Você está na página 1de 21

1)tell me about yourself

2)can u tell about your was experience?


3)can you tell about your roles and responsibilties of your project?
4)can you tell about your project architecture?
5)what is your daily roles and responsibilties?
6)which ticketing tool you are using?
Ans. BMC Remedy tool

IHS
1)Which webserver you are using?
Ans.IHS
2)how to find out which version you are using?
Ans. Versioninfo.sh
3)Differences between embedded http server and external http server?
Ans.
4)Default port number of Http server?
Ans.9080
5)What is the command to start and stop Httpserver?
Ans.Startserver.sh server1
6)How can you check if your Http server (or) Web server is running or not?
Ans.
7)Default port number of IHS admin server?
Ans.80
8) What is the most important config file located in IHS http server and
where it is located?
Ans.
9)what are the parameters in httpd.conf file?
Ans.
10)How to enable SSL for webserver?
Ans.
11)What are all the Config changes we have to do to enable virtual host for
webserver?
Ans.
12)How many plugins are required by Http server?
Ans.
13)How do Http server Know if it is a static request (or) Dynamic Request?
Ans.
14)How can we know how many requests are in Queue?
Ans.
15)What are all the log files inside the HTTP server?
Ans. activity log ,access log

16)How Can we Know Http Server is properly installed or not?


Ans. once the installation done we can enter\ http://hostname it will give out put..
if not give , through log also we can come to know

17)What are all the different modes available to install IBM Http server?
Ans.
18)What are the Parameters available in IHS Servers Response file?
Ans.

APPLICATION SERVER
1)Which version of application server you are using?
Ans.
2)Differences beyween 5.0,5.1,6.0,6.1?
Ans.
3)What is the latest version of WAS?
Ans.7.0.0.0
4)Which Version Of java is being used by WAS 5.0,5.1,6.0,6.1?
Ans.
5)Is it possible to change Java Version?
Ans.yes
6)How you are going to install WAS?How do you know installation is
successful?
Ans.
7)If you get a problem before creating a logs directory, at that time where
you can check status of installation?
Ans. under /tmp file system you wil get log's
8)What are the Pre-Requisties for WAS installation?
Ans.
9)How can you verify the version of WAS?
Ans.versioninfo.sh
10)What is the latest Refresh pack?
Ans.
PROFILES
1)What is a profile?
Ans. profiles are a set of files that represent a websphere application server
configuration
2)What is a cell?
Ans. It is grouping of nodes in to a single administrative domain. In the base and
express configurations, a cell contains one node.
3)what is a node?
Ans. logical group of servers.
4)what is a server?
Ans. Server is a run time environment in which to deploy manage, and run j2ee
applications.

5)what is a application?
Ans. Application Server is a run time environment in which to deploy manage, and
run j2ee applications.
6)what is a nodeagent?
Ans.Interface between node and dmgr
7)what is a managed node and unmanaged node?
Ans. Node with Node Agent
8)What is Web application and Enterprise Application
Ans.
9.What are the components available in WAR and EAR files?
Ans.
10.How to create a profile and what are all the ways?
Ans.
11.How to federate a profile?
Ans.addnode.sh localhost soap prot no
12.What is the DMGR SOAP connecting port?
Ans.8879
13What are the different kinds of profiles?What is the use of each profile?
Ans.Deploymeny\t manager, application server, custem ,cell
14.How can we know how many profiles are available?
Ans. Four profiles r available 1.dmgr 2.application server 3.custem 4.cell
15.Default admin console port number?
Ans.9060
16.Complete command for federation?
Ans. Addnode.sh localhost soapconn prot no
17.what is the admin console port number if security is enabled?
Ans.9043
18.What is meant by federation?What you have understood about
federation?
Ans.
19.What happenes if a profile is federated to DMGR at that time when it is
stopped?What happens to the applications under the servers?
Ans.
20.What happens to applications if node agent is not running?
Ans.
21.How can you change port number ?In which XML file all the port
numbers are available?
Ans.serverindex.xml file
22.What is the default location of serverindex.xml file?
Ans.
23.What is the default SOAP connector port of application server profile?
Ans.8880
24.How to take back up without stopping server?

Ans.
25.What is boot strap port number?
Ans.2809
26.IS it possible to communicate between two cells?
Ans.

GLOBAL SECURITY

1.What is the necessasity of global security?


Ans. It provides the authentication and authorization for websphere application
server domain (administration client or console).
2.What are the different types of user registries available?
a)
Ans. There are four user registries
1)
Local O/S
2)
LDAP
3)
Federated repository
1) Custom Repository

3.Which user registry you are using?


Ans.Ldap ,local o/s
4.Which LDAP version you are using?
Ans.
5.Tell me the steps how to configurev LDAP registry?
Ans.
6.What is single signon?
Ans. Single sign-on (SSO) is a property of access control of multiple, related, but
independent software systems. With this property a user logs in once and gains
access to all systems without being prompted to log in again at each of them.
Single sign-off is the reverse property whereby a single action of signing out
terminates access to multiple software systems.
As different applications and resources support different authentication mechanisms,
single sign-on has to internally translate to and store different credentials compared
to what is used for initial authentication.
7.What is the port number for LDAP server with SSL and without SSL?
Ans.389
8.What is the difference between base distinguished name and bind
distinguished name?
Ans. Base distinguished name (DN) :Specify the domain components of the DN of
the account that is chosen in the first step. For example: dc=ibm, dc=com
Bind distinguished name (DN) :Specify the full distinguished name of the account
that is chosen in the first step. For example: cn=adminUsername, cn=users,
dc=ibm, dc=com
9.What are the advantages and disadvantages of Local OS,Custom and LDAP
user registries?
Ans. For maintaining large member's we can go for LDAP
10.How to enable Global security by using Custom registry and local OS
registrty?

Ans.
11.how to disable security?
Ans. Two types 1. Select global security to disable the Enable global security, 2. To
select security.XML file in that to change True or False.
12.What are the different kinds of roles available and explain about each
role?
Ans.
13.How to provide security for application users?
Ans. developers will provide thos security other wise from our end we can give
Java2security check box need to enable.

DATABASES
1.On which database server you have worked so far?
Ans.
2..Which version of oracle and DB@ you are using?
Ans.
3.How to check the status of database?
Ans.
4.do you have any knowledge on database?
Ans.
5.Tell me the confi steps to create JDBC providers?
Ans.
6.What is the difference between JDBC provider and data source?
Ans.
7. .What is the difference between connection pool data source and XA data
source?
Ans.
8.Types of JDBC drivers?
Ans.Type2 and type4
9) Differences between Type 2 And type 4 driver?
Ans. we have 2 types of JDBC drivers in was . Those are Type2(Thick) and
Type4(Thin/Native Protocol) jdbc drivers.Type2 JDBC drivers require the database
client software on the client node to connect to the database server.Type4 JDBC
drivers connect directly to the database server.
10)What are the JAR files necessary to configure DB2 database?
Ans. /opt/IBM/db2/V9.5/java
-r--r--r-- 1 bin
bin
172716 May 15 2009 db2qgjava.jar
-r--r--r-- 1 bin
bin
1663971 May 15 2009 sqlj4.zip
-r--r--r-- 1 bin
bin
1633889 May 15 2009 sqlj.zip
-r--r--r-- 1 bin
bin
2900237 May 15 2009 Common.jar
-r--r--r-- 1 bin
bin
9095 May 15 2009 db2umplugin.jar
-r--r--r-- 1 bin
bin
149313 May 15 2009 db2policy.jar
-r--r--r-- 1 bin
bin
8 May 15 2009 .level
-r--r--r-- 1 bin
bin
877292 May 15 2009 db2java.zip
-r--r--r-- 1 bin
bin
1015 May 15 2009 db2jcc_license_cu.jar
-r--r--r-- 1 bin
bin
3242907 May 15 2009 db2jcc4.jar
-r--r--r-- 1 bin
bin
3084872 May 15 2009 db2jcc.jar

drwxr-xr-x 7 bin
bin
256 May 15 2009 jdk64
-rwxrwxrwx 1 wassrvr websrvr
2068 Jun 04 2009 db2jcc_license_cisuz.jar
.......................................
/opt/IBM/db2/V9.5/java/db2jcc.jar
/opt/IBM/db2/V9.5/java/db2jcc_license_cu.jar

/opt/IBM/db2/V9.5/java/db2jcc_license_cisuz.jar
11) What are the JAR files necessary to configure Oracle database?
Ans.
12)What is the default user name of DB2 and Oracle?
Ans. db444,db445 for DB2
13) What is the default port number name of DB2 database and Oracle
database?
Ans. 60000,60004 for DB2
14)Explain the mechanism of connection pooling?What is the advantages of
connection pooling?
Ans.
15)What is meant by minimum connections and maximum connections?Who
will give all the details?
Ans. specifies the minimum number of physical connections to maintain.
(a)the Unused Timeout thread does not discard physical connections
(b)Also, if you set a value for Aged Timeout, connections with an expired age are
discarded, regardless of the minimum pool size setting.
Maximum connections:
Specifies the maximum number of physical connections that you can create in this
pool
(a)These are the physical connections to the backend resource.
Once this number is reached, no new physical connections are created and the
requester waits until a physical connection that is currently in use returns to the
pool, or a ConnectionWaitTimeout exception is issued.
(b)If Maximum Connections is set to 0, the connection pool is allowed to grow
infinitely.
16)What is unused timeout?
Ans. Specifies the interval in seconds after which an unused or idle connection is
discarded.
(a)Unused physical connections are only discarded if the current number of
connections exceeds the Minimum Connections setting.
17) What is aged timeout?
Ans. Specifies the interval in seconds before a physical connection is discarded.
(a)if the Aged Timeout value is set to 1200, and the Reap Time value is not 0, any
physical connection that remains in existence for 1200 seconds (20 minutes) is
discarded from the pool.
(b)The only exception is if the connection is involved in a transaction when the aged
timeout is reached. If it is the connection is closed immediately after the transaction
completes
18) What is reap timeout?

Ans. Specifies the interval, in seconds, between runs of the pool maintenance
thread.
(a)If the pool maintenance thread is enabled, set the Reap Time value less than the
values of Unused Timeout and Aged Timeout. When the pool maintenance thread
runs, it discards any connections remaining unused for longer than the time value
specified in Unused Timeout, until it reaches the number of connections specified in
Minimum Connections. The pool maintenance thread also discards any connections
that remain active longer than the time value specified in Aged Timeout.
19)What is purge policy?
Ans. Specifies how to purge connections when a stale connection or fatal connection
error is detected.
Note :Valid values are EntirePool and FailingConnectionOnly
20)When you will get Stale connection exception?
Ans. Any connection not in use is immediately closed.
A connection in use is closed and issues a stale connection Exception during the next
operation on that connection.
21) When you will get connection time out exception?
Ans. The maximum value of connections in the particular connection pool has been
reached.
For example, if Connection Timeout is set to 300, and the maximum number of
connections are all in use, the pool manager waits for 300 seconds for a physical
connection to become available.
If a physical connection is not available within this time, the pool manager initiates a
ConnectionWaitTimeout exception.

PLUGINS
1)Importance of plugins?
Ans.
2)Where you are going to install plugins?
Ans.
3. what are all pre requisites to install a plugins?
Ans.
4. which config file is necessary at the time of installing plugins?
Ans. httpd.conf file
5. what is web server definition ?
Ans.
6. what information is available in plugin cfg. Xml file?
Ans. Plug-in configuration file contains routing information for all applications
mapped to the web server. This file is read by binary plug-in module loaded in the
web server.
Plugin-cnf.xml file will have all the configuration setting to determine whether
a request is for the webserver or the application server. When a request reaches the
web server, the URL is compared to those managed by the plug-in. If a match is

found, the plug-in configuration file contains the information needed to forward that
request to the web container using the web container inbound transport chain.
7.
What are the different log files in plugins?
Ans. access.log,error.log
In Administrative console
Servers --> Webservers -->Webserver -->log files (configuration tab)( here
we can change the path of the log files
8.
How the web server knows plugin cfg.xml file is available in a
particular location?
Ans.
9.
Is it possible to communicate from web server to application server
without plugin?
Ans.
10. How to enable ssl for plugins?
Ans.
11. How to generate and propagate plugin cfg.xml file?
Ans. Application deployment at that time we will generate plugin cfg.xml file
12. DEfalult location of plugin Cfg.Xml file/
Ans.
13. Difference between local plugin and remote plugin?
Ans.

CLUSTERS
1.
Tell me the architecture of WAS?
Ans. The WebSphere architecture contains
Cell, DMGR, Node.
Where Cell on top of the hierarchy. Within the cell Dmgr will be there where
admin console is lying. For the Cell we can federate the Nodes and on the
Nodes we can configure the application servers.
If you want then I can explain the Web container and EJB container and Web
server and JDBC etc.
Web container
when we receive request from client browser so web container will act as interface
between client request and Servlets and jsp in other words Servlets and jsp will
reside under web container in order to server client request. hence we required web
container in order to invoke Servlets or JSP (Java Server Pages)
EJB Container:
An Enterprise JavaBeans (EJB) container provides a run-time environment for
enterprise beans within the application server. The container handles all aspects of
an enterprise bean's operation within the application server and acts as an
intermediary between the user-written business logic within the bean and the rest of
the application server environment.
One or more EJB modules, each containing one or more enterprise beans, can be
installed in a single container.

The EJB container provides many services to the enterprise bean, including the
following:
Beginning, committing, and rolling back transactions as necessary.
Maintaining pools of enterprise bean instances ready for incoming requests
and moving these instances between the inactive pools and an active state,
ensuring that threading conditions within the bean are satisfied.
Most importantly, automatically synchronizing data in an entity bean's
instance variables with corresponding data items stored in persistent storage.
2. . What is the responsibilities of Web container , EJB container and
JNDI ?
Ans.
3. Explain the request flow of your Environment?
Ans.
4. What is High availability?
Ans.
5. What is work load management?
Ans.
6. What are the differences between load balancing and work load
management?
Ans.
7. What is the default work load management policy?
Ans.
8. What is cluster ? Why we need a Cluster ?
Ans.
9. What are the different types of Clusters available?
Ans. Types of clusters:

vertical cluster - members of cluster must be at same node


horizontal cluster - members of cluster must be at different nodes
10.Use of Horinzontal and vertical Clusters? Which better performance
among these?
Ans. vertical cluster - members of cluster must be at same node

horizontal cluster - members of cluster must be at different nodes


11.How to assign weights to Cluster members?
12.How to deploy an application in one Cluster member out of four
Cluster members?
Ans. it is possible , we can target the particuler cluster of nodes while deploying
the applicaiton.
13.What is replication domain?
Ans.

VIRTUAL HOST*
1. What is virtual host?
Ans. A virtual host is a configuration that enables a single host machine to resemble
multiple host machines. This configuration allows a single physical machine to

support several independently configured and administered applications. A virtual


host is not associated with a particular node. It is a configuration, rather than a live
object, which is why you can create it but you cannot start or stop it.
2. How to configure Virtual host?
Ans. Select environment-> virtual host-> click new and provide name and
apply.click on host alias in additional properties panel.provide host name ,port no,
click apply and save
3. What are the different Virtual hosts available in WAS?
Ans. Admin_host, default_host
4. What are all the Port numbers available in default Host and admin
Host?
Ans. 9080, 80,9443-default_host
9060 ,9043-admin_host
5. Which XML file , if I change the fort name or add a fort number to a
particular Host will get updated?
Ans. Serverindex.XML file
6. How to configure Virtual Host for WAS?
Ans. select environment-> virtual hosts->click new and provide name and
apply.click on Host aliases in additional properties panel. Provide host name, port
no, click apply and save.
7. Is it possible to change Virtual Host name after deployment of an
application? If it is how can we do that?
Ans.Yes, we can change the virtualhost just click on the app name and
virtulahosts and select what you need the virtualhost(before u can create for ur
needed virtulhost)
8. Is it possible to a server to listen to multiple fort numbers?how
Ans. Yes,we can make the server to listen N no of ports

u should enable the unique ports in webcontainer settings as well as in virtualhost


configuration

SSL
1.Tell me in detail how you are going to enable SSL for Web server,
Plugins and application server?
Ans.
2.Difference between Trust file and key file?
Ans.
3.What is a CSR?
4.How you are going to get a certificate from certificate authority?
Ans.
5. What are the different ways to deploy an application?
Ans.
6. What is the necessity of a context root?
Ans.
7. Why we have to specify context root for War files but not for EAR file?
Ans. see WAR file are web related related project so we can have for accessing ..
8. What is the context root available for EAR files ? What is the file
name?

9. What is the Deployment descriptor?

FIX PACKS
1. Difference between refresh packs, fix packs, internal fixes?
Ans.
2. How we are going to install a Fix pack explain all the steps?
Ans.
3. What are the difference between update and roll out update?
Ans.

GENERAL
1. What is a garbage colleter?
Ans. The iSeries garbage collector is asynchronous (runs in the background),
concurrent (runs at the same time as the rest of your application) and multithreaded.
While these features normally improve GC performance, they also make it more
difficult to see when the garbage collector isn't tuned properly. For example, while
JVMs on other platforms may experience long "pause times" with improper GC
tuning, the iSeries collector doesn't typically cause long pauses in your application
threads. Therefore, you may not realize that your application is experiencing
problems with GC unless you specifically look for these problems.
2. What is Heap memory?
Ans.objects storage space for objects references created at run time in a jvm is
heap
3. What is Heap dump?
Ans.
4. What is a thread dump, Java core dump?
Ans.
5. What is a default heap size?
Ans. Initial Heap Size: 50 MB .Maximum Heap Size: 256 MB
6. What are the different types of syncroziations available?
Ans. Types of Synchronization:
1)Method level Synchronization: A method can be Synchronized by adding a perfix
word Synchronize . Here we have Parametrised Synchronization options also.
example: public Synchronize void foo(){}
2)Block level Synchronization: A block can be Synchronized by adding a perfix word
Synchronize . Here we have Parametrised Synchronization options also.
Synchronize { }

7. How to generate thread dump and heap dump?


Ans. Kill -3 PID
8. Do you chance to analyze both of them?
Ans.
9. what are the different types of logging utilities or trouble shooting
utilities?

Ans.
10.How many JVMs will there for each server?
Ans.
11.IN which log file garbage Colletctor information will be available?
Ans. Native logs file.
12.What are the different kinds of log files in WAS?
Ans. system out, system err, trace, native out , native err, activity.
13.How log analyzer works internally?
Ans.
14.What is the use of collector pool?
Ans. 1) Collector tool is the tool which collects the information about the websphere
application server installation and configuration.
1)
This is available in two versions
a)
Default standalone collector( implemented as a shell script in profle root)
collects almost all the logs and configuration files found on the system, without
distinction
b)

A new flexible collector tool is integrated into ISA

2)
In either case, the result is JAR file that contains a lot of information needed
by IBM support to diagnose the problem
a)

JAR file is to IBM support

b)

Only need to be run upon IBM supports request.


15.Difference between node group and core group?
Ans. A core group is a component of the high availability manager function.
A core group is a grouping of WebSphere cell processes. A core group can contain
stand-alone servers, cluster members, node agents, and the deployment
manager.
A core group must contain at least one node agent or the deployment manager.
In order to delete a core group, the core group must be empty. Connected core
groups are those connected to this core group via access point groups.

Node Group:
(ans)A node group is a collection of WebSphere Application Server nodes. A node
group defines a boundary for server cluster formation.
A node can be a member of more than one node group.
16.Difference between node group and cell?
Ans. the node group can exist in the cell
The main difference between node group and cell is cell can have nodes which are
there in different platforms but nodegroup will have all the nodes which exist on
same type of platform
Ex: in cell you can have nodes which are there in IBM AIX,HP AIX, Windows, Sun
Solaris..
But we will group all windows platform based nodes into one group, and all IBM AIX
nodes into one group etc.
17.What are shared libraries and how to configure them?
Ans.specifies container-wide shared libray that can be used by deployed
application

browse the node or server and select ,after that click new and provide the name
and classpath apply
18.What is generic server ?
Ans. It is aserver that managed dy websphere administrative domain ,although it
si not a server supplied by the webspher application server product. The generic
server can be any server or process that is nessary to support the application
server environment ,include a java server,a c or c++ server or process a core
server ,or a rmi server.
19.Use of service integration logs?
Ans.
20.What are all the disadvantages in memory to memory replication?
ans
21.What is PMI?how to enable PMI?
Ans: monitoring and tuning>PMI>select any process (server1, nodeagent,
dmgr) and then enable PMI>then apply and then save. Select performance
viewer>current activity and then select enabled process and click the start
monitoring button after that process select.
22.How to check all the servers in multiple notes are running or not?
23.How to increase a heap size through command line and explain the
perameters?
Ans. It is possible to increase heap size allocated by the Java Virtual Machine (JVM)
by using command line options.
Following are few options available to change Heap Size.
1 -Xms<size>
set initial Java heap size
2 -Xmx<size>
set maximum Java heap size
3 -Xss<size>
set java thread stack size
For example, you can set minimum heap to 64 MB and maximum heap 256 MB
for a Java program HelloWorld.
1.java -Xms64m -Xmx256m HelloWorld
24.What is a dynamic cache?
Ans.
25.What is a cache monitor?
Ans.
26.What are the different types of caching mechanisms we have?
Ans.
27.How to tune the performance?
Ans. All the steps for Performance Tuning would approximately take 45 minutes.
JVM Heap Size
By default, the Java virtual machines for WebSphere Application Server and
WebSphere Portal Server are assigned only 256 MB per process. This value should be
increased.
To change this value, open the WebSphere Admin Console and go to
Servers -> Application Servers -> (all server names) -> Process Definition -> Java
Virtual Machine
and set both initial heap size and max heap size to an adequate value:
on a machine with 4 GByte of real memory, set it to 1024 MByte, on a 8 GByte
machine to 2048 MByte.

If a value greater than 1024 MByte is selected, it may be necessary to change the
AIX parameter LDR_CONTRL. For details, please refer to the AIX documentation.
Session Timeout
Reducing the session timeout can help reduce memory consumption requirements.
To change this value, open the WebSphere Admin Console and go to
Servers -> Application Servers -> (all server names) -> Web Container -> Session
Management -> Session Timeout
and set Timeout to 10 Minutes.
Class Garbage Collection
To change this value, open the WebSphere Admin Console and go to
Servers -> Application Servers -> (all server names) -> Process Definition -> Java
Virtual Machine -> Generic JVM arguments
and add the parameter -Xnoclassgc.
Servlet Engine Thread Pool Size
To change this value, open the WebSphere Admin Console and go to
Servers -> Application Servers -> (all server names) -> Web Container -> Thread
Pool
and add the parameters for Minimum size threads and Maximum size threads to 70.
Data Source Connection Pool Size
To change this value, open the WebSphere Admin Console and go to
Resources -> JDBC Providers -> (all providers) -> Data Sources -> (all data sources)
-> Connection Pools
and set the parameters for Minimum connections and Maximum connections to 50.
Statement Cache Size
To change this value, open the WebSphere Admin Console and go to
Resources -> JDBC Providers -> (all providers) -> Data Sources -> (all data sources)
And set the parameter for Statement Cache Size to 500.
28.How to enable log rotation in HTTP server?
Ans.
29.How to configure JMS?
Ans.
30.What is a Queue connection factory?
Ans.
31.what happens when you use Syncnode.sh?
ans.
32.which problem management tool you are using?
Ans.
33.what is session persistence?
Ans.
34.Difference between one way SSL and two way SSL?
Ans.
35.What is the use of activation specification in JMS?
How to configure message resource?
ans
36.What are the performance tuning metrics?
Ans.
37.How to verify session failover in memory to memory replication?
Ans.

38.What is hung process?


Ans.
39.what is tunneling?
Ans.
40.What is session affinity?
Ans.
41.What is the difference between Session ID and Clone ID?
What are the dis-advantages of memory to memory replication?
Ans. it consumes large amount of memory in networks with many users, because
each server has a copy of all sessions. And another disadvantage is each change
to a session must be replicated to all application servers.
42.How can we check how many users are using admin console?
Ans.
43.How can we check how many users are accessing the log files?
Ans.
44.what is session failover?
Ans.
45.How can we send 100 requets to server1,50 requests to server2,40
requests to server3?
Ans.
46.What is federated Repository?
Ans. Federated Repository is one of the existing users registry type. In this
method we can use multiple repositories with WebSphere application server.

Default repository is a file based federated repository


Can be file based, LDAP, Multiple LDAPs or subtree of an LDAP
Defined and theoretically combined under a single realm
All of the user repositories that are configured under federated
repository functionality are invisible to WebSphere application server.
Federation capabilities are provided by the VMM(Virtual Member
Manager)

47.How round robin algorithm works?


Ans.
48.How to access HTML files from application server even though you
have web server?
Ans.
49.what is the maximum heap size and how you are going to set
maximum heap size?
Ans.
50.If we increase heap size in which XML file it will get updated?
Ans.serverindex.xml file
51.Tell me the full syntax of syncnode.sh?
Ans. We can Sync Node in two ways
From Command prompt : stop the Node then issue the SynNode command in the
command prompt.
<Node_Host>/bin> SyncNode <DMGR_HOST> <DMGR_PORT> [Options]
-username
-password
-restart
-conntype
-quit

-stopserver
2) From Admin Console:
Select System Administration --> Nodes--> Synchronise (Select the Particular
node to sync)
WEB SERVER ADMIN.
1.What are the different types of WS admin. We have?
Ans. AdminConfig Object, AdminControl Object, Adminapp object, Admin task object
2.Explain in detail what is the purpose of each WS Admin object?
Ans. Introduction to Admin Objects, is a must-read because it explains how to
configure wsadmin in order to use many of the examples shown later in the book.
The wsadmin properties that are shown in this chapter (specifically the changing of
the profiles directive) provide an environment upon which many of the later
examples depend.
The AdminConfig Object, is the beginning of the explanation of the wsadmin
scripting objects. Specifically, it explains the AdminConfig scripting object in great
detail. Many administrative scripts deal primarily with the AppServer configuration
use and depend upon this scripting object for the vast majority of these
manipulations. A number of useful examples are provided to demonstrate just how
helpful this scripting object can be.
The AdminControl Object, describes the AdminConfig scripting object in similar
detail. This object is used by scripts that need to manipulate active AppServer
objects (MBeans). So this chapter is full of useful information for those types of
scripts.
The AdminApp Object, covers the AdminApp scripting object in detail. This object
is used to list, view, install, uninstall, and modify AppServer applications. As such,
this chapter explains how to perform these operations using the AdminApp object
methods.
The AdminTask ObjectServer Management, is where we begin the description of
some of the AdminTask scripting object methods. The AdminTask object is
enormous. Additionally, as is explained in this chapter, the methods included vary
based upon a number of factors. The scope (as in breadth and depth) of this object
is huge. It includes hundreds and hundreds of methods. As such, there is no way for
it to be adequately covered in a single chapter. In fact, Chapters 12 through 15
largely deal with AdminTask object methods. Thats not all they cover, but it is at
the core of each of these chapters.

3.What are the different types of scripting mechanisms available in


websphere?
Ans.
4.What are the differences between JACL and JYTHON?
Ans. a) Jython depends on the Python commands whereas Jacl(Java command
language) depends on the Tcl commands.

b) Jython syntax seems more natural to programmers used to Java or C, but Jacl
syntax can be more familiar to administrators who are familiar with Tcl
c) Each language has its own style and syntax, but they end up being able to do
the same things
WSADMIN scripting tool can be used in an interactive mode, the main ability for
wsadmin is to provide the ability to run scripts.
5.Which scripting you are using?
Ans.
6.How to configure log rotations for webserver?
Ans.
7.What is compiler optimization?
Ans.
8.What is the use of class loaders?

Ans.

9.Tell me the mechanism of class loader?


Ans.
10.What are the difference between Java2 security and J@EE security?
Ans.
11.What is ULimit?
Ans.
12.What are the properties we have to configure to generate heap dump
once you generate a thread dump?Where you have to configure the
properties?
Ans.
13.How to generate a Thread dump?
Ans.
14.What is the default location of a Thread dump and what is the format?
Ans.
15.How to generate a heap dump and what is the default location of heap
dump and what is the format?
Ans.
16.What are the differences between thread dump and heap dump?
Ans. Thread Dump: When we trigger a thread dump on a application server,all
active thread informations will be dumped into file which is known as thread dump.
Here we can get information about thread like active thread, hung thread, dead lock,
runnable and inactive thread info.
Command:kill-3PID
Core/Heap Dump: Its snap shot of our JVMs Heap memory, so here we can have
all active java objects and their activities which object doing what and how much
memory it is occupying.
17.What is PMI?what is the use of PMI?
Ans.
18.How can we check the performance of the application server without
external monitoring tools?
19. What is the difference between JVM and JRE?
20.In which log file garbage collector information will be recorded?How to
enable Garbage collector?

SHARED LIBRARIES

1.Use of shared libraries?How to configure them?


2.What is the difference between System out..log file and trace.log file?

ISSUES
1.How you are going to troubleshoot if you are getting403,404,500 error?
Explain?
Ans. HTTP 403 Forbidden:
Edge component is not configured properly
SSO configuration might be not configured yet. WCP (WebSphere Catching
component)
There was separate team for proxy configuration so no idea on this issue.
HTTP 404 (Page not found or file not found):
Need to check the system out file for the logs and verify the ear file
HTTP 500 internal errors:
It is server-side error (Web server or application server). Might be application server
or web server or down. Need to recycle by verifying the system out logs for analysis.
2.What is the reason for out of memory exception?
Ans.You may receive "out of memory" exception error messages, although as much
as 2 gigabytes (GB) of physical memory is still available. This problem is most likely
to occur when stress levels are reached and when you are using many large objects
(objects that are over 85 kilobytes [KB]).
3.If we get page cannot be displayed then how you are going to
troubleshoot the issue?
4.What is the difference between page not found and HTTP 404 error?
Ans. The Page not found error is, the request is not reaching the server. HTTP 404
errors is request is reaching to server but whatever it is expecting its not found at
expected location
5.What are the general issues you are facing normally in the production
environment?
6.When you will get class loader exception?
7.What is the most challenging experience you have faced in your WAS
experience?

1.What is the difference between Symmetric keyexception and Asymmetric


key exception?
Ans.
2.How does SSL works?
Ans. SSL uses a combination of asymmetric and symmetric encryption to create a
session between the client and server.
-Asymmetric encryption is used to negotiate a session key (shared secret)
--asymmetric encryption is slow but does not require a shared secret.
-Symmetric encryption os used to transfer data between the client and server
-- symmetric encryption is fast but require a shared secret
SSL Working Mechanism:
Client request SSL connection
Server presents certificate

Client verifies server certificate


Client generate a session key, encrypts it with the servers public key
Using the session key, client and server swith to asymmetric key encryption
HTTPS communications
Note : Because the client chooses its own session key, nobody else knows it. It can
securely send that session key to the server using the servers public key. Now
nobody but client and server knew the session key. The session key is then used as
shared secret to switch to much more efficient symmetric key encryption.
Certificate (signing certificate) contains information about the server, including the
servers public key, and is digitally signed by the certificate authority.
Configuration of SSL in WebSphere :
SSL configuration can be achived in three different ways
1) From Admin console:
Once we get the certificate from CA (Certificate Authority) then we will import into
trust store. To enable security between IHS and Application server we need to export
defaut personal certificates of all nodes and import the same to the trust store of the
IHS.
2) Command line :
By using gsk7cmd command we can achive the SSL configuration. Gsk7cmd
provides the otions like import ,export,list,create options for certificates
Gsk7cmd cert create db plugin-key.kdb pw password label websphere
pluginkey -dn
3) ikeyman:
By using ikeyman we can open the KDB(key data base) and add the certificates to
the key database.
3.What are the different types of log levels you have?
Ans.
4.If we give heap size value min=max at that time what are the advantages
and dis-advantages?
Ans.
5What are FFDC logs? What is the use of that?
Ans.
6.In how many ways we can deploy the application? And what is the
command to deploy the application?
Ans.
7.What are the differences between WAR, EAR and JAR files?
a)
Ans. In J2EE application modules are packaged as EAR, JAR and WAR based
on their functionality
JAR: EJB modules which contains enterprise java beans class files and EJB
deployment descriptor are packed as JAR files with .jar extenstion
WAR :Web modules which contains Servlet class files,JSP FIles,supporting files, GIF
and HTML files are packaged as JAR file with .war( web achive) extension
EAR :All above files(.jar and .war) are packaged as JAR file with .ear ( enterprise
archive) extension and deployed into Application Server.
There is no much difference in deploying these applications. We need to give context
root for WAR and for others no need to give.
EAR deployment:If we have two or more modules then we can target individual
modules to individual servers.
8.Purpose of JNDI?

Ans. Suns JNDI API is a standard extension to the java platform and it allows the
java application to access naming and directory services. With the help of JNDI java
applications can seamlessly access the heterogeneous enterprise naming and
directory services like DNS, LDAP, and Local file system, or objects in an application
server.
9.What are WAS resources?
Ans. WAS resources are JDBC, JMS,Mail service,Resource Adpaters, Cache instances,
URL,Etc..
10.What is EAR Expander?
Ans.
11. What is Ripple start?
Ans) Ripple stop/start will stop one server at a time while other servers will continue
to serve the client requests. Like this it will stop and start all the server in the cluster
12. How do you check Heap is used by JVM?
Ans.

UNIX COMMANDS
1. What is the command to find the running processes?
Ans ps-efl grep java
2. What is the command to find the disk space?
Ans df
3.. What is the command to find the CPU utilization?
Ans topas
4. Command to kill a process?
Ans kill -9
5. How to generate thread dump and Heap dump?*
Ans kill -3
6. How to change privileges to a file or folder?*
Ans chmod
7. How to change Ownership to a file or folder?*
Ans chown
8. Command to list the files?*
Ans ls
9. How to JAR the files?
Ans
10. How to schedule the Jobs?
Ans
11. How to check IP address?*
Ans ipconfig
12. How to check process ID ?
Ans
13. How to check Java ID?
ans
14. How can you know NIC cards are enable or not?
15. How to find out CPU utilization for singal process?*
16. What is the purpose of symbolic link files?

17. In which location password file is located?


18. How to change a password?
19. Purpose of GREP command?*
Ans it search file
20 How to copy a file from one Unix machine to another Unix machine?
Ans
21. What is SSH?
Ans
22. What is Secure copy?
Ans
23. How we are going to connect to your Unix boxes?
24. Which Flavor of Unix your using?
Ans LINux
25. Which version of are RHEL your using?
Ans versioninfo
26. How can you find a string in a file?
27. How can you replace a text with a particular string?
28. Tell me the full syntax of SCP command?
29. How can you know fort is running or listening or not?*
Ans netstat
30. Tell me VI editor commands? How to open, Edit, Save and close a
file?*
Ans vi file, insert, wq!

Você também pode gostar