Tuesday, October 28

How to run wlst script files

Raja Reddy 
1. set class path (./setWLSEnv.sh) 
2.java weblogic.WLST path_of_scriptfile.py file 

(or) 
1. set class path (./setWLSEnv.sh)
2.java weblogic.WLST 
3. exec(path_of_scriptfile)

Example::

1. opt/Apps/Oracle/Middleware/wlserver_10.3/server/bin/setWLSEnv.sh
2. java weblogic.WLST /opt/Apps/Files/deploy.py


(or)
1. opt/Apps/Oracle/Middleware/wlserver_10.3/server/bin/setWLSEnv.sh
2. java weblogic.WLST 
3. exec('/opt/Apps/Files/deploy.py')

deploy.py:

print "connecting to server.........."

connect('weblogic','weblogic1','t3://localhost:7001')

appname='benefits'

appLoc='/opt/Apps/Files/benifits.war'
target='MS1'
deploy(appname, appLoc, target)

print "application Deployed"



Friday, October 24

What is TNS ?

Ananth Srinivas
 TNS is related to Database , if TNS Liestner i up and Running then only we can connect to DB.

Weblogic Virtual Host

Apache is running and weblogic server also running. How can I test both are integrated or not?

  • Bobby Katreddy Try to send request to Apache.. if you have wrriten any handlers in appache..your request should redirect to weblogic. if it is redirecting application, then those are integrated!!!!
  • Parvath Reddy here many solution follow any one....

  • 1)you can do ping for weblogic and webserver...
  • 2)check in the apache access.log file tells where forwarded in application server...
  • 3)enable debug mode at webserver level in the if module debug=on that will put the log file of apache server....
  • 4)send request from browser if the request is for weblogic server ,You will get APACHE-BRIDGE-FAIL

Monday, October 20

RSA Algorithem


  • Chandu Reddy Used in ssl for encryption(keypair)


  • Neehar Kukkapalli RSA Is an asymmetric cyrpthographic algorithm used by latest systems to encrypt and decrpyt messages it encrypt msgs with public key which public key everyone can know and decrypt messages with private key Adavantages:integrity,secrecy,privacy,authentication,non-repudiation


  • Gaguturi Kamalbee The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt a message without the need to exchange a secret key separately.
    The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based on the difficulty of factoring large integers.

What is Cookie? What is Session?

Arun Karthik Thanks

Cookie:
Cookie is a text file which is created by the website which you visit.It will store the user's information along with the user ID. There are two types of cookie

1) Session Cookie
2) Persistent Coookie

Session Cookie : 

This cookie exits until you close a session , this will not save any information (meaning in text file in your hard disk).
Persistent cookie :

This type of cookie saves a text file in your disk. The information saved in the text entirely depends on the site which you visit.

Sample cookie Info :
User ID xxxxxx site name.

Session :

Session basically keeps track of the things which you traverse in a site. When you access a site (example : www.facebook.com) , a seesion will be created along with a unique ID which is called as session ID or JsessionID. This session ID will be provided by the JVM (Meaning the server where you host the application).

Note : Mostly websites uses cookie , so you have to enable cookie in your browser to access most of the website's

What is CLOUD Environment ?

Kiran Kumar Ravula the term mainly deals with the data center / Storage devices
as you know now a days Server , data , security and software maintenance is too much cost effective , and by using these individual dedicated resources , it is too difficult to maintain . Clo
ud is simply sharing the resources and maximizing the effectiveness of the shared resources over a particular network. it is like you are using same printer from different systems in your college computer lab. . these resources includes the hardware/platform/infrastructure/software ... in a traditional way the dedicated servers are used by single app/group only.. but in cloud environment all the resources are used by multiple users and if any additional requirement is there, we can add additional resources. simply multiple users can use a single server without purchasing licenses for different applications . all the servers will be converted in to VMs. BUT in practical approach, as per my knowledge Cloud is not safe for Critical commercial business applications.

Stick Session

http://tamanmohamed.blogspot.ie/2011/07/what-is-sticky-session.html?m=1

  •  If you send a request and that request reaches a particular server and if you send the request again, it has go to the same server (if the session is same for that request).. that is sticky session
  •  Load balancer, the request will be directed to the server that served the first request (and has the session).Sticky session means to route the requests of particular session to the same physical machine who served the first request for that session.

  • Arun Karthik Sticky session :

  • As you know , when you access a site , you will get a session ID or JsessionID (created by managed server).Consider there are 2 managed server (MS1 , MS2) configured and you are accessing the site.

    1) For instance the request hits MS1 , so the seesion ID will created by MS1 and all your session details will be tracked by MS1 server until you close the session.So , all your session information will be maintained by MS1 and all the consequitive request from the same session will be served by MS1 server.This behaviour is called as sticky session.

    Session Replication : 

    Consider , suppose if MS1 instance goes down unexpectedly , and if MS1 and MS2 are in cluster , all the session information maintained by MS1 will be replicated to MS2. So, the users information is keep on tracked and user's can enjoy uninterrupted service.This is called session replication.

Monday, October 13

setDomainEnv.sh - setWlsEnv.sh - setCommEnv.sh

What is the difference between setDomainEnv.sh - setWlsEnv.sh - setCommEnv.sh

If you set it in setDomainEnv.sh, it will be specific for the domain for which setDomainEnv.sh belongs.

if you set it in setWlsEnv.sh, it will be specific just when you run the setWlsEnv.sh for example >> in WLST.

if you set it in setCommEnv.sh, java parameters will be set for all the environment as they will be called by any script you run

Saturday, October 11

External stage Deployment


External stage deployment is similar to stage mode deployment. But in this, admin server is not responsible to copy the deployment files to the target servers. This should be done manually by the user. 
Steps:

- Create a stage folder in each target server directory.

- Inside the stage folder, create another folder by the name of the application that will be deployed. 
For e.g: MyWebApp

- Then copy the deployment files to the folder. Do this for each target server.

From the admin console, go to target server, -> Configuration -> Deployments.
 Change the Staging mode to external stage in the drop down list.

mtime



what is the command for,
1. find logs of last 5 days
2. find logs of last 5th day
3. find logs of last 10 to 20 days.
4. find logs of particular day(15aug2014).
5. find logs of particular period (15th aug to 20th aug)



  • 1. find logs of last 5 days find . -name xxxxx.log -mtime -5
  • 2. find logs of last 5th day find . -name xxxxx.log -mtime 5
  • 3. find logs of last 10 to 20 days find . -name xxxxx.log -mtime +10 -mtime -20 
  • 4. find logs of particular day(15aug2014). find . -type f -mtime $(( ( $(date +%s) - $(date -d '2014-08-15' +%s) ) / 60 / 60 / 24 - 1 ))
  • 5. find logs of particular period (15th aug to 20th aug) find . -type f -mtime +$(( ( $(date +%s) - $(date -d '2014-08-15' +%s) ) / 60 / 60 / 24 - 1 )) -mtime -$(( ( $(date +%s) - $(date -d '2014-08-15' +%s) ) / 60 / 60 / 24 - 1 ))