Web response monitoring(WRM) need more info how to utilize it in server for

I don't have much idea whatis the real benefit i am going to get from WRM monitoring. I have got some jsp with very few lines of code. Here it is:-
1)appcheck.jsp contains
<FORM METHOD="Post" NAME="TestForm" ACTION="Test">
<TABLE class="maintable">
<TR>
<TD>
     <%@ include file = "setup.jsp" %>
     <%@ include file = "jboss_health_test.jsp" %>
     <%@ include file = "showoutput.jsp" %>
</TD>
</TR>
</TABLE>
</FORM>
2) setup.jsp contains
<%@ page import = "com.ca.gis.util.*, com.ca.gis.ldap.dao.*, org.apache.log4j.Logger" %>
<%
     //set values for getting connections
     ApplicationContext appctx = new ApplicationContext(application);
     //set up fields for tests
     String email = "[email protected]";
     CAUserKey userKey = new CAUserKey();
     userKey.setUserId(email);
     CAUserModel userModel = new CAUserModel(userKey);
     String currenttime = DateUtil.getSQLCurrentTime();
     boolean allSuccessful = true;
     String errors = "";
     Logger logger = Logger.getLogger(this.getClass().getName());
%>
3)jboss_health_test.jsp
<%
          out.println("SYSTEM TEST SUCCESS");
%>
4)showoutput.jsp
<%
     if(allSuccessful)
          out.println("SYSTEM TEST SUCCESS");
     else
     out.println("<!--" + errors + "-->");
%>
I don't know how much effective its going to be for getting info like:
A)I need to check if there is any problem with application while running.
B)I don't think it can give me info if jboss is really down as if server is not up application will also be down.
If someone have good idea on this please let me know
what are the major advantages of wrm monitoring.
can i do what i am really looking for.
send me any link any good lines of code using which something useful can be done here.
thanks
vijendra

When one follows this how-to, one got the following result:
The same page, say xyz.html, can be accessed in two ways: one is from
http://localhost:8080/xyz.html, and the other is from https://localhost:8443/xyz.html.
How can one allow people to be only able to access from https://localhost:8443/xyz.html, to be not able to access from http://localhost:8080/xyz.html? There is one sentence mentioned some where that Servlet 2.4 specification can do this. But Servlet 2.4 specification would not provide any help. Any clue?

Similar Messages

  • I need to know how to size a media server for 800-1200 user

    i need to know how to size a media server for 800-1200 user

    Please clarify what you mean. Do you already have an iPhone? If so, and it came from the US and is (presumably) carrier locked, you're out of luck. NONE of the US carriers will unlock iPhones. There are no exceptions.
    The unlocked iPhone 4S is not yet available in US Apple retail stores. All phones sold at retail in the US are currently carrier locked.

  • I have a presentation to make to a customer and need to know how many educational apps are there for the iPad/iPod?

    I have a presentation to make to a customer and need to know how many educational apps are there for the iPad/iPod? More specifically special education apps.
    Thanks

    Keep in mind as well that not all apps are "created equal".  Some are really good, and others are not very good.  You might also want to look at some education sites for recommendations.  An example of a general iPads in education forum is
    http://ipadeducators.ning.com/
    but I imagine some exist for special education needs as well.  Our healthcare organization is using some apps for working with autistic children and find them very helpful. 

  • How can i host a server for assetto corsa

    How can i host a server for assetto corsa with log me in ?We are like 5 friends, and we are on diffrent networks Pls Help, if this is possible that is

    National Instruments also offers a web UI builder, and you can learn more about it here.  This allows you to build a web-based user interface for your programs.  I have never used it, but it says it can compile "the code into a Silverlight .XAP file, which can then be deployed to any web server for a user to invoke from a web browser".  Maybe this could run on your web server.

  • How do I find out my keychain password? Need more info fast about this

    My computer started to get really slow, so I looked what I could do to make it faster again. After searching I found that the safari content was high and that I should delete it to make it less laggy and slow. Long story short I ended up deleting my saved passwords on safari...Looking into more info, I found out that I needed to get to Keychain Access. I got to Keychain access, found all the passwords.
    My question..
    •How do I get them out of Keychain?
    •If I end up needing my password for Keychain, how do I find that out? I have the like start up CD, but I dont remember ever making a password.
    •And if I do retreive my Keychain Password some how, will that delete everything stored in Keychain? I would have just tried it, but its a lot of passwords I CAN NOT lose...
    Please help :/
    Thanks!

    Never mind the screenshot.
    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you boot, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, reboot as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Need more info on EO,VO and AM *.java files

    HI,
    Friends and experts I need your help in learning OAF.
    I am new to OAF and want to know more info about the following java classes.
    When I created a simple search page with EO, VO and AM, the following java classes are created.
    I want to know
    what is it?
    what we do with that ?
    where we use that?
    Any sample scripts if possible?
    EOImpl.java
    Please correct me if I am wrong,I know that we use this one for manipulating data for a particular row ,operations such as getattribut,setattribute, delete ,update, insert. There are various methods got created when you create the EO if you select options on the " Generate Method " during step 4 on EO wizard.
    EOCollImpl.java
    VOImpl.java
    ViewRowImpl
    AMImpl.java
    Thanks
    Sri.

    Hi Sri ,
    EO :
    Entity Objects are basically based on one table which encapsulate the business rules. These objects are used by OAF page to perform update/insert/delete operations .
    Inside EOImpl.java you will find setter() and getter () methods in java we call it as accessor and mutator , each attribute in EO is mapped to column in the data base table .
    You can also generate a create () method Validate () method .
    Eg : To get the sequence value in OAF you can use Create() method .
    VO :
    VOImpl (VO) : It just consist of an Data base sql query , you might have noticed while executing a query eg : VO.executeQuery() ;
    to perform any validation it provides iteration over and access to the view rows in its result set.
    VoRowImpl : Represents a single row in a view object .
    You will understand better when you writing a code using voimpl /voRowimpl objects
    AmImpl :
    It basically performs the Business logic , we will define all our methods to implement business logic .
    Eg : you can call a method from controller and define the method Amimpl.java , you can use of initializing the query or
    you do DML operation , etc ...
    In summery : The main reason why we have java file distribute across EO , VO , AM is because OAF is designed with MVC design pattern ,
    in other words we have to isolate the responsibility of code in each layer ( Model , View , Controller ) .Its bad practice to write
    the entire code in one single class file .
    Eg : Controller class should accept the parameter from user and pass these parameters BC4J files ( AMImpl.java ) and its Job of the AMImpl.java
    to perform the business logic and return the result back to to controller .
    To enforce the coding standard of MVC design pattern we have these java files EO , VO , AM , CO . with more practice you will understand the various
    methods defined in each of these java files .
    Keerthi

  • Need More Info on Server 2012 R2 Essentials

    I'm currently running Server 2008 R2 Foundation for my wife's (1 person) online business, and have been looking at 2012 R2 Foundation vs Essentials.  The latter sounds like a better fit, since in my absence, my wife has limited IT knowledge/experience, but
    I need more information:
    1) Can Essentials be run in a WORKGROUP instead of a domain?  I currently have my server that way, and it serves our needs very well.
    2) I read in some of the forums that while essentials allows 25 users, only two can be logged in concurrently.  Is that true, or am I missing something?
    3) Server 2012 R2 Foundation DOES NOT require CALs for local LAN users, is this also true with 2012 R2 Essentials?  Also, how much are the CALS for RDP users?
    Capt. Dinosaur

    Hi again, Grey, and thank you for your response.  I do appreciate your detail, and I'll answer them each in turn.
    "1) http://technet.microsoft.com/en-us/library/dn281793.aspxMust be the domain controller at the root of the forest and
    domain, and must hold all the FSMO roles."
    Well I guess if it must it must, although I don't understand why the (first) response above states emphatically that a workgroup can be used.  I prefer a workgroup because I understand it much better than a domain setup, and I don't understand Active
    Directory etc.  When I bought my server in 2011 I hired someone to set up the os for me.  I also purchased Mark Minasi's book on 2008 R2, but so much of it was over my head.  Fifty five years in the computer business, and today I feel as though
    I've never seen one before (hence the name Capt. Dinosaur).  I am, however, signed up for a course in Managing Windows Server 2012 which starts in January.  I hope that helps get through my aging grey matter.  All these initials and acronyms
    are total confusion to me, along with my case of chronic CRS (Can't Remember Squat).
    "2) If you say you have 3 different users logged into Foundation with RDP I
    am not going to argue.  I know the license only allows for 2
    administrative connections. http://technet.microsoft.com/en-us/library/cc770759.aspx 
    The default connection (RDP-Tcp) only allows a maximum of two simultaneous
    remote connections."
    I currently have two licenses for 2008 R2 Foundation, and Ithe users who log in to those remotely are
    NOT administrator accounts.   I don't know if that makes a difference, but I've had both users logged in from Florida and I was logged in (as an administrator) from a local workstation.  I had to test that early on to make sure
    that my two users could log in concurrently, and that I could be logged in to manage the system.
    "As a rule we do not suggest you use your server as a workstation. ..."
    Maybe I misled you with something I said, but I/we do not use the server as a workstation.  Sometimes, though infrequently, I have to log in to the server directly (as Administrator) to do or fix something, but do not stay on it for
    normal work.  When we're home my (Dell Precision Mobile) Workstation is connected to my LAN.  I also do software development on that workstation.  I have a development environment on an external eSATA drive attached to my workstation,
    and both a beta and a live environment on the server; I use my workstation to operate all three.
    "... And I really have no clue what would happen if you
    restored your dell box to something else.  It may fail activation. 
    Guess you need to try that sometime. ..."
    I have tried it, albeit to another - but completely different Dell box, which is normally the only brand I use;  that's a holdover from my mainframe/minicomputer days when having a mixed shop was seriously avoided - with a clean bare HDD, and it
    worked.  When the restoration was executed, True Image asked only that you provide the drivers for the new computer, and they do the rest.
    " ... The advantage to the Essentials client backup is it will backup a whole lot of PC's to the server and use data dedupe to keep the backup database small.  So it would backup your wife's PC at
    work and the 3 you have on the road."
    I should explain that my wife's office is in our basement at home, in a separate room from my computer room.  My wife has a second business making gourmet wine infused jams, and we built a FDA certified canning kitchen
    in the basement, and her workstation is there so that she can work at both businesses.  Her workstation, my server and my workstation are backed up weekly to hard drives in a docking station, and stored in a fire resistant safe.  The
    computers we have on the road are my mobile workstation and her laptop.  When my daughter comes along, she also brings her laptop.  Since no company information is stored on any of the workstations, only the server data are mission critical. 
    "But in any case if what
    you have is doing what you want.  You don't seem to want what essentials
    offers, Active Directory, Remote Access, or Client backup, so why change?"<o:p></o:p>
    I guess I'm something like the man who bought a tuxedo and so now he has to start looking for formal dances to attend.  I should explain that we live in a very rural area - our town has a population of 1,000, 60% of the country is National
    Forest, and my home is literally in in it, bordered by it on two sides - and have only a very small technical college here.  I need to learn all about the server OS and how to administer it so that I don't
    have to hire someone when something needs to be done, and 2012 R2 is the only course available within 100 miles - up until this year they were only offering 2003, and even that was at a different campus 60 miles away (and over a 2,000' mountain). 
    Since the course I'll be taking is for '12,  I'm simply looking to upgrade so that what I have is what the course covers.  All my other computers are running Windows 7 (Pro and/or Ultimate) 
    "More on #1 Active Directory gives you group policy and more  control over file permissions than workgroup.  Say you had a folder shared and it had your bank.xls  You could give your wife permission to see it but not your daughter. 
    Group Policy is probably not a big deal for one client PC.  The advantage is you can make one setting and it can be applied to hundreds of PC's"
    Actually I have remote access now in '08 R2 Foundation, and I'm not sure what Active Directory will buy me, but that could, of course, change when I get into the course.  Not having Group Policies has been a small problem,
    on one or two rare occasions, so that could be a game changer for me, but with what I have now, I've been able to set up my political campaign system such that
    no one from one campaign can see or access any data for any other campaign.  Also I was able to set up the user accounts so that a remote user logging in
    can not see nor execute anything except the campaign system.  Any attempt to do otherwise automatically logs them out.
    In summation, you may just have convinced me that using a domain instead of a workgroup, with all it advantages might just be the way for me to go, since hopefully I'll learn all about that when I take that course.  The limitation of only two concurrent
    RDS users, however, is still worrying me, and I'm not sure that I'm accurately communicating.  If the
    two concurrent RDS user limitation ONLY refers to
    Administrator accounts then there's no problem, because any user accounts other than those for my wife and myself,
    would not be Administrator accounts.  I can't remember whether 2008 R2 foundation supports
    "Power User" accounts, but if so, that would be the highest level any other users would have, and possibly not even that high.
    Capt. Dinosaur

  • Need more info about "NestedContainer" violation

    Hello,
    I have a "NestedContainer" violation for a Canvas container in my application. Compared to the application's root container it is located at level 6 i.e. nested in 5 other parent containers. However at the same time I have other containers (again Canvases) which are even deeper nested for example at level 8 compared to the root container.
    I need more information when exactly the "NestedContainer" violation is triggered so I fix my code if needed and submit a bug for FlexPMD in case the rule is not implemented as designed.
    Thanks!
    Smirnoff

    Hi
    I would like to share an example but I need to create it since I don't want to post the actual source code.
    Simply copying the problem mxml file under another name doesn't work because it is put outside its container and then the violation is not generated.
    If I have to create an example it might be too time consuming to achieve these:
    - keep the same component hierarchy
    - keep the problem present
    - keep the example clean from the real source code
    That's why I wanted to get more info when this violation is triggered and hopefully create an example faster.
    Smirnoff

  • Need more info on Java SE 6 after downloading my new operating system to Yosemite

    I updated my operating system on my MacBook Pro to Yosemite 10.10.2, now when I try to open CS4 it directs me to download Java SE 6, but the "more info" button which is to direct to the website to download the Java, does not work, and I can't find anything or where to download this. I need CS4 to do my work, can someone help me?

    Get Apple Java 2014-001.

  • 6358629 SSLSocket.close() / read() deadlock  - need more info

    Java 1.5.0_14 is documented as having this fix ....
    "6358629 jsse runtime SSLSocket.close() and SSLSocket.read() deadlock "
    I cannot find this bug in the bug db and the sun page says sometimes bugs don't show up for security reasons.
    The complete absense of info on this bug other than its title means I cannot tell whether this is the same bug I am seeing randomly in production.
    Given that I cannot replicate the problem in a reproducable test case I need sufficient info to justify upgrading the prod VM and risk introducing new bugs in an otherwise stable platform.
    Is there any way to get more info on this bug ?
    Anyone seen a problem like this in their system?
    Is it possible Sun has just hidden the bug for no good reason?
    Any help appreciated.

    Hello, thank you very much for your information.
    I had met same bug on Linux.
    java version "1.6.0_11"
    Java(TM) SE Runtime Environment (build 1.6.0_11-b03)
    Java HotSpot(TM) 64-Bit Server VM (build 11.0-b16, mixed mode)
    My workaround is here. Closing file descriptor directry by calling private native method( closeSocket0 of java.net.PlainSocketImpl ) using reflection.
    It works well on my environment.
    public static void closeNativeSocket( Socket socket )
    try
    Object object = socket;
    String fieldName = "impl";
    Field field = null;
    Method method = null;
    Class clazz;
    clazz = Class.forName( "java.net.Socket" );
    field = clazz.getDeclaredField( fieldName );
    field.setAccessible( true );
    object = field.get( object );
    clazz = Class.forName( "java.net.PlainSocketImpl" );
    method = clazz.getDeclaredMethod( "socketClose0", new Class[] { Boolean.TYPE } );
    method.setAccessible( true );
    method.invoke( object, new Object[]{ new Boolean( false ) } );
    catch( Exception e )
    e.printStackTrace();
    hope this helps.

  • Need more info on adding user than is in UserGuide

    Before I send an invitation to someone to be a user and access one of my computers, I need more information on how that works that is provided in the LMI Pro User Guide.  Would really like to actually have RTV conversation with someone familiar with it (having done it), but it that's impossible, here goes. 1Do I have to give him the PW for my entire account, do I specify a separate PW for him, or does he set it when accepting the invitation ? 2
    Will he have to know the UN & PW of the target computer or will he just be "in" by virtue of the LMI Pro account ? 3Will he have all the remote functionality I have - Remote Control, File Manager, etc ? May have more questions later so I would really appreciate a contact who has used this before.  

     
    Hello  ,
    Thanks for posting your query here! 
    1 - When you invit a secondary user with a Pro account, this person will click on the link invitation and be prompted to login/create and account with his own username (email address) and own password - so you will not share yours
    2 - As for the target computer, the username/password of the session  or the acccess code (according to the settings) need to be known indeed.
    3-  The remote functionalities are set on target computers , therefore secondary users would have the ability to do File Transfer and remote printing. 
    Let me know if that clarifies the situation for you and feel free to get back to me if you have further questions!
    Thanks, 
    Best
    Julie

  • Need more info for the ag34405 DMM VI's

    Hi !
    I'm working with the Agilent 34405a multimeter and made a little VI for data-logging. The problem is, I want to choose between 4.5 & 5.5 resolution and the is no litterature about it. I'm using the NI drivers and VI's made for this application. There is a VI named "Configure measurement.vi" in which you could perhaps select the resolution (as the default value is 0.0001, that would be for 5.5 digits I think). I already tried to change the value from 0.0001 to 0.001 but the instrument still use the 5.5 digit measurement method.
    Does somebody also know if there is more documentation as the contextual help of each VI made for the ag34405a DMM (there are more or less only default values explained, but I would need more...)?
    I've attached my VI if this could help to solve this issue. Am working with LabView 8.20.
    In advance, thanks for your help !
    Yves
    Attachments:
    Start_stop_logging_ag34405a_V1.vi ‏47 KB

    Yves,
    One of the things that is great about instrument drivers is the context help on each of the controls. You can turn the context help on with Ctrl+H and then hover you mouse cursor over the control. If you open "Configure Measurement.vi" and look at the help for the absolute resolution control you'll see a good description that includes:
    Notes:
    (1) The instrument driver ignores this parameter if the Range parameter is set to AG34405A_VAL_AUTO_RANGE_ON (-1) .
    If you look at the help of the Range parameter you'll find see a similar discription with details and the following:
    Defined Values:
    AG34405A_VAL_AUTO_RANGE_OFF (-2)   (-2.0)  - Auto-Range Off
    AG34405A_VAL_AUTO_RANGE_ON (-1)    (-1.0)  - Auto-Range On
    Based on this, can you try setting the auto-range to -2 and specifying the absoulte resolution?
    Regards,
    Kamran

  • Need more info abt the functions of each classes in Workflow API's of BPEL

    Need more information about the functions of each method of the classes in Workflow API's of BPEL
    The Java documentation of the workflow API (especially Identity Service classes) is having a one liner explanation for the methods of each class. We need to implement our own Identity Service that implements the BPMIdentityService interface. We are not able to map the function of each methods of this interface to what our security subsystem provides. We feel that we need more detailed information about what each method of each class is doing internally so that we can map to whatever our security subsystem provides.
    The BPEL Developers Guide does not talk about the functionality of each methods of this interface. If anybody can guide me to look into some documentation that has this information or if anybody has this information, then please do the necessary help.
    Regards
    Ramana

    Did you find out the solution for your above posted query ? I'm also in need of some documents. Can you help me out?

  • DNS/web-server hosted off-site. How to set up Leopard server for mail?

    Hey Everyone,
    Brand new xserve with leopard server 10.5.2. Currently, Our web and DNS server for our domain,"company.com" is co-located off-site with an MX record of "mail.company.com" pointed at the static IP of the office where our mail server is. I want to replace the mail server with the xserve. With that in mind, how do I configure the DNS on the xserve during initial configuration to reflect that? Give it a self-referencing FQDN like server.company.office and see if the mail service can handle the domain hosted elsewhere?
    I'm pretty new to servers and would love be able to keep this all in Standard but I'm not afraid to jump into Advanced if need be. I've created a test domain through GoDaddy of "company2.com" with an MX record of "mail.company2.com" pointing at the IP address of the xserve. Any help would be greatly appreciated!

    Hello,
    Have a look at this blog post:
    http://blogs.adobe.com/captivate/2010/08/reporting-the-quiz-results-to-a-local-server.html
    Lilybiri

  • Need information on how to create Idoc Inbound Interfaces for Business Sys

    Hi,
    I'm losing it.
    Can anyone point me to some documentation or an example of how to create inbound interfaces for Business Systems in PI 7.1.
    Here's the scenario
    I'm working on a B2B integration process which sends inbound idocs to an ECC 6.0 system.
    I've created the Business System communication component  but under the Inbound Interfaces it is blank.
    I want to have MBGMCR.MGBMCR03 as an inbound interface.
    But I forget how to get it there.
    For Business components you can just add the inbound interface.
    I've already defined the Business System in the SLD pointed it to the correct Tech System, imported the idoc definitions in the Enterprise Service Builder and set up IDX1, IDX2 to ensure the metadata exists in PI.
    But for Business systems the hep says that it's got to come from the SLD.
    Outbound/Inbound Interfaces
    For each business system, the interfaces that are installed on the business system are also entered in the SLD. These interfaces are displayed in this frame. You cannot add any other interfaces.
    I know I've done this before, but I can't remember how.
    Cheers,
    John

    Hi John ,
    Please have a look at the following links which might be of help to you
    PI 7.1 IDocs interfaces act as operations
    http://www.sdn.sap.com/irj/scn/weblogs;?blog=/pub/wlg/7933
    /people/peter.gutsche/blog/2008/10/27/what146s-new-in-sap-netweaver-pi-71
    There is a section in the following link on IDOC , have a look at the links in that section
    https://wiki.sdn.sap.com/wiki/display/XI/ImportantBlogsand+Notes
    Best Regards

Maybe you are looking for