PLEASE HELP - Production ColdFusion server down

I've been running CF 8.0.1 on a Windows 2008 server for over 2 years with no problems.  Tonight, IIS 7 locked up for the first time and I had to kill off the process.  Afterwards, I started getting this on all requests for .cfm pages:
The service is unavailable
Server Error
Either the Macromedia application server(s) are unreachable or none of them has a mapping to process this request.
The server *can* still serve up .html files.
I've tried rebooting and using the Web Server Configuration Tool to remove and re-add the connector but neither has fixed the problem.  The last time I ran the tool, I enabled "verbose logging for connector".
I see the following in the jrun_iis6_wildcard111221.log file:
2011-12-21 02:00:40 jrISAPI[4128:2184]  ***HttpExtensionProc for JRun ISAPI Extension: uri is "/index.cfm"
2011-12-21 02:00:40 jrISAPI[4128:2184]  trying to bootstrap from "127.0.0.1:51800"
2011-12-21 02:00:40 jrISAPI[4128:2184]  127.0.0.1:51800 initPool finished
2011-12-21 02:00:40 jrISAPI[4128:2184]  initialized temp proxy for 127.0.0.1:51800
2011-12-21 02:00:40 jrISAPI[4128:2184]  127.0.0.1:51800 jrConnect [376]
2011-12-21 02:00:40 jrISAPI[4128:2184]  sent/avail/result 25/25/25
2011-12-21 02:00:40 jrISAPI[4128:2184]  recv failed[376]: 10054 Connection reset by peer
2011-12-21 02:00:40 jrISAPI[4128:2184]  read/len/total -1/4/0
2011-12-21 02:00:40 jrISAPI[4128:2184]  127.0.0.1:51800 destroying/closing socket [376] error 10054
2011-12-21 02:00:40 jrISAPI[4128:2184]  jrCloseSocket [376]
2011-12-21 02:00:40 jrISAPI[4128:2184]  JRun closed connection. [376] dropped while sending command
2011-12-21 02:00:40 jrISAPI[4128:2184]  127.0.0.1:51800 could not fetch clustered-servers
2011-12-21 02:00:40 jrISAPI[4128:2184]  127.0.0.1:51800 destroyed.
2011-12-21 02:00:40 jrISAPI[4128:2184]  used thread identity to open file C:/ColdFusion8/runtime/lib/wsconfig/1/jrunserver.store
2011-12-21 02:00:40 jrISAPI[4128:2184]  loadServersFromStore(C:/ColdFusion8/runtime/lib/wsconfig/1/jrunserver.store)
2011-12-21 02:00:40 jrISAPI[4128:2184]  Couldn't initialize from remote server, JRun server(s) probably down.
2011-12-21 02:00:40 jrISAPI[4128:2184]  ExecUrl: request received: URL=/index.cfm
2011-12-21 02:00:40 jrISAPI[4128:2184]  ExecUrl Completion: 503, URL=/index.cfm.
I *can* telnet to port 51800 but don't know how to test that any further.
I would be extremely grateful to any suggestions on what I should try next as this is a production server for a fairly large international company.

In that case, you may have to remove the connectors manually. The connector is installed within CF's directory (something like c:\coldfusion9\runtime\lib\wsconfig in the standalone install if I recall correctly) and obviously settings for that connector are installed in IIS. In the case of IIS 7, those settings end up in one of the .config files (web.config, applicationHost.config, machine.config depending on what options you selected).
Is this documented anywhere?  I'd very much like to understand this but am not sure I'd find all the components by hunting around.  I know about the handler mappings but I'm curious what else is involved.
Not that I'm aware of, but those are the two locations where everything is.
Is the jrun_iis6_wildcard111221.log file one of these?  I guess I'm not quite sure what software components make up the "connector".  I know there's an ISAPI filter/extension and some handler mappings but am not sure what else.  I'd love to see a technical document that details all of this.
Yes, that's one of the files that makes up the connector. The connector consists of a couple of DLLs and a bunch of text files. On the CF server side, the port that the connector talks to is the JrunProxyServer port in jrun.xml (if I recall correctly).
Dave Watts, CTO, Fig Leaf Software

Similar Messages

  • PLEASE HELP!! Drop Down Menu Using Photoshop Images

    I have hit a brick wall in trying to work this out, and it is
    killing my productivity, I just need to get through this hurdle on
    this site, and I can finish it.
    Quick rundown on where I'm at:
    I created the website to look how I wanted in Photoshop.
    After I've gotten it looking how I want, I bring it into fireworks
    and slice it up (I'm sure this step can be skipped, but thats how
    I'm used to it), and then I export it into Dreamweaver.
    All of that is working fine, except for this drop down menu.
    All I'm wanting to happen is when they roll their mouse over "firm
    profile" for example, for there then to be a drop down menu that
    drops below it (no animation necessary) that has 2 additional
    options they can select.
    I have created what the page would look like after the drop
    down menu would come up (in photoshop). I've tried doing swap
    images and menu bars and some scripts from the net etc etc but
    nothing works. It either tries to load the drop down menu WITHIN
    the slice where it says "firm profile" instead of below it, or just
    messes up completely.
    In fireworks, I'm able to setup a swap image where when you
    put your mouse over "firm profile" it asks which slice you want the
    new swap image to come up in, which would work fine EXCEPT that
    when you go to select one of the bottom submenu options, the
    rollover disapears. If you do it where the whole slice is switched,
    then that submenu appears when you rollover where it would be, even
    if you haven't first rolled over "firm profile"
    So to summerize: All I want is to be able to tell it when you
    put your mouse over "FIRM PROFILE" that underneath it , a drop down
    menu image that I have already created pops up, and you are able to
    1) select the sub menu items (urls). I feel that this should not be
    anywhere near this hard.
    Please help.

    cdeatherage wrote:
    I just realized--and Murray correct me where I stray--I may have intimated what you want to do is not very complicated. It will be a bit involved, actually. You are probably going to have to set up an id for each menu item so that you can apply the applicable image to the link state for each button. That is to say, your images for Menu Item 1 are going to be different than for Menu Item 2, so you are going to have to code individual link states for each button rather than rely on a global state. I think you can still do what you have designed, but you will likely have much frustration getting there if you are not comfortable writing code. Perhaps what might be easier for you is to use text in the html code for each menu item and then globally apply one background image for the a: state, another for the hover state, etc.
    Hope I'm making sense.
    Chris
    Yes that does make sense - and is exactly the thought I was coming round to.

  • Please help with Forms server and forms

    Hi, all
    I am new to oracle.
    Mine is home PC and the spec. of the system are as follows.
    database:Oracle 8i EE
    Forms :6i
    OS :Windows 2000
    Yesterday I downloaded Oracle9iAS Server and followed the documentation in installing.
    As per the documentation, I accepted default values in many cases and went thru with installation.
    At the end of the installation, i got the following config(found at the bottom of the message).
    Please give me steps in resolving the issues below.
    Also,
    when I run the "Run form from web" from Programs....
    what if the web listener port is taken. how do we figure out if one is already in use and if so what are other ports available to me.
    and finally in the same app. is "Web Host" the name of my computer on which I installed the Oracle server?
    TIA
    Shankar
    Configuration Steps for Oracle Forms installation of 00:44:38 2002/05/01
    This file gives details of the configuration steps done for you by the installation process
    (marked '[INFO]') and of any actions you need to do manually (marked '[ACTION]'). Please read
    this file and perform the requested actions.
    [ACTION] If you are installing in a new Oracle Home, please reboot the machine after the installation.
    [ACTION] Please configure the following virtual path with your web listener: /dev60temp for
    physical directory C:\shankar\6iForms\F6i\tools\web60\temp.
    [INFO] NT service Oracle Forms Server [Forms60Server-6Web] has been created and started for
    the Forms Server.
    [ACTION] Please configure the following virtual path with your web listener: /forms60java for
    physical directory C:\shankar\6iForms\F6i\FORMS60\java.
    [ACTION] Please configure the following virtual path with your web listener: /dev60html for
    physical directory C:\shankar\6iForms\F6i\tools\web60\html.
    [ACTION] Please configure the following virtual path with your web listener: /dev60cgi for
    physical directory C:\shankar\6iForms\F6i\tools\web60\cgi.
    [INFO] An internet shortcut to run a standard test form, or any form of your choice, has been
    created for you in the Oracle Forms program group.
    [ACTION] Please configure the following virtual path with your web listener: /jinitiator for
    physical directory C:\shankar\6iForms\F6i\JINIT.

    Thanks, Vikas!
    But I did a search for 6iServer.conf and did NOT locate any such file
    Please help
    TIA
    SHANKAR
    Shankar,
    It would have helped if you had indicated what is the full version of 9iAS that you have installed. By default the portnumber that is used is 7778.
    As per the entries, they should have already been made in the config files. But check that the 6iServer.Conf file and it should contain the entries that you are being told to update. If not, then add the entries in the 6iServer.conf file and that is all you need.
    HTH.
    Vikash

  • Please help!  Lightroom shuts down and re-starts EVERY time I export a file

    I've used Lightroom for 2 years and it only started happening TODAY!  I need to edit my pictures in photoshop, but I can't get them from Lightroom because every time I hit the export button it starts the process and then my computer shuts down and then re-starts after a few seconds.  Why?  How can I fix it.  I'm a wedding photographer and need these pictures edited!  Any help is appreciated.

    Check in the same folder/directory as your active .lrcat: there should be no xxxx.lock file when LR is quit; there should be one opened when LR is launched. Other than also deleting your Prefs file, perhaps the OS and version of LR would help.

  • Please help with a server error

    Server Error in '/' Application.
    Runtime Error
    Description: An application error occurred on the server. The current custom error settings for this application prevent the details of the application error from being viewed remotely (for security reasons). It could, however, be viewed by browsers running on the local server machine.
    Details: To enable the details of this specific error message to be viewable on remote machines, please create a <customErrors> tag within a "web.config" configuration file located in the root directory of the current web application. This <customErrors> tag should then have its "mode" attribute set to "Off".
    <!-- Web.Config Configuration File -->  <configuration> <system.web> <customErrors mode="Off"/> </system.web> </configuration>
    Notes: The current error page you are seeing can be replaced by a custom error page by modifying the "defaultRedirect" attribute of the application's <customErrors> configuration tag to point to a custom error page URL.
    <!-- Web.Config Configuration File -->  <configuration> <system.web> <customErrors mode="RemoteOnly" defaultRedirect="mycustompage.htm"/> </system.web> </configuration>

    Hello,
    So, tell us more... what services are you sharing, is this a NetBoot? Admin account? What App is reporting this?
    Open Console in Utilities & see if there are any clues or repeating messages when this happens.

  • Please help with mail server choice and setup

    Hello dear arch users, for begining i`ll start with litle intro what i know, and what i dont understand, so it would be easyer to help solve my problem, thanks for reading this.
    I've been using arch for some time (few months) but i still dont know very much about it..
    I have successfully installed lighttpd+php (fcgi)+mysql+phpmyadmin, ssh and mc allso of cource, serveral times, so i know how to solve little problems
    I need everything lightweight because my arch's box is not so fresh as i could want
    p2 350mhz CPU
    192mb of RAM
    8Gb HDD
    10Mbit internet connection
    whole project is for personal use only, and it will not even reach 10 user limit (me and some friends are using this..)
    Now i`m willing to install mail server with some webmail ( i dont like outlook express thunderbird and other clients, only web acces)
    I have googled for tutorials for 2 days now, just looking for best thing for newbie like me, with little knowlage of linux.
    SquirrelMail or RoundCube wich one is bether ? I like RoundCube because it has nicer web design, but is it bether that SquirrelMail ?
    Postfix and Dovecot are they enough good, or is there anything bether ?
    Spamassasin and Graylistening will this work, or i`ll need something stronger?
    Did i miss anything ?
    I just want to say thanks for reading this, and helping me out. Thanks!
    ps will this be good enough tutorial to follow ? http://www.hypexr.org/linux_mail_server.php
    Karlis.
    Last edited by karlis (2010-01-10 13:49:14)

    Hi, thanks for response
    SSL certificate is generated ... ok so it wont be so hard to help here are my configs
    main.cf
    # Paths
    queue_directory = /var/spool/postfix
    command_directory = /usr/sbin
    daemon_directory = /usr/lib/postfix
    mail_owner = postfix
    # Domain settings
    myhostname = <mydomain>
    myorigin = <mydomain>
    mydestination = $myhostname, localhost.$mydomain, localhost
    # SMTP settings
    smtpd_tls_cert_file=/etc/ssl/certs/mail.crt
    smtpd_tls_key_file=/etc/ssl/private/mail.key
    smtpd_use_tls=yes
    smtpd_tls_session_cache_database = btree:/var/lib/postfix/smtpd_scache
    smtp_tls_session_cache_database = btree:/var/lib/postfix/smtp_scache
    smtpd_tls_loglevel = 1
    smtpd_sasl_auth_enable = yes
    smtp_sasl_auth_enable = yes
    smtpd_recipient_restrictions = permit_sasl_authenticated,
    permit_mynetworks,
    reject_unauth_destination,
    check_policy_service inet:127.0.0.1:10030
    smtpd_sender_restrictions = permit_sasl_authenticated, permit_mynetworks
    smtpd_sasl_security_options = noanonymous
    # SASL
    smtpd_sasl_type = dovecot
    smtpd_sasl_path = /var/run/dovecot/auth-client
    # Email and mailbox settings
    alias_maps = hash:/etc/postfix/aliases
    alias_database = $alias_maps
    home_mailbox = Maildir/
    virtual_alias_domains = <mydomain>
    virtual_alias_maps = hash:/etc/postfix/virtual
    mailbox_size_limit = 0
    dovecot.conf
    protocols = imap imaps
    disable_plaintext_auth = yes
    log_timestamp = "%b %d %H:%M:%S "
    ssl = yes
    ssl_cert_file = /etc/ssl/certs/mail.crt
    ssl_key_file = /etc/ssl/private/mail.key
    mail_access_groups = mail
    mechanisms = plain login
    socket listen {
    client {
    path = /var/run/dovecot/auth-client
    mode = 0660
    user = postfix
    group = postfix
    here are some of my config uncommented part, if its nececery i can zip and upload bouth configs to be 100% clear wheres the problem..
    Karlis
    Last edited by karlis (2010-01-13 18:02:23)

  • Please help with flascomm server plan

    Hello
    I need to broadcast with flashcomm an event for about 150-200
    users (I get
    the signal from a TV tuner and I send it to Flashcomm
    server). Currently I'm
    using Uvault (www.uvault.com) servers but I don't get the
    results I'd like.
    The problem is uvalt gives me up to 5 Mbs of peak bandwidth
    (I have hired
    Flash Media Server Plan 4) and I need a real-time streaming
    of the signal,
    so I'd like to be advised what should I do to get real-time
    streaming.
    Should I hire a Flash Video Plan to Uvault (I really don't
    know how does it
    work) or shuold I hire a plan with any other company. Could
    you tell me
    about other companys that can offer me a higher bandwidth to
    get the real
    time streaming I need?
    Thank you everybody

    If you are talking about their shared Flash Media Server plan
    then that
    could be the problem: it is shared and you are subject to the
    server dealing
    with other users and demand peaks. Perhaps looking at a
    dedicated plan is
    the way to go.
    You might look over the hosting list at
    http://flashcomguru.com/articles/hosts.cfm
    Lon Hosford
    www.lonhosford.com
    Flash, Actionscript and Flash Media Server examples:
    http://flashexamples.hosfordusa.com
    May many happy bits flow your way!
    "Dpto. Programaci�n Prodigia Consultores"
    <[email protected]> wrote
    in message news:e6piae$ce0$[email protected]..
    > Hello
    >
    > I need to broadcast with flashcomm an event for about
    150-200 users (I
    > get the signal from a TV tuner and I send it to
    Flashcomm server).
    > Currently I'm using Uvault (www.uvault.com) servers but
    I don't get the
    > results I'd like. The problem is uvalt gives me up to 5
    Mbs of peak
    > bandwidth (I have hired Flash Media Server Plan 4) and I
    need a real-time
    > streaming of the signal, so I'd like to be advised what
    should I do to get
    > real-time streaming. Should I hire a Flash Video Plan to
    Uvault (I really
    > don't know how does it work) or shuold I hire a plan
    with any other
    > company. Could you tell me about other companys that can
    offer me a higher
    > bandwidth to get the real time streaming I need?
    >
    > Thank you everybody
    >

  • URGENT PLEASE HELP: Broker only serving one queue consumer at a time

    Hello all,
    I have multiple consumers listening on a queue. The broker sends a message to the first listening consumer. This consumer receives that message and acknowledges it. and does some processing with it.
    All other consumers do not get any message from the broker. They are all listening on the queue for a long time. After i kill the first consumer one of the listening consumer gets a message.
    How can I configure the queue so that it sends multiple (different) messages to all the listening consumers with minimum delay?
    I am using a persistent queue and using 3.5 sp2 on windows.
    Thanks a lot in advance

    Sounds like your number of active consumers is set to 1 which is the default. Use imqcmd to set the maxNumActiveConsumers on your queue. The Platform Edition supports up to two active and one backup consumer. The Enterprise Edition does not have any limits.

  • Please please help My iPad fell down and i broke the glass..... what should i do?? can i repair it?? in India??

    oh god..... i dont know what to do anymore!!!!!! it was an accident i swear.!.. but can i fix it??? in India????

    Apple does not repair iPads, but will replace the entire iPad for a flat fee. You will need to contact an authorized Apple service center in India. See this web page:
    https://locate.apple.com/in/en/
    There are independent iPad repair services that may be able to replace the screen for less. Do a web search for "ipad repair".  Note, though, that if you elect to have the iPad serviced by an unauthorized shop, all further warranty will be void.
    Regards.

  • My one to one page won't load. server down??

    trying to access one to one page (my last mac ran brontosaurus OS I, so I need help).  Is server down or is it just me?

    No, you are not alone!
    If you are in the U.S. there's an 800 # you can call here > http://store.apple.com/us/browse/campaigns/onetoone

  • My phone just shut off and will not turn back on but I do not want to loose all my stuff...please help!!

    Please help - my phone shut down a few hours ago and will not turn back on....I am scared to reset (home and power button) because I do not want to loose any of my info, pictures, contacts, etc

    first thing to do is plug it in and let it sit for a little while.  if the battery was drained and you plug it in it will need to charge up a little bit before it will turn on.

  • Production issue; Please HELP !!! ...weired error while starting WLS8.1 server

    Hi All/Rob,
    Iam running WLS8.1+SP2 and i have 4 clusters each of these clusters contains 4
    managed servers.
    Now, iam getting a weired error when starting each of the instances ......this
    is the Exception that iam getting:
    PLEASE HELP AS THIS IS OUR PRODUCTION ISSUES ........
    <Feb 25, 2004 11:42:29 AM EST> <Notice> <Security> <BEA-090082> <Security initializing
    using security realm myrealm.>
    <Feb 25, 2004 11:42:30 AM EST> <Notice> <WebLogicServer> <BEA-000328> <Starting
    WebLogic Managed Server "rsa_nova1t_s1" for domain "Mah-sub">
    Failed setting Group
    <Feb 25, 2004 11:42:39 AM EST> <Error> <Security> <BEA-090031> <Failed to Switch
    to Group rsaadmin.>
    Failed setting user
    <Feb 25, 2004 11:42:39 AM EST> <Error> <Security> <BEA-090033> <Failed to Switch
    to User rsaadmin.>
    <Feb 25, 2004 11:42:39 AM EST> <Notice> <Cluster> <BEA-000138> <Listening for
    announcements from cluster RSA on 237.0.3.11:8001.>
    <Feb 25, 2004 11:42:39 AM EST> <Notice> <Cluster> <BEA-000133> <Waiting to synchronize
    with other running members of RSA.>
    <Feb 25, 2004 11:43:21 AM EST> <Warning> <HTTP> <BEA-101247> <admingui.war: Public
    ID references the old version of the Servlet DTD. You must change the public ID
    in web.xml file to "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN".>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000355> <Thread
    "ListenThread.Default" listening on port 8020, ip address 153.2.252.189>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <Cluster> <BEA-000102> <Joining cluster
    RSA on 237.0.3.11:8001>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000330> <Started
    WebLogic Managed Server "rsa_nova1t_s1" for domain "Mah-sub" running in Production
    Mode>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000360> <Server
    started in RUNNING mode>
    <Feb 25, 2004 12:02:23 PM EST> <Error> <Cluster> <BEA-000110> <Multicast socket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    >
    <Feb 25, 2004 12:03:38 PM EST> <Error> <Cluster> <BEA-000110> <Multicast socket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    >
    <Feb 25, 2004 12:09:11 PM EST> <Error> <Cluster> <BEA-000139> <There are two clusters
    in the network that are possibly running different versions of WebLogic Server.
    These two clusters probably name the same RSA and they are using same address
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:09:37 PM EST> <Error> <Cluster> <BEA-000110> <Multicast socket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    >
    <Feb 25, 2004 12:09:59 PM EST> <Error> <Cluster> <BEA-000139> <There are two clusters
    in the network that are possibly running different versions of WebLogic Server.
    These two clusters probably name the same RSA and they are using same address
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:10:09 PM EST> <Error> <Cluster> <BEA-000110> <Multicast socket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    >
    <Feb 25, 2004 12:12:43 PM EST> <Error> <Cluster> <BEA-000139> <There are two clusters
    in the network that are possibly running different versions of WebLogic Server.
    These two clusters probably name the same RSA and they are using same address
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:13:31 PM EST> <Error> <Cluster> <BEA-000139> <There are two clusters
    in the network that are possibly running different versions of WebLogic Server.
    These two clusters probably name the same RSA and they are using same address
    237.0.3.11 and port 8001.>

    Rob,
    Each cluster uses UNIQUE IP address ......but here is the information that iam
    getting .....if that is in any way related to this problem ....i ran this command
    bash-2.03# java -cp /xx/bea/weblogic81/server/lib/weblogic.jar utils.MulticastTest
    -A 237.0.3.11
    ***** WARNING ***** WARNING ***** WARNING *****
    Do NOT use the same multicast address as a running WLS cluster.
    Starting test. Hit any key to abort
    Using multicast address 237.0.3.11:7001
    Will send messages under the name 1077733276 every 2 seconds
    Will print warning every 600 seconds if no messages are received
    I (1077733276) sent message num 1
    I (1077733276) sent message num 2
    Received message 2 from 1077733276
    I (1077733276) sent message num 3
    Received message 3 from 1077733276
    I (1077733276) sent message num 4
    Received message 4 from 1077733276
    I (1077733276) sent message num 5
    Received message 5 from 1077733276
    I (1077733276) sent message num 6
    Received message 6 from 1077733276
    I (1077733276) sent message num 7
    Received message 7 from 1077733276
    Rob Woollen <[email protected]> wrote:
    First thing to check is that each cluster has its own multicast address.
    It looks like the server is complaining that multiple clusters are using
    237.0.3.11 and port 8001
    -- Rob
    steve wrote:
    Hi All/Rob,
    Iam running WLS8.1+SP2 and i have 4 clusters each of these clusterscontains 4
    managed servers.
    Now, iam getting a weired error when starting each of the instances......this
    is the Exception that iam getting:
    PLEASE HELP AS THIS IS OUR PRODUCTION ISSUES ........
    <Feb 25, 2004 11:42:29 AM EST> <Notice> <Security> <BEA-090082> <Securityinitializing
    using security realm myrealm.>
    <Feb 25, 2004 11:42:30 AM EST> <Notice> <WebLogicServer> <BEA-000328><Starting
    WebLogic Managed Server "rsa_nova1t_s1" for domain "Mah-sub">
    Failed setting Group
    <Feb 25, 2004 11:42:39 AM EST> <Error> <Security> <BEA-090031> <Failedto Switch
    to Group rsaadmin.>
    Failed setting user
    <Feb 25, 2004 11:42:39 AM EST> <Error> <Security> <BEA-090033> <Failedto Switch
    to User rsaadmin.>
    <Feb 25, 2004 11:42:39 AM EST> <Notice> <Cluster> <BEA-000138> <Listeningfor
    announcements from cluster RSA on 237.0.3.11:8001.>
    <Feb 25, 2004 11:42:39 AM EST> <Notice> <Cluster> <BEA-000133> <Waitingto synchronize
    with other running members of RSA.>
    <Feb 25, 2004 11:43:21 AM EST> <Warning> <HTTP> <BEA-101247> <admingui.war:Public
    ID references the old version of the Servlet DTD. You must change thepublic ID
    in web.xml file to "-//Sun Microsystems, Inc.//DTD Web Application2.3//EN".>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000355><Thread
    "ListenThread.Default" listening on port 8020, ip address 153.2.252.189>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <Cluster> <BEA-000102> <Joiningcluster
    RSA on 237.0.3.11:8001>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000330><Started
    WebLogic Managed Server "rsa_nova1t_s1" for domain "Mah-sub" runningin Production
    Mode>
    <Feb 25, 2004 11:47:33 AM EST> <Notice> <WebLogicServer> <BEA-000360><Server
    started in RUNNING mode>
    <Feb 25, 2004 12:02:23 PM EST> <Error> <Cluster> <BEA-000110> <Multicastsocket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    <Feb 25, 2004 12:03:38 PM EST> <Error> <Cluster> <BEA-000110> <Multicastsocket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    <Feb 25, 2004 12:09:11 PM EST> <Error> <Cluster> <BEA-000139> <Thereare two clusters
    in the network that are possibly running different versions of WebLogicServer.
    These two clusters probably name the same RSA and they are using sameaddress
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:09:37 PM EST> <Error> <Cluster> <BEA-000110> <Multicastsocket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    <Feb 25, 2004 12:09:59 PM EST> <Error> <Cluster> <BEA-000139> <Thereare two clusters
    in the network that are possibly running different versions of WebLogicServer.
    These two clusters probably name the same RSA and they are using sameaddress
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:10:09 PM EST> <Error> <Cluster> <BEA-000110> <Multicastsocket
    receive error: java.io.StreamCorruptedException
    java.io.StreamCorruptedException
    at java.io.ObjectInputStream$BlockDataInputStream.readBlockHeader(ObjectInputStream.java:2350)
    at java.io.ObjectInputStream$BlockDataInputStream.refill(ObjectInputStream.java:2383)
    at java.io.ObjectInputStream$BlockDataInputStream.read(ObjectInputStream.java:2455)
    at java.io.DataInputStream.readInt(DataInputStream.java:392)
    at java.io.ObjectInputStream$BlockDataInputStream.readInt(ObjectInputStream.java:2660)
    at java.io.ObjectInputStream.readInt(ObjectInputStream.java:900)
    at weblogic.cluster.MulticastManager.execute(MulticastManager.java:379)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170)
    <Feb 25, 2004 12:12:43 PM EST> <Error> <Cluster> <BEA-000139> <Thereare two clusters
    in the network that are possibly running different versions of WebLogicServer.
    These two clusters probably name the same RSA and they are using sameaddress
    237.0.3.11 and port 8001.>
    <Feb 25, 2004 12:13:31 PM EST> <Error> <Cluster> <BEA-000139> <Thereare two clusters
    in the network that are possibly running different versions of WebLogicServer.
    These two clusters probably name the same RSA and they are using sameaddress
    237.0.3.11 and port 8001.>

  • Can you please help to understand how the firefox decides on the Expires date for a cached javascript file ( my server did not set any Expire header, but firebox set it down).

    # Question
    Can you please help to understand how the firefox decides on the Expires date for a cached javascript file ( my server did not set any Expire header, but firebox set it down). I tried to understand but different javascript file gets different Expires date value when it is being cached. Please help me as I tried lot and could not get proper answer for this. Thanks in Advance.

    Try posting at the Web Development / Standards Evangelism forum at MozillaZine. The helpers over there are more knowledgeable about web page development issues with Firefox. <br />
    http://forums.mozillazine.org/viewforum.php?f=25 <br />
    You'll need to register and login to be able to post in that forum.

  • I believe that i have malware on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? please help. :-).

    i believe that i have malware (possible highjack of safari browser) on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? i have symnatic endpoint and, after scanning, it reveals nothing. please help. :-).

    are locked user files or that have incorrect permission a bad thing?
    Yes.
    why am i removing symantec?
    Short answer: Because it's worse than useless and worse than the imaginary "viruses" you're afraid of would be if they really existed. For the long answer, see below.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Production server down with corruption error

    Hi All,
    OS : Solaris 10
    Database : 10.2.0.3.0
    Our production server down out of sudden.Below are the errors :
    ORA-01242: data file suffered media failure: database in NOARCHIVELOG mode
    ORA-01122: database file 1089 failed verification check
    ORA-01110: data file 1089: '+DGVICTORIA/dixie/datafile/undotbs2.1222.702393987'
    ORA-01200: actual file size of 2580481 is smaller than correct size of 3932160 blocks
    My database is in No Archive log mode.
    Size of the database is more than 1 TB.
    Please help me to bring the database up.
    Thanks ,
    Vipin

    Hi Chinar,
    Yes this is true that no archiving is very dangerous. But because of space crunch we thought for no archiving.
    Here are the more alerts :
    Tue Jun 15 23:39:44 2010
    Errors in file /software/oracle/admin/dixie/bdump/dixie1_ckpt_12076.trc:
    ORA-01242: data file suffered media failure: database in NOARCHIVELOG mode
    ORA-01122: database file 1089 failed verification check
    ORA-01110: data file 1089: '+DGVICTORIA/dixie/datafile/undotbs2.1222.702393987'
    ORA-01200: actual file size of 2580481 is smaller than correct size of 3932160 blocks
    Tue Jun 15 23:39:44 2010
    Errors in file /software/oracle/admin/dixie/bdump/dixie1_ckpt_12076.trc:
    ORA-01242: data file suffered media failure: database in NOARCHIVELOG mode
    ORA-01122: database file 1089 failed verification check
    ORA-01110: data file 1089: '+DGVICTORIA/dixie/datafile/undotbs2.1222.702393987'
    ORA-01200: actual file size of 2580481 is smaller than correct size of 3932160 blocks
    Tue Jun 15 23:39:44 2010
    CKPT: terminating instance due to error 1242
    Tue Jun 15 23:39:44 2010
    System state dump is made for local instance
    System State dumped to trace file /software/oracle/admin/dixie/bdump/dixie1_diag_12015.trc
    Tue Jun 15 23:39:47 2010
    Trace dumping is performing id=[cdmp_20100615233944]
    Tue Jun 15 23:39:49 2010
    Instance terminated by CKPT, pid = 12076
    Wed Jun 16 09:16:39 2010
    Starting ORACLE instance (normal)
    LICENSE_MAX_SESSION = 0
    LICENSE_SESSIONS_WARNING = 0
    Interface type 1 e1000g3 192.168.10.0 configured from OCR for use as a cluster interconnect
    Interface type 1 e1000g0 10.192.252.0 configured from OCR for use as a public interface
    Picked latch-free SCN scheme 3
    Using LOG_ARCHIVE_DEST_10 parameter default value as USE_DB_RECOVERY_FILE_DEST
    WARNING: db_recovery_file_dest is same as db_create_file_dest
    Autotune of undo retention is turned on.

Maybe you are looking for

  • Posting date in J1IEX with option R07 - Internal Excise Invoice

    Hi CIN guys, I have one requirement with respect to J1IEX transaction -> Post -> R07 - Internal Excise Invoice. In J1IEX transaction, there is a field called "Posting Date" available in Header as editable under the tab "Excise Invoice", results user

  • HT201365 How to turn off the apps so that battery not running out fast with ios 7.0.2

    Im so regret to upgrade my ipad mini. The apps cant turn off n my battery is running out fast. What is the solution?

  • Disable BEx Analyzer in BPS layout

    Hi gurus, how to disable BEx analyzer toolbars in BPS manual layout? I mean: when i open BEx analyzer AND in another window a BPS0 layout system opens BEX analyzer even in layout, sometimes changing colors ecc..how to avoid BEX in bps layouts? tks Mi

  • DPS7: LDAP error code 52

    env: DPS7 on RH5. we are running into many types of connection issues...the following 3 are frequent.. 1. LDAP: error code 52 - Unable to read BIND response from server 2. LDAP: error code 52 - Unable to read SEARCH response from backend server : Con

  • Error message when opened in browser - Parse error?

    I'm having this problem when I use the image upload server behavior in my PHP file.  Anyone have an explanation of this error when I open it into a browser? Also there is a red exclamation point next to the server behavior.  Is there a place in Dream