29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.7 Serviceability<br />

Tip: When installing CIM make sure that the Windows firewall allows<br />

connections from the CIM<br />

The repository for the CIM can either be created during the installation of<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> Network Deployment <strong>V7.0</strong> or afterwards using<br />

the Installation Factory. The installation using the CIM provides a good approach<br />

to perform centralized remote installations and upgrades. The drawback is that<br />

you cannot control the naming of the profiles created when performing standard<br />

installation. This problem can be avoided by using custom installation packages<br />

created through the installation manager.<br />

For more details about CIM, refer to the <strong>IBM</strong> White Paper Centralized Installation<br />

Manager for <strong>IBM</strong> <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> Network Deployment Version<br />

7.0, available on the following Web page:<br />

http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&<br />

product=was-nd-dist&topic=was-nd-dist-dw-cim1<br />

Also see the Information Center at the following Web page:<br />

http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/topic/com.ibm.web<br />

sphere.installation.nd.doc/info/ae/ae/tins_cim.html<br />

A major challenge of problem management is dealing with unanticipated<br />

problems. It is much like detective work: find clues, make educated guesses,<br />

verify suspicions, and so on. The most important skills are common sense, focus,<br />

thoroughness, and rigorous thinking. A proactive approach to problem<br />

management is always the best. This section outlines general practices to follow.<br />

Perform the following checks to avoid issues with the runtime environment:<br />

► Check that you have the necessary prerequisite software up and running.<br />

► Check that the proper authorizations are in place.<br />

► Check for messages that signal potential problems. Look for warnings and<br />

error messages in the following sources:<br />

– Logs from other subsystems and products, such as TCP/IP, RACF,<br />

Windows Event Viewer, and so forth.<br />

– <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> SystemOut and SystemErr logs.<br />

– SYSPRINT of the <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> for z/OS.<br />

– Component trace output for the server.<br />

Chapter 9. System management 329

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!