The document describes various commands that can be used with the weblogic.Admin utility to perform administrative tasks on WebLogic Server instances from the command line. Some of the commands described include STORECONFIG to create a user configuration file, RESUME to change a server instance from standby to running state, SHUTDOWN to shut down a server instance gracefully, and START to start a managed server using Node Manager.
Architecting Large Enterprise Java ProjectsMarkus Eisele
In the past I've been building component oriented applications with what I had at hand. Mostly driven by the features available in the Java EE standard to be "portable" and easy to use. Looking back this has been a perfect fit for many customers and applications. With an increasing demand for highly integrated applications which use already available services and processes from all over the place (departmental, central or even cloud services) this approach starts to feel more and more outdated. And this feel does not come from a technology perspective but from all the requirements around it. Having this in mind this post is the starting point of a series of how-to's and short tutorials which aim to showcase some more diverse ways of building (Enterprise Java) applications that fit better into today's requirements and landscapes.
Architecting Large Enterprise Java ProjectsMarkus Eisele
In the past I've been building component oriented applications with what I had at hand. Mostly driven by the features available in the Java EE standard to be "portable" and easy to use. Looking back this has been a perfect fit for many customers and applications. With an increasing demand for highly integrated applications which use already available services and processes from all over the place (departmental, central or even cloud services) this approach starts to feel more and more outdated. And this feel does not come from a technology perspective but from all the requirements around it. Having this in mind this post is the starting point of a series of how-to's and short tutorials which aim to showcase some more diverse ways of building (Enterprise Java) applications that fit better into today's requirements and landscapes.
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012Scott Sutherland
During this presentation attendees will be introduced to lesser known, yet significant vulnerabilities in SQL Server implementations related to common trust relationships, misconfigurations, and weak default settings. The issues that will be covered are often leveraged by attackers to gain unauthorized access to high value systems, applications, and sensitive data. An overview of each issue, common vectors of attack, and manual techniques will be covered. Finally newly created Metasploit modules and TSQL scripts will be demonstrated that help automate the attacks. This presentation will be valuable to penetration testers who are looking for faster ways to gain access to critical data and systems. Additionally, it should be worth while for developers and database administrators who are interested in gaining a better understanding of how to protect their applications and databases from these attacks.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellScott Sutherland
This presentation will provide an overview of common SQL Server discovery, privilege escalation, persistence, and data targeting techniques. Techniques will be shared for escalating privileges on SQL Server and associated Active Directory domains. Finally we?ll show how PowerShell automation can be used to execute the SQL Server attacks on scale. All scripts created and demonstrated during the presentation will be open sourced. This should be useful to penetration testers and system administrators trying to gain a better understanding of their SQL Server attack surface and how it can be exploited.
Java EE 6 = Less Code + More Power (Tutorial) [5th IndicThreads Conference O...IndicThreads
Session Presented at 5th IndicThreads.com Conference On Java held on 10-11 December 2010 in Pune, India
WEB: http://J10.IndicThreads.com
------------
Java Platform, Enterprise Edition 6 (JavaEE 6) provides new capabilities that make it easier to develop and deploy enterprise and Web applications. It provides a simplified developer experience and improves on the developer productivity features introduced in JavaEE 5. It breaks the “one size fits all” approach in previous releases with Profiles and offers a comprehensive Web profile for lightweight, standards-based modern Web applications.The Web profile allows developers to build web applications quickly and prevents proliferation of custom web stacks for easier maintainability.
The platform enables extensibility by embracing open source libraries and frameworks such that they are treated as first class citizens of the platform. Several specifications like Contexts & Dependency Injection, Java Server Faces 2, Java API for RESTful Services, Java Persistence API 2, and Servlets 3 make the platform more powerful. All these specifications are implemented in GlassFish Open Source Edition 3 – a modular (OSGi based) light-weight, embeddable, extensible, and the open source reference implementation for Java EE 6. NetBeans, Eclipse, and IntelliJ provide extensive tooling for Java EE 6 and GlassFish Open Source Edition.
This tutorial session will help the attendees learn the latest APIs and develop a complete Java EE 6 application using NetBeans IDE. The attendees will understand the different tips & tricks such as code completion, templates, and wizards for a rapid application deployment. The techniques like session preservation and deploy-on-save are demonstrated to reduce the development lifecycle.
common_schema, DBA's framework for MySQLShlomi Noach
An introduction to common_schema, looking at the concepts behind the project and some notable features.
Slides from my talk at Percona Live London, Dec 2012
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL ServerScott Sutherland
During this presentation, we’ll cover interesting techniques for executing operating system commands through SQL Server that can be used to avoid detection and maintain persistence during red team engagements. We’ll also talk about automating attacks through PowerShell Empire and PowerUpSQL. This will include a review of command execution through custom extended stored procedures, CLR assemblies, WMI providers, R scripts, python scripts, agent jobs, and custom ole objects. We’ll also dig into some new integrations with PowerShell Empire. All code and slide decks will be released during the presentation. This should be interesting to blue teamers looking for a faster way to test their detective control capabilities and red teamers looking for a practical way to avoid detection while trying to maintain access to their target environments.
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL ServerScott Sutherland
During this presentation, we’ll cover interesting techniques for executing operating system commands through SQL Server that can be used to avoid detection and maintain persistence during red team engagements. We’ll also talk about automating attacks through PowerShell Empire and PowerUpSQL. This will include a review of command execution through custom extended stored procedures, CLR assemblies, WMI providers, R scripts, python scripts, agent jobs, and custom ole objects. We’ll also dig into some new integrations with PowerShell Empire. All code and slide decks will be released during the presentation. This should be interesting to blue teamers looking for a faster way to test their detective control capabilities and red teamers looking for a practical way to avoid detection while trying to maintain access to their target environments.
2017 Thotcon - Hacking SQL Servers on Scale with PowerShellScott Sutherland
This presentation will provide an overview of common SQL Server discovery, privilege escalation, persistence, and data targeting techniques. Techniques will be shared for escalating privileges on SQL Server and associated Active Directory domains. Finally I’ll show how PowerShell automation can be used to execute the SQL Server attacks on scale with PowerUpSQL. All scripts demonstrated during the presentation are available on GitHub. This should be useful to penetration testers and system administrators trying to gain a better understanding of their SQL Server attack surface and how it can be exploited.
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012Scott Sutherland
During this presentation attendees will be introduced to lesser known, yet significant vulnerabilities in SQL Server implementations related to common trust relationships, misconfigurations, and weak default settings. The issues that will be covered are often leveraged by attackers to gain unauthorized access to high value systems, applications, and sensitive data. An overview of each issue, common vectors of attack, and manual techniques will be covered. Finally newly created Metasploit modules and TSQL scripts will be demonstrated that help automate the attacks. This presentation will be valuable to penetration testers who are looking for faster ways to gain access to critical data and systems. Additionally, it should be worth while for developers and database administrators who are interested in gaining a better understanding of how to protect their applications and databases from these attacks.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellScott Sutherland
This presentation will provide an overview of common SQL Server discovery, privilege escalation, persistence, and data targeting techniques. Techniques will be shared for escalating privileges on SQL Server and associated Active Directory domains. Finally we?ll show how PowerShell automation can be used to execute the SQL Server attacks on scale. All scripts created and demonstrated during the presentation will be open sourced. This should be useful to penetration testers and system administrators trying to gain a better understanding of their SQL Server attack surface and how it can be exploited.
Java EE 6 = Less Code + More Power (Tutorial) [5th IndicThreads Conference O...IndicThreads
Session Presented at 5th IndicThreads.com Conference On Java held on 10-11 December 2010 in Pune, India
WEB: http://J10.IndicThreads.com
------------
Java Platform, Enterprise Edition 6 (JavaEE 6) provides new capabilities that make it easier to develop and deploy enterprise and Web applications. It provides a simplified developer experience and improves on the developer productivity features introduced in JavaEE 5. It breaks the “one size fits all” approach in previous releases with Profiles and offers a comprehensive Web profile for lightweight, standards-based modern Web applications.The Web profile allows developers to build web applications quickly and prevents proliferation of custom web stacks for easier maintainability.
The platform enables extensibility by embracing open source libraries and frameworks such that they are treated as first class citizens of the platform. Several specifications like Contexts & Dependency Injection, Java Server Faces 2, Java API for RESTful Services, Java Persistence API 2, and Servlets 3 make the platform more powerful. All these specifications are implemented in GlassFish Open Source Edition 3 – a modular (OSGi based) light-weight, embeddable, extensible, and the open source reference implementation for Java EE 6. NetBeans, Eclipse, and IntelliJ provide extensive tooling for Java EE 6 and GlassFish Open Source Edition.
This tutorial session will help the attendees learn the latest APIs and develop a complete Java EE 6 application using NetBeans IDE. The attendees will understand the different tips & tricks such as code completion, templates, and wizards for a rapid application deployment. The techniques like session preservation and deploy-on-save are demonstrated to reduce the development lifecycle.
common_schema, DBA's framework for MySQLShlomi Noach
An introduction to common_schema, looking at the concepts behind the project and some notable features.
Slides from my talk at Percona Live London, Dec 2012
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL ServerScott Sutherland
During this presentation, we’ll cover interesting techniques for executing operating system commands through SQL Server that can be used to avoid detection and maintain persistence during red team engagements. We’ll also talk about automating attacks through PowerShell Empire and PowerUpSQL. This will include a review of command execution through custom extended stored procedures, CLR assemblies, WMI providers, R scripts, python scripts, agent jobs, and custom ole objects. We’ll also dig into some new integrations with PowerShell Empire. All code and slide decks will be released during the presentation. This should be interesting to blue teamers looking for a faster way to test their detective control capabilities and red teamers looking for a practical way to avoid detection while trying to maintain access to their target environments.
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL ServerScott Sutherland
During this presentation, we’ll cover interesting techniques for executing operating system commands through SQL Server that can be used to avoid detection and maintain persistence during red team engagements. We’ll also talk about automating attacks through PowerShell Empire and PowerUpSQL. This will include a review of command execution through custom extended stored procedures, CLR assemblies, WMI providers, R scripts, python scripts, agent jobs, and custom ole objects. We’ll also dig into some new integrations with PowerShell Empire. All code and slide decks will be released during the presentation. This should be interesting to blue teamers looking for a faster way to test their detective control capabilities and red teamers looking for a practical way to avoid detection while trying to maintain access to their target environments.
2017 Thotcon - Hacking SQL Servers on Scale with PowerShellScott Sutherland
This presentation will provide an overview of common SQL Server discovery, privilege escalation, persistence, and data targeting techniques. Techniques will be shared for escalating privileges on SQL Server and associated Active Directory domains. Finally I’ll show how PowerShell automation can be used to execute the SQL Server attacks on scale with PowerUpSQL. All scripts demonstrated during the presentation are available on GitHub. This should be useful to penetration testers and system administrators trying to gain a better understanding of their SQL Server attack surface and how it can be exploited.
Dentro XVII SEMANA EUROPEA DE LA CALIDAD Y LA EXCELENCIA promovida por Euskalit en Euskadi, y celebrada del 26 de octubre al 11 de noviembre de 2011, se organizón un acto promovido por Aktiba la Asociación de Empresas de Turismo Activo de Euskadi denominado "
Tim Krupinski, a Solution Architect at SageLogix, Inc., offers his experience in using tools like Puppet to facilitate a hybrid cloud approach with Oracle Infrastructure as a Service
Complete Training on Youtube with all topics - FREE
http://www.youtube.com/playlist?list=PLeHUvPtMTsdeaE4YBiPPZlMYVaDfKt_DH
Weblogic Application Server overview and concepts
Weblogic integration with apache and security hardening with multi user realms and SSL
JMS Overview with queues/topic and jms bridges
JDBC overview with failover and HA modes
WLST & Node manager commands and setup
Weblogic deployment concepts
Offline and online backup recovery comcepts
Weblogic 11g admin basic with screencastRajiv Gupta
Installation of weblogic 11g
Creation and configuration of Admin server with three managed server
Creation of And Configuring Machines in Weblogic Server
Administering Managed Server With Node Manager
A presentation delivered most recently at OUG Norway on 16/4/2011. It introduces WebLogic terminology, how to install/configure it, high level monitoring and an example of its use to run Oracle Enterprise Manager 12c Cloud Controle.
Webinar Slides: New Tungsten Dashboard - Overview, Installation and ArchitectureContinuent
Tungsten Dashboard is our graphical user interface (GUI) for managing your Tungsten MySQL clusters interactively using a web browser, on your desktop, laptop, tablet or mobile. In our session, we'll provide a Tungsten Dashboard overview and discuss architecture, pre-requisites and security limitations.
AGENDA
- Configure the Tungsten Cluster Manager API
- Install and configure the Tungsten Dashboard
- Configure the Apache 2.4 web server
- Test connectivity to the Tungsten Manager API directly
- Install and configure HA proxy
- Test connectivity to the Tungsten Manager API via HA proxy
- Access the Tungsten Dashboard via a browser
Training Slides: Basics 106: Tungsten Dashboard Overview, Installation and Ar...Continuent
In this training session, we'll provide a Tungsten Dashboard overview and discuss architecture, pre-requisites and security limitations. A simple GUI management tool for Tungsten Clustering for MySQL / MariaDB / Percona Server, the Dashboard is usually installed on a standalone web server with HAProxy installed. This training session uses an example of a 6-node composite cluster.
AGENDA
- Tungsten Dashboard Welcome
- Tungsten Dashboard Overview
- Tungsten Dashboard Prerequisites
- Tungsten Dashboard Security Limitations
- Configure the Tungsten Cluster Manager API
- Test Connectivity to the Tungsten Manager API Directly
- Install the Tungsten Dashboard
- Install and Configure the Apache 2.4 Web Server
- Configure the Tungsten Dashboard
- Install and Configure HAProxy
- Test Connectivity to the Tungsten Manager API via HAProxy
- Access the Tungsten Dashboard GUI via a Browser
This presentation describes how to configure and leverage ProxySQL with
AWS Aurora,
Azure Database for MySQL
and CloudSQL for MySQL.
It details the various benefits, configuration, and monitoring.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
2. weblogic.Admin utility
● Used to perform Administrative functions from command
prompt
● A Java Class
● Must be added to classpath and PATH
● Can be used in shell scripts
● For multiple invocations BATCHUPDATE can be used.
● Syntax:-
java [ SSL Arguments ] weblogic.Admin
[ Connection Arguments ][ User Credentials Arguments ]
COMMAND-NAME command-arguments
3. weblogic.Admin
STORECONFIG Command
Creates a user-configuration file and an associated key file. The user-
configuration file contains an encrypted username and password.
The key file contains a secret key that is used to encrypt and decrypt the
username and password. Only the key file that originally encrypted the username
and password can decrypt the values. If you lose the key file, you must create a
new user-configuration and key file pair.
java weblogic.Admin
-username username[-password password]
[ -userconfigfile config-file] [ -userkeyfile keyfile]
STOREUSERCONFIG
4. weblogic.Admin
RESUME Command
Moves a server instance from the STANDBY state to
the RUNNING state.
Syntax
java [ SSL Arguments ]
weblogic.Admin
[-url URL]
[ User Credentials Arguments ]
RESUME [targetServer]
5. weblogic.Admin
SHUTDOWN Command
Gracefully shuts down the specified WebLogic Server instance.A graceful
shutdown gives WebLogic Server subsystems time to complete certain
application processing currently in progress. By default, a server instance waits
for pending HTTP sessions to finish as a part of the graceful shutdown. You can
override this behavior using the -ignoreExistingSessions argument.
java [ SSL Arguments ] [-Dweblogic.system.BootIdentityFile=filename [-
Dweblogic.RootDirectory=path] ] weblogic.Admin
[ Connection Arguments ] [ User Credentials Arguments ] SHUTDOWN [-
ignoreExistingSessions] [-timeout seconds] [targetServer]
(Deprecated)java [ SSL Arguments ] [-
Dweblogic.system.BootIdentityFile=filename [-Dweblogic.RootDirectory=path]
]
weblogic.Admin
[ Connection Arguments ]
6. weblogic.Admin
CANCEL_SHUTDOWN Command
(Deprecated) The CANCEL_SHUTDOWN command cancels the SHUTDOWN command
for a specified WebLogic Server.
When you use the SHUTDOWN command, you can specify a delay (in seconds). An
administrator may cancel the shutdown command during the delay period. Be aware that
the SHUTDOWN command disables logins, and they remain disabled even after
cancelling the shutdown. Use the UNLOCK command to re-enable logins.
Syntax
java [ SSL Arguments ] weblogic.Admin [ Connection Arguments ] [ User Credentials
Arguments ] CANCEL_SHUTDOWN
Example
The following example cancels the shutdown of a WebLogic Server instance that runs
on a machine named ManagedHost and listens on port 8001:
java weblogic.Admin -url ManagedHost:8001 -username weblogic -password weblogic
CANCEL_SHUTDOWN
7. weblogic.Admin
FORCESHUTDOWN Command
Terminates a server instance without waiting for active sessions to complete.
If a server instance is in a deadlocked state, it can respond to weblogic.Admin commands
only if you have enabled the domain-wide administration port. (A deadlocked
server is one in which all threads are struck trying to acquire locks held by other
threads.) If you have not already enabled the domain-wide administration port,
your only option for shutting down the server instance is to kill the Java process
that is running the server. You will lose all session data.
Syntax
java [ SSL Arguments ] [-Dweblogic.system.BootIdentityFile=filename [-
Dweblogic.RootDirectory=path] ]
weblogic.Admin [ Connection Arguments ] [ User Credentials Arguments ]
FORCESHUTDOWN [targetServer]
8. weblogic.Admin
DISCOVERMANAGEDSERVER
CommandCauses the Administration Server to re-establish administrative control over Managed
Servers. If the Administration Server fails while Managed Servers continue to run, or if
you shut down the Administration Server while Managed Servers continue to run, you
lose the ability to change the configuration or deploy modules to any server in the
domain. To regain this administrative ability, you must restart the Administration
Server. By default, an Administration Server finds the last known set of Managed
Servers and re-establishes a connection. If the Administration Server is unable to
automatically re-establish a connection to one or more Managed Servers during its
startup cycle, you can use this command to re-establish administrative control. For
example, you might have started a Managed Server in the STANDBY state and did not
resume the Managed Server before restarting the Administration Server. The
Administration Server discovers only Managed Servers that are in the RUNNING state.
Other factors can prevent the Administration Server from finding and re-connecting to
Managed Servers, and you can use this command any time you need to re-establish a
connection.
Syntax
java [ SSL Arguments ] weblogic.Admin
[ -url [protocol://]listen-address:listen-port ]
9. weblogic.Admin
LOCK Command
(Deprecated) Locks a WebLogic Server instance against non-privileged logins. Any
subsequent login attempt initiates a security exception which may contain an optional
string message.
This command is privileged. It requires the password for the WebLogic Server
administrative user. Instead of using the LOCK command, start a server in the
STANDBY state. In this state, a server instance responds only to administrative requests
over the domain-wide administration port.
Syntax
java [ SSL Arguments ]
weblogic.Admin
[ -url [protocol://]listen-address:listen-port ]
[ User Credentials Arguments ]
LOCK [“stringMessage”]
10. weblogic.Admin
START Command
Starts a Managed Server using Node Manager. This command requires the following
environment:
The domain’s Administration Server must be running.
The Node Manager must be running on the Managed Server’s host machine.
The Managed Server must be configured to communicate with a Node Manager.
The Startup Mode field in the Administration Console determines whether a Managed
Server starts in the RUNNING state or STANDBY state.
Syntax
java [ SSL Arguments ] weblogic.Admin
[-url URL]
[ User Credentials Arguments ]
START targetServer
11. weblogic.Admin
STARTINSTANDBY Command
(Deprecated) Starts a Managed Server using Node Manager.
In previous releases, this command started a Managed Server using the Node Manager
andplaced it in a STANDBY state. In this state, a server is not accessible to requests
from external clients.
In the current release, the Startup Mode field in the Administration Console determines
the state in which a Managed Server starts, regardless of which command you use to
start the server Instance.
Syntax
java [ SSL Arguments ] weblogic.Admin
[-url URL]
[ User Credentials Arguments ]
STARTINSTANDBY targetServer
12. weblogic.Admin
UNLOCK Command
(Deprecated) Unlocks the specified WebLogic Server after a LOCK operation. This
command is deprecated because the LOCK command is deprecated. Instead of LOCK
and UNLOCK, use STARTINSTANDY and RESUME.
Syntax
java [ SSL Arguments ] weblogic.Admin [-url URL]
[ User Credentials Arguments ]
UNLOCK
Example
In the following example, an administrator named adminuser with a password of
gumby1234
requests the unlocking of the WebLogic Server listening on port 7001 on machine
localhost:
java weblogic.Admin -url localhost:7001 -username adminuser
-password gumby1234 UNLOCK
13. weblogic.Admin
CONNECT Command
Connects to a WebLogic Server instance and returns two numbers representing the total
time for each round trip and the average amount of time (in milliseconds) that each
connection is Maintained.
Syntax
java [ SSL Arguments ] weblogic.Admin
[-url URL]
[ User Credentials Arguments ]
CONNECT [count]
14. weblogic.Admin
GETSTATE Command
Returns the current state of a server.
If a server instance is in a deadlocked state, it can respond to weblogic.Admin
commands only if you have enabled the domain-wide administration port. (A
deadlocked server is one in which all threads are struck trying to acquire locks held by
other threads.) If you have not already enabled the domain-wide administration port,
your only option is to shut down the server instance by killing the Java process that is
running the server. You will lose all session data.
Syntax
java [ SSL Arguments ] weblogic.Admin
[ Connection Arguments ]
[ User Credentials Arguments ]
GETSTATE [targetServer]
15. weblogic.Admin
HELP Command
Provides syntax and usage information for all WebLogic Server commands (by default)
or for a single command if a command value is specified on the HELP command line.
You can issue this command from any computer on which the WebLogic Server is
installed. You do not need to start a server instance to invoke this command, nor do you
need to supply user credentials.
Syntax
java weblogic.Admin HELP [COMMAND]
Example
In the following example, information about using the PING command is requested:
java weblogic.Admin HELP PING
The command returns the following:
Usage: java [SSL trust options]
weblogic.Admin [ [-url | -adminurl] [<protocol>://]<listen-
address>:<port>]
16. weblogic.Admin
LIST Command
Lists the bindings of a node in the JNDI naming tree.
Syntax
java [ SSL Arguments ] weblogic.Admin
[ Connection Arguments ]
[ User Credentials Arguments ]
LIST [JNDIcontextName]
17. weblogic.Admin
PING Command
Sends a message to verify that a WebLogic Server instance is listening on a port and is
ready to accept WebLogic client requests.
Syntax
java [ SSL Arguments ] weblogic.Admin
[ Connection Arguments ]
[ User Credentials Arguments ]
PING [roundTrips] [messageLength]