-Dcom.sun.management.jmxremote.port=<host_port>
-Dcom.sun.management.jmxremote.authenticate=false
-Dcom.sun.management.jmxremote.ssl=false
-Djava.rmi.server.hostname=<host_ip>
--
You received this message because you are subscribed to the Google Groups "Payara Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to payara-forum+unsubscribe@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/payara-forum/e7d88828-a2ce-43ca-87af-1755ee7a4d7a%40googlegroups.com.
Benjamin E NduggaRegards,I will try to access the JMX remotely with the steps shared in previous mail and see how it goes.Hi Ondrej,Thank you soo much, I actually used MobaXterm client tool that allowed me to access console based programs like JConsole. I can now access the JMX instance locally.On 6 September 2017 at 17:47, Ondrej Mihályi <ondrej....@gmail.com> wrote:You don't need to use any system property. In fact, you should avoid using the com.sun.management and java.rmi.server properties, which will most probably start a separate JMX server in parallel to the server started by Payara Server itself.You can configure the JMX server in Payara Server in Admin console, int the server-config -> Admin Service page.If you try to connect to JMX locally, it always works. You just need to supply admin user and password - the same you use to access the admin console.But if you access JMX remotely, it has to be secured by a SSL certificate. You can do this by turning on Security in the JMX Connector tab in the Admin console, and then in the SSL tab you have to select the certificate by its nickname (the default certificate is s1as). However, you have to use the same certificate on the client, which is a bit tricky. Have a look at Oracle docs: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html#gdevoIn short, you have to pass the Payara Server keystore file, which is by default in domain/config/keystore.jks,to the JConsole on command line, like this:jconsole -J-Djavax.net.ssl.trustStore=domain/config/keystore.jks -J-Djavax.net.ssl.trustStorePassword=changeitThe second argument the password used to open the keystore, which is Payara Server master password, by default "changeit". Fr more info about securing Payara Server with certificates, look at this blog post: http://blog.payara.fish/securing-payara-server-with-custom-ssl-certificateOndro2017-09-06 12:05 GMT+02:00 Benjamin E.Ndugga <bjnd...@gmail.com>:Benjamin E NduggaRegards,Hi Ondrej,Do you know which parameters I can use to specify the username and password?On 6 September 2017 at 13:01, Ondrej Mihályi <ondrej....@gmail.com> wrote:Hi Benjamin,If I'm not mistaken, JMX works remotely only if secured via authentication. If no authentication is required, then it's available only locally for security reasons.Ondro
--
You received this message because you are subscribed to the Google Groups "Payara Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to payara-forum+unsubscribe@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/payara-forum/e3c2a5ae-afd4-4816-aad5-4595a2069290%40googlegroups.com.
1 2 3 4 5 | -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=<jmx_remote_port, in my case I used 38686> -Dcom.sun.management.jmxremote.local.only=false -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false |