3.2 Running the Configuration Assistant
- After the Oracle GoldenGate Veridata installation is complete,
navigate to the bin directory, and run
vdtca.sh
to display the Configuration Assistant. - If MySQL is a new install from Installer, then in the Repository
Creation page, enter the New Root Password, and New Veridata
Password. Ensure to pick a unique Schema Prefix to allow multiple
Veridata installation to point to the same MySQL Repository. To ensure
successful configuration, remove previously-installed MySQL instances.
Note:
If the Configuration Assistant detects a pre-existing MySQL instance in the system, it will display the information with red text shown as follows:Figure 3-7 Repository Creation Page for a New MySQL Install
Note:
If the Configuration Assistant shows a warning message saying it has detected a pre-existing MySQL for the new MySQL installation option, then run the following command:yum list installed | grep mysql
and verify if any MySQL database or package is installed in the system. If you are sure that the MySQL database does not exist in the system, then you can safely ignore the warning and proceed with the configuration. For example,pcp-pmda-mysql.x86_64
package can cause a false warning.- The New Veridata Username cannot be defined as an existing user in the existing MySQL database.
- The user responsible for creating a new MySQL Veridata
repository user in an existing MySQL instance needs to have all
privileges across all databases and tables. This includes the ability to
grant privileges to other MySQL users and allow connections from any IP
address. The following is a sample SQL script for creating such a user:
CREATE USER 'superuser'@'%' IDENTIFIED BY 'superpassword'; GRANT ALL PRIVILEGES ON *.* TO 'superuser'@'%' WITH GRANT OPTION; FLUSH PRIVILEGES; SHOW GRANTS FOR 'superuser'@'%';
Figure 3-8 Repository Creation Page for an Existing MySQL
- In the Memory Options page, for the Java Heap Sizes,
select Use recommended settings (or modify according to your
requirements) and click Next.
Figure 3-9 Memory Options
- In the Administrator Account Credentials page, enter the
Veridata Administrator Username, Password, and Confirm
Password and click Next.
Figure 3-10 Administrator Account Credentials
- The Security Options step of the Oracle GoldenGate Veridata
Configuration Assistant allows users to configure the security settings for the
Web User Interface (UI) by selecting encryption options, certificates, and
communication ports. The primary function of this screen is to secure the
connection between the client and the server using SSL/TLS protocols. This point
outlines each of the available options and describes how to configure them.
- SSL / TLS Security for Web UI
- Purpose: Enabling this option ensures that communication between the Web UI and users is encrypted using SSL (Secure Sockets Layer) or TLS (Transport Layer Security).
- Default Setting: This checkbox is enabled by default, meaning SSL/TLS is turned on.
- Implications: If disabled, the communication will not be encrypted, making it vulnerable to eavesdropping and other security threats. You can opt in to disable SSL/TLS for faster and simpler deployment in a test environment.
Note:
The SSL / TLS Security for Web requires 8830 port to be open apart from the selected port. If 8830 the port is not open, then Oracle GoldenGate Veridata server does not start after the installation. In such a case, do the following after installation:- Update the following property in
<VERIDATA_HOME>/config/oggvdt_cainput.properties server.port=8830
to an available port. - Start the Oracle GoldenGate Veridata server
from
<VERIDATA_HOME>/bin
:./run.sh
- Certificate Configuration
To secure the Web UI, Oracle GoldenGate Veridata uses X.509 certificates. The configuration wizard provides two ways to specify certificates outlined as follows:
- Use Veridata Self-Signed Certificate:
- Purpose: Use this option if you want Veridata to automatically generate a self-signed SSL certificate.
- Pros:
- Quick and easy setup with no need for external certificate files
- Useful in non-production environments or internal use cases where a trusted Certificate Authority (CA) is not necessary.
- Cons:
- Self-signed certificates are not trusted by web browsers without manual intervention.
- Not suitable for production environments where certificates must be validated by a third-party CA.
- Upload Custom PEM Files
- Purpose: This option allows users to specify their own SSL certificate, private key, and CA certificate files (in PEM format).
- Required Files: This is the public
certificate (usually with a
.pem
or.crt
extension) that will be used to identify the server to clients.- File Input Field: Certificate
- Example Path:
/scratch/vdt23c/web/certificate.pem
- CA Certificate File: This file
contains the certificate(s) of the Certificate Authority
(CA) that signed the server certificate. The CA file is
used to verify that the server certificate is
trusted.
- File Input Field: CA Certificate File
Example Path: /scratch/vdt23c/web/ca.pem
- When to Use: This option is best suited for production environments where an official SSL certificate issued by a trusted CA (such as Let’s Encrypt, DigiCert, or GoDaddy) is required.
- Use Veridata Self-Signed Certificate:
- Port Configuration
Oracle GoldenGate Veridata operates over specific ports, and users can define whether to use the default port or a custom one.
- Use Default Port (8831)
- Purpose: The default port for SSL/TLS connections to the Veridata Web UI is 8831.
- When to Use
- Suitable for environments where port 8831 is open and available.
- Easier to configure, especially in less restrictive network environments.
- Use Non-Default Port
- Purpose: Allows users to specify a custom port for Veridata to use for SSL/TLS traffic instead of the default 8831.
- When to Use
- In cases where the default port (8831) is blocked or already in use.
- When a specific port policy is enforced by your IT or security team (for example, using port 443 for HTTPS traffic).
- Configuration: Enter the custom port number into the input field provided.
- Use Default Port (8831)
Figure 3-11 Security Options
- SSL / TLS Security for Web UI
- Review the configuration summary on the Summary page. Click
Save Response File to save the respose file if needed.
Figure 3-12 Conifuguration Assistant Summary
- Open a terminal and run
sudo su
to change toroot
. After you see the following screen, run the script as root.Figure 3-13 Configure root
Note:
The root script should typically take 10-15 seconds.If theinstall_configure_mysql.sh
script was executed successfully, the console will display the following information:- The Configuration Assistant will set the root user password as what you entered in the next stage of veridata repository creation.
-
MySQL has been installed and started.
-
Please return to the Configuration Assistant and click OK to continue.
Then follow the console instruction, return to the Configuration Assistant and click OK to continue.
- After a successful configuration, the Finish page displays
the URL of Oracle Goldengate Veridata web application. Input the URL to a web
browser to verify that the Oracle GoldenGate Veridata server is running.
Figure 3-14 Configuration Complete
Parent topic: Install