Finding jar files using JarScan

Sometimes we need to know in which jar file a particular class resides, and the location of that jar file. We can find out using jarscan utility. It can be downloaded from here I had to find out which jar file contains this particular class weblogic.security.spi.AuthenticationProviderV2 I downloaded the jar

Continue reading »

Enabling and Disabling Weblogic Admin Console

Disabling and Enabling Admin Console Many at times for most of our administration work including the changes (deployments, start/stop of servers, etc) or configurations (JMS, creation/deletion/editing of our servers, etc) we use our weblogic admin console. But, for security reasons some of the banking companies for its core banking applications

Continue reading »

Monitoring JDBC Datasource Runtime Attributes using WLST

Step 1 :- Set the environment C:\bea103\user_projects\domains\prpc612\bin>setDomainEnv.bat Step 2:- Connect to server and browse to the JDBCDataSourceRuntime MBean C:\bea103\user_projects\domains\prpc612>java weblogic.WLST Initializing WebLogic Scripting Tool (WLST) … Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands wls:/offline> connect() Please enter your username [weblogic] : Please enter

Continue reading »

Encrypting JBoss Database Cleartext Passwords

I was planning to write this article for past two days but I was in dilemma whether to post this article or not. Its not that this article is not helpful, but there are already many good articles on this subject on internet currently. I had even tried to automate

Continue reading »

Working with JMS and the Standard Issues in JMS

Java Messaging Service acronymised as JMS is popular in both development and administration world. Different vendors have got different implementations for this JMS API. Oracle Weblogic Server implements this JMS for communication between two different weblogic server domains. This implementation although looks simple but its usage is very high (especially

Continue reading »

Working with Reverse proxy servers

The term “Proxy Servers” is mostly popular among our middleware techies as: “Server which forwards the request”. But, for simple multiple reasons, this one lined defined server is vastly used in each and every environment in multiple forms like Forward Proxy Server, Reverse Proxy Server and Open Proxy Server. The

Continue reading »

Automation of Open SSL CSR(Certificate Sign Request) creation

As part of my Job routine I need to create CSR for various new sites we maintain and mail them to CA. Creation of CSR is a two step process, first we create a key which is simple one line command and then we create the CSR. For the second

Continue reading »

Remote Administration Of Domain Through WLST

For administration of the whole domain and all the servers in the domain, we can use WLST commands. This is the best way for a monitoring and managing the complete domain using nodemanager. To start the admin server using WLST, ensure that the admin server is associated to a machine.

Continue reading »