Just a couple of quick questions: Exactly which OS are you using? Is Apache listening on port 8080? Are you running a firewall? Is port 8080 open? Are you using SELinux? Are the correct contexts on the files in DocumentRoot set?
311 % grep DocumentRoot /local/tools/apache/conf/httpd.conf
# DocumentRoot: The directory out of which you will serve your
DocumentRoot "/local/tools/apache/htdocs"
# access content that does not live under the DocumentRoot.
312 % ls -l /local/tools/apache/htdocs/
total 4
-rw-r--r--. 1 weather weather 53 Jul 16 11:41 sample.html
If you don't get an answer immediately, wait! We are not "on call".
Why have you compiled apache from source? Certainly Redhat must have a package available for it! Compiling from source by hand may cause uncommon problems which we couldn't predict, depending on what configuration you chose.
Having SElinux enabled greatly complicates things. This problem may have nothing to do with your web server.
Do you see anything in /var/log/apache2/access_log ?
Akshay Hegde : Compiling is not an issue . I see all the http processes ,starting the webserver is also not an issue . But the page is not getting displayed. any inputs ?
---------- Post updated at 10:58 AM ---------- Previous update was at 10:57 AM ----------
I suspect this is SElinux doing its job, preventing users from running network daemons without the administrator's knowledge and approval. This is usually a useful function... An attacker can't just just dump in an IRC server or whatever to coordinate a botnet, even if they did manage to get in.
So you will likely need to ask your administrator to enable networking on that port for the daemon you installed without his knowledge.
Or, more likely, just get him to install an apache server properly.
---------- Post updated at 11:10 AM ---------- Previous update was at 11:08 AM ----------
Only problem when having root user to install webserver is everytime you want to update httpd.conf you need root user to update . Which is not feasible . So its always good to compile your own source code and edit the configuration as possible .
Things which don't require explicit permission in ordinary Linux, do in SElinux -- that is the entire point of having it. SElinux is "security-enhanced Linux". It adds many extra layers of checks and controls. Often we get people coming here having problems with ordinary programs in SElinux, the solution of which is to enable certain special SElinux options, permissions, or bug their administrator to do so. It's a completely different kettle of fish.
So it's entirely possible that you're not getting the access you need just because SElinux isn't configured to allow full access to rogue daemons which someone just happened to upload without Administrator oversight or approval.
Most distributions of apache organize it into sub-files, so you don't need to edit httpd.conf at all. File access permissions or a line in sudoers or whatever could easily be set up so you could edit any of those files yourself anyway.