Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONWLS-ADMIN II - TEST 1

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
WLS-ADMIN II - TEST 1

Description:
1Z0-134

Author:
AVATAR

Creation Date:
17/05/2023

Category:
Others

Number of questions: 59
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
A hardware load-balancer (HWLB) is positioned as the primary entry point into your WebLogic Server domain. Aspects of your application use SSL to protect data on the network from your clients to your domain. Which configuration provides the best performance for your domain? (Choose the best answer.) Configure the HWLB to use pass-through SSL, configure an SSL hardware accelerator on WebLogic, and terminate SSL. Configure the HWLB to use pass through SSL to the WebLogic Server that it connects to, and terminate SSL. Configure the HWLB to delegate SSL handling to the WebLogic Proxy Plug-in and terminate SSL. Configure the HWLB to use an SSL hardware accelerator and terminate SSL.
You want to use the WebLogic Diagnostic Framework (WLDF) to monitor some historic MBean attribute values in your WebLogic domain. Which WLDF component do you use to accomplish this? (Choose the best answer.) the Archiver with a metric collection definition the Harvester with a metric collection definition the MBean Collector with a metric collection definition a Watch on a metric collection definition.
Your domain is experiencing some intermittent problems that you are not able to figure out on your own. You have opened a case with Oracle Support to help you figure out the problem. The support engineer would like to use the WebLogic Diagnostic Framework (WLDF) to obtain an overall view of your WebLogic Server environment to try to narrow the problem to a particular subsystem. What WLDF data does the support engineer request from you? (Choose the best answer.) Java Flight Recording of the JVM Instrumentation log Diagnostic image snapshot Specific harvested metrics.
I am configuring the security policy for my JMS module. I am specifying some security conditions for the module. Which two security conditions are valid in this context? (Choose two) The JMS module should throw a custom security exception on invalid access The JMS module can be accessed in a receive-only mode. The JMS module can be accessed only between 1 pm and 6 pm. The JMS module can be accessed only by users belonging to the Operators group. The JMS module can process only 50 messages at a time.
Poor ventilation and cooling in and around the machine that hosts your administration server and a clustered managed server causes a local hard drive failure and thus both servers crash as well. This is the first time this crash has occurred in production but an automatic Whole Server Migration kicks in as expected. The clustered server migrates to a machine on which it has never run before, and for that reason the server cannot be started on this new machine. Which action could have helped to launch this migrated clustered server? (Choose the best answer.) Copy the Node Manager security files to the new machine that hosts your migrated server. Use a shared disk/NFS for all the migratable servers in the cluster. Shut down and relaunch the Node Manager. Ensure that the Administration Server is up when the server migration is being performed. First restart the Administration Server, remove this managed server from the cluster, restart it manually, and then target it back to the cluster.
Review the digital certificate below. Based on what the certificate contains, which statement is true ? (Choose the best answer.) It is a self-signed digital certificate with no certification chain. It is an authentic root CA certificate with a valid certification chain. It is an authentic digital certificate with a valid certification chain. It is a digital certificate for a private key with a valid certification chain.
A current production WebLogic Server (WLS) domain needs to be upgraded without affecting the users. What are the five steps to follow for a Rolling Update? (Choose five.) Back up the contents of your domain. Shut down the servers in a single machine. Restart the servers in the machine. Repeat the process for all machines in the domain. Use pack and unpack to upgrade each of the servers in the machine. Repeat the process for all domains in the machine. Upgrade the servers in the machine.
The administration server is a major component of a WebLogic domain. I need to make available a standby administration server in case the main administration server in the domain crashes. Which utility will help me in doing this? (Choose the best answer.) Domain Template Builder Configuration Wizard pack/unpack Enterprise Manager.
Your organization is using a Multi data source (MDS) on WebLogic Server to support applications connecting to an Oracle RAC database. You have been tasked with configuring a new callback handler for the MDS. Which two statements are true concerning related MDS options and behavior? (Choose two.) If the Failover Callback Handler attribute is set on the MDS, the Test Frequency attribute is no longer used. You can register only one callback handler for each WebLogic server. Callback handlers are called for both failover and failback decisions. Callback handlers are optional when using the Failover MDS Algorithm.
What are two differences between a group and a role? (Choose two.) Groups are static and roles are dynamic and conditional. Groups can be scoped to applications and roles are only global. Groups can contain roles but roles cannot contain groups. Roles can be scoped to applications and groups are only global Roles are static and groups are dynamic and conditional.
You are asked to configure Node Manager for your production environment. You are considering whether to use the Java version or the script-based version of Node Manager. Which statement correctly describes the difference between the two versions? The script-based version of Node Manager requires a larger footprint than the Java version. When Node Manager is used for consensus leasing, you may see faster performance with the script-based version. The script-based version of Node Manager can be used in conjunction with inetd on supported UNIX systems. If you are installing WebLogic Server on a Windows system, you must use the Java version of Node Manager.
You are trying to set up a JMS Session with a specified acknowledgment mode. You want the application that receives the message to explicitly take care of the acknowledgment. Which option represents a valid choice for the acknowledgment mechanism that you can use? (Choose the best answer.) AUTO_ACKNOWLEDGE CLIENT_ACKNOWLEDGE DEFAULT_ACKNOWLEDGE DUPS_OK_ACKNOWLEDGE.
Your WebLogic Server (WLS) environment consists of multiple domains. Which is a true statement about WLS domains? (Choose the best answer.) Multiple domains can use the same or separate WLS installation while running on the same machine. Domains require a minimum of one managed server. Multiple domains require separate WLS installations while running on the same machine. Multiple domains require individual Node Managers while running on the same machine. Multiple domains can share the same administration server.
You are implementing leasing functionality within your environment to ensure exclusive ownership of a cluster-wide entity. Which type of leasing requires that Node Manager is configured and running? (Choose the best answer.) high-availability in-memory leasing high-consensus leasing high-availability database leasing non-database consensus leasing.
You are concerned with messages being received systematically. You designed Message-Driven beans (MDB) to guarantee the most reliable way to consume messages. In which three scenarios would JMS always redeliver a message? (Choose three.) when the onMessage() method fails to acknowledge the reception of the message when messages are not being sent as part of a transaction when the transaction the MDB participates in eventually fails and rolls back when messages are non-persistent when the onMessaqe() method of the MDB throws a Java error.
You are required to configure a Coherence cluster for a WebLogic domain. Review the image below for the architecture of the WebLogic domain. The configuration represents the following:• · Two WebLogic clusters of n number of servers each · One cluster contains an EAR deployment that contains a WAR module and a GAR module · One cluster contains a GAR deployment · Application data flows into the cluster with the EAR deployment and then to the cluster with the standalone GAR deployment Based on this configuration, what is the typical configuration of a Coherence cluster for this domain? A Coherence cluster for each WebLogic cluster. EAR and GAR clusters use a replicated topology with storage enabled. Single Coherence cluster that includes both WebLogic clusters. EAR and standalone GAR clusters are both storage-enabled. Single Coherence cluster that includes both WebLogic clusters. EAR cluster is storage-disabled. GAR cluster is storage-enabled. Single Coherence cluster that includes both WebLogic clusters/ EAR cluster is storage-enabled. GAR cluster is storage-disabled.
Your WebLogic domain is experiencing a problem. You want to use the WebLogic Diagnostic Framework (WLDF) to diagnose the problem. You have a support case open with Oracle Support, and they have requested a diagnostic image of your server that is experiencing the problem. The problem is not predictable or reproducible on-demand, but you noticed that the number of requests waiting to execute increases dramatically when the problem does occur. The problem also seems to occur at any time of the day or night. How would you approach reliably capturing a diagnostic image that contains data that is relevant to the problem that is occurring? Configure WebLogic overload protection to automatically trigger a diagnostic image when the number of requests waiting to execute exceeds a certain threshold. Manually monitor the number of requests waiting to execute and create a diagnostic image when you see the number of requests waiting to execute exceeds a certain threshold. Configure a WLDF watch that triggers a diagnostic image action when the number of requests waiting to execute exceeds a certain threshold. Configure the server health failure action to trigger a diagnostic image when the number of requests waiting to execute exceeds a certain threshold.
Which are three valid actions of the Post Domain Creation process? (Choose three.) Run any SQL scripts to generate database artifacts. Run the root.sh script. Assign DNS names to all the hosts. Run the RCU utility for each hosted application. Use WLST to run the postdomain.py script. Import LDAP data from XML files. Run pack and unpack commands for managed servers on remote machines.
Review this scenario of an application running on a storage-disabled, managed Coherence server that uses a Coherence two-tier near cache: * Cache data is already written to the distributed cache. * There is a local near cache configured on the application side (storage-disabled node). * Application requests the data from Coherence twice. Assuming this is the server's first access of this data from the cache, how many network round trips between Coherence cluster instances take place in total? (Choose the best answer.) 1 4 2 3.
My domain consists of an administration server and two managed servers. During runtime, my administration server has crashed and I wish to start the managed servers in MSI mode. Which two files need to be copied from the admin server to the managed servers when starting them in this mode? (Choose two.) MSI.xml access.log SerializedSystemIni.dat AdminServer.log config.xml.
You need to ensure that when a failed admin server instance is restarted on another machine with a different IP address, the managed server is able to establish connection with the newly started instance. Which technique will ensure that the connection can be made? (Choose the best answer.) Configure a DNS name for AdminServer which maps to multiple IP addresses and specify this DNS name during managed server startup. Use WLST to update the AdminServer IP address for a running managed server. Specify multiple admin server IP addresses during managed server startup. Update the host file for a running managed server instance.
In your production environment, you have deployed an application that is accessing a registered Java EE shared library as well as an application deployment plan. In addition, both the library and the application use annotations for some of their configuration properties. You are attempting to understand the current state of the properties that have been used in this deployment. From greatest to least, what is the correct order of precedence that is used by WebLogic Server when applying configuration properties during deployment? (Choose the best answer.) Deployment Plan, Library descriptors, Application descriptors, Library annotations, Application annotations Deployment Plan, Application descriptors, Application annotations, Library descriptors, Library annotations Deployment Plan, Library descriptors, Library annotations, Application descriptors, Application annotations Deployment Plan, Application annotations, Library annotations, Application descriptors, Library descriptors Deployment Plan, Application descriptors, Library descriptors, Application annotations, Library annotations.
Examine the domain diagram: Assume all servers are up and running and you have just started an offline WLST interactive session. Assume further that the username/password "weblogic/Welcome1" maps to a valid administrator. You type two lines of WLST code: connect('weblogic','Welcome1','host02.acme.com:7101') print cmo.getType() + ':' + cmo.getName() What will be printed? (Choose the best answer.) Machine:machine02 Server:server03 DomainRuntime:server03 Domain:TestDomain Session:weblogic.
You have a multithreaded application that looks up the WebLogic JMS ConnectionFactory object from the JNDI tree. Which statement is correct in this scenario? (Choose the best answer.) The access to ConnectionFactory object MUST be synchronized. In a multithreaded scenario, connection objects cannot be safely created from the ConnectionFactory. It is not permitted. A multithreaded application cannot access the ConnectionFactory object. The ConnectionFactory object can be referenced in a multithreaded application without any special considerations. Multiple threads trying to use the ConnectionFactory object simultaneously will throw an exception.
You are analyzing the JMSDeliveryMode header field for all the messages for all the queues deployed to your JMSServer. Which two values do you expect to find for this header? (Choose two.) MULTIMODE EXACTLY_ONCE NON_PERSISTENT TRANSIENT PERSISTENT PERMANENT.
You successfully configured a new dynamic cluster but haven't launched any of the dynamic servers. You want to change the configuration for one specific server. Which parameter can you modify for that server before starting up the dynamic clustered servers for the first time? dynamic server name No parameters can be modified. machine name that hosts a dynamic server replication groups listen port number of individual dynamic servers.
You need to make sure that a JMS Message never expires.What value should you set for the JMSExpiration header? (Choose the best answer.) 0 1000 1 999.
You are managing and monitoring durable subscribers for your JMS topics to ensure that all the subscribers would receive persistent messages.However, JMS connections are currently restricted, so only one connection with the same client ID could exist in the scope of your cluster.On which page of the Administration Console can you set Client ID Policy to unrestricted in order to lift this restriction? (Choose the best answer.) Topic > Configuration > Durable Subscribers Topic > Configuration > Thresholds and Quotas Topic > Monitoring > Durable Subscribers Topic > Configuration > Overrides JMS Server > Configuration > Durable Subscribers Connection Factory > Configuration > Client.
Review the diagram below. It depicts the following: A WebLogic domain that consists of two WebLogic clusters that are each included in a Coherence cluster The Coherence cluster includes a configuration for Coherence*Web HTTP session storage An application deployed on cluster 1 that is configured to use Coherence*Web A client is using a web browser to interact with the application on cluster 1 (via a proxy) The client's HTTP session is stored by Coherence*Web on the server in the upper right-hand corner The server where the client's HTTP session is stored crashes Assuming the next request for an HTTP session attribute is a new attribute that is not stored in a near-cache, the client's session attribute is fetched from the remaining storage-enabled server in cluster 2. Why is the session attribute retrieved from this other server's cache? (Choose the best answer.) Coherence*Web stores sessions in a replicated cache on the back end and the request fails over to the new location automatically. Coherence*Web stores sessions in a distributed cache on the back end and the request fails over to the new location after partition re-balancing takes place. Coherence*Web stores sessions in a shared disk cache on the back end and Coherence*Web automatically load balances requests. Coherence*Web stores sessions in a cache that is backed by a database cache loader. The data is fetched from the database and placed into the cache on the new server.
You are planning to use WebLogic JMS for implementing my enterprise messaging architecture. Which messaging paradigm is invalid in this context? (Choose the best answer.) Point to Point messaging Datagram messaging Publish Subscribe messaging Persistent messaging.
You intend to introduce ordering in message processing for your JMS destination by creating a destination key. Which statement is true about the JMS Destination Key configuration? (Choose the best answer.) A Destination Key can be applied to the message body. A JMS Destination Key cannot be specified using WLST. A JMS Destination Key allows a user-defined sort key. A JMS Destination Key cannot be used to sort messages in a Last In First Out order.
A Web Module needs specific tuning. The Development team fine tunes the module in the deployment descriptor (weblogic.xml) as follows: Which two are true? (Choose two.) Add the line MyWorkManager before tags in weblogic.xml to make the Web Module use the Work Manager MyWorkManager. MyWorkManager is an application-scoped Work Manager. MyWorkManager is a Default Work Manager. Once the application is deployed and started on a Managed WebLogic Server, MyWorkManager will appear under Environment/Work Managers on the WebLogic Console. MyWorkManager is a Global Work Manager.
We find the JMSRedelivered header set for a particular message on the receiver. In which two scenarios is this expected to happen? (Choose two.) The session's recover() method was called to restart the session beginning after the last acknowledged message. The application has already received the message, but did not acknowledge it. The sender calls the redeliver() method for the message. The sending application crashes after sending the message.
You are troubleshooting an issue with a WLS data source. However, your attempt to execute a manual test on the connection pool fails when you invoke the testPool() method on the corresponding JDBCDataSourceRuntimeMBean. Which configuration condition would contribute to the failure of executing the test? (Choose the best answer.) The TestFrequencySeconds property is set to a value greater than 0. The ManualTestEnabled property is set to false. The TestTableName property is either not set or is set to an invalid SQL statement. The ConnectionReserveTimeoutSeconds property is set to a value other than -1. The TestReservedConnections property is enabled.
You are creating and configuring a production WebLogic Server (WLS) domain that is highly available. Which three WebLogic Server features allow you to best accomplish this requirement? (Choose three.) Cluster Machine migration Multiple standalone managed servers Whole-server migration Load Balancer DNS caching.
You are considering targeting your JMS servers to dynamic clusters to benefit from dynamic scaling. However, you have been advised to keep in mind some of the associated limitations. What are two valid limitations and considerations for clustered JMS services? (Choose two.) Targeting a messaging bridge to a dynamic cluster is not supported. A sub-deployment cannot be targeted to a duster. Store-and-Forward agents cannot be targeted to a cluster (dynamic or mixed). WLST in offline mode does not support the get and set commands to target JMS servers to a dynamic cluster.
Which two automatic migration scenarios require node manager for all migratable services? (Choose two.) Consensus leasing Database leasing with no pre and post migration scripts Synchronous leasing Database leasing with pre and post migration scripts.
The image below depicts a high-level diagram of configuration auditing within WebLogic Server. When Administrators make configuration changes to the WebLogic Server domain, those changes are sent to the audit provider for logging. What task must be performed in order to make configuration audit messages in the log meaningful to an observer? Define unique users for all administrators. Configure the CONFIG severity level. Define the audit message listener for audit messages. Configure a persistent store for log messages.
Your developers have decided to use a deployment plan with their applications that will be deployed by WebLogic administrators into one or more WebLogic Server production environments. Which two primary goals can be accomplished by leveraging a deployment plan? (Choose two.) Expose the external resource requirements of the application, such as JNDI names of datasources. Expose additional configurable properties, such as tuning parameters. Expose the targeted servers for deployment. Expose access points into the application, such as a WSDL for web services. Expose the specific Java EE modules within the application, such as EJBs.
What does the WLST command pwd() do? Initiates an operation to change the current WLST user's password. Displays the location in the file system where the current WLST session was launched. Prints the name of the current server. Displays the current location in the configuration or runtime bean hierarchy. Prints the name of the current domain.
I want to configure automatic migration of pinned services from an unhealthy server to another target in the cluster. I wish to configure consensus leasing for this purpose. Which two statements are true in this scenario? (Choose two.) Set the cluster "Migration Basis" policy to Consensus. A high availability database must be configured to manage consensus leasing information. Set the server "Migration Basis" policy to Consensus. Migratable server should be associated with a node manager.
Which two statements are true about the role of cluster master in whole server migration? (Choose two.) The cluster master must host all the pinned services in the cluster. A cluster master must always be different from a singleton master. Any managed server in the cluster can serve as the cluster master. The cluster master must always be started with the node manager There is exactly one cluster master in the cluster at a given point of time.
In order to increase scalability and high availability you are configuring WebLogic clustering with JMS distributed destinations. Which recommendation will ensure optimal load balancing of the message processing? All servers in the cluster should be assigned to the same WebLogic machine. The cluster should include at least one configurable server. The machines that host the cluster should have similar processing power, disk space, and memory. The cluster should use unicast communication.
Even though your company has a thorough procedure for testing applications in a pre-production environment prior to production deployment, you have decided to conduct additional testing of a particular application after it is deployed. You choose to deploy the application in administration mode. Which three statements are true? (Choose three.) The application must first be distributed to the targeted server prior to starting it in administration mode. The application cannot have any dependencies on any shared Java EE libraries. After testing, the application can be dynamically transitioned to start accepting all client requests. The application deployment must use the redeploy option using a unique version string. You must configure an administration port for the entire domain, or an administration channel for the targeted server.
You are configuring the principals needed to fulfill the security requirements of an application within a sandbox environment that uses the WebLogic Server-embedded LDAP server. The given security requirements provided have outlined the following facts about some test principals: One security requirement states that internal patient data can be viewed only by physicians who are employees.What is an appropriate way to fulfill this security requirement from a principal perspective using the provided information? Create an authorization policy that denies access if a user is a member of the physicians group and their employee attribute is false, bypassing the use of a role entirely. Create an ACL that grants access if a user is a member of the physicians group and their employee attribute is true, bypassing the use of a role entirely. Create an authorization policy that grants access if a user is a member of the physicians group and their employee attribute is true, bypassing the use of a role entirely. Create authorization policies for individual users whose employee attribute is true creating a constraint-only model, bypassing the use of a role entirely.
I am sending a set of ten JMS messages. I want all of these messages to be sent successfully or none at all. Which JMS Session feature is most suitable for implementing such a scenario? (Choose the best answer.) Store and Forward Transacted Session Unit of Order Server affinity Persistent Session.
For some reason, servers in your domain are failing. The host machines are pingable and the WebLogic JVM processes are running but the getState() method on the ServerRuntimeMBean reports FAILED. In the future, when this happens, you want these failed servers to be shut down and then restarted automatically without human intervention. At the same time, you want to constrain how much time will be spent restarting those servers and how many restart attempts will be made. Pick the two options that would help with this situation. (Choose two.) When starting Node Manager, use the WLST nmStart command and pass in a WLST properties object with RestartMax set to an appropriate positive integer. Make sure all managed servers are members of a cluster with ReplicationGroupsEnabled set to true. For each server (or cluster), set RestartInterval to an appropriate positive integer. Start the servers by executing the restartManagedWebLogic.sh script in the domain's /bin directory.
You want to create a WebLogic Server (WLS) Work Manager with a Response Time Request Class of one second. You start to create the following WLST script: Which two can replace the missing sequence to finish this script? (Choose two) managedServer=getMBean('/Servers/ManagedServer') cmo.addTarget(managedServer) cmo.setWorkManaqer(getMBean('/SelfTuning/wls_domain/WorManagers/MyWorkManager')) cd('edit:/Servers/ManagedServer') cmo.addTarget(getMBean('/SelfTuning/wls_domain/ResponseTimeRequestClasses/MyResponseTime')) cmo.addTarget (getMBean('/SelfTuning/wls_domain/WorkManagers/MyWorkManager')) cmo.addTarget(getMBean('/Servers/ManagedServer')) cd('edit:/SelfTuning/wls_domain/WorkManagers/MyWorkManager') cmo.setResponseTimeRequestClass(getMBean('/SelfTuning/wls_domain/ResponseTimeRequestClasses/MyResponseTime')) cmo.addTarqet('/Servers/ManagedServer') cd('/SelfTuning/wls_domain/WorkManagers/MyWorkManager') cmo.setResponseTimeRequestClass('/SelfTuning/wls_domain/ResponseTimeRequestClasses/MyResponseTime') managedServer=getMBean('/Servers/ManagedServer') cmo.addTarget(managedServer) cd('edit:/SelfTuning/wls_domain/WorkManagers/MyWorkManager') cmo.setResponseTimeRequestClass(getMBean('/SelfTuning/wls_domain/ResponseTimeRequestClasses/MyResponseTime')) .
My JMS Server uses a persistent file store. I need to ensure that the size of the persistent store does not exceed 1GB. Which option can I use to configure this? (Choose the best answer.) Set the weblogic.store.FileSize to 1GB. Set the weblogic.store.MaxFileSize to 1GB. The file size limit must be configured at the operating system level. Set the weblogic.store.TotalFileSize to 1GB.
You have defined Uniform Distributed Destination (UDD) topics targeted to multiple JMS servers. Which three statements are correct about UDDs? (Choose three.) UDDs guarantee the order of messages. You no longer need to create or designate destination members. UDDs increase the overall availability of JMS. JMS destinations do not need to run on each server in a cluster. Weight-based load balancing policy distributes messages evenly to servers with preassigned weights.
What is the correct path within the configuration hierarchy to the MBean that contains the log rotation parameters for server04? (Choose the best answer.) /TestDomain/server04/log /Machine02/server04/log /Logs/server04 /server04/log/rotation /Servers/server04/Log/server04 /server04/log /Cluster01/server04/log.
My JMS file store size has grown very large and is using up a significant chunk of the disk. I need to reduce the file size during the maintenance window without impacting any relevant information. Which utility enables me to do this? (Choose the best answer.) weblogic.file.FileUtil weblogic.store.Reducer weblogic.store.Admin weblogic.store.Compacter.
Which three tools allow you to create a Domain Template? (Choose three) weblogic.Build JDeveloper pack command Smart Template Wizard Domain Template Builder Archive command WLST.
You are creating a Domain Template to simplify the process of deploying a domain across multiple hosts. Which five types of information can be included in a Domain Template? (Choose five.) Windows and UNIX server start scripts LDAP data. custom folders and files JTA log. e-mail notification settings Java Enterprise Edition (Java EE) applications and shared libraries domain configuration, those included in the config.xml file Windows Start menu entries.
Which three statements are correct regarding the WLST create command? (Choose three.) When the create command is used with WLST online, the connection must be to the administration server. The create command is used to create any configuration or runtime management bean. The create command returns a WLSTProgress object. The correct order of the mandatory parameters for the create statement is name followed by childMBeanType. The type of MBean being created must be a child type of the current management object.
Which three WebLogic Server entities can be set up for service level migration? (Choose three.) User Defined Singleton Service JTA Transaction Recovery Service JMS Server JOLT Service JNDI Service JDBC Service.
Some of the messages entering a JMS queue are expiring and are being removed from the queue. You need better insight regarding these expired messages. Which mechanism helps achieve this? (Choose the best answer.) Set the "Log Expired Message" attribute to true for the queue. Configure an Expiration Event Handler for the JMS Queue which logs the expired message properties. Enable Message Life Cycle logging for the JMS Queue. Associate an ExpirationEventHandler object for the queue.
You are asked to create a WLST script to make live updates to a domain that has its administration server running. You want your script to mimic the actions of a WebLogic administrator by using the administration console and clicking the "Lock and Edit" button.What commands would accomplish this? lockDomain() followed by editDomain() clearPending() followed by lockDomain() getLock(0) followed by edit() edit() followed by startEdit() domainConfig() followed by cd('Edit') lockDomain() followed by edit().
You created a script to monitor your WebLogic Server WLS Execute Thread: #!/bin/bash jstack $1 > stack.txt rm ExecuteThread.log while read line do echo $line | grep "^\".* ExecuteThread:" >> ExecuteThread.log done < stack.txt rm stack.txt Here is a message in your ExecuteThread.log file What is the value of xxxx if the thread has been running a request for twenty minutes, assuming a default configuration? FAILED STUCK ADMIN WAITING RUNNING SRANDBY ACTIVE.
Report abuse Consent Terms of use