This action might not be possible to undo. Are you sure you want to continue?
à Common environment and programming model for your applications. àPlatform for developing and Deploying web services and SOA based apps à Secure, Scalable, reliable transaction engine for ERP à IBM WebSphere is architected to enable you to build business-critical applications for the Web à WebSphere includes a wide range of products that help you develop and serve Web applications. à They are designed to make it easier for clients to build, deploy, and manage dynamic Web sites more productively à WAS implements J2EE specification WebSphere Application Server provides the environment to run your Web-enabled ebusiness applications. An application server functions as Web middleware or a middle tier in a three-tier e-business environment. The first tier is the HTTP server that handles requests from the browser client. The third tier is the business database (for example, DB2 UDB for iSeries) and the business logic (for example, traditional business applications, such as order processing). The middle tier is WebSphere Application Server, which provides a framework for a consistent and architected link between the HTTP requests and the business data and logic.
With the Base and Express packages, you are limited to single application server environments. The Network Deployment package allows you to extend this environment to include multiple application servers that are administered from a single point of control and can be clustered to provide scalability and high availability environments.
The typical application flow is as follows: 1. A Web client requests a URL in the browser (input page). 2. The request is routed to the Web server over the Internet. 3. The Web server immediately passes the request to the Web server plug-in. All requests go to the Web server plug-in first. 4. The Web server plug-in examines the URL, verifies the list of host name aliases from which it will accept traffic based on the virtual host information, and chooses a server to handle the request. 5. A stream is created. A stream is a connection to the Web container. It is possible to maintain a connection (stream) over a number of requests. The Web container receives the request and, based on the URL, dispatches it to the proper servlet. 6. If the servlet class is not loaded, the dynamic class loader loads the servlet (servlet init(), then doGet() or doPost()). 7. JNDI is used for lookup of either datasources or EJBs required by the servlet. 8. Depending upon whether a datasource is specified or an EJB is requested, the JNDI directs the servlet: – To the corresponding database and gets a connection from its connection
pool in the case of a data source. – To the corresponding EJB container, which then instantiates the EJB when an EJB is requested. 9. If the EJB request involves an SQL transaction, it goes back to the JNDI to look up the datasource. 10.The SQL statement is executed and the retrieved data is sent back either to the servlet or to the EJB. 11.Data beans are created and handed off to JSPs in the case of EJBs. 12.The servlet sends data to JSPs. 13.The JSP generates the HTML that is sent back through the plug-in to the Web server. 14.The Web server sends the output page (output HTML) to the browser.
Functionality of WAS WebSphere Application Server supports asynchronous messaging through the use of a JMS provider and its related messaging system.(JMS 1.1 Messaging Provider) WebSphere Application Server provides authentication and authorization capabilities to secure administrative functions and applications, using LDAP WebSphere Application Server works with a Web server (such as the IBM HTTP Server) to route requests from browsers to the applications that run in WebSphere Application Server. Web server plug-ins are provided for installation with supported Web browsers. The plug-ins direct requests to the appropriate application server and perform workload balancing among servers in a cluster. Web services enable businesses to connect applications to other business applications, deliver business functions to a broader set of clients and partners, interact with marketplaces more efficiently, and create new business models dynamically. Delivers a high performance and extremely scalable transaction engine for dynamic e-business applications Packaging WebSphere Application Server is available in multiple packaging options. WebSphere Application Server - Express V6.0 à Single Server environment.(No Clustering or multi server management) à J2EE 1.4 support àMedium-sized business
3 support JDK 1.4 High Availability Manager Java Based Messaging Engine .3 support Web Services based on Apache engine WAS 6.4 support JDK 1.Only a paper license upgrade is required) àWebSphere Application Server.4 support (JDK 1.2/1.Only a paper license upgrade is required) Differences b/n WAS Version WAS 5: J2EE 1.Can be done without any software upgrades .Express V6 and WebSphere Application Server V6 node can be federated into a WebSphere Application Server .3/1.2) Web Services based on J2EE 1.Network Deployment V6 cell (Can be done without any software upgrades .àContains Rational Web Developer application tool à Doesn’t handle EJB and JCA à Limited to 2 CPU’s WebSphere Application Server V6.Express V6 node can be upgraded to a WebSphere Application Server V6 node(.1 (Base) àSlightly differs in packaging and licensing à Contains Application Server toolkit à Includes a trial version of Rational Application Developer àUnlimited CPU’s WebSphere Application Server Network Deployment V6 àExtends Base version àClustering capabilities àEdge Components which provide high performance and availability (Caching Proxy and Load Balancer) àHA for distributed configurations àLarge Enterprise applications àScalability.2/1.0: J2EE 1.4. Availability and Performance àWeb Server plug-in supports weighted WLM àAll V6 application servers have the same core and base functionality àWebSphere Application Server .
the Web container creates a request object and a response object. à HTML and other static content processing Requests for HTML and other static content that are directed to the Web container are served by the Web container inbound chain.0 support JSF-a framework for Web applications Integrated Console Security changes Secure and Scalable runtime Edge Components Using Edge components can reduce Web server congestion. and JSP 2.0 and 1. after which the JVM performs garbage collection. Web container àA Web container. and improve Web server performance. and JavaServer Pages (JSPs) à Web container transport chains: Requests are directed to the Web container using the Web container inbound transport chain. in most cases. JCA 1. then invokes the servlet service method.2/1.1: J2EE 1. . an HTTP inbound channel that serves HTTP 1. Profiles and all profiles use same WebSphere binaries(Less storage) Node groups Service integration functionality provides both message-oriented and service Oriented applications WAS 6. As the name indicates.4 support JDK 5. However. and a Web container channel over which requests for servlets and JSPs are sent to the Web container for processing à Servlet processing When handling servlets.4.3/1. Servlet 2.5. servlets. using an external Web server and Web server plug-in as a front-end to a Web container is more appropriate for a production environment. which processes HTTP requests. JMS 1.1 requests.0 Supports Java Server Faces (JSF) Creates Archive of the existing WAS configurations and the archive can be used to create new configurations. Edge components usually run on machines that are close (in a network configuration sense) to the boundary between an enterprise’s intranet and the Internet.1.EJB 2.1. The chain consists of a TCP inbound channel that provides the connection to the network. The Web container invokes the servlet’s destroy method when appropriate and unloads the servlet. increase content availability.
such as the EJB (Enterprise JavaBean) component model found on J2EE (Java 2 Platform. and messaging. In most cases. Such application server clients can include GUIs (graphical user interface) running on a PC. application server provides exposes businness logic for client applications through various protocols . according to our definition. the Web server simply passes the request to the program best able to handle it. The server-side program usually provides for itself such functions as transaction processing. Enterprise Edition) application servers. or even other application servers. iPlanet Web Server The application server: As for the application server. transaction processing.purpose. Difference between AppServer and a Web server : (1) Webserver serves pages for viewing in web browser. and messaging. The information traveling back and forth between an application server and its client is not restricted to simple display markup. Sun ONE Web Server. the application server manages its own resources. Instead. Eg: Apache HTTP Server. When a request comes into the Web server. While a Web server mainly deals with sending HTML for display in a Web browser. Since the logic takes the form of data and method calls and not static HTML. possibly including HTTP. an application server may also employ various scalability and fault-tolerance techniques. for viewing in a Web browser. caching. and clustering—features oftentimes erroneously assigned as features reserved only for application servers. Such gate-keeping duties include security. Understand that a Web server's delegation model is fairly simple. Like a Web server. the server exposes this business logic through a component API. the client can employ the exposed business logic however it wants. resource pooling. a Web server. most often in HTML. database connectivity. The Web server doesn't provide any functionality beyond simply providing an environment in which the server-side program can execute and pass back the generated responses. such server-side programs generate a response. The application program can use this logic just as it would call a method on an object (or a function in the procedural world). it may employ various strategies for fault tolerance and scalability such as load balancing. an application server provides access to business logic for use by client application programs. an application server exposes business logic to client applications through various protocols. While a Web server may not itself support transactions or database connection pooling. Moreover. the information is program logic.
Session Persistance: You use session persistence to permanently store data from an HTTP session object to enable failover and load balancing across a cluster of WebSphere Applicaiton Servers. Roles & Responsibilities Explain your work in your previous environment (Your script) What is wsadmin / jacl scripting WSADMIN is a scripting interface (or command-line interface) into WebSphere Application Server that permits the automation of many different tasks that we can do using a (web interface) or graphical user admin console. (or) In a clustered environment. Sessiontracking: Session tracking enables you to track a user's progress over multiple servlets or HTML pages. 2. which. Explain Session affinity: Most servers use the term "Session Affinity" to indicate that within a cluster of servers. 4. JACL scripting is the scripting language that is supported by the WebSphere Application Server to administer or write any custom-based task. What are the different wsadmin objects. 3.1. .jacl What did you use wsadmin / jacl scripting for. AdminConfig AdminControl AdminApp AdminTask Help How do you invoke wsadmin command Go to the appropriate <profile_home> and type wsdmin. are stateless. How do you set session time out : You can specify an interval of time after which HTTP sessions expire. requests from the same client always get routed back to the same server. any HTTP requests associated with an HTTP session must be routed to the same Web application in the same JVM. How do you execute a jacl script >wsadmin -f myScript. by nature.
2. web module level. Back Ups How do you take back ups in WAS backupConfig. Manual synchronization. Configurator 4.zip> -nostop What is the Backup policy in your previous company Incremental Backups every week. Automatic synchronization. Explain profiles and what is the equivalent command in WAS 5.sh [filename] -nostop What is the out put file WebSphereConfig_yyyy-mm-dd.x In WAS 5. Operator 3.click Servers > Application servers > server_name > Web container settings > Session management > Session Timeout What are the different levels at which session timeout can be set application level. Startup synchronization. server level 5.x ----> wsInstance. How do you disable auto sync System Administration > nodeagent > file synchronization service > Uncheck automatic synchronization. How do you upgrade WAS GUI Upgrade Silent Upgrade Logs files and their paths for both 6. Administrator . 3.sh -name instanceName -path instanceLoacation -host hostName -create | delete 8. 9. What is the default interval for auto sync 60 seconds. What are the different kinds of sync operations 1.sh <filename. 7. Monitor 2. What are the different UserRoles in WAS 1.zip How do you restore back ups restoreConfig.
CosNaming provides the server-side implementation and is where the name space is actually stored. It can be used in a servlet or EJB. if it is certain that the object is located on the same application server. JNDI essentially provides a client-side wrapper of the name space stored in CosNaming and interacts with the CosNaming server on behalf of the client. Here is an example of a corbaname: corbaname::myhost1:9812/NameServiceServerRoot#ejb/webbank/Account Complex names Compound name/remote/complex Applications that do not run in the same server cannot use simple name lookup because the simple name is not local to the application. Here is an example of a simple name: ejb/webbank/Account Corba Corbaname The corbaname binding is always guaranteed to work.sh Run the dumpNameSpace command against any bootstrap port to get a listing of the names bound with that provider URL. The fully qualified (compound name) JNDI name is always guaranteed to work.10. The JNDI implementation in WebSphere Application Server is built on top of a Common Object Request Broker Architecture (CORBA) naming service (CosNaming). Simple Simple name The simple name binding is guaranteed to succeed if lookup is within the same server or when connected directly to the name space of the server containing the target of the lookup. Explain JNDI in WAS Each application server hosts a name service that provides a Java Naming and Directory Interface (JNDI) name space. it requires that you know the correct path to the object at deployment time. Instead. . Each application server contains a name server. JNDI provides the client-side access to naming and presents the programming model that application developers use. an application of this type must look the object up directly from the name server. However. The service is used to register resources hosted by the application server. Here is an example of a compound name: cell/nodes/node1/servers/server1/ejb/webbank/Account When do you use dumpNameSpace. System artifacts such as EJB homes are bound relative to the server root context in that name server.
Explain JDBC Connection Pooling Each JDBC data source has a pool of JDBC connections that are created when the data source is deployed or at server startup. Applications use a connection from the pool then return it when finished using the connection. Connection pooling enhances performance by eliminating the costly task of creating database connections for the application. Each data source that you configure contains a pool of database connections that are created when the data source instance is created-when it is deployed or targeted, or at server startup. Connection Timeout This value indicates the number of seconds a request for a connection waits when there are no connections available in the free pool and no new connections can be created. Max Connections Specifies the maximum number of physical connections that you can create in this pool. Min Connections Specifies the minimum number of physical connections that you can create in this pool. Reap Time Specifies the interval in seconds between runs of pool maintenance thread. Unused Timeout Specifies the interval in seconds after which an idle or unused connection is discarded. Aged Timeout Specifies the interval in seconds before a physical connection is discarded. Which one should be the highest and which one should be the lowest in the reap/unused/aged timeouts. Aged timeout should be the highest and Reap timeout should be lowest. Purge Policy Specifies how to purge connections when a stale connections or fatal connection error is detected. What are stale connection exceptions When an application receives a stale connection exception on a database operation, it indicates that the connection currently held is no longer valid. (or) Whenever a troubled connection is encountered, a staleConnectionException is raised. (A troubled connection is an inconsitent connection object in a connection pool) 12. Explain the Deployment steps of a J2EE application to WAS
13. How would you go about when a new application comes into ur environment (resources, settings, heaps etc) 14. What is rollover update It is used to rollover the updates to all the cluster members in a cluster whenever any changes are made to even one of the cluster member. 15. What is ripple start RippleStart combines stopping and starting operations. It first stops and then restarts each member of the cluster. 16. 17. Explain 2 Troubleshooting scenarios
How would you set up introscope profiles/probes Wily's Introscope is an enterprise application performance monitoring tool. It provides an overview of application and server health and statistics. 18. VerboseGC
VerboseGC is the logging mechanism implemented by the JVM to diagnose memory/storage problems. Here Garbage collection identifies and frees previously allocated storage that is no longer in use. An understanding of the way that the Garbage Collector works will help you to diagnose problems. Verbose logging is intended as the first tool to be used when attempting to diagnose garbage collector problems; more detailed analysis can be performed by invoking one or more (trace garbage collector) traces. How do set it up In Admin Console goto Servers > Application Servers > Java and Process Management > Process Definition > Java Virtual Machine > Check Verbose Garbage Colletion option. What files have verbosegc information That particular server's (<profile_home>/logs/servername/) native_stderr.log What tool did you use to analyse verbosegc logs GCAnalyzer 19. What is process definition. A process definition specifies the run-time characteristics of an application server process. A process definition can include characteristics such as JVM settings, standard in, error and output paths, and the user ID and password under which a server runs. What is the effect of changing max heap and min heap size of a jvm
Max Heap Size: When you have established the maximum heap size that you need, you might want to set the minimum heap size to the same value; Using the same values is not usually a good idea, because it delays the start of garbage collection until the heap is full. The first time that the Garbage Collector runs, therefore, becomes a very expensive operation. Also, the heap is more likely to be fragmented and require a heap compaction. Again this is a very expensive operation. Min Heap Size: The recommendation is to start your application with the minimum heap size that it needs. When it starts up, the Garbage Collector will run often and, because the heap is small, it runs efficiently. Whats the max heap allowed by AIX Minimum heap size allowed AIX: 4 MB LINUX: 4 MB WINDOWS: 4 MB Maximum heap size allowed AIX: Half the available memory with a minimum of 16 MB and a maximum of 512 MB LINUX: Half the available memory with a minimum of 16 MB and a maximum of 512 MB WINDOWS: Half the real (physical or RAM) memory with a minimum of 16 MB and a maximum of 2 GB What are the effects of large initial heap/max heap The time between garbage collections will increase, but the garbage collection will take longer, which indirectly effects the turn-around-time of the applicaiton performance. (or) Because it delays the start of garbage collection until the heap is full. The first time that the Garbage Collector runs, therefore, becomes a very expensive operation. Also, the heap is more likely to be fragmented and require a heap compaction. Again this is a very expensive operation. 20. Heap Dumps/ Core dumps
What is a heap dump Heapdump is a JVM facility that generates a dump of all live objects that are on the Java heap at a certain point in time; that is, those that are used by the Java application. When the java heap is exhausted the JVM will generate a heap dump by default. By default, you get heapdumps only on OutOfMemoryErrors. You do not get heapdumps in crashes or through a signal to the JVM. It shows the objects that are using large amounts of memory on the Java heap, and what is preventing them from being collected by the Garbage
How to generate Heap dump both WAS 5/6 By default.4 heap dump format generates a . The reason we can utilize this service on Windows platform is because the Windows OS automatically starts this service whenever the system is up and we can flexibily start and stop the server from windows services. What is a core dump/thread dump Java thread dumps provide detailed information about all active Java threads. you get heapdumps only on OutOfMemoryErrors.*] >$AdminControl invoke $mythread_dm dumpThreads Whats the difference between kill -3 command executed on WAS5 JVMs and WAS 6 JVMS kill -3 command generate core dumps. What tools did you use to analyse core dump/thread dump IBM ThreadAnalyzer What tools did you use to analyse heap dumps IBM HeapAnalyzer In what scenarios is a core dump/thread dump useful It is useful in several situations.Collector. most notable for memory leak problems or memory allocation problems for exaple OutOfMemoryExceptions. In order to manually generate a heapdump.process=server1.process=server1.4) jdk 1.*] >$AdminControl invoke $myheap_dm generateHeapDump How to generate core dump/thread dump both WAS 5/6 Through wsadmin >set mythread_dm [$AdminControl completeObjectName type=JVM. you must first enable signal-based heapdumps by setting the IBM_HEAPDUMP=TRUE and IBM_NOSIGHANDLER=TRUE environmental variables and through wsadmin follow the below process: >set myheap_dm [$AdminControl queryNames type=JVM. . WASService. It is useful in several situations. most notably for hung servers.3 and 1. You do not get heapdumps in crashes or through a signal to the JVM. What are the respective extensions (jdk 1.exe. In what scenarios is a heap dump useful It is useful in situations. How do you make a jvm run as a service in windows and why. most notably for hung servers or hung thread situations or thread deadlock situations.phd format 21.
What other connection pools do you know in WAS other than JDBC connection pool J2C connection pool MQ connection pool Thread pool 27. You can attach files to your PMR to provide the IBM engineer more information to better assist you. Configure Authentication mechanisms (LTPA) 3. which logs activity of various WebSphere Application Server components. How do you set up traces.log files. What is activity log and how do you view it. Log Analyzer is used to view the activity.22. . LDAP. Web Servers (parameter : ) 26. Application server (parameter : ) 2. Hardware capacity and settings (parameter : ) 8. Database (parameter : ) 5. In Admin console Troublshooting > logs and trace > servername > choose Diagnostic trace 24. select Security -> Global Security > User Registries -> LDAP. JVM tunings (parameter : ) 3. OS) How do you enable global security in WAS 1. JMS (parameter : ) 6. ESR: Electronic Service Request -------25. Security 7. Configure Authorization (if there is any) and then check Enable global security. In the Deployment Manager Admin Console. How do u configure an LDAP 1. Applications (parameter : ) 4. Operating System (parameter : ) 9. These are IBM Service logs which are in binary format. What all parameters did you tune in WAS (other than JDBC connection pool and heap sizes) We can tune some of these other aspects such as 1. 23.PMR is created wehn a customer submits a request to fix a software problem via ESR. A PMR number is assigned to track the request. Configure User registries (it can be custom. What is a PMR and explain how you worked with IBM on a PMR PMR: Problem Management Record ---. or local 2.
Does WAS support multiple LDAPs? Yes.0 version onwards 28. Provide the details for the fields in the Configuration panel as listed below: Serverid. Save the configuration for WebSphere. What is the utility that comes with WAS / IHS to manage certificates ikeyman. Host.2.com (every resource under google. 31. Bind password (please get this info from LDAP admin) 3. How do you make SSO work across multiple cells The LTPA token keys must be exported to the target cell and the LTPA token key from the target cell must be imported into the current cell. this will validate the settings.sh What is the defualt key store location for WAS <profile_home>/etc 30. 6. "Uncheck" 'Enforce Java 2 Security' option 8. Navigate to Security -> Global Security. Type. What is SSL Secure Socket Layer is the technology to establish secure communication along with data integrity and encryption over the network or between the nodes (machines) 29. Did you ever work with certificates Yes. . It cannot span multiple domains. "Check" 'Enable global security' option 7.com can be accessed) but outside of that domain SSO cannot be applied. Click Apply. Example: mail. Base DN. from 6. Click Apply 4. We need to define the configuration for Global Security in the Administrative Console. From the Active User Registry drop-down list select LDAP as the active user registry.google. Serverpassword. Save the configuration for WebSphere. Port. Bind DN. 9. How do u configure LTPA Global Security > Authentication mechanism > LTPA > provide the password and Apply How do u configure SSO Global Security > Authentication mechanism > LTPA > SSO > check 'Enabled' option What is the limitation of SSO It is applicable only to a single domain. 10. 5. and then restart the server.
What are the two virtual hosts that come with WAS installation admin_host. Explain virtual hosts concept A virtual host is a configuration that enable a single host machine to resemble multiple host machine. Depending on the operating platform. xml (dmgr starts but cannot open the admin console because the port hasn't been changed in virtual host xml file) C:\WebSphere\profiles\dmgr\config\cells\dmgr_cell\virtualhosts.xml) contains routing information for all applications mapped from the web server to the application server. How do you disable security for Deployment manager without logging into the console security. default_host 36.xml 35. the command is: Linux and Unix: GenPluginCfg. serverindex.xml 33. What is the plugin configuration file and where is it located The plug-in configuration file (plugin-cfg.bat When do u regenerate the plugin config file The plug-in configuration file needs to be regenerated and propagated to the Web servers when there are changes to your WebSphere configuration that affect how requests are routed from the Web server to the application server. If you have to change the ports of a jvm manually without logging into the admin console which file would you edit. How do u regenerate the plugin config file The GenPluginCfg command is used to regenerate the plug-in configuration file.sh Windows: GenPluginCfg. These changes include: _ Installing an application _ Creating or changing a virtual host .xml .32. How do you change the port number for admin console Logging into the admin console http://<hostname>:<admin_port>/admin ex: http://localhost:9060/admin Without logging into the admin console C:\WebSphere\profiles\dmgr\config\cells\dmgr_cell\nodes\dmgr_node\serviceindex. enable=false 34.
60 seconds If a change is made to the plugin config should the webserver be restarted? Not Required because the plugin's automatic refresh interval is 60 seconds. The webserver first takes the request and if it can't serve. and URIs. What is the information in a plugin config file Plugin config file contains routing information along with information on virtual hosts . What is the configuration file for IHS httpd. When the request comes to a webserver how does the webserver know the JVM that is capable of handling that request. What changes are made to this config file (automatically) during plugin installation on the webserver The plugin's binary module file (. The webserver must to restarted so the changes made to the config file become effective.xml) path will be copied to the httpd.conf If changes are made to the config file should the webserver be restarted Yes. LoadBalanceWeight. What webserver did you work on I have on on IBM HTTP and Apache web servers. clusters (cluster members). The plugin config file routes the request to the appropriate application server (or cluster member or jvm) according to the mapping information it has. 37.e HTTP ports) _ Creating or altering a cluster When do you manually edit the plugin config file When enabling SSL (specifying the key file name). and minimum number of connections. 38.conf file automatically.dll) path and the plugin's configuration file (plugin-cfg. What is the refresh interval of plugin. it forwards the request to the plugin config file . What is collector tool The collector tool gathers information about your WebSphere Application Server installation and packages it in a Java archive (JAR) file that you can send to ._ Creating a new server _ Modifying HTTP transport settings (i.
. Clustering is a mechanism which provides workload management (WLM) and failover for applications that reside on the application server cluster. If it doesnt. Collector tool can be run by only root or administrator.sh | bat Use It can be used to send it to the IBM Customer Support to assist in determining and analyzing your problem. click Resources >JDBC Providers > New. For example: node31-dmgr_cell-dmgr_nodedmgr-WASenv.jar file.jar 39. Will it work?? We can federate it to the same DM.IBM Customer Support to assist in determining and analyzing your problem. What is the difference between horizontal/vertical clustering. operating system and Java data. When on a system there is an existing installation of websphere federated to the DM. Ex: C:\IBM\WebSphere\profiles\dmgr\config\cells\dmgr_cell\applications 42. Syntax It must be invoked from a temporary work directory > C:\IBM\WebSphere\AppServer\bin\collector. 43. You make one more installation and federate this to another/same DM. Disadvantage: Single point of failure. how will you make it work 40. Vertical clustering: For high availability and vertical scalability. and the presence and level of each software prerequisite. where can the application binaries be found In the Applications folder when the application is deployed. This works. When would you use them For workload management (WLM) and failover requirements. When an application is deployed. configuration files. 41. Horizontal clustering: For high availability and horizontal scalability. Information in the JAR file includes logs. Output file The output will a . Unix commands How do you create a JDBC resource To view this administrative console page. property files.
log 48. TAI = Trust Association Interceptor. What is the difference between webserver handling in WAS 5 and 6 45. New features in WAS 6 46. What are the configuration files in IPlanet web server magnus. What are the logs in IHS access. Choose a supported database type.LogFormat"%t %h %u %m" 49.conf 50. .Step 1: Select the database type. Choose a supported implementation type. type. How do you change the log format in IHS In httpd.conf. click Resources > JDBC Providers > JDBC_provider > Data sources > New 44. Trust association is used to connect reversed proxy servers to WebSphere Application Server. 1 GB 2) What is the default installation location of WAS in Linux. Choose a supported JDBC Provider Step 3: Select the implementation type. What is the pre requisite for syncnode command The nodeagent on the node must be in a stopped state when this command is executed. What is TAI. 47. (or) Trust association enables the integration of IBM WebSphere Application Server security and third-party security servers. error. Step 2: Select the JDBC provider type. obj. Opt/IBM/WebSphere/AppServer 3) What is the default installation location of WAS in Sun Solaris. Step 4: Apply Step5: Now create the required Data Sources To view this administrative console page. and how do you enable it.conf file change the following line to your required parameters ----.log. Global Security > LTPA > TrustAssociation > Check Enable trust association and Apply 1) What is the recommended free disk space in /tmp to install WAS.
hostName="localhost" -W winservicepanelInstallWizardBean. 9) What is the default Http transport port number for Application Server profile and what is the use. JNDI use bootstrap port to obtain initial context root. 11) Installation was successful and when I am trying to start server it is giving “Invocation Target Exception” why you will get this issue and how you are trouble shooting this issue.nodeName="krishna_node" -W nodehostandcellnamepanelInstallWizardBean. If we want federate a profile by using SOAP protocol and SOAP connector port number. we can federate a profile. To access the EJB’s.0? ./install –options “<absolute path of response file>” – silent 7) Which registry file will get updated after installation of WAS. Add the host name in etc/hosts file which you had given at the time of installation. 12) What are different profile templates in WAS 6. 2809. May be the problem with hostnames. <was-setup>.startupType="manual" 6) Write the complete command to execute a response file.value="true" -P wasProductBean. (if ssl was enabled 9443) If we want to invoke applications running on AppServer we are using HTTP transport port 10) What is the default Bootstrap port number in App. hostnames are mismatched. vpd.installLocation="C:\IBM\WebSphere\AppServer" -OPT disableOSPrereqChecking="true" -OPT installType="installNew" -OPT createProfile="true" -OPT profileType="deploymentManager" -OPT PROF_enableAdminSecurity="true" -W nodehostandcellnamepanelInstallWizardBean. Client Applications like wsadmin uses Simple Object Access Protocol and that is listening to the port 8879.winServiceQuery="true" -W winservicepanelInstallWizardBean.accountType="localsystem" -W winservicepanelInstallWizardBean.properties 8) What is the use of SOAP Connector port and what is the default soap port number for DMGR profile. 9080.Opt/IBM/WebSphere/AppServer 4) What is the default installation location of WAS in AIX Usr/IBM/WebSphere/AppServer 5) List any 10 parameters in response file -W silentInstallLicenseAcceptance.Serv profile and what is the use.
default and managed 13) Write the complete command to create an App. we can change the port numbers. . Local OS. Federated repository was added in 6.1.Dmgr.1 23) What is the necessity of global security? To provide security for the admin console. 17) What is the impact for the federated profile servers. LDAP.txt 16) What is the difference between managed node and unmanaged node Manged Node contains node agent. if DMGR is down. 20) If we stop the nodeagent. Serverindex. C:\IBM\WebSphere\AppServer\bin>wasprofile.xml 19) What is a server. what will be the impact for end users. process that request and execute that request and response will be generated to the end users.bat -delete -profileName AppSrv01 15) If you get a problem before creating a log’s directory at the time of installation. There is no impact for end users 21) How to take backup with out stopping servers. For unmanaged the will be no nodeagent./backupConfig. Custom. at that time where you can check the status of installation tmp/log. Server receives user request. C:\IBM\WebSphere\AppServer\profiles\AppSrv01\bin>wasprofile.sh –nostop 22) What are the different user registries under global security in 6. No impact on servers and applications 18) In which xml file.bat -create -profileName AppSrv04 -profilePath "C:\IBM\WebSphere\AppServer\profiles\AppSrv04" -template Path "C:\IBM\WebSphere\AppServer\profileTemplates\default" -nodeName app_node04 -cellName cell04 -hostName krishamurthy 14) Write a complete command to delete a profile.0 and 6. 24) What is the port number for LDAP server with SSL and without SSL? .Serv profile through command line. Server provides a runtime environment for your web app’s Or Enterprise applications. we can administer federated profiles servers and applications from dmgr admin console.
where as in the custom user registry specifying user names and passwords in a normal file and we are specifying the absolute path of that file into the websphere application server. if it is not enabled 389. Here we are integrating seperate directory servers. whenever we are going for LDAP user registry we have to specify user id & password & type of directory server. Registry We can create this file any where but we have to configure this absolute path to the application servers. 2) Custom user registry. Those are Type2(Thick) and Type4(Thin/Native Protocol) jdbc drivers. Registry Groups. b) LDAP: It is a mechanism & not a server. Making a connection to a database Creating SQL or MySQL statements Executing that SQL or MySQL queries in the database Viewing & Modifying the resulting records We have 2 types of JDBC drivers in was. 1) Local os user registry.sh –listProfiles 27) What are the advantages and disadvantages of Local OS./wasprofile. -> In local os user registry we have to create user accounts and that user accounts have to configure to websphere application servers.Custom and LDAP user registries? Global Security: In 6.sh -conntype NONE Securityoff exit 26) How to know how many profiles are available.0 we have 3 ways to provide security for admin console.Type2 JDBC drivers require the database . 3) LDAP (Light Weight Directory Access Protocol) user registry. 28)What is the full form of JDBC. if SSL is enabled the port number is 636. and retrieve the data form the database and utilize the data in the java program. port number (default is 389). that is useful to write a java program to connect any database./wsadmin. a) Custom user registry: Here we have to create two files named: Users. if SSL is enabled we have to specify port number as 636 and we have to specify Base distinguished name which indicates authentication for users and we have to specify Bind distinguished name and Bind password which specify authorization for user and we have to select "Advanced Light Weight Directory Access Protocol user registry settings" there we have to specify user filter classes and group filter classes (automatically it will be there) and finally we have to restart the server.389 and 636 25) How to disable Global Security . JDBC (java Database Connectivity) is an API (Applicationprogram Interfaces). /AppServer/bin>.
30)Write the name of the jar file necessary to configure Oracle 9i & Oracle 10g Database. Security Breach.k.a design b. Number of connections in connection pool may vary. You need more information to address this question. goal is to provide scalability e. Hurdle. . goal is to provide 0 downtime Rolea. Incident Management = Risk Plan. Risk.DB2JCC_LICENSE_C4. -> The .JAR (for log) & Class12.class files.e OJDBC14.client software on the client node to connect to the database server. Goal is to provide infrastructure for the demands b. Potential incidents management. In oracle 10g & 9i We have only one jar file i. goal is to provide stable environment c.jar (for 9i) and In DB2 we have 3 or more jar files. involve in infrastructure architecting a. goal is to provide high availability d.e DB2JCC. involve in solving issues which become hurdles in scaling 35) what is incident management? Incident = Issue. 32) What is meant by Federation 33) What are the different types of console roles available and explain about each role? 34) what is your goal and role in was? Goal a. Downtime. So we should configure this jar files with database.Type4 JDBC drivers connect directly to the database server. After using the connection he can send back that connection to the connection pool. involve in solving infrastructure issues d. involve in solving application environment issues e. 36) Do you know how to configure ticketing tool with WAS? This is a meaningless question.JAR. involve in implementing architectures c.JAR.JAR. It is necessary to communicate with the database. 29) What is the full form of JAR and what a jar file contains? An EJB module which contains enterprise java beans class files and EJB deployment descriptors are packed as JAR files with . 31) What is a connection pool? Connection pooling is a place where a set of connections are kept and are used by the different programmers with out creating connections to the database(it means there is a ready made connection available for the programmers where he can use). involve in solving issues which become hurdles in providing high availability f. i. DB2JCC_LICENCE_CIS42.jar file is nothing but a collection of .jar extension.
an application server process is not responding. sit on the issue. read the message what the problem is about. try again. jvm could not complete a specific thread. talk to firewall team. . or its difficult to answer. How do you trouble shoot this scenario? You don’t trouble shoot. Open the ticket. blablabla. propagate first hand info to stakeholders. it’s a blind question.On any server. login to targeted server(s). Server y. or process failing to release a resource. perl scripting. How do you trouble shoot this issue. tcl. can server y reach server x [simple ping or telnet on ldap port] C) If yes . 37) when you configure LDAP with application server. a.U have LDAP. Feb 7 (2 days ago) 41) when you are on call support when you got a severity 1 ticket.Ticketing System . verfiy the disk space. if the users are unable to connect to WAS. G) U have to login to admin console and verify the authentication. Even when you are unable to kill the process.htm 39) In Windows 2003 box. e. running on Server x. u need to dig like this A) Ldap up or not B) If yes. jython. jacl. Explain in detail. check logs. depending on error. verify error log and out log. if a problem occurs.is it part of IBM? Does it fall in Web Sphere Umbrella? Is it an application running on WAS? Is it a Web based app? or Java Client? Unless you know these. Blabla 40) how many types of scripting you have done or you know? such questions cannot be asked in a forum. any droppage of packets? E. ask them to enable trace between server y and x. fix it.log. ant. kill -3. if everything is clean. check the processor utilization thru task manager c.about. how do you take action. php. Feb 7 (2 days ago) Raju 38) What is the difference between Signed Certificate and Self-signed certificate? Which one you prefer? http://webdesign.Ur infrastructure is clear D) Any firewall between server y and server x. you *troubleshoot* The issue is . *trouble shoot* . app server freeze .com/od/ssl/a/signed_v_selfsi. shell. do u have enuf rights to kill the process? b. if not responding.may because of resource crunch. python. enable trace on that specific group who are getting auth errors. find out what exactly the error message you get. blabla. close it. i wud say. F) Look into systemout. if i were you. again and again d. u can *test* ldap auth from console. WAS bind to server x. talk to ldap admin.
refresh pack is a mile stone for a release. click Servers > Core groups > Core groups settings . To decrease the CPU time spent in discovery: In the administrative console.If we said to analyze thread dumps can you do? Ya!! Why not 44) How comfortable with scripting? 100% pakka comfortable . Feb 7 (2 days ago) Raju 43) when you find in a particular server 'cpu starvation' error message what you will do? whenever there is not enough physical memory available to allow the high availability manager threads to have consistent runtimes. Transient high availability heartbeat failures und 11. it becomes 6. When the CPU is spending the majority of its time trying to load swapped-out processes while processing incoming work. if you apply rp2.1 is a release. a refresh pack takes you to a release. it is recommended that you allocate at least 512 MB of RAM for each Java process running on a single machine.0.2. Click OK and then Save to apply these changes to the master configuration. it becomes a release 6. If global security is enabled.35. and then select the -> DefaultCoreGroup. search for starvation.42) What is a fix pack. click Custom properties > New. High CPU usage in a large cell configuration when security is enabled With certain configurations and states. the DCS connections are secured. Click OK.2. If a large the number of processes are defined within a core group.0. the amount of time spent in discovery becomes substantial. Then click New again and enter IBM_CS_SS_SECURE_TOKEN in the Name field andfalse in the Value field. Enter IBM_CS_UNICAST_DISCOVERY_INTERVAL_SECS in the Name field and 120 in the Value field. If a large number of inactive processes are defined within a core group. refresh pack and when you will go for fix pack installation and when you will go for refresh pack installation? fix pack fixes certain issues.0. a proportionally large number of connections must be established to support these processes. thread starvation might occur. if you apply fp35. Goto InfoCenter. Under Additional Properties.0. and the impact of opening a connection greatly increases . which is not a release. say 6. a proportionally large number of connections are attempted during each discovery interval. Restart the server for these changes to take effect. To achieve good performance and avoid receiving these error messages.
what is a document server? in general a document server is a repository of documents in an enterprise. 46) When you found hung thread error messages what you will do? Will you kill the process. Add the following properties: Name: com.threshold Value: The number of times (T) that false alarms can occur before automatically increasing the threshold. If yes. what is the best place to put it? on ur desk top? or attach to mail? or dump it in a shared location. this is the funniest question one can ask. some infrastructure team can access it. .websphere.ibm..threshold Value: The length of time (in seconds). 48) What is a document server and what is the use of it. servers.threadmonitor.websphere. above that. Name: com. Why wud I use two scripting styles? At a given point of time. another team who wants to read that document can access that.html Configuring the hang detection policy The hang detection option for WebSphere Application Server is turned on by default.false.threadmonitor. above that datacom people can access it and so on.websphere. Is it not easy to perform a simple search on InfoCenter like this *hung thread*? http://publib.com/infocenter/wasinfo/v6r0/index.doc/info/ae/ae/ttrb_confighangdet. Feb 7 (2 days ago) Raju 47) Explain about your enivronment. providing earlier detection of failing servers. u have prepared a document on ur environment. in which case you have to kill the process? Lucky you and lucky me. Name: com. ex.boulder.ibm. webservers. scripting interface accepts only one language. above that. what is the use of it? its the central repository and depending access polices agency wide authorized and authenticated *users* can access documents.ibm.ibm. u need a place to put that document so that ur team can access it.alarm. we have IBM's InfoCenter. When a hung thread is detected. Default: The default value is 600 seconds (ten minutes).websphere. etc.45) Did you worked with JACL or Jython scripts? I prefer one scripting style. Think about ur company and thier business. Cook a story.threadmonitor.ibm. You can configure a hang detection policy to accommodate your applications and environment so that potential hangs can be reported.nd. salt and pepper. WebSphere Application Server notifies you so that you can troubleshoot the problem.interval Value: The frequency (in seconds) Default: 180 seconds (three minutes)..jsp? topic=/com. ur manager can access it. Serve it on the table with some masala.multiplatform.
6. 51. 4.LOG? Its very simple in systemout. 55) Difference between Websphere 5.Secure Proxy.0 Profiles WebSphere 5.WHEN THE SERVER HUNG HOW WILL IDENTIFY IN SYSOUT.WHAT IS THE DIFF B/W COREDUMP & THREAD DUMP? there is not much difference between these two.if its a shared location.1:Cell Profile. what that could be? will you dump it in a zunkyard shared location or in a proper shared location? first | < previous | next > | last report spam reply 49) TYPES OF SEVERIATIES? Severities will be of different types like Severity 1. The thread name will be WSVR**** 53. hang threads also 52. Note:Under Management there are three types of profiles available :Administrative agent Deployment Manager . 5. 50) WHAT TYPE OF ISSUE'S CONTAIN SEVERIATY1 TICKET'S? Severity 1 tickets are the most rare tickets which will get and which we have to get in our administration.0 Cell(DeploymentManager and managed node). application server is not responding or entire environment falls then we will get severity 1 ticket. Websphere 6. 2. In thread dump we can find.Custom Profile Websphere 7.Deployment Manager profile. Where as core dump contains information about dead locks. what are the active threads that are there at that particular time.Network Deployment and Enterprise.1 and 7. 54.log we will find a particular thread is hung from this many milli seconds will be found.1.Base .Custom profile. HOW TO TAKE BACKUP THE APPLICATION? Taking backup of the application can be done by using export option in the admin console or directly from the directory location. 3. WHAT'S THE RELATION B/W WIILY INTROSCOPE & WAS(LIKE AGENT/AGENTLESS)? Wily introscope is a third party tool which is used to monitor the server environments. Depending upon the type of issue it will be classified.1:No Concepts of profile .there are 4 types of Installation -Express. that means your application not responding.Management. If our process is not running smooth.Application Server.Application Server profile. not only WAS anything.
1 :Websphere multiple installation instance can be created using wsinstance script WebSphere 6.configurator WAS 6.1 there is a Change log detail levels which will enable the Message level and trace level of the JVM WAS 7.Standalone Custom registry WAS 6.Microsoft IIS.Domino Server.Sun Java System Web Server.configurator.1 Apart from the logs available in 5.1:Apache HttpServer.configurator.0:HTTPServer for Z/Os and all web servers supported in 6.IHS.1:Administrator.Sun Java System Web Server WAS 7.1Diagnostic trace JVM logs Process logs IBM Service logs WAS 6.1:Local Operating System.Profile Management Tool(GUI) 2.Auditor WebServers supported WAS 5.IHS.1:Federated repositories.Manage profiles(Command interface for managing profiles ) WebSphere 7.Job Manager Note:The Main use of Job Manager is to queue jobs to application server in a flexible management environment Managing Profiles WebSphere 5.ISC Admin WAS 7.HTTP Server for iseries WAS 6.Microsoft IIS.ISC Admin.1 User Registries/Repositries WAS 5.operator.Admin Security Manager.0:Administrator.Standalone LDAP registry.1 Managing WebServers .Deployer.Deployer.operator.0:Same as 6.0: same as 6.0Same as V 6.Standalone Custom registry or file based registry WAS 7.Local Operating System.Standalone LDAP registry.1:Apache HttpServer.Domino Server.1 lOGGING AND TRACING WAS 5.1 Security Roles WAS 5.Admin Security Manager.1:There are two ways of managing a profile 1.operator.1:Administrator.
1N/A WAS 7.0same as V 6.1:JMS Fail over support and scalability is available.1 Intelligent Run Time provisioning WAS 5. 2008 create Heapdump using wsadmin //Refrence of JVM . Generation and propagation of Plug-in can be done).1:JACL will be deprecated from 6.1 Monitoring WAS 5.1SIP(Session Initiation Protocol) extends the application server to allow to run SIP applications written to JSR 116 Specification The Portlet applications can deployed which is compliant with JSR 168 WAS 7. Web Servers can be created in Managed node or in Unmanaged node WAS 7. September 25.1 JMS WAS 5.1 Posted by TechnoTips at 4:18 AM 0 comments Reactions: Thursday.WAS 5.0 At run time the server uses the activation plan to start only those components that are required inside the application server Components like Web Container .0Intelligent run time provisioning is a new concept introduced in V7.1 and Jython scripting will be used.1:JACL is the scripting language which is used WAS 6.0 same AS V 6.1N/A WAS 6.1:N/A WAS 6.0same as V 6.1:N/A WAS 6.1:JMS Fail Over Support and scalability is not available WAS 6. Web Service and SIP Container are dynamically activated SIP and Portlet Container WAS 5. EJB Container .1:WebServers can be Administered using the Websphere Admin Console (Stopping. WAS 7. Starting.1:Web Servers cannot be managed through Websphere Admin Console WAS 6.SIB(Service Integration Bus Concept is being introduced) WAS 7.0:Same as V 6.0:Same as V 6.1 wsadmin scripts WAS 5.1:TPF(Tivoli Performance Viewer) is embedded in the Websphere Admin Console for monitoring WebSphere Objects WAS 7.
JDBC Backend Tier.process=WebSphere_Portal.xml file for the requested url and It will redirect the request to the avaliability of the servers in the cluster.J2EEServer=WebSphere_Portal.Browser. The plug-in mainly perform the work load management. It will handled over to the plug-in.BL (Business) 3.queryNames('type=JVM.invoke(objectName.version=6. 3. 2.typ e=JVM.cell=wpcell //genrate heapdump wsadmin>AdminControl.mbeanIdentifier=JVM. "generateHeapDump") Posted by TechnoTips at 4:24 AM 0 comments Reactions: 1)What is 5 Tier Architecture? in J2E we can write 5 tier archi like 1. 5. Client Applications Presentation Tier. JSP Business Tier. 4.conf .conf? /opt/IBM HTTPSERVER/conf/httpd.process=WebSphere_Portal. 3)what are the main point while installing an IHS? The main use of installing any external web server is to proces the dynamic content request 4)what the file path of httpd.0.j2eeType=JVM.Databases.node=a hdp2csmwas78.objectName=AdminControl. JMS 2)we know that 3 tier have 1.Servlets. Applet.platform=dynamicproxy.DL (Database) 2)Tell me about the Architecture of Web Application (how it will happen Workload Management & clustering) when there request coming from the browser the webserver will handled that request .2.UI(User interface) or (presentation) logic 2.If any server is processing any request then the plug-in will route the request to the avaliability of the servers based on their weight and based on the algorithams.*') wsadmin>print objectName WebSphere:name=JVM.21. then the plug-in will looks in to the plugin cfg. Client Tier.EJB or Some Business Objects Integration Tier.
ENB.and it provide the all the host computer connectivity in the network.yes it is required to stop the servers.HIbernate 6)What is Object pool? How to take back up ? while taking back is it necessary to stop the server? execute backupConfig. MKS etc.sh command to take the backup . by default when you execute this command it will stop all the servers on the node so yhe partially synchronized information will not be saved .jsp.conf 5)What are Java Programming languages? Servlets.. Basic difference between thin and thick client Oracle has a thin client driver which mean you can connect to a oracle database without the Oracle client installed on your machine. ODBC binary code and in many cases database client code must be loaded on each client machine that uses such a driver. Thick client would need the Oracle Client database drivers etc.Cruise Control.AdminConsole 4. Thin drivers: This style of driver converts JDBC calls into the network protocol used directly by DBMSs allowing a direct call from the client machine to the DBMS server and providing a practical solution for intranet access.wsadmin 3.Hot fix 2.it provides JDBC access via ODBC drivers..type 1 and type 2 JDBC drivers are called thick drivers.so its r most important driver which we use in the java. thick driver .the main advantage is this driver is we connect the databse to java without create DSN. hence their conenction to DB is more direct and without any intermediate stage making them thin drivers.why it is cal. Drivers include JDBCODBC bridge drivers JDBC drivers depending on tns resolution.window c:\programfiles\IBM HTTP SERVER\conf\httpd. what are the Deployment ways ? steps ? 1. The reason for it is .JSF. type 4 driver. and as the program is connected to database by an extra layer in the clint hence thay are called thick drivers.Struts.Using third party tolls like .Teamsite . Dominic thin driver is 4 type driver in java which r provide the connectivity between oracle and java. 2)What is Connection Pooling . 1)what is thin driver and thick driver..
some binary code may be required on the client machine. D) ODBC binary code must be installed on each client machine that uses this driver. After using the connection he can send back that connection to the connection pool." C) As with the Type 1 driver. B) This driver is referred to as a "native-API.war) are packaged as JAR file with . partly Java driver.ear ( enterprise archive) extension and deployed into Application Server.JSP FIles. GIF and HTML files are packaged as JAR file with . 1)How many JDBC drivers are there ? A) 2 B) 4 C) 3 D) 1 2)Which of the following is false for the Type 1 JDBC bridge driver? A) A Type 1 driver is a JDBC-ODBC bridge driver B) This type of driver enables a client to connect to an ODBC database via Java calls and JDBC C) Both the database and middle tier need to be Java compliant. 5)Full form of java jar file? In: JAVA Programming [Edit categories] JAR = Java ARchive 6)Re: URL of Oracle thin driver. Explanation: Neither the database nor the middle tier needs to be java compliant. Topic: JDBC Luigi Viggiano PREMIUM.supporting files. 3)Which of the following statement is true for the Type 2 JDBC driver? A) A Type 2 driver converts JDBC calls into calls for a specific database.war( web achive) extension EAR All above files(. D) All of the above 4)What is the difference between EAR. Number of connections in connection pool may vary.jar extenstion WAR Web modules which contains Servlet class files.jar and .Connection pooling is a place where a set of connections are kept and are used by the different programers with out creating conncections to the database(it means there is a ready made connection available for the programmers where he can use). JAR and WAR based on their functionality JAR: EJB modules which contains enterprise java beans class files and EJB deployment descriptor are packed as JAR files with . which means this type of driver is not suitable for downloading over a network to a client. 2001 [replies:1] briefly: jdbc:oracle:thin:@hostname:port:oracle-sid . Jun 4. JAR and WAR file Answered by Jey on 2005-05-08 11:23:41: In J2EE application modules are packaged as EAR.
in green the Oracle sub-protocol (can be oracle:oci7:@.1. oracle:oci8:@. or its ip address. in red the network machine name. etc. Web sphere is known for its turn key operation in e business applications. This can be used to perform business with consumers. 1) Explain about web sphere? The word web sphere popularly refers to IBM middleware technology products. to locate the server where oracle is running. 3. WAS refers to web sphere application server. 3) Detail about the architecture of web sphere? Web Sphere is built on three main components they are • Database • J2EE application server • A web server The databases which it supports are • DB2 • Oracle • Cloudscape Application server is IBMWAS and the supported web servers are • IBM server • Microsoft IIS • Sun web server 4) State some of the features present in web sphere? Some of the features which are present in web sphere are: • Order management .) is related on the driver you are unsign and the protocol to communicate with server. business and indirectly through channel partners.. in magenta the sid. in blue the port (it is complementary to the address to select the specific oracle service) 4. 1) Find Java Archive files using an Eclipse plug-in jmalasko writes " Discover JAR Class Finder. 2.. It can be very productive if you are planning to do business with consumers. 2) Explain about web sphere commerce? IBM web sphere commerce has a single platform which offers complete ecommerce solutions to developers. This plug-in finds JAR files containing a given class for the Java build path and helps fix NoClassDefFound exceptions. racle:thin:@. select on wich database you want to connect. It has run time components and tools which can help in creating applications which run on WAS. a plug-in utility with improved compatibility for Rational Application Developer. and Eclipse. WebSphere Integration Developer. business and channel partners altogether.
Content requested by the user is cached by edge before sending or adhering to the query. User authentication and authorization mechanisms are also provided in WAS. Page fragments arising from JSP or servlets are cached by Edge and the caching process is slow. Dynamic virtualization between servers is possible with the help of XD. Basically four components are present in the web sphere they are Network dispatcher. 9) Explain the various Administrator benefits using Web sphere? Web sphere almost reduces the work of server administrator as he can manage load on servers efficiently without any hassles.• • • • Web sphere commerce accelerator Analytical and business intelligence Open standards such as Java. 6) Explain about extended deployment? Web sphere application server extended deployment increases the functionality of the server in two main areas they are manageability and performance. Light weight third party authentication mechanism is the main security feature present in WAS. Work specific to a particular can be routed to that cluster. etc. restart options. Content distribution and application service at the edge. 10) Explain about caching proxy of IBM Web sphere Edge sphere? A caching proxy can be configured in forward direction or as a proxy. Email alerts. partitions can be declared during run time and are usually run on a single cluster at a time. 11) Explain about the network deployment feature present in WAS? Managing singletons will be a thing of the past and it also provides hot recovery of singletons which makes you forget about your GC collected singletons. A stand alone distributed cache was added to it under the performance header. It also depends upon the operating system. etc Web sphere commerce payments and customer care. Caching proxy. 8) Explain about asymmetric clustering? Asymmetric clustering applications are primarily used in electronic trading systems employed in banks. Some of the features are. it is known as Object Grid. He can also predict about the incoming load on servers. It can be used as forward or proxy server. 7) Explain about the security features present in WAS? Security model for web sphere is primarily based on JAVA EE security model. EJB. memory leak detection. Transaction logs can stored on a shared file system. For clustering run time operations . etc 5) Explain about IBM Web Sphere edge server? Web sphere edge server is used to improve the performance of web based systems. Performance and scalability of J2EE applications can be increased by edge. It also gives him flexibility to divide the load and applications among different server farms.
This server is generally used to communicate to the queue manager by the client. 13) Explain about compute Grid? Compute grid is also known as Web sphere batch. WID was built with RAD Eclipse based technology. point to point). the naming of connection factory is independent of the name specified by JMS client. This feature is important because it gives us the flexibility to change the administered object without changing the JMS client code. 12) Explain about IBM web sphere integration developer? Web sphere integration developer provides an IDE to build applications based on service oriented architecture. xJCL.deployment manager`s role was eliminated. Various features are provided which help a developer to create. Job scheduler. It isolates the application from object names. This supports high volume and high performance across different clients. J2EE failover support and cell configuration support is also present. manage and execute batch jobs. This is made possible by WAS (Web sphere application server) with its resource references. The default standard used by CHANNEL is SVRCONN which is the server connection channel. 15) Explain about Web sphere MQ JMS Provider? Web sphere MQ and Web Sphere Business integration manager Broker are very useful in providing Java messaging services to wide range of clients (publisher – subscribe. Tell me your self 1) Explain us in what way your education background will help you and the organization? . 14) Explain about web sphere MQ Real time transport? This feature is very useful in instant messaging across different clients through intranet and internet. It is very useful to have knowledge of Web sphere MQ for proper configuration. Generally this is Web Sphere MQ network abstraction. batch container and batch programming controller. It uses the concept of light weight transport which is again based on IP rather than the queue process. 17) Is the naming of connection factory independent of the name specified by JMS client? Yes. Java classes are chiefly responsible for translating the API calls to API`s defined by web sphere. Web sphere process server and web sphere ESB were built with WID. 16) Explain the attribute CHANNEL in web sphere MQ? CHANNEL specifies the name of the server connection channel. Web sphere extended deployment offers a Java batch processing system called as Compute Grid. This forms an additional feature to Web sphere network environment.
it would be an added advantage if you speak about the different projects you did.When answering this question explain to him about your education background and some extra courses you learnt during the process. 6) Explain us about your previous project and its benefits As the question states you need to explain to him about your project and its benefits. 7) What was the reason you left your previous job? While explaining this question you need to make sure that you don’t speak about the negative features of your previous job which made you to leave the company instead explain about those negative features in a convincing manner and you can state that those reasons are hindering your growth. This is very important as he will mention to the technical HR about your project. etc. projects. 3) Why did you choose this specific course or stream of study when there are these many options available to you? When answering this question explain to him about why you choose this course or stream of study. previous job. passion. Just brief him about all your interests and passion without going into detail. Have a goal which is reasonable and achievable because it gives you a feeling of accomplishment. Keep it small and simple explain to him about all your interests. 4) What will be the future of this industry? You need to explain the current trend of the industry and then explain to him about future developments. . soft skills. Also state or explain about your goal and higher education pursuits. etc which can fetch you the job. If you have interest in pursuing higher studies then do explain about that. 8) What is your goal and what do you like to achieve in the near future? Explain to him about the goal which you would like to pursue in the near future and how the company can help you achieve that goal. team members. 5) Explain specifically why we need to hire you? Explain to the interviewer about the necessary skills you have which were mentioned in the job requirement and also tell him about your team playing skills. if asked state him about it in detail. technical descriptions. This is very important because it shows you that you are going hand in hand on the developments of the industry. What made you to choose this course. It would be added advantage if you can explain to him about the necessary features of the job. etc. You need to correlate your education background with the job opening. 2) Tell us something about yourself (One of the most common question asked)? Make sure that you tell about yourself in detail. usage. Do remember a project is done by a team and it has features such as Environment. hobbies.
Therefore.9) What was your biggest job or project accomplishment? For this question you would be explaining to him about the most challenging project you undertook and the benefits you obtained by completing it within the deadline. 12) Did you miss deadlines or target? Be honest when answering this question because your previous employer will have everything on record and your current employer may request for it. Try to have as much information about the job position also. 10) Can you go to tours often? When answering this question have it in mind that your answer will be kept in the record. developers tend to define a large number of indexes on tables to guarantee that each and every query performs well. Many indexes mean. What is a JAR file? The JAR file format is based on the popular ZIP file format. and plug-ins. to achieve the best database performance. The answer which you give will be kept in the record. it is critical to be able to determine which indexes are necessary for query execution and which indexes you can safely drop without impacting query runtimes. 11) What do you know about this organization? Before answering this question make sure that you do enough research about the organization before applying to it. 1)How to identify unused indexes in DB2 for Linux. and DELETE (UID) operations. In addition. and is used for aggregating many files into one. and Windows® (DB2 LUW) database administrator (DBA) can use to identify unused and seldom used indexes. During database application development. and are consumed directly by tools such as compilers and . UNIX®. components. Unlike ZIP files. JAR files are used not only for archiving and distribution. Many indexes mean more work for the database system when executing UPDATE. If you cannot take tours due to various reasons state them in a pleasant tone. UNIX. INSERT. regular maintenance activities like RUNSTATS and REORG also run considerably longer in cases where many indexes are present. management skills and team play. Explain to him/her about the deadlines you have met during the process. After application development has been finished and a database has gone into production. and Windows database has gone into production. but also for deployment and encapsulation of libraries. Also make it a habit to take small tours or travelling because every job demands that. the existence of too many indexes turns out to be a cause for decreased database performance. This article explains several methods that a DB2® for Linux®. This will explain to the interviewer about your necessary skills. the existence of too many indexes turns out to be a cause for decreased database performance. Also do remember that the interviewer knows much more about this organization than you do.
Special files contained in the JAR. A JAR file can hold data about the files it contains. Compression. A JAR file might be used: For distributing and using class libraries As building blocks for applications and extensions As deployment units for components. (Java 3D and JavaMail are examples of extensions developed by Sun. the applet's class files and associated resources can be downloaded by a browser in a single HTTP transaction. The mechanism for handling JAR files is a standard part of the Java platform's core API. If an applet is bundled in a JAR file. applets.) Package sealing. Decreased download time. Packages stored in JAR files can be optionally sealed to enforce version consistency and security. The Java Extensions Framework provides a means by which you can add functionality to the Java core platform. Uncompressed JAR files can generally be loaded more quickly than compressed JAR files.JVMs. You can digitally sign the contents of a JAR file. because . Package versioning. such as vendor and version information. instead of opening a new connection for each file. These include: Security. and detect if the code has been tampered with. Compressed and uncompressed JARs The jar tool (see The jar tool for details) compresses files by default. Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have. Portability. such as manifests and deployment descriptors. instruct tools how a particular JAR is to be treated. which uses the JAR file for packaging of extensions. Sealing a package means that all classes defined in that package must be found in the same JAR file. or plug-ins For packaging auxiliary resources associated with components The JAR file format provides many benefits and features. Transparent platform extension. The JAR format allows you to compress your files for efficient storage. many of which are not provided with a traditional archive format such as ZIP or TAR.
you use the Java Archive Tool (jar tool) provided as part of the Java Development Kit. The following files or directories in the META-INF directory are recognized and interpreted by the Java 2 platform for configuring applications. extensions. Running an application packaged as an executable JAR file java -jar app... Table 1 shows some common applications: Table 1. Creating a JAR file from a directory jar cf jar-file dir-name Creating an uncompressed JAR file jar cf0 jar-file dir-name Updating a JAR file jar uf jar-file input-file..SF. This is the signature file for the JAR file.. such as security and versioning information.DSA. but download time over a network may be longer for uncompressed files.MF. The manifest file defines the extension.the need to decompress the files during loading is eliminated. It is part of the JarIndex implementation and used by class loaders to speed up the class loading process.and package-related data. Viewing the contents of a JAR file jar tf jar-file Extracting the contents of a JAR file jar xf jar-file Extracting specific files from a JAR file jar xf jar-file archived-file. and class loaders: MANIFEST.. which is used to store package and extension configuration data.jar -------------------------------------------------------------------------------what is a connection pool? .LIST. INDEX. The signature block file associated with the signature file stores the public signature used to sign the JAR file. xxx. Common usages of the jar tool Function Command Creating a JAR file from individual files jar cf jar-file input-file. The placeholder xxx identifies the signer. You invoke the jar tool with the jar command. The jar tool To perform basic tasks with JAR files. xxx. The META-INF directory Most JAR files contain a META-INF directory. This file is generated by the new -i option of the jar tool and contains location information for packages defined in an application or extension..
This driver need to load some binary code on client machine like JDBC-ODBC Bridge Driver. This article focuses on support for connection pooling of both database resources and non-database resources in a J2EE environment.and retrieve the data form the database and utilize the data in the java program.It uses JDBC-Bridge-ODBC means between JDBC and ODBC one bridge is work that establise the connection between application and DataBase. It is suitable for automatic installation and downloading java technology application is not important.Making a connection to a database 2. The JDBC Driver provides vendor-specific implementations of the abstract classes provided by the JDBC API. This driver is used to connect to the database. *Native API partly Java Driver:-Known as Type-2 Driver. He then looks at the upcoming J2EE Connector Architecture 1. Siva examines the JDBC 2. that is useful to write a java program to connect any database.02.In this connection some native code or native database client code must be loaded on each client machine due to this process it is slower than other drivers. *Jdbc net pure Java Driver:-Known as Type-4 Driver. JMS 1.Creating SQL or MySQL statements 3.2 Standard Extension APIs with regard to connection pooling and looks at some existing vendor implementations of those APIs.Executing that SQL or MySQL queries in the database 4.Connection pooling is a technique used for sharing server resources among requesting clients. 1. *Network Protocol Driver:-Known as Type-3 Driver..Viewing & Modifying the resulting records 3) How warnings are retrieved in JDBC? Answer while using jdbc. JNDI 1.0.It enables driver converts JDBC calls into calls on the client API for Oracle or any other databases.0 that would support a vendor-independent/pluggable approach to managing resource connections. 1) How many JDBC drivers ?name them? Answer There are 4 JDBC drivers are available: *JDBC-ODBC Bridge Driver:-Popular name is Type-1 Driver. warnings can occur at any time while getting connection .. there are: Type 1 : JDBC-ODBC Bridge Driver Type 2: Native API Partly Java Driver Type 3: Network protocol DriverType 4: JDBC Net pure Java Driver 2) what is JDBC? Answer JDBC(java Database Connectivity) is an API(Application program Interfaces).
->In 6.}Application Servers Web Sphere --} Tomcat -. ->We have different servers in market such as: JBOSS --} Web Logic -. ->Web Sphere relates to IBM Family.WAR (web Archieve)file. not application. we can get using getWarnings() method.Ejb's(enterprise java beans.Xml file is used to find out the port number. ->ServerIndex.e not pure Web Server &Not pure Application Server. -> Independantly a custom profile will have no use. 2) Deployment Profile.while creating statement while getting resultset.0 Version we have 3 types of packages. -> And we will make enterprise applications as . ->JBoss is a open source software ->The concepts of Web Logic & Web Sphere are same but only the terminology is different. There are 3 types: 1) Application Profile.EAR file. We have to get connected with dmgr. at each . 2)Silent Mode. no need to change here again. -> Whenever we change port number and restart the server it will be updated in portdef. .Distributed Environment -> In java we have 3 parts. 1)J2SE (core java) 2)J2EE (servlets. Profile: A profile is nothing but an environment where we can create Servers. Servers are listening to this port number. jsp's(web applications) . 3)J2ME -> We will make the web application as . 1) Express Package --} 2) Base Package --} Used for Stand alone Environment 3) Network Deployment -. -> The default profile is Application Server profile. -> The soap connecter port number of deployment manager is 8879. Silent Mode there is a file called Response File this is what we have to customize. -> The custom profile will give us an empty node.Partial Application Servers i. 3) Custom Profile. -> For installation we have 2 modes: 1)GUI.
If we start Node.registry We can create this files any where but we have to configure this absolute path to the application servers. It is not at all a server. Global Security: In 6. 1) Local os user registry. We can create number of servers under dmgr console using Add-node. . in both 6. It is just a stand alone profile. number of servers will be there under same environment. Federation: In Dmgr01 we should have an eligible node to create servers but Dmgr node is not eligible. Cell Profile: is the combination of deployment profile and application profile. at that time we can connect App-node which is eligibe to create servers from the appsrv01 Then we can create servers using App-Node in dmgr01. 3) LDAP (Light Weight Directory Access Protocol) user registry. In dmgr admin console.Dmgr is under running or not. if it is not enabled 389. ->In ND package we have 3 types of Templates: 1) Dmgr Template 2) Default Template 3) Managed Template. The complete administration will be under the cell profile only.-> Before federation we have to check whether. -> By default the dmgr profile won't give any servers. Whenever we create cell profile automatically there will be deployment profile & application profile and federation also will be done automatically.Dmgr is opening or not. 3)LDAP: It is a mechanism & not a server. . When ever we do federation a node agent will be created to communicate between Appserv & Dmgr. Node Agent: It will acts as a communication between which node we are federating.0 we have 3 ways to provide security for admin console. -> The AppServer gives server1 as default server.1 the cell is available in deployment manager. Node: is a collection of servers. it reduces administration burden.registry groups. if SSL is enabled the port number is 636.0 & 6. In application server we have no option to create server. 2) custom user registry: Here we have to create two files named: users. Here we are integrating seperate directory servers. used just to configure. if we stop all will be stopped. It is a single point of servers. In dmgr host we maintain dmgr just to monitoring and configuring the administration. -> In local os user registry we have to create user accounts and that user accounts have to configure to websphere application servers. Dmgr was introduced for single point of admin. . If we want to do federation we have to ping the Dmgr Server. 2) Custom user registry. n-number of servers will get started.
where as in the custom user registry specifying user names and passwords in a normal file and we are specifying the absolute path of that file into the websphere application server. All applications and application servers has to listen to this ports.JAR. In level 1 (Tier-1) we have HTTP server (or web server) In Tier-2 we have Application server In Tier-3 we have Data base. To communicate between http servers & app servers we have a concept called "PLUG-INS". which is taken care by the http server. . ->multiple domain names can access the same application.JAR. After following all the steps we have to restart the server.e DB2JCC.(it is a intermediatory component) By using round robin algorithm (default). how may cluster environments are there.e how many clusters are there. ->If we want to access an application under multiple domains. (simply multiple domains. The responsibility of http servers is to serve static content only. i. -> A schema is a collection of Tables.JAR. here we have a concept routing table. ->A database is a collection of data. ->Web Sphere application server is a middleware component. Virtual Host: Here we will have wc-default host port number also.jar file is nothing but a collection of . port number (default is 389).xml contains complete information about application server environment i. -> Plug-ins contain Plugin-cfg.jar (for 9i) and In DB2 we have 3 or more jar files. ->We can say HTTP Servers as web servers also. -> In 3-Tier Architecture we have 3 levels. It is necessary to communicate with the database. ->All the applications will go through the http server only at the time of trouble shooting we can by pass this http server for some purposes. Whenever we integrate database with application server every applications are able to communicate with the database. if SSL is enabled we have to specify port number as 636 and we have to specify Base distinguished name which indicates authentication for users and we have to specify Bind distinguished name and Bind password which specify authorization for user and we have to select "Advanced Light Weight Directory Access Protocol user registry settings" there we have to specify user filter classes and group filter classes (automatically it will be there) and finally we have to restart the server.JAR (for log) & Class12.class files. -> The .DB2JCC_LICENSE_C4.But data source provide communication for applications inside WAS with particular database inside the DB server. It will give quick response to static content than app servers. So we should configure this jar files with database. whenever we are going for LDAP user registry we have to specify user id & password & type of directory server. -> In oracle 10g & 9i We have only one jar file i. or by using multiple ports. We can create or change this ports by using Virtual hosts concepts. DB2JCC_LICENCE_CIS42. weight of cluster etc.e OJDBC14.multiple ports). JDBC: providers create connection between web application server & database server for communication.
jsp. Nor is it tied to any particular operating system or programming language so theoretically the clients and servers in these dialogues can be running on any platform and written in any language as long as they can formulate and understand SOAP messages.Hibernate How to take back up ? while taking back is it necessary to stop the server? execute backupConfig. As such it is an important building block for developing distributed applications that exploit functionality published as services over an intranet or the internet. This contract specifies a runtime environment for Web components that includes security. It is not tied to any particular transport protocol though HTTP is popular. MKS etc.Struts.Cruise Control. A Web container is provided by a Web or J2EE server What is the error HTTP 403 indicates and how to solve these issues? This is due to SSL certificate or some security settings in the server might have issues.by default when you execute this command it will stop all the servers on the node so yhe partially synchronized information will not be saved .conf What are Java Programming languages? Servlets.yes it is required to stop the servers. concurrency.AdminConsole 4. what is soap and soap port? SOAP is an XML-based messaging protocol.Teamsite .Hot fix 2. transaction.wsadmin 3. life-cycle management.conf window c:\programfiles\IBM HTTP SERVER\conf\httpd. what is a webcontainer? A container that implements the Web component contract of the J2EE architecture.sh command to take the backup . what are the Deployment ways ? steps ? 1.Using third party tolls like . deployment.conf? /opt/IBM HTTPSERVER/conf/httpd.ENB. .JSF. and other services. It defines a set of rules for structuring messages that can be used for simple one-way messaging but is particularly useful for performing RPC-style (Remote Procedure Call) request-response dialogues.what the file path of httpd. A Web container provides the same services as a JSP container as well as a federated view of the J2EE platform APIs.
For example try the following URL (then hit the 'Back' button in your browser to return to this page): This URL should fail with a 403 error saying "Forbidden: You don't have permission to access /accounts/grpb/B1394343/ on this server". your Web browser or our CheckUpDown robot) was correct. Fixing 403 errors . but access to the resource identified by the URL is forbidden for some reason. This is true for most Web sites on the Internet .with no further discussion allowed.their Web server has "Allow directory browsing" set OFF. So the 403 error is equivalent to a blanket 'NO' by your Web server . This data stream contains status codes whose values are determined by the HTTP protocol. Receive an HTTP data stream back from your Web server in response.g.Introduction Your Web server thinks that the HTTP data stream sent by the client (e. which may be difficult to resolve because the HTTP protocol allows the Web server to give this response without providing any reason at all. They do not often allow you to browse the file directory structure of the site. This indicates a fundamental access problem.you have to navigate from one specific Web page to another using the hyperlinks in those Web pages. This is because our CheckUpDown Web site deliberately does not want you to browse directories . Write an HTTP data stream through that socket. You can see this if the URL ends in a slash '/' rather than the name of a specific Web . This error occurs in the final step above when the client receives an HTTP status code that it recognises as '403'. Parse this data stream for status codes and other useful information. By far the most common reason for this error is that directory browsing is forbidden for the Web site. your Web browser or our CheckUpDown robot) goes through the following cycle: Obtain an IP address from the IP name of your site (your site URL without the leading 'http://'). This lookup (conversion of IP name to IP address) is provided by domain name servers (DNSs). Most Web sites want you to navigate using the URLs in the Web pages for that site.general You first need to confirm if you have encountered a "No directory browsing" problem.g. 403 errors in the HTTP cycle Any client (e. Open an IP socket connection to that IP address.
htm or . If your entire Web site is actually secured in some way (is not open at all to casual Internet users). Obviously this message should disappear in time . then you have no option but to access individual Web pages for that Web site directly.) that you have used previously. Web Site Password for your CheckUpDown . then it is possible that your Web server (or surrounding systems) have been configured to disallow certain patterns of HTTP traffic. Web Site User ID and 3. It is possible that there should be some content in the directory. but unlikely. but now no longer do so and can not or will not provide a redirection to a new URL. If this type of browser check indicates no authority problems. This is unusual. For example if your ISP offers a 'Home Page' then you need to provide some content . Some Web servers may also issue an 403 error if they at one time hosted your site. then they have missed a no-brainer step. In this case it is not unusual for the 403 error to be returned instead of a more helpful error. .g.as the Internet catches up with whatever change you have made. HTTP communication from a well-known Web browser is allowed. Your ISP should do this as a matter of course . In other words. If you think that the Web URL *should* be accessible to all and sundry on the Internet and you have not recently changed anything fundamental in your Web site setup. If this is your problem.html). switched ISPs). The first thing you can do is check your URL via a Web browser. Ideally all this should be done over a completely different Internet connection to any you have used before (e. Fixing 403 errors .directly yourself or by providing it to your ISP.g. Until the content is there. anyone trying to access your Home Page could encounter a 403 error. it also needs to be authorised for public access via the Internet. but may indicate a very defensive security policy around your Web server. The solution is to upload the missing content . then you may need to provide two items 2. It is possible. If this is not the case. then an 401 . In short.Not authorized message could be expected.CheckUpDown The first question is whether the Web page for your URL is freely available to everyone on the Internet. and you should avoid authentication (passwords etc. a different ISP dial-up connection). that your Web server issues an 403 message instead. then an 403 message indicates a deeper problem.g. So if you have recently changed any aspect of your Web site setup (e. but there is none there yet. This browser should be running on a computer to which you have never previously identified yourself in any way. you are trying to get the same behaviour a total stranger would get if they surfed the Internet to your Web page URL.page (e.if they do not. but automated communication from other systems is rejected with an 403 error code.for the Home Page directory that your ISP assigns to you.usually HTML files . Once the content is in the directory. then a 403 message is a possibility.typically within a week or two .
Invoking the tool . as described in the application installation instructions. If however your Web page is open to all customers and there have been no fundamental changes recently to how your Web site is hosted and accessed. These discussions unfortunately may take some time. EARExpander can also collapse the expanded format back to a normal Ear (.account . You can assist by endorsing our service to your security personnel. normally we will use this to expand it in other than the default path. If the “page can’t display “error comes then what you will do in the production system? a) There must be some network issue or server not receiving the request. What is the difference between page not found and HTTP 404? How to solve these issues? a) The “Page not found” error is.. we can only resolve this by negotiation with the personnel responsible for security on and around your Web site. Once expanded we will update the same app binaries from WAS admin console to update WAS. but can often be amicably resolved. What is the error HTTP 404 indicates and how to solve these issues? The 404 or Not Found error message is an HTTP standard response code indicating that the client was able to communicate with the server but the server could not find what was requested.but only if your site uses HTTP Basic Authentication. the request is not reaching the server. so that we can agree the best way to resolve them. The Web Master or other IT support people at your site will know what security and authentication is used. The EARExpander expands Ear files into the format desired by the application server runtime. then an 403 message should only appear if your Web server objects to some aspect of the access we are trying to get to your Web site. Need to check the server availability. HTTP 404 errors is request is reaching to server but whatever it is expecting it’s not found at expected location What is meant by ear expander utility? EAR Expander utility is used to expand the application binaries into any path.zip) format.jar or . Please contact us (email preferred) if you see persistent 403 errors. Because it indicates a fundamental authority problem.
Version 1.02\bin>EARExpander. the Heap file contains the garbage collected from java process. open a command line and invoke the tool without arguments.websphere.0 Copyright IBM Corp. 1997-2001 Required Argument Missing:ear Usage: java com. Expanding files The following example command expands the file my.EARExpander -ear -expandDir -operation [expansionFlags] ExpansionFlags indicate whether you want every JAR file expanded. C:\seaa0122.install.bat To view syntax. The default is all. Here is a typical result.0 J2EE J2EE Application Expansion Tool.ibm.commands. What is meant by JAVA Script? Java script is a scripting tool to developed web applications. What are the available log file in the WAS 6. EARExpander -ear my. or just the contained WAR files within the EAR file. The line breaks have been changed for better formatting in this documentation. What is meant by Heap in Java process and what information will be available in heap file? a) Heap is used to collect the garbage for java applications.1 . Release 4.The tool is located in the following directory: product_installation_root/bin/EARExpander.ear -expandDir product_installation_root/bin/myEAR -operation expand Collapsing files Using the collapse -operation reverses the format to normal.ear -expandDir product_installation_root/bin/myEAR -operation collapse Type each of the above commands on a single line.ear into the product_installation_root/bin/myEAR directory: EARExpander -ear my.bat IBM WebSphere Application Server. despite their appearance in this documentation..
out log is used to monitor the health of the running application server.err streams of the JVM to independent log files. Changes on the Runtime panel will apply immediately.out and System. Process Logs View or modify settings for specifying the files to which standard out and standard error streams write. IBM Service Logs Configure the IBM service log.a) In was there are list of logs available to monitor and troubleshoot. Changes on the Runtime panel will apply immediately. These logs can also contain information relating to problems in native code or diagnostic information written by the JVM. Process logs are also created for the deployment manager and each node manager. Changes on the Configuration panel will apply when the server is restarted. JVM logs are also created for the deployment manager and each node manager.out stream and some special messages that contain extended service information that can be important when analyzing problems. The process logs are created by redirecting the standard out and standard error streams of a process to independent log files. There is one set of JVM logs for each application server and all of its applications. and their node agent (if present). The IBM service log contains both the WebSphere Application Server messages that are written to the System. Native code writes to the process logs. The System. Use the Log Analyzer or Showlog tool to view the IBM service log. or Groups to specify a log detail level for a predefined group of components.err logs for this managed process. They are Diagnostic Trace Service View and modify the properties of the diagnostic trace service. The JVM logs are created by redirecting the System. Click a component or . The IBM Service log is maintained in a binary format. also known as the activity log. Changes on the Configuration panel will apply when the server is restarted. Diagnostic trace provides detailed information about the execution of WebSphere Application Server components within this managed process. Click Components to specify a log detail level for individual components. Change Log Detail Levels Log levels allow you to control which events are processed by Java logging. There is one set of process logs for each application server and all of its applications. The System. Changes on the Runtime panel will apply immediately.out and System. Changes on the Configuration panel will apply when the server is restarted. including all application servers. There is one service log for all WebSphere Application Server Java virtual machines (JVMs) on a node. JVM Logs View and modify the settings for the Java Virtual Machine (JVM) System. A separate activity log is created for a deployment manager in its own logs directory.err log contains exception stack trace information that is useful when performing problem analysis.
This value should be increased. JVM Heap Size By default. please refer to the AIX documentation. the Java virtual machines for WebSphere Application Server and WebSphere Portal Server are assigned only 256 MB per process. To change this value. a level near the top of the list includes all levels below it. If a value greater than 1024 MByte is selected. set it to 1024 MByte. Class Garbage Collection To change this value. To change this value. Servlet Engine Thread Pool Size To change this value. open the WebSphere Admin Console and go to Servers -> Application Servers -> (all server names) -> Process Definition -> Java Virtual Machine and set both initial heap size and max heap size to an adequate value: on a machine with 4 GByte of real memory. Log detail levels are cumulative. For details. open the WebSphere Admin Console and go to Servers -> Application Servers -> (all server names) -> Process Definition -> Java Virtual Machine -> Generic JVM arguments and add the parameter -Xnoclassgc. If a developer requests to tune an application then what you will do? Performance Tuning All the steps for Performance Tuning would approximately take 45 minutes. Data Source Connection Pool Size To change this value. open the WebSphere Admin Console and go to Servers -> Application Servers -> (all server names) -> Web Container -> Thread Pool and add the parameters for Minimum size threads and Maximum size threads to 70. open the WebSphere Admin Console and go to Servers -> Application Servers -> (all server names) -> Web Container -> Session Management -> Session Timeout and set Timeout to 10 Minutes. it may be necessary to change the AIX parameter LDR_CONTRL.group name to select a log detail level. Session Timeout Reducing the session timeout can help reduce memory consumption requirements. open the WebSphere Admin Console and go to Resources -> JDBC Providers -> (all providers) -> Data Sources -> (all data sources) -> Connection Pools and set the parameters for Minumum connections and Maximum connections to 50. . on a 8 GByte machine to 2048 MByte.
The JDBC provider object supplies the specific JDBC driver implementation class for access to a specific vendor database. Together. the JDBC provider and the data source objects are functionally equivalent to the J2EE Connector Architecture (JCA) connection factory. To create a pool of connections to that database. you associate a data source with the JDBC provider.Statement Cache Size To change this value. . If the data source has no more connections. open the WebSphere Admin Console and go to Resources -> JDBC Providers -> (all providers) -> Data Sources -> (all data sources) And set the parameter for Statement Cache Size to 500. Tell about Resource analyser? a) Resource analyser is used to analyse the performance of the WAS resources. When the client has finished with the connection. It is a monitoring tool comes with WAS. which provides connectivity with a non-relational database. How to find a text in VI editor in UNIX? a) Escape / followed by text Tell about “nany process” in UNIX? a) Nanny process on Windows NT and Windows 2000 is the Windows service "IBM WS AdminServer". it may ask the database manager for more connections (as long as it has not exceeded the maximum number of connections). What is the basic command in UNIX to find network performance? a) Netstat Tell about data source? Installed applications use JDBC providers to interact with relational databases. it closes the connection. If you need to configure a process in UNIX what are the steps? a) No Idea about this question. The data source then returns the connection to the available pool. The data source then returns a connection to the client. Data sources allow you to manage a pool of connections to a database Data sources work as follows: When a client wants to use a connection. it looks up a data source by name from a JNDI server.
business logic is split into partitions. This profile gives you an application server that can run stand alone or un-managed. For WebSphere Application Server v5.11 test environments and servers you can configure data sources by using the Data Source page in the server editor. What is the programming model/Module? JAVA related wage to me. Cell Profile The application server is federated to the DMGR profile. resulting in high performance reading and writing without the need to maintain a distributed cache between cluster nodes. where each partition can be the sole accessor of a set of underlying data. What information contains by SERVER INDEX file ? . As a result.x by using the Deployment page in the application deployment descriptor editor or using the administrative console. some times using distributed caching products for performance increasing.x? And difference between them? In WAS 6. A cluster can contain nodes or individual application servers. Custom Profile A Custom profile is an empty Node intended for federation to a deployment manager. What is meant by Asymmetric Cluster and how it works? a) Clusters are groups of servers that are managed together and participate in workload management.1 we have 4 different types of profiles available. It is a combination of DMGR and Application server profiles.You can configure data sources for WebSphere® Application Server v6. Asymmetric clustering proposes an architecture that is almost opposite to the typical stateless server farm where the entire app is replicated across machines. What are the profiles available in WAS 6.. In an asymmetric cluster. each node in the cluster can implement it's own local cache (and be the sole accessor of that data). They are Deployment Manager Profile(DMGR): The deployment manager profile defines a deployment manager in a distributed server environment Application Server Profile: It is a single stand –alone application server.
Symmetric key encryption: Symmetric or secret key technology is a model in which two parties have a shared secret The same key is used for both encryption and decryption Note: The trouble with this approach is that at some point the secret needs to be shared. This is to secure the WebSphere environment. Asymmetric key encryption: Public key cryptography: -two keys that are cryptographically related -Public key (can be shared with every one) Private key ( Must never be shared. this would be rather difficult. the URL is compared to those managed by the plug-in. If a match is found.a) Server index will have SOAP/Boot strap and all ports and details What information contains by Plugin-cnf. What is meant by SSL and how does it works? a) SSL mean secured socket layer. SSL provides connection security through -Communication privacy –the data on the connection is encrypted -Communication integrity—the protocol includes a built-in integrity check -Authentication—the client knows who the server is -SSL creates a VPN.xml file ? a) Plug-in configuration file contains routing information for all applications mapped to the web server. Plugin-cnf. securing the data using a combination os symmetric and asymmetric encryption. the plug-in configuration file contains the information needed to forward that request to the web container using the web container inbound transport chain. In an e-business application. When a request reaches the web server. This file is read by binary plug-in module loaded in the web server. possession is proof) -Keys are asymmetric .xml file will have all the configuration setting to determine whether a request is for the webserver or the application server.
It can securely send that session key to the server using the server’s public key. Those client machines can then use that public key to encrypt messages designed for the server which then only the server can decrypt. including the server’s public key. Now nobody but client and server knew the session key. Unlike symmetric key encryption. nobody else knows it. The session key is then used as “shared secret” to switch to much more efficient symmetric key encryption. it can send out its public key( through a signing certificate – also known simply as a certificate ) to client machine. Since the client can validate the server’s certificate.If a server has public.symmetric encryption is fast but require a shared secret SSL Working Mechanisam: 1) Client request SSL connection 2) Server presents certificate 3) Client verifies server certificate 4) Client generate a session key. this process does not require the client and server to have a shared secret. Nor can the server send the client secured messages.private set. there is one way to authentication. -Asymmetric encryption is used to negotiate a session key (shared secret) --asymmetric encryption is slow but does not require a shared secret. and is digitally signed by the certificate authority. -Symmetric encryption os used to transfer data between the client and server -. Certificate (signing certificate) contains information about the server. encrypts it with the server’s public key 5) Using the session key. client and server swith to asymmetric key encryption 6) HTTPS communications Note : Because the client chooses its own session key. . But the server has no way (at this point) to authenticate the client. How does SSL works ? SSL uses a combination of asymmetric and symmetric encryption to create a session between the client and server.Given message is encrypted with one key and decrypted with the other Note : .
/WAS_INST_ROOT/bin/showlog PATH_TOACTIVITY_LOG/activity. just as a sample: ExtendedMessage: What are the different roles available in the WAS? a) In WAS we have the following roles . You ca use this script called.log file from the activity of the various WebSphere Application Server components.log This displays ur activity log something like this.list.export. showlog under appserver root. Ex. 2) Command line : By using “gsk7cmd” command we can achive the SSL configuration. What is the difference between round robin and random load balancing? a) Round robin load balance is nothing but symmetric clustering and random load balancing nothing but asymmetric clustering What is the activity log and what it is useful? The application server creates the activity./showlog . Gsk7cmd provides the otions like import .log like this websphe: /software/opt/IBM/WebSphere/AppServer/bin $ .Configuration of SSL in WebSphere : SSL configuration can be achived in three different ways 1) From Admin console: Once we get the certificate from CA (Certificate Authority) then we will import into trust store./profiles/AppSrv*/logs/activity.kdb –pw password –label ‘websphere pluginkey’ -dn 3) ikeyman: By using ikeyman we can open the KDB(key data base) and add the certificates to the key database.create options for certificates Gsk7cmd –cert –create –db plugin-key. To enable security between IHS and Application server we need to export defaut personal certificates of all nodes and import the same to the trust store of the IHS. you cannot read this log with a text reader.. ..
allows a user to view the WebSphere configuration and current application server state. How many levels we can enable the trace file? a) LEVEL = all | entryExit | debug | event If memory leakage is there in then where (in which file) we get this information? a) Memory leakage information can get in the process logs ( Native_stdout and Native_stderrer logs) How many ways we can federate the Node? . and iscadmins privileges. such as starting or stopping servers. such as Modifying the primary administrative users and passwords. Operator: Monitor privileges plus ability to change runtime state. Configuration. users can also manage authorisation groups. plus additional privileges granted solely to the administrator role. Deployer : Only available for wsadmin users(not for administration console) Allows a user to change configuration and runtime state on application using wsadmin Admin Security Manager: 1) Only available for wsadmin users 2) Allows a user to map users to administrative roles using wsadmin 3) When restricted access to resource authentication data is in effect.Monitor: Least privileged. Configuration: Monitor privileges plus the ability to change the WebSphere configuration. Mapping users and groups to the administrator role Enabling or disabling administrative and java 2 security Additional console security roles : Iscadmins (Integrated solutions console) : Only available for administration console users Allows a user to manage users and groups in the federated repository. Administrator: Operator.
If security is enabled provide user id and password and include application (if required). ii) Using the AddNode Command: To use AddNode command do the following 1) Open a command line window on the system that has the running stand – alone application server 2) Change the directory to <Profile_Home>/bin directory of the stand alone application server installation 3) Execute “AddNode” Command Syntax with Ex: <Profile_Home>/bin>AddNode <DMGR_HOST> <DMGR_SOAP_PORT> [Options] Options include like -conntype [SOAP/RMI] -includeapps (It includes installed application on the stand alone Node) Note: We can add Node from DMGR installed system as well.. in this option we need to give the Host name and port number of the stand alone application server’s credentials instead of DMGR’s. Then select the connector type (SOAP or RMI) and connector port... . How many ways we can synchronise a node? a) We can Sync Node in two ways 1) From Command prompt : stop the Node then issue the “SynNode” command in the command prompt.Ans Before federating any Node we must make sure Application server should be started on the Node to be added We need to find the SOAP connector for DMGR( we can find this in communication section in the detailed page for the application server(DMGR) default is 8879 ) From the Admin Console: Select System Administration --> Nodes --> AddNode Select Managed Node and click next then specify the HostName of the Node to be added to the cell..
<Node_Host>/bin> SyncNode <DMGR_HOST> <DMGR_PORT> [Options] -username -password -restart -conntype -quit -stopserver 2) From Admin Console: Select System Administration --> Nodes--> Synchronise (Select the Particular node to sync) How many user registries are available in the WAS 6. Default repository is a file based federated repository Can be file based.X? There are four user registries Local O/S LDAP Federated repository Custom Repository Tell about federated repository? Federated Repository is one of the existing users registry type. Federation capabilities are provided by the VMM(Virtual Member Manager) . In this method we can use multiple repositories with WebSphere application server. LDAP. Multiple LDAPs or subtree of an LDAP Defined and theoretically combined under a single realm All of the user repositories that are configured under federated repository functionality are invisible to WebSphere application server.
are reached.log * Incident Stream:<ServerName>_<threadid>_<timeStamp>_<SequenceNumber>. This will eliminate some overhead that occurs when the JVM needs to expand or contract the size of the JVM heap. There are two artifacts which are produced by FFDC.If we give heap size value same for both min and max then what are the advantages and what are the disadvantages? a) The Java heap parameters influence the behavior of garbage collection. you following information: When the thresholds up unused storage. Make sure the region is large enough to hold the specified JVM heap. the garbage collector gets invoked to free Therefore. of Java performance. a larger heap also takes longer to compact and causes garbage collection to take longer. The JVM has thresholds it uses to manage the JVM's storage. These files are deleted after a maximum number of days has passed . a large heap size ultimately affects response time when garbage collection eventually kicks in because the collection process takes more time. Increasing the heap size supports more object creation. the application runs longer before a garbage collection occurs. should consider the In the majority of cases you should set the maximum JVM heap size to value higher than the initial JVM heap size. steady state periods within the confines of the initial heap but also to operate effectively during periods of high transaction volume by expanding the heap up to the maximum JVM heap size. Because a large heap takes longer to fill. However. Beware of making the Initial Heap Size too large. While a large heap size initially improves performance by delaying garbage collection. This allows for the JVM to operate efficiently during normal. garbage collection can cause significant degradation Before changing the initial and maximum heap sizes. In some rare cases where absolute optimal performance is required you might want to specify the same value for both the initial and maximum heap size. the information can be located in the <Install Root>/logs/FFDC directory: * Exception Logs:<ServerName>_Exception.txt Exception Log . What is FFDC? a) The first failure data capture (FFDC) log file saves information that is generated from a processing failure.
Due to optimizations in the data collection. file content The make up of the file can be a little confusing when first viewed.. this indicates that the row has been added to the table since the last time the entire table was dunmped. ..04.row elements The exception logs contains all of the exception paths which have been encountered since the server has started. is a time stamp for the last occurence of the exeception. This is useful to see if there is an unusual number of exceptions which are occurring. This means that much of the informaion in the file is out of data. This information is useful to locate information in the incident steam about the specific failure. The third element in the row.11 13:12:33:711 CDT java. (Again due to performance concerns. The dump will be deliminated by '-------------------. The file is a accumulation of all of the dumps which have occurred over the life of the server.ws. A entry in the table look like this : Index Occur Time of last Occurence Exception SourceId ProbeId ences ----------------------------------------------------------------------1 1 02.http. Here is a screen image of the end of the Server1_Exception. the table is dump only periodically.IOException com. hopefully there are available on your system). this is simply used to determine the number of rows in the table.io.startTransport 103 The first element in the row is a simply index. (This is done by using mks commands. The second element is the number of occurences. and when the server is stopping). In some entries. This consists of the exception name.'. a source Id and the probe Id. A more viewable form of the file would be to actually sort the output based upon the time stamp. The last element in the row is a combination of values. a '+' may appear in the first column.ibm. This is useful in looking at exceptions which have occurred at about the same time. and does not apply to the current server.log The information in the above file is displayed in the unordered form as the hash table. the table was created to give an over view of the exceptions which have been encountered in the server. Entries which begin with a '+' appear outside the delimination of the table. The most relevent information is the last (tail) of the file. and indicate that they are additions to the table since the last time the table was dumped.webcontainer. It is quite easy to locate the last dump of the exception table.HttpTransport.
log | sort -k4n where n is the number exceptions in the exception table plus 1 (use the index value to determine this value). source Id and the probe Id) contained in the exception table (documented above).log. run and stop time have been included in the exception log. you can use a compound grep command.properties). In some instances. Each exception will contain information which corresponds to the information (exception name. Note: The sort key needs a little work for servers which have rolled the data. in most instances will have a corresponding entry in the incident stream. For demonstration purposes. the start. the incident stream will not contain exception information for exceptions which were encountered during the start of the server (due to the Level=1 in the ffdcStart. there may be an exception which was encountered while the server is running which will not produce a call stack. The default settings of the property files. Incident Stream The incident stream contains more details about exceptions which have been encountered during the running of the server. if you need to know the exact file containing the value. Depending on the configuration of the property files. the exception is considered to be a normal path exception. The simpliest way to look at this information is to use the grep command. if there is a diagnostic module which corresponds to the current execution. the content of the incident streams will vary. the DM will write the information about the state of the object to the incident stream. The information is not all contained on the same line. . The call stack will also be written to the incident stream. and new exeception which is encountered will be processed..Sorted output of only the last dump of the exception table for Server1_Exception. The relationship between the exception log and the incident stream is the hash code which is made up of the exception type. and the probe Id. <servername> is the name of the server. All of the exception can be seen by either looking at all of the runtime exceptions. The values which are contained in the exception log. This is because the exception was encountered during the start of the server. In some instances. If the catch of the exception is a non-static method. But where the server does to ready. the source Id. or looking at all of the exceptions. The incident stream files should be used in conjunction of the exception log. and since the server started. This is done by the following command : tail -n<n> <servername>_exception. the content of the this pointer. file content The file contains information on exception which have been encountered.
Network Deployment. IBM WebSphere MQ V7. Given the name of a class. Some of the SSL CAs are Etrust Verisign Geotrust RSA etc. IBM WebSphere Application Server. IBM WebSphere MQ V7. Solution Design Business Integration: Dynamic Business Process Management Test 372. I July 2009 I October 2009 992 995 I June 2009 I July 2009 289 994 I May 2009 253 I August 2009 996 .How many SSL Certificate authorities available in today’s market ? There might be many SSL CAs. System Administration Commerce: Web Commerce None in plan. V7.2.x Test 374.7. IBM WebSphere Process Server V6. There are three class loaders: Bootstrap class loader The Extensions class loader The application class loader Default class loader option is Parent first class loader.0. IBM WebSphere Business Modeler Advanced V6. IBM WebSphere DataPower SOA Appliances Firmware V3.0. System Administration Test 376.2.0. How many certifications are available in the WAS? a)Application Servers: Distributed Application and Web Servers Test 377. Each java class must be loaded by a class loader. Core Administration Business Integration: Application Integration and Connectivity Test 378. the class loader locates the definition of this class. Tell about class loader and where we use? a) Class loader enable the Java Virtual Machine( JVM) to load java classes. Business Analysis and Design Test 375.
Has some extra addons in the admin console navigation tree. V5x node can be on different platforms. Dmgr must be V6 level. Environment Variables etc. as it is already included. JAAS authentication aliases. Has default JMS providers Webservers can be managed from VD admin console and also can create generic servers. Rapid Deployment: I August 2009 807 . Are embed within the application resulting in an Enhanced EAR.0 * E = entry. Introduction of service integration Bus (SIB) for messanging.updates and starts the application one cluster member at a time.x ? WAS 6. Stops.x has all the features of WAS 5.x which are Multiple profiles creation with a single installation. Mixed version Node in cell: supports V5x and V6 nodes in a Cell. the system administrator no longer need to define this deployment information. Rollout Application update option: Automatic roll out of application update in a clustered environment Ensures no service interruption of the application. while the other cluster members continue to run the application Enhanced EAR file: Using the enhanced EAR editor from the Application Developer or application Server Toolkit.Software Development: Web Services Test 371. and then export that to be installed by your system administrator. A = advanced 36) What are the differences between 5. Web Services Development for IBM WebSphere Application Server V7.x along with some additional features included in the WAS 6. I = intermediate. you can define resources and properties for the application For example datasource.x and 6.
deployment automation. to use WD functionality. . Change trigger processing provided automatic monitoring of changes to the WRD user workspace. update or remove parts of the installed application and restart the changed part. set of user customizations include WebSphere configuration. It's capabilities include annotation-based programing.3 applications will continue to run on v6 WebSphere application server V6 files are divided into two categories: Product files: shared application binaries for WebSphere User files.Websphere rapid deployment(WRD) simplifies the development and deployment of application. transaction log files etc.2 and J2EE 1. Improved Administrative Console Appearance and functionality console views change based on the context version platporm installed capabilities Integrated Tivoli Performance viewer Integrated IBM HTTP server V6 management Fine Grinned Application update: Ability to add. J2EE 1.4 is the new level supported with V6 with exsting J2EE 1. J2EE support: WebSphere application server v6 supoorts three levels of the J2EE specification. properties. Changes trigger the automatc generation of code and deployment of the application to the application server. installed applications. no changes are required on the application server. resource adapters. It uses existing application server administration function to deploy and control applications. and change-triggered process. WRD uses the metadata to generate additional J2EE artifacts needed to run the application on the application srver environment. Annotation-based programming allows the developer to add metadata tags into application source code. log files.
1) Using Admin Console: In admin console Enterprise applications -.37) Why you prefer 6. with enabled class reloading ( Not recommended for Production) 3) Using Wsadmin command: .> Install Provide the required parameters like full path. etc. 2) Hot Deployment : “We could copy directly the JAR files to the deployedapps folder in the websphere “ we call this method as Hot Deployment Dropping JSP files. but 5X and above provide the following options. context root.x ? Absolutely WAS 6X because in 6x there are advanced features than earlier versions so we prefer 6X 38) a) What is the command to create profile ? Manageprofile create -ProfileName <profile_name> -Profilepath <Profile_path> -NodeName <Node_Name> -templatePath <Templete_path> -cellName <Cell_Name> -hostName <Host_Name> List Profile: Manageprofile –listprofiles Delete Profile: Manageprofile –delete –profilename <profile_name> 39) How many ways we can deploy the application ? and What is the command to deploy application ? a) It depends on the version of the WAS we are using.
4) Using Jacl or Jython Scripts: 5) Rapid Deployment (Feature available at 6x): a) WebSphere rapid deployment (WRD) simplifies the development and deployment of application.JSP FIles. Changes trigger the automatic generation of code and deployment of the application to the application server. Change trigger processing provided automatic monitoring of changes to the WRD user workspace. 41) How u will secure your administrative console. It's capabilities include annotation-based programing.war( web achive) extension EAR :All above files(. WRD uses the metadata to generate additional J2EE artifacts needed to run the application on the application srver environment. JAR and WAR based on their functionality JAR: EJB modules which contains enterprise java beans class files and EJB deployment descriptor are packed as JAR files with . 42) What is the difference between WAR.ear ( enterprise archive) extension and deployed into Application Server.jar extenstion WAR :Web modules which contains Servlet class files. deployment automation.war) are packaged as JAR file with . Annotation-based programming allows the developer to add metadata tags into application source code. GIF and HTML files are packaged as JAR file with . JAR and what is the difference between deployments of these? a) In J2EE application modules are packaged as EAR. EAR.supporting files. to use WD functionality. . This is the credentials to login into the Relational database. no changes are required on the application server. and changetriggered process. It uses existing application server administration function to deploy and control applications. So we need to give proper privileges to the user by logging in as System administrator. 40) What is authentication mechanism in JDBC driver? a) In JDBC driver configuration we can configure the authentication details in J2C authentication pan.jar and . We need to give context root for WAR and for others no need to give. There is no much difference in deploying these applications. if u r using local O/S users registry u r getting messages like not able to authenticate what u will do? What is the solution? a) There might be the privileges issue to the user in O/S level.
EAR deployment: If we have two or more modules then we can target individual modules to individual servers. 43) How you will solve if u get page can’t displayed?
a) It is a HTTP 404 error. If you get this error we need to check the logs for application server status. The page expecting by the request is not finding that means request is reaching the server but it is not available at expected location. 44) WAS architecture?
The WebSphere architecture contains Cell, DMGR, Node. Where Cell on top of the hierarchy. Within the cell Dmgr will be there where admin console is lying. For the Cell we can federate the Nodes and on the Nodes we can configure the application servers. If you want then I can explain the Web container and EJB container and Web server and JDBC etc.
Web container when we receive request from client browser so web container will act as interface between client request and Servlets and jsp in other words Servlets and jsp will reside under web container in order to server client request. hence we required web container in order to invoke Servlets or JSP (Java Server Pages) EJB Container: An Enterprise JavaBeans (EJB) container provides a run-time environment for enterprise beans within the application server. The container handles all aspects of an enterprise bean's operation within the application server and acts as an intermediary between the user-written business logic within the bean and the rest of the application server environment. One or more EJB modules, each containing one or more enterprise beans, can be installed in a single container. The EJB container provides many services to the enterprise bean, including the following: • Beginning, committing, and rolling back transactions as necessary. • Maintaining pools of enterprise bean instances ready for incoming requests and moving these instances between the inactive pools and an active state, ensuring that threading conditions within the bean are satisfied.
Most importantly, automatically synchronizing data in an entity bean's instance variables with corresponding data items stored in persistent storage. What is cluster, how request routes between cluster members?
a) The algorithm which we select for load balance will route the requests. There are two algorithms 1) Round robin 2) Random 46) Can you give me two major issues you faced and solved?
a) The application was having error with SSL , shows bad certificate on the application right cornor..So customer requested for root cause for GSK_ERROR_BAD_CERT .
I investigated...... like certificsate mismacth between Plugin and the WebSphere..
1. I found in the WAS console that, the default personal certs in the node level of WAS in not reflected in the web servers. Which was added in the DMGR? Steps i followed to resolve this are :
1. I noted down the personal certificates serial no from the nodes by navigating to Security --> SSL certificate and key management--> Manage endpoint security configurations -->Inbound--> expand cell-->Node--> Key stores and certificates -->NodeDefaultKeyStore-->Personal Certificates Noted down the serial number of the default certificate then --- >Extracted the certificate to Server temp path. Come to inbound/outbound---> expand cell-->node-->web server--> Key stores and certificates-->CMSkeystore -->signer certificates--> verify the serial no of the previous nodes certs.... I found one of the cert is not appear here in Web server.
i Added the same from here.. as i already enabled Dynamically update the runtime when changes occur" option.. it should update without restart... Then i came to Plugin-key.kdb to verify whether the added cert is updated in the KDB or not.. using ikeyman. Reference: http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21264477 http://www-01.ibm.com/support/docview.wss?uid=swg21198862
a copy of WebSphere Application Server V6.1 or V7.0 (or another related product) is present in the specified directory, even when the ODM VPD is clean.
While uninstalling the older version of WAS(5.x) to upgrade it to 6. we uninstalled and but it was not uninstalled clearly.... We tried to remove the registry with Smitty tool... after that also we are not able to install as it says the path contains the WAS already installed. So we contacted the WAS product support from IBM raised PMR.. where we got some resolutions to clear the ODM...... Then they suggested to try with manual_WebSphere_ODM_wipe.sh manual_IHS_ODM_wipe.sh
After that we followed the same with suggested steps and we succeeded finally we upgraded to 6x. It was one of challenging task in my career 47) What is the Ticketing process and escalation /approval process?
a) For all issues operations team gets alerts and they used to raise the tickets against the appropriate team through USD (unicentre service desk). Depending on the priority we used to allot the tickets. The priority was like (high priority P1, P2, and low priority P3, P4, P5). Low priority tickets were attending by offshore team and high priority were serving by onsite team. For high priority tickets we need to get approvals from the service delivery manager. Intern service delivery manager will take all approvals from the client side to deliver the solution. Once we get the approvals then service delivery manager will start a bridge call
whereas an application server serves business logic to application programs through any number of protocols 49) a) What is rollout update in was6.0 51) How to set plug-in logs ? In Administrative console Servers --> Webservers -->Webserver -->log files (configuration tab)( here we can change the path of the log files (access. a) . you can take heap dumps anytime you wish to see what is being held in memory. updates and starts the application one cluster member at a time. Depends on the OS.used for memory analysis Java cores .log) 52) What is the difference between heap dump and thread dump? a) Heap dumps anytime you wish to see what is being held in memory Out-of-memory errors Heap dumps .picture of in memory objects . The writing of the heap dump can be cpu and i/o intensive depending on the size of the configured heap.in most cases heap dumps should be created when an OOM is triggered.used to determine hangs. Out-of-memory errors or a good time to view heap dumps.also known as thread dumps or java dumps. There is a cost associated with producing heap dumps. Stops. Thread dump should also contain a lot of additional information besides just the threads and stacks used to determine hangs.log. Unless you're an administrator or root you'll need to own the process you want to kill in order for the command to work.1? Automatic roll out of application update in a clustered environment Ensures no service interruption of the application. Java cores also known as thread dumps or java dumps.48) What is the difference between web server and App Server? a) A Web server exclusively handles HTTP requests.5. IBM java cores should a lot of additional information besides just the threads and stacks -.1? a) J2RE 1. while the other cluster members continue to run the application 50) What is JDK version supporting in WAS 6. used for viewing the thread activity inside the JVM at a given time. used for viewing the thread activity inside the JVM at a given time. deadlocks.error. In fact. and reasons for performance degradation System cores Heap dumps are taken by issuing a "kill -3" against the JVM pid.
and reasons for performance degredation.don't try to read the text dump with vi or something…. If you didn't specify any environment entries then only a core dump is taken 53) How you will check the details of a process if you know only port number of that process? First we need to find the socketno of that port by using Netstat –Aan|grep <port_no> Then we need to find the sid by using the socketno Rmsock <socketno> protocol Ex: #netstat –Aan|grep 944 #f100020000fc4398 ……………you get some more information….…….There are options available to dump the heap in . #rmsock f100020000fc4398 tcpcb The socket oxfc4008 is being by process 626888 (Java) Ps –ef|grep 626888 You get the detailed information about the said process. Now. u can also go with jacl or jython scripts) IBM_HEAPDUMP TRUE IBM_HEAPDUMP_OUTOFMEMORY true(if a OOM occurs.txt format this files can be huge and unless you're a genius with lots of time on your hands .deadlocks. then a heap dump is taken in the specified directory and also a core dump will be taken. if you run kill -3 pid. Use MDD4J or HeapAnalyzer. 54) What are the regular issues you get in production support and how you resolve them? a) Usually faced are we get tickets from the operational team. a dump is saved to /tmp IBM_HEAPDUMPDIR appropriate directory. For taking heap dumps you need set these environment entries for that JVM using admin consle(this is one way of doing taking heap dumps.. Some of the call which we . The kill -3 command captures JVM signals and dumps the requested diagnostic material.
502 etc. .) HTTP 400 (Bad Request): This error comes with because of syntax errors in the URL which was typed by client.500.that means the provided credentials are not having the privileged access to the requested content or page. 5) 100% CPU utilisation: Check for the CPU utilisation bye using TOPAS command.401. We can get this statics from the Natice_stdout and Native_stderr files. HTP 401(UN authorised): This error comes after providing the credentials . 4) Thread Dump: Create the thread dump by issuing kill-3 command and forward to the application team for analysis.403. After analysing the logs and situation if required then recycle the application server to resolve the issue.1) Out of Memory: If we get this error we need to check for the standards configured in the application server. Need to provide the correct (updated) URL to the users. Temporarily increase the connection pool size.404. Check the unused connections. 2) No of connections reached Check for the recommended connection pool size in the JDBC driver. I mean heap settings in the server and if not we need to resent according to the standards. If you are getting this error frequently then we need to ask application team to check for the memory leakage. If required then kill some of the non important process which are taking more cpu % 6) HTTP errors like (HTTP 400. 3) File System issue: Check the file system by using DU Forward to the System admin team and coordinate for the resolution.
. whereas in horizontal clustering cluster members will be there on different nodes. The database is used in the analysis of event and error messages that may occur in a log. And another disadvantage is each change to a session must be replicated to all application servers. string match patterns. HTTP 403 Forbidden: Edge component is not configured properly SSO configuration might be not configured yet. WCP (WebSphere Catching component) There was separate team for proxy configuration so no idea on this issue. Might be application server or web server or down. To resolve this issue we need to engage the Network team and coordinate for the solution. HTTP 404 (Page not found or file not found): Need to check the system out file for the logs and verify the ear file HTTP 500 internal errors: It is server-side error (Web server or application server). 56) Difference between horizontal clustering and vertical clustering? Ans) the main difference between horizontal cluster and vertical cluster are: 1) We can configure the cluster members on the same node in the vertical clustering. HTTP 502 Bad Gateways: This might be because of Network issue. associated solutions. because each server has a copy of all sessions.conf” file. What is meant by symptom data base? Ans) A symptom database is an XML file of symptoms. 55) What are the disadvantages of Memory to memory replication? Ans) it consumes large amount of memory in networks with many users. In other words A WebSphere cluster consists of having multiple application servers (cluster member or clones) across a machine (Vertical Cluster) or across several machines (Horizontal Cluster) 57) Ans) 58) Without admin console how to administrate the web server? Using the “httpd. Need to recycle by verifying the system out logs for analysis.We need to access for the requirement of the access to the credentials if require we need to add this user to the group to which the privileged access is there for the particular page or content. and directives.
Symptom databases can be imported from an external XML symptom database.1 release of the IBM WebSphere application server. see 'application server toolkit> detecting and analyzing runtime problems > log and trace analyzer' in the information center. use IBM log and trace analyser for Eclipse in the application server toolkit. and to get detailed information on error resolution. Instead. is a separately downloaded feature of WebSphere 3. A solution is information about why an error or an event may have occurred and how to recover from it. For more information. It may have a solution associated with it in the symptom database.0x. and exported into an external file in XML format. 4. You can either import symptom databases from a local or a remote host. the result is JAR file that contains a lot of information needed by IBM support to diagnose the problem a) b) 60) JAR file is to IBM support Only need to be run upon IBM support’s request.2 and later (it is now bundled with WebSphere 4. saved. installable from the launchpad console. 2) This is available in two versions a) Default standalone collector( implemented as a shell script in profle root) collects almost all the logs and configuration files found on the system.0+ and 5. the tool that was previously provided for viewing and analyzing the activity or service log file. Starting the Log Analyzer in Windows Windows users may launch it manually with the command <WebSphere Root>\bin\waslogbr . It is designed to assist customers in diagnosing and resolving common runtime problems. is removed from 6. without distinction b) A new flexible collector tool is integrated into ISA 3) In either case.A symptom is an error or event message.0 users do not need to download the the tool). 59) What is collector tool? Ans) 1) Collector tool is the tool which collects the information about the websphere application server installation and configuration. Overview The Log Analyzer. Log records can be analyzed using a symptom database to interpret known events and error conditions.5. What is loganalizer & how to use? Ans) Log Analyzer provides interactive interface to WebSphere activity log and contains on-line diagnoses and resolutions to known problems Log analyser.
Now any records with a green check mark next to them match a record in the symptom database. Updating the symptom database The database of known problems and resolutions -. Change directory to <serverRoot>/bin. If you select a record. you'll see its contents. including the basic error or warning message. A good rule of thumb would be to do this at least once a month. each of which can have different function and operations available.log or tracefile.used by WebSphere when you click the "analyze" menu item -. time.. and 2. and which process (i. Invoke shell script waslogbr . 61) What is MBeans? Ans) MBeans are managed beans. in the upper-right hand pane. right click on a record in the tree on the left (click on the "UnitOfWorkView" at the top to get 'em all). . admin server or an app server) it came from. and select "analyze". yellow are warnings.Starting the Log Analyzer in Unix 1. For ex a) b) An application server MBean migh expose operations such as start and stop An application MBean might expose operations such as install and uninstall. To analyze the records.e. use the File->open menu item.is periodically enhanced as new problems come to light and new versions of WebSphere are introduced./waslogbr The Log Analyzer is a GUI application. The Log Analyzer does not analyze any other log files.) Expand the tree of WebSphere admin and app server logging sessions. you'll see and explanation of the problem in the lower-right-hand pane. since extensive updates have been made since the tool was released. Java objects that represent resources to be managed. When you select a check-marked record. so Unix users will need to launch it from a machine with a CDE-type environment. such as default_stderr. An MBean has a management interface consisting of: • • • Named and typed attributes that can be read and written Named and typed operations that can be invoked Typed notifications that can be emitted by the MBean Websphere application server provides a number of MBeans. use the "file -> update database -> advanced symptom database" menu item from within the log analyzer tool. and pink are errors. (You can also browse to activity. and select the file <websphere install root>/logs/activity. Users who have just installed the product and have never run the update should do so immediately. Uncolored records are "normal". To ensure that you have the latest version of the database. which WebSphere component logged the record.log. date.logs which customers have sent you. or export the display to a GUI client platform. Using the Log Analyzer Once the tool has opened.
Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems. Writing CacheSize would update the size of the cache. Dynamic MBeans define their management interface at runtime.. Standard MBeans are Java objects that conform to design patterns derived from the JavaBeans component model. Reading the CacheSize attribute would return the current size of the cache. an MBean representing an application's configuration could have attributes representing the different configuration parameters. All these methods are defined statically in the MBean interface and are visible to a JMX agent through introspection. Attributes are exposed through "getter" and "setter" methods. For example. MBeans can be standard or dynamic.For example.HP AIX. such as a cache size. 63) Difference between cell and nodegroup? Ans) the node group can exist in the cell The main difference between node group and cell is cell can have nodes which are there in different platforms but nodegroup will have all the nodes which exist on same type of platform Ex: in cell you can have nodes which are there in IBM AIX. A standard MBean exposes the resource to be managed directly through its attributes and operations. potentially changing the behavior of the running application. As different applications and resources support different authentication mechanisms. 62) What is SSO ? Ans) Single sign-on (SSO) is a property of access control of multiple. This is the most straightforward way of making a new resource manageable. An operation such as save could store the current configuration persistently. Sun Solaris. related. The MBean could send a notification such as ConfigurationChangedNotification when the configuration changes. A dynamic MBean is an MBean that defines its management interface at runtime. but independent software systems. But we will group all windows platform based nodes into one group. a configuration MBean could determine the names and types of the attributes it exposes by parsing an XML file. and all IBM AIX nodes into one group etc. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Operations are the other methods of the class that are available to managers. single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication. 64) Shall we have different nodes in different platforms with in a node group? . Windows.
65) What is TPV? Ans) Tivoli Performance Viewer.Ans) No. Trace file only contains more details than the logfile 68) What is virtual host and give two different virtual hosts? Ans) The term Virtual Host refers to the practice of maintaining more than one server on one machine. because node group is nothing but group of nodes which are there on same platforms. From TPV. The Tivoli Performance Viewer (TPV) enables administrators and programmers to monitor the overall health of WebSphere Application Server without leaving the administrative console. 69) What are difference scripting options in wasadmin engine? Ans) a) b) c) d) 70) There are four types of scripting options Admincontrol Adminconfig AdminApp AdminTask What are the WAS resources? . TPV also allows you to view data for other products or customer applications that implement custom PMI 66) What is the purpose of JNDI? Ans) Sun’s JNDI API is a standard extension to the java platform and it allows the java application to access naming and directory services. LDAP. or objects in an application server. For example. With the help of JNDI java applications can seamlessly access the heterogeneous enterprise naming and directory services like DNS.company2. it is often desirable for companies sharing a web server to have their own domains. with web servers accessible as www. as differentiated by their apparent hostname.com and www.company1.com. and Local file system. you can view current activity or log Performance Monitoring Infrastructure (PMI) performance data for the following: • • • System resources such as CPU utilization WebSphere pools and queues such as a database connection pool Customer application data such as servlet response time In addition to providing a built in viewer for PMI. 67) What is trace file & where you get more details in trace or log files? Ans) Trace file contains the step by step activity details of the WAS process. without requiring the user to know any extra path information.
JMS. You copy an Extensible Markup Language (XML) configuration file.Ans) WAS resources are JDBC. you use a Web server plug-in that is included with the WebSphere Application Server packages for installation on a Web server. It is usefull for diagnosis purpose. This is generated at the first time failure of your system. It will be deleted after some time automatically. Resource Adpaters. because for this type of application. 71) What is the functionality of web server plug-in file? Ans) Web server plug-ins A Web server can serve requests that do not require any dynamic content (for example. Cache instances. the space that it occupies on the heap is normally used for the creation of new objects. if your application creates dynamically or uses reflection.Mail service. it forwards the request to the appropriate Web container in the application server.. What is FFDC? Where you will use? Ans) FFDC is nothing but first failure data capture. the use of this option can lead to native memory exhaustion. The plug-in uses the configuration file to determine whether a request should be handled by the Web server or an application server. and cause the JVM to throw an out of memory exception. configured on the WebSphere Application Server. only to have re-instantiate the class when the next request comes along. The plug-in can use HTTP or HTTPs to transmit the request. URL. Tuning off class garbage collection eliminates the overhead of loading and un-loading the same class multiple times. 74) How you get better performance by giving the –xnoclassgc in generic JVM arguments in the JVM ? Ans) By default the JVM unloads a class from memory when there are no live instances of that class left. However. . When WebSphere Application Server receives a request for an application server. when a request requires dynamic content. However if you have an application that handles requests by creating new instance of a class and if requests for that application come in at random times. When this option is used. it is possible that when previous requester is finished. the normal class garbage collection will clear up this class by freeing the heap space it occupied. If a class is no longer needed. To forward a request. such as JavaServer Pages (JSP™) or servlet processing.Etc. but this can degrade performance. to the Web server plug-in directory. HTML pages). 72) How to detect the hangs of JVMs? Ans) 73) If your logs are not rotating that means your JVM hanged. if have to redeploy an application you should always restart the application server to clear the classes and static data from the previous version the application. In this situation you might want to use this option to disable the garbage collection of classes Avoid Trouble: This option should be used with caution. it must be forwarded to WebSphere Application Server for handling.
Cache disk offload By default. through a servlet’s service() method or a command’s execute() method). and a WebSphere HTTP Server plug-in ESI Fragment Processor that is not z/OS. Because J2EE applications have high read-write ratios and can tolerate small degrees of latency in the currency of their data. The dynamic cache includes an alternative feature named disk offload. the dynamic cache matches external cache entries with those groups and pushes out cache entries and invalidations to those groups. which copies the evicted cache entries to disk for potential future access Edge Side Include caching The Web server plug-in contains a built-in Edge Side Include (ESI) processor. 76) Explain about dynamic cache in WAS ? Ans) Dynamic cache service The dynamic cache service improves performance by caching the output of servlets. Data is generated one time and then copied or replicated to other servers in the cluster. The dynamic cache either stores the object’s output to or serves the object’s content from the dynamic cache. saving execution time and resources. commands. an IBM HTTP Server’s FRCA cache that is not z/OS. The ESI processor caches whole pages. intercepting calls to objects that can be cached (for example. Therefore.75) What is Webcontainer failover? Ans) The Web server plug-in in the Web server is aware of the configuration of all Web containers and can route around a failed Web container in a cluster. the dynamic cache can create significant gains in server response time. enabling new entries to enter the cache service. and scalability. throughput. and JSP files. The following caching features are available in WebSphere Application Server: Cache replication Cache replication among cluster members takes place using the WebSphere data replication service. the cache entries are not saved when the Web server is restarted. as well as fragments. providing a higher cache hit ratio. when the number of cache entries reaches the configured limit for a given WebSphere server. such as that provided by the Edge components. The dynamic cache works within an application server. eviction of cache entries occurs. External caching The dynamic cache controls caches outside of the application server. This external caching enables WebSphere to manage dynamic content beyond the application . When external cache groups are defined. The cache that is implemented by the ESI processor is an in-memory cache. not a disk cache. Web services. Sessions can be persisted to a database or in-memory using data replication services.
The ESI processor has the ability to cache whole pages. Cache disk offload: By default. Dynamic caching The dynamic cache service improves performance by caching the output of servlets. Because J2EE applications have high read-write ratios and can tolerate small degrees of latency in the currency of their data. Edge Side Include caching: The Web server plug-in contains a built-in ESI processor. Cache replication: Cache replication among cluster members takes place using the WebSphere internal replication service. and scalability. The dynamic cache includes an alternative feature named disk offload. as well as fragments. eviction of cache entries takes place. not a disk cache. thus saving execution time and resources. When external cache groups are defined. External caching: The dynamic cache has the ability to control caches outside of the application server. for example through a servlet's service() method or a command's execute() method. . The content can then be served from the external cache instead of the application server. and a nonz/OS WebSphere HTTP Server plug-in ESI Fragment Processor. improving savings in performance. intercepting calls to cacheable objects. improving performance. the dynamic cache matches externally cacheable cache entries with those groups. a non-z/OS IBM HTTP Server's FRCA cache. commands and JSP files. providing a higher cache hit ratio. which copies the evicted cache entries to disk for potential future access. therefore.server. This allows WebSphere to manage dynamic content beyond the application server. Data is generated one time and copied or replicated to other servers in the cluster. The content can then be served from the external cache. when the number of cache entries reaches the configured limit for a given WebSphere server. allowing new entries to enter the cache service. the cache entries are not saved when the Web server is restarted. such as IBM Edge Server. and pushes cache entries and invalidations out to them. The dynamic cache works within an application server. throughput. the dynamic cache can create an opportunity for significant gains in server response time. The cache implemented by the ESI processor is an in-memory cache. instead of the application server. and either stores the object's output to or serves the object's content from the dynamic cache. The following caching features are available in WebSphere Application Server.
JSP files and other types of server-side includes. SIP applications are packaged as SIP archive (SAR) files and are deployed to the application server using the standard WebSphere Application Server administrative tools. but not created or removed. modify. The embedded Web server is based on the IBM HTTP Server product. The Web container invokes the servlet’s destroy method when appropriate and unloads the servlet. Portlets are packaged in WAR files.independent of SIP. personalization and member services. in the Express configuration. the use of an external Web server and Web server plug-in as a front end to the Web container is more appropriate for a production environment. after which the JVM performs garbage collection. and instant messaging. can be considered for production use. Web container: The Web container processes servlets. the communication takes place over the specified transport mechanism. SIP is used to establish. similar to other J2EE components. Embedded HTTP server: the Web container runs an embedded HTTP server for handling HTTP(S) requests from external Web server plug-ins or Web browsers. and terminate multimedia IP sessions. Session Initiation Protocol (SIP) applications SIP applications are Java programs that use at least one Session Initiation Protocol servlet written to the JSR 116 specification. SIP negotiates the medium. . After the SIP call has been established. In the more advanced configurations. the transport.1 we have 5 containers which are : Portlet Container : Portlet applications are intended to be combined with other portlets to collectively create a single page of output. Directing client requests to the embedded Web server is useful for testing or development purposes and. Each application server runtime has one logical Web container.77) ? Administrator point of view how many containers are there in was 6. such as portlet aggregation and page layout. then invokes the servlet service method. The Application Server Toolkit provides special tools for developing SIP applications. Examples of application types that use SIP include voice over IP. SAR files can also be bundled within a J2EE application archive (EAR file). and the encoding for the call. The Portlet container takes the output of one or more Portlets and generates a complete page that can be displayed. Note that the portlet runtime does not provide the advanced capabilities of WebSphere Portal. or collaboration features. Servlet processing:when handling servlets. which can be modified. click-tocall. the Web container creates a request object and a response object.1 Ans) In WAS 6.
. It allows the client to run applications in an EJB-compatible J2EE environment. From an administrative viewpoint. The container provides many low-level services.http. Web server plug-ins Although the Web container has an embedded HTTP server. it must be forwarded to WebSphere Application Server for handling. it is forwarded to the appropriate Web container in the application server.HttpSession interface described in the Servlet API specification. Web services engine: Web services are provided as a set of APIs in cooperation with the J2EE applications. The Web server can serve requests that do not require any dynamic content. HTML pages. The enterprise beans (packaged in EJB modules) installed in an application server do not communicate directly with the server. is copied to the Web server plug-in directory. Client application container The client application container is a separately installed component on the client's machine. configured on the WebSphere Application Server. Web services engines are provided to support SOAP. Together. when a request requires dynamic content (JSP/servlet processing). However. When a request for an application server is received. EJB container The EJB container provides all the runtime services needed to deploy and manage enterprise beans.Session management: support is provided for the javax. The plug-in is included with the WebSphere Application Server package for installation on a Web server. instead. the container manages data storage and retrieval for the contained beans. The mechanism to accomplish this is provided in the form of a Web server plug-in. The plug-in uses the configuration file to determine whether a request should be handled by the Web server or an application server. It is a server process that handles requests for both session and entity beans. the container and the server provide the bean runtime environment. including threading and transaction support. An XML configuration file. A single container can host more than one EJB JAR file. for example. The plug-in can use HTTP or HTTPs to transmit the request. the EJB container provides an interface between the EJBs and the server.servlet. There is a command-line executable (launchClient) which is used to launch the client application along with its client container runtime 78) What is deployment descriptor and how many dedployment descriptors are available ? Ans) A deployment descriptor (DD) refers to a configuration file for an artifact that is deployed to some container/engine. a more likely scenario is that an external Web server will be used to receive client requests.
each of which corresponds to a type of deployment unit: • EJB deployment descriptors are defined in the Enterprise JavaBeans specification. security settings and describes specific configuration requirements. • Web deployment descriptors are defined in the Java Servlet specification. b) Jython syntax seems more natural to programmers used to Java or C. so you do not have to edit and manage them directly. the deployment descriptor must be called web. • Resource adapter deployment descriptors for Java Connectors are defined by the J2EE Connector architecture specification. For Java EE applications.ear file. The JNDI is a standard interface to an enterprise object name service. Enterprise Edition. XML is used for the syntax of these deployment descriptor files.xml and must reside in a WEB-INF subdirectory at the web application root. but they end up being able to do the same things . Each deployment descriptor type is defined in its corresponding specification as an XML Document Type Definition (DTD). Deployment descriptors describe the contents of deployment units and configure components and applications to their environment. It directs a deployment tool to deploy a module or application with specific container options. a deployment descriptor describes how a web application or enterprise application should be deployed. so those relationships can be managed without writing or changing program code. There are five types of deployment descriptors. the deployment descriptor must be named application. For web applications.In the Java Platform. but Jacl syntax can be more familiar to administrators who are familiar with Tcl c) Each language has its own style and syntax. 79) Difference between JACL & JYTHON and which one is better? Ans) 1) a) Jython depends on the Python commands whereas Jacl(Java command language) depends on the Tcl commands.xml and must be placed directly in the META-INF directory at the top level of the application . They also externalize the relationships between components. • Application and application client deployment descriptors are both defined in the J2EE platform specification. Deployment descriptors contain information used by a component's container and also contain information that the component can access directly by way of the JNDI. Deployment tools usually automatically generate deployment descriptors.
By context root only your configuration file (Plugin-cnf. Netscape Enterprise Server. XML. If EAR contains . Microsoft Internet Information Services (IIS). WAS is built using open standards such as J2EE. Ans) WebSphere Application server is middleware software provided by IBM. 81) Ans) What is the difference in installation of war and ear? Only difference in this application installation is optional context root for JAR and EAR and for WAR it is mandatory. then developers might use any of the protocols like IIOP/RMI in their code/login. workload management. and IBM HTTP Server for AIX/Linux/Microsoft Windows/Solaris. It works with a number of Web servers including Apache HTTP Server. Why you are not giving context root for EAR? Context root is optional for EAR file. What is context root? The context root identifies the web application.JARs which is ment to access through EJB applications. threading. is the flagship product within IBM's WebSphere brand.xml) route the request to the particular application.WAR then we can target these files to different application servers. the main ability for wsadmin is to provide the ability to run scripts. a software application server. If EAR file is having multiple modules like JAR. It provides services like database connectivity. we can access EAR file using that context root. Multiple world-wide IBM labs participate in creating WebSphere run-time products and development tools.x? 512MB.1 GB is recommended What is the ticket tracking tool you used? 82) Ans) 83) Ans) 84) Ans) 85) Ans) unicentre service desk (USD) 86) How you will check CPU utilisation? . IBM HTTP Server for z/OS. What is the memory requirement for 6. If we will give context root for EAR. It is a platform on which Java-based business applications run. IBM HTTP Server for i5/OS. and Web Services. If it uses SSO.WSADMIN scripting tool can be used in an interactive mode. we can access thru SSO login page. 80) What is WebSphere and explain the functionality of the WAS? IBM WebSphere Application Server (WAS). and so on that can be used by the business applications.
It can be as sophisticated as a complex database for a large. Applications access a data source using a connection.Was install root 10GB. The DataSource interface provides two methods for establishing a connection with a data source. and a DataSource object can be thought of as a factory for connections to the particular data source that the DataSource instance represents.Logs : 10GB Soft ware requirements for the WAS 6. a data source is a facility for storing data. Recommended 1GB ( project recommended it will go up to 4GB to 5GB ) Had disk (File system) : Temp : 10GB. . In basic terms. 89) What is the s/w and h/w requirements to install the WAS 6.TOPAS 87) Ans) What is the data source and how you configure it? A Data Source object is the representation of a data source in the Java programming language.1 installation.Type4 JDBC drivers connect directly to the database server.Type2 JDBC drivers require the database client software on the client node to connect to the database server. corporation or as simple as a file with rows and columns. Those are Type2(Thick) and Type4(Thin/Native Protocol) jdbc drivers.x? Hard ware requirements for the WAS 6. or it can be on a local desktop machine. 88) Ans) How many jdbc drivers’ types you have in was? we have 2 types of JDBC drivers in was .1 installation. Memory : Minimum 512 MB. A data source can reside on a remote server.
. 90) Which version of unix you are using and what is java version which supports for was 6.x ?
92) How you will schedule jobs using cron jobs how you will set? Ans ) Crontab -l======> list the crons crontab -e =====> edit and modify The crontab File Entry Format A crontab file contains entries for each cron job. Entries are separated by .4 91) While installing if you get error like “java not found”then what could be the reason and how you solve it? Ans) The problem: Attempting to use the LaunchPad program from CD-ROM installation fails with a /java: not found error.1 is J2EE 1.Java supporting version for WAS 6. The solution: Change directories to the cdrom/ directory and try the installation again.
.list. Click Security > SSL certificate and key management > Manage endpoint security configurations. every Monday. Each crontab file entry contains six fields separated by spaces or tabs in the following form: minute hour day_of_month month weekday command_with_complete_path ex : To run the calendar command at 6:30 a. 2. Wednesday. Select an SSL configuration link on either the Inbound or Outbound tree. Procedure 1.create options for certificates 3) ikeyman: By using ikeyman we can open the KDB(key data base) and add the certificates to the key database. depending on the process you are configuring.m.3. and Friday. 2) Command line : By using “gsk7cmd” command we can achive the SSL configuration. enter: 30 6 * * 1.5 /usr/bin/calendar 93) Explain about ssl configuration steps using admin console? Configuration of SSL in WebSphere : SSL configuration can be achived in three different ways 1) From Admin console: Once we get the certificate from CA (Certificate Authority) then we will import into trust store.export. To enable security between IHS and Application server we need to export defaut personal certificates of all nodes and import the same to the trust store of the IHS. Gsk7cmd provides the otions like import .newline characters.
A centrally managed SSL configuration tree can override the default alias. the scope inherits the configuration properties of the first scope above it that is associated with an SSL configuration and certificate alias. Select a keystore name from the drop-down list. which is a keystore whose role is to establish trust during the connection. 4. then the scope is not associated. o If you change the keystore name. Select the default only when you have not specified an SSL configuration alias elsewhere and have not selected a certificate alias. Instead. You can also view and select these configuration at every scope that is lower on the topology. A keystore contains the personal certificates that represent a signer identity and the private key that WebSphere Application Server uses to encrypt and sign data. 7. see Creating a keystore configuration to create a new keystore. o 3. If there is no keystore in the list. . A truststore name refers to a specific truststore that holds signer certificates that validate the trust of certificates sent by remote connections during an SSL handshake. Make the alias name unique within the list of SSL configuration aliases that are already created at the selected scope. You cannot select links under Additional Properties until you type a configuration name and click Apply.If the scope is already associated with a configuration and alias. The new SSL configuration uses this alias for other configuration tasks. o If the parenthetical information is not included. Choose a default server certificate alias for inbound connections. For more information. Click New to display the SSL configuration panel. the SSL configuration alias and certificate alias are noted in parentheses. WebSphere Application Server uses a server alias for inbound connections and a client alias for outbound connections. If there is no truststore in the list. This field is required. Type an SSL configuration name. 6. The configuration name is the SSL configuration alias. The cell scope must be associated with an SSL configuration because it is at the top of the topology and represents the default SSL configuration for the inbound or outbound connection. see Creating a keystore configuration to create a new truststore. Select a truststore name from the drop-down list. Click SSL configurations under Related Items. You can view and select any of the SSL configurations that are configured at this scope. 5. click Get certificate aliases to refresh the list of certificates from which you can choose a default alias. o 8. see Central management of Secure Sockets Layer configurations.
p12. and the authenticity of the certificate. Select a protocol for the SSL handshake. if the client does not have a certificate. Click Apply if you intend to configure Additional Properties. The default protocol. Make the management scope in this field identical to the link you selected in Step 2. o If you select Supported. If you want to change the scope. o 14. Important: The signer certificate that represents the client must be in the truststore that you select for the SSL configuration. Important: Do not use the SSLv2 protocol for the SSL server connection. supports client protocols TLSv1. However. the handshake fails. the integrity of the signer. However. Select one of the following options: . SSLv3. that is located in the cell directory of the configuration repository. the server requests that a client send a certificate. By default. Use it only when necessary on the client side. perform a signer exchange before you select either Supported or Required. Click Quality of protection (QoP) settings under Additional Properties. and SSLv2. the server requests that a client send a certificate. o The TLSv1 protocol supports TLS and TLSv1. the server does not request that a client send a certificate during the handshake. If you select None. 11. 10. servers within the same cell trust each other because they use the common truststore. Select a client authentication setting to establish an SSL configuration for inbound connections and for clients to send their certificates. o 15. Select the default only when the server SSL configuration specifies an SSL client authentication. The SSL server connection must support this protocol for the handshake to proceed. if you use keystores and truststores that you create. The SSL server connection must support this protocol for the handshake to proceed. If not. However. o If you select Required. go to Step 24. SSL_TLS. QoP settings define the strength of the SSL encryption. 12.9. Choose a default client certificate alias for outbound connections. Review the identified management scope for the SSL configuration. the handshake might still succeed. if the client does not have a certificate. trust. you must click a different link in the topology tree and continue at Step 3. o The SSLv3 protocol supports SSL and SSLv3. 13. if appropriate.
o o Choose IbmPKIX when you require certificate revocation list (CRL) checking using CRL distribution points in the certificates. Define a custom trust manager.o o A predefined Java Secure Socket Extension (JSSE) provider.ibm. It is required for use by the channel framework SSL channel.TrustManagerExtendedInfo interface to obtain product-specific information. 18. 19.wsspi. Any time you change the ciphers that are listed from a specific cipher suite group. The custom trust manager must implement the JSSE javax. You can configure a custom trust manager to perform CRL checking.ssl. Weak: WebSphere Application Server can support integrity signing algorithms but not to perform encryption. 20. Select this option with care because passwords and other sensitive information that cross the network are visible to an Internet Protocol (IP) sniffer. However. 21. Type a provider name in the Custom provider field. You can define a custom trust manager that runs with the default trust manager you select. Medium: WebSphere Application Server can perform 40-bit encryption algorithms for encryption and support integrity signing algorithms. a strong cipher suite can affect the performance of the connection. o o o 17. the com. IBMJSSE2 is used in combination with the IBMJCEFIPS crypto provider. if necessary.net. Choose IbmX509 when you do not require CRL checking but do need increased performance. the group name changes to Custom. . Select from among the following cipher suite groups: o Strong: WebSphere Application Server can perform 128-bit confidentiality algorithms for encryption and support integrity signing algorithms. When Federal Information Processing Standard (FIPS) is enabled. Click Update selected ciphers to view a list of the available ciphers for each cipher strength.X509TrustManager interface and. Custom: you can select specific ciphers.ssl. Click Trust and key managers under Additional Properties. Click OK to return to the new SSL configuration panel. Select a default trust manager for the primary SSL handshake trust decision. if appropriate. optionally. A custom JSSE provider. 16. The IBMJSSE2 provider is recommended for use on all platforms which support it.
In test environments. e. Click Custom Property on the SSL configuration panel. c. click Security > Secure communications > SSL configurations > SSL_configuration > Trust and key managers > Key managers > New. By default. the new custom trust manager displays in the Additional ordered trust managers field. Select the Custom option. Important: If you choose to implement your own key manager. Type a class name. Remember that these environment are not secure.ssl. Click Security > SSL certificate and key management > Manage endpoint security configurations > SSL_configuration > Trust and key managers > Trust managers > New. 3 Click OK to save the trust and key manager settings and return to the new SSL configuration panel. To define a custom key manager. Use the left and right list boxes to add and remove custom trust managers. b. When you return to the Trust and key managers panel. 4 Results Important: You can override the default trust manager when you configure at least one custom trust manager and set the com. which is not recommended for production environments. However.skipDefaultTrustManagerWhenCustomDefined property to true. if you change the default. IbmX509 is the only key manager unless you create a custom key manager. 2 Select a key manager for the SSL configuration. d.a. you leave all the trust decisions to the custom trust manager. use a dummy trust manager to avoid certificate validation. Click OK. you can associate SSL configurations with protocols using one of the following methods: • Set the SSL configuration on the thread programmatically . Type a unique trust manager name.ibm. you can affect the alias selection behavior because the key manager is responsible for selecting the certificate alias from the keystore. Click Save to save the new SSL configuration. What to do next In this release of WebSphere Application Server. The custom key manager might not interpret the SSL configuration as the WebSphere Application Server key manager IbmX509 does.
For more information. 97) Explain about web sphere commerce? IBM web sphere commerce has a single platform which offers complete ecommerce solutions to developers. For more information. 98) Detail about the architecture of web sphere? Web Sphere is built on three main components they are Database . It can be very productive if you are planning to do business with consumers. 96) Explain about web sphere? The word web sphere popularly refers to IBM middleware technology products.x? a) Profile concept b) Single installation WAS product supports for multible profile creation c) Cell profile d) SIB (System Integration Bus) What is Webcontainer failover? 94) Ans) 95) Ans) the Web server plug-in in the Web server is aware of the configuration of all Web containers and can route around a failed Web container in a cluster. see Selecting an SSL configuration alias directly from an endpoint configuration Manage the SSL configurations centrally by associating them with SSL configuration groups or zones that are scoped for endpoints.• • • Associate the SSL configuration with an outbound protocol. business and channel partners altogether. Web sphere is known for its turnkey operation in e business applications. business and indirectly through channel partners. It has run time components and tools which can help in creating applications which run on WAS. What is main feature in 6. This can be used to perform business with consumers. see Associating Secure Sockets Layer configurations centrally with inbound and outbound scopes. see Associating a Secure Sockets Layer configuration dynamically with an outbound protocol and remote secure endpoint Associate the SSL configuration directly using the alias. WAS refers to web sphere application server. Sessions can be persisted to a database or in-memory using data replication services. For more information. and target host and port.
etc • Web sphere commerce payments and customer care. it is known as Object Grid. EJB. It also depends upon the operating system. etc 100) Explain about IBM Web Sphere edge server? Web sphere edge server is used to improve the performance of web based systems. 101) Explain about extended deployment? Web sphere application server extended deployment increases the functionality of the server in two main areas they are manageability and performance.• J2EE application server • A web server The databases which it supports are • DB2 • Oracle • Cloudscape Application server is IBMWAS and the supported web servers are • IBM server • Microsoft IIS • Sun web server 99) State some of the features present in web sphere? Some of the features which are present in web sphere are: • Order management • Web sphere commerce accelerator • Analytical and business intelligence • Open standards such as Java. Content distribution and application service at the edge. 102) Explain about the security features present in WAS? Security model for web sphere is primarily based on JAVA EE security model. It can be used as forward or proxy server. A stand alone distributed cache was added to it under the performance header. Basically four components are present in the web sphere they are Network dispatcher. . Dynamic virtualization between servers is possible with the help of XD. Light weight third party authentication mechanism is the main security feature present in WAS. User authentication and authorization mechanisms are also provided in WAS. Caching proxy.
He can also predict about the incoming load on servers. 104) Explain the various Administrator benefits using Web sphere? Web sphere almost reduces the work of server administrator as he can manage load on servers efficiently without any hassles.103) Explain about asymmetric clustering? Asymmetric clustering applications are primarily used in electronic trading systems employed in banks. Web sphere extended deployment offers a Java batch processing system called as Compute Grid. Page fragments arising from JSP or servlets are cached by Edge and the caching process is slow. Email alerts. It also gives him flexibility to divide the load and applications among different server farms. Web sphere process server and web sphere ESB were built with WID. etc. 108) Explain about compute Grid? Compute grid is also known as Web sphere batch. J2EE failover support and cell configuration support is also present. Some of the features are. For clustering run time operations deployment manager`s role was eliminated. memory leak detection. partitions can be declared during run time and are usually run on a single cluster at a time. Performance and scalability of J2EE applications can be increased by edge. Various . 106) Explain about the network deployment feature present in WAS? Managing singletons will be a thing of the past and it also provides hot recovery of singletons which makes you forget about your GC collected singletons. WID was built with RAD Eclipse based technology. restart options. This forms an additional feature to Web sphere network environment. 105) Explain about caching proxy of IBM Web sphere Edge sphere? A caching proxy can be configured in forward direction or as a proxy. Content requested by the user is cached by edge before sending or adhering to the query. Transaction logs can stored on a shared file system. Work specific to a particular can be routed to that cluster. 107) Explain about IBM web sphere integration developer? Web sphere integration developer provides an IDE to build applications based on service oriented architecture.
It is very useful to have knowledge of Web sphere MQ for proper configuration. xJCL. Java classes are chiefly responsible for translating the API calls to API`s defined by web sphere. This feature is important because it gives us the flexibility to change the administered object without changing the JMS client code. It isolates the application from object names.please give me one examples ? . It uses the concept of light weight transport which is again based on IP rather than the queue process. 110) Explain about Web sphere MQ JMS Provider? Web sphere MQ and Web Sphere Business integration manager Broker are very useful in providing Java messaging services to wide range of clients (publisher –subscribe. the naming of connection factory is independent of the name specified by JMS client. 112) Is the naming of connection factory independent of the name specified by JMS client? Yes. 109) Explain about web sphere MQ Real time transport? This feature is very useful in instant messaging across different clients through intranet and internet.features are provided which help a developer to create. This is made possible by WAS (Web sphere application server) with its resource references. This supports high volume and high performance across different clients. The default standard used by CHANNEL is SVRCONN which is the server connection channel. manage and execute batch jobs. Generally this is Web Sphere MQ network abstraction. 113) How many ways deployments in ibm websphere. point to point). Job scheduler. batch container and batch programming controller. This server is generally used to communicate to the queue manager by the client. 111) Explain the attribute CHANNEL in web sphere MQ? CHANNEL specifies the name of the server connection channel.
3 and 1. Rapid Deployment (feature available at WAS 6). and what are the similarities for both 5.4 specifications – – – – – – Can upgrade runtime environment without upgrading applications Supports mixed version nodes in a v6 ND Cell Allow for migration in stages within a cell Mixed v5 and v6 nodes must have v6 DMgr (can’t add new v5 node) v6 ND introduces profiles Each profile has its own user data including WebSphere configuration . And in which field they differ and why we go for 6. 1.Ways of deplyment depends on version of WebSphere Application server you are using. But 5.X and Above provide following ways 1. Hot Deployment droping jsp files.2. with enabled class reloading (not recommanded for production) 3. using WSAdmin command 5. Jacl is an implementation of a Tcl interpreter written entirely in Java. 20) how to connect to the db2 database from websphere studio? 115) I need the difference btw the two versions of 5.x and 6.x rather than 5.x.x ? Supports J2EE 1. 114) What is JACL? JACL and JYTHON are the two scripting language Which WebSphere supports.x. Using Jacl Scripts 4. Using Admin Console 2.x and 6.
So we can can’t configure the same node in another cell 118) How you will install the WAS? Ans) WAS we can install in three different methods. deployment manager or custom profile 116) How you will replace the multible occurance of single word in a text file with another word ? Ans) We can replace the word in vi editor by using the following command :%s/text1 /text2 /g (return) Text1 will be replaced by text2 117) In a clustered environment I have node1 in cell1 now I need to configure same node in cell2 . The QEJBSVR user profile must have *WX authority to the directory path specified in backup_file. . If no path is specified. Parameters The following options are available for the backupConfig command: -nostop Tells the backupConfig command not to stop the servers before backing up the configuration. If you do not specify one. To take backup we can use the command Syntax The command syntax is as follows: backupConfig <backup_file> [options] where backup_file specifies the file to which the backup is written. the QEJBSVR user profile must have *WX authority to the current working directory. How can I achieve this task ? Ans) we can configure one node in one cell only. a unique name is generated.– – – All profiles share same WebSphere binaries Less disk space required than separate installations stand-alone server. Before we go to apply fix packs we need to take backup of the existing configuration of our WAS and all profiles. a) Silent mode using responce file b) Interactive mode c) Graphical mode 119) How to install fix packs? Ans) we can apply the fix packs using the update installer.
-logfile <fileName> Specifies the location of the log file to which information gets written.zip. The -profileName option is not required for running in a single profile environment. Acts the same as the -user option.zip -nostop to restore the backed configuration we can use the command Syntax The command syntax is as follows: . The default for this option is the default profile. -password <password> Specifies the password for authentication if security is enabled in the server.-quiet Suppresses the progress information that the backupConfig command prints in normal mode. backupConfig myBackup. -user <name> Specifies the user name for authentication if security is enabled in the server. -username <name> Specifies the user name for authentication if security is enabled in the server.zip The following example creates a file called myBackup. -help Prints a usage statement. Acts the same as the -username option. Usage scenario The following example demonstrates correct syntax: backupConfig The following example creates a new file that includes the current date: WebSphereConfig_2003-04-22. -profileName <profileName> Defines the profile of the Application Server process in a multi-profile installation. -trace Generates trace information into the log file for debugging purposes. -? Prints a usage statement. -replacelog Replaces the log file instead of appending to the current log. and does not stop any servers before beginning the backup process.
Parameters The following options are available for the restoreConfig command: -help Prints a usage statement. By default. -trace Generates trace information into the log file for debugging purposes. Acts the same as the -user option.log and is created in your logs directory. -quiet Suppresses the progress information that the restoreConfig command prints in normal mode. The -profileName option is not required for running in a single profile environment. If you do not specify one. -username <name> Specifies the user name for authentication if security is enabled in the server. -logfile <fileName> Specifies the location of the log file to which trace information is written. -profileName Defines the profile of the Application Server process in a multiple profile installation. the log file is named restoreConfig. -replacelog Replaces the log file instead of appending to the current log. . The location defaults to the profile_root/config directory. -location <directory_name> Specifies the directory where the backup file is restored. The location defaults to the app_server_root/config directory. -nostop Tells the restoreConfig command not to stop the servers before restoring the configuration. -password <password> Specifies the password for authentication if security is enabled in the server. The default for this option is the default profile. the command will not run.restoreConfig <backup_file> [options] where backup_file specifies the file to be restored.
zip restoreConfig. you may need to manually update some of the paths in the configuration directory.zip -location /tmp -nostop restoreConfig. For example: MigrationBackup.zip The following example restores the given file to the /tmp directory and does not stop any servers before beginning the restoration.Thu-Aug-28-10. -? Prints a usage statement.zip Usage scenario The following example demonstrates correct syntax: restoreConfig WebSphereConfig_2006-04-22.15045-2006.150452006. You can use the restoreConfig command to recover an application server if it fails.zip -profileName myprofile Be aware that if you restore the configuration to a directory that is different from the directory that was backed up when you performed the backupConfig command.zip -location /tmp -nostop The following example restores the configuration stored in /home/mydir/myprofileBackup.-user <name> Specifies the user name for authentication if security is enabled in the server. restoreConfig WebSphereConfig_2006_04_22. Perform the following steps: Locate the automatic migration backup in the app_server_root/temp directory.zip restoreConfig WebSphereConfig_2006-04-22.zip Restore the configuration with the restoreConfig command. For example: restoreConfig app_server_root/temp/MigrationBackup. 120) What is the virtual memory required for JVM process? Ans) The recomended virtual memory for JVM is ¼ of the physical memory.sh WebSphereConfig_2006_04_22.Thu-Aug-28-10.zip -location /tmp -nostop restoreConfig WebSphereConfig_2006_04_22.sh WebSphereConfig_2006_04_22.zip to the configuration for profile myprofile: restoreConfig WebSphereConfig_2006-04-22. Acts the same as the -username option. 121) What are the regular commands is UNIX in use? Ans) In our day to day activity we use the following commands in unix: a) To find out the running processes the command is ef| grep java :Ps – .
folders we use the following command Tar –xvf <file name with path> Tar – uvf Tar – cvf -- --adding one or two files two folder -.Wednesday and friday n) To find fully qualified domain name (FQDN) if you know IP $ Nslookup <IP_ADDRESS> --(vice versa) 122) Whats the default server in WAS for application server profile? Ans) server1 123) In Clusters what is the riffle stop ? .3.total folder m) To schedule the job in cron command is as follwos Crontab –l ( to list all the scheduled jobs) Crontab –e ( to edit the scheduled job) Whithin the crontab the syntax for the schedule the script as follows Ex: 30 6 * * 1.5 /usr/bin/calender 30(minutes) 6 (hours) *(day of the month) * (month of the year) 1.3.b) To find out the disk space the command is :du :df c) To find out the file system the command is d) To find out the network performance/port info command is :netstat e) To find out the CPU utilisation the command is f) To kill the running process the command is -9 <PID> g) To generate heap/thresd dump the command is : topas/osstat : kill :kill -3 <PID> : h) To change the privileges of the file/folder the command is chmod i) j) To change the owner of the file/folder the command is To list the file the command is :chown : ls :mkdir k) To create DIR(folder) the command is l) To TAR the files .5 (day no of the week)/usr/bin/calender In the above example we scheduled the script called calender which is located in the location “/usr/bin” to run every Monday.
Like this it will stop and start all the server in the cluster 124) How you will start the server & how you will stop from command line? Ans) stopserver and startserver are the commands to stop and start from the command line 125) How to check the physical memory (RAM) in the system? Ans) “bootinf –r “ will give you the physical memory details of the unix box 126) What is the first signal you find when memory leakage is there in the application? Ans) If you have memory leakage in your application code then you get frequently “ OUT OF MEMORY EXCEPTION” error. Supports the Jave 2 Platform. And also we need to take backup of all profiles and configuration. Integrated Tools : a) Tivoli Performance viewer (TPV) Enables administrators to monitor the overall health of websphere application server. Enterprise Edition (J2EE) Management Reference Implimentation (JSR-077) 2) Request Metrics : Technology to trace each individual transaction and record its responce time at different stages as it flows through the application server. 128) What are the performance monitor tools in WAS? Ans) Websphere provides integrated tools to monitor and tune system and application performance: Source Systems of the performance data : 1) Performance Monitoring Infrastructure (PMI): Core performance data collection technology for websphere application server. We need to make sure that update installer which is installed should be compatible with WAS. 127) How to apply fix packs to WAS? a) Using update installer we can apply the fix packs.recording the processing time in each of the major websphere application server components.Ans) Ripple stop/start will stop one server at a time while other servers will continue to serve the client requests. It is accessed from within the administrative console b) Request Metrics ( Tool) Enables you to track individual transactions. Output viewed in standard logs or using an application responce measurement( ARM) based tool . Supports externalisation of data to standard log files and /or an Application Responce Management (ARM) agent.
So I need to avoid the typing os my user id and password to stop the servers in security enables environment. Output viewed in TPV or in administrative console runtime messages d) Performace servlet Provideds simple retrival of performance data in XML format. 129) What information you get with the command “ps–ef|grep httpd” ? Ans) we get the all webserver instance informations with process id. using that socket we can get SID $rmsock <socket_no> <protocol> Ex: $netstat –Aan|grep 944 . How can we achive this task ? Ans) We can achive this task by storing the credentials in the following mentioned files For SOAP connector –soap. 130) How you will check the web server status Ans) by using the following command we can check the all instances of the webserver $ ps – ef| grep httpd 131) If you enable global security every time we need to provide userid and password while stopping the servers.c) Performance advisor Analze collected performance data and provide configuration recommendations to improve the application server performance.profs 132) I have a standalone application server. Because we are depending on the node to configure the server2 on standalone server on theserver1. 133) How can you control the web browser requests only to particular ip address? Ans) using “Virtual hosts” (need to cross verify the answer) 134) If you want to know detailed information for a particular port when you know only port number then how you will check? Ans) we need to follow the steps mentioned below to know the detailed information about the process running on the particular port $ netstat –Aan|grep <Port_no> Socket will be listed.profs For RMI connector –sas.client. Now I need to configure server2 on the same node how can I achieve this task? Ans) To configure server2 there is no dependency on the server1 status. It is bit security issues it will disclose to any one while typing the password.client. in that server1 crashed because of some reasons. Acced through a browser.
dynamic cache.Mail service. Cache instances. Stateful session beans use the replication service so that applications using stateful session beans are not limited by unexpected server failures. URL. For more information about replication in the dynamic cache. 138) If I try to connect to use one port and I got message saying this port is already used by some other process then how to change the port number in WAS and where we can change the same? Ans) only way to change the port is by changing the virtual host port for which the application is trying to use. and stateful session beans available across many application servers in a cluster.Etc. Data replication service (DRS) is the internal WebSphere Application Server component that replicates data. The benefits of using replication vary depending on the component that you configure to use replication. node & profile point of view? Ans) In WAS Cell will be on top. For more information about memory-to-memory replication. session manager maintains data about sessions across multiple application servers. Application servers. Use data replication to make data for session manager. preventing the loss of session data if a single application server fails. or events among application servers. When memory-to-memory replication is configured. see Memory-to-memory replication. Nodeagents. preventing the need to repeatedly perform the same tasks and queries in different application servers. Clusters Websphere resources like JMS. see Configuring cache replication.f10002000fc4398 $rmsock f10020000fc4398 tcpcb the socket oxfc4008 is being by process 626888(java) $ps –ef| grep 626888 135) How you will find how much heap is used by each JVM? Ans) Using PMI we can see the percentage of the memory used by JVM 136) Explain how request served by WAS explain complete step by step? Ans) First request comes to the webserver 137) Explain the architecture in the cell. Nodes. 139) What is the default user registry and how you will configure the LTPA configuration? 140) explain about session replication ? Ans) Replication is a service that transfers data. For more • • • . Nodegroups. Dynamic cache uses the data replication service to further improve performance by copying cache information across application servers in the cluster. Resource Adpaters. objects. Within cell we have Dmgr. Session manager uses the data replication service when configured to do memory-to-memory replication.
session affinity in the WebSphere Application Server plug-in routes the requests for a given session to the same server. In a peer-to-peer cluster. There are three possible modes.> servers -.> [all servers] ->webcontainer settings -.> session management -. These replication settings can be configured in the following location in the admin console Amin console -. avoiding the overhead of session retrieval from another server containing the backup. sessions can replicate to one or more WebSphere Application Server instances to address HTTP Session single point of failure (SPOF).> distributed environment settings Options are : None. In a clustered environment.information about stateful session bean failover. This support is referred to as memory-to-memory session replication. the hot failover feature causes the plug-in to failover to a server that already contains the backup copy of the session.Database and memeory –to – memory replication Memory-to-memory replication WebSphere Application Server supports session replication to another WebSphere Application Server instance. the server retrieves the session from a server that has the backup copy of the session. If the current owner server instance of the session fails. see Stateful session bean failover for the EJB container. The server now becomes the owner of the session and affinity is now maintained to this server. The WebSphere Application Server instance in which the session is currently processed is referred to as the owner of the session. In this mode. WAS provides session recovery support in the form of a) Database session b) Memory –to –memory replication Session recovery support is required in the following conditions 1) When the user’s session data must be maintained across a server restart 2) When the user’s session datais too valuable to lose through an unexpected server failure.> application servers -. In a client/server cluster. You can set up a WebSphere Application Server instance to run in: • Server mode: Only store backup copies of other WebSphere Application Server sessions and not to send out copies of any session created in that particular server • Client mode: Only broadcast or send out copies of the sessions it owns and not to receive backup copies of sessions from other servers . then the WebSphere Application Server plug-in routes the requests to another appropriate server in the cluster.
Multiple data replication service instances that exist on the same application server due to session manager memory-to-memory configuration at various levels that are configured to be part of the same domain must have the same mode. then the rest of the session manager instances in that domain must be a combination of servers configured as Client only and Server only. or both when configuring the session management facility for memory-to-memory replication. then all session manager instances must be configured as Both client and server. If one session manager instance in a domain is configured to use the client/server topology. However. or both mode) topology is the default configuration and has a single replica. The default is both. This storage option is controlled by the mode parameter. If one session manager instance is configured to use the peer-to-peer topology.Both mode: Simultaneously broadcast or send out copies of the sessions it owns and act as a backup table for sessions owned by other WebSphere Application Server instances You can select the replication mode of server. The memory-to-memory replication function is accomplished by the creation of a data replication service instance in an application server that talks to other data replication service instances in remote application servers. With respect to mode. client. For example. the following are the primary examples of memory-tomemory replication configuration: • Peer-to-peer replication • Client/server replication • Memory-to-memory topology: Peer-to-peer function The basic peer-to-peer (both client and server function. Data replication service instances on disparate application servers that replicate to one another must be configured as a part of the same domain. You must configure all session managers connected to a replication domain to have the same topology. You must configure this data replication service instance as a part of a replication domain. . you can also add additional replicas by configuring the replication domain. a server only data replication service instance and a both client and server data replication service instance cannot exist in the same replication domain.
and each handles the same amount of work. In a clustered environment. When using this configuration. the most stable implementation is achieved when each node has equal capabilities (CPU. For a cluster configured to run in the peer-to-peer mode this feature causes the plug-in to failover to a server that already contains the . then the WebSphere Application Server plug-in routes the requests to another appropriate server in the cluster. where the various system parts are collocated and requires the fewest server processes. session affinity in the WebSphere Application Server plug-in routes the requests for a given session to the same server. Session hot failover A new feature called session hot failover has been added to this release. If the current owner server instance of the session fails.In this • • • basic peer-to-peer topology. memory. and so on). each server Java Virtual Machine (JVM) can: Host the Web application leveraging the HTTP session Send out changes to the HTTP session that it owns Receive backup copies of the HTTP session from all of the other servers in the cluster This configuration represents the most consolidated topology. This feature is only applicable to the peer-to-peer mode.
Memory-to-memory topology: Client/server function The following figure depicts the client/server mode. where the session manager receives updates from the replication clients. Benefits of the client/server configuration include: Isolation (for failure recovery) . There is a second tier of servers without a Web application installed.backup copy of the session. and these sessions are replicated out as they are created and updated. You must upgrade all WebSphere Application Server plug-in instances that front the Application Server cluster to version 6. therefore avoiding the overhead of session retrieval from another server containing the backup.0 to ensure session affinity when using the peer-to-peer mode. There is a tier of applications servers that host Web applications using HTTP sessions.
After connecting to wsadmin we fire a command securityoff. hence. Consolidation There is most likely no need to have a one-to-one correspondence between servers handling backups and those processing the applications. and conversely recycle an application JVM without potentially losing that backup data for someone. The clients attempt to replicate information and HTTP sessions to the backup servers as soon as they come up. HTTP sessions that are created prior to the time at which the servers come up might not replicate successfully. failure recovery is possible). 143) How you configure LDAP with WAS? Ans) To configure the console server. We can connect to wsadmin by mentioning NONE connection type .In this case we are isolating the handling of backup data from local data. you may have one or two more powerful computers in the back end of your enterprise that have the capacity to run a couple of session managers in replication server mode. 141) If admin console is not accessible then what we will do in base installation? Ans) in base also we have the WSADMIN scripting tool. allowing you to free up your cheaper Web application hardware to process the Web application. you again free up memory and processing in the servers processing the Web application Isolation for stopping and starting You can recycle a backup server without affecting the servers running the application (when there are two or more backups. Refer to Configuring the J2EE Application in the IBM Tivoli(R) Business Systems Manager Administrator's Guide for information on how to configure the console server. 142) How you get user id for datasource? Ans) from the database team we get the user id to configure the datasource. As a result. do the following steps: 1. . Timing consideration: Start the backup application servers first to avoid unexpected timing windows. Start the WebSphere(R) Application Server service on the console server. aside from isolating the moving parts in case of a catastrophic failure in one of them. It will disable the security after that we can login to the admin console and reset the passwords. 2. you are again reducing the number of places to which you transfer the data. Disparate hardware: While you run your Web applications on cheaper hardware.
you must map WebSphere Application Server roles to Tivoli Business Systems Manager groups.o=abc in the directory. see Configuring WebSphere Application Server to use LDAP.dc=DOMAIN_NAME_HERE Bind Password: Password for the user above Reuse Connection: Checked Ignore Case: Checked This is just an example. In the Server User ID and Server User Password fields. Following is an example of the type of information and sample answers that you need to do the steps in this section: • • • • • • • • • • Server User ID: User_ID Server User Password: password Type of LDAP: Active_Directory Host: The fully qualified name of the server running LDAP Port: 389 (Default) Base Distinguished Name (DN): dc=DOMAIN_NAME_HERE Bind Distinguished Name (DN): cn=user_id.abc. The LDAP User Registry page opens. If you are using LDAP. To enable WebSphere Application Server to work with Tivoli Business Systems Manager. In the WebSphere Administrative Console. type the user ID and password from your LDAP directory that the WebSphere Application 2. do not following the instructions in Configuring WebSphere Application Server to use LDAP yet. Refer to the IBM Tivoli Business Systems Manager Administrator's Guide for information. This is a sample configuration based on this example and uses the default values where appropriate. Your security administrator knows what information you need. expand Security -> User Registries in the left-hand navigation pane and click LDAP. If you are upgrading and plan to use LDAP. you need some information from your security administrator. .cn=users. You can switch to LDAP later in the process.3. If you are using the LocalOS user registry. you do not need to do anything else. The following steps assume that you configured your LDAP server on the ldapserver. Configuring WebSphere Application Server to use LDAP To configure WebSphere Application Server to use LDAP. 4. 1. The Secure Sockets Layer (SSL) between the LDAP server and WebSphere Application Server is not configured.com host and that your users and groups for Tivoli Business Systems Manager and the WebSphere Application Server that is hosting Tivoli Business Systems Manager are defined under the name ou=tbsm.
The User ID Map field specifies a filter that is used to determine the User's Full Name in Tivoli Business Systems Manager. 8. However. The WebSphere Administrative Console might switch to the Global Security page. In the Bind Distinguished Name and Bind Password fields. In the Base Distinguished Name field. 10. 9. If so. o=IBM.com. In the Port field. 5. If IBM Directory Server is selected as the LDAP directory server. In the Reuse Connection field. select this check box. so you need to supply the appropriate values. 6. you can leave these fields clear. Click Apply to accept the changes.abc.3. Note however that this value does not affect how Tivoli Business Systems Manager treats distinguished names stored in the Tivoli Business Systems Manager database. For this example use ldapserver. In the Host field. you can create users with distinguished names cn=John Doe. Otherwise. To eliminate any problems. if the user registry is configured to be case sensitive. type the hostname of your directory server. select the default value of 389. The check box should be selected.ou=tbsm. 4. Click Advanced LDAP Settings near the bottom of the window. In the Search Timeout field.o=abc. type ou=tbsm. 12. c=us. If your server allows anonymous queries. select the type of LDAP server you want to use. The Active Directory default setting requires authentication to run queries. when searching for resources assigned to John Doe (for example ownership notes). o=ibm. Accept the default SSL settings to run without the SSL. this field is optional and can left unchecked when a case sensitive authorization check is required. You can leave this field blank. Type the ID either as userid or as a distinguished name similar to uid=userid. Server runs under. In the User ID Map field. Internally. 13. follow the recommendations for your LDAP server. Tivoli Business Systems Manager treats distinguished names as case insensitive. type the name of the container object in the LDAP that contains your Tivoli Business Systems Manager users. For this example. accept the default value of 120. Click Configuration and click the General Properties tab. . type the distinguished name and password for a user ID that is authorized to run queries on your LDAP server. In the Ignore Case field. c=US and cn=john doe. ou=raleigh. accept the default setting. configure the user registry to be case insensitive or ensure that all users are created with unique distinguished names that are different in more than just case. 15. ou=Raleigh. 11. For example. the IBM(R) Directory Server default setting allows anonymous queries.o=abc. navigate back to the LDAP User Registry window (see Step 1 for directions). For example. all notes assigned to John Doe and john doe will be returned. 7. 14. In the Type field.
WebSphere Application Server validates your setup. If the page does not display automatically.The User Filter field determines what part of the LDAP entry must match the logon ID of the user. You might have to restart the console and WebSphere Application Server to see any changes you make. Verify that this and the other LDAP parameters are correct for your LDAP server and repeat the Global Security configuration steps until the validation is successful. red error message is displayed. 20. Click OK.ibmallGroups:uniqueMember Certificate Map Mode: EXACT_DN Certificate Filter: leave clear 17. use all the default values except the following values: o Enabled: checked o Active User Registry: LDAP 19. 18. . to use the cn attribute. If an round. Click Save at the top of the window. it means that WebSphere Application Server could not validate the Server ID you gave with the LDAP. 16. Verify the following settings: o Active Directory: User Filter: (&(sAMAccountName=%v)(objectclass=user)) .specify the attribute from the LDAP that you want to display for the full name of the user. Yellow warning messages are typical. specify *:cn. Click OK. From the Global Security page. If you are using Active Directory. navigate to the Security -> Global Security page. Group Filter: (&(cn=%v)(objectclass=group)) User ID Map: *:displayName (or whatever you entered in Step 15) Group ID Map: *:cn Group Member ID Map: memberof:member Certificate Map Mode: EXACT_DN Certificate Filter: leave clear IBM Directory Server: o User Filter: (&(uid=%v)(objectclass=ePerson) Group Filter: (&(cn=%v)(|(objectclass=groupOfNames) (objectClass=groupOfUniqueNames))) User ID Map: *:cn (or whatever you entered in Step 15) Group ID Map: *:cn Group Member ID Map: ibm-allGroups:member. For example. specify *:displayName. The messages at the top of the screen indicate your results.
152) If application is giving very slow response then how will improve? . Click Save again. 151) How and where to find the specific class? Ans) Appcliacation classes will be available at installed app path. 22. If WAS classes . We need to get the heap dumps and analyse the dumps for any memory issues with the code and if you find any issue then we need to ask developers to fix the same. In our project it was 4 GB.. see the LDAP server documentation in the WebSphere InfoCenter. Temporarly we can increase the heap size . 146) How you will check the port status? Ans) netstat 147) What is the command to find the process in the sun Solaris environment ? Ans) psrinfo –v (need to cross verify) 148) How you will check the application status? Ans) ps –ef |grep appservername( from admin console à enterprise applications) 149) If you are trying to start the WAS and you are getting the “Class not found” exception then how to solve the issue? Ans)1. Bur in real time projects it will be more the recomended. This is basicaly due to the request is reaching to IHS and not able to reach the app. Navigate to All topics by feature -> Security -> Securing applications and their environments -> Managing security -> Configuring user registries.21.. 145) What is the recommended physical memory for WAS? Ans) Mandatory is 512 MB and IBM recomends 1024 MB. Start WebSphere Application Server again. Check the WebSphere Class path and set it properly if not set correctly Check the System out and systemErr logs for any specific errors/warning to identify which class is not found when starting the server 150) If you get internal error then what is the solution for it? Ans) Check the IHS is running or not. find out in WAS classpath. if its running. For more information about specific LDAP servers. check the App server is running or not. 144) How you will fix memory leakage? Ans) Memory leak is the issue with native code. In this way after analysing the exact root cause we need to fix the memory leakage issue.
Or install new version in the production BOX and then migrate the old one with new version. We normally take the new box and install new version .p12 path 158) How you will achieve performance in production environment? Ans) 159) How you will change / migrate the project from one version to other? Ans) We will get new verion of EAR/WAR(project) deploy it. 156) What is JMS destination? Ans) 157) In ssl configuration how you will provide the path of the certificate? Ans) While Adding certificate. change acordingly if required JVM memory settings. If we want to migrate WAS. then deploy new app and make new server into production. we have to give . 160) Explain about how you will put the brand new system into production. and if you want to give Certicate store path. 155) What are the steps to do performance tuning for webserver? Ans) To reduce the disk i/o by using the _file() API directive on unix . we have to give the location of the certificate. 154) What is the significance of the embedded http server explain ? Ans)to get requests from external IHS and forward to WEB container. then decommission the old server. Explain from development to production? .Ans) Have to check Connection pooling settings. change acordingly if required And check the data base if its giving slow response Check any conneciton are waiting and not closing Check the CPU utilization and JVM utilization 153) What is SIB & what is the purpose? Ans) Service Inegration BUS is introduced in V6 and the perpupose is to connect the SOA apps like MQ.
petefreitag. And then put the server into Production. 161) Silent mode how it will work and if you get any errors then how you will rectify it? Ans) Silent mode of installation will also have the log file. where we can check the errors 162) Explaing about configuration of IBM Tivoli directory server? Ans) Don’t have Experience. Then we will create Test Env. 163) What is your last project architecture? Ans) 164) How many servers are there & in which environment? Ans) 165) How many types of Garbage collections? http://www.Ans) Developement team will develope the code and test in the Developement env.com/articles/gctuning/ .