Solved

Performance of J2ee application running on weblogic 8.1 with stateless seesion bean and DAO talking to Oracle DB

Posted on 2004-08-04
4
266 Views
Last Modified: 2013-12-10
Hello currently we are using stateless session bean with DAO to talk to database on weblogic App server.
The performance we are getting is not acceptable.We do save and continue page after page.Can somebody suggest
performance enhancement suggestions.Will stored procedures with DAO help(as against constructing sql within DAO)?
Urgent help required.Need to go production this week
Thanks in advance
0
Comment
Question by:protege_g
4 Comments
 
LVL 10

Accepted Solution

by:
avidya earned 500 total points
Comment Utility
Hi,

You probebly did read it, but this is an interesting links:
http://e-docs.bea.com/wli/docs81/bpfaq/tuning.html
http://e-docs.bea.com/wls/docs81/perform/index.html#wrap

This are tools to help you monitor and identify the problem:
http://phx.corporate-ir.net/phoenix.zhtml?c=95476&p=irol-newsArticle&t=Regular&id=586400&
http://www.devstream.com/JView2004/JViewCertified.html

http://www.quest.com/apm_j2ee/?landing=jpt_textlink
<i>.....At Quest, we have some great tools that I have worked with extensively. If developers would like to see how well their WebLogic Server is running internally and isolate and diagnose configuration problems, I would highly recommend looking at Spotlight on WebLogic. For diagnosing application issues, we have PerformaSure, which allows users to trace requests "from HTML to SQL" identify "hot" transactions and pinpoint their locations. I would never deploy a real-time application without first running it through PerformaSure.... </i>
0
 
LVL 53

Expert Comment

by:COBOLdinosaur
Comment Utility
protege_g,

I have moved this to the weblogic topic where I think will have a better chance of getting a solution.

COBOLdinosaur
Page Editor, Web Development
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
How to enable gc.log for tomcat? 3 33
JRE and project layout option 6 77
Weblogic Logs 4 109
websphere 1 72
-Xmx and -Xms are the two JVM options often used to tune JVM heap size.   Here are some common mistakes made when using them:   Assume BigApp is a java class file for the below examples. 1.         Missing m, M, g or G at the end …
Most of the developers using Tomcat find it easy to configure the datasource in Server.xml and use the JNDI name in the code to get the connection.  So the default connection pool using DBCP (or any other framework) is made available and the life go…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now