A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:
Which PMI modules can the administrator examine to obtain this data?
Correct Answer:C
Monitoring overall system health. To monitor overall system health, monitor the following statistics at a minimum:
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/tprf_monitoringhealth.html
A system administrator was asked by the development team to inform them of any warning message which contains a string “Connection” on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.
Correct Answer:C
The High Performance Extensible Logging (HPEL) facility writes to the log and trace repositories in a binary format. You can view, query and filter the repository using the LogViewer command.
logviewer.sh -monitor -includeLoggers Connection
-monitor [integer]Specifies that you want the logViewer to continuously monitor the repository and output new log record entries as they are created. You can provide an optional integer argument after this parameter to specify how often you want the LogViewer tool to query the repository for new records. By default the logViewer queries the repository for new records every 5 seconds. When used with other filtering options, only those new records that match the filter criteria are displayed.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/rtrb_logviewer.html
A system administrator has created a Jython script called globalScript.py.
What should the administrator do to ensure globalScript.py is loaded when the wsadmin shell is used?
Correct Answer:D
wsadmin.properties has this entry com.ibm.ws.scripting.profiles where we can add the scripting files to be loaded.
References: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rxml_ propscript.html
A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.
How should the administrator fix this?
Correct Answer:A
Deleting profiles. You can delete a profile using the manageprofiles command. If the command fails, you can delete the profile using operating system commands.
Before you begin: If a node within a profile is federated to a deployment manager, before you delete the profile, stop the node and remove the node from the deployment manager.
Otherwise, an orphan node remains in the deployment manager.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/tpro_removeprofile.html
A system administrator needs to trigger a javacore only when a java,net.SocketTimeoutException is encountered in real time.
What does the administrator have to configure to trigger the javacore dump?
Correct Answer:B
Dump agents are set up during JVM initialization. They enable you to use events occurring within the JVM, such as Garbage Collection, thread start, or JVM termination, to initiate one of four types of dump or to launch an external tool. Default dump agents are set up at JVM initialization They are sufficient for most cases, but the use of the -Xdump option on the command line allows more detailed configuration of dump agents. The total set of options and sub-options available under -Xdump is very flexible and there are many examples presented in this chapter to show this flexibility.
Example: To generate system cores:
-Xdump:system:events=user
References: http://www-01.ibm.com/support/docview.wss?uid=swg21242497
A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
Correct Answer:B