Before You Begin
This 15-minute tutorial shows you how to access the Cloud Manager instance from a local Linux or Microsoft Windows computer.
Background
The Cloud Manager stack includes a instance configuration ("bootstrap") script that runs in the VM for the Cloud Manager instance after the Resource Manager Apply job completes successfully. The instance can be accessed from a Microsoft Windows machine using an SSH client such as PuTTY, or directly from a Linux machine.The method that you use depends upon the way you set up the virtual cloud network.
This is the eleventh tutorial in the Install PeopleSoft Cloud Manager series. Read the tutorials in the order listed. The optional tutorials offer alternate methods for setup.
- Prepare to Install PeopleSoft Cloud Manager
- Verify Oracle Cloud Account Information for PeopleSoft Cloud Manager
- Plan the Virtual Cloud Network for PeopleSoft Cloud Manager (Optional)
- Create a Virtual Cloud Network for PeopleSoft Cloud Manager in the Oracle Cloud Infrastructure Console (Optional)
- Use Custom or Private Network Resources with PeopleSoft Cloud Manager (Optional)
- Create a Custom Linux Image for PeopleSoft Cloud Manager (Optional)
- Create a Custom Windows Image for PeopleSoft Cloud Manager in Oracle Cloud Infrastructure (Optional)
- Create Vault Resources for Password Management for PeopleSoft Cloud Manager
- Generate API Signing Keys for PeopleSoft Cloud Manager
- Install the PeopleSoft Cloud Manager Stack with Resource Manager
- Log in to the Cloud Manager Instance
- Specify Cloud Manager Settings
- Use File Storage Service for PeopleSoft Cloud Manager Repository
- Manage Cloud Manager Users, Roles, and Permission Lists
- Configure a Web Proxy for PeopleSoft Cloud Manager (Optional)
- Create a Load Balancer in Oracle Cloud Infrastructure for PeopleSoft Cloud Manager Environments (Optional)
- Create Defined Tags in Oracle Cloud Infrastructure for PeopleSoft Cloud Manager (Optional)
- Create Data Science Resources for Auto Scaling in PeopleSoft Cloud Manager (Optional)
Log In To the Cloud Manager Instance VM from a Linux or UNIX System
Use these instructions if the Cloud Manager instance resides in a public subnet. To access the instance from a Linux or UNIX computer:
- Get the IP address for the Cloud Manager instance from the
instance details page using one of these methods:
- From the Resource Manager Apply job (Resource Manager > Stack > Stack Details > Job Details), select Outputs, and then copy cm_http_url.
- From the Oracle Cloud Infrastructure home page, click the menu icon at the top left, and select Compute > Instances. Select your compartment, and view the instance details page. The Instance information page includes the Public IP Address.
- Enter the following command:
ssh -i <path_to_private_key_file>/<private_key_name> -o ServerAliveInterval=5 -o ServerAliveCountMax=1 opc@<public_ip_address_of_instance>
- If you entered a passphrase when creating your SSH key pair, enter the passphrase when prompted.
- The first time you connect to your instance, the SSH utility prompts you to confirm the public key. In response to the prompt, enter yes.
Log In To the Cloud Manager Instance VM from a Microsoft Windows System
Use these instructions if the Cloud Manager instance resides in a public subnet. To access the instance from a Microsoft Windows computer:
- Get the IP address for the Cloud Manager instance from the
instance details page using one of these methods:
- From the Resource Manager Apply job (Resource Manager > Stack > Stack Details > Job Details), select Outputs, and then copy cm_http_url.
- From the Oracle Cloud Infrastructure home page, click the menu icon at the top left, and select Compute > Instances. Select your compartment, and view the instance details page. The Instance information page includes the Public IP Address.
- Start PuTTY. The PuTTY Configuration window is displayed, showing the Session panel.
- In the Host Name (or IP address) field, enter the public IP address of your instance.
- In the Connection type field, select SSH
if it is not already selected.
Description of this illustration (putty_login3.png) -
In the Category pane, click Connection. Enter 5 in the Seconds between keepalives (0 to turn off) text box.
Description of this illustration (putty_login4.png) - In the Category pane, expand SSH, and then click Auth. The Auth panel is displayed.
- In the Private key file for authentication
field, click Browse and select the private key
file that you saved earlier, mykey.ppk in this
example.
Description of this illustration (putty_login6.png) - In the Category tree, click Session.
The Session panel is displayed.
- In the Saved Sessions field, enter a name for this connection configuration, and then click Save.
- Click Open to open the connection.
The PuTTY Configuration window is closed and the PuTTY window is displayed.
- When prompted for a user name, enter opc.
- Enter the passphrase you had provided for your SSH key pair.
- The first time you connect to your instance, the PuTTY Security Alert window is displayed, prompting you to confirm the public key. Click Yes to continue.
Set Up SSH Access to a Private Cloud Manager Instance Through a Bastion
If you created Network resources, private or public subnets, and an OCI bastion as part of the Cloud Manager installation, use these instructions to set up a managed SSH session (SSH tunnel) to a Cloud Manager private subnet through a bastion. The SSH access lasts until you close the Bash shell or git bash shell, as long as the bastion session is active.
For more information on creating and using bastions, see the Oracle Cloud Infrastructure documentation for the Bastion service.
You must supply an SSH private key in the OpenSSH format for these commands. If you created an SSH private key in PuTTY in the RSA format, convert it to the OpenSSH format, as follows:
- Open the PuTTY generator and load the current private key.
- Select Conversions > Export OpenSSH key.
- Save the file, and make a note of the full path and key name.
Note:
If you want to distinguish this private key from the private key that you use with PuTTY, you can save the file to a different name. You cannot use this version of the key with PuTTY. - Use the newly exported key in the command to create the SSH tunnel.
To set up SSH access with the bastion:
- In the Compute console, click the menu icon at the top left, and select Compute, then Instances.
- If necessary, select your compartment, and locate the Cloud Manager instance.
- Select the Oracle Cloud Agent tab, and verify that the Bastion
plugin has been enabled. If it is not enabled, turn it on.
The Resource Manager Apply job for the Cloud Manager instance enables the Bastion plugin by default. If you are using these instructions to access a PeopleSoft provisioned environment, you may need to enable the Bastion plugin. It will take a little time to become active.
Description of this illustration (ssh_access_instance_details_bastion_enabled.png) - Select Resource Manager, then Stacks, and locate the Cloud Manager stack.
- On the Stack Details page for the Cloud Manager instance, select the Apply job.
- On the Job Details page, select Outputs from the Resources list on the left, and make a note of the bastion name.
- Select Identity & Security, then Bastion, and locate the bastion.
- If there is no active session, click Create Session.
- Select Managed SSH session from the Session type drop-down list.
- Enter a name for the session, or accept the default.
- Enter opc for the Username.
- If necessary, change the compartment, and select the Cloud Manager instance from the Compute instance drop-down list.
- Supply the public SSH key by browsing to the key file, pasting
the text for the key file, or generating a new key pair.
Description of this illustration (ssh_access_create_managed_session.png) - Click Create session.
- Wait until the session state is Active. Click the Actions icon
and select Copy SSH command.
Description of this illustration (ssh_access_copy_ssh_command.png) - Paste the command in a text editor, and replace
<privateKey> with the full path and key name to the
OpenSSH-formatted key.
Be sure to replace both instances of <privateKey> in the command.
- In a Bash shell (Linux) or a git bash shell (Microsoft Windows),
enter the edited command to create the ssh connection to the Cloud
Manager instance.
If you created a passphrase when generating the private key, you will be prompted to enter it.
Note:
If you are unable to connect, it may be due to the version of git bash you are using. See the workaround at the end of this section. - To verify the current path after you access the Cloud Manager
instance, enter pwd.
$ pwd
/home/opc - To leave the Cloud Manager instance and return to the Bash shell or git bash shell prompt, type exit.
Tip:
In the Bash or git bash shell, in case of error, use CTRL+c to terminate a command.Note:
One way to verify the SSH tunnel connection is to use the following command and look for "tunnel" in the output:ps -ef | grep ssh
With some versions of git bash, you may see an error message such as "Unable to negotiate with <port number>" when you enter the command to create the SSH connection. Use these steps to avoid the error.
- Make a note of the bastion host from the SSH command that you
copied after creating the session (step 15). In this sample
command, it would be the text in bold beginning host.bastion.
ssh -i <privateKey> -o ProxyCommand="ssh -i <privateKey> -W %h:%p -p 22 ocid1.bastionsession.oc1.us-ashburn-1.xxxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com" -p 22 opc@xx.x.x.xx
- In the git-bash shell, change to the user's home directory:
$ cd ~
- Make a new directory called ".ssh" under the home directory:
$ mkdir .ssh
- Change to the .ssh directory.
$ cd .ssh
- Create a file called config; for example using vi or another
editor:
$ vi config
Tip:
Review the usage withvi --help
. - Add these contents to the file and save.
Host <bastion host>
User opc
PubkeyAcceptedAlgorithms +ssh-rsa
HostkeyAlgorithms +ssh-rsaFor <bastion host> enter the information from the SSH command; for example:
Host host.bastion.us-ashburn-1.oci.oraclecloud.com
User opc
PubkeyAcceptedAlgorithms +ssh-rsa
HostkeyAlgorithms +ssh-rsa - Enter the SSH command to access the Cloud Manager instance.
Alternatively, you can create the .ssh directory and config file in Windows File Explorer before using them in the git-bash shell.
- Make a note of the bastion host from the SSH command that you
copied after creating the session (step 15). In this sample
command, it would be the text in bold.
ssh -i <privateKey> -o ProxyCommand="ssh -i <privateKey> -W %h:%p -p 22 ocid1.bastionsession.oc1.us-ashburn-1.xxxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com" -p 22 opc@xx.x.x.xx
- In the git-bash shell, change to the user's home directory.
$ cd ~
- Determine the user's home directory.
$ pwd
/c/Users/username
The path /c/Users/username in the git-bash shell corresponds to C:\Users\username in Windows File Explorer.
- In Windows File Explorer, go to C:\Users\username and create the .ssh directory.
- Go to the C:\Users\username\.ssh directory.
- Using Notepad or another text editor, create the config file
with these contents, and save.
Host <bastion host>
For <bastion host> enter the information from the SSH command; for example:
User opc
PubkeyAcceptedAlgorithms +ssh-rsa
HostkeyAlgorithms +ssh-rsa
Host host.bastion.us-ashburn-1.oci.oraclecloud.com
User opc
PubkeyAcceptedAlgorithms +ssh-rsa
HostkeyAlgorithms +ssh-rsa - Go to the git-bash shell and run the SSH command to access the Cloud Manager instance.
Monitor the Cloud Manger Configuration Process and Review the Log Files
Monitor the configuration process status by reviewing the log file /home/opc/bootstrap/CloudManagerStatus.log.
- Access the Cloud Manager instance in a Linux terminal window or with PuTTY.
- To view the end of the log file, enter this command:
$ tail /home/opc/bootstrap/CloudManagerStatus.log
- In case you want to review other log files, use these commands
to navigate.
Enter pwd to verify the current directory.
$ pwd
/home/opc
- Change to the /home/opc/bootstrap directory.
$ cd bootstrap
- To view the files and directories in /home/opc/bootstrap, enter
ls.
$ ls
The configuration process takes several minutes. When the process completes successfully, the same log file includes the Cloud Manager URL to sign in to the PeopleSoft Pure Internet Architecture (PIA) in a browser.
Other log files include the following:
- /home/opc/bootstrap/CloudManagerStatus.log — Input logs for the Cloud Manager Instance Configuration wizard
- /home/opc/bootstrap/psft_oci_setup.log — Cloud Manager provisioning log
- /home/opc/bootstrap/cmpatch/logs/cmpatch_apply.log — Contains details on the steps for the download process for Cloud Manager update patch files
- /home/psadm2/psft/data/cloud/cmlogs/BOOTSTRAP_LOGS/* — PeopleSoft Cloud Administrator logs related to processes such as file server creation
- /opt/oracle/psft/dpks/setup/psft_dpk_setup.log — Detailed Puppet log for the Cloud Manager installation.
For more information, see PeopleSoft Cloud Manager for Oracle Cloud Infrastructure, "Cloud Manager Logs." Select Online Help (HTML) or PeopleBooks (PDF) on the PeopleSoft Cloud Manager page on the Oracle Help Center.
Copy the Log Files from the VM to a Windows Computer (Optional)
If you want to copy the log files to a Microsoft Windows computer, use a secure copy or secure FTP utility such as those associated with Putty.
For example, to transfer the files using the PSCP utility in PuTTY:
- Create a saved session in PuTTY to connect to the Cloud Manager Linux instance.
- Make a note of the path to your Putty installation on your laptop (for example, C:\Program Files (x86)\PuTTY).
- Make a note of the path on the Linux VM with the files you want to copy, and the path on your laptop where you want to save them.
- Open a command prompt and make a note of your PATH environment
variable.
To list the environment variables, enter the command
set.
Copy the contents of PATH to Notepad or elsewhere as a backup. - In the command prompt, append the path to the PuTTY
installation to the beginning of your PATH. For example:
set PATH=C:\Program Files (x86)\PuTTY;%PATH%
Note:
This environment variable setting only lasts until the command window closes. -
Use this command to connect to the session with user opc, and copy files from the source Linux VM to the target Microsoft Windows computer:
pscp –l <user> <session name>:<source> <target>
-
Enter the passphrase for the SSH key at the prompt.
>pscp -l opc cm-oci-infodev:/home/opc/bootstrap/psft_oci_setup.log C:\user\CloudManager\target
Passphrase for key "rsa-key-psft":
psft_oci_setup.log | 1142 kB | 1142.5 kB/s | ETA: 00:00:00 | 100%
Next Steps
Specify Cloud Manager Settings
Learn More
- PeopleSoft Cloud Manager Home Page, My Oracle Support, Doc ID 2231255.2
- Cumulative Feature Overview Tool (Click Generate a CFO report and select PeopleSoft Cloud Manager at the top.)
- Oracle Cloud Documentation in Oracle Help Center
Log in to the Cloud Manager Instance
F26266-09
January 2024
Copyright © 2024, Oracle and/or its affiliates.
Access the Cloud Manager instance from a local Linux or Windows computer.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms governing the U.S. Government's use of Oracle cloud services are defined by the applicable contract for such services. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.