> From: Angelo Chen [mailto:angelochen...@yahoo.com.hk]
> Subject: checking of jvm params in a running tomcat
>
> I use JAVA_OPTS='-Xms256m -Xmx1024m'
> and now I'd like to check if the running tomcat really picking up this,
> how to check?
JConsole is probably the easiest platform-independent wa
Hi,
I use JAVA_OPTS='-Xms256m -Xmx1024m'
and now I'd like to check if the running tomcat really picking up this, how
to check? without installing the tomcat manager? thanks.
--
View this message in context:
http://www.nabble.com/checking-of-jvm-params-in-a-running-tomcat-tp24990162p24990162.htm
Try installing Firebug on an install of Firefox and watch Firebug's Net
tab. You'll see all the requests, response codes and more as the page
loads. Should be able to figure out what's happening in short order.
--David
Gabriele Fatigati wrote:
> And very very strage, with user_1 pages has corre
> From: Martin Gainty [mailto:mgai...@hotmail.com]
> Subject: RE: Tomcat subdirectories BASIC authentication
>
> could you read the servlet 3.0 spec at
> http://jcp.org/aboutJava/communityprocess/pr/jsr315/index.html
The servlet 3.0 spec is not appropriate; it's not approved and not implemented.
could you read the servlet 3.0 spec at
http://jcp.org/aboutJava/communityprocess/pr/jsr315/index.html
in the meanwhile could you display the following items
web.xml
user_1 and css
user_2 and css
molte grazie
Martin Gainty
__
Note de déni et de confid
Gabriele Fatigati wrote:
> Dear Marc,
> My question was referred to css problem..
> After BASIC authentication, sometimes page layout is wrong. So, how
> can avoid this?
>
> Your suggested me that maybe there are wrong css link in source pages.
> I've checked and are correct.
Clearly, something i
Dear Marc,
My question was referred to css problem..
After BASIC authentication, sometimes page layout is wrong. So, how
can avoid this?
Your suggested me that maybe there are wrong css link in source pages.
I've checked and are correct.
2009/8/15 Mark Thomas :
> Gabriele Fatigati wrote:
>> And v
Gabriele Fatigati wrote:
> And very very strage, with user_1 pages has correct layout, with user 2 no!
I think you need to read this.
http://catb.org/~esr/faqs/smart-questions.html
Mark
> 2009/8/15 Gabriele Fatigati :
>> Mm,
>> there are css link in the source of the page. But i've checked and i
And very very strage, with user_1 pages has correct layout, with user 2 no!
2009/8/15 Gabriele Fatigati :
> Mm,
> there are css link in the source of the page. But i've checked and i
> think are correct.
>
> How can avoid this behaviour?
>
> 2009/8/15 Gabriele Fatigati :
>>> Bad reference to the c
Mm,
there are css link in the source of the page. But i've checked and i
think are correct.
How can avoid this behaviour?
2009/8/15 Gabriele Fatigati :
>> Bad reference to the css maybe?
>
> Yes, to the css.
>
> 2009/8/15 Mark Thomas :
>> Gabriele Fatigati wrote:
>>> Well,
>>> now i can authentic
> Bad reference to the css maybe?
Yes, to the css.
2009/8/15 Mark Thomas :
> Gabriele Fatigati wrote:
>> Well,
>> now i can authenticate subdirectories. But for some strange reason,
>> web pages, after BASIC authentication has very bad layout! I attached
>> an example.
>
> Attachments are blocked
On Sat, Aug 15, 2009 at 7:08 AM, wrote:
> Okay, so let's say I set my db connection pool size to one, where do I look
> to see what connection doesn't get closed like it should?
Chuck already gave you the sophisticated (thread dump) approach.
Alternatively, from the Department of Quick Hackery :
Gabriele Fatigati wrote:
> Well,
> now i can authenticate subdirectories. But for some strange reason,
> web pages, after BASIC authentication has very bad layout! I attached
> an example.
Attachments are blocked on this list so no-one can see your example.
> Why?
Bad reference to the css maybe?
Well,
now i can authenticate subdirectories. But for some strange reason,
web pages, after BASIC authentication has very bad layout! I attached
an example.
Why?
2009/8/15 David Smith :
> Mark Thomas wrote:
>> Gabriele Fatigati wrote:
>>
>>> I kow what is tag , but simply i don't understand how i
Daniele Development-ML wrote:
> Hello everybody,
> I have deployed a web application within a remote Tomcat server and now I
> need to access the Tomcat logging for debugging purposes.
> Anybody knows whether is available a web application to monitor this
> remotely - in analogy with the Manager ap
Hello everybody,
I have deployed a web application within a remote Tomcat server and now I
need to access the Tomcat logging for debugging purposes.
Anybody knows whether is available a web application to monitor this
remotely - in analogy with the Manager application? Or any other techniques
you w
> From: David Smith [mailto:d...@cornell.edu]
> Subject: Re: Connection Pool Exhausted
>
> some other app on the same tomcat instance
> is leaking the connections.
Can't be another app - the connections are declared local to this webapp.
As David states, finding out what changed before the resta
I know I'm coming late to the party and starting with the original post
to boot.
I see a third party app (not developed by Kristen) that ran perfectly
before a restart caused some problems. Given this, I'm of the feeling
there's a config problem OR some other app on the same tomcat instance
is le
> From: kwal...@sbceo.org [mailto:kwal...@sbceo.org]
> Subject: RE: Connection Pool Exhausted
>
> where do I look to see what connection doesn't get closed
> like it should?
Now you've reached the hard part. You'll need to take thread dumps to find out
what threads are running and where they a
Mark Thomas wrote:
> Gabriele Fatigati wrote:
>
>> I kow what is tag , but simply i don't understand how i
>> have to write security coinstraints.
>>
>
> But you clearly don't know what a context path is. Read the servlet
> spec. It explains this.
>
>
>> You told me:
>>
>> "you don't ne
Okay, so let's say I set my db connection pool size to one, where do I look to
see what connection doesn't get closed like it should? Is there a particular
log file, place to look in the Lambda Probe, etc, and then how do I trace that
to the source code?
My apologies if the answers to these are
> From: azharalibuttar [mailto:az...@itoperationz.com]
> Subject: Re: Running multiple tomcat instances with Tomcat 6.0.14
>
> Thanks for sharing a very valuable information with the users of apache
> tomcat but there is also a very simple way to run multiple instances of
> apache tomcat 6 given i
Martin Gainty wrote:
> if the proposed solution is not conformant to spec
There is a spec compliant solution to the OPs question...
> or is not a TC solution
...and Tomcat supports that spec compliant solution.
> yelling at the op or anyone else
Whose yelling? I don't see any shouting on this
> From: gabriele.fatig...@gmail.com [mailto:gabriele.fatig...@gmail.com]
> On Behalf Of Gabriele Fatigati
> Subject: Re: Tomcat subdirectories BASIC authentication
>
> I kow what is tag , but simply i don't understand how i
> have to write security coinstraints.
As Mark said, you must not includ
> From: Martin Gainty [mailto:mgai...@hotmail.com]
> Subject: RE: Connection Pool Exhausted
>
> from my experience setting numActive to 1 is NOT a l/t solution
No one ever suggested it was; it's simply a debugging technique to make it
easier to find the connection leak.
- Chuck
THIS COMMUNIC
from my experience setting numActive to 1 is NOT a l/t solution
Martin Gainty
__
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten
if the proposed solution is not conformant to spec or is not a TC solution
yelling at the op or anyone else (even though what you're saying is technically
correct)
still does not provide (a TC Servlet-spec) solution that will work for the
client
the end result is that the client gets ticked a
Martin Gainty wrote:
> set numActive=1 is not a long term solution mark
It isn't meant to be. For the umpteenth time, read the thread and
understand the context before you comment.
Mark
-
To unsubscribe, e-mail: users-unsubscr
set numActive=1 is not a long term solution mark
Martin Gainty
__
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten wir hoeflich um
Martin Gainty wrote:
> As we are learning
> There are some things that Tomcat can do and
> some things Tomcat cannot do
There are may things you can't do with Tomcat. However, Tomcat can do this.
> if you want to look at how other webappservers accomplish url-pattern and
> security-constraint re
Martin Gainty wrote:
> that is only one solution
No it isn't. You didn't answer the question asked which was "How do I
set the connection pool size to 1".
> what is your non-jocl solution?
Read the thread. Hassan has already answered the question.
Mark
---
azharalibuttar wrote:
> Hi,
>
> Thanks for sharing a very valuable information with the users of apache
> tomcat but there is also a very simple way to run multiple instances of
> apache tomcat 6 given in the post on under given blog;
>
> http://www.itoperationz.com/2009/07/multiple-instances-of-
As we are learning
There are some things that Tomcat can do and
some things Tomcat cannot do
if you want to look at how other webappservers accomplish url-pattern and
security-constraint read
http://edocs.bea.com/wls/docs61/webapp/web_xml.html#1039540
ping me offline for a solution you can use
that is only one solution
what is your non-jocl solution?
Martin Gainty
__
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten wir h
Hi,
Thanks for sharing a very valuable information with the users of apache
tomcat but there is also a very simple way to run multiple instances of
apache tomcat 6 given in the post on under given blog;
http://www.itoperationz.com/2009/07/multiple-instances-of-apache-tomcat-6-on-debain5-lenny/
Gabriele Fatigati wrote:
> I kow what is tag , but simply i don't understand how i
> have to write security coinstraints.
But you clearly don't know what a context path is. Read the servlet
spec. It explains this.
> You told me:
>
> "you don't need to include the context path in the elements"
I kow what is tag , but simply i don't understand how i
have to write security coinstraints.
You told me:
"you don't need to include the context path in the elements"
And i renew my question :), What i have to write in in
this specific case?
2009/8/15 Mark Thomas :
> Gabriele Fatigati
Gabriele Fatigati wrote:
> Hi Mark, thanks for your reply.
> But i didn't understarnd what you said. Where i have to define that
> user_2 can access only in subdir_1? Can you give me an example?
If you don't understand terms I used, you really need to read the
servlet specification.
Mark
>
> 20
Hi Mark, thanks for your reply.
But i didn't understarnd what you said. Where i have to define that
user_2 can access only in subdir_1? Can you give me an example?
2009/8/15 Mark Thomas :
> Gabriele Fatigati wrote:
>> Wehere is a mistake?
>
> You don't need to include the context path in the elem
Gabriele Fatigati wrote:
> Wehere is a mistake?
You don't need to include the context path in the elements.
> Is it possible to do this in Tomcat 5.5?
This is possible in all Tomcat versions.
Mark
-
To unsubscribe, e-mail:
Martin Gainty wrote:
> dbcp parameters are located in a *.jocl file located on your classpath
Kristen - you can safely ignore this. It doesn't apply in your case.
Martin - Please read the entire thread before you post. It was made
quite clear how the pool was configured and it wasn't with a jocl
Dear Tomcat users,
i would ask you if is it possibile in Tomcat 5.5 to protect
subdirectories of my deployed application. I'll explain an example.
Suppose i have deployed my app in /application. This application has
two subdirectories, subdir_1, subdir_2, but only in the url not in the
file system
42 matches
Mail list logo