TIBCO BW QUESTIONS
What is the use of service container?
In the latest version of TIBCO Active Matrix Business Works a new feature called Service container is added. In this service container we can add number of EAR files and run all the services simultaneously. With the Service container feature we can add and upgrade processes without bringing down other running processes.
In how any ways can we create EAR files.
We can build EAR files in 2 ways. One method is using the Enterprise Archive pallete in the Tibco designer and adding the process archive we can build EAR file.
Other method is from the cmd prompt. We use the command appmanage and buildear.
What is Schema and why do we create schema.
Schema is used to create a XML schema file in which we add the variables which we want to use in our designer process. We can create the elements under which we can add the typed variables. The structure formed will be in the form of tree structure.
What is the use of confirm activity.
Confirm activity is used to confirm the success of a activity that have confirmable messages. For example if certain process starts on reception of a message then if that process starts the confirm activity sends a confirm message to the sender of the message.
What are the different modes of tibco BW installation.
There are 3 modes installation .
When we save a project what files are created under the saved project folder.
In that folder we see the Aeschema folder, all processes create in that project and the vcrepo.dat file.
what is AESchema?
Its a active enterprise schema
The AESchema resource contains folders for the classes, sequences, etc. to be used by the adapter if you are creating an SDK-based adapter, you can configure Schema resources using the AESchemas.
By default AEschema folder will come , You can't delete this folder .
What are the contents of vcrepo.dat
This files contains the display name , RV encodings and description.
What is grouping activity?
Grouping activity is used to group certain activities used in the designer so that we can loop those activities and iterate the group with conditions.
What is the condition for a process in order to build the EAR file?
We need to have a process starter.
How can we design exception handling?
The basic method is by routing the process to another sub process whenever error occurs by using the error transition.
What is the use of Render XML pallet.
It is used to create a XML file by creating the tags used in the xml file.
What are the elements in the WSDL file.
In abstract WSDl file we have the information about the messages ( request, reply) port type, operation. In concrete in addition to above we have the transport information.
What is the use of global variables?
Global variables are useful in order to provide dynamic input at the run time.
What is custom activity?
Custom activity is useful when we want others to use our process and not allow them to view the contents of the process. We can add this process into our MY Pallete section. We can directly use this process by dragging it into our process.
In web service in how many ways can we create connections.
2 ways. HTTP and JMS.
How does the file poller activity works.
This is a starter activity which starts the process whenever there is update for the file that is specified.
What is the use of project template?
In project template we can save our standard processes that we want to use in future. These processes are generally the ones which have the commonly used activities.
What is the optimum maximum number of connections in JDBC?
What is sub process and what is its use?
Whenever we call a process from another process , the called processbecomes the subprocess. Sub process helps in reducing the complexity of the design by assigning the activity in other process.
What is TRA.
Tibco Runtime Agent is the main frame work for all the tibco softwares. It provides the runtime agent and monitoring agent. All the libraries required by the designs are provided by TRA.
What are the process variables that are available to all activities as inputs.
global variables and process context.
What are break points?
Break points are used to check the inputs and outputs of each activity during testing the design so that we can debug our design. We can place the check points for all activities on input and output side.
What re the encoding techniques in WSDL?
Encoded and literal.
What are the conditions in transitions?
Success, Success with condition, Success with no condition and error.
What are the different variables in BW?
Global variables, Shared variables, process variables and job shared variables.
What is the purpose of autocommit command
Causes the change to the configuration files to be saved automatically into files on disk.
What is the purpose of commit command
Commits all configuration changes into files on disk
Will the commit occur in "autocommit" command if there is error in script we run?
No - If the "ignore" parameter is not specified.
What is the command to know the Database Store Files?
show db [
How can we compress the Database store files?
Will both the asynchronous and synchronous database files can be compressed at a time?
No - Each file has to be compressed separately
What are the types of durable subscriptions we have?
Static - The Specification will be written to the durables.conf file
Is the commands "show server" and "info" are same in
Yes - Both the commands Shows server name and information about the connected server.
What is the difference between the "disconnect" and "shutdown" commands
disconnect - the server be active, only the admin tool get disconnected from server.
shutdown - the server itself shuts down by confirming with the user.
TIBCO Designer allows you to create alias to resources that are to be reused in other projects. Alias are used in two resources, the AliasLibrary and the LibraryBuilder. The AliasLibrary resource allows you to load files stored in the file system into your project. The LibraryBuilder resource allows you to build a design-time library that includes resources defined in one project that can be shared with other projects.
How to change the global variable at runtime?
To Change Global Variables for a Service or Process
1. In TIBCO Administrator, click Application Management.
2. Select an application and expand it.
3. In the Configuration Builder pane, click a service or process name. A service is
named with a .arr suffix. A process is named with a .par suffix.
4. Click the Advanced tab.
5. Change global variables as required. Be sure to use valid XML characters only.
6. Click Save.
How to manage the code in tibco after development?
n realtime we have a configuration management tools like VSS, CVS, Star team etc
All project documents and source code will be stored into the given
tools. If any developer wants to work on documents or source code they have to checkout from the tool.
Once development is over and tested , Again developer needs to checkin that same source code into the tool .
Note: Once a developer check out the code from the tool, other developer can't work on that code .
Coming to the migration of application . We will migrate only ear file from one environment to another environment, only we will change the global variables
Check Point Description
The Checkpoint activity performs a checkpoint in a running process instance. A checkpoint saves the current process data and state so that it can be recovered at a later time in the event of a failure. If a process engine fails, all process instances can be recovered and resume execution at the location of their last checkpoint in the process definition. If a process instance fails due to an unhandled exception or manual termination, it can optionally be recovered at a later time, if the process engine is configured to save checkpoint data for failed processes
Check point will stores in two places File and DB
Coming to the db, you have to select a Database before that you need to create database connection and deploy.
Check point file location will be in Par file (Tibco Administrator )
if you are working on local machine
C:\Documents and Settings\
How can we configure the SSL parameter?
In BusinessWorks we have JMS Connection, HTTP, ADB Adapter etc which have SSL features. They can be used by checking the checkbox and doing corresponding settings for certificates and identity objects.
The security over SSL is provided by using cryptography which in turn uses the certificates and the cryptographic algos like RSA, Message Digest, DES and others to change the message into encrypted message. This encrypted message can only be understood if we have the certificates.
The SSL configuration needs to be done in the administrator. The transportation can be invoked by components and by the browsers as well. The underlying SSL basics include an initial handshake, an exchange of digital certificates, the use of public and private keys to validate identities through a challenge, and finally the set up of an agreed-upon key to be used with a symmetric cipher.
The certificates can be found at the given directory
The Key players and the terms are:
Certificate Authority or trusted third-party --The party which issues the Certificates.
Identity Object---Role that the BusinessWorks process assumes.
Following are the trusted SSL Certificate formats:
Following are the identity file formats:
§ Copy C:\tibco\jms\bin\tibjmsdssl.conf C:\tibco\jms\bin\tibjmsd.conf.
§ Tools->Trusted Certificates->Import into PEM format
§ Import “server_root.cert.pem” (CA), and “server.cert.pem” (Server Cert)
These are the basic concepts and configuration required for the SSL to be used in BW. Apart from these the
Administrator needs to be configured. If the HTTP is used than the browser also needs to have certificate.
What is LDAP?
Lightweight Directory Access Protocol(ldap) is a protocol for communication between LDAP servers and LDAP clients. LDAP servers store "directories" which are accessed by LDAP clients. LDAP communications happens at the default port 389. If we are using a secure SSL connection, the protocol will be "ldaps" on port 636. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.
The main benefit of using LDAP is that information for an entire organization can be consolidated into a central repository. For example, rather than managing user lists for each group within an organization, you can use LDAP as a central directory accessible from anywhere on the network and because LDAP supports Secure Sockets Layer (SSL) and Transport Layer Security (TLS), sensitive data can be protected from security threats.
LDAP servers store a hierarchical directory of information called LDAP Directory Information Tree(DIT). In LDAP, a fully-qualified name of a directory entry is called a DistinguishedName(DN). Each entry will have a set of attributes. Attributes are name and value pairs. Each entry in the DIT has a unique identifier. It is the Distinguished Name(DN). This consists of its Relative Distinguished Name (RDN) constructed from some attribute(s) in the entry, followed by the parent entry's DN. For example cn=James Smith, dc=example, dc=com
what is schema of LDAP?
The schema defines the attribute types that directory entries can contain. An attribute definition includes a syntax, and most non-binary values in LDAPv3 use UTF-8 string syntax. The schema defines object classes.
Each entry must have an objectClass attribute, containing named classes defined in the schema. The schema definition of the classes of an entry defines what kind of object the entry may represent - e.g. a person, organization or domain. Most schema elements have a name and a globally unique Object identifier (OID).
what is LDIF?
LDIF (Lightweight Directory Interchange Format) is an ASCII file format used to exchange data and enable the synchronization of that data between Lightweight Directory Access Protocol (LDAP) servers. LDIF files are simple text files and can be created and edited with any suitable text editor. Each line is terminated with EITHER
LDAP is extensible and can be used to store any type of data.Two common applications of LDAP are for computer user/group data, and for address book information (persons, departments etc). Many e-mail clients support LDAP lookups. Most interesting is that LDAP is being used as a core technology for most Single Sign On (SSO) implementations.