Base Installation:
Make sure you read the Artesia 68 instllation guide before you proceed
upload Artesia_DAM_6.8_Sol.iso to /public
# lofiadm -a /public/artesia/Artesia_DAM_6.8_Sol.iso
/dev/lofi/1
# mkdir /mnt/cd
# mount -o ro -f hsfs /dev/lofi/1 /mnt/cd
install oracle client - select administrator option
make sure you tnsnames.ora configured which points to the right DB
Also make sure lsnrctl is running on the DB server
create artesia user and make in part of dam group
# export ORACLE_HOME=/home/oracle/product/10.2.0/Db_1
Add ORACLE_HOME, ORACLE_HOME/bin and LD_LIBRARY_PATH in artesia user account
check the connectivity with the ORACLE SID using artesia user
change permission on /opt/artesia as artesia:dam
goto
# cd /mnt/cd/disk1/instdata/vm
start installation as artesia user
artesia$ ./install.bin
or
try always doing as console install
artesia$ ./install.bin -i console -f artesia-config.txt
Resolving LLDS issues:
#1. make sure you install artesia direcly login to the server as artesia, no sudo to artesia
#2. after installation, make you source .profile again or re-login as artesia
#3. make iodbctest works with your DSN name
#4. also change /opt/artesia/Search/Spider/config/DSN.ini to point to your DSN
#5. make sure /opt/artesia/install/ant/build.cfg poitns to the correct DSN
#6. also check in .profile or .bash_profile it runs openlink.sh
Resolving classpath issue:
#1. /opt/artesia/jboss/server/teams/conf/jboss-service.xml
#2. /etc/system has these lines to set ulimit parameters
set rlim_fd_max=1024
set rlim_fd_cur=1024
Default login
tsuper:tsuper
Url
http://localhost:11090/teams
http://localhost:11090/teams/Admin.do?action=ShowLogin
LLDS url
http://localhost:11090/brs/
sqlplus artesia/artesia@xxxx
and run these scripts.
sh /home/artesia/builds/deploy.metadata.sql
(you may have set set escape \ while running @PopulateMD.sql)
sh /home/artesia/builds/deploy.transformer.sql
sh /home/artesia/builds/deploy.phase1.sql
Run llds database
sh /home/artesia/builds/deploy.llds.sh
Run ant customization and mkdir commands
sh /home/artesia/builds/deploy.Tresource.sh
sh /home/artesia/builds/deploy.mk_dir.sh
make sure the /usr/sfw/bin is in the path
start the app:
sh bin/artesia-process-manager.sh start
create this user
login-name: hotExporter
login-pass: hotExporter
----------------------------------------------
Artesia Env Variables:
TEAMS_HOME
TEAMS_REPOSITORY
TEAMS_SERVER_DEBUG
PATH=$TEAM_HOME/bin
Artesia start and stop:
artesia-process-manager.sh start
artesia-process-manager.sh stop
LLDS start and stop
startLLDS.sh
stopLLDS.sh
Using crypt for LDAP authentication:
/home/artesia/artesia68/bin/crypt.sh e ?5s-sH_FYi
3YKQ0UBlXcf4/5o5Xq2Kcw==
-----
User ID: $svc-mdcldap
path: ou=ServiceAccounts,ou=SpecialAccounts,ou=_PankajGautam,dc=pankajgautam,dc=com
PW: ?5s-sH_FYi (Question Five Sierra Dash Sierra Hotel Underscore Foxtrot Yankee India )
Tresource syntax:
[NC]"LDAP_SERVER_URL0"="ldap://ldap.domain.com:389"
[NC]"LDAP_SEARCH_NAME"="OU=users,OU=dotcom,DC=domain,DC=com"
[NC]"LDAP_SEARCH_PRINC"="ldap@pankajgautam.com"
[NC]"LDAP_SEARCH_PASS"="XXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
LDAP authentication:
- First read artesia security configuration section in Artesia Integrators guide
cd $TEAMS_HOME/install/ant
run ant enable-ldap-synchronization
Make sure you update tresource file according to your environment
==========
[SECURITY\LDAP_SYNCHRONIZATION]
"LDAP_PROVIDER_URL0"="ldap://ldap.domain.com:389"
"LDAP_SYNC_USER"="ldap@pankajgautam.com"
"LDAP_SYNC_PASS"="XXXXXXXXXXXXXXXXXXXX"
"LDAP_FIRSTNAME_ATTR"="givenName"
"LDAP_LASTNAME_ATTR"="sn"
"LDAP_LOGINNAME_ATTR"="userPrincipalName"
"LDAP_ROLE_ATTR"="extensionAttribute5"
"LDAP_GROUP_ATTR"="memberOf"
"LDAP_LAST_MODIFIED_ATTR"="whenChanged"
"CONTEXT_PROPERTIES"=
"LDAP_SEARCH_BASE"="OU=users,OU=dotcom,DC=domain,DC=com"
"LDAP_SEARCH_DISABLED_FILTER"="(&(objectClass=user)(extensionAttribute5=*)(!(userAccountControl=512)))"
"LDAP_SEARCH_ENABLED_FILTER"="(&(objectClass=user)(extensionAttribute5=*)(userAccountControl=512))"
"PROCESS_UPDATED_ONLY"="true"
"LDAP_DIRECTORY_ATTRIBUTES"="mail"
"LDAP_ARTESIA_ATTRIBUTES"="emailAddress"
"LDAP_MEMBEROF_GROUPS"=
"LDAP_ARTESIA_USER_GROUPS"=
#"LDAP_SEARCH_TIMEOUT"="5000"
"ARTESIA_USER"="ldap@pankajgautam.com"
"ARTESIA_PASS"="XXXXXXXXXXXXXXXXX"
"DEFAULT_ARTESIA_ROLE"="2"
"DEFAULT_ARTESIA_DEPARTMENT"=
"DEFAULT_ARTESIA_EMAILADDRESS"=
"DEFAULT_ARTESIA_EMAILENABLED"=
"DEFAULT_ARTESIA_PARTICIPANTROLE"=
"DEFAULT_ARTESIA_CANDIDATEUSERGROUPADMINISTRATOR"=
"DEFAULT_ARTESIA_CANDIDATESECURITYPOLICYADMINISTRATOR"=
"DEFAULT_ARTESIA_PREFERENCETEMPLATE"=
"DEAFULT_ARTESIA_PASS"=
===========
$TEAMS_HOME/bin/ldapsync.sh
Artesia repository
$TEAMS_HOME/data/repository-default but it configurable
/opt/artesia/data/repository
Artesia server configuration file
$TEAMS_HOME/data/cs/global/Tresource
$TEAMS_HOME/data/cs/global/commonProperties.xml
Log clean ups
$TEAMS_HOME/ear/artesia.ear/war/teams.war/images/previewCreator
$TEAM_HOME/archive
log file
$TEAM_HOME/logs/artesiaappserver.log
Log levels
app log level
set grep DEBUG
JBoss log level
$TEAMS_HOME/jboss/server/teams/conf/log4j.xml
JBoss high availability configuration
have we tested that
who has done this configuration
Artesia Tools and Utils
$TEAMS_HOME/RoleManager.sh
$TEAMS_HOME/Thesaurus.sh
Artesia Processes
brsnetd.exe - 1 (LLDS process)
llspider.exe - 1
perl.exe - 5
sulu.exe -2
LDAP configuration command:
ldapclient manual \
-a credentialLevel=proxy \
-a authenticationMethod=simple \
-a proxyDN=cn=ldap,cn=Users,dc=domain,dc=fds \
-a proxyPassword=xxxxx \
-a defaultSearchBase=dc=domain,dc=dom \
-a domainName=pankajgautam.com \
-a defaultServerList=ldap.domain.fds \
-a attributeMap=group:userpassword=userPassword \
-a attributeMap=group:memberuid=memberUid \
-a attributeMap=group:gidnumber=gidNumber \
-a attributeMap=passwd:gecos=cn \
-a attributeMap=passwd:gidnumber=gidNumber \
-a attributeMap=passwd:uidnumber=uidNumber \
-a attributeMap=passwd:homedirectory=unixHomeDirectory \
-a attributeMap=passwd:loginshell=loginShell \
-a attributeMap=shadow:shadowflag=shadowFlag \
-a attributeMap=shadow:userpassword=userPassword \
-a objectClassMap=group:posixGroup=group \
-a objectClassMap=passwd:posixAccount=user \
-a objectClassMap=shadow:shadowAccount=user \
-a serviceSearchDescriptor=passwd:dc=domain,dc=com?sub \
-a serviceSearchDescriptor=group:dc=domain,dc=com?sub
ldapsearch -h ldap.domain.fds -b "cn=users,dc=domain,dc=com" -o mech=gssapi -o authzid='' "cn=Pankaj Gautam"
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment