RequestDispatcher include of jsp is not coming in place

Posted on 2009-04-21
Last Modified: 2012-05-06

I want to include the FCHTMLRenderer.jsp page in my jsp, I am doing with RequestDispatcher using following code,
but the included jsp code is coming in first para of the even before the HTML tag, I want to display withing the Table TD.When I am doing with JSP include it is working fine, but i want to use the RequestDispatcher  as I need to pass the parameters dynamically
Please suggest the possible solution,



        <td width="<%=width%>" >

        <%RequestDispatcher rd=request.getRequestDispatcher("FCHTMLRenderer.jsp"+par1);





        <td width="<%=width%>">

            <jsp:include page="FCHTMLRenderer.jsp" flush="true">

                <jsp:param name="chartSWF" value="/OA_HTML/eisrs/jsp/dashboard/FC/MSColumn3D.swf" />

                <jsp:param name="strURL" value="/OA_HTML/eisrs/jsp/dashboard/XMLData/SecondChartData.xml" />

                <jsp:param name="strXML" value="" />

                <jsp:param name="chartId" value="chart2" />

                <jsp:param name="chartWidth" value="450" />

                <jsp:param name="chartHeight" value="300" />

                <jsp:param name="debugMode" value="false" />

                <jsp:param name="registerWithJS" value="false" /> 








Open in new window

Question by:ramadevimandala
    LVL 10

    Assisted Solution

    You can use the include syntax with an expression in the value:

    <jsp:include page="FCHTMLRenderer.jsp" flush="true">
        <jsp:param name="par1Name" value="<%= par1Value %>" />   

    Open in new window


    Accepted Solution

    I got the solution...

    just did out.flush(); before rd.inclue(..)...

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
    DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now