Some Background Weblogic distribution is the terminology that depicts the form or the nature of the Oracle Weblogic Installer (or) the installable files. Oracle weblogic 12c can be downloaded in two forms. Generic Distribution Developer Distribution What is Generic Distribution In Generic Distribution, Oracle has bundled the Weblogic server and[...]
Read moreAuthor: Sarav AK
docker pull container-registry.oracle.com - access denied (or) Unauthorized
In this article we are going to see how to fix the access denied and unauthorized errors while using the containers of container-registry.oracle.com. Most of us at times might have got this exceptions access denied and unauthorized while downloading the image using docker pull command. This article is all about[...]
Read moreHow to Deploy docker image to Kubernetes
In this post, we are going to see the Steps to create a Docker Image and Deploy to Kubernetes in 8 easy steps. This post is about the title of this post which is "How to Deploy docker image to kubernetes" For this post, we have used minikube cluster and[...]
Read moreHow to find High CPU Consuming Threads - Java Thread Top
The Objective Let it be any Application Server you use such as Weblogic, Websphere, Tomcat, Jboss, Glassfish. (or) Let it be any Java framework or architecture your web application is developed in like Spring MVC, EJB, JSF, DAO. When it comes to administrating the Java (J2EE) application ( WEB or[...]
Read moreWeblogic User Creation Script WLST
The Objective The purpose of this post to share the WLST script which helps in creating a new user in weblogic 11g or 12c and map them to righteous Group for privileges. Like Administrators, Deployers, Monitors etc. Version Compatibility Weblogic 12c (or) 11g The Properties file This is[...]
Read moreLET-M-READ - Controlled Read Access to Linux Users
An Open Source tool to grant controlled read access to unprivileged users on UNIX based OS to read log files or config files etc. With LET-M-READ system admins can give read access to unprivileged or Guest users. without changing the file permissions (or) directory permissions. LET-M-READ can help mostly while[...]
Read moreAnsible changed_when and failed_when examples
In this post, we are going to see how to use conditional statements of Ansible such as when, changed_when, failed_when and where to use them appropriately and how it works. By these conditional modules, Ansible provides a way for us to define when should ansible run a certain task or consider the[...]
Read moreAnsible Facts and How to use them - Ansible Variable list
In this post, we are going to see, What is ansible facts (or) playbook variables and how to use these facts various types of facts such as Dictionary, List, Normal Text. Also covered, What does ansible Gathering facts tasks do in ansible playbook execution, data types of ansible variables and how[...]
Read moreAnsible SSH Key transfer from one host to another - local and remote
SSH Key-based authentication setup in LINUX (or) UNIX based OS is one of the major platform services related task and most frequently executed task by Unix admins. Ansible, An IT Automation tool could automate this tedious task as well. SSH Key based authentication is indispensable when it comes to automation. Even[...]
Read moreLog Rotation, Purging, Archiving of Application Server Logs - Script
Overview An Automation script Linux for Log rotation, LogPurging and Compressing For weblogic and tomcat Installations. In Big infrastructure when you are running multiple Tomcat, weblogic, JBoss (or) Websphere instances or domains. The Biggest problem that you would face often as a system administrator is disk space issue. Perhaps, the[...]
Read more