrust
Verisign
Geotrust
RSA etc.
Tell about class loader and where we use?
a)
Class loader enable the Java Virtual Machine( JVM) to load java classes. Given
the name of a class, the class loader locates the definition of this class. Each java
class must be loaded by a class loader.
253
I June 2009
289
I July 2009
994
I August
2009
996
I July 2009
992
I October
2009
995
807
-cellName <Cell_Name>
-hostName <Host_Name>
List Profile:
Manageprofile listprofiles
Delete Profile:
Manageprofile delete profilename <profile_name>
39)
How many ways we can deploy the application ? and What is the
command to deploy application ?
a)
It depends on the version of the WAS we are using, but 5X and above provide
the following options.
1) Using Admin Console:
In admin console
Enterprise applications -- > Install
Provide the required parameters like full path, context root, etc.
2) Hot Deployment :
We could copy directly the JAR files to the deployedapps folder in the
websphere we call this method as Hot Deployment
Dropping JSP files, with enabled class reloading ( Not recommended for
Production)
3) Using Wsadmin command:
4) Using Jacl or Jython Scripts:
5) Rapid Deployment (Feature available at 6x):
a)
WebSphere rapid deployment (WRD) simplifies the
development and deployment of application. It's capabilities include
annotation-based programing, deployment automation, and changetriggered process. to use WD functionality, no changes are required
on the application server. It uses existing application server
administration function to deploy and control applications.
Annotation-based programming allows the developer to add
metadata tags into application source code. WRD uses the metadata to
generate additional J2EE artifacts needed to run the application on the
application srver environment.
Change trigger processing provided automatic monitoring of changes
to the WRD user workspace. Changes trigger the automatic generation
of code and deployment of the application to the application server.
40)
What is authentication mechanism in JDBC driver?
a)
In JDBC driver configuration we can configure the authentication details in J2C
authentication pan. This is the credentials to login into the Relational database.
41)
How u will secure your administrative console, if u r using local O/S
users registry u r getting messages like not able to authenticate what u will
do? What is the solution?
a)
There might be the privileges issue to the user in O/S level. So we need to
give proper privileges to the user by logging in as System administrator.
42)
What is the difference between WAR, EAR, JAR and what is the
difference between deployments of these?
a)
In J2EE application modules are packaged as EAR, JAR and WAR based on their
functionality
JAR: EJB modules which contains enterprise java beans class files and EJB
deployment descriptor are packed as JAR files with .jar extenstion
WAR :Web modules which contains Servlet class files,JSP FIles,supporting files, GIF
and HTML files are packaged as JAR file with .war( web achive) extension
EAR :All above files(.jar and .war) are packaged as JAR file with .ear ( enterprise
archive) extension and deployed into Application Server.
There is no much difference in deploying these applications. We need to give context
root for WAR and for others no need to give.
EAR deployment:
If we have two or more modules then we can target individual modules to
individual servers.
43)
How you will solve if u get page cant displayed?
a)
It is a HTTP 404 error. If you get this error we need to check the logs for
application server status. The page expecting by the request is not finding that
means request is reaching the server but it is not available at expected location.
44)
WAS architecture?
The WebSphere architecture contains
Cell, DMGR, Node.
Where Cell on top of the hierarchy. Within the cell Dmgr will be there where
admin console is lying. For the Cell we can federate the Nodes and on the
Nodes we can configure the application servers.
If you want then I can explain the Web container and EJB container and Web
server and JDBC etc.
Web container
when we receive request from client browser so web container will act as interface
between client request and Servlets and jsp in other words Servlets and jsp will reside
under web container in order to server client request. hence we required web
container in order to invoke Servlets or JSP (Java Server Pages)
EJB Container:
An Enterprise JavaBeans (EJB) container provides a run-time environment for
enterprise beans within the application server. The container handles all aspects of
an enterprise bean's operation within the application server and acts as an
intermediary between the user-written business logic within the bean and the rest of
the application server environment.
One or more EJB modules, each containing one or more enterprise beans, can be
installed in a single container.
The EJB container provides many services to the enterprise bean, including the
following:
Beginning, committing, and rolling back transactions as necessary.
Maintaining pools of enterprise bean instances ready for incoming requests
and moving these instances between the inactive pools and an active state,
ensuring that threading conditions within the bean are satisfied.
Most importantly, automatically synchronizing data in an entity bean's
instance variables with corresponding data items stored in persistent storage.
45)
What is cluster, how request routes between cluster members?
a)
The algorithm which we select for load balance will route the requests. There
are two algorithms
1) Round robin
2) Random
46)
Can you give me two major issues you faced and solved?
a)
The application was having error with SSL , shows bad certificate on the
application right cornor..So customer requested for root cause for
GSK_ERROR_BAD_CERT .
I investigated...... like certificsate mismacth between Plugin and the
WebSphere..
1. I found in the WAS console that, the default personal certs in the node level
of WAS in not reflected in the web servers. Which was added in the DMGR?
Steps i followed to resolve this are :
1. I noted down the personal certificates serial no from the nodes by
navigating to
Security --> SSL certificate and key management--> Manage endpoint
security configurations -->Inbound--> expand cell-->Node--> Key stores and
certificates -->NodeDefaultKeyStore-->Personal Certificates
Noted down the serial number of the default certificate then
--- >Extracted the certificate to Server temp path.
Come to inbound/outbound---> expand cell-->node-->web server--> Key
stores and certificates-->CMSkeystore -->signer certificates--> verify the
serial no of the previous nodes certs....
I found one of the cert is not appear here in Web server.
i Added the same from here.. as i already enabled Dynamically update the
runtime when changes occur" option.. it should update without restart...
Then i came to Plugin-key.kdb to verify whether the added cert is updated in
the KDB or not.. using ikeyman.
Reference:
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21264477
http://www-01.ibm.com/support/docview.wss?uid=swg21198862
a copy of WebSphere Application Server V6.1 or V7.0 (or another related
product) is present in the specified directory, even when the ODM VPD is
clean.
While uninstalling the older version of WAS(5.x) to upgrade it to 6. we
uninstalled and but it was not uninstalled clearly....
We tried to remove the registry with Smitty tool... after that also we are not
able to install as it says the path contains the WAS already installed.
So we contacted the WAS product support from IBM raised PMR.. where we got
some resolutions to clear the ODM......
Then they suggested to try with
manual_WebSphere_ODM_wipe.sh
manual_IHS_ODM_wipe.sh
After that we followed the same with suggested steps and we succeeded
finally we upgraded to 6x.
It was one of challenging task in my career
47)
What is the Ticketing process and escalation /approval process?
a)
For all issues operations team gets alerts and they used to raise the tickets
against the appropriate team through USD (unicentre service desk). Depending on
the priority we used to allot the tickets. The priority was like (high priority P1, P2, and
low priority P3, P4, P5). Low priority tickets were attending by offshore team and high
priority were serving by onsite team. For high priority tickets we need to get
approvals from the service delivery manager. Intern service delivery manager will
take all approvals from the client side to deliver the solution. Once we get the
approvals then service delivery manager will start a bridge call
48)
What is the difference between web server and App Server?
a)
A Web server exclusively handles HTTP requests, whereas an application
server serves business logic to application programs through any number of protocols
49)
What is rollout update in was6.1?
a)
Automatic roll out of application update in a clustered environment
Ensures no service interruption of the application. Stops, updates and starts the
application one cluster member at a time, while the other cluster members continue
to run the application
50)
What is JDK version supporting in WAS 6.1?
a) J2RE 1.5.0
51)
How to set plug-in logs ?
a)
In Administrative console
Servers --> Webservers -->Webserver -->log files (configuration tab)
( here we can change the path of the log files (access.log,error.log)
52)
What is the difference between heap dump and thread dump?
a)
Heap dumps anytime you wish to see what is being held in memory Out-ofmemory errors
Heap dumps - picture of in memory objects - used for memory analysis
Java cores - also known as thread dumps or java dumps, used for viewing the thread
activity inside the JVM at a given time. IBM java cores should a lot of additional
information besides just the threads and stacks -- used to determine hangs,
deadlocks, and reasons for performance degradation
System cores
Heap dumps are taken by issuing a "kill -3" against the JVM pid. There is a cost
associated with producing heap dumps. The writing of the heap dump can be cpu and
i/o intensive depending on the size of the configured heap, you can take heap dumps
anytime you wish to see what is being held in memory. Out-of-memory errors or a
good time to view heap dumps. In fact,in most cases heap dumps should be created
when an OOM is triggered. Unless you're an administrator or root you'll need to own
the process you want to kill in order for the command to work.
Depends on the OS.
Java cores also known as thread dumps or java dumps, used for viewing the thread
activity inside the JVM at a given time. Thread dump should also contain a lot of
additional information besides just the threads and stacks used to determine hangs,
deadlocks, and reasons for performance degredation.
The kill -3 command captures JVM signals and dumps the requested diagnostic
material.There are options available to dump the heap in .txt format this files can be
huge and unless you're a genius with lots of time on your hands - don't try to read
the text dump with vi or something...
Use MDD4J or HeapAnalyzer.
For taking heap dumps you need set these environment entries for that JVM using
admin consle(this is one way of doing taking heap dumps, u can also go with jacl or
jython scripts)
IBM_HEAPDUMP TRUE
IBM_HEAPDUMP_OUTOFMEMORY true(if a OOM occurs, a dump is saved to /tmp
IBM_HEAPDUMPDIR appropriate directory.
Now, if you run kill -3 pid, then a heap dump is taken in the specified directory and
also a core dump will be taken. If you didn't specify any environment entries then
only a core dump is taken
53)
How you will check the details of a process if you know only port
number of that process?
First we need to find the socketno of that port by using
Netstat Aan|grep <port_no>
Then we need to find the sid by using the socketno
Rmsock <socketno> protocol
Ex:
#netstat Aan|grep 944
#f100020000fc4398 you get some more information.
#rmsock f100020000fc4398 tcpcb
The socket oxfc4008 is being by process 626888 (Java)
Ps ef|grep 626888
You get the detailed information about the said process.
54)
What are the regular issues you get in production support and how
you resolve them?
a)
Usually we get tickets from the operational team. Some of the call which we
faced are
1)
2)
3)
4)
5)
6)
Out of Memory:
If we get this error we need to check for the standards configured in
the application server. I mean heap settings in the server and if not we
need to resent according to the standards. If you are getting this error
frequently then we need to ask application team to check for the
memory leakage. We can get this statics from the Natice_stdout and
Native_stderr files.
No of connections reached
Check for the recommended connection pool size in the JDBC driver.
Check the unused connections.
Temporarily increase the connection pool size.
After analysing the logs and situation if required then recycle the
application server to resolve the issue.
File System issue:
Check the file system by using DU
Forward to the System admin team and coordinate for the resolution.
Thread Dump:
Create the thread dump by issuing kill-3 command and forward to the
application team for analysis.
100% CPU utilisation:
Check for the CPU utilisation bye using TOPAS command.
If required then kill some of the non important process which are
taking more cpu %
HTTP errors like (HTTP 400,401,403,404,500,502 etc.)
55)
Ans) it consumes large amount of memory in networks with many users, because
each server has a copy of all sessions. And another disadvantage is each change to
a session must be replicated to all application servers.
56)
Difference between horizontal clustering and vertical clustering?
Ans) the main difference between horizontal cluster and vertical cluster are:
1)
We can configure the cluster members on the same node in the vertical
clustering, whereas in horizontal clustering cluster members will be there on
different nodes. In other words A WebSphere cluster consists of having multiple
application servers (cluster member or clones) across a machine (Vertical Cluster)
or across several machines (Horizontal Cluster)
57)
Ans)
58)
Log records can be analyzed using a symptom database to interpret known events
and error conditions, and to get detailed information on error resolution.
Symptom databases can be imported from an external XML symptom database,
saved, and exported into an external file in XML format. You can either import
symptom databases from a local or a remote host.
59)
Ans) 1) Collector tool is the tool which collects the information about the
websphere application server installation and configuration.
2)
This is available in two versions
a)
Default standalone collector( implemented as a shell script in profle root)
collects almost all the logs and configuration files found on the system, without
distinction
b)
3)
In either case, the result is JAR file that contains a lot of information
by IBM support to diagnose the problem
a)
b)
60)
needed
Ans) Log Analyzer provides interactive interface to WebSphere activity log and
contains on-line diagnoses and resolutions to known problems
Log analyser, the tool that was previously provided for viewing and analyzing the
activity or service log file, is removed from 6.1 release of the IBM WebSphere
application server.
Instead, use IBM log and trace analyser for Eclipse in the application server toolkit,
installable from the launchpad console.
For more information, see 'application server toolkit> detecting and analyzing
runtime problems > log and trace analyzer' in the information center.
Overview
The Log Analyzer, is a separately downloaded feature of WebSphere 3.5.2 and later
(it is now bundled with WebSphere 4.0x. 4.0+ and 5.0 users do not need to
download the the tool). It is designed to assist customers in diagnosing and
resolving common runtime problems.
Starting the Log Analyzer in Windows
Windows users may launch it manually with the command <WebSphere
Root>\bin\waslogbr
Starting the Log Analyzer in Unix
1. Change directory to <serverRoot>/bin; and
2. Invoke shell script waslogbr
./waslogbr
The Log Analyzer is a GUI application, so Unix users will need to launch it from a
machine with a CDE-type environment, or export the display to a GUI client
platform.
Using the Log Analyzer
Once the tool has opened, use the File->open menu item, and select the file
<websphere install root>/logs/activity.log. (You can also browse to activity.logs
which customers have sent you.) Expand the tree of WebSphere admin and app
server logging sessions. Uncolored records are "normal", yellow are warnings, and
pink are errors. If you select a record, you'll see its contents, including the basic
error or warning message, date, time, which WebSphere component logged the
record, and which process (i.e., admin server or an app server) it came from, in the
upper-right hand pane.
The Log Analyzer does not analyze any other log files, such as default_stderr.log or
tracefile.
To analyze the records, right click on a record in the tree on the left (click on the
"UnitOfWorkView" at the top to get 'em all), and select "analyze". Now any records
with a green check mark next to them match a record in the symptom database.
When you select a check-marked record, you'll see and explanation of the problem
in the lower-right-hand pane.
Updating the symptom database
The database of known problems and resolutions -- used by WebSphere when you
click the "analyze" menu item -- is periodically enhanced as new problems come to
light and new versions of WebSphere are introduced. To ensure that you have the
latest version of the database, use the "file -> update database -> advanced
symptom database" menu item from within the log analyzer tool. A good rule of
thumb would be to do this at least once a month. Users who have just installed the
product and have never run the update should do so immediately, since extensive
updates have been made since the tool was released.
61)
What is MBeans?
Ans) MBeans are managed beans, Java objects that represent resources to be
managed. An MBean has a management interface consisting of:
Websphere application server provides a number of MBeans, each of which can have
different function and operations available. For ex
a)
b)
An application server MBean migh expose operations such as start and stop
An application MBean might expose operations such as install and uninstall.
What is SSO ?
Ans) Single sign-on (SSO) is a property of access control of multiple, related, but
independent software systems. With this property a user logs in once and gains
access to all systems without being prompted to log in again at each of them. Single
sign-off is the reverse property whereby a single action of signing out terminates
access to multiple software systems.
As different applications and resources support different authentication mechanisms,
single sign-on has to internally translate to and store different credentials compared
to what is used for initial authentication.
63)
Ans)
Tivoli Performance Viewer. The Tivoli Performance Viewer (TPV) enables
administrators and programmers to monitor the overall health of WebSphere
Application Server without leaving the administrative console.
From TPV, you can view current activity or log Performance Monitoring Infrastructure
(PMI) performance data for the following:
In addition to providing a built in viewer for PMI, TPV also allows you to view data for
other products or customer applications that implement custom PMI
66)
Ans) Suns JNDI API is a standard extension to the java platform and it allows the
java application to access naming and directory services. With the help of JNDI java
applications can seamlessly access the heterogeneous enterprise naming and
directory services like DNS, LDAP, and Local file system, or objects in an application
server.
67)
What is trace file & where you get more details in trace or log files?
Ans) Trace file contains the step by step activity details of the WAS process. Trace file
only contains more details than the logfile
68)
What is virtual host and give two different virtual hosts?
Ans) The term Virtual Host refers to the practice of maintaining more than one
server on one machine, as differentiated by their apparent hostname. For example,
it is often desirable for companies sharing a web server to have their own domains,
with web servers accessible as www.company1.com and www.company2.com,
without requiring the user to know any extra path information.
69)
What are difference scripting options in wasadmin engine?
Ans)
a)
b)
Adminconfig
c)
AdminApp
d)
AdminTask
70)
A Web server can serve requests that do not require any dynamic content (for
example, HTML pages). However, when a request requires dynamic content, such as
JavaServer Pages (JSP) or servlet processing, it must be forwarded to WebSphere
Application Server for handling. To forward a request, you use a Web server plug-in
that is included with the WebSphere Application Server packages for installation on
a Web server. You copy an Extensible Markup Language (XML) configuration file,
configured on the WebSphere Application Server, to the Web server plug-in
directory. The plug-in uses the configuration file to determine whether a request
should be handled by the Web server or an application server. When WebSphere
Application Server receives a request for an application server, it forwards the
request to the appropriate Web container in the application server. The plug-in can
use HTTP or HTTPs to transmit the request.
72)
How to detect the hangs of JVMs?
Ans)
73)
If your logs are not rotating that means your JVM hanged.
What is FFDC? Where you will use?
Ans) FFDC is nothing but first failure data capture. This is generated at the first
time failure of your system. It will be deleted after some time automatically. It is
usefull for diagnosis purpose.
74)
How you get better performance by giving the xnoclassgc in generic
JVM arguments in the JVM ?
Ans) By default the JVM unloads a class from memory when there are no live
instances of that class left, but this can degrade performance. Tuning off class
garbage collection eliminates the overhead of loading and un-loading the same
class multiple times.
If a class is no longer needed, the space that it occupies on the heap is normally
used for the creation of new objects. However if you have an application that
handles requests by creating new instance of a class and if requests for that
application come in at random times, it is possible that when previous requester is
finished, the normal class garbage collection will clear up this class by freeing the
heap space it occupied, only to have re-instantiate the class when the next request
comes along. In this situation you might want to use this option to disable the
garbage collection of classes
Avoid Trouble:
This option should be used with caution, if your application creates dynamically or
uses reflection, because for this type of application, the use of this option can lead
to native memory exhaustion, and cause the JVM to throw an out of memory
exception. When this option is used, if have to redeploy an application you should
always restart the application server to clear the classes and static data from the
previous version the application.
75)
Ans) The Web server plug-in in the Web server is aware of the configuration of all
Web containers and can route around a failed Web container in a cluster.
Sessions can be persisted to a database or in-memory using data replication
services.
76)
Explain about dynamic cache in WAS ?
Dynamic caching
The dynamic cache service improves performance by caching the output of servlets,
commands and JSP files. The dynamic cache works within an application server,
intercepting calls to cacheable objects, for example through a servlet's service()
method or a command's execute() method, and either stores
the object's output to or serves the object's content from the dynamic cache.
Because J2EE applications have high read-write ratios and can tolerate small degrees
of latency in the currency of their data, the dynamic cache can create an opportunity
for significant gains in server response time, throughput, and
scalability. The following caching features are available in WebSphere Application
Server.
Cache replication:
Cache replication among cluster members takes place using the WebSphere internal
replication service. Data is generated one time and copied or replicated to other
servers in the cluster, thus saving execution time and resources.
Cache disk offload:
By default, when the number of cache entries reaches the configured limit for a given
WebSphere server, eviction of cache entries takes place, allowing new entries to
enter the cache service. The dynamic cache includes an alternative feature named
disk offload, which copies the evicted cache entries to disk for potential future
access.
Edge Side Include caching:
The Web server plug-in contains a built-in ESI processor. The ESI processor has the
ability to cache whole pages, as well as fragments, providing a higher cache hit ratio.
The cache implemented by the ESI processor is an in-memory cache, not a disk
cache; therefore, the cache entries are not saved when the
Web server is restarted.
External caching:
The dynamic cache has the ability to control caches outside of the application server,
such as IBM Edge Server, a non-z/OS IBM HTTP Server's FRCA cache, and a non-z/OS
WebSphere HTTP Server plug-in ESI Fragment Processor. When external cache groups
are defined, the dynamic cache matches externally cacheable cache entries with
those groups, and pushes cache entries and invalidations out to them. This allows
WebSphere to manage dynamic content beyond the application server. The content
can then be served from the external cache, instead of the application server,
improving savings in performance.
77)
?
Administrator point of view how many containers are there in was 6.1
SIP applications are Java programs that use at least one Session Initiation Protocol
servlet written to the JSR 116 specification. SIP is used to establish,
modify, and terminate multimedia IP sessions. SIP negotiates the medium, the
transport, and the encoding for the call. After the SIP call has been established,
the communication takes place over the specified transport mechanism,independent
of SIP. Examples of application types that use SIP include voice over IP, click-to-call,
and instant messaging. The Application Server Toolkit provides special tools for
developing SIP applications. SIP applications are packaged as SIP archive (SAR) files
and are deployed to the application server using the standard WebSphere
Application Server administrative tools. SAR files can also be bundled within a J2EE
application archive (EAR file), similar to other J2EE components.
Web container:
The Web container processes servlets, JSP files and other types of server-side includes.
Each application server runtime has one logical Web container, which can be modified,
but not created or removed.
Servlet processing:when handling servlets, the Web container creates a request
object and a response object, then invokes the servlet service method. The Web
container invokes the servlets destroy method when appropriate and unloads the
servlet, after which the JVM performs garbage collection.
Embedded HTTP server: the Web container runs an embedded HTTP server for
handling HTTP(S) requests from external Web server plug-ins or Web browsers. The
embedded Web server is based on the IBM HTTP Server product. Directing client
requests to the embedded Web server is useful for testing or
development purposes and, in the Express configuration, can be considered for
production use. In the more advanced configurations, the use of an external Web
server and Web server plug-in as a front end to the Web container is more
appropriate for a production environment.
Session management: support is provided for the javax.servlet.http.HttpSession
interface described in the Servlet API specification.
Web services engine: Web services are provided as a set of APIs in cooperation
with the J2EE applications. Web services engines are provided to support SOAP.
Web server plug-ins
Although the Web container has an embedded HTTP server, a more likely scenario is
that an external Web server will be used to receive client requests. The Web server
can serve requests that do not require any dynamic content, for example, HTML
pages. However, when a request requires dynamic content
(JSP/servlet processing), it must be forwarded to WebSphere Application Server for
handling. The mechanism to accomplish this is provided in the form of a Web server
plug-in. The plug-in is included with the WebSphere Application Server package for
installation on a Web server. An XML configuration file, configured on the WebSphere
Application Server, is copied to the Web server plug-in directory. The
plug-in uses the configuration file to determine whether a request should be handled
by the Web server or an application server. When a request for an application server
is received, it is forwarded to the appropriate Web container in the application server.
The plug-in can use HTTP or HTTPs to transmit the
request.
EJB container
The EJB container provides all the runtime services needed to deploy and manage
enterprise beans. It is a server process that handles requests for both session and
entity beans. The enterprise beans (packaged in EJB modules) installed in an
application server do not communicate directly with the server; instead, the EJB
container provides an interface between the EJBs and the server. Together, the
container and the server provide the bean runtime environment. The container
provides many low-level services, including threading and transaction support. From
an administrative viewpoint, the container manages data storage and retrieval for
the contained beans. A single container can host more than one EJB JAR file.
Client application container
The client application container is a separately installed component on the client's
machine. It allows the client to run applications in an EJB-compatible J2EE
environment. There is a command-line executable (launchClient) which is used to
launch the client application along with its client container runtime
78)
What is deployment descriptor and how many dedployment
descriptors are available ?
Ans) A deployment descriptor (DD) refers to a configuration file for an artifact
that is deployed to some container/engine.
In the Java Platform, Enterprise Edition, a deployment descriptor describes how a web
application or enterprise application should be deployed. It directs a deployment tool
to deploy a module or application with specific container options, security settings
and describes specific configuration requirements. XML is used for the syntax of
these deployment descriptor files. For web applications, the deployment descriptor
must be called web.xml and must reside in a WEB-INF subdirectory at the web
application root. For Java EE applications, the deployment descriptor must be named
application.xml and must be placed directly in the META-INF directory at the top level
of the application .ear file.
Deployment descriptors describe the contents of deployment units and configure
components and applications to their environment. They also externalize the
relationships between components, so those relationships can be managed without
writing or changing program code. Deployment tools usually automatically generate
deployment descriptors, so you do not have to edit and manage them directly.
There are five types of deployment descriptors, each of which corresponds to a type
of deployment unit:
Ans) 1)
a) Jython depends on the Python commands whereas Jacl(Java command
language) depends on the Tcl commands.
b) Jython syntax seems more natural to programmers used to Java or C, but Jacl
syntax can be more familiar to administrators who are familiar with Tcl
c) Each language has its own style and syntax, but they end up being able to do
the same things
WSADMIN scripting tool can be used in an interactive mode, the main ability for
wsadmin is to provide the ability to run scripts.
80)
Ans)
81)
Ans)
Only difference in this application installation is optional context root for JAR
and EAR and for WAR it is mandatory. If EAR file is having multiple modules
like JAR,WAR then we can target these files to different application servers.
82)
Ans)
83)
Ans)
84)
Ans)
85)
Ans)
86)
87)
Ans)
88)
Ans)
89)
What is the s/w and h/w requirements to install the WAS 6.x?
Hard ware requirements for the WAS 6.1 installation.
Memory : Minimum 512 MB, Recommended 1GB ( project recommended it
will go up to 4GB to 5GB )
Had disk (File system) : Temp : 10GB,Was install root 10GB,Logs : 10GB
Soft ware requirements for the WAS 6.1 installation.
.
90)
Which version of unix you are using and what is java version which
supports for was 6.x ?
The solution: Change directories to the cdrom/ directory and try the installation
again.
92)
How you will schedule jobs using cron jobs how you will set?
93)
30 6 * * 1,3,5 /usr/bin/calendar
Explain about ssl configuration steps using admin console?
Configuration of SSL in WebSphere :
SSL configuration can be achived in three different ways
1) From Admin console:
Once we get the certificate from CA (Certificate Authority) then we will import
into trust store. To enable security between IHS and Application server we
need to export defaut personal certificates of all nodes and import the same
to the trust store of the IHS.
2) Command line :
By using gsk7cmd command we can achive the SSL configuration.
Gsk7cmd provides the otions like import ,export,list,create options for
certificates
3) ikeyman:
By using ikeyman we can open the KDB(key data base) and add the
certificates to the key database.
Procedure
1. Click Security > SSL certificate and key management > Manage
endpoint security configurations.
2. Select an SSL configuration link on either the Inbound or Outbound tree,
depending on the process you are configuring.
If the scope is already associated with a configuration and alias, the
SSL configuration alias and certificate alias are noted in parentheses.
o If the parenthetical information is not included, then the scope is not
associated. Instead, the scope inherits the configuration properties of
the first scope above it that is associated with an SSL configuration and
certificate alias.
The cell scope must be associated with an SSL configuration because it is at
the top of the topology and represents the default SSL configuration for the
inbound or outbound connection.
o
3. Click SSL configurations under Related Items. You can view and select any
of the SSL configurations that are configured at this scope. You can also view
and select these configuration at every scope that is lower on the topology.
4. Click New to display the SSL configuration panel. You cannot select links
under Additional Properties until you type a configuration name and click
Apply.
5. Type an SSL configuration name. This field is required. The configuration name
is the SSL configuration alias. Make the alias name unique within the list of
SSL configuration aliases that are already created at the selected scope. The
new SSL configuration uses this alias for other configuration tasks.
6. Select a truststore name from the drop-down list. A truststore name refers to a
specific truststore that holds signer certificates that validate the trust of
certificates sent by remote connections during an SSL handshake. If there is
no truststore in the list, see Creating a keystore configuration to create a new
truststore, which is a keystore whose role is to establish trust during the
connection.
7. Select a keystore name from the drop-down list. A keystore contains the
personal certificates that represent a signer identity and the private key that
WebSphere Application Server uses to encrypt and sign data.
o
8. Choose a default server certificate alias for inbound connections. Select the
default only when you have not specified an SSL configuration alias elsewhere
and have not selected a certificate alias. A centrally managed SSL
configuration tree can override the default alias. For more information, see
Central management of Secure Sockets Layer configurations.
9. Choose a default client certificate alias for outbound connections. Select the
default only when the server SSL configuration specifies an SSL client
authentication.
10. Review the identified management scope for the SSL configuration. Make the
management scope in this field identical to the link you selected in Step 2. If
you want to change the scope, you must click a different link in the topology
tree and continue at Step 3.
11. Click Apply if you intend to configure Additional Properties. If not, go to Step
24.
12. Click Quality of protection (QoP) settings under Additional Properties. QoP
settings define the strength of the SSL encryption, the integrity of the signer,
and the authenticity of the certificate.
13. Select a client authentication setting to establish an SSL configuration for
inbound connections and for clients to send their certificates, if appropriate.
o
If you select None, the server does not request that a client send a
certificate during the handshake.
o
o
17. Click Update selected ciphers to view a list of the available ciphers for each
cipher strength.
18. Click OK to return to the new SSL configuration panel.
19. Click Trust and key managers under Additional Properties.
20. Select a default trust manager for the primary SSL handshake trust decision.
o
o
21. Define a custom trust manager, if appropriate. You can define a custom trust
manager that runs with the default trust manager you select. The custom
trust manager must implement the JSSE javax.net.ssl.X509TrustManager
interface and, optionally, the com.ibm.wsspi.ssl.TrustManagerExtendedInfo
interface to obtain product-specific information.
a. Click Security > SSL certificate and key management >
Manage endpoint security configurations >
SSL_configuration > Trust and key managers > Trust
managers > New.
b. Type a unique trust manager name.
c. Select the Custom option.
d. Type a class name.
e. Click OK. When you return to the Trust and key managers panel,
the new custom trust manager displays in the Additional
ordered trust managers field. Use the left and right list boxes
to add and remove custom trust managers.
2
Important: If you choose to implement your own key manager, you can
affect the alias selection behavior because the key manager is responsible for
selecting the certificate alias from the keystore. The custom key manager
might not interpret the SSL configuration as the WebSphere Application Server
key manager IbmX509 does. To define a custom key manager, click Security
> Secure communications > SSL configurations > SSL_configuration >
Trust and key managers > Key managers > New.
3
Click OK to save the trust and key manager settings and return to the
new SSL configuration panel.
Results
Important: You can override the default trust manager when you configure at least
one custom trust manager and set the com.ibm.ssl.skipDefaultTrustM
anagerWhenCustomDefined property to true. Click Custom Property on the SSL
configuration panel. However, if you change the default, you leave all the trust
decisions to the custom trust manager, which is not recommended for production
environments. In test environments, use a dummy trust manager to avoid certificate
validation. Remember that these environment are not secure.
What to do next
In this release of WebSphere Application Server, you can associate SSL configurations
with protocols using one of the following methods:
Set the SSL configuration on the thread programmatically
Associate the SSL configuration with an outbound protocol, and target host
and port. For more information, see Associating a Secure Sockets Layer
configuration dynamically with an outbound protocol and remote secure
endpoint
Associate the SSL configuration directly using the alias. For more information,
see Selecting an SSL configuration alias directly from an endpoint
configuration
Manage the SSL configurations centrally by associating them with SSL
configuration groups or zones that are scoped for endpoints. For more
information, see Associating Secure Sockets Layer configurations centrally
with inbound and outbound scopes.
94)
Ans)
95)
a) Profile concept
b) Single installation WAS product supports for multible profile creation
c) Cell profile
d) SIB (System Integration Bus)
What is Webcontainer failover?
Ans) the Web server plug-in in the Web server is aware of the configuration of all
Web containers and can route around a failed Web container in a cluster.
Sessions can be persisted to a database or in-memory using data replication
services.
96)
Explain about web sphere?
97)
The word web sphere popularly refers to IBM middleware technology products.
Web sphere is known for its turnkey operation in e business applications. It
has run time components and tools which can help in creating applications
which run on WAS. WAS refers to web sphere application server.
Explain about web sphere commerce?
IBM web sphere commerce has a single platform which offers complete
ecommerce solutions to developers. It can be very productive if you are
98)
99)
100)
101)
102)
103)
Security model for web sphere is primarily based on JAVA EE security model. It
also depends upon the operating system. User authentication and
authorization mechanisms are also provided in WAS. Light weight third party
authentication mechanism is the main security feature present in WAS.
Explain about asymmetric clustering?
Asymmetric clustering applications are primarily used in electronic trading
systems employed in banks. Some of the features are, partitions can be
declared during run time and are usually run on a single cluster at a time.
Work specific to a particular can be routed to that cluster.
104)
105)
106)
108)
Managing singletons will be a thing of the past and it also provides hot
recovery of singletons which makes you forget about your GC collected
singletons. Transaction logs can stored on a shared file system. For clustering
run time operations deployment manager`s role was eliminated. J2EE failover
support and cell configuration support is also present.
Explain about IBM web sphere integration developer?
Web sphere integration developer provides an IDE to build applications based
on service oriented architecture. Web sphere process server and web sphere
ESB were built with WID. WID was built with RAD Eclipse based technology.
Explain about compute Grid?
109)
Compute grid is also known as Web sphere batch. Web sphere extended
deployment offers a Java batch processing system called as Compute Grid.
This forms an additional feature to Web sphere network environment. Various
features are provided which help a developer to create, manage and execute
batch jobs. Job scheduler, xJCL, batch container and batch programming
controller.
Explain about web sphere MQ Real time transport?
110)
111)
Web sphere MQ and Web Sphere Business integration manager Broker are
very useful in providing Java messaging services to wide range of clients
(publisher subscribe, point to point). Java classes are chiefly responsible for
translating the API calls to API`s defined by web sphere. It is very useful to
have knowledge of Web sphere MQ for proper configuration.
Explain the attribute CHANNEL in web sphere MQ?
107)
CHANNEL specifies the name of the server connection channel. Generally this is
Web Sphere MQ network abstraction. The default #standard used by CHANNEL is
SVRCONN which is the server connection channel. This server is generally used to
communicate to the queue manager by the client.
112) Is the naming of connection factory independent of the name
specified by JMS client?
Yes, the naming of connection factory is independent of the name specified by
JMS client. This is made possible by WAS (Web sphere application server) with
its resource references. It isolates the application from object names. This
feature is important because it gives us the flexibility to change the
administered object without changing the JMS client code.
113) How many ways deployments in ibm websphere. Please give me one
example?
114)
Mixed v5 and v6 nodes must have v6 DMgr (cant add new v5 node)
V6 ND introduces profiles
Each profile has its own user data including Web Sphere configuration
Ans) we can apply the fix packs using the update installer. Before we go to apply fix
packs we need to take backup of the existing configuration of our WAS and all
profiles.
To take backup we can use the command
Syntax
-quiet
Suppresses the progress information that the restoreConfig command prints
in normal mode.
-replacelog
Replaces the log file instead of appending to the current log.
-trace
Generates trace information into the log file for debugging purposes.
-username <name>
Specifies the user name for authentication if security is enabled in the server.
Acts the same as the -user option.
-user <name>
Specifies the user name for authentication if security is enabled in the server.
Acts the same as the -username option. -?
Prints a usage statement.
You can use the restoreConfig command to recover an application server if it fails.
Perform the following steps:
Locate the automatic migration backup in the app_server_root/temp directory. For
example: MigrationBackup.Thu-Aug-28-10.15045-2006.zip
Restore the configuration with the restoreConfig command. For example:
restoreConfig app_server_root/temp/MigrationBackup.Thu-Aug-28-10.15045-2006.zip
Usage scenario
The following example demonstrates correct syntax:
restoreConfig WebSphereConfig_2006-04-22.zip
restoreConfig.sh WebSphereConfig_2006_04_22.zip
restoreConfig WebSphereConfig_2006-04-22.zip
The following example restores the given file to the /tmp directory and does not stop
any servers before beginning the restoration.
restoreConfig WebSphereConfig_2006_04_22.zip -location /tmp -nostop
restoreConfig.sh WebSphereConfig_2006_04_22.zip -location /tmp -nostop
restoreConfig WebSphereConfig_2006_04_22.zip -location /tmp -nostop
The following example restores the configuration stored in
/home/mydir/myprofileBackup.zip to the configuration for profile myprofile:
restoreConfig WebSphereConfig_2006-04-22.zip -profileName myprofile
Be aware that if you restore the configuration to a directory that is different from the
directory that was backed up when you performed the backupConfig command, you
may need to manually update some of the paths in the configuration directory.
120)
Ans)
121)
Ans) In our day to day activity we use the following commands in unix:
a) To find out the running processes the command is
:Ps
ef| grep java
b) To find out the disk space the command is
:du
c) To find out the file system the command is
:df
d) To find out the network performance/port info command is
:netstat
e) To find out the CPU utilisation the command is
: topas/osstat
f) To kill the running process the command is
: kill -9
<PID>
g) To generate heap/thresd dump the command is
:kill -3 <PID>
h) To change the privileges of the file/folder the command is
:
chmod
i) To change the owner of the file/folder the command is :chown
j) To list the file the command is
: ls
k) To create DIR(folder) the command is
:mkdir
l) To TAR the files ,folders we use the following command
Tar xvf <file name with path>
-Tar uvf
--adding one or two files two folder
Tar cvf
-- total folder
m) To schedule the job in cron command is as follwos
Crontab l ( to list all the scheduled jobs)
Crontab e ( to edit the scheduled job)
Whithin the crontab the syntax for the schedule the script as follows
Ex: 30 6 * * 1,3,5 /usr/bin/calender
30(minutes) 6 (hours) *(day of the month) * (month of the year) 1,3,5 (day
no of the week)/usr/bin/calender
In the above example we scheduled the script called calender which is
located in the location /usr/bin to run every Monday,Wednesday and friday
n) To find fully qualified domain name (FQDN) if you know IP
$ Nslookup <IP_ADDRESS>
--(vice versa)
122)
Ans) server1
123) In Clusters what is the riffle stop ?
Ans) Ripple stop/start will stop one server at a time while other servers will continue
to serve the client requests. Like this it will stop and start all the server in the cluster
124) How you will start the server & how you will stop from command
line?
Ans) stopserver and startserver are the commands to stop and start from the
command line
125) How to check the physical memory (RAM) in the system?
Ans) bootinf r will give you the physical memory details of the unix box
126) What is the first signal you find when memory leakage is there in the
application?
Ans) If you have memory leakage in your application code then you get frequently
OUT OF MEMORY EXCEPTIONerror.
127) How to apply fix packs to WAS?
a) Using update installer we can apply the fix packs. We need to make sure that
update installer which is installed should be compatible with WAS. And also we
need to take backup of all profiles and configuration.
You must create backup by executing command backupconfig.sh in was root
and individual profiles bin directory..a backup file is created.
128)
Ans) Websphere provides integrated tools to monitor and tune system and
application performance:
Source Systems of the performance data :
1) Performance Monitoring Infrastructure (PMI):
Core performance data collection technology for websphere application server.
Supports the Jave 2 Platform, Enterprise Edition (J2EE) Management Reference
Implimentation (JSR-077)
2) Request Metrics :
Technology to trace each individual transaction and record its responce time at
different stages as it flows through the application server. Supports externalisation of
data to standard log files and /or an Application Responce Management (ARM) agent.
Integrated Tools :
a) Tivoli Performance viewer (TPV)
Enables administrators to monitor the overall health of websphere
application server. It is accessed from within the administrative console
b) Request Metrics ( Tool)
Enables you to track individual transactions,recording the processing
time in each of the major websphere application server components.
Output viewed in standard logs or using an application responce
measurement( ARM) based tool
c) Performance advisor
Analze collected performance data and provide configuration
recommendations to improve the application server performance.
Output viewed in TPV or in administrative console runtime messages
d) Performace servlet
Provideds simple retrival of performance data in XML format. Acced
through a browser.
129)
Ans) we get the all webserver instance informations with process id.
130) How you will check the web server status
Ans) by using the following command we can check the all instances of the
webserver
$ ps ef| grep httpd
131)
If you enable global security every time we need to provide userid
and password while stopping the servers. It is bit security issues it will
disclose to any one while typing the password. So I need to avoid the
typing os my user id and password to stop the servers in security
enables environment. How can we achive this task ?
Ans) We can achive this task by storing the credentials in the following mentioned
files
For SOAP connector soap.client.profs
For RMI connector sas.client.profs
132) I have a standalone application server, in that server1 crashed
because of some reasons. Now I need to configure server2 on the same
node how can I achieve this task?
Ans) To configure server2 there is no dependency on the server1 status. Because we
are depending on the node to configure the server2 on standalone server on
theserver1.
133) How can you control the web browser requests only to particular ip
address?
Ans) using Virtual hosts (need to cross verify the answer)
134) If you want to know detailed information for a particular port when
you know only port number then how you will check?
Ans) we need to follow the steps mentioned below to know the detailed information
about the process running on the particular port
$ netstat Aan|grep <Port_no>
Socket will be listed, using that socket we can get SID
$rmsock <socket_no> <protocol>
Ex:
$netstat Aan|grep 944
f10002000fc4398
$rmsock f10020000fc4398 tcpcb
the socket oxfc4008 is being by process 626888(java)
$ps ef| grep 626888
135) How you will find how much heap is used by each JVM?
Ans) Using PMI we can see the percentage of the memory used by JVM
136) Explain how request served by WAS explain complete step by step?
Ans) First request comes to the webserver
137) Explain the architecture in the cell, node & profile point of view?
Ans) In WAS Cell will be on top. Within cell we have
Dmgr, Nodes, Nodegroups, Nodeagents, Application servers, Clusters
Ans)
Amin console -- > servers -- > application servers -- > [all servers] ->webcontainer settings -- > session management -- > distributed environment
settings
Options are :
None,Database and memeory to memory replication
Memory-to-memory replication
WebSphere Application Server supports session replication to another WebSphere
Application Server instance. This support is referred to as memory-to-memory
session replication. In this mode, sessions can replicate to one or more WebSphere
Application Server instances to address HTTP Session single point of failure (SPOF).
The WebSphere Application Server instance in which the session is currently
processed is referred to as the owner of the session. In a clustered environment,
session affinity in the WebSphere Application Server plug-in routes the requests for a
given session to the same server. If the current owner server instance of the session
fails, then the WebSphere Application Server plug-in routes the requests to another
appropriate server in the cluster. In a peer-to-peer cluster, the hot failover feature
causes the plug-in to failover to a server that already contains the backup copy of the
session, avoiding the overhead of session retrieval from another server containing
the backup. In a client/server cluster, the server retrieves the session from a server
that has the backup copy of the session. The server now becomes the owner of the
session and affinity is now maintained to this server.
There are three possible modes. You can set up a WebSphere Application Server
instance to run in:
Server mode: Only store backup copies of other WebSphere Application
Server sessions and not to send out copies of any session created in that
particular server
Client mode: Only broadcast or send out copies of the sessions it owns and
not to receive backup copies of sessions from other servers
Both mode: Simultaneously broadcast or send out copies of the sessions it
owns and act as a backup table for sessions owned by other WebSphere
Application Server instances
You can select the replication mode of server, client, or both when configuring the
session management facility for memory-to-memory replication. The default is both.
This storage option is controlled by the mode parameter.
The memory-to-memory replication function is accomplished by the creation of a
data replication service instance in an application server that talks to other data
replication service instances in remote application servers. You must configure this
data replication service instance as a part of a replication domain. Data replication
service instances on disparate application servers that replicate to one another must
be configured as a part of the same domain. You must configure all session managers
connected to a replication domain to have the same topology. If one session manager
instance in a domain is configured to use the client/server topology, then the rest of
the session manager instances in that domain must be a combination of servers
configured as Client only and Server only. If one session manager instance is
configured to use the peer-to-peer topology, then all session manager instances must
be configured as Both client and server. For example, a server only data replication
service instance and a both client and server data replication service instance cannot
exist in the same replication domain. Multiple data replication service instances that
exist on the same application server due to session manager memory-to-memory
configuration at various levels that are configured to be part of the same domain
must have the same mode.
With respect to mode, the following are the primary examples of memory-to-memory
replication configuration:
Peer-to-peer replication
Client/server replication
Memory-to-memory topology: Peer-to-peer function
The basic peer-to-peer (both client and server function, or both mode) topology is the
default configuration and has a single replica. However, you can also add additional
replicas by configuring the replication domain.
In this basic peer-to-peer topology, each server Java Virtual Machine (JVM) can:
Host the Web application leveraging the HTTP session
Send out changes to the HTTP session that it owns
Receive backup copies of the HTTP session from all of the other servers in the
cluster
This configuration represents the most consolidated topology, where the various
system parts are collocated and requires the fewest server processes. When using
this configuration, the most stable implementation is achieved when each node has
equal capabilities (CPU, memory, and so on), and each handles the same amount of
work.
Session hot failover
A new feature called session hot failover has been added to this release. This feature
is only applicable to the peer-to-peer mode. In a clustered environment, session
affinity in the WebSphere Application Server plug-in routes the requests for a given
session to the same server. If the current owner server instance of the session fails,
then the WebSphere Application Server plug-in routes the requests to another
appropriate server in the cluster. For a cluster configured to run in the peer-to-peer
mode this feature causes the plug-in to failover to a server that already contains the
backup copy of the session, therefore avoiding the overhead of session retrieval from
another server containing the backup.
You must upgrade all WebSphere Application Server plug-in instances that front the
Application Server cluster to version 6.0 to ensure session affinity when using the
peer-to-peer mode.
Memory-to-memory topology: Client/server function
The following figure depicts the client/server mode. There is a tier of applications
servers that host Web applications using HTTP sessions, and these sessions are
replicated out as they are created and updated. There is a second tier of servers
without a Web application installed, where the session manager receives updates
from the replication clients.
While you run your Web applications on cheaper hardware, you may have one
or two more powerful computers in the back end of your enterprise that have
the capacity to run a couple of session managers in replication server mode;
allowing you to free up your cheaper Web application hardware to process the
Web application.
Timing consideration: Start the backup application servers first to avoid
unexpected timing windows. The clients attempt to replicate information
and HTTP sessions to the backup servers as soon as they come up. As a
result, HTTP sessions that are created prior to the time at which the servers
come up might not replicate successfully.
141) If admin console is not accessible then what we will do in base
installation?
Ans) In base also we have the WSADMIN scripting tool. We can connect to wsadmin
by mentioning NONE connection type .After connecting to wsadmin we fire a
command security off. It will disable the security after that we can login to the admin
console and reset the passwords.
142)
Ans) from the database team we get the user id to configure the datasource.
143) How you configure LDAP with WAS?
Ans) To configure the console server, do the following steps:
1. Start the WebSphere(R) Application Server service on the console server.
2. Refer to Configuring the J2EE Application in the IBM Tivoli(R) Business Systems
Manager Administrator's Guide for information on how to configure the
console server.
3. To enable WebSphere Application Server to work with Tivoli Business Systems
Manager, you must map WebSphere Application Server roles to Tivoli Business
Systems Manager groups. Refer to the IBM Tivoli Business Systems Manager
Administrator's Guide for information.
4. If you are using the LocalOS user registry, you do not need to do anything
else. If you are using LDAP, see Configuring WebSphere Application Server to
use LDAP. If you are upgrading and plan to use LDAP, do not following the
instructions in Configuring WebSphere Application Server to use LDAP yet. You
can switch to LDAP later in the process.
Configuring WebSphere Application Server to use LDAP
To configure WebSphere Application Server to use LDAP, you need some information
from your security administrator. Following is an example of the type of information
and sample answers that you need to do the steps in this section:
This is just an example. Your security administrator knows what information you
need.
The following steps assume that you configured your LDAP server on the
ldapserver.abc.com host and that your users and groups for Tivoli Business Systems
Manager and the WebSphere Application Server that is hosting Tivoli Business
Systems Manager are defined under the name ou=tbsm,o=abc in the directory. The
Secure Sockets Layer (SSL) between the LDAP server and WebSphere Application
Server is not configured.
This is a sample configuration based on this example and uses the default values
where appropriate.
1. In the WebSphere Administrative Console, expand Security -> User
Registries in the left-hand navigation pane and click LDAP. The LDAP User
Registry page opens.
2. In the Server User ID and Server User Password fields, type the user ID
and password from your LDAP directory that the WebSphere Application
Server runs under. Type the ID either as userid or as a distinguished name
similar to uid=userid,ou=tbsm,o=abc.
3. In the Type field, select the type of LDAP server you want to use.
4. In the Host field, type the hostname of your directory server. For this example
use ldapserver.abc.com.
5. In the Port field, select the default value of 389.
6. In the Base Distinguished Name field, type the name of the container
object in the LDAP that contains your Tivoli Business Systems Manager users.
For this example, type ou=tbsm,o=abc.
7. In the Bind Distinguished Name and Bind Password fields, type the
distinguished name and password for a user ID that is authorized to run
queries on your LDAP server. If your server allows anonymous queries, you
can leave these fields clear.
For example, the IBM(R) Directory Server default setting allows anonymous
queries. You can leave this field blank. The Active Directory default setting
requires authentication to run queries, so you need to supply the appropriate
values.
8. In the Search Timeout field, accept the default value of 120.
9. In the Reuse Connection field, accept the default setting. The check box
should be selected.
10. In the Ignore Case field, follow the recommendations for your LDAP server.
If IBM Directory Server is selected as the LDAP directory server, select this
check box. Otherwise, this field is optional and can left unchecked when a
case sensitive authorization check is required. Note however that this value
does not affect how Tivoli Business Systems Manager treats distinguished
names stored in the Tivoli Business Systems Manager database. Internally,
Tivoli Business Systems Manager treats distinguished names as case
insensitive. For example, if the user registry is configured to be case sensitive,
you can create users with distinguished names cn=John Doe, ou=Raleigh,
o=IBM, c=US and cn=john doe, ou=raleigh, o=ibm, c=us. However, when
searching for resources assigned to John Doe (for example ownership notes),
all notes assigned to John Doe and john doe will be returned. To eliminate any
problems, configure the user registry to be case insensitive or ensure that all
users are created with unique distinguished names that are different in more
than just case.
11. Accept the default SSL settings to run without the SSL.
12. Click Apply to accept the changes.
13. The WebSphere Administrative Console might switch to the Global Security
page. If so, navigate back to the LDAP User Registry window (see Step 1 for
directions). Click Advanced LDAP Settings near the bottom of the window.
14. Click Configuration and click the General Properties
tab.
15. The User ID Map field specifies a filter that is used to determine the User's
Full Name in Tivoli Business Systems Manager. In the User ID Map field,
specify the attribute from the LDAP that you want to display for the full name
of the user. For example, to use the cn attribute, specify *:cn. If you are using
Active Directory, specify *:displayName.
16. Verify the following settings:
o Active Directory:
User Filter: (&(sAMAccountName=%v)(objectclass=user)) - The
User Filter field determines what part of the LDAP entry must
match the logon ID of the user.
Group Filter: (&(cn=%v)(objectclass=group))
User ID Map: *:displayName (or whatever you entered in Step
15)
Group ID Map: *:cn
Group Member ID Map: memberof:member
Certificate Map Mode: EXACT_DN
Certificate Filter: leave clear
o IBM Directory Server:
User Filter: (&(uid=%v)(objectclass=ePerson)
Group Filter: (&(cn=%v)(|(objectclass=groupOfNames)
(objectClass=groupOfUniqueNames)))
User ID Map: *:cn (or whatever you entered in Step 15)
Group ID Map: *:cn
Group Member ID Map: ibm-allGroups:member;ibmallGroups:uniqueMember
If the page does not display automatically, navigate to the Security ->
Global Security page.
18. From the Global Security page, use all the default values except the following
values:
o Enabled: checked
o Active User Registry: LDAP
19. Click OK.
WebSphere Application Server validates your setup. The messages at the top
of the screen indicate your results. Yellow warning messages are typical. If a
round, red error message is displayed, it means that WebSphere Application
Server could not validate the Server ID you gave with the LDAP. Verify that this
and the other LDAP parameters are correct for your LDAP server and repeat
the Global Security configuration steps until the validation is successful.
20. Click Save at the top of the window.
21. Click Save again.
22. Start WebSphere Application Server again.
For more information about specific LDAP servers, see the LDAP server
documentation in the WebSphere InfoCenter. Navigate to All topics by feature ->
Security -> Securing applications and their environments -> Managing
security -> Configuring user registries.
144)
Ans) Memory leak is the issue with native code. We need to get the heap dumps and
analyse the dumps for any memory issues with the code and if you find any issue
then we need to ask developers to fix the same. Temporarily we can increase the
heap size . In this way after analysing the exact root cause we need to fix the
memory leakage issue.
145) What is the recommended physical memory for WAS?
Ans) Mandatory is 512 MB and IBM recomends 1024 MB. But in real time projects it
will be more the recomended. In our project it was 4 GB.
146) How you will check the port status?
Ans) netstat
147) What is the command to find the process in the sun Solaris
environment ?
Ans) psrinfo v (need to cross verify)
148)
If you get internal error then what is the solution for it?
Ans) Check the IHS is running or not, if its running... check the App server is running
or not.
This is basicaly due to the request is reaching to IHS and not able to reach the app
server.
151)
156)
Ans)
157)
In ssl configuration how you will provide the path of the certificate?
Ans) While Adding certificate, we have to give the location of the certificate, and if
you want to give Certicate store path, we have to give .p12 path
158) How you will achieve performance in production environment?
Ans)
159)
How you will change / migrate the project from one version to other?
Ans)
165)
http://www.petefreitag.com/articles/gctuning/