A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.
How should the administrator fix this?
Correct : A
Deleting profiles. You can delete a profile using the manageprofiles command. If the command fails, you can delete the profile using operating system commands.
Before you begin: If a node within a profile is federated to a deployment manager, before you delete the profile, stop the node and remove the node from the deployment manager. Otherwise, an orphan node remains in the deployment manager.
Start a Discussions
A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
Correct : A
You must archive both the checkpoint metadata and content directories to store a checkpoint for later restoration.
Start a Discussions
The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation.
What can the administrator do to identify the cause of the installation failure?
Correct : C
Installation Manager creates log files that you can use to troubleshoot any installation problems. Consider verifying the log files after any installation to ensure that everything in that process went successfully.
To examine the logs manually, locate the Installation Manager logs directory. The default location for this directory varies according to the operating system:
Windows: C:\ProgramData\IBM\Installation Manager\logs
UNIX: /var/ibm/InstallationManager/logs
References:
Start a Discussions
A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?
Correct : D
Run the command to record a response file for the package installation. This command uses the -skipInstall
Windows: IBMIM -record <responseFile> -skipInstall
Unix/Linux: ./IBMIM -record <responseFile> -skipInstall
Start a Discussions
A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server.
How can the administrator ensure that the attributes configured on the new data source are used by the application server?
Correct : C
Process embedded configuration
Specifies whether the embedded configuration should be processed. An embedded configuration consists of files such as resource.xml, variables.xml, and deployment.xml. You can collect WebSphere Application Server-specific deployment information and store it in the application EAR file. Such an EAR file can then be installed into a WebSphere Application Server configuration, using application management interfaces that are described in the topic, Installing an application through programming.
One such application EAR file is an enhanced EAR file, which is created when you export an already installed application. The embedded configuration check box identifies such an enhanced EAR file. By default, the check box for 'process embedded configuration' is checked if the application is detected to be an enhanced EAR. The application install options are prepopulated with the information from the embedded configuration whether the check box for 'process embedded configuration' is checked or not. Users can overwrite these values during the deployment process.
Start a Discussions