Top
Cloud Services Management V1.1.0 Installation Guide
FUJITSU Software

2.4.3 Post-setup Operations

This section explains the tasks to perform after the setup of coordination adapters.

Note

When adding a coordination adapter after offline backup has been performed, perform offline backup again after setup.

Note that if the backup is not performed then the added coordination adapter will not be restored.

For details on offline backup, refer to "Backup and Restore", and "Offline Backup" in the "Fujitsu Software Cloud Services Management Operation Guide".

2.4.3.1 Configuring and Modifying Proxy Server Connection Information for External Connections

When the server that performs setup of coordination adapters uses a proxy to access the cloud to be coordinated, it is necessary to configure the proxy and authentication information for the APP domain.

The proxy and authentication information can be configured using the administration command of the Java EE execution environment (asadmin command). To execute the command, the following information about Java EE execution environment of the domain to modify is necessary.

Configuring

Execute the following command if necessary:

  1. The command for configuring a proxy host

    Execute the following command with a value specified in <proxy host>.

    "%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> create-jvm-options -Dhttps.proxyHost=<proxy host>
  2. The command for configuring a proxy port

    Execute the following command with a value specified in <PORT NO>.

    "%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> create-jvm-options -Dhttps.proxyPort=<PORT NO>
  3. The command for configuring a proxy authentication user

    When the proxy performs authentication, execute the following command with a value specified in <authentication user name>.

    "%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> create-jvm-options -Dhttps.proxyUser=<authentication user name>
  4. The command for configuring a proxy authentication password

    When the proxy performs authentication, execute the following command with a value specified in<authentication password>.

    "%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> create-jvm-options -Dhttps.proxyPassword=<authentication password>

When the above proxy configurations have been performed, to enable communications which does not use a proxy, it is necessary to configure a directly connected host.

Execute the following command with values specified in <host names or IP addresses to be connected directly>. When there are multiple host names or IP addresses to be connected directly, separate them using vertical bars ("|").

"%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> create-jvm-options -Dhttps.proxyHost="<host names or IP addresses to be connected directly>"

After performing the above procedure, restart the APP domain. In Cloud Services Management, the start and stop processes of the coordination adapter platform (APP) and the management server are linked.

See

For details on how to restart, refer to "Starting and Stopping" in the "FUJITSU Software Cloud Services Management Operation Guide".


Deleting configurations

To delete a configuration, execute the following.

Execute the following command to delete a target configuration:

"%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p <admin port number> -u <user name of administrator> delete-jvm-options <operand of jvm-options to delete>

Example of command execution: (With a proxy host)

Configure the already configured value of -Dhttps.proxyHost using the format "-Dhttps.proxyHost=value" in <operand of jvm-options to delete>.

"%FSCSM_HOME%\SWCTMG\glassfish3\bin\asadmin" -p 3948 -u Administrator delete-jvm-options -Dhttps.proxyHost=proxy.com
Enter admin password for user "Administrator">
Deleted 1 option(s)
Command delete-jvm-options executed successfully.

Modifying configurations

To modify a configuration, first delete the existing configurations using the procedure in "Deleting configurations", then configure again using the procedure in "Configuring".

2.4.3.2 Configuring ROR Connection Information (Only when Performing ROR Coordination)

This step is necessary for ROR coordination. This step is not required when not performing ROR coordination.

Add the ROR admin serve certificate required for the ROR coordination adapter to connect the ROR admin server to the APP domain.

Exporting the Certificate for the ROR Admin Server

This section explains how to export the certificate for the ROR admin server and save it as a file.

Point

After exporting the certificate file, copy it to the server that performs setup of the ROR coordination function for use. Delete the certificate file that is no longer necessary.

Importing the Certificate for the ROR Admin Server

This section explains how to import the exported certificate for an ROR admin server into the truststore for the APP domain.

Import using the following procedure:

  1. Import the certificate into the truststore for the APP domain.

    Execute the following command. In "[Certificate file for the ROR admin server]", specify the certificate file for the ROR server to which the certificate was exported (It is not necessary to include line feeds in this command. When copying this command from the manual, delete line feeds before using it).

    The message prompting for confirmation of trusting this certificate is displayed. If you trust this certificate, enter "y" and then press the Enter key.

    %FSCSM_HOME%\SWCTMG\jdk7\bin\keytool -import -file [Certificate file for the ROR admin server] -trustcacerts -alias rorsv -keystore %FSCSM_HOME%\SWCTMG\glassfish3\glassfish\domains\app-domain\config\cacerts.jks -storepass changeit
  2. Confirm that the certificate file for the ROR admin server has been added in the truststore for the APP domain.

    Execute the following command:

    %FSCSM_HOME%\SWCTMG\jdk7\bin\keytool -list -keystore %FSCSM_HOME%\SWCTMG\glassfish3\glassfish\domains\app-domain\config\cacerts.jks -storepass changeit

2.4.3.3 Configuring AWS Connection Information (Only when Performing AWS Coordination)

This step is necessary for AWS coordination. This step is not required when not performing AWS coordination.

Configure an access key ID and a secret access key for AWS to the AWS service controller by using the following procedure.

  1. Confirm the user key (1000) and password (BSS_USER_PWD) for access to management server domains (API and GUI domains).

    For details on the password (BSS_USER_PWD), refer to "Table 2.2 List of Parameters Configured Automatically during Setup".

  2. To open the [AWS Controller Configuration] window, access the following URL using a web browser.

    In <server>, specify the host name or IP address of the management server for Cloud Services Management. In <port>, specify the HTTP listener port for the APP domain.

    http://<server>:<port>/oscm-app-aws/

    The port number of the HTTP listener of the APP domain is "AS_APP_BASE_PORT + 80/tcp".

  3. In the [Login] window, specify the user key and password confirmed in step 1 to log in.

  4. After logging in, the [AWS Controller Configuration] window is displayed.

  5. Specify the access key ID and the secret access key.

  6. Save the settings.

Note

To modify items displayed in [General controller settings] in the [AWS Controller Configuration] window, modify using the reconfiguration command, not this menu. For details on the reconfiguration command, refer to "C.4 Reconfiguring Coordination Adapters".

2.4.3.4 Configuring Azure Connection Information (Only when Performing Azure Coordination)

This step is necessary for Azure coordination. This step is not required when not performing Azure coordination.

Register the subscription file for connecting with Azure.

Perform the following procedure to configure Azure connection information.

  1. Access the page for generating Azure subscription files at:

    https://manage.windowsazure.com/publishsettings

    After login, a management certificate is generated and registered on Azure. In addition, downloading of the subscription file starts. Save it in a safe folder.

    Note

    The above URL and the download procedure are subject to change.

    For details on generation of management certificates and subscription files, contact the Azure service support desk.

  2. Save the downloaded subscription file on the management server.

    1. Create a folder named "Subscription _ID" in the following folder:

      %FSCSM_HOME%\conf\adapter\azure\certificate
    2. Place the subscription file in the created folder as is. It is not necessary to change the file name. The folder structure should be as follows:

      %FSCSM_HOME%\conf\adapter\azure\certificate\<Subscription ID folder>\<Subscription file>

Point

When you want to modify Azure connection information, delete the subscription ID folder and the subscription file first, then register a new subscription file. If you want to use multiple subscriptions, create a subscription ID folder for each subscription and place each subscription file in its own folder.

2.4.3.5 Configuring VMware Connection Information (Only when Performing VMware Coordination)

This step is necessary for VMware coordination. This step is not required when not performing VMware coordination.

Add the VMware certificate required for the VMware coordination adapter to connect the VMware to the APP domain.

For details on how to obtain VMware certificates, refer to the following. (As of May 2016)

Execute the following command to import the certificate into the truststore for the APP domain. In "[Certificate file for VMware]", specify the obtained VMware certificate file.

The message prompting for confirmation of trusting this certificate is displayed. If you trust this certificate, enter "y" and then press the Enter key.

%FSCSM_HOME%\SWCTMG\jdk7\bin\keytool -import -file [Certificate file for VMware] -trustcacerts -alias vmware -keystore %FSCSM_HOME%\SWCTMG\glassfish3\glassfish\domains\app-domain\config\cacerts.jks -storepass changeit