Solved

Tracing is not creating trace.log file.

Posted on 2008-06-26
5
2,072 Views
Last Modified: 2013-12-10
I'm trying to figure out why my trace.log isn't being created by the Tracing service in WAS.  I have used and gathered traces before and even renamed the file(inside of adminconsole) to reflect the situation and all has worked as expected.  So, I'm somewhat familiar with it.  Also have checked the server.xml file to verify the changes.  All is there.

- <services xmi:type="traceservice:TraceService" xmi:id="TraceService_1173992774921" enable="true" startupTraceSpecification="*=info:com.ibm.websphere.commerce.WC_BUSINESSCONTEXT=all:com.ibm.websphere.commerce.WC_SERVER=all" traceOutputType="SPECIFIED_FILE" traceFormat="ADVANCED">
  <traceLog xmi:id="TraceLog_1173992774921" fileName="${SERVER_LOG_ROOT}/trace.log" rolloverSize="10" maxNumberOfBackupFiles="3" />
  </services>


However, I'm trying to capture some tracing now but my trace.log file is not being created nor any errors being generated.  I know I'm looking in the right profile\dev\logs\server1 directory; dev being the Commerce instance name.  Even if I search the entire hdd, no file exists.  I have also disabled/enabled Trace and restarted the server between actions.  Configuration or Runtime results the same.

Anyone else had this issue?

tia,
mg
0
Comment
Question by:clownbird
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 41

Accepted Solution

by:
HonorGod earned 300 total points
ID: 21882562
I don't see anything obviously wrong with those settings.

Q: What userid was used to install WebSphere?  (e.g., root?)

Q: What userid is being used to start WebSphere?

Q: Did you change the runAs setting?

I have seen this type of symptom most often when the AppServer no longer has permission to write to the specified directory...
0
 

Author Comment

by:clownbird
ID: 21882857
Security isn't enabled.  I'm loggin onto the Windows server with a local admin account.  However, I will save a file into the directory just to dismiss it.

Runas hasn't been modified.

I have a PMR open so I'll share the outcome.

Thanks.
0
 

Author Comment

by:clownbird
ID: 21883597
One of IBM's suggestions was to enable TraceService via the wsadmin tool to see if the adminconsole had something broke....

However, trace mysteriously began working this am when the server came back up from nightly backups.

I was able to drop a test.txt file into the dir.

Not really sure what the hangup was with tracing but its working now.

Have a great weekend.
0
 

Author Closing Comment

by:clownbird
ID: 31470972
Self-healing issue.  Mystery....  Although your checklist is proficient.  Thanks.
0
 
LVL 41

Expert Comment

by:HonorGod
ID: 21884265
Wow, I hate it when that happens.  :-)

I prefer to understand, and resolve the issues.

Thanks for the grade & points.

Good luck & have a great day
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

-Xmx and -Xms are the two JVM options often used to tune JVM heap size.   Here are some common mistakes made when using them:   Assume BigApp is a java class file for the below examples. 1.         Missing m, M, g or G at the end …
This exercise is about for the following scenario: Dmgr and One node with 2 application server. Each application server contains it owns application. Application server name as follows server1 contains app1 server2 contains app1 Prereq…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question