A process hang is defined as one of the Portal Server processes not responding to requests anymore while the process is still running locally. The Portal Server processes are:
appservd: When Portal Server is hosted on Sun Java System Application Server
webservd: When Portal Server is hosted on Sun Java System Web Server
java process: Secure Remote Access (gateway)
Collect the general system information as explained in To Collect Debug Data on Portal Server Installation Problems.
(Secure Remote Access only) Consult the following information.
http://sunsolve.sun.com/search/document.do?assetkey=1-25-75583-1&searchclause=75583 |
If the problem persists after using this information, then continue with this procedure to collect the necessary data for the Sun Support Center.
(Secure Remote Access only) Can you connect to the Portal Server host when you bypass the gateway host?
If yes, the gateway java process is hung. Collect the debug data that follows on this process and not on the Portal Server container process.
Get the pid of the Web Server process.
ps -ef | grep uxwdogThe result will give you the PID of the uxwdog daemon, for example, 11449:
ps -ef | grep ns-hhtpd
C:\windbg-root>tlist.exe
For example, on Solaris OS:
# ptree 11449 11449 ./uxwdog -d /prods/crypto/60SP6/https-sun/config 11450 ns-httpd -d /prods/crypto/60SP6/https-sun/config 11451 ns-httpd -d /prods/crypto/60SP6/https-sun/config |
You want to gather data on the highest PID process, which in this example is 11451. The Web processes is either ns-hhtpd or webservd depending on the Web Server version.
Note the day and time that the process hang occurred.
Get the output of the following command.
netstat -an | grep web-port (or gateway-port)
netstat -an | web-port (or gateway-port)
For Solaris OS systems, the iwshang script gathers all the following debug data for you, except the output of the pkg_app script.
You must run the pkg_app script as indicated on one of core files generated by the iwshang script. Be sure to launch the iwshang script on the valid PID. For HP-UX, Linux, and Windows platforms, or if you do not have the iwshang script, continue with the remaining steps. See To Run the iwshang Script for more information.
Run the following commands and save the output.
ps -ef | grep server-rootvmstat 5 5iostat -xtopuptime
ps -aux | grep server-rootvmstat 5 5iostat -xtopsar
ps -aux | grep server-rootvmstat 5 5topuptimesar
Obtain the WEB process PID: C:\windbg-root>tlist.exe
Obtain process details of the WEB running process PID: C:\windbg-root>tlist.exe web-pid
Get the swap information.
swap -l
swapinfo
free
Already provided in C:\report.txt as described in To Collect Debug Data on Portal Server Installation Problems.
For Unix-Linux systems, if you are able to isolate the hanging process, get the following debug data for that process. Otherwise, get the following data for each of the Web Server processes. For Windows systems, get the following data for the webservd.exe or ns-httpd.exe process.
Get the output of the following command.
truss -ealf -rall -wall -vall -o /tmp/web-pid.truss -p web-pid
tusc -v -fealT -rall -wall -o /tmpweb-pid.tusc -p web-pid
strace -fv -o /tmp/web-pid.strace -p web-pid
Use DebugView: http://www.sysinternals.com/Utilities/DebugView.html
Wait one minute after launching the appropriate command (truss, strace, tusc, or DebugView) then stop it by pressing Control-C in the terminal where you launched the command.
Get the the Directory Server Access, Errors, and Audit logs used by Portal Server.
server-root/slapd-identifier/logs/accessserver-root/slapd-identifier/logs/errors server-root/slapd-identifier/logs/audit (if enabled)
server-root\slapd-identifier\logs\accessserver-root\slapd-identifier\logs\errors server-root\slapd-identifier\logs\audit (if enabled)
Get core files and the output of the following commands.
In a process hang situation, it is helpful to compare several core files to review the state of the threads over time. To not overwrite a core file, copy that core file to a new name, wait approximately one minute then rerun the following commands. Do this three times to obtain three core files.
For HP-UX, you need the following two patches to use the gcore command: PHKL_31876 and PHCO_32173. If you cannot install these patch, use the HP-UX /opt/langtools/bin/gdb command from version 3.2 and later, or the dumpcore command.
cd server-root/bin/https/bingcore -o /tmp/web_process-core Archive the result of the pkg_app script:./pkg_app.ksh PID-of-application corefile
The output of the pkg_app script is required to analyze the core files.
Make sure that you have set the size of the core dumps to unlimited by running the ulimit command. and that the user is not nobody. Also, check the coreadm command for additional control. See 1.6 Configuring Solaris OS to Generate Core Files if a core file isn't generated.
# gcore -p web-pid (gdb) attach web-pid Attaching to process web-pid No executable file name was specified (gdb) dumpcore Dumping core to the core file core.web-pid (gdb) quit The program is running. Quit anyway (and detach it)? (y or n) y Detaching from program: , process web-pid |
The file core.web-pid should be generated in the https-instance/config directory.
cd server-root/bin/https/bin # gdb (gdb) attach web-pid Attaching to process web-pid No executable file name was specified (gdb) gcore Saved corefile core.web-pid (gdb)backtrace (gdb)quit |
Get the WEB process PID:
C:\windbg-root>tlist.exe
Generate a crash dump on the WEB running process PID:
C:\windbg-root>adplus.vbs -hang -p web-pid -o C:\crashdump_dir
For Windows, provide the complete generated folder under C:\crashdump_dir.
Get the Access Manager configuration file.
/opt/SUNWam/lib/AMConfig.properties
access-manager-server-root\lib\AMConfig.properties
Get the Access Manager log files.
/var/opt/SUNWam/*
access-manager-server-root\debug\*
Get network trace files between the gateway and the portal hosts, and between the client and the portal host.
Make sure that all the data collection is done over the same time frame in which you had the problem. Try to indicate the hung process if possible.
Indicate clearly all IP addresses and host names for each component to correctly read these network traces.
snoop -V -vvv -d interface-o /tmp/gw-snoop-portal ip-portal-server
tcpdump -i interface -w /tmp/gw-snoop-portal ip-portal-serverThe tcpdump command is available here:http://hpux.connect.org.ukYou can use the native nettl command too.
tethereal -V -F snoop -i interface -w /tmp/gw-snoop-portal ip-portal-server
The tethereal command already should be installed. If not, get it from the following location: http://www.ethereal.com. You can also use the ethereal GUI or the tcpdump command.
tethereal -vvv -i interface -w /tmp/gw-snoop-portal host ip-portal-server
The tethereal command is available at the following location: http://www.ethereal.com. You can also use the ethereal GUI.