Author: dan

BPEL: Beware the use of nested loops in a short running process

One of the restrictions when dealing with a short running process is that it must always run within a single transaction. The implication is that the process must complete within the default transaction timeout window. On an application server, this is 120s. We had an issue where our Process Server was creating a large number […]

Read more

WebSphere Process Server v6.1 API

There are various API’s that are provided as a part of WebSphere Process Server. EJB API There is the standard EJB lookup method for the four JNDI’s (Human Task, BusinessFlow, Relationship etc). EJB provides slightly more functionality than the Web service or JMS interface. The generic EJB API supports Remote Artifact loading so you don’t […]

Read more

WebSphere Integration Developer & WebSphere Process Server v6.1.2 released

V6.1.2 has been released for WebSphere Integration Developer and WebSphere Process Server. You can read the list of features. I’m going to highlight the ones that interest me: WebSphere Process Server New out-of-the-box, ready-to-run, Web 2.0 BPM client for business users with configurable work lists and detailed work item views, including support for collaboration using […]

Read more

My Next Opportunity: Oracle Fusion

As my gig here in Toronto doing WebSphere Process Server implementations comes to a close, I’m going to be moving on to a new opportunity using Oracle Fusion and Oracle BPEL. This should be very interesting as I will be able to directly compare and contrast the two integration engines from the perspective of someone […]

Read more

WAS: Resolution to Messages in the SIB locked forever

In a cluster where the messaging engine has failed over between nodes, a situation could arise where the transaction log (‘tranlog’) has become corrupt or is unrecoverable. In this situations, you may see messages on SIB Queues that are in the LOCKED state but are unprocessed. If you factor in a sequential delivering of messages, […]

Read more

WebSphere Application Server: -recovery flag

If you have a server that crashed without a clean shutdown, you may have transactions that are in progress and need to be recovered. In development, you would likely jusy delete the tranlog. On a production machine, you will likely need the following useful command line option when starting your server: startServer <server> -recovery This […]

Read more

DataPower Course WB552 Overall Impressions

I have to admit that I was very impressed with DataPower Course WB552. The content of the course covered everything that on would need to know about how to use the box along with security. It also provided a lot of opportunity to go off the beaten path and try modifications on your own. I […]

Read more

WB552: Random DataPower Thoughts Part 12

Message set (traffic Pattern) Count monitors increment based on condition. Duration monitors occur when a configured amount of time passes during processing of messages for the condition. Message Count Monitors would be used to limit requests to a certain rate (100/second) Message duration monitors are clock-based. Measure things like average server response. Traffic Definitions are […]

Read more

WB552: Random DataPower Thoughts 11

Tivoli Directory Integration can integrate with multiple LDAP. LDAP Search Attribute is the attribute in the LDAP that you want to look up. Load Balancing Algorithms: First-Alive: Secondary servers are only called when the primary server is down. So the first alive entry is always used. Hash: Hashes the IP address of the client to […]

Read more

WB552: Random DataPower Thoughts Part 10

AAA: Authentication, Authorization and Auditing Authentication can occur without the use of external servers: AAA file, LTPA and a Validation credential object, SAML token (?).  Can use the external Systems: LDAP, SAML, Tivoli, RADIUS When hitting a webpage, a browser artifact on a third party server can be pointed to embedded in the URL of […]

Read more

WB552: Random DataPower Thoughts Part 9

XML Virus scanning uses a filter action sheet: store://Virus-ScanAttachment.xsl. This transform needs to be modified to include the URL of your ICAP server Dictionary Attacks Protection uses count monitoring. SQL injection Protection uses the store://SQL-Injection-Filter.xsl transformation.

Read more

DataPower: Can A Match Action Accept Multiple URLs?

I have a match action which should accept /encrypt and /encrypt_fl . Could I have both of these specified in a single match action? When I tried it, I got a datapower error with the box unable to match. Not sure if this is user-error or what, but I thought I’d give a heads up […]

Read more

WB552: Random DataPower Thoughts Part 8

SSL: Message Confidentiality, Message Integrity and Non-Repudiation Server always authenticates to the client. Client optionally authenticates to the server. During an SSL handshake: Negotiate the level of SSL, decide on cipher suite, authenticate the server, build a secret key to be used for the session. SSL hello contains list of Cipher Suites. Server responds with […]

Read more

WB552: Random DataPower Thoughts Part 7

SSL Connections need Validation or Identification credentials based on which side of the conversation (client or server) the datapower box is. Nonrepudiation: How do you knowwho the party on the other end is? Signature: Encrypt a message with a private key, decrypt with the public key. This allows the receiver to verify the sender. Only […]

Read more

WB552: Random DataPower Thoughts Part 6

Always check the default system log when an error is first encountered. Audit log only occurs on the default domain. Captured IP packets are stored in pcap format. Need a tool to explore the data such as ethereal. The packet capture file is in the temporary directory. Probes and debug level logging will create a […]

Read more

WB552: Random DataPower Thoughts Part 5

Pass-thru: Traffic is passed without execution of the service policy. XML: Check for well-formed XML SOAP: Checked for SOAP Message validity. Non-XML: Treated as a binary and the service policy is executed. Service Level Monitors need a WSDL file to be defined. The validate action only accepts a single XSD definition or WSDL file. The […]

Read more

WB552: Random DataPower Thoughts Part 4

XML Firewall is a superset of the XSL Proxy. Web Service proxy understands more of the requirements to be a web service than the XML Firewall which only treats data as XML documents. Web Service Proxy and Multi-Protocol Gateway are supersets of the XML Firewall. Neither suppors the loopback proxy. Web Application Firewall: Customized XML […]

Read more

WB552: Random DataPower Thoughts Part 3

“Root Certificates” are implicitly trusted. The lookup chain of certificates ends at a root cert. These are stored in the pubcert directory. sharedCert is where certificates that we share with other clients are located. When creating a domain, you should always include default as a visible domain. This allows access to the store:// file system […]

Read more