Solved

Weblogic 8.1 SP2

Posted on 2006-07-18
5
678 Views
Last Modified: 2013-12-10
Hi

Referring to http://e-docs.bea.com/wls/docs81/notes/resolved_sp03.html, it seems that, for SP2, setTimeout() has a bug that cause it to timeout with 2 times the value set for it.

Is that really the case?

I'm using SP2, and cannot really find the appropriate API documentation for this SP. I'm using setTimeout() function, but the timeout seems to occur only after double of the period specified. For eg, I set it to 5 minutes, but the timeout occurred only about 10 minutes.

Is this due to the bug mentioned on the website?
0
Comment
Question by:java_kevin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 35

Accepted Solution

by:
girionis earned 125 total points
ID: 17144624
If you tried it and it behaves as described (i.e. double the time) then it should be a bug.
0
 

Author Comment

by:java_kevin
ID: 17144634
Yep, I've contacted their helpdesk and kinda got a response I'm looking for.

And at the start, I thought the session-timeout in the xml file is overriding the timeout period, and the setTimeout method is not working as expected. So I can't really confirm it's a bug.
0
 
LVL 35

Expert Comment

by:girionis
ID: 17144640
Thank you for accepting :)

BTW what did the helpdesk say?
0
 

Author Comment

by:java_kevin
ID: 17144648
No problem, your response is an alternative way to find out the answer. So it's still an answer :)

They said it's a known bug in the SP2. And there is a patch for it.

And that, my observation was true.

They are gonna send me the patch to apply.
0
 
LVL 35

Expert Comment

by:girionis
ID: 17144652
Nice :)
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Configure Web Service (server application) I. Configure security for Web Services methods First, we need to protect Session bean which implements the service: 1. Open EJB deployment descriptor (ejb-jar.xml) in the EJB project that contains you…
Upgrading Tomcat – There are a couple of methods to upgrade Tomcat is to use The Apache Installer is to download and unzip and run the services.bat remove|install Tomcat6 Because of the App that we are working with, we can only use Tomcat 6.…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question