6 Installing Network Integrity
This chapter describes how to install Oracle Communications Network Integrity 8.0. Before installing Network Integrity, read these chapters:
Methods to Install Network Integrity
Network Integrity installation can be performed in two ways:
-
Installation in Interactive Mode. See "Installing Network Integrity Using Interactive Install" for more information.
-
Installation in Silent Mode. See "Installing Network Integrity in Silent Mode".
Caution:
If the installation fails for some reason, you must create a new WebLogic domain and a new database schema before you begin installation again.
See "Installing and Configuring the Oracle Database" and "Installing and Configuring Oracle WebLogic Server" for more information.
Caution:
The Network Integrity Installer must be launched from the same system as the one hosting the Administration server of your domain.
Installing Network Integrity Using Interactive Install
To run the Network Integrity installer, the Java Runtime Environment (JRE) must already be installed. See "Required Software" for more information about the required Java version.
To install Network Integrity:
-
Create a directory (dir).
-
Download the Network Integrity Installer software from the Oracle software delivery website:
and save it to dir:
-
Export JDK Home by running one of the following command. See Software Requirements for JDK version information.
export JAVA_HOME=$JDK_HOME
-
Run the Oracle Nextgen Network Integrity Installer using the following command:
java -jar NetworkIntegrityInstaller_{release}.jar
where jre_Path contains the jre folder inside the Java Development Kit (JDK) installation directory.
The Installer Welcome screen appears.
-
Click Next.
-
One of the following screens is displayed:
-
If Network Integrity is the first Oracle product that you are installing on the system, the Specify Inventory directory and credentials screen appears. Enter the full path of the inventory directory, select the Operating System group name, and then click Next.
The Select Installation Type screen appears. Continue with step 7.
Note:
The inventory directory manages all Oracle products installed on your system.
-
If you have installed any Oracle products on the system prior to installing Network Integrity, the Installation Location Screen appears appears. Continue with step 7.
-
-
In NI_Home field, enter or browse the path to the folder where you want to install Network Integrity and click Next.
The Installation Type Screen appears.
-
Select Complete and click Next.
The WebLogic Administration Server Connection Information screen appears.
-
Do the following:
-
In the Host Name field, enter the IP address or the host name of the Administration Server.
-
In the Port Number field, enter the Administration Server port number.
-
In the User Name field, enter user name with which you connected to the Administration Server.
Note:
This user should belong to the WebLogic Administrator's group.
-
In the Password field, enter the password for the user name that you provided in the User Name field.
-
Select or deselect the Use SSL checkbox based on your business need.
-
In the Keystore field, enter the keystore location if the Use SSL check box is selected.
Note:
You can configure an SSL certificate based on any specific requirements. If necessary, you can create a custom certificate and apply it to your domain before installing Network Integrity. For more information, see "Configuring the SSL Policy and SSL Certificate" section in Network Integrity System Administrator's Guide. -
Click Next.
The Target Selection screen appears.
-
-
Select the option for the server, or cluster, where you want to deploy Network Integrity, and click Next.
The DB Type Selection Page appears.
Note:
If you select a managed server, ensure that all the managed servers are running. -
In the Database Type Selection screen, do one of the following.
-
Select the Standard Oracle Enterprise Database option.
The Standard DB Connection screen appears.
Do the following:
-
In the Host Name field, enter the IP address or the host name of the system where the database server is installed.
-
In the Port Number field, enter the port number with which the installer connects to the database server.
-
In the User Name field, enter the user name of the database SYSDBA User.
-
In the Password field, enter the password for the user name that you provided in the User Name field.
-
In the Service name field, enter the service name that uniquely identifies your database on the system.
-
Click Next.
The Network Intgrity Schema Table Creation screen appears.
-
-
Select the Oracle Real Application Cluster Database option.
The RAC DB Nodes Connection Information screen appears.
Do the following:
-
In the RAC Database Connection String field, enter the connection details to connect to the Oracle RAC database.
For example:
HOST NAME1:PORT1:SERVICE NAME1, HOST NAME2:PORT2:SERVICE NAME2
-
In the User Name field, enter the user name for the Oracle RAC database SYSDBA user.
-
In the Password field, enter the password for the user name that you provided in the User Name field.
-
Click Next.
The NI Schema Table Creation screen appears.
-
-
- Select Yes Option and click Next.
The MDS Schema User Connection screen appears.
-
In MDS Schema User Connection, do the following:
Note:
Ensure that the schema owner has an associated MetaData Services (MDS) schema.
Caution:
You must use the same user name and password that you created during the MetaData schema creation. See "Creating the Database (MetaData) Schema for Network Integrity" for more information.
-
In the Schema User Name field, enter the name for the MDS schema user.
-
In the Schema User Password field, enter the password for the MDS schema user to access the schema.
-
Click Next.
The Security Provider Selection screen appears.
-
-
Select the type of security provider you want to use by performing one of the following steps:
-
If you select Embedded_LDAP option,the Admin User Creation screenappears.
Do the following (Optional):
- In the UserName field, enter the user name for the Network
Integrity user.
This user accesses and uses Network Integrity.
- In the Password field, define a password for the Network
Integrity user.
Note:
The password requirements for the Network Integrity user is as follows:- Password length must be between 8 to 12 characters.
- It should contain at least one uppercase letter, one lowercase letter, one number and one special character.
- It must not contain the username either directly or in reverse
- You may use a character 3 times in a row maximum, but not more than 4 times in total.
In the Confirm Password field, enter the password again to confirm it.
-
Click Next.
The Internal user Creation screen appears.
- In the UserName field, enter the user name for the Network
Integrity user.
-
If you select External Security Provider, the External Security Provider Connection Information screen appears.
Do the following:
-
In the LDAP Server Host Name field, enter the host name for the external LDAP server.
-
In the LDAP Server Port Number field, enter the port number for the external LDAP server.
-
In the LDAP Server User Name field, enter the user name for the external LDAP server.
-
In the LDAP Server Password field, enter the password for the external LDAP server.
-
In the User Base DN field, enter the user base DN.
-
In the Group Base DN field, enter the group base DN.
-
Click Next.
The Internal user Creation screen appears.
-
-
If you select Other Security Provider, and click Next.
The Disable unsecured Port screen appears.
Skip to step 16.
-
-
In the Internal user Creation, do the following:
-
In the User Password field, define a password for the Network Integrity internal user.
Note:
The password requirements for the Network Integrity internal user is as follows:- Password length must be between 8 to 12 characters.
- It should contain at least one uppercase letter, one lowercase letter, one number and one special character.
- It must not contain the username either directly or in reverse
- You may use a character 3 times in a row maximum, but not more than 4 times in total.
In the Confirm The User Password field, enter the password again to confirm it.
-
Click Next.
The Disable Unsecured Listen Port screen appears.
-
-
Select whether to disable the unsecured listen port by doing one of the following:
-
Select Yes if you are configuring Network Integrity to communicate and listen over SSL-enabled ports only by disabling Non-SSL Ports.
-
Select No if you are not configuring Network Integrity to communicate and listen over both SSL and Non-SSL ports.
-
-
Click Next.
The Java Home Location screen appears.
-
Accept the default settings, then click Next.
The Installation Summary screen appears.
-
Review the content in the summary and click Next.
The Installation Progress Screen appears.
-
You can view the installation progress.
Note:
During the installation progress, two popup messages will appear.
The first popup message asks for the confirmation to stop the WebLogic Servers, click OK.
The second popup message gives the order in which the servers should be restarted manually.
On successful installation of Network Integrity, the Installation Complete screen appears.
-
Click Exit to close the Installation Wizard.
- Open the following file once the installation is complete, to get the URL to access
Network Integrity: NI_Home/install/readme.txt.
For example: /opt/integrity/Oraclecommunications/install/readme.txt
-
To start the server, do the following:
-
To start the AdminServer, use the following command:
./startNI.sh
-
To startt the managed servers, use the following command:
./startNI.sh cluster_managed_server_name admin_server_URL
-
For information on verifying the successful installation of Network Integrity, see "Verifying the Network Integrity Installation".
After verifying the successful installation, perform the required post-installation actions. See Network Integrity Post-Installation Tasks for more information.
Installing Network Integrity in Silent Mode
Use silent install mode when you are installing Network Integrity using the same configuration repeatedly. Silent install mode does not use the GUI and it runs in the background.
About the Response File
The Network Integrity installer uses a response file, which contains a pre-defined set of values, such as server connection details. The response file comes in a template form, to install Network Integrity in silent mode.
The oracle.communications.integrity.rsp response file template comes as part of the Network Integrity installation package.
The response file templates contain all the fields that the installer requires performing installation in silent mode.
When you extract the installer JAR file, the response file templates are saved in the Response directory at the following location: Disk1/storage/Response.
Table 6-1 presents the Network Integrity response file template properties, along with the values that should be specified for a complete installation scenario.
Note:
Before using the response file, ensure that any optional properties or values not required by the installer are left empty.
Table 6-1 Network Integrity Response File Template Properties
Response File Template Name | Property Name | Description (with Default Values) |
---|---|---|
Installation Location Details (Required) | ORACLE_HOME | Directory path where the NI application will be installed. |
Installation Type Details (Required) | INSTALLATION_TYPE | Type of installation (Allowed values: Complete or Upgrade).
Set to "Complete" for a fresh installation. |
WebLogic Admin Server Connection Details (Required) | APP_ADMIN_HOST | Host name or IP address of the WebLogic Admin Server. |
WebLogic Admin Server Connection Details (Required) | APP_ADMIN_PORT | Port number for the WebLogic Admin Server (values provided must be enclosed in double
quotes).
For SSL-based deployment, provide the SSL port value and specify the keystore file location in the APP_SERVER_KEYSTORE property. |
WebLogic Admin Server Connection Details (Required) | APP_SERVER_USER | Username for the WebLogic Admin Server. |
WebLogic Admin Server Connection Details (Required) | APP_SERVER_PASSWD | Password for the WebLogic Admin Server. |
WebLogic Admin Server Connection Details (Required) | APP_SERVER_KEYSTORE | Path to the keystore file required for SSL-based deployment.
Example:, certs/Keystore.jks |
Target Selection Details (Required) | APP_TARGET_NAME | Name of the target (such as AdminServer or CL1) where the NI application will be installed. |
Database Selection Details (Required) | DATABASE_TYPE | Type of database used.
Accepted values: Standard Oracle Enterprise Database or Oracle Real Application Cluster Database |
Standard DB Details (Required only if DATABASE_TYPE = Standard Oracle Enterprise Database) | DB_HOST_NAME | Host name of the standard Oracle database. |
Standard DB Details (Required only if DATABASE_TYPE = Standard Oracle Enterprise Database) | DB_HOST_PORT | Port number of the standard Oracle database (enclose in double quotes). |
Standard DB Details (Required only if DATABASE_TYPE = Standard Oracle Enterprise Database) | DB_USER_NAME | Username with SYSDBA privileges for the standard Oracle database. |
Standard DB Details (Required only if DATABASE_TYPE = Standard Oracle Enterprise Database) | DB_PASSWORD | Password for the SYSDBA user of the standard Oracle database. |
Standard DB Details (Required only if DATABASE_TYPE = Standard Oracle Enterprise Database) | DB_SERVER_SERVICE | Service name of the standard Oracle database. |
RAC DB Details (Required only if DATABASE_TYPE = Oracle Real Application Cluster Database) | RAC_CONNECTION_STRING | Connection string details for Oracle RAC in the format:
HostName1:Port1:Service1,HostName2:Port2:Service2 |
RAC DB Details (Required only if DATABASE_TYPE = Oracle Real Application Cluster Database) | RAC_SERVER_USER | Username for connecting to the Oracle RAC database |
RAC DB Details (Required only if DATABASE_TYPE = Oracle Real Application Cluster Database) | RAC_SERVER_PASSWORD | Password for the Oracle RAC database server. |
NI Schema Table Creation (Required only if INSTALLATION_TYPE=Complete) | DB_SCHEMA | Flag to indicate whether to create the app schema table
Allowed values: “true” or “false”). For fresh installation, provide “true”. |
MDS Schema Information Details (Required ) | SCHEMA_OWNER_NAME | Username for the MDS (Metadata Services) schema created using RCU utility. |
MDS Schema Information Details (Required ) | SCHEMA_OWNER_PASSWD | Password for the MDS (Metadata Services) schema user. |
Security Provider Selection Details | SECURITY_PROVIDER_NAME | Type of security provider to select.
Allowed values: Embedded_LDAP or External_LDAP |
Embedded LDAP Details (User creation is optional; values can be left empty even if SECURITY_PROVIDER_NAME is set to Embedded LDAP) | LDAP_USER_NAME | Username to be created in the embedded LDAP directory. |
Embedded LDAP Details (User creation is optional; values can be left empty even if SECURITY_PROVIDER_NAME is set to Embedded LDAP) | LDAP_PASSWD | Password for the newly embedded LDAP user.
Note: The password requirements are
as follows.
|
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_SERVER_HOST | Host name of the external LDAP server. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_SERVER_PORT | Port number of the external LDAP server. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_SERVER_USER | Username for connecting to the external LDAP server. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_SERVER_PASSWORD | Password for the external LDAP server user. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_USER_BASE_DN | User BASE DN information of external LDAP server. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_GROUP_BASE_DN | Group BASE DN information of external LDAP server. |
External LDAP Details (Required only if SECURITY_PROVIDER_NAME=External LDAP) | LDAP_SERVER_KEYSTORE | Path to the keystore file for the external LDAP server (e.g., certs/externalLDAPKeystore.jks). |
NI Internal user Details (Required) | LDAP_DEF_USER_PASSWD |
Password for the NI internal user. Note: The password requirements are as follows.
|
Disable Non-SSL Port Option (Required) | DISABLE_NONSSLPORT | Option to disable the non-SSL port (Allowed Values: set to “true” to disable, or “false” to keep enabled). |
Note:
- Before using the response file, ensure that any optional properties or values not required by the installer are left empty.
- You can configure an SSL certificate based on any specific requirements. If necessary, you can create a custom certificate and apply it to your domain before installing Network Integrity. For more information, see "Configuring the SSL Policy and SSL Certificate" section in Network Integrity System Administrator's Guide.
Starting Silent Mode Installation
Before you begin installing Network Integrity in silent mode, ensure that you have provided all required input values in the response file template.
To install Network Integrity in silent mode:
- Export JDK Home by running one of the following command, See Software Requirements for JDK version
information:
export JAVA_HOME=$JDK_HOME
-
Use the following command to start the silent installer,here absolute_path is the fully qualified response file location:
java -jar NetworkIntegrityInstaller_{release}.jar -responseFile {absolute_path}
The installation runs silently in the background.
Note:
The installer shuts down all of the servers, including the Administration Server and the Managed Servers, after a silent installation. Start all of the servers manually after the installation is complete.
- At the end of the installation, the command window displays the location of the installer log files. Users can review these logs located at oraInventory/logs to verify that the installation was successful.
- Start the AdminServer, using the following
command:
./startNI.sh
- Start the managed servers, using the following
command:
./startNI.sh cluster_managed_server_name admin_server_URL
-
Open the following file once the installation is complete, to get the URL to access Network Integrity:
NI_Home/install/readme.txt
For example: /opt/integrity/Oraclecommunications/install/readme.txt
-
Copy the URL and paste it in the browser window's address field and press Enter to access Network Integrity.
You can now access the Network Integrity application.
For information on verifying the successful installation of Network Integrity, see "Verifying the Network Integrity Installation".
After verifying a successful installation, perform the required post-installation actions. See Network Integrity Post-Installation Tasks for more information.