Solved

error in set datasource in RAD 6.0, the testing server is Webspere protal server 5.0.

Posted on 2006-10-20
1
229 Views
Last Modified: 2013-12-10
Hello,

I'm trying to set up a DB2 pool connection by using a datasource.  I have set up the DB2 datasource in RAD 6.0, the testing server is Webspere protal server 5.0.

i got an errror is:

javax.naming.NameNotFoundException: Name "comp/env/MYtestDB" not found in context "java:"

the code for retrieve datasource is: datasource = (javax.sql.DataSource) ctx.lookup("java:comp/env/MYtestDB");

is there someting missing? this is my first time that i'm using datasource

Thanks very much for your reply,

lilyyan
0
Comment
Question by:lilyyan
1 Comment
 
LVL 9

Accepted Solution

by:
shinobun earned 500 total points
ID: 17776722
Try "java:comp/env/jdbc/MYtestDB" or maybe just "jdbc/MYtestDB".
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Verbose logging is used to diagnose garbage collector problems. By default, -verbose:gc output is written to either native_stderr.log or native_stdout.log.   It is also possible to redirect the logs to a user-specified file. This article will de…
Upgrading Tomcat – There are a couple of methods to upgrade Tomcat is to use The Apache Installer is to download and unzip and run the services.bat remove|install Tomcat6 Because of the App that we are working with, we can only use Tomcat 6.…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question