This document introduces a troubleshooting methodology for Oracle SOA Suite 11g that focuses on performance issues, composite instances, deployment errors, and logging. It discusses classifying problems into categories of deployment errors, runtime errors, or performance issues. For deployment errors, the document examines the different deployment phases and provides tips for identifying issues like invalid JNDI names by tailing logs. It also discusses increasing log levels and types to find more details for runtime errors when generic errors are reported. Signs of potential performance problems and ways to diagnose them are outlined as well.
It is one thing to design and code the "happy flow" of your automated business processes and services. It is another thing to deal with situations you do not want [or expect] to occur in your processes and services. This session will dive into fault handling in Oracle SOA Suite 11g using a case study based on automated invoice handling. First the session investigates what can go wrong in automated processes and services. Then it categorizes these situations and dives into the mechanisms Oracle SOA Suite 11g offers to handle these different scenarios. These mechanisms include BPEL activities such as Throw and Catch activities, the SOA Suite Enterprise Manager, and SOA Suite's fault handling framework. The session will wrap up by introducing a generic fault handling framework for technical faults used in a real-life project that is realized using a Java fault handler and SOA Suite's fault handling framework.
Effective fault handling in SOA Suite 11gGuido Schmutz
t is one thing to architect, design, and code the “happy flow” of your automated business processes and services. It is another thing to deal with situations you do not want or expect to occur in your processes and services. This session dives into fault handling in Oracle Service Bus 11g and Oracle SOA Suite 11g, based on an order-to-cash business process. Faults can be divided into business faults, technical faults, programming errors, and faulty user input. Each type needs a different approach to prevent them from occurring or to deal with them. For example, apply User Experience (UX) techniques to improve the quality of your application so that faulty user input can be prevented as much as possible. The session shows and demos what patterns and techniques can be used in Oracle Service Bus and Oracle SOA Suite to prevent and handle technical faults as well as business faults.
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataPerficient, Inc.
In this presentation, Perficient experts examined techniques, frameworks and products to log and analyze complex systems and events. Discussions included:
• Logging and exception management as service within your SOA
• Frameworks for event and transaction monitoring
• Event sense and response techniques
• Highly scalable logging product
• Logging in the context of business transaction and events
Short presentation-on incident management, as per ITIL definition,In today’s article we are going to learn all about the “Incident Tracking and management” Process – How to track and manage incidents in Software Testing with sample templates.
Are you thinking- “STH has published a lot of content on defect/bug tracking, so how is this going to be different”? That is exactly the reason why we have to look at what we mean by incident first.
Whilst there are many intangible benefits that can result from use of the ProAct solution, the list below focuses primarily on tangible ones that could result in some level of direct cost saving
It is one thing to design and code the "happy flow" of your automated business processes and services. It is another thing to deal with situations you do not want [or expect] to occur in your processes and services. This session will dive into fault handling in Oracle SOA Suite 11g using a case study based on automated invoice handling. First the session investigates what can go wrong in automated processes and services. Then it categorizes these situations and dives into the mechanisms Oracle SOA Suite 11g offers to handle these different scenarios. These mechanisms include BPEL activities such as Throw and Catch activities, the SOA Suite Enterprise Manager, and SOA Suite's fault handling framework. The session will wrap up by introducing a generic fault handling framework for technical faults used in a real-life project that is realized using a Java fault handler and SOA Suite's fault handling framework.
Effective fault handling in SOA Suite 11gGuido Schmutz
t is one thing to architect, design, and code the “happy flow” of your automated business processes and services. It is another thing to deal with situations you do not want or expect to occur in your processes and services. This session dives into fault handling in Oracle Service Bus 11g and Oracle SOA Suite 11g, based on an order-to-cash business process. Faults can be divided into business faults, technical faults, programming errors, and faulty user input. Each type needs a different approach to prevent them from occurring or to deal with them. For example, apply User Experience (UX) techniques to improve the quality of your application so that faulty user input can be prevented as much as possible. The session shows and demos what patterns and techniques can be used in Oracle Service Bus and Oracle SOA Suite to prevent and handle technical faults as well as business faults.
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataPerficient, Inc.
In this presentation, Perficient experts examined techniques, frameworks and products to log and analyze complex systems and events. Discussions included:
• Logging and exception management as service within your SOA
• Frameworks for event and transaction monitoring
• Event sense and response techniques
• Highly scalable logging product
• Logging in the context of business transaction and events
Short presentation-on incident management, as per ITIL definition,In today’s article we are going to learn all about the “Incident Tracking and management” Process – How to track and manage incidents in Software Testing with sample templates.
Are you thinking- “STH has published a lot of content on defect/bug tracking, so how is this going to be different”? That is exactly the reason why we have to look at what we mean by incident first.
Whilst there are many intangible benefits that can result from use of the ProAct solution, the list below focuses primarily on tangible ones that could result in some level of direct cost saving
This modules covers two different aspects that we need to understand to customize our business processes to specific business situations. The first concept that we need to understand is the Service Task activity defined in the BPMN v2 specification. Once we understand the nature of external system interactions we need to understand the mechanisms implemented in jBPM5 to provide these extension points.
Find more about it in:
http://salaboy.wordpress.com
http://ilesteban.wordpress.com
This module is about start using jBPM5 and the things that you need to know in order to understand the basic concepts about how it works. During this module you can download and play with a sample project that define a simple business process with some business rules. This module provides different tests that shows how to interact with our processes in different ways and how to test the behavior unit testing them. For more information check out: http://salaboy.wordpress.com/
Attribute-Based access control (ABAC) is the current state-of-practice model to express access rules in terms of attributes of subjects, resources, actions and the environment. In industry, ABAC is becoming the general methodology for managing access in IT applications. In the first part of this talk, we go into detail on how attributes can express different access control concepts. In the second part of the talk, we discuss how ABAC is used as a model for access control management to align access rules with business processes via a wide variety of domain-specific access control concepts.
The first question asked by many ITSM organizations is why should I automate any of my processes? Won’t it be expensive to purchase a product to implement automation? Once they have been implemented won’t I need to maintain those automation’s with an expensive resource (like a code developer) going forward?
The short answer to these questions is that it depends on the product that you are using for ITSM. Hopefully, your product includes some form of automation out of the box. At a minimum, it should allow you to integrate calls to an external workflow automation tool. If your ITSM product does include some form of automation tool, with any luck it is possible to create that automation without a need to write a lot of code that will need to be maintained in the future.
In this presentation, I will explain event driven architecture, describe the different types of events, demonstrate how events can be related and orchestrated, and provide a basic understanding of how this method can drive the architecture of enterprise systems. In addition to understanding the concepts of event driven architecture, we will explore a working sample built using an open-source .NET messaging framework called MassTransit.
Automatic Proactive Troubleshooting with IBM Rational Build ForgeBill Duncan
Abstract
This paper will address using Build Forge to integrate Rational products to fix or “phone home” potential support issues proactively without user intervention.
Content
Refrigerator companies have often floated the idea of having intelligent refrigerators that would call in service requests for themselves when components were failing. The basis of this idea is that better diagnostics are driven by greater integration between computerized parts. This paper brings this idea to Rational products by using Build Forge to fix or “phone home” potential support issues proactively without user intervention.
DevOps - Continuous Integration, Continuous Delivery - let's talkD Z
Brief but detailed insight about what to expect and what not from DevOps engineer if an organization is willing to hire one.
At the same time detailed insight about someone who is willing to dive into DevOps as a career option.
Metric Abuse: Frequently Misused Metrics in OracleSteve Karam
This is a presentation I created for RMOUG 2014 which I was sadly unable to attend. However, I wanted to share it with the Oracle community so that you can learn a bit about metrics that are frequently cited, frequently demonized, and frequently misused. In this deck we will go through the steps to diagnose issues and what NOT to blame as you go through the process.
The topics and concepts discussed here were originally formed in a blog post on the OracleAlchemist.com site: http://www.oraclealchemist.com/news/these-arent-the-metrics-youre-looking-for/
This modules covers two different aspects that we need to understand to customize our business processes to specific business situations. The first concept that we need to understand is the Service Task activity defined in the BPMN v2 specification. Once we understand the nature of external system interactions we need to understand the mechanisms implemented in jBPM5 to provide these extension points.
Find more about it in:
http://salaboy.wordpress.com
http://ilesteban.wordpress.com
This module is about start using jBPM5 and the things that you need to know in order to understand the basic concepts about how it works. During this module you can download and play with a sample project that define a simple business process with some business rules. This module provides different tests that shows how to interact with our processes in different ways and how to test the behavior unit testing them. For more information check out: http://salaboy.wordpress.com/
Attribute-Based access control (ABAC) is the current state-of-practice model to express access rules in terms of attributes of subjects, resources, actions and the environment. In industry, ABAC is becoming the general methodology for managing access in IT applications. In the first part of this talk, we go into detail on how attributes can express different access control concepts. In the second part of the talk, we discuss how ABAC is used as a model for access control management to align access rules with business processes via a wide variety of domain-specific access control concepts.
The first question asked by many ITSM organizations is why should I automate any of my processes? Won’t it be expensive to purchase a product to implement automation? Once they have been implemented won’t I need to maintain those automation’s with an expensive resource (like a code developer) going forward?
The short answer to these questions is that it depends on the product that you are using for ITSM. Hopefully, your product includes some form of automation out of the box. At a minimum, it should allow you to integrate calls to an external workflow automation tool. If your ITSM product does include some form of automation tool, with any luck it is possible to create that automation without a need to write a lot of code that will need to be maintained in the future.
In this presentation, I will explain event driven architecture, describe the different types of events, demonstrate how events can be related and orchestrated, and provide a basic understanding of how this method can drive the architecture of enterprise systems. In addition to understanding the concepts of event driven architecture, we will explore a working sample built using an open-source .NET messaging framework called MassTransit.
Automatic Proactive Troubleshooting with IBM Rational Build ForgeBill Duncan
Abstract
This paper will address using Build Forge to integrate Rational products to fix or “phone home” potential support issues proactively without user intervention.
Content
Refrigerator companies have often floated the idea of having intelligent refrigerators that would call in service requests for themselves when components were failing. The basis of this idea is that better diagnostics are driven by greater integration between computerized parts. This paper brings this idea to Rational products by using Build Forge to fix or “phone home” potential support issues proactively without user intervention.
DevOps - Continuous Integration, Continuous Delivery - let's talkD Z
Brief but detailed insight about what to expect and what not from DevOps engineer if an organization is willing to hire one.
At the same time detailed insight about someone who is willing to dive into DevOps as a career option.
Metric Abuse: Frequently Misused Metrics in OracleSteve Karam
This is a presentation I created for RMOUG 2014 which I was sadly unable to attend. However, I wanted to share it with the Oracle community so that you can learn a bit about metrics that are frequently cited, frequently demonized, and frequently misused. In this deck we will go through the steps to diagnose issues and what NOT to blame as you go through the process.
The topics and concepts discussed here were originally formed in a blog post on the OracleAlchemist.com site: http://www.oraclealchemist.com/news/these-arent-the-metrics-youre-looking-for/
Angular is a powerful tool for managing the display of data. However, like any powerful tool there can be trouble if misused. Below we’ll look at some common AngularJS mistakes. They vary in severity, but ultimately can conspire to make developing an AngularJS application more of a headache than it needs to be. We’ll cover five of these common mistakes, and ways to avoid them.
A very successful talk where in I discuss the top 10 failures of organizations I have personally experienced when trying to scale. More than just performance!
An ideal static analyzer, or why ideals are unachievablePVS-Studio
Being inspired by Eugene Laspersky's post about an ideal antivirus, I decided to write a similar post about an ideal static analyzer. And meanwhile think how far from being it our PVS-Studio is.
Writing good test codes are hard. Everyone struggles with it at some point. But with practice, everyone can write clean, readable test codes. Here are some ways to help you.
Similar to Oracle SOA Suite 11g Troubleshooting Methodology (whitepaper) (20)
The Linux operating system accounts for 90% of all servers provisioned in the cloud, thus its security becomes of the utmost importance. Proactively securing Linux becomes especially critical in order to protect against expanding cybersecurity threats. However, most Linux patching is traditionally disruptive and requires planning and downtime.
Oracle Cloud offers a number of services to help manage operating system security at a large scale: OS Management Service (to monitor and manage patching), Oracle Ksplice (for non-disruptive patching), Oracle Autonomous Linux (self-managed Linux operating system), and the Vulnerability Scanning Service (to scan hosts and containers).
This presentation starts with general operating system security concepts, as well as a brief overview of CVEs and zero-day vulnerabilities, and walks through each of the Oracle Cloud operating system security offerings. Multiple live demos will be accompanied during the presentation.
Infrastructure-as-Code, or IaC, has gained momentum in the past several years with the explosion of cloud computing. IaC helps automate and manage infrastructure provisioning of your cloud resources. Even small infrastructure footprints can benefit from IaC. It can become difficult to manage and maintain hundreds, if not thousands, of individual configuration settings in your infrastructure. Enter Terraform, an open-source IaC software tool created in 2014.
This presentation walks through the fundamentals of Terraform, and where and how it can benefit you in your cloud infrastructure provisioning. A live demo will showcase the provisioning of an entire Oracle Cloud infrastructure from scratch, in a matter of minutes, including compartments, networking, compute, and database, for both a development and production environments.
APIs are one of the main elements of cloud services. All major cloud service providers expose REST APIs to allow you to programmatically access their services and capabilities. SOAP and REST are the two most common ways of exposing APIs, whether to external, partner, cloud, or internal developers.
The concept of API management is to publish these web APIs for consumption, and includes capabilities such as monitoring, security, and documentation.
This presentation introduces basic concepts of APIs, API management, cloud REST services, and a brief walkthrough of WSO2 API Manager and the Oracle API Gateway to see how you can centrally publish, expose, and secure APIs, essentially virtualizing your backend services.
Automating Cloud Operations: Everything You Wanted to Know about cURL and RESTRevelation Technologies
All cloud service providers support seamless cloud automation and management through a REST API architecture allowing for single tasks or complex multi-step orchestrations to be created. REST has become the de facto standard for these cloud interfaces because of its ease of us, communication over HTTP, and wide support of nearly all programming languages and operating systems.
Where do you start? How do you decipher the API documentation? Where do you authenticate? And how do you create cloud resources programmatically?
This presentation walks through the fundamentals of REST, how its invoked through cURL, as well as a live demonstration of the automated provisioning of Oracle Cloud services through cURL/REST.
Getting Started with API Management – Why It's Needed On-prem and in the CloudRevelation Technologies
APIs are one of the main elements of cloud services. All major cloud service providers expose REST APIs to allow you to programmatically access their services and capabilities. SOAP and REST are the two most common ways of exposing APIs, whether to external, partner, cloud, or internal developers.
The concept of API management is to publish these web APIs for consumption, and includes capabilities such as monitoring, security, and documentation.
This presentation introduces basic concepts of APIs, API management, cloud REST services, and a brief walkthrough of WSO2 API Manager and Oracle API Gateway to see how you can centrally publish, expose, and secure APIs, essentially virtualizing your backend services.
Automating Cloud Operations - Everything you wanted to know about cURL and RE...Revelation Technologies
All cloud service providers support seamless cloud automation and management through a REST API architecture allowing for single tasks or complex multi-step orchestrations to be created. REST has become the de facto standard for these cloud interfaces because of its ease of us, communication over HTTP, and wide support of nearly all programming languages and operating systems.
Where do you start? How do you decipher the API documentation? Where do you authenticate? And how do you create cloud resources programmatically?
This presentation walks through the fundamentals of REST, how its invoked through cURL, as well as a live demonstration of the automated provisioning of Oracle Cloud services through cURL/REST.
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices FrameworkRevelation Technologies
As AWS became a viable cloud service provider with wide adoption, Amazon introduced back in 2015 the "AWS Well-Architected Framework" which provides architectural best practices across five pillars. Similarly, Oracle Cloud Infrastructure (OCI) introduced their own "OCI Best Practices Framework." This framework covers best practices for four "business goals" that include: security and compliance, reliability and resiliency, performance and cost optimization, and operational efficiency. Learning about and adopting these recommended best practices help you design and operate cloud topologies that deliver maximum business value.
These best practices are the result of years of experience with thousands of cloud customers creating architectures that are meant to be secure, highly performant, resilient, and efficient. While not overly complex this framework can be intimidating for those newly embarking on their cloud journey; this presentation introduces the framework, walks through the business goals, and highlights some of the elements and strategies to give you a stronger idea of how this framework can benefit you.
Everything You Need to Know About the Microsoft Azure and Oracle Cloud Interc...Revelation Technologies
Back in 2019, Microsoft and Oracle announced a partnership enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
This extremely low-latency, private connection can distribute workload, and it opens a world of possibilities including deploying applications using the best of Oracle Cloud and Microsoft Azure. Scenarios such as running Oracle E-Business Suite in Azure with its databases operating in Oracle Cloud are now entirely possible.
Highlights on the current offerings, support and licensing models, details on performance, and a list of pitfalls are covered in this presentation. Join this presentation to learn more about what the Oracle and Microsoft cloud partnership is all about, how it works, and what this means for cloud interoperability.
Our article in PTK describes how Ansible was used to boost Oracle Fusion Middleware to deliver true Infrastructure-as-Code (IaC) via extreme automation.
PTK Winter 2020 / Issue 72
Our article in PTK evaluates and compares the performance of Linux Host, Oracle WebLogic Server 12c, and Oracle Database 18c performance on leading compute cloud providers that include Oracle Cloud, Amazon Web Services, Microsoft Azure, Google Cloud, and IBM Cloud.
PTK Autumn 2019 / Issue 71
Everything You Need to Know About the Microsoft Azure and Oracle Cloud Interc...Revelation Technologies
Back in 2019, Microsoft and Oracle announced a partnership enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
This extremely low-latency, private connection can distribute workload, and it opens a world of possibilities including deploying applications using the best of Oracle Cloud and Microsoft Azure. Scenarios such as running Oracle E-Business Suite in Azure with its databases operating in Oracle Cloud are now entirely possible.
Highlights on the current offerings, support and licensing models, details on performance, and a list of pitfalls are covered in this presentation. Join this presentation to learn more about what the Oracle and Microsoft cloud partnership is all about, how it works, and what this means for cloud interoperability.
Compute Cloud Performance Showdown: 18 Months Later (OCI, AWS, IBM Cloud, GCP...Revelation Technologies
In January 2019, our team conducted and published results of performance tests against leading compute cloud providers that included Amazon Web Services, Microsoft Azure, Google Cloud, Oracle Cloud, and IBM Cloud. Host, application server, and database performance were compared. Nothing alarming in the results were found; more powerful CPUs yielded better performance with the exception of Azure which generally underperformed. However, other non-performance related factors were found to affect the overall experience and cloud selection recommendations.
Now, 18 months later, we have ran the same series of tests against the same cloud service providers. In this presentation, we compare how each cloud provider has evolved in the past year and a half and share our findings and observations.
Compute Cloud Performance Showdown: 18 Months Later (OCI, AWS, IBM Cloud, GCP...Revelation Technologies
In January 2019, our team conducted and published results of performance tests against leading compute cloud providers that included Amazon Web Services, Microsoft Azure, Google Cloud, Oracle Cloud, and IBM Cloud. Host, application server, and database performance were compared. Nothing alarming in the results were found; more powerful CPUs yielded better performance with the exception of Azure which generally underperformed. However, other non-performance related factors were found to affect the overall experience and cloud selection recommendations.
Now, 18 months later, we have ran the same series of tests against the same cloud service providers. In this presentation, we compare how each cloud provider has evolved in the past year and a half and share our findings and observations.
The Microsoft Azure and Oracle Cloud Interconnect Everything You Need to KnowRevelation Technologies
Bank in 2019, Microsoft and Oracle announced a partnership enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
This extremely low-latency, private connection can distribute workload, and it opens a world of possibilities including deploying applications using the best of Oracle Cloud and Microsoft Azure. Scenarios such as running Oracle E-Business Suite in Azure with its databases operating in Oracle Cloud are now entirely possible.
Highlights on the current offerings, support and licensing models, details on performance, and a list of pitfalls are covered in this presentation. Join this presentation to learn more about what the Oracle and Microsoft partnership is all about, how it works, and what this means for cloud interoperability.
Learn about various cloud integration strategies, and how API Gateways fit into the schema of things. Learn about cloud integration development lifecycles and cloud integration strategies.
Compute Cloud Performance Showdown: Amazon Web Services, Oracle Cloud, IBM ...Revelation Technologies
This one of a kind presentation that compares Linux Host, Oracle WebLogic Server 12c, and Oracle Database 18c performance on leading compute cloud providers that include Oracle Cloud, Amazon Web Services, Microsoft Azure, Google Cloud, and IBM Cloud. Join us to see actual results and findings as it pertains to IaaS performance.
This is practically the only presentation of its kind with actual published results of numerous performance metrics against the 5 leading compute cloud providers. Attendees will learn about provisioning challenges as well as non-performance factors in terms of cloud provider selection.
Securing your Oracle Fusion Middleware Environment, On-Prem and in the CloudRevelation Technologies
Oracle WebLogic Server (and Oracle HTTP Server) form the foundation for practically all Oracle Fusion Middleware products. For the most part, securing your on-prem installation is similar to their Oracle Cloud equivalent counterparts, with some notable differences which we intend to cover. In this presentation, we discuss security patching, configuration hardening, web service security, network lockdowns, transport security, OS best practices, access policies, and much more - all intended to increase the security of your Oracle Fusion Middleware environments.
Want to see Oracle SOACS in action and understand how it differs from your on-premise Oracle SOA Suite installation? Join us for some hands-on with the entire stack - Oracle Java Cloud Service (JCS), Oracle SOA Cloud Service (SOACS), and Oracle Database Cloud Service (DBaaS). Learn about access, backups, monitoring, and deployment in the Oracle Cloud. Also find out first hand the struggles a recent customer went through and what it took to get everything stabilized and back on track. The lessons learned - part technical, part sales, and part management - should be considered for anyone considering a first time implementation on the Oracle Cloud.
Let’s face it. There’s a shortage of Oracle BPM development skills out there. And developing SOA-based integrations is not quite the same as modeling business processes. This presentation is self-explanatory and is geared towards Oracle SOA Suite developers who want to understand key concepts surrounding BPM and how to get started developing your first business process.
Developing Web Services from Scratch - For DBAs and Database DevelopersRevelation Technologies
WSDL. XSD. SOAP. Namespaces. Port types. If these terms make little sense, this presentation is for you. By the end of this presentation, you will completely understand how to dissect and decipher a web service interface, understand key design patterns, and learn how to develop top-down and bottom-up web services in technologies such as Java and Oracle SOA Suite. Want to know how to expose a PL/SQL package as a web service? This technical presentation, one of my most popular, is intended for DBAs and database developers who want to know what it takes to design and create web services.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Oracle SOA Suite 11g Troubleshooting Methodology (whitepaper)
1. Middleware
1 Session 185
ORACLE SOA SUITE 11G TROUBLESHOOTING METHODOLOGY
Harold A. Dost III, Raastech, Inc.
ABSTRACT
Most troubleshooting guides simply list out solutions to
common errors. This paper introduces a troubleshooting
methodology surrounding performance, composite
instances, deployment, and logging. The goal is to better
equip the reader with the ability to solve most problems as
they pertain to the SOA infrastructure and its executed
transactions. As well as, learn where to look, what to look
for, and what do afterward.
TARGET AUDIENCE
This is intended for every Oracle SOA Suite 11g developer
and administrator should read.
EXECUTIVE SUMMARY
There is no guarantee that every error is an easy fix away.
However, this paper will provide the reader with a better
understanding of where to look for errors, how to
categorize them, and deal with them in an appropriate
manner. With the tools explained later on, quicker
resolutions may be achieved which will produce more
efficient development and better support.
BACKGROUND
According to Splunk one of their clients, Macy’s, noted
that tracking down the exact cause of a problem could be
“exceedingly difficult.” It often required a team comprised
of members from various IT functional areas to fix these
problems. Even with these teams, resolutions still took
days.
In the past when an issue presented itself it was always the
network admins to be blamed. Over time technology has
improved in that area, therefore network issues at most
companies are few and far between by comparison.
Everything is connected higher in the stack through
various integration servers and technologies. The blame is
often shifted to the integration team, but much like people
blaming a browser for a bad Internet connection, this can
often be misdirected.
Customers hold a company responsible to maintain near-
continuous reliable services and by transitivity the
integration team. This puts a lot of pressure onto the
integration team to quickly determine if the error is
something within their realm or if it needs a different
group’s attention.
One of the biggest pains with tracking down issues in
middleware is that it is composed of so many layers. For
example, a web application might make a call. The payload
first goes through Oracle Enterprise Gateway (OEG), this
is because it is going from the Internet to the company
intranet. Then the company uses Oracle Service Bus
(OSB) for all internal service calls to abstract naming and
versions of services. Finally, the payload makes it to
Oracle SOA Suite and it goes on from there to call other
systems. Since the focus is on Oracle SOA Suite, below
are a few issues.
A custom ANT script is used to iterate through a list of
composites and deploys them one at a time. After the 66th
composite an OutofMemeory:PermGen error is thrown;
an odd but repeatable error. A much more common error
is: “Unable to access endpoint…” This error can have
many explanations from a simple timeout, to a security
issue such as an invalid certificate. Without knowing how
to diagnose the source of these symptoms will slow down
even the most senior developers and administrators.
TECHNICAL DISCUSSIONS AND EXAMPLES
Before learning how to solve these problems, it is first a
good idea to step back and acknowledge that
troubleshooting problems is an art. Like any other art it is
part skill and part knowledge. For skill there each person
has a certain level of natural inclination towards solving
problems, some being better than others. Much of it deals
with having a very methodical and scientific approach. The
other half, knowledge, refers to a person’s intimacy with
the product. Unless someone has the ability to deduce the
topology of a system without ever using it is at hand, there
needs to be some time spent working with and
understanding the various subsystems of a product. To
understand how SOA Suite works and how to fix errors
there are many resources.
Many people, not having an answer to an issue, will
immediately jump onto the Internet and perform a series
of queries on their favorite search engine. This can lead to
various blogs and even some Oracle specific resources,
2. Middleware
2 Session 185
such as the OTN discussion forums. This is often wasted
time leading to solutions that aren’t related to the problem
at hand. Finding no resolution, many will hop onto the
Oracle support site to search for the existence of a patch.
While none of these options are bad, if unable to properly
direct searches this can be very time consuming,
frustrating, and wasteful. The Internet should not be the
only resource used. In fact, one’s brainstorming and
knowledge should also be a resource on how to determine
the issue at hand. Ideally once the source of the issue is
tracked a resolution is obvious or at least achievable. If
that is not the case then it’s time to resort to the
aforementioned resources. The company may also have an
error tracking and knowledge base of its own. Also, always
remember talking to coworkers is useful, since often issues
have been previously solved and forgotten.
The first step in tracking down the error should be to
classify the problem. For purposes of this paper, lets start
by placing the issues into one of three major categories:
deployment, runtime, and performance. Distinguishing
between these categories may not be at first obvious, but
after encountering a few different types of problems this
will provide a better idea. Runtime errors are going to be
an issue in the logic of integration; this can be actual code
or configuration in the server.
In certain cases the problem would be specific to a
particular composite. Signs that only a composite is
affected are usually obvious since the only errors showing
related to that integration. However, there may also be
issues that affect the entire infrastructure. For now, the
focus is on singular composites and deployment.
The quickest, and usually easiest, issues to troubleshoot are
deployment related. Deployment of a composite is broken
into different phases: cleanup, validation, compilation, and
the deployment. The cleanup phase should never fail as it
searches for existing packaged integrations and deletes
them if they exist. Validation examines the code, and many
errors related to bad references and XML. The
compilation phase will provide further errors should they
arise, but if successful this also packages the source into a
JAR file to prepare for deployment. Finally, deployment
occurs. The deployment process will reveal a number of
issues, however they may not all be displayed from the
deployer’s point of view. Normally that is not a problem,
as most of the issues will be revealed at runtime. These
issues are usually with the server configuration: data
sources, queues, topics, etc. When dealing with a process
that polls a database or file folder the processes will simply
not start. The best way to identify the root cause here is to
tail the out logs while performing a deployment.
Commonly, the issue is a bad JNDI name or a directory
that doesn’t exist. Most of these require coordination with
an application administrator depending on the level of
permissions that the developer has in the particular
environment. Issues that can be determined by the
developers themselves will be discussed with runtime
errors.
During runtime any number of errors can occur, but not
all of them will be caused by individual composites. Some
of them can be overarching issues that affect multiple
integrations. Similar to deployment issues, runtime issues
may be caused by problems in the code or in server
configurations. Most code related issues will appear in the
flow trace and will be obvious to solve. Most issues, even
non-code related, will manifest as an error in the console
but the root cause will be hidden in the logs.
In the case of Figure 1, the error is a missing organization.
This is a business fault and should be handled by the
integration code or passed back to the calling application.
Other issues can include errors like: “Cannot insert NULL
into…” These issues may or may not need to be handled
by the integration. Unfortunately, not all of the errors will
appear in the logs all the time, or the error that does show
is not descriptive enough to determine a resolution
immediately. One such error is the “Unable to access the
following endpoints…” error. Logging levels can be
increased to various levels to obtain further information.
However, there are many different loggers available, so
always knowing which logger to modify can be difficult.
The best way to decide which logger should be modified is
by looking in the header of a log message. Next, finding
the right level of logging can be difficult, because trace
logging at times can be overly verbose leading to more
time sifting through the noise. One of the best ways to
find the right logging level is to increment by a couple
levels at a time until the true problem is revealed.
There are many signs that there is a problem with the
performance of a system. Some of those signs being:
The Oracle Enterprise Manager Fusion
Middleware Control is abnormally slow.
The completion time of composites is increased
consistently across the board.
The size of the dehydration store is growing
rapidly.
A large number of errors are appearing in the logs.
<Aug 6, 2011 10:10:33 AM EDT> <Error> <oracle.soa.mediator.serviceEngine> <BEA-
000000>
<Got an exception:
oracle.fabric.common.FabricInvocationException:
javax.xml.ws.soap.SOAPFaultException:
Message: Organization 129024 not found. Stack trace: at
Core.WebServices.Message.MessageWebService.SaveNotificati
on(Organization organization, Notification notification)
in c:Data1.0CoreMessageMessageWebService.svc.cs:line
100, detail=javax.xml.ws.soap.SOAPFaultException:
Figure 1: Business Fault
3. Middleware
3 Session 185
Knowing the server is experiencing any of these issues
listed above means there is likely a performance issue.
There are a number of places to look to track down the
root cause. First, check if there is enough available space
on the hard drives. A lack a space can result in drastic
performance reductions. Secondly, be sure to check the
processor, memory, and I/O statistics with a tool like
vmstat to help narrow down which process is exactly
hogging resources on the [virtual] machine. Other factors
in performance can be the number of files open and the
number of processes running. A runaway integration has
the possibility to consume all file descriptors thereby
degrading performance across the rest of the system. If
issues arise like this, it is often a good idea in development
to clear the logs and restart Weblogic while watching the
logs for any errors that may be a precursor to the “too
many files open” error. If nothing is found specific to
SOA Suite, check other applications running, and be sure
to check the OS logs (/var/log/messages). While errors
can be a common reason for a slow environment, there
could be other issues playing a role.
A tuned JVM is the only one that will give the kind of
performance demanded by production level environment;
this is especially true when there are high volumes of
transactions passing through the environment. If the
application server is not already running in the JRockit
JVM, it is highly recommended. Speed increases can be
realized with little configuration. However, once JRockit is
running there are a number of tools such as the JRockit
Flight Recorder (JFR) that come with the JVM to further
tune your instance as necessary. As of writing this paper,
the Hotspot and JRockit JVMs will ship as one product
with the release of JDK 8. This means the benefits of
JRockit will be realized within the JVM. Tuning a JVM is
not the only useful part interacting directly with your
configuration settings. Additional information can be
provided by your JVM as well. Performing a heap dump
when a memory error occurs is one of those ways. The
JVM is not the only part that should be monitored.
Data sources are another critical component that should
be monitored in the case of performance issues. It is
possible that the available connection pool has been
saturated with connections and is causing a bottleneck. If
there is consistently an issue with a particular connection
pool, involve a DBA to help understand why the pool may
be getting full. There may be some SQL tuning that can be
done so that queries and procedures run more efficiently
shortening the length of connection times.
In the end, even this paper can only gloss over the very
complex art that is troubleshooting. There are many
variables that can come into determining the cause such as
security considerations, operating system, hardware, etc.
Most issues that arise can be narrowed into runtime or
infrastructure errors, performance issues, and deployment
issues. Targeting the category can allow focus on where
the true cause of the issue lay. For deployment issues, it is
good to have an understanding of the overall deployment
process. Also, knowing the purpose of the adf-config.xml
can provide insight as to how the MDS is referenced and
other important deployment related information.
When dealing with errors determining whether there is a
code specific issue or a system wide issue can prevent
many long hours looking in the wrong place. Modifying
logging levels can assist in this and allow for drilling into
the true cause of the issue.
APPENDICES
JVM Performance Tuning Documentation
http://docs.oracle.com/cd/E23943_01/web.1111/e13814
.pdf
http://docs.oracle.com/cd/E15289_01/doc.40/e15060.p
df
Location of out.err (Used for deployment errors)
Unix/Linux:
/tmp/out.err
Microsoft Windows:
C:Users<user>AppDataLocalTempout.err
Oracle ADF-config.xml Description
http://docs.oracle.com/cd/E15586_01/web.1111/b3197
4/appendixa.htm#BGBIFEJE
REFERENCES
Splunk. Ensure the availability and performance of your critical
applications using the genius of splunk. Retrieved from
http://www.splunk.com/web_assets/pdfs/secure/Troubl
eshooting_Critical_Applications.pdf