This blog contains Oracle Database and RHEL and OEL support and troubleshoot documents. Most of them are copied from Oracle support Documents and references are mentioned.
Tuesday, April 17, 2018
After R12 Clone: XML reports are not completing
After make a clone of R12, the new instance gave “Completed, Warning” for all XML output requests the request log show the following:
oracle.apps.fnd.cp.opp.PostProcessorException:
oracle.apps.fnd.cp.opp.PostProcessorException: oracle.apps.xdo.XDOException: /ebiz/ebizapps/share/temp/xdoiZKMS2ITgq041618_20232583012.tmp
(No such file or directory)
Solution:
Navigate to Xml publisher Administrator and add the path
1. Navigation Path: /u01/vis/visapps/share/temp
(Responsibility) XML Publisher Administrator > (Menu) Home > (Tab) Administration > (SubTab) Configuration > Properties > General > Temporary directory
2. Provide a valid value to ‘Temporary directory’, and click button ‘Save’.
Type the following command as the root user to disable firewall for IPv4: # service iptables save # service iptables stop # chkconfig iptables off Sample outputs:
iptables: Flushing firewall rules: [ OK ]
iptables: Setting chains to policy ACCEPT: filter [ OK ]
iptables: Unloading modules: [ OK ]
Sample output with verification (see below):
Enable firewall
Type the following command as the root user to enable firewall for IPv4: # service iptables start # chkconfig iptables on Sample outputs:
iptables: Applying firewall rules: [ OK ]
Type the following command as the root user to disable firewall for IPv6 : # service ip6tables start # chkconfig ip6tables on
Verify that firewall is disabled
Type the following command as root user to see IPv4 firewall rules: # /sbin/iptables -L -v -n OR # service iptables status The following output indicates that firewall is not active:
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
(b) IPv6
Type the following command as the root user to disable firewall for IPv6 : # service ip6tables save # service ip6tables stop # chkconfig ip6tables off
Type the following command as root user to see IPv6 firewall rules: # /sbin/ip6tables -L -v -n OR # service ip6tables status