In case a host computer fails, you can fail over the Administration Server to another host. The following sections provide the steps to verify the failover and failback of the Administration Server from BIHOST1 and BIHOST2.
Assumptions:
The Administration Server is configured to listen on ADMINVHN, and not on localhost or ANY address.
For more information about the ADMINVHN virtual IP address, see Reserving the Required IP Addresses for an Enterprise Deployment.
These procedures assume that the Administration Server domain home (ASERVER_HOME) has been mounted on both host computers. This ensures that the Administration Server domain configuration files and the persistent stores are saved on the shared storage device.
The Administration Server is failed over from BIHOST1 to BIHOST2, and the two nodes have these IPs:
BIHOST1: 100.200.140.165
BIHOST2: 100.200.140.205
ADMINVHN : 100.200.140.206. This is the Virtual IP where the Administration Server is running, assigned to ethX:Y, available in BIHOST1 and BIHOST2.
Oracle WebLogic Server and Oracle Fusion Middleware components have been installed in BIHOST2 as described in the specific configuration chapters in this guide.
Specifically, both host computers use the exact same path to reference the binary files in the Oracle home.
The following procedure shows how to fail over the Administration Server to a different node (BIHOST2). Note that even after failover, the Administration Server will still use the same Oracle WebLogic Server machine (which is a logical machine, not a physical machine).
This procedure assumes you’ve configured a per domain Node Manager for the enterprise topology. For more information, see About the Node Manager Configuration in a Typical Enterprise Deployment
To fail over the Administration Server to a different host:
Stop the Administration Server.
Stop the Node Manager in the Administration Server domain directory (ASERVER_HOME).
Migrate the ADMINVHN virtual IP address to the second host:
Run the following command as root on BIHOST1(where X:Y is the current interface used by ADMINVHN):
/sbin/ifconfig ethX:Y down
Run the following command as root on BIHOST2:
/sbin/ifconfig <interface:index> ADMINVHN netmask <netmask>
For example:
/sbin/ifconfig eth0:1 100.200.140.206 netmask 255.255.255.0
Note:
Ensure that the netmask and interface to be used to match the available network configuration in BIHOST2.
Update the routing tables using arping
, for example:
/sbin/arping -q -U -c 3 -I eth0 100.200.140.206
Start the Node Manager in the Administration Server domain home on BIHOST2.
Start the Administration Server on BIHOST2.
Test that you can access the Administration Server on BIHOST2 as follows:
Ensure that you can access the Oracle WebLogic Server Administration Console using the following URL:
http://ADMINVHN:7001/console
Check that you can access and verify the status of components in Fusion Middleware Control using the following URL:
http://ADMINVHN:7001/em
After you perform a manual failover of the Administation Server, it is important to verify that you can access the Administration Server, using the standard administration URLs.
From the load balancer, access the following URLs to ensure that you can access the Administration Server when it is running on BIHOST2:
http://admin.example.com/console
This URL should display the WebLogic Server Administration console.
http://admin.example.com/em
This URL should display Oracle Enterprise Manager Fusion Middleware Control.
This section describes how to enable SSL communication between the middle tier and the hardware load balancer.
Note:
This steps are applicable if the hardware load balancer is configured with SSL and the front end address of the system has been secured accordingly.
In an enterprise deployment, there are scenarios where the software running on the middle tier must access the front-end SSL address of the hardware load balancer. In these scenarios, an appropriate SSL handshake must take place between the load balancer and the invoking servers. This handshake is not possible unless the Administration Server and Managed Servers on the middle tier are started using the appropriate SSL configuration.
This section describes the procedure for creating self-signed certificates on BIHOST1. Create these certificates using the network name or alias of the host.
The directory where keystores and trust keystores are maintained must be on shared storage that is accessible from all nodes so that when the servers fail over (manually or with server migration), the appropriate certificates can be accessed from the failover node. Oracle recommends using central or shared stores for the certificates used for different purposes (for example, SSL set up for HTTP invocations). In this case, BIHOST2 uses the cert directory created for BIHOST1certificates.
For information on using trust CA certificates instead, see the information about configuring identity and trust in Oracle Fusion Middleware Securing Oracle WebLogic Server.
About Passwords
The passwords used in this guide are used only as examples. Use secure passwords in a production environment. For example, use passwords that include both uppercase and lowercase characters as well as numbers.
To create self-signed certificates:
This section describes how to create an Identity Keystore on BIHOST1.example.com.
In previous sections you have created certificates and keys that reside in a shared storage. In this section, the certificate and private key for both BIHOST1 and ADMINVHN are imported into a new Identity Store. Make sure that you use a different alias for each of the certificate/key pair imported.
Note:
The Identity Store is created (if none exists) when you import a certificate and the corresponding key into the Identity Store using the utils.ImportPrivateKey
utility.
To create the Trust Keystore on BIHOST1.example.com.
For the SSL handshake to behave properly, the load balancer's certificate needs to be added to the WLS servers trust store. For adding it, follow these steps:
Alternatively, you can use the setUserOverrides.sh
file to place these options, this way they will not get overwritten when the domain's scripts are extended with the configuration wizard or updated with unpack operations. For more information, see "Customizing Domain Wide Server Parameters" in Administering Server Startup and Shutdown for Oracle WebLogic Server.
To configure the Node Manager to use the custom keystores, add the following lines to the end of the nodemanager.properties
files located both in ASERVER_HOME
/nodemanager
and MSERVER_HOME
/nodemanager
directories in all nodes:
KeyStores=CustomIdentityAndCustomTrust CustomIdentityKeyStoreFileName=Identity KeyStore CustomIdentityKeyStorePassPhrase=Identity KeyStore Passwd CustomIdentityAlias=Identity Key Store Alias CustomIdentityPrivateKeyPassPhrase=Private Key used when creating Certificate
Make sure to use the correct value for CustomIdentityAlias
for Node Manager's listen address. For example on BIHOST1, use appIdentity2 according to the steps in Creating a Trust Keystore Using the Keytool Utility
(appIdentity2 mapped to the BIHOST1 listen address). Example for Node 1: KeyStores=CustomIdentityAndCustomTrust CustomIdentityKeyStoreFileName=KEYSTORE_HOME/appIdentityKeyStore.jks CustomIdentityKeyStorePassPhrase=password CustomIdentityAlias=appIdentity1 CustomIdentityPrivateKeyPassPhrase=password
The passphrase entries in the nodemanager.properties
file are encrypted when you start Node Manager as described in "Starting the Node Manager on BIHOST1." For security reasons, minimize the time the entries in the nodemanager.properties
file are left unencrypted. After you edit the file, start Node Manager as soon as possible so that the entries are encrypted.
To configure the identity and trust keystores:
This section provides guidelines for making sure you back up the necessary directories and configuration data for an Oracle Business Intelligence enterprise deployment.
Note:
Some of the static and run-time artifacts listed in this section are hosted from Network Attached Storage (NAS). If possible, backup and recover these volumes from the NAS filer directly rather than from the application servers.
For general information about backing up and recovering Oracle Fusion Middleware products, see the following sections in Administering Oracle Fusion Middleware:
Table 13-1 lists the static artifacts to back up in a typical Oracle Business Intelligence enterprise deployment.
Table 13-1 Static Artifacts to Back Up in the Oracle Business Intelligence Enterprise Deployment
Type | Host | Tier |
---|---|---|
Database Oracle home |
DBHOST1 and DBHOST2 |
Data Tier |
Oracle Fusion Middleware Oracle home |
WEBHOST1 and WEBHOST2 |
Web Tier |
Oracle Fusion Middleware Oracle home |
BIHOST1 and BIHOST2 |
Application Tier |
Installation-related files |
WEBHOST1, WEHOST2, and shared storage |
N/A |
Table 13-2 lists the runtime artifacts to back up in a typical Oracle Business Intelligence enterprise deployment.
Table 13-2 Run-Time Artifacts to Back Up in the Oracle Business Intelligence Enterprise Deployment
Type | Host | Tier |
---|---|---|
Administration Server domain home (ASERVER_HOME) |
BIHOST1 and BIHOST2 |
Application Tier |
Application home (APPLICATION_HOME) |
BIHOST1 and BIHOST2 |
Application Tier |
Oracle RAC databases |
DBHOST1 and DBHOST2 |
Data Tier |
Scripts and Customizations |
BIHOST1 and BIHOST2 |
Application Tier |
Deployment Plan home (DEPLOY_PLAN_HOME) |
BIHOST1 and BIHOST2 |
Application Tier |
Singleton Data Directory (SDD) |
BIHOST1 and BIHOST2 |
Application Tier |