Friday, August 13, 2010

Modifying DataSource connection pool properties/advanced/custom using jython

1.       Prepare a script with required parameters as below and save in a file (ex:modifyds)

AdminConfig.modify('(cells/<hostname>Node01Cell/nodes/<hostname>Node01/servers/server1|resources.xml#ConnectionPool_1281713531147)', '[[connectionTimeout "888"] [maxConnections "888"] [unusedTimeout "888"] [minConnections "18"] [purgePolicy "EntirePool"] [agedTimeout "8888"] [reapTime "8888"][freePoolDistributionTableSize "8"] [stuckTime "8"] [stuckTimerTime "8"] [surgeCreationInterval "8"] [numberOfSharedPoolPartitions "8"] [stuckThreshold "8"] [numberOfFreePoolPartitions "8"] [surgeThreshold "-1"]]')

AdminConfig.create('Property', '(cells/<hostname>Node01Cell/nodes/<hostname>Node01/servers/server1|resources.xml#ConnectionPool_1281713531147)', '[[validationExpression ""] [name "test"] [description "test"] [value "test"] [required "false"]]')

AdminConfig.save()

2.       Copy the file to the server to some folder (ex: /var/scripts)

3.       Run the following command

./wsadmin.sh -lang jython -f /var/scripts/modifyds

4.       Connects to the server/dmgr and should come out without any error (in case of error, troubleshoot based on the message); verify the datasouce properties in admin console



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, August 12, 2010

JACL script to change connection pool settings

Links: http://publib.boulder.ibm.com/infocenter/wasinfo/fep/topic/com.ibm.websphere....

Try creating a test datasource with required connection pool properties to test the script.

The script can be used to modify existing datasource or delete an existing datasource and create the same one with required values.

proc createjdbcds {cellName nodeName jdbcName jdbcDSName timeout max min reap unused aged} {

   #--------------------------------------------------------------

   # set up globals variables

   #--------------------------------------------------------------

        global AdminConfig

        global AdminApp

        set ds [$AdminConfig getid /Cell:$cellName/Node:$nodeName/JDBCProvider:$jdbcName/DataSource:$jdbcDSNam e/]      

        #set properties the connection pool

        set connectionPool [$AdminConfig list ConnectionPool $ds]

        set conTimeout [list connectionTimeout $timeout]

        set maxConn [list maxConnections $max]

        set minConn [list minConnections $min]

        set reapTime [list reapTime $reap]

        set unTimeout [list unusedTimeout $unused]

        set agedTimeout [list agedTimeout $aged]

        set purgePolicy [list purgePolicy "FailingConnectionOnly"]

        set fullArgs [list $conTimeout $maxConn $minConn $reapTime $unTimeout $agedTimeout $purgePolicy]

        $AdminConfig modify $connectionPool $fullArgs

        $AdminConfig save

}

#-----------------------------------------------------------------

# Main

#-----------------------------------------------------------------

if {($argc  10) } {

   puts "modifydsconnectionpool: this script requires at least six parameters: cellName nodeName jdbcName connectiontimeout maxcon mincon reaptime unusedtimeout agedtimeout"

   puts "e.g.:     modifydsconnectionpool mycell mynode SPSESS51JDBC SPSESS51DS 600 50 10 180 180 0"

} elseif {$argc == 10} {

   # do some checking

   set cellName [lindex $argv 0]

   set nodeName [lindex $argv 1]

   set jdbcName [lindex $argv 2]

   set jdbcDSName [lindex $argv 3]

   set timeout [lindex $argv 4]

   set max [lindex $argv 5]

   set min [lindex $argv 6]

   set reap [lindex $argv 7]

   set unused [lindex $argv 8]

   set aged [lindex $argv 9]

   createjdbcds $cellName $nodeName $jdbcName $jdbcDSName $timeout $max $min $reap $unused $aged

}



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Wednesday, August 4, 2010

Sample Scripts for WebSphere Application Server

These sample jacl and Jython scripts let you automate common administation tasks and configure security in WebSphere Application Server Versions. The versions that the scripts apply to are noted. Download them and run them as is, or modify them to suit your environment.

  • The sample admin script and the script library package for the Feature Pack for Communications Enabled Applications run on WebSphere Application Server version 7.
  • The automated deployment sample runs on WebSphere Application Server versions 5.0, 5.1, and 6.0
  • The security configuration samples run on WebSphere Application Server Version 5 and WebSphere Application Server - Express, Version 5 and on WebSphere Application Server Version 6 and 6.1. There is one download that contains the samples for versions 5 and 5.1, one for version 6, and another for version 6.1.
  • The administration samples run on WebSphere Application Server versions 5.0, 5.1, and 6.0. (The Jython versions of the administration scripts only run on versions 5.1 and 6.0)
  • The configuration change samples run on version 5.1.1 and on version 6.

The hardware and software requirements for these samples are the same as for the products on which they run.

http://www.ibm.com/developerworks/websphere/library/samples/SampleScripts.html



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, July 29, 2010

How to delete CEI events

The eventpurge command deletes events from the event database.

Example

The following example deletes all events from the database whose severity (optional) is 20 (harmless) and were generated earlier than 10 minutes ago (if not seconds you can give –end for events generated before the end date/time to be deleted).

eventpurge -group "All events" -severity 20 -seconds 600

Purpose

Deletes events from the event database.

eventpurge [-seconds seconds | -end end_time] [-group event_group] [-severity severity] [-extensionname extension_name] [-start start_time] [-size size]

Description

The eventpurge command deletes events from the event database. You can delete all events from the event database, or you can limit the deletion to events meeting certain criteria.

Security: If WebSphere® security is enabled, your user ID must be mapped to the eventAdministrator role to delete events.

Parameters

-seconds seconds

The minimum age of events you want deleted. The seconds value must be an integer. Only events older than the specified number of seconds are deleted. This parameter is required if you do not specify the -end parameter.

-end end_time

The end time of the group of events you want to delete. Only events generated before the specified time are deleted. The end_time value must be specified in the XML dateTime format (CCYY-MM-DDThh:mm:ss ). For example, noon on 1 January 2006 in Eastern Standard Time would be2006-01-01T12:00:00-05:00. For more information about the dateTime data type, refer to the XML schema at www.w3.org.

This parameter is required if you do not specify the -seconds parameter.

-group eventGroup

The event group from which to delete events. The event_group value must be the name of an event group defined in the Common Event Infrastructure configuration. This parameter is optional.

-severity severity

The severity of the events you want deleted. The severity value must be an integer; only events whose severity is equal to the value you specify are deleted. This parameter is optional.

-extensionname extension_name

The extension name of the events you want included in the deletion. Use this parameter to restrict the deletion to events of a specific type. Only events whose extensionName property is equal to extensionName are deleted. This parameter is optional.

-start start_time

The beginning time of the group of events you want to delete. Only events generated after the specified time are deleted. The start_time value must be specified in the XML dateTime format (CCYY-MM-DDThh:mm:ss ). This parameter is optional.

-size size

The number of events to delete in a single transaction. The size value must be an integer. After this number of events have been deleted, the command commits the transaction before continuing in a new transaction. This parameter is optional.



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Friday, July 16, 2010

scp - secure copy (remote file copy program for Linux/UNIX)

If you have to copy files (lot of them and big in size) from one remote computer to another remote computer, using regular ftp clients may take a lot of time.

You may have to download files from one remote computer to your local computer and then upload to the second remote computer. Lot of hassle and time consuming!

Using scp command will save a lot of time.

Example: scp –r localfolder1 remoteuser@remotehost:remotefoldername (scp –r /var/logs/ wasadmin@uprwas01:/var/logs/)

scp - secure copy (remote file copy program)

Syntax

scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port]  -S program] [[user@]host1:]file1 [...] [[user@]host2:]file2

-1

Forces scp to use protocol 1.

-2

Forces scp to use protocol 2.

-4

Forces scp to use IPv4 addresses only.

-6

Forces scp to use IPv6 addresses only.

-B

Selects batch mode (prevents asking for passwords or passphrases).

-C

Compression enable. Passes the -C flag to ssh(1) to enable compression.

-c cipher

Selects the cipher to use for encrypting the data transfer. This option is directly passed to ssh.

-F ssh_config

Specifies an alternative per-user configuration file for ssh. This option is directly passed to ssh.

-i identity_file

Selects the file from which the identity (private key) for RSA authentication is read. This option is directly passed to ssh.

-l limit

Limits the used bandwidth, specified in Kbit/s.

-o ssh_option

Can be used to pass options to ssh in the format used in ssh_config. This is useful for specifying options for which there is no separate scp command-line flag. For full details of the options listed below, and their possible values, see ssh_config.

AddressFamily
BatchMode
BindAddress
ChallengeResponseAuthentication
CheckHostIP
Cipher
Ciphers
Compression
CompressionLevel
ConnectionAttempts
ConnectionTimeout
GlobalKnownHostsFile
GSSAPIAuthentication
GSSAPIDelegateCredentials
Host
HostbasedAuthentication
HostKeyAlgorithms
HostKeyAlias
HostName
IdentityFile
IdentitiesOnly
LogLevel
MACs
NoHostAuthenticationForLocalhost
NumberOfPasswordPrompts
PasswordAuthentication
Port
PreferredAuthentications
Protocol
ProxyCommand
PubkeyAuthentication
RhostsRSAAuthentication
RSAAuthentication
ServerAliveInterval
ServerAliveCountMax
SmartcardDevice
StrictHostKeyChecking
TCPKeepAlive
UsePrivilegedPort
User
UserKnownHostsFile
VerifyHostKeyDNS

-P port

Specifies the port to connect to on the remote host. Note that this option is written with a capital 'P', because -p is already reserved for preserving the times and modes of the file in rcp.

-p

Preserves modification times, access times, and modes from the original file.

-q

Disables the progress meter.

-r

Recursively copy entire directories.

-S program

Name of program to use for the encrypted connection. The program must understand ssh options.

-v

Verbose mode. Causes scp and ssh(1) to print debugging messages about their progress. This is helpful in debugging connection, authentication, and configuration problems.

Examples

scp myfile.txt hope@computerhope: myfile.txt

The above example would copy the file myfile.txt to the computerhope server under the name hope.

scp remote:/home/hope/*.

Copy files in the remote machine in the /home/hope directory to your local computer.



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, July 1, 2010

SCA Container is disabled because WPS profile is not set

I am using WID's process server to deploy a simple SCA module. Another portlet ( running on WAS 5.1.0.3 and Process Server 601 ) tries to initiate this process deployed in WID's runtime.

I get this error message when the processAction() attempts to populate the input DataObject.

ClientObjectWrapper inputMsgWrapper = businessProcess.createMessage(templateData.getID(), inputTypeName);

if(inputMsgWrapper.getObject() != null && (inpuMsgWrapper.getObject() instanceof DataObject)) {

The problem seem to be occurring at :

DataObject bdo = (DataObject)inputMsgWrapper.getObject();

Here's the exception that I get :

RVE0068E: Could not invoke the service() method on servlet My_Sample1_Portlet. Exception thrown : java.lang.ExceptionInInitializerError

·        

·        

·         Caused by


Caused by: com.ibm.websphere.sca.ServiceRuntimeException: caused by: com.ibm.websphere.sca.ServiceRuntimeException: SCA Container is disabled because WPS profile is not set

Solution:

1. Do not copy sca.jar to <any> ( like <Portal_root> / shared / app folder) location if you get a NoClassDefFoundError.
2. Copy the server-core.xml from server1 folder to WebSphere_Portal folder under <Profile_root> \ config\cells\<cellname> \ nodes\<nodename> \servers
3. Restart WebSphere_Portal and server1

Other related links:

http://www-01.ibm.com/support/docview.wss?uid=swg21308257

http://www-01.ibm.com/support/docview.wss?rs=688&uid=swg21322547



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Friday, June 4, 2010

websphere plugin



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, May 27, 2010

WebSphere(r) Application Server V6.1 Performance and Tuning

Know the performance improvements that went in WebSphere Application Server (WAS) 6.1 base runtime

Understand how to tune and use key J2EE™ components – JDK™ and other runtime components – for optimal performance with WAS 6.1

What’s New for V6.1 Performance?

New performance features of IBM Java5.0

JDK Performance Tuning

EJBand other runtime tuning

http://www-01.ibm.com/support/docview.wss?uid=swg27011085&aid=1



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, May 13, 2010

Unable to login to WAS admin console with server running

[5/13/10 13:45:36:776 EDT] 0000001d webcontainer  E com.ibm.ws.webcontainer.WebContainer handleRequest SRVE0255E: A WebGroup/Virtual Host to handle /admin has not been defined.

[5/13/10 13:46:09:531 EDT] 0000001d webcontainer  E com.ibm.ws.webcontainer.WebContainer handleRequest SRVE0255E: A WebGroup/Virtual Host to handle /ibm/console has not been defined.

[5/13/10 13:46:09:574 EDT] 0000001c webcontainer  E com.ibm.ws.webcontainer.WebContainer handleRequest SRVE0255E: A WebGroup/Virtual Host to handle /favicon.ico has not been defined.

-          Review system out and ffdc logs for any specific error messages and act on them

-          Make sure that the file system permissions are good (if it was owned by root and trying to start the server with wasadmin?)

-          Try executing this script: ${WAS_HOME}/bin/iscdeploy.bat –restore (details: http://publib.boulder.ibm.com/infocenter/eruinf/v2r2/index.jsp?topic=/com.ibm.tool.doc/deploy_comp1.html)



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Wednesday, May 12, 2010

Could not find stored procedure 'master..xp_jdbc_open2'

If you see the following error while using MS SQL Server data source in WAS the solution is simple:

java.sql.SQLException: [IBM][SQLServer JDBC Driver][SQLServer]Could not find stored procedure 'master..xp_jdbc_open2'.DSRA0010E: SQL State = HY000, Error Code = 2,812

When creating a SQL datasource via the WAS Admin Console, you'll notice that certain custom properties are added 'out of the box'.  Above error will occur when enable2Phase custom property is true. Try changing this property to true in your script or add the property manually via the console.

Another resolution: http://www-01.ibm.com/support/docview.wss?uid=swg21168355



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Tuesday, May 11, 2010

MustGather: Read first for WebSphere Application Server

Collect troubleshooting data for problems with IBM WebSphere Application Server. Gathering this information before calling IBM support will help familiarize you with the troubleshooting process and save you time.

For IBM WebSphere Application Server V5.0.2 or later, use thecollector tool to capture general information for each host machine. If you are running a version prior to V5.0.2, you can also manually collect the general information.

http://www-01.ibm.com/support/docview.wss?uid=swg21145599

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/ttrb_runct.html



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Friday, April 16, 2010

How WebSphere Application Server handles poison messages

WebSphere Application Server V5.x provides support for asynchronous messaging based on the Java™ Messaging Service (JMS) specification. Using the message listener service and either the Embedded JMS Server or an external message provider, such as WebSphere MQ, application developers can write message-driven beans (MDBs) that listen on a JMS destination (either a message queue or a topic) and that then get invoked when a message arrives at that particular destination. If the message listener service delivers a "poison message" to an MDB application, the application can choose to reject it. When this happens, what does the application server do with the message?

http://www.ibm.com/developerworks/websphere/library/techarticles/0405_titheridge/0405_titheridge.html

http://www-01.ibm.com/support/docview.wss?rs=171&uid=swg27016582



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Wednesday, April 7, 2010

websphere javacore and heap dump location

The Java heap is the memory space where the Java Virtual Machine (JVM) stores the entire set of objects created by the running Java application. A JVM heapdump is a file produced by the JVM to record the state of the heap at a particular moment in time. 

A java core is a snapshot of the threads at work in a JVM. It also details a cross section of information from the major components in the JVM like XM,XE, LK, etc (IBM Javacore only, Sun does not - it just shows threads)

A heapdump is a snapshot of JVM memory - it shows the live objects on the heap along with references between objects. It is used to determine memory usage patterns and memory leak suspects. 

Both can be created by issuing a kill -3 on the PID of the JVM process. There are other ways to gather these docs as well (wsadmin scripts)

The heapdump file location will be reported to stderr (usually the command window) by the JVM. If you set IBM_HEAPDUMPDIR, this directory should be used. Typically the file name will look something like this:
heapdump.YYYYMMDD.HHMMSS.PID.phd

Environment variables control the IBM JVM’s heap dump behavior. They can be set either in the OS environment variables or in the admin console (preferred).

Go to Application servers > server1 > Process definition > Environment Entries (or custom properties in older versions of WAS)

Create the following entries by clicking New:

  IBM_HEAPDUMP                           true      

  IBM_HEAPDUMPDIR                    /var/logs/heap

  IBM_HEAPDUMP_OUTOFMEMORY      true      

  IBM_HEAP_DUMP                        true       

  IBM_JAVACOREDIR                      /var/logs/core

  IBM_JAVADUMP_OUTOFMEMORY      true      

  IBM_JAVA_HEAPDUMP_TXT  true  



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Tuesday, March 30, 2010

wps messaging engine issues



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, March 25, 2010

nmon performance: A free tool to analyze AIX and Linux performance

http://www.ibm.com/developerworks/aix/library/au-analyze_aix/

The nmon tool is designed for AIX and Linux performance specialists to use for monitoring and analyzing performance data, including:

  • CPU utilization
  • Memory use
  • Kernel statistics and run queue information
  • Disks I/O rates, transfers, and read/write ratios
  • Free space on file systems
  • Disk adapters
  • Network I/O rates, transfers, and read/write ratios
  • Paging space and paging rates
  • CPU and AIX specification
  • Top processors
  • IBM HTTP Web cache
  • User-defined disk groups
  • Machine details and resources
  • Asynchronous I/O -- AIX only
  • Workload Manager (WLM) -- AIX only
  • IBM TotalStorage® Enterprise Storage Server® (ESS) disks -- AIX only
  • Network File System (NFS)
  • Dynamic LPAR (DLPAR) changes -- only pSeries p5 and OpenPower for either AIX or Linux

Also included is a new tool to generate graphs from the nmon output and create .gif files that can be displayed on a Web site.



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Friday, March 19, 2010

installing websphere or wps application using wsadmin (jacl or jython)

1.       Use scripts in websphere or process server scriptLibraries folder

/opt/ibm/WebSphere/ProcServer/scriptLibraries

2.       Use the wsadmin script with jython (python running on java) or jacl option

http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/topic/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/txml_callappinstall.html or

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.express.doc/info/exp/ae/txml_script.html

The following steps are for using jacl option and above link will show the syntax for using jython instead (for jython you have to use wsadmin.sh –lang jython and issue AdminApp.install command):

Steps:
- copy the ear file to some staging directory ex: /home/wpsadmin
- cd to profile root bin. ex: /opt/ibm/WebSphere/ProcServer/profiles/
DEV01/bin
- run wsadmin as below
./wsadmin.sh (or wsadmin.sh –lang jython or wsadmin.sh -lang jython -user wsadmin -password wsadmin)
- use the jacle script to install the app using default values (when
there is only one cell/node/server)
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear"  or AdminApp.install('/home/wpsadmin/HelloWorldProcessApp.ear') for jython.

for a specific server use the following
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-node
dvlpsij01Node01 -cell dvlpsij01Node01Cell -server server1} or

AdminApp.install("/home/wpsadmin/HelloWorldProcessApp.ear" {-node
dvlpsij01Node01 -cell dvlpsij01Node01Cell -server server1}

for a specific cluster use the following
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-cluster
clustername}

- uninstall the app from default server (assuming there is only one
server). pl note there is no .ear at the end of the app name, just the
name.
$AdminApp uninstall HelloWorldProcessApp

for a specific server use the following
$AdminApp uninstall HelloWorldProcessApp {-node dvlpsij01Node01 -cell
dvlpsij01Node01Cell -server server1}

for a specific cluster use the following
$AdminApp uninstall HelloWorldProcessApp {-cluster clustername}



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

installing websphere or wps application using wsadmin (jacl or jython)

1.       Use scripts in websphere or process server scriptLibraries folder

/opt/ibm/WebSphere/ProcServer/scriptLibraries

2.       Use the wsadmin script with jython (python running on java) or jacl option

http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/topic/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/txml_callappinstall.html

the following steps are for using jacl option and above link will show the syntax for using jython instead:

Steps:
- copy the ear file to some staging directory ex: /home/wpsadmin
- cd to profile root bin. ex: /opt/ibm/WebSphere/ProcServer/profiles/
DEV01/bin
- run wsadmin as below
./wsadmin.sh
- use the jacle script to install the app using default values (when
there is only one cell/node/server)
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear"

for a specific server use the following
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-node
dvlpsij01Node01 -cell dvlpsij01Node01Cell -server server1}

for a specific cluster use the following
$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-cluster
clustername}

- uninstall the app from default server (assuming there is only one
server). pl note there is no .ear at the end of the app name, just the
name.
$AdminApp uninstall HelloWorldProcessApp

for a specific server use the following
$AdminApp uninstall HelloWorldProcessApp {-node dvlpsij01Node01 -cell
dvlpsij01Node01Cell -server server1}

for a specific cluster use the following
$AdminApp uninstall HelloWorldProcessApp {-cluster clustername}



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Sample Scripts for WebSphere Application Server Administration

These sample jacl and Jython scripts let you automate common administation tasks and configure security in WebSphere Application Server Versions 5, 6 and 6.1. Download them and run them as is, or modify them to suit your environment.

http://www.ibm.com/developerworks/websphere/library/samples/SampleScripts.html



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Monday, March 15, 2010

what does the first line of unix/linux script #!/bin/ksh means?

#!/bin/ksh or #!/usr/bin/ksh is added as the first line for any unix or linux scripts. Why?

Originally, we only had one shell on unix. When you asked to run a command, the shell would attempt to invoke one of the exec() system calls on it. It the command was an executable, the exec would succeed and the command would run. If the exec() failed, the shell would not give up, instead it would try to interpet the command file as if it were a shell script.

Then unix got more shells and the situation became confused. Most folks would write scripts in one shell and type commands in another. And each shell had differing rules for feeding scripts to an interpreter.

This is when the "#! /" trick was invented. The idea was to let the kernel's exec() system calls succeed with shell scripts. When the kernel tries to exec() a file, it looks at the first 4 bytes which represent an integer called a magic number. This tells the kernel if it should try to run the file or not. So "#! /" was added to magic numbers that the kernel knows and it was extended to actually be able to run shell scripts by itself. But some people could not type "#! /", they kept leaving the space out. So the kernel was exended a bit again to allow "#!/" to work as a special 3 byte magic number.
So
#! /usr/bin/ksh
and
#!/usr/bin/ksh
now mean the same thing. I always use the former since at least some kernels might still exist that don't understand the latter.

And note that the first line is a signal to the kernel, and not to the shell. What happens now is that when shells try to run scripts via exec() they just succeed. And we never stumble on their various fallback schemes.



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Friday, March 12, 2010

Global Shared Library in WebSphere and Process Server

Question

How can I share my assets (Java™ binaries, XML schemas, and WSDL definitions) by-reference between Service Component Architecture (SCA) modules in the WebSphere Process Server run-time environment?

 

Cause In WebSphere Integration Developer, the default sharing behavior for assets is share-by-copy. That is, at build time, SCA library projects, containing shared SCA module assets become .jar files that are included in each SCA module application enterprise archive (.ear) file. Shared Java library artifacts are also included in each SCA module application .ear file.
Depending on the size of the libraries, number of assets, and number of deployed modules, the share-by-copy module can result in a large memory footprint. Sharing these assets by-reference can reduce this memory footprint.

Answer

http://www-01.ibm.com/support/docview.wss?rs=2307&uid=swg21322617



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Monday, March 8, 2010

How to install an application onto websphere or wps using a script?

Reference Link:

http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/txml_deployapp.html

Steps:

- copy the ear file to some staging directory ex: /home/wpsadmin

- cd to profile root bin. ex: /opt/ibm/WebSphere/ProcServer/profiles/DEV01/bin

- run wsadmin as below

./wsadmin.sh

- use the jacle script to install the app using default values (when there is only one cell/node/server)

$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear"

for a specific server use the following

$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-node dvlpsij01Node01 -cell dvlpsij01Node01Cell -server server1}

for a specific cluster use the following

$AdminApp install "/home/wpsadmin/HelloWorldProcessApp.ear" {-cluster clustername}

- uninstall the app from default server (assuming there is only one server). pl note there is no .ear at the end of the app name, just the name.

$AdminApp uninstall HelloWorldProcessApp

for a specific server use the following

$AdminApp uninstall HelloWorldProcessApp {-node dvlpsij01Node01 -cell dvlpsij01Node01Cell -server server1}

for a specific cluster use the following

$AdminApp uninstall HelloWorldProcessApp {-cluster clustername}



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, March 4, 2010

FAQ about WebSphere Application Server security

Because the integrity of your processing environment is at stake, questions about security must be answered as quickly as possible. To that end, this article provides quick, direct answers to some of the most frequently asked questions about IBM® WebSphere® Application Server security.

http://www.ibm.com/developerworks/websphere/techjournal/1003_botzum/1003_botz...



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Monday, March 1, 2010

WebSphere Portal Single Sign-On (SSO) resources

Friday, February 26, 2010

Implementing message flow security in WebSphere Message Broker V7

In IBM® WebSphere® Message Broker V6.1 or later, (hereafter called Message Broker) a security manager enables a broker to perform end-to-end processing of an identity carried in a message through a message flow. With this access control based on the identity associated with a message, security is independent of both transport type and message format. Without enablement of this message flow security, the default security facilities in WebSphere Message Broker are based on the security provided by the transport mechanism. A broker processes all inbound messages in a message flow by default using the broker service user ID as a proxy identity, and any identity carried in the messages is ignored.

Implementing message flow security in WebSphere Message Broker V7



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Cloning a WebSphere Portal V6 installation

It's one thing to install a basic WebSphere Portal system; you could finish this task in one to two hours. However, It's a whole other matter to establish a complete portal enviornment that meets internal security configuration requirements, connects to the corporate LDAP and database servers, and includes all the portal’s basic set of pages and portlets; for this task, you should plan several extra days. Administrators who need to establish multiple environment could benefit from being able to replicate a base, fully-configured portal enviornment quickly. This article can help you do just that. You learn how to build a custom install package, archive the install, and then use that archive as a template for creating addiitonal installations. Finally, you see sample code for automating much of the process.

Cloning a WebSphere Portal V6 installation

Article in PDF format

0711_lamb-CloneWP6install-rev3.pdf

556 KB

HTTP

Code samples

wp60_cloning_files.zip

6.22 KB

HTTP



This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

Thursday, February 25, 2010

installation of WPS v7

simple document that explains about wps v7 install

This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous

WPS V7 Install

WPS V7 Installation

This e-mail, including any attachments, may be confidential, privileged or otherwise legally protected. It is intended only for the addressee. If you received this e-mail in error or from someone who was not authorized to send it to you, do not disseminate, copy or otherwise use this e-mail or its attachments. Please notify the sender immediately by reply e-mail and delete the e-mail from your system.

Posted via email from shaker's posterous