12/28/2023 0 Comments Keystore explorer github![]() ![]() For Iroha support, please switch to iroha-integration branch and read this README for instructions on how to use it. Update! Hyperledger Explorer now can be used with Hyperledger Iroha. Users can configure and build Hyperledger Explorer on macOS and Ubuntu. Hyperledger Explorer is a simple, powerful, easy-to-use, well-maintained, open-source utility to browse activity on the underlying blockchain network. If you wish to contribute, please reach out to the TSC mailing list ![]() If you are interested in continuing development of this code, please consider submitting a PR at and sending and email to See more details about project proposals at: Although Hyperledger Explorer is not currently being developed or maintained, the code is still available under an open source license so you would be welcome to reactivate this project. #cat $_scriptPath/certificateExpireWarning.txt $_scriptPath/certificateSummary.Hyperledger Explorer has been moved to End of Life status by the original project maintainers. #Comment out if you want to send as WARNING email. (>&2 echo "$(cat $_scriptPath/certificateExpireWarning.txt)") (>&2 echo "!!! Check expired certificates !!!") _lcCEW=$(cat $_scriptPath/certificateExpireWarning.txt | wc -l) Printf " => $_alias > $_scriptPath/certificateExpireWarning.txt #printf " => $_alias $_alias > $_scriptPath/certificateSummary.txt _lc=$(cat $_scriptPath/certificateStatus.txt | wc -l)įor (( c=1 c $_alias $_alias > $_scriptPath/certificateSummary.txta _threshold=$(($_currentDate + ($_thresholdDay*24*60*60)))Įcho -n > $_scriptPath/certificateStatus.txtĮcho -n > $_scriptPath/certificateExpireWarning.txtĮcho -n > $_scriptPath/certificateSummary.txtįor i in $($_keytool -list -v -keystore $_keystore -storepass $_keystorepass | grep 'Alias name:' | perl -ne 'if(/name: (.*?)\n/) ') > $_scriptPath/certificateStatus.txt #Author: M.Fevzi Korkutata | Last day of 2017 (New year PARTY script) (Copy/Download the script from Github because the shell script source file is well formated at there) I am also adding the entire script as below. Regards!) –> Sharing is just caring Fevzi Korkutata Source Code (Script and sample output file):Īll the project source and sample output files are available in the Github monitorJKSforWebLogic project. (Please share the screencast with other Oracle FMW WebLogic Community. Youtube Screencast Tutorial: Monitoring Certificate Expiry Date of JKS Especially about WebLogic cron job integrations and definitions. If you already read this technical blog post please also watch the entire technical screencast it will inspire you about your PRODUCTION environment monitoring cases. I have did some tricks for executing my shell script properly for macOS environment (If you are interested knock my door). The date function/command is different in MacOS (Sierra) than Linux. I’ve recorded the entire video on my iMac. I have also prepared a Youtube tutorial/screencast about monitoring JKS entries. I have finished the documentation part and reading part. Edit environment variables according to your server and WebLogic installation paths. Download monitorJKS folder and upload to your server (Do it at the end, firstly read the whole tutorial)Ģ. Step by Step Script Usage and Integration via Server CRON Job:ġ. Go to my GitHub project page to download entire project. I’ll explain two method for doing this JKS certificate monitoring in WebLogic.Īt the end of post I’ll put download link of the script and you can download it. Then decided to write a new one from scratch to iterate all JKS aliases in the JKS file. I have found some other scripts available but all of them based on JKS alias entries. There are too many alternatives to do that. Monitoring Certificate Expiry Dates of a JAVA Keystore (.JKS) File in a WebLogic Domain (Shell Script, Scheduling, Alerting) How to monitor imported certificates (CRT, CER) expiry / expiration date in a JKS (Java Keystore) file and create remaining day alerts/notifications? Especially, if you are working with OSB (Oracle Service Bus) and SOA Suite 11g/12c WebLogic domains it is very crucial to monitor imported JKS certificate entries. So, a proactive administrator should monitor these certificates and should warn the 3rd party end point URL’s administrator or update/import the certificate with the new one before the failure. If an imported certificate entry expires in a JKS (Java Keystore File) then the HTTPS transactions is going to fail because of SSL handshake exception/failure. One of my client asked me how to monitor expiry dates of JKS certificate entries in a WebLogic domain.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |