Powered By Blogger

Monday, April 21, 2014

Weblogic Server Commands

$ # Start NodeManager
$ nohup $WLS_HOME/server/bin/startNodeManager.sh > /dev/null 2>&1 &


$ # Start WebLogic
$ nohup /u01/app/oracle/config/domains/mydomain/startWebLogic.sh > /dev/null 2>&1 &
$ # or
$ nohup /u01/app/oracle/config/domains/mydomain/bin/startWebLogic.sh > /dev/null 2>&1 &

$ # Stop WebLogic
$ /u01/app/oracle/config/domains/mydomain/bin/stopWebLogic.sh


$ # Start Managed Server
$ nohup /u01/app/oracle/config/domains/mydomain/bin/startManagedWebLogic.sh AdminServer > /dev/null 2>&1 &

$ # Stop Managed Server
$ /u01/app/oracle/config/domains/mydomain/bin/stopManagedWebLogic.sh AdminServer


$ # Start the configuration wizard
$ $WLS_HOME/common/bin/config.sh

SSL in Weblogic

1.       Generate Keystore        
keytool -genkey -alias alias123 -keyalg  RSA -keysize 2048  -keystore identity.jks -storepass storepass123 -keypass keypass123

We get  identity.jks file from this
2.       Generate the CSR file
keytool -certreq -keyalg RSA -keysize 2048 -alias alias123 -file certreq.csr -keystore identity.jks -storepass storepass123 -keypass keypass123

3.       Using the certreq.csr file generated get SSL certificate, root certificate & intermediate certificate
We name as
                SSL certificate - cert.cer
root certificate- rootCA.cer     (Will be used to import in the browser)
intermediate certificate- intermediatCA.cer     

4.       Now club all these 3 certificates obtained in the order and name the resultant file as CertRootInter.pem
1. cert.cer
2. rootCA.cer
3. intermediateCA.cer

5.       Import CertRootInter.pem file to keystore
keytool -import  -file CertRootInter.pem -alias alias123 -keystore  identity.jks -storepass storepass123 -keypass keypass123

6.       Create the trust file by importing rootCA.cer
keytool -import  -file rootCA.cer -alias alias321 -keystore trust.jks -storepass storepass123 -keypass keypass123

By doing step 6 and 7 we have got
1.     Identity file ( identity.jks ) which contains the certificates you got from certificate authority
2.      Trust file ( trust.jks ) which contain rootCA certificate

7.       Now login to Weblogic and select the managed server
Navigate to keyStores tab

Keystores: Custom Identity and Custom Trust
Custom Identity Keystore: D:\shamajith\middlewareinstaller\jdk160_29\bin\identity.jks
Custom Identity Keystore Type: jks
(store password for identity) Custom Identity Keystore Passphrase:storepasss123  
Custom Trust Keystore: D:\shamajith\middlewareinstaller\jdk160_29\bin\trust.jks
Custom Trust Keystore Type:jks
(store password for trust)Custom Trust Keystore Passphrase: storepasss123


Navigate to SSL Tab
                                Identity and Trust Locations: Keystores
Private Key Location: from Custom Identity Keystore
Private Key Alias: alias123
Private Key Passphrase:keypass123
Certificate Location: from Custom Identity Keystore
Trusted Certificate Authorities: from Custom Trust Keystore

General Tab
Tick on SSL Listen Port enabled and choose the port required.
                               


Monday, April 14, 2014

Weblogic https implementation

http://weblogicserveradministration.blogspot.in/2013/03/weblogic-server-ssl-configuration.html

http://onlineappsdba.com/index.php/2011/04/18/implement-ssl-in-weblogic/

http://weblogic-wonders.com/weblogic/2011/05/25/ssl-configuration-for-weblogic-server/

Monday, April 7, 2014

Splitting of the log file

split -b 1024k


Splitting based on some keyword

grep -n 'keyword'
ex: grep -n 'batch12' out.log




grep -n 'batch17' out.log_12_12_2013_sloweringestion
Get the first line and last line ex (4132522,6834429)

tail -n +4132522 out.log_12_12_2013_sloweringestion | head -2701907 > batch17_part1and2_out.log


tail –n+(startnumber) filetobeparsed | head –(6834429 - 4132522,) > outfile.log


More Details can be found in

http://www.thegeekstuff.com/2009/08/10-awesome-examples-for-viewing-huge-log-files-in-unix/