Evolution of JMX monitoring Monitoring is an essential part of Site Reliability Engineering and Infrastructure Services. I have started my career a decade ago when there was no many JMX monitoring tools and APMs(Application Performance Monitoring) available. I have worked on my fair share of J2EE Application servers and Servlet[...]
Read moreCategory: weblogic
Weblogic Datasource Creation WLST script & Ansible Playbook
In this post, we are going to see how to create a weblogic data source using WLST script and an Ansible Playbook. For this example, we are going to create a simple generic data source. What is DataSource? Quick intro A Datasource or Connection Pool is simply a buffer[...]
Read moreCPU and Memory consuming Java WebApp - For testing
There might be times where we might wonder what process is consuming all the system memory or CPU. We invest a lot of time debugging it and looking at the JMX graphs and then we finally find a bug in the code and fix it for good. On the other[...]
Read moreWEBLOGIC Remote Code Execution CVE-2018-3191 - How to Fix
Overview Oracle Weblogic Remote Code Execution vulnerability allows unauthenticated attackers with network access via T3 to compromise vulnerable Oracle WebLogic Server. Successful exploitation of it can result in takeover of Oracle WebLogic Server, hence remote code execution Affected versions Weblogic 10.3.6.0 Weblogic 12.1.3.0 Weblogic 12.2.1.3 Solution This vulnerability[...]
Read moreROBOT Return of Bleichenbacher Oracle Threat - How to Fix
Overview ROBOT is the return of a 19-year-old vulnerability that allows performing RSA decryption and signing operations with the private key of a TLS server. In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 v1.5 padding allowed an adaptive-chosen ciphertext[...]
Read moreWebLogic Remote Code Execution Vulnerability (CVE-2019-2725)
Overview Oracle WebLogic is vulnerable to a new deserialization vulnerability that could allow an attacker to execute remote commands on vulnerable hosts. This vulnerability was identified in China by China National Vulnerability Database (CNVD) published a Security Team, they have issued a bulletin about an unauthenticated remote command execution (RCE)[...]
Read moreWeblogic Slow Server Startup (or) Stuck WLST script - How to Fix it !
The Objective Though you do everything Correct in terms of Installation and Configuration of Weblogic in CentOS and Linux. For Some Reason, the Weblogic Server would not come up or your WLST script would take years to complete. Your Weblogic Server Startup would be very slow or your WLST script[...]
Read moreHow to Start Weblogic Admin and Managed Server in Command Line
The Objective In this post, we are going to see how to Start the Weblogic Admin and managed server in the command line. Presumably, most of the weblogic servers in the industry is running in LINUX Operating System and So this article is designed for the Linux as well. Prerequisite[...]
Read moreMonitor Weblogic Stuck Threads - WLST Script
In this post, we are going to share the Weblogic Stuck Thread Monitoring Script which will automatically trigger an email notification and create heap and thread dumps when the maximum Thread stuck count has reached the threshold ( currently set to 10 but can be modified.) This is written with[...]
Read moreA Sample Java Web Application - War file to Deploy and Test
The Overview This post is about the Java J2EE web application and starts with explaining what is Web Application and why they are called as WAR files and what is the Standard Directory Structure of Web Application or WAR file and What WAR files are consists of etc and continues[...]
Read more