5 Performing Post-deployment Tasks
This chapter describes the tasks you perform after deploying AIA cloud native.
Installing SSL Certificates
Note:
This procedure automates the process of importing certificates to kss-based keystore. If you wish to use jks-based keystore, set it up manually.- Create keystore credentials by running the following commands:
Note:
Ensure that certificates are available in the $AIA_DIR/oc-cn-aia-comms/helm-charts/aia-comms-chart/charts/aia-comms-certs/certificates directory and that proper management policies are used to store the private keys.cd $AIA_DIR/oc-cn-aia-comms/scripts/ ./create-keystore-secret.sh -h usage: ./create-keystore-secret.sh -k keystore -c custTrust -i custIdentity [-d domainUID] [-n namespace] [-h] -k pasword for KeyStore, must be specified. -c password for Cust Trust, must be specified. -i password for Cust Identity , must be specified. -d domainUID, optional. The default value is soainfra. If specified, the secret will be labeled with the domainUID unless the given value is an empty string. -n namespace, optional. Use the soans namespace if not specified -h Help
- Run the following command, which creates Kubernetes
secret:
kubectl -n soa_namespace create secret generic secret_name --from-file=certificates
- Update values in the following files:
- oc-cn-aia-comms/helm-charts/aia-comms-chart/values.yaml
- oc-cn-aia-comms/helm-charts/aia-comms-chart/charts/aia-comms-certs/values.yaml
- name: The Keystore name on which the operation is to be performed. For example, custTrust or CustIdentity.
- identityKeyStoreName: The Keystore name of the Identity Keystore. For example, custIdentity.
- trustKeyStoreName: The Keystore name of Custom Trust Keystore. For example, custTrust.
- type: The type of the certificate which is to be imported, updated, and deleted. For example, TrustedCertificate.
- For each Siebel certificate and OSM certificate to be
imported, specify the following:
- fileName: The certificate filename which is to be imported. This should be available in the aia-comms-chart/charts/aia-comms-certs/certificates directory.
- alias: The alias name.
- operation: The supported operation types are: import , delete , and update. Leave this value empty or commented in case no operation is required to be performed on either OSM certificate or Siebel certificate.
Note:
The helm chart execution supports adding, updating, and deleting the certificate. The mandatory fields are:- import: alias, fileName, operation
- delete: alias, operation
- update: alias, fileName (the file name of the new certificate to be updated), operation
- After the aia-comms-ssl-certificate-job completes, restart
the domain to import, update, or delete the OSM certificate, Siebel certificate,
or both certificates as specified in the values.yaml file of the
chart.
cd $AIA_DIR/oc-cn-aia-comms/helm-charts helm install aia-comms-certs-osm \ aia-comms-chart/charts/aia-comms-certs/ \ --namespace namespace \ --values ./aia-comms-chart/values.yaml # Restart domain
Integrating Applications with AIA Cloud Native
- Siebel CRM Cloud Native 23.03
- Billing and Revenue Management (BRM) Cloud Native 12 Patch Set 8
- Order and Service Management Cloud Native 7.4.1 Patch 10
Note:
Before proceeding with integrating these applications, ensure that all web user interfaces of these applications are available for integration.Integrating Siebel Cloud Native
This section provides instructions for integrating Siebel cloud native with AIA cloud native.
- Get the following JAR files:
- From Siebel containers, get siebel.jar and SiebelJI_enu.jar.
- From the WebLogic container, get wlthint3client.jar.
- Log in to Siebel eCommunication Web UI as SADMIN user and update the JAVA64
profile parameters to include the three JAR files:
Note:
Ensure that the path /sfs/aiacn/jms is a persistent store so that the files are retained after the pod restarts./sfs/aiacn/jms:/sfs/aiacn/jms/Siebel.jar:/sfs/aiacn/jms/SiebelJI_enu.jar:/sfs/aiacn/jms/wlthint3client.jar:.
- Relocate the JAR files:
- Connect to the Siebel SES pod.
- Create a folder with the same name as what is listed in step 2 (/sfs/aiacn/jms), where /sfs is a shared persistent folder, and then copy the 3 JAR files into the folder.
- In the same folder, create the jndi.properties file and copy the
following text into it:
Note:
Ensure that the AIACN t3 channel URL and user name and password are set with the correct values.java.naming.factory.initial=weblogic.jndi.WLInitialContextFactory java.naming.provider.url=t3://soa_cluster_service_name.soa_namespace.svc.cluster.local:soa_service_cluster_port java.naming.security.principal=soa_console_username java.naming.security.credentials=soa_console_password
- Copy the three JAR files into the Apache TOMCAT /siebel/mde/applicationcontainer/lib folder.
- Restart Apache TOMCAT server inside Siebel SES pod.
- Configure Siebel Web Service in Siebel DB.
- Create the "update_siebel_ws.sql" SQL script with the following
content:
UPDATE S_WS_PORT SET PORT_ADDRESS='jms://jms/aia/AIA_SALESORDERJMSQUEUE@jms/aia/COMMS_SUBMITORDER_CONSUMER', PORT_TRANSPORT='JMS' WHERE NAME='SWISubmitOrderPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='jms://jms/aia/AIA_SALESORDERJMSQUEUE@jms/aia/COMMS_SUBMITORDER_CONSUMER', PORT_TRANSPORT='JMS' WHERE NAME='SWISubmitOrder_o2cPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='jms://jms/aia/AIA_SALESORDERJMSQUEUE@jms/aia/COMMS_SUBMITORDER_CONSUMER', PORT_TRANSPORT='JMS' WHERE NAME='SWISubmitQuote_o2cPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='jms://jms/aia/AIA_SPECIALRATINGJMSQ@jms/aia/COMMS_SPECIALRATINGLIST_CONSUMER', PORT_TRANSPORT='JMS' WHERE NAME='SWISpecialRatingListPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='jms://jms/aia/AIA_CMUREQADJIOJMSQUEUE@jms/aia/COMMS_ADJUSTMENT_CONSUMER', PORT_TRANSPORT='JMS' WHERE NAME='SWICreateAdjustmentPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/AccountBalanceSiebelCommsReqABCS/AccountBalanceSiebelCommsReqABCS_ep' WHERE NAME='_soap_AccountBalanceSiebelCommsReqABCS_AccountBalanceSiebelCommsReqABCS'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/AdjustmentSiebelCommsReqABCS/AdjustmentSiebelCommsReqABCS_ep' WHERE NAME='AdjustmentSiebelCommsReqABCSPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/InvoiceSiebelCommsReqABCS/InvoiceSiebelCommsReqABCS_ep' WHERE NAME='_soap_InvoiceSiebelCommsReqABCS_InvoiceSiebelCommsReqABCS'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/PaymentSiebelCommsReqABCS/PaymentSiebelCommsReqABCS_ep' WHERE NAME='PaymentSiebelCommsReqABCSPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/UnbilledUsageSiebelCommsReqABCS/UnbilledUsageSiebelCommsReqABCS_ep' WHERE NAME='_soap_UnbilledUsageSiebelCommsReqABCS_UnbilledUsageSiebelCommsReqABCS'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/SyncCustomerSiebelEventAggregator/Client' WHERE NAME='SyncCustomerSiebelEventAggregatorPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='http://aiacn_hostname:port/soa-infra2/services/default/UpdateCreditAlertSiebelCommsReqABCSImpl/UpdateCreditAlertSiebelCommsReqABCSImpl' WHERE NAME='UpdateCreditAlertSiebelCommsReqABCSImplServicePort'; SET ESCAPE ON; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWIOrderUpsert'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWI Product Attribute Import'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWI Product Class Import'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWIProductImport'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWIPromotionImport'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/eai/enu/start.swe?SWEExtSource=SecureWebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='SWIUpsertQuote'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/app/eai/enu?SWEExtSource=WebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='COMMSCancelOrderPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/app/eai/enu?SWEExtSource=WebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='COMMSCustomServicesPort'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/app/eai/enu?SWEExtSource=WebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='COMMSOrderUpsert'; UPDATE S_WS_PORT SET PORT_ADDRESS='https://Siebel_hostname:Siebel_port/siebel/app/eai/enu?SWEExtSource=WebService\&SWEExtCmd=Execute\&WSSOAP=1' WHERE NAME='COMMSSubmitBillingOrder'; commit; quit;
- Connect to Siebel DB and run the SQL script with DB user name and the corresponding password.
- Create the "update_siebel_ws.sql" SQL script with the following
content:
- Configure the Siebel repository in Siebel DB:
- Create the "update_siebel_repository.sql" SQL script with the following
contents:
UPDATE S_SYS_PREF SET VAL='TRUE' WHERE SYS_PREF_CD='Enable AIA Comms'; UPDATE S_SYS_PREF SET VAL='TRUE' WHERE SYS_PREF_CD='Enable AIA MDM'; UPDATE S_SYS_PREF SET VAL='TRUE' WHERE SYS_PREF_CD='Enable AIA Testing'; UPDATE S_SYS_PREF SET VAL='FALSE' WHERE SYS_PREF_CD='Enable AIA Utility'; UPDATE S_SYS_PREF SET VAL='No' WHERE SYS_PREF_CD='Enable Promotion Group'; UPDATE S_SYS_PREF SET VAL='/siebel/mde/siebsrvr/temp/OrderBackup/' WHERE SYS_PREF_CD='AIA Order Backup Path'; UPDATE S_SYS_PREF SET VAL='Yes' WHERE SYS_PREF_CD='Enable Promotion Group'; UPDATE S_SYS_PREF SET VAL='Y' WHERE SYS_PREF_CD='Promotion Group Compatibility'; commit; quit;
- Connect to Siebel DB and run the SQL script with DB user name and the corresponding password.
- Create the "update_siebel_repository.sql" SQL script with the following
contents:
- Configure EAI File Transfer Folder:
- Connect to the SES pod of the Siebel cloud native instance.
- Run the following two Siebel commands respectively and set
"EAIFileTransportFolders" with the created "OrderBackup" sub-folder's full path as
follows:
[aiacn_pod-0:/siebel/mde]#srvrmgr /g cgw-aiacn-0.ses-aiacn.siebel-cn.svc.cluster.local:2320 /e aiacn /u username /p password /c "change ent param EAIFileTransportFolders=/siebel/mde/siebsrvr/temp/OrderBackup"
srvrmgr> change ent param EAIFileTransportFolders=/siebel/mde/siebsrvr/temp/OrderBackup
srvrmgr> change ent param EAIFileTransportFolders=/siebel/mde/siebsrvr/temp/OrderBackup for server aiacn_pod-0
- Restart the SES service using the kubectl
command:
kubectl -n siebel_namespace, delete pod Siebel_Enterprise_Server_pod_name-0
- After the pod is recreated and verified that it is running, do steps 5 and 6.
- (Optional) Import products into Siebel cloud native by using the Siebel eCommunication application. Refer to Siebel CRM documentation for instructions.
- Import Siebel cloud native SSL/TLS security certificates and configure AIA
cloud native with the certificates. See "Installing SSL Certificates".
- Validate that keystore custom identity and custom trust are created successfully. To do this, log in to the Enterprise Manager Console for AIA and navigate to the Keystore section.
- Validate that Siebel trust certificate is available in the custom trust keystore in the Keystore section.
- Log in to the Weblogic Console of AIA cloud native. For each managed
server, in the Keystore section, ensure the following:
- kss://system/custom_identity_keystorename is displayed for Custom Identity Store.
- kss://system/custom_trust_keystorename is displayed for Custom Trust Store.
- Validate
/u01/oracle/user_projects/domains/soainfra/bin/setDomainEnv.sh with custom
trust:
- Connect to any managed server pod.
- Open the /u01/oracle/user_projects/domains/soainfra/bin/setDomainEnv.sh using the vi tool.
- Validate that -Djavax.net.ssl.trustStore=kss://system/custom_trust_keystorename -Djavax.net.ssl.trustStoreType=kss -Djavax.net.ssl.keyStorePassword=password" is configured in EXTRA_JAVA_PROPERTIES.
- Configure Siebel credentials in the Enterprise Console of AIA cloud native.
- Navigate to the Credentials section and edit participatingapplications.siebel.server.eai.password to specify the username and password.
- Repeat step a. for participatingapplications.siebel.server.db.password if you want to change the Siebel DB credentials.
- Restart the AIA cloud native services by using the domain-lifecycle scripts.
- Configure AIA cloud native MetaData with Siebel Business Unit ID, and
PRICELIST.
- Log in to Siebel and get Siebel Business Unit Id by navigating to Organizations. Navigate to About Record, copy Row #, and update the AIAConfigurationProperties.xml file with it.
- If not already available, create a pricelist.
- Search for the pricelist you created.
- Update AIAConfigurationProperties.xml and PRICELIST.dvm for Default Pricelist.
- Repeat steps from b. to d. for Business Pricelist and Consumer Pricelist.
- Search for the Pricelist and get Row # if available. Navigate to All Price Lists, select the row that contains NA Pricelist, and copy the Row # from About Record.
- Update AIAConfigurationProperties.xml and PRICELIST.dvm for Default Pricelist.
- Repeat steps from f. and g. for Business Pricelist and Consumer Pricelist.
- Log in to Enterprise Manager console for AIA and update Siebel end
points, Price List IDs, and Business Unit IDs:
- Get the latest AIAConfigurationProperties.xml and PRICElIST.dvm files.
- In Enterprise Manager console for AIA, navigate to the MDS Configuration section and export the zip file.
- Go to soa/configuration/default folder of your zip and copy the AIAConfigurationProperties.xml.
- Go to apps/AIAMetaData/dvm and copy PRICELIST.dvm.
- In the AIAConfigurationProperties.xml file, replace the Siebel URL and then save and close the file.
- Update MDS with the updated AIAConfigurationProperties.xml file and restart AIA cloud native using domain-lifecycle scripts.
- In the PRICElIST.dvm file, do the following:
- Update the value of <cell> element, which is immediately after DEFAULT Pricelist, with the copied Row # of NA Pricelist.
- Change the value of <cell> element, which is immediately after Consumer Pricelist, with the copied Row # of Consumer Pricelist.
- Change the value of <cell> element, which is immediately after Business Pricelist, with the copied Row # of Business Pricelist.
- Save and close the file.
- Open AIAConfigurationProperties.xml and search for XML tags property by the name Siebel.SEBL_01.PriceList.ID.
- Update all the values of Siebel.SEBL_01.PriceList.ID with the copied NA Pricelist Row #.
- Save and close the file.
- Update the Business Unit ID:
- In the AIAConfigurationProperties.xml file, search for XML tags property by the name Siebel.SEBL_01.BusinessUnit.
- Update all the values of Siebel.SEBL_01.BusinessUnit with the copied Default Organization Row #.
- Save and close the file.
- Update MDS with the updated PRICELIST.dvm and
AIAConfigurationProperties.xml files.
- Copy the PRICELIST.dvm and AIAConfigurationProperties.xml files to a shared folder of AIA cloud native.
- Create a file with the name UpdateMetaDataDP.xml and add the following
content:
<?xml version="1.0" standalone="yes"?> <DeploymentPlan component="Metadata" version="3.0"> <Configurations> <UpdateMetadataFile wlserver="fp" mdslocation="soa/configuration/default/"> <fileset dir="absolute_path_to_share_folder_where_the_files_are_copied" <include name="AIAConfigurationProperties.xml" /> </fileset> </UpdateMetadataFile> <UpdateMetadataFile wlserver="fp" mdslocation="/apps/AIAMetaData/dvm"> <fileset dir="absolute_path_to_share_folder_where_the_files_are_copied" <include name="PRICELIST.dvm" /> </fileset> </UpdateMetadataFile> </Configurations> </DeploymentPlan>
- Connect to any SOA or AIA cloud native managed server pod and run following
command:
$ cd /u01/aiacn/comms_home/bin $ source ./commsenv.sh $ ant -f $MW_HOME/soa/aiafp/Install/AID/AIAInstallDriver.xml -DDeploymentPlan=absolute_path_to_file_no_variables_please/UpdateMetaDataDP.xml -DPropertiesFile=$DOMAIN_LOCATION/soa/aia/bin/AIAInstallProperties.xml
- Restart AIACN domain services by running the domain-lifecycle scripts.
- Enable the eai_enu application configuration using the Siebel Management Console. Refer to the Siebel Management Console documentation for instructions.
Integrating BRM Cloud Native
This section provides instructions for integrating BRM cloud native with AIA cloud native.
- Validate the BRM cloud native CM parameter by running the following
command:
Note:
Ensure that the BRM CM service is configured with the dnsName of the cluster, so that the CM service can be connected using the dnsName in the cluster.kubectl -n brmcn_namespace get deployment/cm -o yaml
A sample output is as follows:- name: CM_DNS_NAME value: dns:cm.brmcn-ps8
- Deploy the BRM JCA Adapter by downloading Patch 35353279 from My Oracle
Support and apply it.
- In the extracted files, in the Oracle_BRMJCA_Adapter_RAR/META-INF directory, update the value for the ConnectionString parameter with the same value of CM_DNS_NAME of the CM service of BRM cloud native.
- In the ra.xml and weblogic-ra.xml files, set the
properties appropriately. For details, see "Deploying and Configuring JCA Resource
Adapter on Oracle WebLogic Server" in the BRM JCA Resource Adapter
guide. In addition to the parameters listed in the BRM JCA Resource Adapter
guide, set the following parameters with appropriate values for a single cluster. The
values shown are samples.
- ConnectionString :
"ip cm.brmcn-ps8 11960
" - FailoverConnectionString :
"
root.0.0.0.1:password@cm.brmcn-ps8:11960
" - UserName :
"root.0.0.0.1
" - Password :
password
- SslWalletLocation :
"/u01/oracle/user_projects/domains/soainfra/servers/AdminServer/tmp/_WL_user/OracleBRMJCA15Adapter/wernpi/wallet"
Note: In a multi-cluster scenario, set the values of ConnectionString and FailoverConnectionString as shown in the following samples:
- ConnectionString : "
ip 192.0.2.1 31773
" - FailoverConnectionString :
"root.0.0.0.1:password@192.0.2.1:31773,root.0.0.0.1:password@192.0.2.1:31773
"
- ConnectionString :
- Download cwallet.sso file from the CM pod of the BRM cloud native instance and re-package ra.xml, weblogic-ra.xml and cwallet.sso into OracleBRMJCA15Adapter.rar.
- Deploy OracleBRMJCA15Adapter.rar into AIA cloud native Weblogic cluster using the Weblogic Admin console and ensure that it is in the "Active" state.
- (Optional) Validate the connection between AIA cloud native and BRM cloud native by deploying the BRM JCA Adapter test client (Web application) and sending a test request with the test client Web UI. For more details, see "Testing JCA Resource Adapter Configuration and BRM Connectivity" in the BRM JCA Resource Adapter guide.
- Enable notification and Product Sync in BRM cloud native.
- Ensure that the fm_publish enable_publish parameter is set to 1 in the CM pin.conf.
- Ensure that eai-java-server in cm pod Infranet.properties file has the same payload as payloadconfig_crm_sync.xml. This payload contains the required events (ProductInfoChange and DiscountInfo change) for generating the XML for EAI. Ensure that the DB is 0.0.9.7, which points to EAI. The DB entries mapping can be found in dm-oracle pin.conf.
- Ensure that in the dm-aq config file, ALL queues are enabled.
- Ensure that notifications are enabled for the following:
/event/notification/price/products/modify /event/notification/price/discounts/modify /event/notification/price/sponsorships/modify /event/customer/status /event/notification/amt/AccountInfoChange
- Restart the cm and dm-oracle, dm-aq and dm-ifw-sync pods of the BRM cloud native instance.
Integrating OSM Cloud Native
This section provides instructions for integrating OSM cloud native with AIA cloud native.
- Create a t3 channel in the AIA cloud native instance:
- For a single cluster scenario, where in AIA cloud native, Siebel CRM
cloud native, BRM cloud native, and OSM cloud native are deployed in the same cluster,
create a t3 channel in the WebLogic Admin Console for AIA cloud native.
- Log in to AIA cloud native Weblogic Console.
- Navigate to the Servers section in the Domain Structure pane and then select a managed server (for example, select soa_server1).
- Navigate to the Channels tab in Protocols and create a new channel (for example, T3Channel).
- Specify the following:
- Listen Address as soainfra-cluster-soa-cluster.namespace.svc.cluster.local.
- External Listen Port.
- Ensure that ‘Tunneling Enabled’ is selected.
- Repeat steps b. to e. for managed server soa_server2.
- For multiple clusters, where in AIA cloud native and OSM cloud native are deployed
in different clusters, do the following:
- Connect to the AIA cloud native cluster and create an ingressroute
that includes route rules for all common names and the respective ports.
apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: aia-ingress namespace: namespace spec: entryPoints: - web routes: - kind: Rule match: Host(`soa.domain_name.namespace.aia.org`) services: - name: soa_cluster_service_name port: soa_ms_port sticky: cookie: httpOnly: true - kind: Rule match: Host(`t3.domain_name.namespace.aia.org`) services: - name: soa_cluster_service_name port: soa_cluster_service_port sticky: cookie: httpOnly: true - kind: Rule match: Host(`admin.domain_name.namespace.aia.org`) services: - name: soa_admin_server_service_name port: soa_admin_server_port sticky: cookie: httpOnly: true
- Apply the yaml file to create the
ingressroute:
kubectl apply -f aia-ingress.yaml
- Edit the AIA cloud native domain configuration to specify the
following settings for integrating with the OSM cloud native instance:
Note:
If the previous node is cordoned, deleted, or repaved, update the values forhostAliases
and change the IP addresses to new IP addresses of a working node.spec: ......... ......... serverPod: ......... ......... hostAliases: - hostnames: - t3.instance.project.osm.org - instance.project.osm.org - admin.instance.project.osm.org ip: osm_node_IP_address - hostnames: - soa.soainfra.soa_namespace.aia.org - t3.domain_name.namespace.aia.org - admin.domain_name.namespace.aia.org ip: soa_node_IP_address
- Edit the OSM cloud native domain configuration to specify the same settings as
described in step 1.b for integrating with the AIA cloud native
instance.
Note:
Ensure that the AIA cloud native and OSM cloud native instance pods restart automatically after steps b and c. If they do not, run the corresponding scripts to restart the AIA and OSM instances. - Create a t3 channel in the WebLogic Admin Console for AIA cloud native, ensuring that the External Listen Address is set as the hostname defined earlier. In addition, ensure that the HTTP Enabled for This Protocol option is selected.
- Connect to the AIA cloud native cluster and create an ingressroute
that includes route rules for all common names and the respective ports.
- For a single cluster scenario, where in AIA cloud native, Siebel CRM
cloud native, BRM cloud native, and OSM cloud native are deployed in the same cluster,
create a t3 channel in the WebLogic Admin Console for AIA cloud native.
- Deploy the O2A cartridge into the OSM cloud native instance. For instructions, see OSM Cloud Native Deployment Guide for Oracle Application Integration Architecture Cartridges and "Deploying the Sample Cartridge" in OSM Cloud Native Deployment Guide.
- Set the AIA cloud native SAF t3 value, created earlier, in the OSM project
specification file as follows:
- For single cluster, specify the
following:
safConnectionConfig: - name: O2A_SAFImportedDestinations t3Url: t3://soa_cluster_servicename.namespace.svc.cluster.local:soa_cluster_serviceport secretName: osm_project_instance__saf_credentials_aia_secret_name
Note:
osm_project_instance__saf_credentials_aia_secret_name
is the secret you created while setting up and deploying OSM. - For multiple clusters, specify the
following:
safConnectionConfig: - name: O2A_SAFImportedDestinations t3Url: http://t3_hostname_in_ingressroute:t3_port_created secretName: osm_project_instance__saf_credentials_aia_secret_name
- For single cluster, specify the
following:
- Run the corresponding scripts to deploy the O2A cartridge with the AIA cloud
native
configuration:
[opc@cn-deployment o2a_cartridge]$ ./shutdown_osm.sh ; ./deploy_o2a_par.sh ; ./start_osm.sh
- Log in to the Weblogic Admin Console for OSM cloud native and verify that the SAF setting is configured with the expected t3 Url value.
- Log in to the OSM Task Web client and verify that the O2A cartridge is deployed.
- In WebLogic Admin Console for OSM cloud native, copy the t3 URL dispalyed for T3ClustChannel for single cluster or the value of T3Channel (HTTP) for multi-cluster channel.
- In the WebLogic Admin console for AIA cloud native, navigate to the JMS Modules page, for the OSM and SOM AIAJMSModules, set the URL test fields with the copied t3 URLs.
- Restart the AIA cloud native domain services by using the domain-lifecycle scripts.
- In WebLogic Admin Console, navigate to the Store and Forward Agents page. In the Remote Endpoints tab for OSM_SAFAgent, ensure that for each Remote Endpoint, the t3 URL is displayed for single-cluster environment.
- Log in to Oracle Enterprise Manager Fusion Middleware Control for AIA cloud native, add the singleton property. See the AIA Installation Guide for instructions.
- Configure the AIA queues to support JMS Priority. See the AIA Installation Guide for instructions.
- Add the No Authentication security policy to the Product class service. See the AIA Installation Guide for instructions. Ensure that you select "QueryProductClassAndAttributesSCECommsReqABCSImpl" in the Service and References region.
- Ensure that the JAVA_OPTIONS parameter
-Dweblogic.rjvm.allowUnknownHost=true
is added into AIA cloud native domain setting. - In Oracle Enterprise Manager Fusion Middleware Control, for SOA Infrastructure, set the Callback Server URL and Server URL common properties with the SOA infrastructure URL.
Deploying Custom Components
This section describes how to deploy custom components.
You can deploy the following:
- SOA Adapter customizations. For instructions, refer to the Oracle Fusion Middleware on Kubernetes documentation at: https://oracle.github.io/fmw-kubernetes/22.4.2/soa-domains/adminguide/persisting-soa-adapters-customizations/.
- Custom SOA composites. For instructions, refer to the Oracle Fusion Middleware on Kubernetes documentation at: https://oracle.github.io/fmw-kubernetes/22.4.2/soa-domains/adminguide/deploying-composites/.
- Custom AIA artifacts. See "Deploying Custom AIA Artifacts" for instructions.
Deploying Custom AIA Artifacts
The deployment of the artifacts is done by AIA Installation Driver (AID). AID takes the deployment plan and the AIAInstallProperties.xml file as input. Based on the tags specified in the deployment plan, AID configures and deploys the artifacts onto the server.
- Main Deployment Plan
- Supplementary Deployment Plan
- Custom Deployment Plan
Main Deployment Plan is auto-generated by the Deployment Plan Generator. Whereas, Supplementary Deployment Plan and Custom Deployment Plan are handcoded. Support to add custom deployment tags to the main deployment plan is available through Pre-Install and Post-Install sections in the Deployment plan. However, the problem with using these sections is that the deployment plan may not be upgrade-safe. To mitigate the issue, supplementary and custom deployment plans are introduced. The supplementary deployment plan is used mostly by the internal Pre-Built Integration development team. Use custom deployment plan to meet the requirement of non-native artifact deployment plan.
- Main Deployment Plan
- (Optional) Supplementary Deployment Plan
- (Optional) Custom Deployment Plan
Note:
To facilitate durability across upgrades and patch updates, place the custom modified files in a directory path different from AIA-shipped PIP_NameDP.xml and PIP_NameSupplementaryDP.xml.The following sections show the deployment commands for various deployment scenarios.
Deploying AIA Shipped Native Artifacts and Non-native Artifacts
This scenario does not involve any customizations. The following command takes the main deployment plan and the supplementary deployment plan which are shipped with the Pre-Built Integration installer as input.
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameSupplementaryDP.xml \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml
Deploying Modified AIA-shipped Artifacts
This section describes how to deploy modified AIA-shipped native and non-native artifacts.
Deploying Modified Native Artifacts and Original Non-native Artifacts
For modified native artifacts scenario, re-harvest the modified artifacts and regenerate the deployment plan, and name it as PIP_NameCustomDP.xml. Pass this as the main deployment plan, instead of the shipped deployment plan.
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameCustomDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameSupplementaryDP.xml \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml
Deploying Original Native Artifacts and Modified Non-native Artifacts
For the original native artifacts and modified non-native artifacts scenario, copy the contents of the shipped supplementary DP to a new file and name it as PIP_NameCustomSupplementaryDP.xml. Modify this file with the customizations. This is passed as the supplementary deployment plan, instead of the shipped supplementary DP.
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameCustomSupplementaryDP.xml \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml
Deploying New or Custom Built Artifacts
This section discusses how to deploy newly added native and non-native artifacts.
Deploying Newly-added Native Artifacts and Original Non-native Artifacts
If you are introducing new native artifacts, harvest the new artifacts and regenerate the deployment plan for the new artifacts along with the shipped ones, and name it PIP_NameCustomDP.xml. Pass this as the main deployment plan, instead of the shipped deployment plan.
Run the following AID command inside the domain admin pod:
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameCustomDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameSupplementaryDP.xml \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml \
-l $COMMS_HOME/pips/PIP_name/DeploymentPlans/PIPDeploymentPlanName.log
Deploying Newly Added Non-native Artifacts
For new non-native artifacts scenario, add customizations to PIP_NameCustomDP.xml, which is an empty deployment plan shipped with the Pre-Built Integration. This custom plan is in the same location as the main plan. Pass this as Custom Deployment Plan to AID.
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameSupplementaryDP.xml \
-DCustomDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameCustomDP.xml> \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml
The AIAInstallProperties.xml file contain the details of the AIA environment and is located at: $VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml.
Undeploying Services
The undeployment plan is generated at the same location as the deployment plan with the name PIP_NameUndeployDP.xml. The undeployment plan is generated only for native artifacts modified through the Project Lifecycle Workbench. This contains undeploy tasks for all the services deployed and the configurations done as part of the Deployment Plan. The undeployment plan is run using the AID.
The undeployment command is similar to the deployment plan command except for the input argument and an additional argument "Uninstall". You run this command inside the domain admin pod.
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameDP.xml \
-DSupplementaryDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameSupplementaryDP.xml \
-DDeploymentPolicyFile=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameConditionalPolicy.xml
source $COMMS_AIA_HOME/comms_home/bin/commsenv.sh
ant -f $SOA_HOME/aiafp/Install/AID/AIAInstallDriver.xml \
-DPropertiesFile=$VOLUME_DIR/domains/$DOMAIN_NAME/soa/aia/bin/AIAInstallProperties.xml Uninstall \
-DDeploymentPlan=$COMMS_HOME/pips/PIP_name/DeploymentPlans/PIP_nameUndeployDP.xml
- Copy the supplementary deployment plan and name it as PIP_NameUndeploySupplementaryDP.xml or PIP_NameUndeployCustomSupplementaryDP.xml, depending on the supplementary deployment plan name.
- In the new deployment plan, change the action attributes of all the tasks from "deploy" to "undeploy" or from "create" to "delete".
Validating the AIA Cloud Native Deployment
- Verify the logs:
- Run the following
command:
kubectl exec -it admin_server -n namepspace –- bash cd $ORACLE_HOME/user_projects/domains/domain_name
- Verify there are no errors in the log files.
Note:
If you want to verify the PIP deployment log, refer to the logs from the following deployment pods:- /u01/shared/runconfig.log
- /u01/shared/setupo2c.log
- Run the following
command:
- Verify the deployment of composites for Siebel CRM, OSM, and BRM. See "Verifying Composite Deployment" in the AIA Installation Guide for details.
- Test the order flow to check connectivity between Siebel, OSM, and BRM.