Skip to main content

Removing IBM Websphere broker services on AIX, Linux, Solaris - Middleware News


Removing IBM Websphere broker services on AIX, Linux, Solaris

In some situations, you may want to remove broker services from a server where you install IBM® WebSphere® MQ and WebSphere Event Broker. Removing broker services involves deleting the queue manager, the configuration manager, the broker itself, and the database tables used for storing associated information.

Before you begin

There are several situations in which you may want to remove the broker services from a Linux® deployment; for example:
  • When you want to replace the WebSphere Event Broker configuration (possibly to use different ports for the listeners)
  • When you are uninstalling WebSphere MQ and WebSphere Event Broker, and you want to be sure you are leaving a clean configuration

Procedure

  1. Log on to the server hosting WebSphere MQ and WebSphere Event Broker as root.
  2. Remove the broker services as follows:
    1. Open the Message Broker Command Console..
    2. Navigate to the directory where you installed WebSphere Event Broker.
    3. Stop the message broker with the following command:
      su - mqsi -c "mqsistop broker_name"
      For example:
      su - mqsi -c "mqsistop BRKR_SCCS"
    4. Delete the message broker with the following command:
      mqsideletebroker broker_name
      For example:
      mqsideletebroker BRKR_SCCS
    5. Stop the configuration manager with the following command:
      su - mqsi -c "mqsistop config_manager_name"
      For example:
      su - mqsi -c "mqsistop CMGR_SCCS"
    6. Now delete the configuration manager with the following command:
      mqsideleteconfigmgr config_manager_name -n
      For example:
      mqsideleteconfigmgr CMGR_SCCS -n
      You will see a confirmation:
      BIP8071I: Successful command completion. 
      You can verify that the broker has been removed by ensuring that it no longer appears in the results when you run the following command:
      mqsilist
  3. Remove the queue manager as follows:
    1. Open a terminal and navigate to the root of the WebSphere MQ installation.
    1. Stop the queue manager with the following command:
      su - mqsi -c 
        "/opt/mqm/bin/endmqm queue_manager_name"
      For example,
      su - mqsi -c 
        "/opt/mqm/bin/endmqm sccs.queue.manager"
      You will see a confirmation message:
      Quiesce request accepted. 
      The queue manager will stop when all outstanding work is complete.
    2. Delete the queue manager with the following command:
      dltmqm queue_name
      For example:
      dltmqm sccs.queue.manager
      You will see a confirmation message:
      WebSphere MQ queue manager 'sccs.queue.manager' deleted.
  4. Still on the same server, remove the data source for WebSphere Event Broker as follows:
    1. Open the ODBC Tool by clicking Start > Programs > Administrative Tools > DataSources (ODBC).
    2. Click the System DSN - System Data Sources tab.
    3. Select the datasource that you created for WebSphere Event Broker, and then click Remove.
  5. On the IBM DB2® server, open a DB2 Command Window and drop the database that stores WebSphere Event Broker data.
    Note: Make sure the database is not in use; all users must be disconnected from the database before the database can be dropped.
    For example, if your database is called BRKRDB:
    DB2 DROP DATABASE BRKRDB

Comments

adsrerrapop

Popular posts from this blog

IBM Websphere MQ interview Questions Part 5

MQ Series: - It is an IBM web sphere product which is evolved in 1990’s. MQ series does transportation from one point to other. It is an EAI tool (Middle ware) VERSIONS:-5.0, 5.1, 5.3, 6.0, 7.0(new version). The currently using version is 6.2 Note: – MQ series supports more than 35+ operating systems. It is platform Independent. For every OS we have different MQ series software’s. But the functionality of MQ series Default path for installing MQ series is:- C: programfiles\BM\clipse\SDK30 C: programfiles\IBM\WebsphereMQ After installation it will create a group and user. Some middleware technologies are Tibco, SAP XI. MQ series deals with two things, they are OBJECTS, SERVICES. In OBJECTS we have • QUEUES • CHANNELS • PROCESS • AUTHENTICATION • QUERY MANAGER. In SERVICES we have LISTENERS. Objects: – objects are used to handle the transactions with the help of services. QUEUE MANAGER maintains all the objects and services. QUEUE: – it is a database structure ...

IBM Websphere MQ Reason code list / mq reason codes / websphere mq error codes / mq error messages

Reason code list ================= The following is a list of reason codes, in numeric order, providing detailed information to help you understand them, including: * An explanation of the circumstances that have caused the code to be raised * The associated completion code * Suggested programmer actions in response to the code * 0 (0000) (RC0): MQRC_NONE * 900 (0384) (RC900): MQRC_APPL_FIRST * 999 (03E7) (RC999): MQRC_APPL_LAST * 2001 (07D1) (RC2001): MQRC_ALIAS_BASE_Q_TYPE_ERROR * 2002 (07D2) (RC2002): MQRC_ALREADY_CONNECTED * 2003 (07D3) (RC2003): MQRC_BACKED_OUT * 2004 (07D4) (RC2004): MQRC_BUFFER_ERROR * 2005 (07D5) (RC2005): MQRC_BUFFER_LENGTH_ERROR * 2006 (07D6) (RC2006): MQRC_CHAR_ATTR_LENGTH_ERROR * 2007 (07D7) (RC2007): MQRC_CHAR_ATTRS_ERROR * 2008 (07D8) (RC2008): MQRC_CHAR_ATTRS_TOO_SHORT * 2009 (07D9) (RC2009): MQRC_CONNECTION_BROKEN * 2010 (07DA) (RC2010): MQRC_DATA_LENGTH_ERROR * 2011 (07DB) (RC2011): MQRC_DYNAMIC_Q_NAME_ERROR * 2012 (07DC) (RC201...

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News 1. Security Considerations IBM advises customers who are using SSL, that the most secure way to do this is to use recognized Certification Authorities to sign their certificates. Ensuring secure transfer of information is the main purpose of SSL. This integrity must be properly observed when setting up SSL. You should always be certain who has signed each of your SSL certificates, who has had and who continues to have access to them. The first secure way to generate certificates is to generate a certificate request, on each system or machine that uses SSL. This request has to be signed by an external Certification Authority before it can be used. Getting certificate requests signed by a CA is secure, because during the signing process at no point do any files contain the certificate's Private Keys. This principle is vital to SSL security. Signing certificates in this way is covered...