6 Deploying the BRM Database Schema
Learn how to deploy a new or existing database schema in the Oracle Communications Billing and Revenue Management (BRM) cloud native environment.
Topics in this document:
Deploying BRM with a New Database Schema
To deploy BRM with a new BRM and pipeline database schema:
-
If you have not already done so, create a BRM database and schema users for the BRM Server and pipeline. See "Creating and Configuring Your BRM Database".
-
Create a new Kubernetes namespace for oc-cn-init-db-helm-chart:
kubectl create namespace InitDbNameSpace
-
Create an override-values.yaml file for oc-cn-init-db-helm-chart, and add keys from Table 6-1.
Note:
This documentation uses the override-values.yaml file name for ease of use, but you can name the file whatever you want.
-
If you want to deploy the BRM cloud native schema into a multischema database, do the following in your override-values.yaml file:
-
Set the ocbrm.db.skipPrimary key to false.
-
For each secondary schema in your system, add an ocbrm.db.multiSchemas.secondaryN block, where N is 1 for the first secondary schema, 2 for the next secondary schema, and so on.
-
In each ocbrm.db.multiSchemas.secondaryN block, set the following keys:
Note:
If the host, port, and service keys are not defined, the secondary schema uses the same host name, service, and port number as the primary schema.
-
deploy: Set this to true to deploy this secondary schema.
-
host: Set this to the host name of the secondary schema. This key is optional.
-
port: Set this to the port number for the secondary schema. This key is optional.
-
service: Set this to the service name for the secondary schema. This key is optional.
-
schemauser: Set this to the schema user name.
-
schemapass: Set this to the schema password.
-
schematablespace: Set this to the name of the schema tablespace, such as pin01.
-
indextablespace: Set this to the name of the index tablespace, such as pinx01.
-
-
Enable account migration between your schemas by setting the ocbrm.isAmt key to true.
See "Understanding Account Migration" in BRM Moving Accounts Between Database Schemas for more information.
This shows example entries for a BRM database with one primary schema, two secondary schemas, and account migration enabled:
ocbrm: isAmt: true ocbrm: db: host: hostname port: 12345 service: serviceName schemauser: pin01 schemapass: password schematablespace: pin01 indextablespace: pinx01 skipPrimary: false multiSchemas: secondary1: deploy: true schemauser: pin02 schemapass: password schematablespace: pin02 indextablespace: pinx02 secondary2: deploy: true schemauser: pin03 schemapass: password schematablespace: pin03 indextablespace: pinx03
-
-
To commit seed data to the BRM database, modify the init-db container (configmap_create_obj_2.yaml) to add the corresponding PCM_OP_CREATE_OBJ input flist. For example:
<PCM_OP $PIN_OPNAME=$PIN_CONF_INIT_OPNAME; $PIN_OPFLAGS=0> 0 PIN_FLD_POID POID [0] $DB_NUMBER /config/recharge_card_type 0 0 0 PIN_FLD_NAME STR [0] "-" 0 PIN_FLD_PROGRAM_NAME STR [0] "load_pin_recharge_card_type" 0 PIN_FLD_HOSTNAME STR [0] "-" 0 PIN_FLD_VERSION STR [0] "1" 0 PIN_FLD_ACCOUNT_OBJ POID [0] 0.0.0.1 /account 1 0 </PCM_OP>
-
Initialize the BRM database schema by running this command from the helmcharts directory:
helm install InitDbReleaseName oc-cn-init-db-helm-chart --namespace InitDbNameSpace --values OverrideValuesFile
where:
-
InitDbReleaseName is the release name for oc-cn-init-db-helm-chart and is used to track this installation instance.
-
InitDbNameSpace is the namespace for oc-cn-init-db-helm-chart.
-
OverrideValuesFile is the path to a YAML file that overrides the default configurations in the values.yaml file for oc-cn-init-db-helm-chart.
The init-db Helm chart creates an init-db pod and job for each schema.
-
-
After the init-db Helm chart deploys successfully, delete the Helm chart from your namespace by running this command from the helmcharts directory:
helm delete InitDbReleaseName -n InitDbNameSpace
Table 6-1 lists the keys that directly impact the BRM database schema and pipeline database schema. Add these keys to your override-values.yaml file with the same path hierarchy.
Caution:
Some keys hold sensitive data. They must be handled carefully with controlled access to the file containing its values. Encode all of these values in Base64. See "Secrets" in Kubernetes Concepts.
Table 6-1 oc-cn-init-db-helm-chart Keys
Key | Purpose |
---|---|
imageRepository |
The registry server where you have pushed images. Typically, in the format “RepoHost:RepoPort/”. The value is added as a prefix to all image names when you install or upgrade Helm charts. This key is empty by default. |
imagePullSecrets |
The name of the Secret containing credentials for accessing images from your private image server. This is added to each pod to give it permission to pull the image from your private registry server. See "Creating Secrets for Docker Registry Authorization" for more information. |
uniPass |
Use this key to apply a uniform password to all BRM cloud native services, including:
To override this password for a specific service, specify a different password in the service's key. Note: Use this key for test or demonstration systems only. |
db.sslMode |
The type of SSL connection required for connecting to the database: TWO_WAY, ONE_WAY, or NO. The default is ONE_WAY. |
ocbrm.imagePullPolicy |
Specify when to pull images:
|
ocbrm.isAmt |
Specify whether account migration is enabled in your BRM multischema database:
|
ocbrm.isIPV6Enabled |
Specify whether IPV6 is enabled in your Kubernetes environment:
|
ocbrm.ece_deployed |
Specify whether to deploy ECE in your BRM cloud native environment:
|
ocbrm.pdc_deployed |
Specify whether to deploy PDC in your BRM cloud native environment:
|
ocbrm.existing_rootkey_wallet |
Specify whether you are using an existing BRM database or an existing root key wallet:
|
ocbrm.is_upgrade |
Specify whether to upgrade the existing database schema:
|
ocbrm.isSSLEnabled |
Specify whether SSL is enabled in the BRM database. The default is true. |
ocbrm.cmSSLTermination |
Specify whether to disable SSL between the CM and DM/EM.
|
ocbrm.customSSLWallet |
Whether to use a custom TLS certificate for the CM.
|
ocbrm.root_key_rotate |
Whether to rotate the BRM root key. The default is false. For more information, see "Rotating the BRM Root Key" in BRM Cloud Native System Administrator's Guide. |
ocbrm.brm_root_pass |
The BRM root password. The value can be per user. You must generate a Secret. Add this key to your override-values.yaml file with the same path hierarchy. |
ocbrm.rotate_brm_role_passwords |
Whether to rotate the BRM role passwords. The default is false. |
ocbrm.brm_role_pass.* |
The initial passwords for each BRM role. The roles grant users the permission to access different BRM components, such as Customer Center or Pipeline Configuration Center (PCC). Note: You must set all of these passwords when the unipass key is not set. You set passwords for the following roles:
Note: After you deploy or upgrade the database schema, you should rotate the role passwords regularly to improve security. To do so, see "Rotating BRM Role Passwords" in BRM Cloud Native System Administrator's Guide. |
ocbrm.wallet.* |
Specify the passwords for these wallets:
You must generate Secrets for these keys. |
ocbrm.db.* |
The details for connecting to a shared database. The keys in this section take precedence over other database connection keys. Add these keys only if your system uses a shared database:
|
ocbrm.db.multiSchemas.secondaryN |
The details for connecting to your secondary schemas, where N is 1 for the first secondary schema, 2 for the next secondary schema, and so on. Add this block only if your BRM database contains multiple schemas. This section will be commented out by default: multiSchemas: secondary1: deploy: true host: localhost port: 1521 service: pindb schemauser: schemapass: schematablespace: indextablespace: |
Deploying BRM with an Existing Schema
To deploy BRM with an existing schema and with default Oracle images:
-
Copy the root-key wallet files from the $BRM_WALLET/client directory to the oc-cn-helm-chart/existing_wallet directory.
-
In your override-values.yaml file for oc-cn-helm-chart, set the ocbrm.existing_rootkey_wallet key to true.
-
Deploy oc-cn-helm-chart.
Alternatively, you could deploy BRM with an existing schema by doing this:
-
Create images for each BRM Server component in the installed BRM staging area (using the same staging area that initialized the database).
-
In your override-values.yaml file for oc-cn-helm-chart, update the keys with the existing schema credentials and also set the following keys:
-
ocbrm.existing_rootkey_wallet: Set this to true.
-
ocbrm.use_oracle_brm_images: Set this to false.
-
ocbrm.db.queuename: Set this to match the queue name in the existing database.
-
obcrm.db.roamqueuename: If you want a database queue for Roaming Pipeline, create another queue in the Oracle database by following the instructions in "Creating Additional Queues for Multischema BRM Systems" in BRM Installation Guide. Then, set the roamqueuename key to the name of the queue you created.
-
-
Deploy oc-cn-helm-chart.