Use an Image
Utilizing the Oracle Tuxedo for OCI images, you can create Oracle Tuxedo domain
nodes in the Oracle Cloud Infrastructure compute instances, with the entitlement to use
Tuxedo software. The Oracle Tuxedo for OCI images contain the following two directories:
/u01/oraHome
: Tuxedo software is installed in this directory. It also includes other utilities such as Oracle JDK 1.8 andOPatch.
/u01/app/oraInventory
: Tuxedo inventory information is stored in this directory. Data files, installation logs, and Oracle home information are stored in it.
Follow these instructions to use the Oracle Tuxedo for OCI images:
- When you create an instance using an image, you must specify an SSH key. You require this SSH key to access the instance and launch it.
- You can connect to an instance using the SSH command as the
opc
user. - SSH Private key: The private key associated with the public key is used during provisioning. For example,
$ssh -I <private_key> opc@< ip_address>
- The user public key was provided during provisioning. Log in directly with the following command:
$ssh opc@< ip_address>
- When you have logged in as the OPC user, switch to the Oracle user by using the following command:
$sudo su - oracle
- Use the source command to load Tuxedo environment variables such as
TUXDIR
, andJAVA_HOME
from thetux.env
file, which is required to run Tuxedo.- Run the following command to load the Tuxedo environment variable:
source /u01/oraHome/<tuxedo version>/tux.env
- Run the following command to load the Tuxedo environment variable:
- Tuxedo supports TLS by default. It is optional to use LDAP. When using Oracle Wallet, LDAP is not required. A user is required to configure LDAP only if any of the following conditions are met.
- The use of legacy security credentials
- The local host must use a port other than 389 for LDAP
- There is no LDAP server running on localhost
- LDAP configuration: Use the
epifregedt
command to modify the registry. - Use the following 3 commands after initialization to modify the TLS LDAP information:
epifregedt -s -k SYSTEM/impl/security/BEA/key_management -a Params=privateKeyDir=file:///$TUXDIR/udataobj/security/keys
epifregedt -s -k SYSTEM/impl/security/BEA/certificate_validation -a Params=caCertificateFile=file:///$TUXDIR/udataobj/security/certs/trust_ca.cer -a Params=peerValidationRuleFile=file:///$TUXDIR/udataobj/security/certs/peer_val.rul
epifregedt -s -k SYSTEM/impl/security/BEA/certificate_lookup -a Params=userCertificateLdap=ldap://*LDAP_SERVICE_NAME*:*LDAP_PORTID* -a Params=ldapBaseObject=*LDAP_BASE_OBJECT* -a Params=filterFileLocation=file:///*LDAP_FILTER_FILE_LOCATION*
- On Unix, the Tuxedo registry is located at
$TUXDIR/udataobj/System.rdp
. Using the commandepifregedt -g
, you can print the current registry. The first command modifies the key management object to specify a particular private key directory. - If the ART Test Manager is available on your VM, please run the following command and instructions to reset the administrator password for Oracle® Tuxedo Application Rehosting Test Manager.
$ORA_HOME/art_tm12.2.2.0.0/config.sh
- Following links (if any) for creating a Tuxedo Domain: Using the Tuxedo Domains Component.
Parent topic: Create an Instance