How does jconsole know of all monitored JVMs in system?

When you run jconsole, the tab named "local" lists JVMs running and their PIDs. By what mechanism is it able to 'know' which JVMs are running that have been started with the arguments that enable JMX management?
Does jconsole connect to JVMs or to MBeanServers? (Assume each JVM has multiple MBeanServers, and each MBeanServer has multiple domains.)
Also, what's the difference between using the 'remote' and 'advanced' tabs to connect to a JVM? They both have usernames and passwords, but while the 'remote' tab has a host and port, the 'advanced' tab has a URL that contains a host and port within it. So what's the difference - when would you pick one method of connection over another?
Thanks.

If jconsole connects to MBeanServers rather than
JVMs, then how can it tell the difference between
multiple MBeanServers that have been started by a
single JVM?JConsole connects to a given JMX connector server which is associated with a given MBeanServer at creation time.
For example, if I have a simple application (i.e. one
JVM) that starts up two MBeanServers in its main
method, using
MBeanServerFactory.createMBeanServer(name). To start
the application, you run the JVM with the
com.sun.management.jmxremote and
com.sun.management.jmxremote.port variables.
How will jconsole know to differentiate between the
two MBeanServers? After all, there's only one JVM -
and it's been started with only one port number.In your example JConsole will not see any of your MBeanServers. It'll see the platform MBeanServer which is the one used by the out-of-the-box management agent.
The next question I have is regarding the JVM - does
any JVM that's started locally show up in the "local"
tab of JConsole (because the JVM is always
instrumented by default - true?), or does it only
appear if you run it with the
com.sun.management.jmxremote variable?The new Attach API in JDK 6 allows JConsole 6 to show all the JVMs running on the local machine although you will only be able to connect to the ones running on JDK 6 (and JDK 5.0 if started with the com.sun.management.jmxremote or com.sun.management.jmxremote.port system properties).
JConsole 5 only shows the JVMs running on JDK 5.0 and started with the com.sun.management.jmxremote or com.sun.management.jmxremote.port system properties.
Have a look at the link below for more detailed info:
http://java.sun.com/javase/6/docs/technotes/guides/management/index.html
Regards,
Luis-Miguel Alventosa
Java SE JMX/JConsole development team
Sun Microsystems, Inc.
http://blogs.sun.com/lmalventosa/

Similar Messages

  • How does j_security_check know which page to redirect to?

    Hi All,
    I have implemented j_security_check in our weblogic web app successfully.
    What I would like to know is following the authentication and authorization via the container, how does it know to redirect the user to index.jsp?
    For example, we have login.jsp which contains the j_username and j_password fields, and the action is j_security_check. After the user hits submit and the container authenticates them, how does it know to then direct them to index.jsp? Is it because the welcome tag in web.xml is set up to direct them to index.jsp?
    <welcome-file-list>
    <welcome-file>index.jsp</welcome-file>
    </welcome-file-list>
    Thats the only thing i can think of!
    Thanks in advance.

    That's correct.
    You are specifying a login page, which will ONLY be accessed when the user attempts to view a secured resource.
    After logging in, they will see the page they were originally trying to get to.
    They will only be forced to go to the login page if you secure the page they are trying to get to:
    <security-constraint>
         <web-resource-collection>
              <web-resource-name>Resources</web-resource-name>
              <description>Require users to authenticate</description>
              <url-pattern>/upload/filelist.jsf</url-pattern>
    </web-resource-collection>
    <auth-constraint>
    <description>Define who can access this url-pattern</description>
    <role-name>NTSB Users</role-name>
    </auth-constraint>
    </security-constraint>
    <login-config>
    <auth-method>FORM</auth-method>
    <realm-name>dot-ad</realm-name>
    <form-login-config>
    <form-login-page>/login.jsp</form-login-page>
    <form-error-page>/loginError.jsp</form-error-page>
    </form-login-config>
    </login-config>
    <security-role>
    <description>This role can access the edit</description>
    <role-name>NTSB Users</role-name>
    </security-role>

  • How does pacman know how to remove packages?

    I've been looking at the 'Creating Packages' page, and it says to create a pkgbuild I only need to specify the build function. My question is... how does pacman know which files to remove when you do pacman -R? Does it keep track of all the files that were installed via build()?
    Second question: How do you guys keep track of packages that weren't installed via the AUR? For example, if you want to hack on a project and use that hacked copy instead of the one available in the repos, what do you usually do? I'm guessing that I should let pacman keep track of those by creating pkgbuilds for them, naming them something like [packagename]-[version]-myown, and noting that it conflicts with the package in the Arch repos... is this correct?

    When you build a package with makepkg, the build function is responsible for installing the files that will be contained in the package under ${BUILD_DIR}/pkg. That directory will be tar'ed and compacted to make your final package. When you install it with pacman, will be created the file  /var/lib/pacman/local/<name of your package>/files which will list all the files owned by your package. So pacman can know how to remove them when you ask it to be deleted.
    About your 2nd. question, you are quite right. The only correction is that the name of your new package should be something like "package-myown-version". You should put the old name in the conflicts and provides directive of the PKGBUILD. You should read the wiki about ABS. With it, you can get a copy of all PKGBUILDS for your current repositories, so you can change what pleases you more.

  • How Do I Know If All Email Deleted is Really Deleted?

    I use a mid 2012 Mac Pro; run Mavericks, Mail 7.3.  How do I know if all email deleted is really deleted from my hard drive?

    How deleted do you need it to be?
    QuickTimeKirk says it may never have been stored on your Mac.  This assumes your mail connection is via IMAP, which keeps the mail on the mail server.
    If you were using POP connection for mail, then your mail would be stored in
    Finder -> Go -> Go to folder -> ~/Library/Mail
    and
    Finder -> Go -> Go to folder -> ~/Library/Mail Downloads
    Any file deleted, will just have its name in the directory removed, and the storage given back to the file system to reuse at a future date.  Until the file system gets around to reusing the storage, it will still have the contents of the email written on it.
    If you are using System Preferences -> Security -> FileVault, then the deleted storage will just be encrypted random bits.  Otherwise, it may be possible to recovery the email with the right specialized tools and enough time and money, right up until the storage is reused for another file (and even then with a lot more money and time, it may be possible to recover the email; when I say a lot more money, I really a whole bunch of money).
    You can use Disk Utility to "Erase Free Space".  This cause Disk Utility create a file, then grow that file until all the unused storage, including your deleted email are allocated to this file.  The file is overwritten with an erase pattern, and then Disk Utility deletes the file, and now all the unused storage contains a random bunch of erase pattern bits in them.
    If you are using an SSD (Solid State Disk), then due to the way SSD storage is managed, it is next to impossible to insure that the data is erased, and because SSD's have a limited number of writes before they start to fail, Disk Utility does no provide the Erase Free Space option, so as not to prematurely shorten the life of the SSD.  With an SSD the only way to be sure something cannot be recovered is to keep the disk encrypted using System Preferences -> Security -> FileVault.  And you would have had to do that BEFORE the email was written to the SSD, not after.
    So, how deleted do you need it to be?

  • How does he know ? (pacman and package names)

    i take a package from pacman cache on box 1
    i rename it from say xorg-1.4.0.pkg.tar.gz to xorg14-1.4.0.pkg.tar.gz
    i pacman -U it on box 2
    pacman on box 2 : upgrading xorg ###############33
    how does he know its xorg and not xorg14 ? (there seem to be only the actual files of the application inside)
    how do i rename the package so that pacman really understands its xorg14 and not xorg ?

    several reasons
    i hate ignorepkgs (and the trouble they can make if some dependency escapes out of what you ignorepkg'd)
    i have multiple (varying between 5 - 9) boxes that run arch + 3 family / friends boxes with arch that i am the support guy for. when a bad or unexpected update was out (dhcpcd kde4 xorg lib/include/asm etc) it was bad for most or all of the boxes - so i want a solution for all at once
    i install from scratch a lot (i naturally have skill of breaking my system to irrecoverable state and with the recent updates of arch its even more cause i swap hard drives). i prefer to have a custom mirror on my usb flash drive
    i want to be able to give this mirror easily to others too - like that guy that made the kde 3 mirror

  • I Cloud. How does it know my various Macs?

    I Cloud lets one purchase an Op and it will appear on all my MAC devices. How does it know all my MAC devises?

    You would have to be signed in with the same Apple ID in iCloud settings in System Preferences on each Mac.

  • How does oracle know which AO Framework page or process to execute.

    Hi,
    How does oracle know which AO Framework page or process to execute. I use to think this was defined in the Function definition. But looking through some Function definition in HRMS setup I noticed some of them simply calling the same first page, such as the one below used in many managers menus. This initial page is the page that allows managers to choose the employee they want to work on.
    OA.jsp?akRegionCode=HR_PERSON_TREE_TOP_SS&akRegionApplicationId=800.
    My question is, after executing this initial page, how does Oracle then varies the OA page by the diffferent functions?

    Hi;
    Thanks for sharing
    Please dont forget to change thread status to answered if it possible when u belive your thread has been answered, it pretend to lose time of other forums user while they are searching open question which is not answered,thanks for understanding*
    Regard
    Helios

  • How does firefox know to fill in my credit card details in a webpage? i don't like it to keep them on file.

    how does firefox know the details of my credit card to fill in a web form.? how can I prevent firefox from keeping a copy of my credit card numbers?
    == This happened ==
    Not sure how often
    == i previously filled in the same web page a month ago.

    See [[Form autocomplete]]
    http://kb.mozillazine.org/Deleting_autocomplete_entries

  • How does Siri know where my office is

    Ok I just got my iPhone 4s and I can't work out how to get Siri to remind me to do something when I get to the office.
    How does Siri know when I'm at the office
    How does Siri know I'm at home
    How does Siri know I am at a particular place.
    I know how to get Siri to do a reminder by using time, but the adverts say "office" so how does it know
    Any help appreciated for a new 4s user :-)

    Put your office location in your contacts by itself with a label of office or work. Or associate it as office or work like you do with wife and kids and such.

  • How does WebLogic know it needs XA transaction?

    I've been informed that Weblogic 8.1 "knows" whether it needs to start a global XA transaction or not when it starts a transaction...sparing the overhead of an XA transaction if it is not needed.
              Is this a true statement?...and if so...how does it know that distributed resources will be used in the transaction when it is starting the transaction?
              The main reason I ask is that we are wondering if there is any way to avoid using the XA driver for "every" transaction, when we only need it less than 1% of the time. We would like to avoid the overhead that is introduced with XA.

    WebLogic always performs XA operations, it looks at the resource and checks if it implements the XAResource interface, if it does it uses the XA operations with that resource otherwise the operations will just be a null op.
              So it depends on what resources you use in the tx. If you mix, XA and Non-XA resources in the tx, you may hit heuristic exceptions and inconsistentcies in your data which you will have to manually correct. Also you loose the ability to recover any transactions.

  • Does anyone know why all of a sudden any new parent divs I add won't display in browser preview?

    Does anyone know why all of a sudden any new parent divs I add won't display in browser preview?

    yes styles are applied. What does not show up are the container divs - they all have the thin purple borders.
    The "Blog Lovers" image shows up but it is inside the #blogindex div - which seems to be invisible because the elements inside #blogindex div are just piled on top of each other. (see below html) This is now happening on all the pages of this site.
    (I test a different site in DW and I was able to add divs and borders and content inside divs just fine.)
    <!-- start #blogindex --> 
         <div id="blogindex">
            <div id="blog_image1"><img src="images/bloglovers.gif" alt="Blog Lovers" /></div>   
             <div id="blog_image2"><img src="images/gcblogheader350x70.jpg" alt="Gina Charles Blog" /></div>
          <div id="blogindex_text">
          <p class="blackbolditalic">Visit the blog for happenings, highlights and conversation! </p></div>
          </div>     
       <!-- end #blogindex -->
    http://www.newworldapparel.com/tests/  -scroll 1/2 way down page to see the "Blog Lovers" pile up!

  • How does apple know what the fault is with my iphone?

    How does apple know what the fault is with my iphone when sending it to them on apple care. My sleep/ wake button seems to be stuck so I sent in for a repair on the website and they sent me a apple care box and said send it back but I Carnt remember if I told them the fault or do they know by the repair ID number? Please help as I'm sending it off in a couple of day.

    Include a note in the shipping box describing in detail the issue you have with the phone. Include your name, address, phone number, email, iPhone model and serial number, and a detailed explanation of the problem.

  • Does anyone know why all of my picture text message would keep failing to send?

    Does anyone know why all of my picture text messages would keep failing to send?

    do you have the necessary mms option from your provider?

  • How does oracle know the databse is inconsistent and needs recovery?

    Hello,
    How does Oracle know that the datafiles are inconsistent and db needs recovery when rebuilding the db off of the online/hot backups? Whereas, it doesn’t ask for recovery when rebuilding the database from cold backup (I understand that, for cold backup, database is shutdown immediate and hence the db is consistent). In both scenarios, a new control file is created (that means it won’t have SCN) and only datafile header will have the SCN. What’s that piece of info that oracle check to know if the database is consistent or inconsistent during the backup restore and recovery and where that info resides?
    Thank you for any hints and answers.
    Jay

    Oracle uses the datafiles to identify if they are consistent. If the datafiles backup was taken when the database was OPEN, they are marked as "fuzzy" in the header. Also, likely, the Checkpoint SCNs may be different if tablespace checkpoints (e.g. by ALTER TABLESPACE BEGIN BACKUP) are at different points in time.
    If the backup was a cold backup with the database shutdown normal/immediate, the headers are marked appropriately.
    When you run CREATE CONTROLFILE, it has to read the datafiles because the controlfile, itself, has no SCN and LogSequenceNumbers information.
    Hemant K Chitale

  • How does one know if the latest Camera Raw is included Photoshop CC?

    How does one know if the latest Camera Raw is included  with Photoshop CC?

    Help>About Plug-In>Camera Raw...

Maybe you are looking for

  • Performance issue in guest access anchored in DMZ

    Hello, I've been having performance issue in our wifi guest network anchored in the DMZ. I have 3-5508 anchor controllers behind the Checkpoint gaia firewall and have 24 guest SSIDs in here. Right now, only 14 guest SSIDs are enabled and tunnelled ou

  • Screen Resolution & Beep Sound

    Mine is T400 bought in NUS, Vista OS. Very happy experience using this fatastic laptop, only a few minor questions First question is How I can set my screen resolution high than 1280*800, which is right now the highest I can find on the display setti

  • Data Block

    Hi,As we all know data block is a combination of the sparse Dimension. IF i make a level 1 member of a sparse dimenison as a Dynamic Calc. Then i wanted to know how essbase will create a data block for that block. If if we perform calculation on it t

  • Animation Keyframes BUGGING OUT when modified

    Windows 7, 64bit Edge Animate CC 2014.1 I created a successful banner ad with png images that has position, opacity and clip animation. I wanted to tweak the timeline to extend the duration at the beginning and end an extra second, but when doing so

  • Boston Globe preview in both newsstand and app store is frozen.  How do I get out of it?

    Am new user.  Went into Newsstand to look at Boston Globe App.  It froze in both Newsstand and App Store.  Cannot release it to get back to main page.  Help