Java Management Extensions (JMX) provides tools for managing and monitoring Java applications and resources. JMX uses MBeans to represent managed resources, with a JMX agent controlling resources through an MBean server. Remote management is enabled through protocol adaptors and connectors, allowing access to JMX agents from outside their Java Virtual Machine. The document discusses configuring Tomcat to enable JMX and integrating a campaign portal application with JMX to expose statistics and send notifications. It also describes using the JConsole tool to monitor a Java application's MBeans over JMX.
The document discusses Java Management Extensions (JMX) and its architecture. JMX provides a standard way to monitor and manage applications. It defines three levels - the instrumentation level which implements manageable resources as Managed Beans (MBeans), the agent level which hosts an MBean server, and the distributed services level which allows remote access. MBeans expose attributes and operations to provide a management interface for resources, and the agent uses introspection to recognize registered MBeans.
This plugin lets you track your phone and maintain inventory information of your Windows mobile equipments using PandoraFMS Enterprise. For more information you can visit the following website: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=313
AzMan is the authorization manager that controls role-based access in Hyper-V. It uses role definitions and assignments to determine which tasks and operations each user role is allowed to perform. AzMan can be used to securely configure access at the hypervisor or individual VM level. It is configured through the Azman.msc interface by creating roles, tasks, and assigning users and groups to roles. When a Hyper-V host joins a domain or is managed by VMM, AzMan permissions may be overwritten and default to provide full access to domain admins or VMM administrators.
This document discusses securing JMX access to Apache ActiveMQ. It describes how to access ActiveMQ through JMX without security by default. It then outlines the steps needed to enable security, which includes updating configuration files like jmx.access and jmx.password to add credentials, restricting permissions on jmx.password, disabling the ActiveMQ JMX connector, and modifying activemq.bat to specify the new configuration. With these changes, JMX access will require valid credentials instead of being open without security.
DotNetNuke Client API -DragDropAdminModules.pdfarunagulla
The document discusses enabling drag-and-drop functionality for DotNetNuke modules using the DotNetNuke Client API. It describes attaching mouse events to allow containers to be dragged, scoring modules' overlap with panes to determine drop location, and using the Client API to persist changes by calling a postback handler on drop. Visual cues are provided during dragging to indicate drop position. The goal is to communicate how to build rich client-side features like drag-and-drop layout within the DotNetNuke framework.
1) This document provides 30 tips for using XPages in 60 minutes.
2) The tips cover general programming, debugging, user interface design, using XPages in the Notes client, and working with Dojo.
3) Example tips include using scoped variables to store data, calling Java classes from XPages, turning on debugging to view error messages, using themes for global configuration, and enabling Dojo parseOnLoad to initialize widgets.
New Flash Builder 4 WSDL and HTTP Connectorsrtretola
This document provides instructions for setting up a Java SDK and Tomcat server on Windows and Mac OS X systems in order to run a Flash Builder project. It describes downloading and configuring a Java SDK by setting the JAVA_HOME environment variable. It then explains how to navigate to the Tomcat directory in the command line and start the server using specific commands for Windows and Mac. The document tests that the server is running properly by accessing certain URLs and describes how a crossdomain.xml policy file works to allow access to remote data services. It concludes by outlining the initial steps to create a new Flash Builder project and connect to REST data from an XML service using MXML and ActionScript.
The document discusses Java Management Extensions (JMX) and its architecture. JMX provides a standard way to monitor and manage applications. It defines three levels - the instrumentation level which implements manageable resources as Managed Beans (MBeans), the agent level which hosts an MBean server, and the distributed services level which allows remote access. MBeans expose attributes and operations to provide a management interface for resources, and the agent uses introspection to recognize registered MBeans.
This plugin lets you track your phone and maintain inventory information of your Windows mobile equipments using PandoraFMS Enterprise. For more information you can visit the following website: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=313
AzMan is the authorization manager that controls role-based access in Hyper-V. It uses role definitions and assignments to determine which tasks and operations each user role is allowed to perform. AzMan can be used to securely configure access at the hypervisor or individual VM level. It is configured through the Azman.msc interface by creating roles, tasks, and assigning users and groups to roles. When a Hyper-V host joins a domain or is managed by VMM, AzMan permissions may be overwritten and default to provide full access to domain admins or VMM administrators.
This document discusses securing JMX access to Apache ActiveMQ. It describes how to access ActiveMQ through JMX without security by default. It then outlines the steps needed to enable security, which includes updating configuration files like jmx.access and jmx.password to add credentials, restricting permissions on jmx.password, disabling the ActiveMQ JMX connector, and modifying activemq.bat to specify the new configuration. With these changes, JMX access will require valid credentials instead of being open without security.
DotNetNuke Client API -DragDropAdminModules.pdfarunagulla
The document discusses enabling drag-and-drop functionality for DotNetNuke modules using the DotNetNuke Client API. It describes attaching mouse events to allow containers to be dragged, scoring modules' overlap with panes to determine drop location, and using the Client API to persist changes by calling a postback handler on drop. Visual cues are provided during dragging to indicate drop position. The goal is to communicate how to build rich client-side features like drag-and-drop layout within the DotNetNuke framework.
1) This document provides 30 tips for using XPages in 60 minutes.
2) The tips cover general programming, debugging, user interface design, using XPages in the Notes client, and working with Dojo.
3) Example tips include using scoped variables to store data, calling Java classes from XPages, turning on debugging to view error messages, using themes for global configuration, and enabling Dojo parseOnLoad to initialize widgets.
New Flash Builder 4 WSDL and HTTP Connectorsrtretola
This document provides instructions for setting up a Java SDK and Tomcat server on Windows and Mac OS X systems in order to run a Flash Builder project. It describes downloading and configuring a Java SDK by setting the JAVA_HOME environment variable. It then explains how to navigate to the Tomcat directory in the command line and start the server using specific commands for Windows and Mac. The document tests that the server is running properly by accessing certain URLs and describes how a crossdomain.xml policy file works to allow access to remote data services. It concludes by outlining the initial steps to create a new Flash Builder project and connect to REST data from an XML service using MXML and ActionScript.
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0Prasad Mukhedkar
To success in Private Cloud, You have to have develop management and automation
strategy. Cloudforms is CPM (Cloud Platform Management) software that provides framework to develop management and automation strategy with its flaxible automation
module
This document discusses an MXM-based application for sharing protected content. It will integrate with the chillout application for content creation and use two media frameworks, VLC and GStreamer, for playback. The first alpha release is planned for the end of July. It also provides an overview of the MXM configuration file and engine architecture, and describes how to implement a basic MXM engine and use MXM APIs.
With this plugin you can monitor JBoss using JMX and Twiddle by using a Pandora FMS Agent Plugin, for Linux/Unix.
For more information visit the following link:
Up is Down, Black is White: Using SCCM for Wrong and Rightenigma0x3
This document discusses using Microsoft's System Center Configuration Manager (SCCM) for both offensive and defensive purposes. It introduces PowerSCCM, a PowerShell toolkit for interacting with SCCM. PowerSCCM can be used to create malicious applications and deploy them to targeted collections of machines. It also provides cmdlets for hunting for compromised users and systems. The document recommends tuning SCCM for improved host-based security monitoring and inventory capabilities. It provides examples of using SCCM data for incident response and hunting activities on the network.
The document discusses MIDlet deployment and push registry in MIDP, including how MIDlet suites are packaged and described using JAD descriptors, over-the-air provisioning for installation, and how push notifications can be used to automatically start MIDlets in response to events or messages through registration in the push registry. It also provides examples of code for setting alarms and handling push notifications.
This document provides information about advertising with and contacting the publisher of the Hackercool Cybersecurity magazine. It discusses copyright and permission requirements for reproducing content from the magazine. It notes that any references to real people or events are fictional. Contact information and the magazine's website are provided. The document states that the information in the magazine should only be used for educational purposes and not to illegally access devices or networks. It previews several articles in the September 2021 issue, including on Active Directory hacking, Metasploit modules, Windows authentication, wireless security, online security risks, and new features in Kali Linux 2021.3.
Reversing & malware analysis training part 12 rootkit analysisAbdulrahman Bassam
The document discusses various techniques used by rootkits, including user mode and kernel mode rootkits. It provides examples of rootkit demonstrations that hook SSDT and DKOM techniques to hide processes. The document instructs attendees on analyzing network activity, callbacks, and examining driver and device objects to detect rootkit components in memory.
This document describes how to hack a default JBoss installation using the JMX console by deploying a web application that executes system commands. It explains how to create a WAR file with a JSP that allows command execution, deploy it to JBoss by adding the URL to the DeploymentScanner, and then use the application to execute commands with the privileges of the JBoss server. It concludes by providing information on securing the JMX console to prevent this type of attack.
This document provides an overview of several Windows command line tools including RUNAS, WMIC, and PSTools. It describes how each tool can be used to gather system information, manage processes and services, and make configuration changes remotely. Specific examples are given for using WMIC and PSTools to inventory software, view events logs, kill processes, and reboot systems remotely. The document emphasizes that these tools can provide valuable insights but also stresses the importance of monitoring changes made.
Oplægget blev holdt ved InfinIT-arrangementet "Temadag: Java for real-time and embedded systems", der blev afholdt hhv. den 12. og 13. september 2013. Læs mere om arrangementet her: http://infinit.dk/dk/arrangementer/tidligere_arrangementer/temadag_java_for_real-time_and_embedded_systems.htm
The document provides instructions for setting up microservices from scratch using JHipster and JBoss on Windows and Linux (Ubuntu) systems. It describes how to install prerequisites like Java, Git, Node.js, Yeoman and JHipster. It then demonstrates how to generate and run a sample banking application with 3 microservices (registry, gateway, banking), and test the banking service API. Finally, it describes how to create a custom transfer service to transfer funds between accounts.
The document describes how to monitor Apache Tomcat application instances using Verax NMS monitoring software. It includes adding the Tomcat application to the device inventory in Verax NMS, configuring availability sensors and performance counters, and an overview of the features provided by the Verax NMS Apache Tomcat plugin for monitoring things like general information, applications, request processors, connectors and thread pools.
Android Nâng cao-Bài 9-Debug in Android Application Development Phuoc Nguyen
This document discusses various debugging tools and techniques for Android application development. It describes the Android Debug Bridge (ADB) for communicating with an emulator or device. It also covers the Dalvik Debug Monitor Server (DDMS) for monitoring heap usage, threads, and more. Specific tools covered include Hierarchy Viewer for debugging layouts, Traceview for method profiling, and jhat for heap profiling. It also discusses handling ANRs, StrictMode for catching errors, and debugging tips like using logcat and Dev Tools.
This document provides instructions on setting up an environment to develop web services using Java with Tomcat, Axis2, and Eclipse. It describes downloading and installing Tomcat 7.0.42, configuring the firewall to allow access on port 8080, extracting and setting up Axis2 1.6.2, and deploying the Axis2 war file to Tomcat. The goal is to have a functioning development environment for building and testing web service applications.
Android development workshop held as part of Java class on Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia.
22.06.2012. Zagreb
Internet and Web Technology (CLASS-9) [React.js] | NIC/NIELIT Web TechnologyAyes Chinmay
The document provides information about the IWT syllabus module 3 which covers topics like XML, AJAX, jQuery, JSON, and React.js. It then discusses React.js fundamentals like its usage for building user interfaces, components, props, state, lifecycle methods, forms, and CSS styling. It also provides code examples for rendering HTML, using JSX, handling forms, and the component lifecycle in React.
This document provides an overview of Gatekeeper, Apple's built-in macOS security feature that aims to block unauthorized code from being installed or run on a user's system. It discusses how Gatekeeper works under the hood, including how it uses file quarantine attributes and the launchservices framework to check for and potentially block execution of apps from untrusted developers. The document also examines ways that Gatekeeper's protections can be bypassed or understood in more detail.
This document discusses using Java Message Service (JMS) with MuleSoft's messaging integration capabilities. It describes the two JMS messaging models of queues and topics. It then provides a step-by-step example of configuring Mule to use ActiveMQ for JMS integration, including importing libraries, creating a connector, sending messages to a queue, and receiving messages with a subscriber.
The document describes an alarm system toolkit that includes programs and procedures for archiving, maintaining, and retrieving control system data from an alarm server. However, there is no warranty for the quality or performance of the programs. The document also provides an overview of the alarm system components, including the Java Message Service (JMS) for communication between clients and servers, a relational database for storing configuration and alarm state information, and tools for configuring and viewing alarms.
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0Prasad Mukhedkar
To success in Private Cloud, You have to have develop management and automation
strategy. Cloudforms is CPM (Cloud Platform Management) software that provides framework to develop management and automation strategy with its flaxible automation
module
This document discusses an MXM-based application for sharing protected content. It will integrate with the chillout application for content creation and use two media frameworks, VLC and GStreamer, for playback. The first alpha release is planned for the end of July. It also provides an overview of the MXM configuration file and engine architecture, and describes how to implement a basic MXM engine and use MXM APIs.
With this plugin you can monitor JBoss using JMX and Twiddle by using a Pandora FMS Agent Plugin, for Linux/Unix.
For more information visit the following link:
Up is Down, Black is White: Using SCCM for Wrong and Rightenigma0x3
This document discusses using Microsoft's System Center Configuration Manager (SCCM) for both offensive and defensive purposes. It introduces PowerSCCM, a PowerShell toolkit for interacting with SCCM. PowerSCCM can be used to create malicious applications and deploy them to targeted collections of machines. It also provides cmdlets for hunting for compromised users and systems. The document recommends tuning SCCM for improved host-based security monitoring and inventory capabilities. It provides examples of using SCCM data for incident response and hunting activities on the network.
The document discusses MIDlet deployment and push registry in MIDP, including how MIDlet suites are packaged and described using JAD descriptors, over-the-air provisioning for installation, and how push notifications can be used to automatically start MIDlets in response to events or messages through registration in the push registry. It also provides examples of code for setting alarms and handling push notifications.
This document provides information about advertising with and contacting the publisher of the Hackercool Cybersecurity magazine. It discusses copyright and permission requirements for reproducing content from the magazine. It notes that any references to real people or events are fictional. Contact information and the magazine's website are provided. The document states that the information in the magazine should only be used for educational purposes and not to illegally access devices or networks. It previews several articles in the September 2021 issue, including on Active Directory hacking, Metasploit modules, Windows authentication, wireless security, online security risks, and new features in Kali Linux 2021.3.
Reversing & malware analysis training part 12 rootkit analysisAbdulrahman Bassam
The document discusses various techniques used by rootkits, including user mode and kernel mode rootkits. It provides examples of rootkit demonstrations that hook SSDT and DKOM techniques to hide processes. The document instructs attendees on analyzing network activity, callbacks, and examining driver and device objects to detect rootkit components in memory.
This document describes how to hack a default JBoss installation using the JMX console by deploying a web application that executes system commands. It explains how to create a WAR file with a JSP that allows command execution, deploy it to JBoss by adding the URL to the DeploymentScanner, and then use the application to execute commands with the privileges of the JBoss server. It concludes by providing information on securing the JMX console to prevent this type of attack.
This document provides an overview of several Windows command line tools including RUNAS, WMIC, and PSTools. It describes how each tool can be used to gather system information, manage processes and services, and make configuration changes remotely. Specific examples are given for using WMIC and PSTools to inventory software, view events logs, kill processes, and reboot systems remotely. The document emphasizes that these tools can provide valuable insights but also stresses the importance of monitoring changes made.
Oplægget blev holdt ved InfinIT-arrangementet "Temadag: Java for real-time and embedded systems", der blev afholdt hhv. den 12. og 13. september 2013. Læs mere om arrangementet her: http://infinit.dk/dk/arrangementer/tidligere_arrangementer/temadag_java_for_real-time_and_embedded_systems.htm
The document provides instructions for setting up microservices from scratch using JHipster and JBoss on Windows and Linux (Ubuntu) systems. It describes how to install prerequisites like Java, Git, Node.js, Yeoman and JHipster. It then demonstrates how to generate and run a sample banking application with 3 microservices (registry, gateway, banking), and test the banking service API. Finally, it describes how to create a custom transfer service to transfer funds between accounts.
The document describes how to monitor Apache Tomcat application instances using Verax NMS monitoring software. It includes adding the Tomcat application to the device inventory in Verax NMS, configuring availability sensors and performance counters, and an overview of the features provided by the Verax NMS Apache Tomcat plugin for monitoring things like general information, applications, request processors, connectors and thread pools.
Android Nâng cao-Bài 9-Debug in Android Application Development Phuoc Nguyen
This document discusses various debugging tools and techniques for Android application development. It describes the Android Debug Bridge (ADB) for communicating with an emulator or device. It also covers the Dalvik Debug Monitor Server (DDMS) for monitoring heap usage, threads, and more. Specific tools covered include Hierarchy Viewer for debugging layouts, Traceview for method profiling, and jhat for heap profiling. It also discusses handling ANRs, StrictMode for catching errors, and debugging tips like using logcat and Dev Tools.
This document provides instructions on setting up an environment to develop web services using Java with Tomcat, Axis2, and Eclipse. It describes downloading and installing Tomcat 7.0.42, configuring the firewall to allow access on port 8080, extracting and setting up Axis2 1.6.2, and deploying the Axis2 war file to Tomcat. The goal is to have a functioning development environment for building and testing web service applications.
Android development workshop held as part of Java class on Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia.
22.06.2012. Zagreb
Internet and Web Technology (CLASS-9) [React.js] | NIC/NIELIT Web TechnologyAyes Chinmay
The document provides information about the IWT syllabus module 3 which covers topics like XML, AJAX, jQuery, JSON, and React.js. It then discusses React.js fundamentals like its usage for building user interfaces, components, props, state, lifecycle methods, forms, and CSS styling. It also provides code examples for rendering HTML, using JSX, handling forms, and the component lifecycle in React.
This document provides an overview of Gatekeeper, Apple's built-in macOS security feature that aims to block unauthorized code from being installed or run on a user's system. It discusses how Gatekeeper works under the hood, including how it uses file quarantine attributes and the launchservices framework to check for and potentially block execution of apps from untrusted developers. The document also examines ways that Gatekeeper's protections can be bypassed or understood in more detail.
This document discusses using Java Message Service (JMS) with MuleSoft's messaging integration capabilities. It describes the two JMS messaging models of queues and topics. It then provides a step-by-step example of configuring Mule to use ActiveMQ for JMS integration, including importing libraries, creating a connector, sending messages to a queue, and receiving messages with a subscriber.
The document describes an alarm system toolkit that includes programs and procedures for archiving, maintaining, and retrieving control system data from an alarm server. However, there is no warranty for the quality or performance of the programs. The document also provides an overview of the alarm system components, including the Java Message Service (JMS) for communication between clients and servers, a relational database for storing configuration and alarm state information, and tools for configuring and viewing alarms.
1. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 1
JMX
Java Management Extensions (JMX) is a Java technology that supplies tools
for managing and monitoring java based applications, system objects,
devices and service oriented networks. Those resources are represented by
objects called MBeans (for Managed Bean).
What is JMX ?
2. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2
JMX Agent & Remote
Management
JMX
JMX Agent
The main component of a JMX agent is the MBean server. This is a core
managed object server in which MBeans are registered. A JMX agent also
includes a set of services for handling MBeans. JMX agents directly control
resources and make them available to remote management agents.
Remote Management
Protocol adaptors and standard connectors make a JMX agent accessible
from remote management applications outside the agent’s Java Virtual
Machine (Java VM) using the JMX URL
(Sample URL : service:jmx:rmi://192.168.7.46:12345/jndi/rmi://192.168.7.46:12345/jmxrmi)
3. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 3
JMX architecture
JMX
4. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 4
Enabling JMX on Tomcat
JMX
CATALINA_OPTS="${CATALINA_OPTS}
-Dcom.sun.management.jmxremote
-Dcom.sun.management.jmxremote.port=4447
-Dcom.sun.management.jmxremote.ssl=false
-Dcom.sun.management.jmxremote.authenticate=false"
1. Go to folder /usr/share/tomcat6/bin (this may differ based on the tomcat version)
2. Create a setenv.sh file with below contents (or add to it if one already exists).
#!/bin/sh
export CATALINA_OPTS="-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=4447 -
Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false“
Note: You can alternatively put this into catalina.sh
3. Save file and restart Tomcat as root user : service tomcat6 restart (this may differ based on the tomcat version)
Ref : https://tomcat.apache.org/tomcat-6.0-doc/monitoring.html#Enabling_JMX_Remote
5. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
Campaign Portal – JMX Integration
JMX
Mbean interface:
(../WebPortal/vsdp-jmx/src/main/java/com/verizon/vsdp/jmx/VsdpManagementMBean.java)
public interface VsdpManagementMBean {
public int getNewCampaignsStat();
public int getCampaignsBudgetStat();
}
Note: By convention, an MBean interface takes the name of the Java class that implements it, with the suffix MBean added.
6. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 6
Campaign Portal – JMX Integration (Continued..)
JMX
Mbean Implementation:
(../WebPortal/vsdp-jmx/src/main/java/com/verizon/vsdp/jmx/VsdpJmxManagement.java)
public class VsdpJmxManagement extends NotificationBroadcasterSupport implements VsdpManagementMBean {
….
MBeanServer mbs = ManagementFactory.getPlatformMBeanServer();
ObjectName cusPortal = new ObjectName("VSDP:type=Customer Portal");
mbs.registerMBean(this, cusPortal);
int newCampaignsStatVal=0;
public void incrementNewCampaignsStat() {
newCampaignsStatVal ++;
}
….
@Override
public int getNewCampaignsStat() {
return newCampaignsStatVal;
}
….
public void sendNotification(String notificationTitle, String notificationMsg, String notificationOldMsg){
Notification n = new AttributeChangeNotification(this, sequenceNumber++, System.currentTimeMillis(),
notificationTitle, "Message", "String", notificationOldMsg, notificationMsg);
sendNotification(n);
}
}
7. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 7
Campaign Portal – JMX Integration (Continued..)
JMX
JMX stats call:
(../WebPortal/vsdp/src/main/java/com/verizon/vsdp/controller/ServiceController.java)
public String createService (@RequestBody CreateUpdateServiceRequest req,
@RequestParam(value=TokenUtils.VSDP_TOKEN, required=true) String token,
@RequestParam(value=TokenUtils.USER, required=true) String userName,
HttpServletRequest request, HttpServletResponse response) throws TfdsCampaignException {
….
String codeSnippet = scmService.createService(req.getService(), req.getRatings(), userName);
if (codeSnippet == null)
throw new TfdsCampaignException("tfdsCampaignCreationError");
else {
….
VsdpJmxManagement.getInstance().incrementNewCampaignsStat();
return sendSuccessResponse(response, "{"codesnippetid":"" + codeSnippet + ""}");
}
….
}
8. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 8
Campaign Portal – JMX Integration (Continued..)
JMX
JMX notification call:
(../WebPortal/vsdp/src/main/java/com/verizon/vsdp/service/SvcService.java)
private final String CD_JMX_NOTFN_TITLE = "Campaign Director connection issue";
public CampaignDirectorResponse invokeRestTemplate(Object service, String event) throws Exception {
...
try {
...
CampaignDirectorResponse cdResposne = responseEntity.getBody();
return cdResposne;
} catch (Exception exc){
logger.error("CD transaction ID {} with Exception {}", uuid,exc.getMessage());
//VPCMS call : Raise an alarm if the exception is due to CD connection loss
if (exc.getMessage().contains("java.net.ConnectException")) {
VsdpJmxManagement.getInstance().sendNotification(CD_JMX_NOTFN_TITLE, exc.getMessage(), "");
}
}
return null;
}
9. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 9
JConsole
Using JConsole for verification
JConsole is a graphical monitoring tool to monitor Java Virtual Machine (JVM) and Java applications both on
a local or remote machine. JConsole uses underlying features of Java Virtual Machine to provide information
on performance and resource consumption of applications running on the Java platform using Java
Management Extensions (JMX) technology. JConsole comes as part of Java Development Kit (JDK) and the
graphical console can be started using "jconsole" command.
Using Jconsole:
1. Download JDK to your laptop / desktop.
2. Start JConsole
3. Enable JMX on tomcat and start the tomcat process
4. Enter process url as “service:jmx:rmi:///jndi/rmi://192.168.7.46:4447/jmxrmi” (Replace the IP with your tomcat IP)
5. Click on “Insecure” button on the next screen if prompted.
6. Click on “MBeans” tab in the next screen after which you should see a screen as shown in fig. 1
7. The applications exposing MBeans would be shown in the console listing the attributes
10. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 10
Jconsole- Fig. 1
Using JConsole for verification