Professional Documents
Culture Documents
E8 Installation
E8 Installation
Contents
Ellipse 8 Installation Guide 2
Commercial In Confidence 4
Preface 5
Summary information 5
Confidentiality 5
Document Control 5
Who should use this guide? 5
How to use this guide 5
Purpose 5
Scope 5
Update Notes 5
Installation Definitions 6
Introduction 7
Appliance Networking Configuration and Setup 9
Ellipse 8 Appliance Networking Setup 10
Ehcache configuration 12
Database Preparation 13
Ellipse 8 database creation 13
Appliance Creation - Fresh install 14
Creating the Appliance Manager 14
Data Initialisation 18
Loading Cold Start Data (new customers) 18
To login an Ellipse instance with coldstart data 18
Secure Sockets Layer (SSL) Certificates 20
Create Ellipse 8 Environments 21
Install Ellipse 8 Environments 21
Access the Environment 22
Secure WebDAV Connectivity 24
GIT Customer Software Repository Override 25
AD Domain Administrator CRT distribution 25
Local Administrator CRT distribution 25
Map Network Drive 25
Monitor Installation of appliance and environments 27
Monitor appliance creation 27
Monitor Ellipse environment creation 27
Appendix 29
Creating an Oracle Ellipse Database 29
Database Parameter recommendations 30
Password issue 30
Fix for password expiry Oracle 11g 30
Workaround 30
Ellipse 8 VIP Tablespace 30
Creating a MS SQL Server Ellipse Database 31
Create Schema SQL 32
Ellipse support for Microsoft's SQL Server 2014 33
In SQL Server 33
Installation Information Collector 34
Virtualisation and Installation Check List Form 35
Commercial In Confidence
Copyright 2016 ABB
All Rights Reserved
Confidential and Proprietary
Legal Disclaimer
The product described in this documentation may be connected to, and/or communicate information and data via, a network
interface, which should be connected to a secure network. It is your sole responsibility to ensure a secure connection to the
network and to establish and maintain appropriate measures (such as but not limited to the installation of firewalls, application
of authentication measures, encryption of data, installation of antivirus programs, etc.) to protect the product, the network,
your systems, and the interface against any kind of security breach, unauthorised access, interference, intrusion, leakage,
damage, or corruption or theft of data. We are not liable for damages or losses related to any such security breach,
unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data.
Preface
The Ellipse 8 Installation Guide is part of the Ellipse Technical Documentation Library. This documentation library comprises a
number of guides that provide information for the implementation, administration, and operation of the Ellipse application in a
networked environment.
Summary information
Confidentiality
The contents of this document are confidential between ABB and its customers. The parties must keep the information herein
confidential at all times and not disclose it, or permit it to be disclosed, to any third party, apart from any of their officers,
employees, agents or advisers who have a specific need to access the information herein and have agreed to be bound by the
terms of confidentiality.
Document Control
Once the project is completed or terminated, this document will revert to an uncontrolled document status. No further advice
will be provided, and each recipient may either destroy the document or mark it as obsolete and retain it for future personal
reference.
All copies of this document will be issued electronically.
Purpose
This document is a guide to Technical Consultants involved with installing Ellipse 8.
Scope
This section indicates what is included and also what is not included in the document.
The following is in scope and covered in a section of this document.
• Creating a database
• Setting up a database
• Populating a database
• Maintaining and supporting the Ellipse environment.
Update Notes
Please refer to the Ellipse 'Update Notes' to check if there is information that applies to your release or upgrade
path. All Update Notes versions have a summary table that covers notes up to that release. Detailed information will only be
provided in a particular version. This version will be refered to in the Summary Table.
Installation Definitions
The following table introduces terminology needed to understand the Ellipse Installation.
Term Definition
Appliance The infrastructure that supports the VEAM, Monitoring Server the Central HTTP Server
IP address Internet Protocol address; a numerical label assigned to each device (for example: computer, printer)
participating in a computer network.
Scalable unit The scalable unit contains a pre-package environment that includes all the necessary components
required to set up and run Ellipse 8, excluding the database server.
Instance Example: Ellipse production
NIC Network Interface Controller
SAN Storage Array Network. SANs primarily are used to make storage devices (such as disk arrays)
accessible to servers.
Kickstart The Red Hat Kickstart installation method is used primarily (but not exclusively) by the Oracle Linux
operating system to automatically perform unattended operating system installation and configuration.
A Kickstart file contains a series of options, to be passed to the Anaconda installer that describes how to
set up the system. It may also include custom scripts to be run before or after the installation.
Oracle Linux (OL) An operating system based on Red Hat Enterprise Linux.
VEAM Ellipse Appliance Manager, the application for managing Ellipse Environments.
Ellipse 8 Operations guide Used to manage, maintain and support Ellipse 8 environments and application servers
Ellipse 8 Customisation and Outlines tools that support integration applications and customisations through API's
Personalisation Guide
The following figure outlines the key tasks linked to each of the activities.
Activity Comment
Prepare Prior to any Ellipse 8 installation onto the Ellipse 8 scalable unit there is the requirement to:
Note
ABB does not supply the OL distribution for Ellipse builds. This is a customers' responsibility. See the Architecture
Deployment guide.
Appliance Networking Configuration and Setup
The Ellipse 8 Appliance provides advanced network configuration options which enable the creation of clustered and
non-clustered production Appliance deployments. Customers can specify:
1. A network interface bonding configuration, enabling customers to take advantage of multiple physical network cards to
create redundancy in the network configuration of each Appliance
2. The corporate IP address (and other relevant information) of the Appliance host
3. Any private network address range to be used by the Appliance when creating virtual servers for environments
4. An appliance number for when an Appliance is required to operate as a member of a cluster of appliances
accommodating the same logical environment (eg. production environment spread over 3 physical Appliance hosts)
A brief description of the three key Appliance networking features follows:
Bonded Appliance Network Interfaces
Bonded networking enables customers to logically combine multiple physical ethernet ports on an Appliance to create a
single logical network interface. Customers do this to provide redundancy at the network configuration level of an
appliance. It is an important step to make an Appliance highly available.
From Ellipse 8.3.7 onwards, production appliances support dual bonded networks, representing a minimum of 4 physical
Ethernet interfaces in dual Ethernet bond configuration. The first bonded network is required to enable inbound traffic to
the host on its public IP address. The second network bond is required to enable cross appliance communications.
Bridged Appliance Networking
Bridged appliance networking is a configuration option that enables two or more Appliances to communicate with each
other. This feature works on the basis that link level (OSA level 2) networking, typically handled by switches and network
interface cards ensures that the private networks stood up and managed by each appliance are routable to/from each
other as long as they are part of the same VLAN. This VLAN should be private to the Appliances only for reasons of
security and isolation from from other similar private network ranges in use in the organisation.
Private Network Reservation
For Ellipse 8.3.6 and below, the private subnet range that the appliance utilised was fixed as 192.168.1.0/2, representing a
Class C network in networking parlance. This approach had the potential to be problematic because some customers may
have existing networks in the same range. To solve this problem, flexibility was added to enable customers to specify their
own private network. In practical terms, this translates to the IP address that must be used to login to a virtual server from
the host (as only the host can see servers in the private network).
The Appliance implementation of Bonding uses Bond Mode 6 (balance-alb). This bonding mode provides redundancy and load
balancing. This bond mode does not require any special switch port configuration.
Clustered, Production environment
1. Project managers can have systems when they want them and do not have to wait for networking teams, virtualisation
teams and other technical disciplines. Database issues are resolved with some basic up-front planning and preparation.
2. New environments can be created in under 30 mins instead of days or weeks.
3. Increased security because corporate systems are not directly accessible to users and other systems unless through
approved protocols.
Things to be aware of:
1. The Appliance firewall will prevent external users and/or applications from communicating directly with virtual servers
“inside” the appliance using non-HTTP protocols.
2. The Appliance virtual servers and associated applications rely on the Command and Control server to route HTTP traffic
based on the URL being requested by the client.
The history and future of Ellipse 8 Appliance networking (for reference purposes only)
• 2 cables total
• 2 interfaces cabled to switch ports mapped to the same VLAN
• Switch ports configured as "access" mode
• Clustered (eg. production)
• 4 cables total
• 2 interfaces cabled to switch ports on the same VLAN (routable within corporate network)
• 2 interfaces cabled switch ports on private VLAN (not routable within the corporate network)
• You should obtain console (local or remote) access to the server to ensure that you fix any errors/issues should the
network interface become unavailable.
2. General recommendations:
• The above physical cabling recommendations assume the specification of network bonding configuration during
Appliance installation. Network bonding is a an Appliance feature that enables customers to "bond" or join physical
network interfaces to create a single, redundant (high availability) network configuration.
• Customer should aim to split physical network interfaces for the private and corporate (public) networks between PCI
and onboard network interfaces for maximum redundancy.
• For clustered appliance configurations, customers will need to reserve an IP range, preferably class C, that is NOT
already in use by the customer to ensure no routing loops are created. If customers select a private network range
that conflicts with an existing range in use with the organisation, a situation can arise where packets originating
from the existing corporate network and delivered to the Appliance will be unable to leave the appliance because the
appliance itself will believe the packet is already in the right private network.
• It is important to understand that the private network range selected for use by the Appliance does NOT have to be
from the currently allocated and in-use corporate private network range. The private network range to be used by
the appliance can be ANY range in the list of ranges that the Internet Engineering Task Force (IETF) , through the
Internet Assigned Numbers Authority (IANA) has reserved for private networks, as published in RFC 1918. For
example, if in the customer organisation today they have servers on a 172.16.x.x range there is no requirement for
the Appliance to allocate IP address in this range. Any network range in the follow table will work as long as it is NOT
already in use somewhere within the organisation.
Largest CIDR
RFC1918 Number of Classful block (subnet Host id Mask
name IP address range addresses description mask) size bits
24-bit block 10.0.0.0 - 16,777,216 single class A 10.0.0.0/8 24 bits 8 bits
10.255.255.255 network (255.0.0.0)
20-bit block 172.16.0.0 - 1,048,576 16 contiguous class 172.16.0.0/12 20 bits 12 bits
172.31.255.255 B network (255.240.0.0)
16-bit block 192.168.0.0 - 65,536 256 contiguous 192.168.0.0/16 16 bits 16 bits
192.168.255.255 class C network (255.255.0.0)
Reference: http://en.wikipedia.org/wiki/Private_network
Ehcache configuration
Each application server in a given environment shares cache information with other application servers. To do this each
application server has a Cache Manager component that must be configured to communicate with other Cache Managers on a
"multicast" ip address and port common to each application server in the same environment whilst remaining unique across
different environments. Following re-installation via the Ellipse installation binary (DIY) or re-deployment via VEAM, the Ellipse
installation process will place a configuration file, named ehcache.xml on the filesystem.
The following (example only) table illustrates a typical multiple environment deployment and possible associated Ehcache
configuration multicast group IP and multicast port values to ensure successful operation:
Application
Create Environment servers per Multicast IP Multicast Example
order name environment Address Port Comment OK?
1 Development 2 (1 x online, 230.0.0.1 40001 Assume initial OK
environment so no
1 x batch)
conflicts
2 Test 2 (1 x online, 1 x 230.0.0.1 41001 Same IP as OK
batch) Development but
different port
3 Training 2 (1 x online, 1 x 230.0.0.2 40001 Different IP to OK
batch) Development and
Test
4 Sandbox 1 2 (1 x online, 1 x 230.0.0.2 40002 Same IP as Training OK
batch) but different port
5 Sandbox 3 (2 x online, 1 x 230.0.0.1 41001 Same IP as NOT OK
batch) Development and
Test AND same port
as Test
6 Production 7 (6 x online, 1 x 230.10.0.230 42001 Should never be OK
batch) using ABB supplied
defaults, IP and port
are unique
Note
1. The assignment of multicast group IP address and port are arbitrary within the range of addresses reserved for IP
multi-casting. This range includes the addresses from 224.0.0.0 to 239.255.255.255. Customers are advised to take
care to avoid assigning multicast IP addresses that conflict with the well known address registered with the Internet
Assigned Numbers Authority (IANA).
2. This manual procedure is a required step for VEAM customers until a new version which fully automates the process
has been released. In practical terms, this means customers should use VEAM to do the deployments and then they
will need to shutdown the app servers to perform the reconfiguration of ehcache.xml followed by a restart of the
application server.
3. ABB recommends changing the default multicast group IP address and or multicast port values that are provided in
the default ehcache.xml initially created by the installation process.
Database Preparation
Ellipse 8 supports Oracle 11g and 12c, SQL Server 2014 and Azure SQL databases.
Database product software installation and patching is assumed to be completed by the customer, directly or indirectly via an
appropriately skill person or organisation.
On completeion of the default Database product installation and associated feature enablement, customers are asked to follow
ABB provided instructions regarding the creation of the pre-requisite database roles, permissions, tablespaces and schemas to
enable the Appliance to create working application environments.
Initial installation of an Ellipse Appliance does not have any interaction with any external Database product therefore no
Database environment is required at the time of Appliance installation. Databases schemas for Ellipse, Ellipse Datamarts,
Integration Platform are only required at the time of Ellipse environment creation.
Note
The Documentation is included on the DVD.
Note
Please ask the local system administrator for assistance when following these steps on the customer's hardware. Due to
manufacturer's different implementations, these steps will vary.
Steps
1. Gather the connectivity information required for creating the Appliance Manager.
Parameter How / why used Example values
Appliance host IMM/RAC Access to remote IMM / remote admin 172.17.120.129
IP address console
RAC login credentials Required for IMM/RAC access user=root, password=admin
Appliance number Unique identifier for each mewmber host.network.appliance.number=2 (default is 1)
of Appliance cluster.
Appliance fully qualified Provide an absolute fully qualified host.fqdn=dev.company.com
domain name domain name
Appliance host IP address IP address to assign to the Appliance host.network.ipaddress=198.168.1.15
Appliance netmask Subnet mask associated with the host.network.netmask=255.255.255.0
Appliance host network
Appliance default Default gateway asspociated with the host.network.gateway=10.20.30.254
gateway Appliance
Appliance network device Override for the default ethernet host.network.device=eth1
device (eth0)
Appliance Interface Use if bonding multiple physical host.network.bond.member.0=eth0
bonding devices host.network.bond.member.1=eth1
DNS server Numbered list of existing corporate host.network.nameserver.1=10.20.30.1
DNS servers that the Appliance shall host.network.nameserver.2=10.20.40.1
forward DNS requests it can't resolve.
DNS search path Name resolution for unqualified host.network.searchpath=corp.com east.corp.com
hostnames (host only) west.corp.coM south.corp.com
NTP server address Ensure Appliance and Guests clocks host.network.ntp.server.1=ntp1.corp.company.com
are kept in sync
Guest network subnet Class B address range to use for the guest.network.subnet=172.17.0.0
guest network
Guest network shared Determine whether guest network is guest.network.shared=true (default is false)
to shared with other Appliances.
Guest network device Specify which host device should be guest.network.device=eth1 (default is eth1)
used to connect Appliance guest
networks in the case of a cluster.
Guest network bonding Numbered list of host devices to bond guest.network.bond.member.1=eth1
together to form single logical "bond" guest.network.bond.member.2=eth3
device
Note
There can be an issue with the Intel network card not being detected by OL – hardware impacted IBM x3650 M4 (and
potentially other IBM M4 Series servers).
While the hardware supports PCIe GEN3 I/O cards, some GEN1 and GEN2 I/O cards are not recognised. For this reason there
may be a requirement to change the PCI speed selection for certain slots from GEN3 to GEN2.
Note 2 - The Network Time Protocol is based on a "consensus" model rather than the usual active/backup model. An NTP
client talks to all of its configured servers so is inherently high availability given enough servers. It derives the time from
the servers who's times are in agreement. It is recommended to configure at least 4 NTP servers to allow for one to fail and
another to give an inaccurate time value. For systems that provide a sub-optimal number of NTP servers, the Oracle
Enterprise Linux NTP client can be configured to ignore inconsistencies between servers and use the time from one server
in preference.
For an Appliance, this can be configured in appliance.properties by appending "true" after the preferred NTP server
hostname:
2. A "wildcard" DNS entry needs to be created for each Appliance in the corporate DNS server. This allows dynamic
resolution of environment resources without requiring further DNS changes for each environment creation/change.
This can be achieved by creating a "domain" entry for the Appliance server (that is a domain called <appliance server
name>.<domain>) instead of an 'A resource record' and configure the default (*) resolution to the IP address of the
appliance server.
Note
This step does not prevent the installation of the appliance from completing. It will only prevent access to the
Command and Control server (cmdctl) and any environments that may have been created.
3. Update the kickstart.ks and application.properities configuration files on the USB drive.
a. Connect the USB to a machine and browse to '\ventyx\' (for example if the USB comes up as drive F, then
F:\ventyx\).
b. Edit the Appliance properties file '\ventyx\appliance.properties' and modify according to the Ellipse Appliance
installation parameters gathered, using the instructions and guidelines provided in the file to help:
Note
For Oracle's Sun Server X4-2 systems, additional installation parameters are provided that may help:
c. Edit the kickstart timezone.ks file '\ventyx\timezone.ks' and modify according to the information gathered, as
per the instructions and tokens indicated, then save the file
Note
Consider removing the '--utc' flag from the desired timezone statement, if you do not intend to set the Hardware
clock to UTC timezone. Setting the Hardware clock to the local timezone, and keeping the '--utc' flag set at the
same time, will cause Linux to add (or subtract) an offset to the current operating system time, resulting in
incorrect timestamps being displayed in various logs.
4. Attach the Appliance USB drive and load the Oracle Linux DVD into the DVD drive of the physical server. The DVD should
be left in the drive until the appliance build is copmleted.
5. Using an Internet browser, navigate to the URL os the host's Remote Access Console (RAC), also known as:
Note
Only core packages to the OS and additional package dependencies are installed.
b. After the operating system (OS) install, cloud infrastructure is copied to the local disk.
c. The automated install will complete and system will reboot.
d. The host boots the OS on the local disk array (previously booted from the USB).
e. The Appliance is built following the first boot.
f. The command and control will be configured and takes 20-30 minutes. It will provide:
Note
To check on progress during the installation refer to “Monitor Installation of appliance and environments”. If this
process fails as a result of the DVD not being available rebuild the Appliance again.
14. For a list of all services running - http://[fully qualified hostname]. No credentials are required.
For example: http://cloud.company.com displays the list of all services running on the server
Versions from 8.3.11 display a window containing the Configuration and Monitoring Menu items. Go to the next step for
earlier versions.
15. Confirm the Appliance Manager is running http://cmdctl.[fully qualified hostname]/veam/ No credentials are
required.
For example: http://cmdctl.cloud.company.com/veam/ links to the Ellipse Appliance Manager
16. Confirm the Monitoring application is running http://monitor.[fully qualified hostname] The credentials are
ventyx/ventyx
Note
The full installation of operating system through to standing up the Appliance Manager, Monitoring and Apache HTTP server
can take from 1 to 3 hours depending on the hardware performance.
Note
Please refer to Operations > Site, Environments and the VEAM > Troubleshooting to check for installation troubleshooting
information.
Data Initialisation
The following choices cover initialising the data within the system:
1. The ABB supplied Cold Start Data is loaded as part of the installation. This is typically used for new customers or creation
of a new environment
2. The Ellipse 8 data is converted to the current Ellipse 8 version as part of the installation. Customers should back their
database up prior to installing the new version of Ellipse.
3. Convert from a pre Ellipse 8 release. Customers should consult the Operations guide - Ellipse Legacy Data Conversion, for
converting data from these releases.
Note
Core data, security data and GIS data is loaded automatically nto the database as part of each and every installation of
Ellipse. Change from one version to another is handled automatically by Ellipse.
Refer to the Operations Guide (Part 4 Load Core Data) for information about re-running the core data load in situations where a
problems has led to the core data not being loaded.
Note
By default the installation either performs an Ellipse 8 data conversion, or loads the coldstart data when the database is
empty.
Note
You must use a wildcard SSL certificate, of the format "*.applianceHostname.domain", for example
"*.appliance01.acme.com".
• Signed Server Certificate - The signed certificate returned to you from the CA in response to your CSR.
• Server Private Key - The key used to generate the CSR.
• CA Intermediate Certificate Chain - (Optional: only if required by your CA)
If you leave these fields blank then the default set is used. These certificates are site-wide, that is they are used across all
environments.
Important
The Server Private Key MUST be generated WITHOUT a password, ensuring that HTTPD avoids prompting for a password at
the time it loads. If you do not remove the password then the HTTP server and VEAM will not start!
For information on how to remove the key, see Step 3 of: http://www.akadia.com/services/ssh_test_certificate.html
Important
If you input the Signed Server Certificate, you MUST input the Server Private Key that accompanies it at the same time! If
you do not, then the HTTP server and VEAM will not start!
To access an environment through HTTP, use the URL on the VEAM splash page.
To access an environment through HTTPS, use the "SECURE" URL on the VEAM splash page.
Create Ellipse 8 Environments
The installation of the Ellipse 8 environments is performed through the Ellipse Appliance Manager. It provides the ability to:
HTTP Server Alias is a site level property. As such, changes to the HTTP Server Alias Domain will be inherited as a default into
all furture environment deploys. Changes to the HTT Server Alias Domain will not impact exsiting environments until they are
redeployed.
3. Move to the "Environments" tab and click on the Add button to display the Add Environment window
4. Complete the fields:
a. Version
b. Type (ensure you select the appropriate type of environment)
c. Name
d. Description
e. Long Description
5. Click on the save button within the Add Environment window to save the selection to the Environments grid
6. Click on the environment that has been created to display information in the Properties table
7. Go to the Properties table and complete the properties for the Application Servers listed. Expand the entries if necessary.
Environment Defaults
Note
For instructions on this application refer to the Ellipse 8 Operations Guide, Using the Appliance Manager
To check on progress during the installation refer to "Monitoring Appliance Instiliasation and Environment Creation".
1. Ellipse
For example:
http://ellipse-dev.cloud.company.com/ria/ui.html
2. VIP
For example:
http://vip-dev.cloud.company.com/vip
Credentials admin/Admin0
Note
[name] refers to step 4c of “Install Ellipse 8 Environments” above.
Note
Please refer to Operations > Site, Environments and the VEAM > Troubleshooting to check for installation troubleshooting
information.
Secure WebDAV Connectivity
As part of the environment creation using the Appliance Manager (VEAM), a secure WebDAV filestore for Ellipse Interfaces is
published.
In order to securely connect to the Environment Interfaces WebDAV, the Certification Authority (CA) used to generate the SSL
Certificate (CRT) needs to be distributed to each client's Trusted Root Certification Authorities certificate store.
The default WebDAV CA of a VEAM managed Environment is at the following Command & Control server filesystem locaton:
/etc/pki/CA/private/[fully qualified hostname].crt
This task can either be done the preferred method by an Active Directory (AD) Domain Admistrator using Group Policy or by
each client user who is a Local Administrator.
GIT Customer Software Repository Override
The Ellipse Appliance provides its own Git server, as an initial deployment option and to ensure that out of the box, Ellipse
Appliances are ready for customer developed software to be introduced to Ellipse environments that might be deployed.
A downside to this approach is that unless configured to do otherwise, each Appliance Git service stores its repositories locally,
that is, on its local filesystem. If the Appliance was to become unrecoverable for any reson, it could result in loss of
customer-software (if it was never backed up). Git is a distributed version control system and so it is possible , even likely, that
one or a number of developers or system administrators may have a recent enough copy of the repository however this
approach is hardly a planned and reliabel approach.
With these limits in mind, some customers choose to change the customer-software deployment model slightly by externalising
their customer-software repository away from the Appliance to a Git service managed by the customer or by a third party,
often in the cloud. GitHub (www.github.com) is a good example of a cloud based Git service.
Through appliance.properties, customers are provided with the option to override the standard GIT customer-software
repository with git service URL external to the Appliance. The Git Service identified must of course have network connectivity to
each Appliance(s). This effectively giving provides a central location rom which software components can be pushed out to all
guests defined on all Appliances and / or to other appliances.
2. If trusted authentication is required (when using ssh-based protocols, git for example), retrieve the locally generated ssh
public key and upload it to the server. This key can be found at the following location on the appliance
/appliance/data/conf/keys/appliance/key.pub
3. Upon detection of a git customer override in appliance.properties, appliance(s) and guests will automatically clone and
refresh the repository at
/appliance/data/conf/git-repos/customer-software
Using the Sample Environment information the WebDAV URL follows, when prompted supply AD user credentials.
https://interfaces-development.cloud.corp.tld
Successful connectivity can be confirmed if the browser does not report any Certificate warnings. When prompted, supply the
AD credentials relevant to the Environment configuration.
To test read/write access to the Interface WebDAV, map a network drive using Windows Explorer or equivalent WebDAV
compatible utility.
1. ssh into the hostname, using the hostname you provided in the appliance.properties file For example >ssh
cloud.company.com The credentials are root/ventyx
2. Tail the log to display installation activity and any evidence of issues such as error and failure messages. If this occurs
review the log for details and contact ABB for support assistance. For example: >tail –f /var/log/messages
When the console screen changes to the login prompt it is possible to login as oneadmin.
Steps:
1. ssh into the hostname, using the hostname you provided in the appliance.properties file
For example >ssh cloud.company.com
The credentials are root/ventyx
2. Switch to the oneadmin user, and using the commands listed in the table check on the status of the first environment
Command Comment
onehost list List the host name when it is up (value = on)
onevnet list Indicates if the virtual network is running
oneimage list Lists the image used for the installation when it is installed
onevm list Lists the VM name for the appliance and monitoring server once it is up (value = running)
Note
The onvevm list command can also be used when an environment is being created and will indicate which VM's have been
created at the time the command is run.
Once the VM has a status of running (and has CPU and Memory allocated) you should be able to log into it.
Steps:
1. ssh into the hostname, using the hostname you provided in the appliance.properties file
For example >ssh cloud.company.com
The credentials are root/ventyx
2. Log into the server - ssh cmdctl.ventyxinternal. The credentials are root/ventyx.
3. Tail the logs to display installation activity and any evidence of issues such as error and failure messages. If this occurs
review the log for details and contact ABB for support assistance.
For example >tail –f /var/log/messages
1. SSH into the hostname, using the hostname you provided in the appliance.properties file
For example >ssh cloud.company.com The credentials are root/ventyx
2. Switch to the oneadmin user (su – oneadmin) and run the onevm command (see above for further details).
3. Once the VM has a status of running (and has CPU and Memory allocated) you should be able to log into it
4. From a root session on the host ssh to the relevant VM for example > ssh ellipse01.dev.ventyxinternal
Each server uses the naming convention [application server name].[name].internal
For example ellipse01.dev.ventyxinternal
[application server name] is the first part of Name shown in the onevm command
[name] is the name you gave the environment (refer to step 4c of Install Ellipse 8 Environments)
Note
The application servers are only accessible from the host.
5. Tail the log to display installation activity and any evidence of issues such as error and failure messages. If this occurs
review the log for details and contact ABB for support assistance.
For example: >tail –f /var/log/messages
6. Also check the following logs for Ellipse and Batch VMs
• select on dba_pending_transactions
• select on v$xatrans$
• select on pending_trans$
• select on dba_2pc_pending
• execute on dbms_system
A schema for the Ellipse data must be created as follows:
• Tablespaces:
• CREATE SESSION
• CREATE TABLE
• CREATE VIEW
• CREATE SEQUENCE
• CREATE PROCEDURE
• XAUSERS (Role)
The following are set of permission grants for database system objects that required by a standard user to query performance
statistics tables and views.
Note
These grants will allow an administrator to run an Oracle performance data capture without DBA involvement. The capture
will be supplied as a Groovy script to run at command line when batch is not available, or as an Ellipse batch job.
Assumptions:
• A server has been configured running Oracle Database with either of the following supported versions:
Note
It is a requirement that the schema and tablespace names match the defined names of 'ellipse' for the schema, and
'ELLIPSE_TAB' and 'ELLIPSE_IDX' for the tablespaces.
Password issue
Profiles in Oracle are a means to limit the resources available to a user. The Oracle profile parameter PASSWORD_LIFE_TIME
determines the maximum period a password is valid.
Note
The value of PASSWORD_LIFE_TIME parameter for the default Oracle profile has being reduced from unlimited in Oracle 10g
to 180 days in Oracle 11g.
All database logins created with the default Oracle 11g profile will expire after 180 days (6 months) and upon expiry, access to
the database using this login(s) will cease. The password must then be reset by the Database Administrator.
Workaround
The following commands can be run using the Oracle SQL*Plus utility or similar interfaces.
To display the current user expiry date
Profile created.
User altered.
• Tablespaces:
• CREATE SESSION
• CREATE TABLE
• CREATE VIEW
• CREATE SEQUENCE
• CREATE PROCEDURE
• XAUSERS (Role)
Assumptions:
• A server has been configured running Oracle Database with either of the following supported versions:
• Tablespaces:
• CREATE SESSION
• CREATE TABLE
• CREATE VIEW
• CREATE SEQUENCE
• CREATE PROCEDURE
• XAUSERS (Role)
where:
<schema_user> is the name of the schema / user required to "connect" to the DB via standard J2EE JDBC connections
<schema_pwd> is the password associated with the <schema_user>
The following are set of permission grants for database system objects that required by a standard user to query performance
statistics tables and views.
Note
These grants will allow an administrator to run an Oracle performance data capture without DBA involvement. The capture
will be supplied as a Groovy script to run at command line when batch is not available, or as an Ellipse batch job.
Note
It is a requirement that the schema and tablespace names match the defined names of 'ellipse' for the schema, and
'ELLIPSE_TAB' and 'ELLIPSE_IDX' for the tablespaces.
Note
This relies on a database having been created.
CREATE SMALLFILE
TABLESPACE "ELLIPSE_IDX"
LOGGING
DATAFILE '/oracle/oradata/btcxst/ellipse_idx_01.dbf' SIZE 4096M REUSE AUTOEXTEND
ON NEXT 100M MAXSIZE 32767M EXTENT MANAGEMENT LOCAL UNIFORM
SIZE 128K SEGMENT SPACE MANAGEMENT AUTO;
CREATE SMALLFILE
TABLESPACE "ELLIPSE_TAB"
LOGGING
DATAFILE '/oracle/oradata/btcxst/ellipse_tab_01.dbf' SIZE 4096M REUSE AUTOEXTEND
ON NEXT 100M MAXSIZE 32767M EXTENT MANAGEMENT LOCAL UNIFORM
SIZE 128K SEGMENT SPACE MANAGEMENT AUTO;
In SQL Server
USE [master]
GO
CREATE DATABASE [elltst]
ON PRIMARY (NAME = N'elltst',
FILENAME = N'C:\Program Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL\DATA\elltst01.mdf',
SIZE = 30GB, MAXSIZE = UNLIMITED, FILEGROWTH = 1GB)
LOG ON (NAME = N'elltst_log',
FILENAME = N'C:\Program Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL\DATA\elltst01_log.ldf',
SIZE = 5GB, MAXSIZE = 2048GB, FILEGROWTH = 10%)
COLLATE SQL_Latin1_General_CP1_CI_AS
GO
CREATE LOGIN [elltst] WITH PASSWORD=N'example_password', DEFAULT_DATABASE=[elltst], DEFAULT_LANGUAGE=[us_english], CHECK_EXPIRATION=OFF, CHECK_POLICY=OFF
GO
USE [elltst]
GO
CREATE USER [elltst] FOR LOGIN [elltst] WITH DEFAULT_SCHEMA=[elltst]
EXEC sp_addrolemember 'db_owner', 'elltst'
GO
For more detail on creating a database in SQL Server 2014 by using SQL Server Management Studio or Transact-SQL. go to
https://msdn.microsoft.com/en-au/library/ms186312(v=sql.120).aspx
Installation Information Collector
Consultants should collect information for each environment and project by printing off the Virtualisation and Installation Check
List Form following. A copy of these pages will be required for each environment in each project.
You are asked to complete the administrative aspects of the sheet as well as the installation related information.
This information covers:
• Virtualisation activities
• Installation activities
Virtualisation and Installation Check List Form
Virtualisation Name: _____________________ Project: ____________________
Environment: _____________________ Customer: ____________________