Solved

Generating java core dump files in Websphere

Posted on 2009-04-14
3
2,545 Views
Last Modified: 2013-12-11
Will java core dump files be automatically generated by WebSphere or does they have to be generated manually?
Because, when i asked my Admin for core dump files, he said "The only javacore dumps I see on these servers are on v205 and dated a month back:"
 
-rw-r--r--   1 wsadmin  wsadm       1196396 Mar 13 15:44 javacore1269914.1236973438.txt
-rw-r--r--   1 wsadmin  wsadm       1196435 Mar 13 15:44 javacore1269914.1236973491.txt

Can't he generate them now?
0
Comment
Question by:srikanthradix
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 41

Accepted Solution

by:
HonorGod earned 500 total points
ID: 24140470
Java core files will be generated under certain circumstances:

For example:
- Out of Memory condition
- Null Pointer Exception

You can also cause a Java core by "sending" an appropriate signal to the JVM.

For example:

http://www.IBM.com/support/docview.wss?rs=180&uid=swg21141514
0
 

Author Closing Comment

by:srikanthradix
ID: 31570011
Thanks for solution. Two questions:
1) kill -3 [PID]. Where PID is the process id of portal server. Will it kill the portal server?
2) ./dbxtrace_aix.sh -a [PID] > dbxtrace.out.   What does this do?
0
 
LVL 41

Expert Comment

by:HonorGod
ID: 24141745
The "kill" command isn't well named.  It is really just sending a signal, which in the case of "-3" is a request to the JVM to create a javacore file, and continue executing.

So, no, it won't "kill" your Portal Server

Thanks for the  grade & points.

Good luck & have a great day

... I'll give you the 2 for 1 price today...  :-)

It is best though for you to open a new question.


0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This exercise is about for the following scenario: Dmgr and One node with 2 application server. Each application server contains it owns application. Application server name as follows server1 contains app1 server2 contains app1 Prereq…
Upgrading Tomcat – There are a couple of methods to upgrade Tomcat is to use The Apache Installer is to download and unzip and run the services.bat remove|install Tomcat6 Because of the App that we are working with, we can only use Tomcat 6.…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question