13.3 Performing WLST Administration via SSL
The following steps show how to perform WLST administration via SSL:
- By default the SSL port is not enabled for the Administration Server or Oracle
Access Management (OAM) managed servers. To configure the SSL port for the Administration
Server and managed servers:
- Login to WebLogic Remote Console.
- Click Edit Tree and in the left-hand navigation menu navigate to
Environment > Servers >
<server_name>
and click on the General tab. - Check the SSL Listen Port Enabled button and provide the SSL Port ( For
AdminServer
:7002
and foroam_server1
):14101
- Click Save.
- Click the Shopping Cart and select Commit Changes.
Note:
If configuring the OAM managed servers for SSL you must enable SSL on the same port for all servers (oam_server1
throughoam_server5
). - Create a
myscripts
directory as follows:cd $WORKDIR/kubernetes
mkdir myscripts
cd myscripts
- Create a
<domain_uid>-adminserver-ssl.yaml
file in themyscripts
directory for the OAM administration server:Note:
Update thedomainName
,domainUID
andnamespace
based on your environment. For example:apiVersion: v1 kind: Service metadata: labels: serviceType: SERVER weblogic.domainName: accessdomain weblogic.domainUID: accessdomain weblogic.resourceVersion: domain-v2 weblogic.serverName: AdminServer name: accessdomain-adminserverssl namespace: oamns spec: clusterIP: None ports: - name: default port: 7002 protocol: TCP targetPort: 7002 selector: weblogic.createdByOperator: "true" weblogic.domainUID: accessdomain weblogic.serverName: AdminServer type: ClusterIP
- Create a
<domain_uid>-oamcluster-ssl.yaml
for the OAM managed server:apiVersion: v1 kind: Service metadata: labels: serviceType: SERVER weblogic.domainName: accessdomain weblogic.domainUID: accessdomain weblogic.resourceVersion: domain-v2 name: accessdomain-oamcluster-ssl namespace: oamns spec: clusterIP: None ports: - name: default port: 14101 protocol: TCP targetPort: 14101 selector: weblogic.clusterName: oam_cluster weblogic.createdByOperator: "true" weblogic.domainUID: accessdomain type: ClusterIP
- Apply the template using the following command for the administration
server:
For example:kubectl apply -f <domain_uid>-adminserver-ssl.yaml
The output will look similar to the following:kubectl apply -f accessdomain-adminserver-ssl.yaml
service/accessdomain-adminserverssl created
- Apply the template using the following command for the OAM managed
server:
For example:kubectl apply -f <domain_uid>-oamcluster-ssl.yaml
The output will look similar to the following:kubectl apply -f accessdomain-oamcluster-ssl.yaml
service/accessdomain-oamcluster-ssl created
- Validate that the Kubernetes services to access SSL ports are created
successfully:
For example:kubectl get svc -n <domain_namespace> |grep ssl
The output will look similar to the following:kubectl get svc -n oamns |grep ssl
accessdomain-adminserverssl ClusterIP None <none> 7002/TCP 102s accessdomain-oamcluster-ssl ClusterIP None <none> 14101/TCP 35s
- Inside the bash shell of the running helper pod, run the
following:
export WLST_PROPERTIES="-Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.TrustKeyStore=DemoTrust"
cd /u01/oracle/oracle_common/common/bin
The output will look similar to the following:./wlst.sh
To connect to the Administration Server t3s service:Initializing WebLogic Scripting Tool (WLST) ... Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands wls:/offline>
The output will look similar to the following:connect('weblogic','<password>','t3s://accessdomain-adminserverssl:7002')
To connect to the OAM Managed Server t3s service:Connecting to t3s://accessdomain-adminserverssl:7002 with userid weblogic ... <<DATE>> <Info> <Security> <BEA-090905> <Disabling the CryptoJ JCE Provider self-integrity check for better startup performance. To enable this check, specify -Dweblogic.security.allowCryptoJDefaultJCEVerification=true.> <<DATE>> <Info> <Security> <BEA-090906> <Changing the default Random Number Generator in RSA CryptoJ from ECDRBG128 to HMACDRBG. To disable this change, specify -Dweblogic.security.allowCryptoJDefaultPRNG=true.> <<DATE>> <Info> <Security> <BEA-090909> <Using the configured custom SSL Hostname Verifier implementation: weblogic.security.utils.SSLWLSHostnameVerifier$NullHostnameVerifier.> Successfully connected to Admin Server "AdminServer" that belongs to domain "accessdomain". wls:/accessdomain/serverConfig/>
The output will look similar to the following:connect('weblogic','<password>','t3s://accessdomain-oamcluster-ssl:14101')
Connecting to t3s://accessdomain-oamcluster-ssl:14101 with userid weblogic ... <<DATE>> <Info> <Security> <BEA-090905> <Disabling the CryptoJ JCE Provider self-integrity check for better startup performance. To enable this check, specify -Dweblogic.security.allowCryptoJDefaultJCEVerification=true.> <<DATE>> <Info> <Security> <BEA-090906> <Changing the default Random Number Generator in RSA CryptoJ from ECDRBG128 to HMACDRBG. To disable this change, specify -Dweblogic.security.allowCryptoJDefaultPRNG=true.> <<DATE>> <Info> <Security> <BEA-090909> <Using the configured custom SSL Hostname Verifier implementation: weblogic.security.utils.SSLWLSHostnameVerifier$NullHostnameVerifier.> Successfully connected to managed Server "oam_server1" that belongs to domain "accessdomain".