Business Objects CMC error

Posted on 2012-08-17
Last Modified: 2012-11-24
Hi there

I am trying to log on to the Central Management Console of Business Objects. However I am getting the following error:

WCA unknown error
Message:An undefined exception has occurred in the plugin

Stack Trace:
      at com.businessobjects.enterprise.wca.impl.internal.WebComponent.process(Native Method)
      at com.businessobjects.enterprise.wca.impl.internal.WebComponent.process(Unknown Source)
      at com.businessobjects.enterprise.wca.servlets.a.a(Unknown Source)
      at com.businessobjects.enterprise.wca.servlets.WCAControllerServlet$DefaultStrategy.apply(Unknown Source)
      at com.businessobjects.enterprise.wca.servlets.WCAControllerServlet.service(Unknown Source)
      at javax.servlet.http.HttpServlet.service(
      at com.evermind.server.http.ServletRequestDispatcher.invoke(
      at com.evermind.server.http.ServletRequestDispatcher.forwardInternal(
      at com.evermind.server.http.HttpRequestHandler.processRequest(
      at com.evermind.util.ReleasableResourcePooledExecutor$

The server running Business Objects is Windows Server 2003
Business Objects is version X1 Release 2
It connects to an Oracle database that runs on Red Hat Linux

Please can someon advise on how to fix this error so I can access the CMC

Many Thanks
Question by:mwitdept
    LVL 37

    Expert Comment

    by:Gerwin Jansen
    Hi, found you this, not exactly the same env you have but the same error. Maybe worth a try, if you do take note of the registry remark.
    LVL 100

    Expert Comment


    Accepted Solution

    Hi there

    Thank you for the suggestions but luckily I am able to log into the CMC now. Not sure why it now works as nothing has changed.
    LVL 37

    Expert Comment

    by:Gerwin Jansen
    No problem, you may close this question. If it happens again just ask :)

    Author Closing Comment

    It just started working on it's own

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Suggested Solutions

    This article explains all about SQL Server Piecemeal Restore with examples in step by step manner.
    Creating and Managing Databases with phpMyAdmin in cPanel.
    This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
    This video shows how to recover a database from a user managed backup

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now