Go to main content
1/23
Contents
Title and Copyright Information
Preface
Audience
Conventions
Part I Understanding an Enterprise Deployment
1
Enterprise Deployment Overview
1.1
About the Enterprise Deployment Guide
1.2
When to Use the Enterprise Deployment Guide
2
Understanding a Typical Enterprise Deployment
2.1
Diagram of a Typical Enterprise Deployment
2.2
Understanding the Typical Enterprise Deployment Topology Diagram
2.2.1
Understanding the Firewalls and Zones of a Typical Enterprise Deployment
2.2.2
Understanding the Elements of a Typical Enterprise Deployment Topology
2.2.3
Receiving Requests Through Hardware Load Balancer
2.2.3.1
Purpose of the Hardware Load Balancer (LBR)
2.2.3.1.1
HTTP Requests from the Internet to the Web server instances in the Web tier
2.2.3.1.2
Specific internal-only communications between the components of the Application tier
2.2.3.2
Summary of the Typical Load Balancer Virtual Server Names
2.2.3.3
HTTPS versus HTTP Requests to the External Virtual Server Name
2.2.4
Understanding the Web Tier
2.2.4.1
Benefits of Using Oracle HTTP Server Instances to Route Requests
2.2.4.2
Alternatives to Using Oracle HTTP Server in the Web Tier
2.2.4.3
Configuration of Oracle HTTP Server in the Web Tier
2.2.4.4
About Mod_WL_OHS
2.2.5
Understanding the Application Tier
2.2.5.1
Configuration of the Administration Server and Managed Servers Domain Directories
2.2.5.2
Using Oracle Web Services Manager in the Application Tier
2.2.5.3
Best Practices and Variations on the Configuration of the Clusters and Hosts on the Application Tier
2.2.5.4
About the Node Manager Configuration in a Typical Enterprise Deployment
2.2.5.5
About Using Unicast for Communications Within the Application Tier
2.2.5.6
Understanding OPSS and Requests to the Authentication and Authorization Stores
2.2.6
About the Data Tier
3
Understanding the Business Intelligence Enterprise Deployment Topology
3.1
Diagram of the Primary Business Intelligence Enterprise Topology
3.2
Understanding the Primary Business Intelligence Topology Diagrams
3.2.1
Summary of Business Intelligence Load Balancer Virtual Server Names
3.2.2
Summary of the Managed Servers and Cluster on the Business Intelligence Application Tier
3.3
Flow Charts and Roadmaps for Implementing the Primary Business Intelligence Enterprise Topologies
3.3.1
Flow Chart of the Steps to Install and Configure the Primary Business Intelligence Enterprise Topologies
3.3.2
Roadmap Table for Planning and Preparing for an Enterprise Deployment
3.3.3
Roadmap Table for Configuring the Business Intelligence Enterprise Topology
Part II Preparing for an Enterprise Deployment
4
Using the Enterprise Deployment Workbook
4.1
Introduction to the Enterprise Deployment Workbook
4.2
Typical Use Case for Using the Workbook
4.3
Using the
Oracle Business Intelligence
Enterprise Deployment Workbook
4.3.1
Locating the
Oracle Business Intelligence
Enterprise Deployment Workbook
4.3.2
Understanding the Contents of the
Oracle Business Intelligence
Enterprise Deployment Workbook
4.3.2.1
Using the Start Tab
4.3.2.2
Using the Hardware - Host Computers Tab
4.3.2.3
Using the Network - Virtual Hosts & Ports Tab
4.3.2.4
Using the Storage - Directory Variables Tab
4.3.2.5
Using the Database - Connection Details Tab
4.4
Who Should Use the Enterprise Deployment Workbook?
5
Procuring Resources for an Enterprise Deployment
5.1
Hardware and Software Requirements for the Enterprise Deployment Topology
5.1.1
Hardware Load Balancer Requirements
5.1.2
Host Computer Hardware Requirements
5.1.2.1
General Considerations for Enterprise Deployment Host Computers
5.1.2.2
Reviewing the Oracle Fusion Middleware System Requirements
5.1.2.3
Typical Memory, File Descriptors, and Processes Required for an Enterprise Deployment
5.1.2.4
Typical Disk Space Requirements for an Enterprise Deployment
5.1.3
Operating System Requirements for the Enterprise Deployment Topology
5.2
Reserving the Required IP Addresses for an Enterprise Deployment
5.2.1
What Is a Virtual IP (VIP) Address?
5.2.2
Why Use Virtual Host Names and Virtual IP Addresses?
5.2.3
Physical and Virtual IP Addresses Required by the Enterprise Topology
5.3
Identifying and Obtaining Software Downloads for an Enterprise Deployment
6
Preparing the Load Balancer and Firewalls for an Enterprise Deployment
6.1
Configuring Virtual Hosts on the Hardware Load Balancer
6.1.1
Overview of the Hardware Load Balancer Configuration
6.1.2
Typical Procedure for Configuring the Hardware Load Balancer
6.1.3
Summary of the Virtual Servers Required for an Enterprise Deployment
6.1.4
Additional Instructions for admin.example.com
6.2
Configuring the Firewalls and Ports for an Enterprise Deployment
7
Preparing the File System for an Enterprise Deployment
7.1
Overview of Preparing the File System for an Enterprise Deployment
7.2
Shared Storage Recommendations When Installing and Configuring an Enterprise Deployment
7.3
Understanding the Recommended Directory Structure for an Enterprise Deployment
7.4
File System and Directory Variables Used in This Guide
7.5
About Creating and Mounting the Directories for an Enterprise Deployment
7.6
Summary of the Shared Storage Volumes in an Enterprise Deployment
8
Preparing the Host Computers for an Enterprise Deployment
8.1
Verifying the Minimum Hardware Requirements for Each Host
8.2
Verifying Linux Operating System Requirements
8.2.1
Setting Linux Kernel Parameters
8.2.2
Setting the Open File Limit and Number of Processes Settings on UNIX Systems
8.2.2.1
Viewing the Number of Currently Open Files
8.2.2.2
Setting the Operating System Open File and Processes Limits
8.2.3
Verifying IP Addresses and Host Names in DNS or hosts File
8.3
Configuring Operating System Users and Groups
8.4
Enabling Unicode Support
8.5
Mounting the Required Shared File Systems on Each Host
8.6
Enabling the Required Virtual IP Addresses on Each Host
9
Preparing the Database for an Enterprise Deployment
9.1
Overview of Preparing the Database for an Enterprise Deployment
9.2
About Database Requirements
9.2.1
Supported Database Versions
9.2.2
Additional Database Software Requirements
9.3
Creating Database Services
9.4
Using SecureFiles for Large Objects (LOBs) in an Oracle Database
9.5
About Database Backup Strategies
Part III Configuring the Enterprise Deployment
10
Creating the Initial BI Domain for an Enterprise Deployment
10.1
Variables Used When Creating the BI Domain
10.2
Understanding the Initial BI Domain
10.2.1
About the Infrastructure Distribution
10.2.2
Characteristics of the Initial BI Domain
10.3
Installing the Oracle Fusion Middleware Infrastructure in Preparation for an Enterprise Deployment
10.3.1
Installing a Supported JDK
10.3.1.1
Locating and Downloading the JDK Software
10.3.1.2
Installing the JDK Software
10.3.2
Starting the Infrastructure Installer on
BIHOST1
10.3.3
Navigating the Infrastructure Installation Screens
10.3.4
Checking the Directory Structure
10.4
Installing Oracle Business Intelligence in Preparation for an Enterprise Deployment
10.4.1
Starting the Installation Program
10.4.2
Navigating the Installation Screens
10.4.3
Checking the Directory Structure
10.5
Creating the Database Schemas
10.5.1
Installing and Configuring a Certified Database
10.5.2
Starting the Repository Creation Utility (RCU)
10.5.3
Navigating the RCU Screens to Create the Schemas
10.6
Configuring the BI Domain
10.6.1
Starting the Configuration Wizard
10.6.2
Navigating the Configuration Wizard Screens to Configure the BI Domain
10.7
Creating the System Components on
BIHOST1
10.8
Creating a BI Service Instance
10.9
Configuring the Singleton Data Directory (SDD)
10.10
Configuring Security for Essbase in Oracle Business Intelligence
10.11
Configuring the Domain Directories and Starting the Servers on
BIHOST1
10.11.1
Starting the Node Manager in the Administration Server Domain Home on
BIHOST1
10.11.2
Creating the boot.properties File
10.11.3
Starting the Administration Server
10.11.4
Validating the Administration Server
10.11.5
Disabling the Derby Database
10.11.6
Creating a Separate Domain Directory for Managed Servers on
BIHOST1
10.11.7
Starting the Node Manager in the Managed Server Domain Directory on
BIHOST1
10.11.8
Starting the WLS_BI1 Managed Server on
BIHOST1
10.11.9
Starting the System Components
10.12
Setting Up the Global Cache
10.13
Verifying Oracle Business Intelligence URLs on
BIHOST1
10.14
Creating a New LDAP Authenticator and Provisioning Enterprise Deployment Users and Group
10.14.1
About the Supported Authentication Providers
10.14.2
About the Enterprise Deployment Users and Groups
10.14.2.1
About Using Unique Administration Users for Each Domain
10.14.2.2
About the Domain Connector User
10.14.2.3
About Adding Users to the Central LDAP Directory
10.14.2.4
About Product-Specific Roles and Groups for
Oracle Business Intelligence
10.14.2.5
Example Users and Roles Used in This Guide
10.14.3
Prerequisites for Creating a New Authentication Provider and Provisioning Users and Groups
10.14.4
Provisioning a Domain Connector User in the LDAP Directory
10.14.5
Creating the New Authentication Provider
10.14.6
Provisioning an Enterprise Deployment Administration User and Group
10.14.7
Adding the New Administration User to the Administration Group
10.14.8
Updating the boot.properties File and Restarting the System
10.15
Backing Up the Oracle Business Intelligence Configuration
11
Configuring the Web Tier for an Enterprise Deployment
11.1
Variables Used When Configuring the Web Tier
11.2
About the Web Tier Domains
11.3
Installing Oracle HTTP Server on WEBHOST1
11.3.1
Starting the Installer on WEBHOST1
11.3.2
Navigating the Oracle HTTP Server Installation Screens
11.3.3
Verifying the
Oracle HTTP Server
Installation
11.4
Creating a Web Tier Domain on WEBHOST1
11.4.1
Starting the Configuration Wizard on WEBHOST1
11.4.2
Navigating the Configuration Wizard Screens for a Web Tier Domain
11.5
Installing and Configuring a Web Tier Domain on WEBHOST2
11.6
Starting the Node Manager and Oracle HTTP Server Instances on WEBHOST1 and WEBHOST2
11.6.1
Starting the Node Manager on WEBHOST1 and WEBHOST2
11.6.2
Starting the Oracle HTTP Server Instances
11.7
Configuring Oracle HTTP Server to Route Requests to the Application Tier
11.7.1
About the Oracle HTTP Server Configuration for an Enterprise Deployment
11.7.1.1
Purpose of the Oracle HTTP Server Virtual Hosts
11.7.1.2
Recommended Structure of the Oracle HTTP Server Configuration Files
11.7.2
Modifying the httpd.conf File to Include Virtual Host Configuration Files
11.7.3
Creating the Virtual Host Configuration Files for Oracle Business Intelligence
11.7.4
Validating the Virtual Server Configuration on the Load Balancer
11.7.5
Validating Access to the Management Consoles and Administration Server
11.7.6
Validating Access to the HTTP Access to the Business Intelligence Components
11.8
Backing Up the Configuration
12
Scaling Out
Oracle Business Intelligence
12.1
Installing Oracle Fusion Middleware Infrastructure on the Other Host Computers
12.2
Installing
Oracle Business Intelligence
on the Other Host Computers
12.3
Stopping the Components on
BIHOST1
12.3.1
Stopping the System Components
12.3.2
Stopping the WLS_BI1 Managed Server
12.3.3
Stopping the Administration Server
12.3.4
Stopping the Node Manager in the Administration Server Domain Home
12.3.5
Stopping the Node Manager in the Managed Server Domain Directory
12.4
Cloning the Components on
BIHOST1
12.5
Packing Up the Initial Domain on
BIHOST1
12.6
Unpacking the Domain on
BIHOST2
12.7
Starting the Components on
BIHOST1
and
BIHOST2
After Scaling Out
12.7.1
Starting the Node Manager in the Administration Server Domain Home
12.7.2
Starting the Administration Server
12.7.3
Starting the Node Managers in the Managed Server Domain Directories
12.7.4
Setting the Listen Address for the WLS_BI2 Managed Server
12.7.5
Configuring the WebLogic Proxy Plug-In
12.7.6
Starting the Managed Servers
12.7.7
Starting the System Components
12.8
Verifying Oracle Business Intelligence URLs on
BIHOST2
12.9
Configuring Oracle BI Publisher
12.9.1
Updating the JMS Shared Temp Directory
12.9.2
Setting the Oracle BI EE Data Source
12.10
Backing Up the Oracle Business Intelligence Configuration After Scaling Out
Part IV Common Configuration and Management Procedures for an Enterprise Deployment
13
Common Configuration and Management Tasks for an Enterprise Deployment
13.1
Verifying Manual Failover of the Administration Server
13.1.1
Failing Over the Administration Server to a Different Host
13.1.2
Validating Access to the Administration Server on
BIHOST2
Through Oracle HTTP Server
13.1.3
Failing the Administration Server Back to
BIHOST1
13.2
Enabling SSL Communication Between the Middle Tier and the Hardware Load Balancer
13.2.1
When is SSL Communication Between the Middle Tier and Load Balancer Necessary?
13.2.2
Generating Self-Signed Certificates Using the utils.CertGen Utility
13.2.3
Creating an Identity Keystore Using the utils.ImportPrivateKey Utility
13.2.4
Creating a Trust Keystore Using the Keytool Utility
13.2.5
Importing the Load Balancer Certificate into the Trust Store
13.2.6
Adding the Updated Trust Store to the Oracle WebLogic Server Start Scripts
13.2.7
Configuring Node Manager to Use the Custom Keystores
13.2.8
Configuring WebLogic Servers to Use the Custom Keystores
13.3
Performing Backups and Recoveries for an Enterprise Deployment
14
Using Whole Server Migration and Service Migration in an Enterprise Deployment
14.1
About Whole Server Migration and Automatic Service Migration in an Enterprise Deployment
14.1.1
Understanding the Difference Between Whole Server and Service Migration
14.1.2
Implications of Using Whole Server Migration or Service Migration in an Enterprise Deployment
14.1.3
Understanding Which Products and Components Require Whole Server Migration and Service Migration
14.2
Creating a GridLink Data Source for Leasing
14.3
Configuring Whole Server Migration for an Enterprise Deployment
14.3.1
Editing the Node Manager's Properties File to Enable Whole Server Migration
14.3.2
Setting Environment and Superuser Privileges for the wlsifconfig.sh Script
14.3.2.1
Setting the PATH Environment Variable for the wlsifconfig.sh Script
14.3.2.2
Granting Privileges to the wlsifconfig.sh Script
14.3.3
Configuring Server Migration Targets
14.3.4
Testing Whole Server Migration
14.4
Configuring Automatic Service Migration in an Enterprise Deployment
14.4.1
Setting the Leasing Mechanism and Data Source for an Enterprise Deployment Cluster
14.4.2
Changing the Migration Settings for the Managed Servers in the Cluster
14.4.3
About Selecting a Service Migration Policy
14.4.4
Setting the Service Migration Policy for Each Managed Server in the Cluster
14.4.5
Restarting the Managed Servers and Validating Automatic Service Migration
14.4.6
Failing Back Services After Automatic Service Migration
15
Configuring Single Sign-On for an Enterprise Deployment
15.1
About Oracle HTTP Server Webgate
15.2
General Prerequisites for Configuring
Oracle HTTP Server
12
c
Webgate
15.3
Enterprise Deployment Prerequisites for Configuring
OHS
12
c
Webgate
15.4
Configuring Oracle HTTP Server 12
c
WebGate for an Enterprise Deployment
15.5
Registering the Oracle HTTP Server 12
c
WebGate with Oracle Access Manager
15.5.1
Locating and Preparing the RREG Tool
15.5.2
About RREG In-Band and Out-of-Band Mode
15.5.3
Updating the Standard Properties in the OAM11gRequest.xml File
15.5.4
Updating the Protected, Public, and Excluded Resources for an Enterprise Deployment
15.5.5
Running the RREG Tool
15.5.5.1
Running the RREG Tool in In-Band Mode
15.5.5.2
Running the RREG Tool in Out-Of-Band Mode
15.5.6
Files and Artifacts Generated by RREG
15.5.7
Copying Generated Artifacts to the Oracle HTTP Server WebGate Instance Location
15.5.8
Restarting the Oracle HTTP Server Instance
15.6
Setting Up the WebLogic Server Authentication Providers
15.6.1
Backing Up Configuration Files
15.6.2
Setting Up the Oracle Access Manager Identity Assertion Provider
15.6.3
Setting the Order of Providers
15.7
Configuring Oracle ADF and OPSS Security with Oracle Access Manager
15.8
Configuring Single Sign-On for Applications
15.8.1
Enabling Single Sign-On and Oracle Access Manager for Oracle BI EE
15.8.2
Enabling Single Sign-On and Oracle Access Manager for Oracle BI Publisher
A
Using Multi Data Sources with Oracle RAC
A.1
About Multi Data Sources and Oracle RAC
A.2
Typical Procedure for Configuring Multi Data Sources for an Enterprise Deployment
Scripting on this page enhances content navigation, but does not change the content in any way.