SLA violations
Hello,
I am using osb in order to monitor my bpel process. I have define some sla alerts and the aggregation interval I use, is 1 minute. Every time a violation occurs
I see at the alert at the dashboard after one minute. I would like to know if it is possible to see the violation the time it occurs. it is very important not to wait for one minute in order to see if there is any violation.
Thanks in advance
If you don't want to use built-in monitoring functions because of unacceptable delay, then you can maybe implement your check in proxy. For example if you want to raise an alert when it takes too long for your business service to invoke, then you can compare time before service callout and after service callout and it difference is greater than x seconds, then you can raise alert. This way, there won't be any delay. The drawback is this approach is not usable in all cases and it's less flexible to make adjustments to than with SLAs.
Similar Messages
-
I can not make IP SLA to signal SNMP traps upon timeout
Hello team.
I want SNMP traps to be sent every time an IP SLA (ICMP) object times out. For that purpose, I carried out the following
ip sla monitor logging traps
ip sla monitor 1
type echo protocol ipIcmpEcho 10.1.1.254
timeout 1000
frequency 15
ip sla monitor schedule 1 life forever start-time now
snmp-server enable traps rtr
snmp-server host 10.1.1.10 mycommunity
But no SNMP trap is sent when the IP SLA object times out. ¿ Am I missing something?
Any help will be greatly appreciated.
Rogelio Alvez
ArgentinaSNMP traps for IP SLAs are handled through the system logging (syslog) process. This means that system logging messages for IP SLAs violations are generated when the specified conditions are met, then sent as SNMP traps using the CISCO-SYSLOG-MIB. The ip sla monitor logging traps command is used to enable the generation of these IP SLAs specific traps. The generation of IP SLAs specific logging messages is dependant on the configuration of the standard set of logging commands (for example, logging on). IP SLAs logging messages are generated at the "informational" system logging severity level.
The command ip sla monitor logging traps is sometime hidden and may not show with ?, so just copy and paste in global config mode and have logging on and check if any traps are generated.
-Thanks
Vinod
**Encourage Contributors. RATE them** -
Monitoring traffic but not use IP SLA
Dear everyone,
I have a problem. I make a leased line between ISP (Service Provider) to Customer. And customer want to monitor traffic on this link. I can use IP SLA to do it. But now, customer don't agree to open ICMP on this link so IP SLA fall
Can everyone help me to resolve it?SNMP traps for IP SLAs are handled through the system logging (syslog) process. This means that system logging messages for IP SLAs violations are generated when the specified conditions are met, then sent as SNMP traps using the CISCO-SYSLOG-MIB. The ip sla monitor logging traps command is used to enable the generation of these IP SLAs specific traps. The generation of IP SLAs specific logging messages is dependant on the configuration of the standard set of logging commands (for example, logging on). IP SLAs logging messages are generated at the "informational" system logging severity level.
The command ip sla monitor logging traps is sometime hidden and may not show with ?, so just copy and paste in global config mode and have logging on and check if any traps are generated.
-Thanks
Vinod
**Encourage Contributors. RATE them** -
How to include images in BAM reports
Hi all,
In Oracle 11g BAM , i can see some already existing Demo reports, i the Active Studio.
in that demo reports i can see a report called SLA Violation.Here in this SLA Vioaltion report there is Updating Orderded list within the list they are showing some images .
can some one help me how to add images like that..? or tell me the steps..
i tried creating the similar updating ordered list in my sample report and gave the image links gived in that demo report
" _switch({Process Due Soon SLA}) case(true):(<span style='width: 8px'><img src='../Images/TradeSubmitted.png'/></span><span style='padding-left: 4px;vertical-align:top;'>Submitted</span>) default( <span style='width: 8px'><img src='../Images/TradeFine.png'/></span><span style='padding-left: 4px;vertical-align:top;'>Fine</span>")_but in the updated ordering list instead of the image im getting entries like this " ):(<span style='width: 8px'><img src='../Images/TradeSubmitted.png'/></span><span style='padding"
Any suggestions on this is Really appreciated..
TIA,
Karthik
Edited by: karthik !! on 20 Jun, 2011 7:28 AMHi,
I have used four different ways to display images in my applications depending on which method is the fastest to refresh.
1. Under Application Attributes > Edit Standard Attributes > Substitutions enter your substitution string (MY_IMAGE_URL) and substitution value(http://somewhere/img)
and then in the region or template use the following syntax &MY_IMAGE_URL. in your html tags eg. img src="&MY_IMAGE_URL./banner.png" width="x" height="x">)
I have found this the best for image refresh speed, especially if the image is already cached.
2. Load your image up into Apex and don't associate it with any application and use the following tag img src="#WORKSPACE_IMAGES#banner.png" width="x" height="x" alt="">
Good for development as all images not associated to an application are available.
3. Load your image up into Apex and associate it with an application and use the following tag img src="#APP_IMAGES#banner.png" width="x" height="x" alt="">
This can be a pain during development when your application numbers continually change.
4. Use standard http address <img src="http://somewhere/banner.png" width="x" height="x">
Ben
Message was edited by:
Benton -
Could someone help me with the document which clearly explains the following reports of the app advisor in detail:
Client Side Monitoring
Application AJAX Calls Analysis
Application Analysis
Application Status
Client Latency Distribution
Load Time Analysis Based on Subnet
Summary Performance Analysis
Summary User Analysis
Problem Analysis Reports
Application Activity Breakdown
Application Daily Activity
Application Failure Breakdown by Functionality
Application Failure Breakdown by Resources
Application Heavy Resources Analysis
Application Slow Request Analysis
Day of Week Utilization
Hour of Day Utilization
Utilization Trend
Resource Utilization Analysis
Application CPU Utilization Analysis
Application IO Utilization Analysis
Application Memory Utilization Analysis
Application Request Utilization Analysis
Computer Application Load Analysis
Computer CPU Utilization Analysis
Computer IO Utilization Analysis
Computer Memory Utilization AnalysisHello !
Here is an extract of the descriptions of each Application Advisor report.
Application Advisor Reports
Application Performance Analysis
This report provides detailed performance analysis for a selected application. It shows the distribution of performance events based on duration. It highlights the top 5 functionality areas that lead to response time SLA violations and provides
further details about the root cause of performance slowdowns for each area. This report also provides an analysis of the top performance problems and groups those problems into application functionality areas.
Application Status
This report provides daily, weekly and monthly application status summaries. It shows major application activity and resource utilization KPI for a selected period in comparison to a dynamic baseline of previous periods. For applications
that experience problems during a selected report period, it provides drilldown to a detailed timeline graph of problem events for the selected period. This report also highlights new problems for the period and the most critical problem for the period.
Problems Distribution Analysis
This report shows the distribution of performance, connectivity, security and code problems across all monitored applications, highlighting the applications that are most problematic. For the applications that contribute to the majority of problems,
this report provides more details by showing application components and external dependencies that are the root cause of those problems.
Summary Failure Analysis
This report provides a breakdown of problems by application. For each application, it lists the top 5 problems and shows them as a percentage of the total problems. This report is a perfect example of the 80-20 rule, where 80% of all failures
happen due to 20% of the problems. This report highlights the top problems and allows management to concentrate on resolving the problems that affect their applications the most.
Summary Performance Analysis
This report provides a breakdown of performance violations by application. For each application it lists the top 5 problems and shows them as a percentage of total performance violations. This report is a good example of the 80-20 rule, where
80% of all failures happen due to 20% of the problems. This report highlights the top problems and allows management to concentrate on resolving problems that affect their applications the most.
Summary User Analysis
This report highlights the application users who experience most of the problems. For each user the report shows performance, connectivity, security and application failure problems. For performance problems the reports shows the top 5 problematic
requests for the selected user and how the response time for that user compares to the average response time for the system.
Client Side Monitoring
Application AJAX Calls Analysis
This report provides detailed failure analysis for a selected application. It highlights the 5 longest running AJAX calls with the average call processing time, average call size, and average latency. The call processing time is broken
down by network, server or client processing. This report also breaks down each of the calls by calling page, providing the average call processing time, average call size, and average latency on a per-page basis.
Client Latency Distribution
This report provides an analysis of client side performance in relation to network latency. Network Latency indicates the quality of a user connection by measuring the time for a packet of data to get from the server to the client browser. This
report correlates the number of performance violations experienced by users with network latency, highlighting network subnets where users experience most of the problems and providing network latency information for those subnets.
Load Time Analysis Based on Subnet
This report provides an analysis of client side performance based on client subnets. The report identifies client subnets where users experience most of the problems and shows a response time breakdown for those subnets. The report analyzes
the response time by breaking it down to Network, Server, DOM load, Peripheral Load and Java Script Processing times. The report provides further analysis by highlighting problematic pages and AJAX calls and shows a response time analysis for them.
Summary Performance Analysis
This report provides an analysis of performance violations by application. For each application it lists the top 5 problems for page requests, AJAX calls and Java Script actions and shows them as a percentage of total performance violations.
This report further breaks down the load time by network, server processing, DOM load, peripheral loading and Java script processing times.
Summary Size Analysis
This report provides an analysis of content size across multiple applications and shows the correlation between content size and load time. The content size is broken down by HTML size, HTC size, Image size, CSS size, Java Script size, and AJAX
size. The report provides further drilldown by showing information for the top 4 heaviest pages and the top 4 heaviest AJAX calls for each application.
Summary User Analysis
This report highlights the application users who experience most of the problems. For each user the report shows the exceptions and performance problems that were experienced by that user and how it compares to an average user experience. For
performance problems the reports shows the top 5 problematic pages for the selected user and how the user response time compares to the average response time for the system.
Problem Analysis Reports
Application Daily Activity
This report shows application activity trends for a selected day in relation to an application's activity during a previous period and average application activity. This reports allows detecting any unusual spikes in the number of requests,
average response time and number of errors.
Application Failure Breakdown by Functionality
This report shows the list of application requests that experience most of the problems. For each request this report provides drilldown into problems happening within the request, and includes information about the frequency of each problem.
Application Failure Breakdown by Resources
This reports provides failure analysis for distributed applications based on the application components and external resource dependencies. This report shows the percentage of application failures attributed to each application component and
external resource dependencies. It provides further drilldown into the problem list for each component and resource.
Application Heavy Resources Analysis
This report provides performance analysis for distributed applications based on the application components and external resource dependencies. For each application component and external resource dependency, this report shows the percentage
of application performance violations that happen due to the slow performance of a corresponding application component or external resource. It provides further drilldown into the performance violation list for each component and resource.
Application Slow Request Analysis
This report shows the breakdown of application performance violations based on application requests. For each application request, this report shows the number of violations along with average and maximum durations. It provides further drilldown
into the performance violation root cause within each request.
Day of Week Utilization
This report shows application activity trends and application resource utilization trends for a selected period.
Hour of Day Utilization
This report shows application activity trends and application resource utilization trends for a selected period.
Utilization Trend
This report shows application activity trends and application resource utilization trends for a selected period.
Resource Utilization Analysis
Application IO Utilization Analysis
This reports highlights applications that have the heaviest IO utilization and provides a breakdown of IO utilization based on the servers which host each application. It provides further drilldown to an analysis of the IO utilization timelines.
Application Memory Utilization Analysis
This reports highlights applications that have the heaviest memory utilization and provides a breakdown of memory utilization based on the servers which host each application. It provides further drilldown to an analysis of the memory utilization
timelines.
Application Request Utilization Analysis
This report provides an analysis of application based on the volume of processed requests. It highlights applications that process the highest volume of requests and shows how request volume correlates with CPU, Memory and IO utilization. This
report provides the utilization information for the selected application and for each server.
Computer Application Load Analysis
This report provides an analysis of servers based on the volume of processed requests. It highlights servers that process the highest volume of requests and shows how request volume correlates with CPU, Memory and IO utilization. This report
provides the utilization information for the selected server and for each monitored application. It provides further drilldown to an analysis of application load and resource utilization timelines.
Computer CPU Utilization Analysis
This reports highlights servers that have the heaviest CPU utilization and provides a breakdown of CPU utilization based on the monitored applications running on each server. This report provides further drilldown to an analysis of the CPU utilization
timelines.
Computer IO Utilization Analysis
This reports highlights servers that have the heaviest IO utilization and provides a breakdown of IO utilization by monitored applications running on each server. It provides further drilldown to an analysis of the IO utilization timelines.
Computer Memory Utilization Analysis
This reports highlights servers that have the heaviest memory utilization and provides a breakdown of memory utilization based on the monitored applications running on each server. It provides further drilldown to an analysis of the memory utilization
timelines.
Hope this helps.
Note: This posting is provided 'AS IS' with no warranties or guarantees, and confers no rights. Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable. This helps the community, keeps the forums tidy, and
recognises useful contributions. -
What is SAP ESB (Enterprise Service Bus)?
Hi fellow sdners gurus I have been reading threads about SAP SOA and ESB.
I do not want to start a debate on wether XI is an ESB, but more of a statement to what is SAP ESB (if XI it is, then be it).
1) What is SAP ESB (Enterprise Service Bus) today (I could not find a clear answer to is)?
2) Who uses this SAP ESB in production currently and what kind of environment (i.e. strictly SAP backend systems, or combination of various vendors backend systems)?
Can someone share some light on this topic?
As a reminder, an ESB is expected to exhibit the following characteristics (source Wikipedia):
It is usually operating-system and programming-language agnostic; for example, it should enable interoperability between Java and .NET applications.
It uses XML (eXtensible Markup Language) as the standard communication language.
It supports web-services standards.
It supports various MEPs (Message Exchange Patterns) (e.g., synchronous request/response, asynchronous request/response, send-and-forget, publish/subscribe).
It includes adapters for supporting integration with legacy systems, possibly based on standards such as JCA
It includes a standardized security model to authorize, authenticate and audit use of the ESB.
To facilitate the transformation of data formats and values, it includes transformation services (often via XSLT or XQuery) between the format of the sending application and the receiving application.
It includes validation against schemas for sending and receiving messages.
It can uniformly apply business rules, enriching messages from other sources, the splitting and combining of multiple messages and the handling of exceptions.
It can provide a unified abstraction across multiple layers
It can route or transform messages conditionally, based on a non-centralized policy (i.e. no central rules-engine needs to be present).
It is monitored for various SLA (Service Level Agreement) threshold message latencies and other SLA characteristics.
It (often) facilitates "service classes," responding appropriately to higher and lower priority users.
It supports queuing, holding messages if applications are temporarily unavailable.
Your help is greatly appreciated.
Kind Regards,
Jean-MichelPI or XI is the ESB from SAP side. PI is not a full pledged ESB on a reference model of ESB idea but it is the the framework SAP provide as a ESB product.
A Standard Based ESB Reference Model should fullfil the following features in a framework.
ESB Features Service Enablement Phase (1, 2, 3)
1) Message brokering between heterogeneous environments
2) Supports asynchronous, synchronous, publish and subscribe messaging
3) Supports synchronous and asynchronous bridging
4) Supports message formats of SOAP
5) Support for message format of SOAP with attachments
6) Support for xml message
7) Support for structured non-XML data
8) Support for raw data message
9) Support for text data message
10) Sport for e-mail with attachment message
11) Heterogeneous transports between service end points
12) Supports for FILE protocols
13) Supports for FTP protocols
14) Supports for HTTP protocols
15) Supports for HTTPS protocols
16) Supports for Multiple JMS providers
17) Supports for RMI protocols
18) Supports for web service protocols
19) Supports for CORBA protocols
20) Supports for DCOM protocols
21) Supports for E-mail (POP, SMTP, IMAP) protocols
22) Support for advanced transformation engine
23) Support for configuration-driven routing
24) Message routing based policies
25) Support for call-outs to external services to support complex routing
26) Support for point-to-point routing
27) Support for one-to-many routing scenarios
28) Support for request response model
29) Support for publish-subscribe models
30) Service monitoring
31) Service logging
32) Service auditing with search capabilities.
33) Support for capture of key statistics for message and transport attributes including message invocations, errors, and performance, volume, and SLA violations.
34) Supports clusters and gathers statistics across the cluster to review SLA violations
35) Support for service provisioning
36) Support deployment of new versions of services dynamically through configuration
37) Migrates configured services and resources between design, staging and production
38) Supports multiple versions of message resources that are incrementally deployed with selective service access through flexible routing
39) Configurable policy-driven security
40) Supports the latest security standards for authentication, encryption-decryption, and digital signatures
41) Supports SSL for HTTP and JMS transports
42) Supports multiple authentication models
43) Policy-driven SLA enforcement
44) Establishes SLAs on a variety of attributes including
a. Throughput times
b. Processing volumes
c. Success/failure ratios of message processes
d. Number of errors
e. Security violations
f. Schema validation issues
45) Initiates automated alerts or enables operator-initiated responses to rule violations using flexible mechanisms including
a. E-mail notifications
b. Triggered JMS messages
c. Triggered integration processes with a JMS message
d. Web services invocations with a JMS message
e. Administration console alerts.
46) Support for having multiple LOBs manage their own service bus based on their policies, and a service bus at an enterprise level that could act as a broker for sharing services across the various business units.
47) Support for agent plug-in to support following features
48) External providers service access for security
49) External providers service management
50) External providers transaction container
a. External providers business orchestration (BPEL Engine) and business work flow service container
51) Transaction support on message level
52) IDE Integration
53) Open standards -
MDG SLA time for each workflow step
Hi Experts,
As I know MDG calculates and report the SLA times for an entire process, It will show as violated if the number of days/half day is exceeded since the creation, but it does not show in which step took more time to process.
My requirement is to have SLA control in each step of a workflow. Please check the following example:
Material creation that has 2 approval steps since it submission.
Example: Submission (Requestor) -> Approval 1 (Business Area) -> Approval 2 (Master Data Specialist) -> Activation / Replication
I need to know through a report how much time the Approval 1 took to process the Change request, How much time Approval 2 took to process the Change Request based on the priority set by the requestor.
With this report the responsible from the Master Data department can check the time spent by the processors for each step of the process.
Does anyone had a similiar requirement?
What is the best approach to achieve this? Through standard SLA queries it is possible to have more information? Or only having an enhancement?
I appreciate any help.
Kind Regards,
FabianoHello Fabiano ,
We have also same requirement like .
Submission (Requestor) -> Approval 1 -> Approval 2 ---------- ->Approval- N (Master Data Specialist) -> Activation.
Can you plz share how to achieve this with : Any document for that plz share.
As you mention :
It uses the object type for example BUS2250 and the object key that is a concatenation with the CR number + an index, after that it obtain the "parent" workitem with the SAP_WAPI_WORKITEMS_TO_OBJECT function module. After that it uses the SAP_WAPI_GET_DEPENDENT_WIS and SAP_WAPI_GET_WORKITEM_DETAIL functions.
Thanks
Nikhilesh -
SLA or Pipeline Alert Monitoring
At Oracle Service Bus I have define sla alert rules and I can monitor at the administrator console if there is any violation.
Can I monitor the details like timestamp , the alert name, alert severity, service etc.. and every time a violation occurs through JMX?
If there are any API's available, could you please provide.
Thanks in advanceYou can use JMS APIs for monitoring. Here is the reference:
http://docs.oracle.com/cd/E28280_01/admin.1111/e15867/app_jmx_monitoring.htm#OSBAG748
Oracle Fusion Middleware Java API Reference for Oracle Service Bus -
Hello,
I have installed SOA Suite 11.1.1.5.0. At Oracle Service Bus I have define sla alert rules and I can monitor at the administrator console if there is any violation. I would like
to know if these violations are written at a file? I want to have a file with the timestamp , the alert name, alert severity, service etc.. and every time a violation occurs these information are written at it.
Thanks in advamceHi,
I changed the Alert rule to Message Count=0 and the main setting that I had to change to raise the alert was in the Operational Settings tab of the Proxy service.
Monitoring: Enabled Pipeline Monitoring for Service Level and above. By default this is set as Pipeline Level.
Thanks & Regards
Kshama -
Hi all,
I setup SLA and after creating activity I can see SLA & reminder timings, when it reached reminder time SLA icon turn in to yellow from green.
But I canu2019t get the Violation Alert u2013 alert profile is activated and also ran the program RPEIC_SLA_ALERTS and it got message on screen saying that 5 entries have been moved into THREIC_SLA_ALRT but when I checked in the table but no entries found
Personal reminder - I created personal reminder when it due to alert I am getting error msg in broadcasting area saying 'unable to deliver the msg'?
Did I miss something here? Any help?
thanks,
RHi Jarret,
As you requested here I am giving steps that I followed.
I followed below steps
1) Defined alert profiles Alert ID HREIC_VOLATION
Class- CL_CRM_IC_ALERT_GENRIC
Navigation link u2013 ToActivityDetailsFromAlert
Description: violation
Message: Activity [param1] passed the due date [param2]
Tooltip: Go To Alert View
2) Defined alert profiles Alert ID HREIC_REMINDER
Class- CL_CRM_IC_ALERT_GENRIC
Navigation link u2013 ToalertviewfromAlert
Description: reminder
Message: The due date [param1]for activity [parm2] approching
Tooltip: Go To Alert View
3) Maintain constants(Table: v_hreic_constant) : ALRTREMIED - HREIC_REMINDER
ALRTVIOLAT - HREIC_VOILATION
4) The program RPEIC_SLA_ALERTS reads the activity table THREIC_ACTIVITY and records those activities that need to have alerts sent to them in the alert table THREIC_SLA_ALRTS (Activities Selected by SLA Alert Program). (for testing after creating activity (assume sla in place) then run the above program then only you can get alerts in production systems we will schedule it back ground on your requirement.
Hope this helps.
Ravi -
Hi all,
I have implemented basic service desk.
Now i want to implement SLA for the same.
Currently i have config the mailing action depending upon Status change. But now the req is to to trigger the mails depending upon timeline.Which can be done via SLA.
I have gone thru the Service desk additional guide which is available on service.sap but not that much helpful.
Can anyone please explain me how to implement the same.
Points will be rewarded for sure.Dear Prakhar,
If you want to work with SLAs a service product and contracts have to be
used. The relevant dates then are not on header level of a service desk
message but on item level. The actions concerning the SLA have to be
defined on item level.
The processing of the service desk messages is done with the transaction
CRM_DNO_MONITOR. In this transaction monitor fields to the header of a
message as well as to the item of a message are available and can be
displayed.
CRM transaction type SLFN actually is NOT configured for the use with
contracts, SLAs,... . If you want to use these functionalities CRM
transaction type SLF1 or an own defined transaction type should be used.
Availability and Response Times can be maintained with transaction
CRMD_SERV_SLA.
Detailed information about the use and the customizing of Service
Contracts and Service Level Agreements can be found
- in the online documentation to Service Level Agreements
- in the CRM IMG documentation, e.g.:
- Customer Relationship Management
- Transactions
- Settings for Service Processes
- SLA Escalation Management <-
- in the additional informations to the service desk that are to
find in the SAP Service Marketplace under the quicklink
'Solutionmanager'
- Media Library
- Technical Papers
-> Service Desk: Additional Information
Hope this helps explain things.
Regards
Amit -
Service Desk with SLA: item data not automatic
Hello all.
I'm trying to setup service desck with contract determination for monitoring SLA (SolMan 7.0 SP 15)
Everything works well, except for item/product determination. I mean, when i check a support message creatde in a satellite system, organizational data are ok, but item's data are blank. Well, i put manually my own product in Item, quantity, press Enter and... that's all: contract data are correctly fullfilled, SLA schema ok, no errors at all.
I'm sure that i missed some basic configuration, but i don't know where... Maybe in the Action Profile of the ABA message? Or in the Item category determination?
Help me!Hi Michele
Go to SPPFCADM > Select Application DNO_NOTIF >> Define Action Profile and Actions >> Action Profile - SLFN0001_STANDARD_DNO >> Action - SLFN0001_STANDARD_DNO_CRM >> Select the processing type Method Call and choose 'change'icon in Method call settings >>
In the container editor , Choose create >> Maintain Element, Name & Description - maintain as ITEM_PRODUCT_ID, Choose ABAP Dict. Reference , Maintain values - Structure CRMD_ORDERADM_I, Field ORDERED_PROD, choose tab - intial value, enter the product code (Ex.SUPPORT)
enter and save.
This setting will ensure you to determine the product id in the Support message automatically, during your message creation process.
Thanks
Ram -
Oracle 9i installation problem with RedHat 7.2 (segmentation violation)
I have try to installation 9i with RedHat 7.2 by x windows.
when i use xwin to run the "./runInstaller, i got the error
(segmentation) as below:
i have already try to follow the installation procedure in
http://staff.in2.hr/denis/oracle/901install_rh72_en.html#1 but
still got this error.
Can anyone help me??
Regards
Chris Sung
=================================================================
===============
oracle install
Connecting 192.168.1.3 via TELNET
Thursday, December 13, 2001 1:04:06
Red Hat Linux release 7.2 (Enigma)
Kernel 2.4.7-10 on an i686
login: oracle
Password:
Last login: Thu Dec 13 00:46:39 from apple
[oracle@orange oracle]$ (/home/oracle/Disk1/runInstaller -
display 192.168.1.2:0
-name "oracle install" &)
[oracle@orange oracle]$ Initializing Java Virtual Machine
from /tmp/OraInstall/jre/bin/jre. Please wait...
SIGSEGV 11* segmentation violation
stackbase=0xbffff298, stackpointer=0xbffff160
Full thread dump:
"Finalizer thread" (TID:0x4276d210, sys_thread_t:0x4d0bfe0c,
state:R) prio=1
"Async Garbage Collector" (TID:0x4276d258,
sys_thread_t:0x4d09ee0c, state:R) prio=1
"Idle thread" (TID:0x4276d2a0, sys_thread_t:0x4d07de0c,
state:R) prio=0
"Clock" (TID:0x4276d088, sys_thread_t:0x4d05ce0c, state:CW)
prio=12
"main" (TID:0x4276d0b0, sys_thread_t:0x80d6fe8, state:R)
prio=5 *current thread*
java.lang.System.initializeSystemClass(System.java)
Monitor Cache Dump:
Registered Monitor Dump:
Thread queue lock: <unowned>
Name and type hash table lock: <unowned>
String intern lock: <unowned>
JNI pinning lock: <unowned>
JNI global reference lock: <unowned>
BinClass lock: <unowned>
Class loading lock: <unowned>
Java stack lock: <unowned>
Code rewrite lock: <unowned>
Heap lock: <unowned>
Has finalization queue lock: <unowned>
Finalize me queue lock: <unowned>
Dynamic loading lock: <unowned>
Monitor IO lock: <unowned>
Child death monitor: <unowned>
Event monitor: <unowned>
I/O monitor: <unowned>
Alarm monitor: <unowned>
Waiting to be notified:
"Clock" (0x4d05ce0c)
Monitor registry: owner "main" (0x80d6fe8, 1 entry)
Thread Alarm Q:Strange, but yesterday I nter in Oracle9i install, open
gnome-terminal window as oracle user and simply type
/tmp/Disk1/runInstaler
the DISPLAY enviroment variable was set,
using RedHat 7.2 , kernel 2.4.16-0.9, glibc-2.2.4-19
Segmentation violation 11 may mean RAM problem, sometimes
incorrect program pointer.So I think it must work (runIstaler) -
Google Play Nexus 6 on Verizon Network C-Block Rules Violation
Verizon,
I have tired for some time to figure out how to activate my Google Play bought Nexus 6 on your network in accordance to C-Block rules. As No rep is able to point me to clearly defined and published procedures and rights I can only assume your in violation of "47 CFR 27.16 - NETWORK ACCESS REQUIREMENTS FOR BLOCK C IN THE 746-757 AND 776-787 MHZ BANDS."
I request that my Nexus 6 be properly activated on your Network, and that I be provided with a Link to the "clear and reasonable procedures" that the FCC requires of you to publish for how to activate a device on your network along with all of my rights to request attachment to your network.
47 CFR States that if your operating in 746-757 and 776-787 MHz bands that
1) Licensees offering service on spectrum subject to this section shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee's C Block network
2)
(1) Licensees shall establish and publish clear and reasonable procedures for parties to seek approval to use devices or applications on the licensees' networks. A licensee must also provide to potential customers notice of the customers' rights to request the attachment of a device or application to the licensee's network, and notice of the licensee's process for customers to make such requests, including the relevant network criteria.
(2) If a licensee determines that a request for access would violate its technical standards or regulatory requirements, the licensee shall expeditiously provide a written response to the requester specifying the basis for denying access and providing an opportunity for the requester to modify its request to satisfy the licensee's concerns.I disagree... I am being discriminated against and charged and extra $25 a month by bringing my own device.
So as they are also not able to activate my device without faking a sim card - IE I cannot make a new account with my GP N6, and they are charging me over. This is clearly a violation.
Discrimination of this nature is prohibited by the 700 MHz Order open platforms provisions (22 FCC Rcd, Pages 15358–15374), specifically Paragraph 222:
In that regard, we emphasize that C Block licensees may not impose any additional discriminatory charges (one-time or recurring) or conditions on customers who seek to use devices or applications outside of those provided by the licensee. -
I have ASA 5505 8.4. How to configure the switch to the backup channel to the primary with a delay (for example 5 min.) using the SLA monitor?
Or as something else to implement it?
My configuration for SLA monitor:
sla monitor 123
type echo protocol ipIcmpEcho IP_GATEWAY_MAIN interface outside_cifra
num-packets 3
timeout 3000
frequency 10
sla monitor schedule 123 life forever start-time now
track 1 rtr 123 reachabilityHey cadet alain,
thank you for your answer :-)
I have deleted all such attempts not working, so a packet-trace will be not very useful conent...
Here is the LogLine when i try to browse port 80 from outside (80.xxx.xxx.180:80) without VPN connection:
3
Nov 21 2011
18:29:56
77.xxx.xxx.99
59068
80.xxx.xxx.180
80
TCP access denied by ACL from 77.xxx.xxx.99/59068 to outside:80.xxx.xxx.180/80
The attached file is only the show running-config
Now i can with my AnyConnect Clients, too, but after connection is up, my vpnclients can't surf the web any longer because anyconnect serves as default route on 0.0.0.0 ... that's bad, too
Actually the AnyConnect and Nat/ACL Problem are my last two open Problems until i setup the second ASA on the right ;-)
Regards.
Chris
Maybe you are looking for
-
Hi I have been building my new PC for the last few month now it need 1 part a cpu. will the new AMD xp2400 be compaterble with my MSI KT3 Ultra Aru v1.0? if not what is the highest cpu it will take Thanks in Advance Widowmaker KT3 Ultra Aru Coolerm
-
Movement type to manually input GL account for charity
Hi Expert, I have issue from user as below: There are certain transactions in their operations was not in the preset movement type as shown during MIGO. As the GL accounts was preset they were unable to choose another account to reflect the actual si
-
ICal 3.0.7 alarms?
Help file says to add an alarm by double-clicking the event, and then clicking on "Edit" in the Event Editor. I do not have an edit button in the Event Editor. I can add attendees, attachments, notes, and a url, but nothing about adding an alarm.
-
I have an IPOD touch that I can connect wirelessly to the internet. I am using a WRT610n router using WPA-2 encryption. The IPOD connects through the router without any problems. When I open LELA3 I see every computer/laptop that is connected to th
-
1200 Series - Tagged Management VLAN Traffic
Hi, As per my understanding the 1200 Series Access points running IOS (12.2(15)XR) send the management traffic (RADIUS,Accouting NTP etc) un-tagged i.e. using VLAN 1. As per our current setup, we assign this un-tagged traffic to a different VLAN (by