Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Why does Weblogic cache so much memory and how can is see how much memory has been cached ?

Posted on 2005-04-25
3
Medium Priority
?
291 Views
Last Modified: 2013-12-10
Why does BEA's WebLogic cache so much o/s memory and how can i see how much is being cached and can i released more back to the o/s. We are running a third party application called 'Manugistics' using BEA Weblogic running on top of an Oracle Database. After running a big batch job through Weblogic the o/s physical memory is being almost totally used and nothing is given back after the process has ended - is this a memory leak or is this how weblogics work ??
thanks
H
0
Comment
Question by:hraja77
3 Comments
 
LVL 1

Expert Comment

by:redmex
ID: 13860607
Hello,

Can you describe your server's environment. Memory, Server OS, etc.

RLI
0
 
LVL 1

Author Comment

by:hraja77
ID: 13860880
Hi RLI,

We are running on unix IBM AIX 5.2 - there is 8GB RAM available - with the Oracle 9.2 database and Weblogic started up only 500M is used. After running a batch through WebLogic - approx 7GB is taken from the o/s and this is kept and not released back to the o/s by WebLogic once the batch has stopped and completed successfully - thus other programs and database queries and even processes fail with no memory available. Once Weblogic has been restarted/rebooted the memory is released back to the o/s and everything else works fine again. If we continuosly bounce Weblogic we won't get any problems but this is not a viable solution.

cheers
H
0
 
LVL 23

Accepted Solution

by:
rama_krishna580 earned 1000 total points
ID: 13976164
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Configure Web Service (server application) I. Configure security for Web Services methods First, we need to protect Session bean which implements the service: 1. Open EJB deployment descriptor (ejb-jar.xml) in the EJB project that contains you…
Most of the developers using Tomcat find it easy to configure the datasource in Server.xml and use the JNDI name in the code to get the connection.  So the default connection pool using DBCP (or any other framework) is made available and the life go…
Screencast - Getting to Know the Pipeline
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question