IBM Udeploy® Administration Guide 5.0.0 IBM Udeploy Administration Guide: 5.0.0

Total Page:16

File Type:pdf, Size:1020Kb

IBM Udeploy® Administration Guide 5.0.0 IBM Udeploy Administration Guide: 5.0.0 IBM uDeploy® Administration Guide 5.0.0 IBM uDeploy Administration Guide: 5.0.0 Publication date January 2013 Copyright © 2013 UrbanCode, an IBM Company, Inc. UrbanCode, an IBM Company, AnthillPro, IBM uDeploy and any other product or service name or slogan or logo contained in this documentation are trademarks of UrbanCode, an IBM Company and its suppliers or licensors and may not be copied, imitated, or used, in whole or in part, without the prior written permission of UrbanCode, an IBM Company or the applicable trademark holder. Ownership of all such trademarks and the goodwill associated therewith remains with UrbanCode, an IBM Company or the applicable trademark holder. Reference to any products, services, processes, or other information, by trade name, trademark, or otherwise does not constitute or imply endorsement, sponsorship, or recommendation thereof by UrbanCode, an IBM Company. All other marks and logos found in this documentation are the property of their respective owners. For a detailed list of all third party intellectual property mentioned in our product documentation, please visit: http://www.UrbanCode, an IBM Company.com/html/company/legal/ trademarks.html. Document Number: 5.0.0.1a About This Book ................................................................................................................ 1 Product Documentation ............................................................................................... 1 Product Support ......................................................................................................... 1 Document Conventions ................................................................................................ 1 Installing and Upgrading Servers and Agents .......................................................................... 3 Installation Recommendations ....................................................................................... 4 System Requirements .................................................................................................. 4 Server Minimum Installation Requirements ............................................................. 4 Recommended Server Installation .......................................................................... 4 Agent Minimum Requirements ............................................................................. 5 32- and 64-bit JVM Support ................................................................................. 5 Performance Recommendations ............................................................................. 6 Download IBM uDeploy .............................................................................................. 6 Database Installation ................................................................................................... 7 Installing Oracle ................................................................................................. 7 Installing MySQL ............................................................................................... 7 Installing Microsoft SQL Server ............................................................................ 8 Server Installation ....................................................................................................... 9 Windows Server Installation ................................................................................. 9 Unix/Linux Installation ...................................................................................... 11 Agent Installation ..................................................................................................... 12 Installing an Agent ............................................................................................ 13 Connecting Agents to Agent Relays ..................................................................... 14 Installing Agent Relays .............................................................................................. 14 Upgrading IBM uDeploy ............................................................................................ 16 Upgrading Agents ............................................................................................. 16 SSL Configuration .................................................................................................... 16 Configuring SSL Unauthenticated Mode for HTTP Communications .......................... 17 Configuring Mutual Authentication ...................................................................... 18 Running IBM uDeploy .............................................................................................. 19 Running the Server ........................................................................................... 19 Running an Agent ............................................................................................. 19 Running an Agent Relay .................................................................................... 19 Accessing IBM uDeploy .................................................................................... 20 IBM uDeploy Security ....................................................................................................... 21 Roles and Permissions ............................................................................................... 22 Default Roles ................................................................................................... 22 Creating and Editing Roles ................................................................................. 23 Agent Roles ..................................................................................................... 23 Application Roles ............................................................................................. 24 Component Template Roles ................................................................................ 24 Component Roles .............................................................................................. 24 Environment Roles ............................................................................................ 25 License Roles ................................................................................................... 25 Resource Roles ................................................................................................. 25 Default Permissions ................................................................................................... 26 Setting Default Permissions ................................................................................ 26 Authorization Realms ................................................................................................ 27 Creating an LDAP Authorization Realm ............................................................... 27 Groups ............................................................................................................ 28 Authentication Realms ............................................................................................... 29 Creating an Authentication Realm ........................................................................ 29 Creating Users .................................................................................................. 30 Importing LDAP Users ...................................................................................... 30 iii IBM uDeploy® Administration Guide Tokens .................................................................................................................... 30 User Interface Security .............................................................................................. 31 System Security ........................................................................................................ 32 System Settings ................................................................................................................ 33 Installing Plug-ins ..................................................................................................... 33 Locks ...................................................................................................................... 33 Managing Locks ............................................................................................... 33 Post-Processing Scripts .............................................................................................. 34 Inventory and Component Statuses .............................................................................. 35 Creating Statuses .............................................................................................. 35 Using Statuses .................................................................................................. 36 Licenses .................................................................................................................. 36 Adding a License .............................................................................................. 36 Adding Agents to a License ................................................................................ 37 Log Settings ............................................................................................................ 37 Network Settings ...................................................................................................... 37 Notifications ............................................................................................................ 38 Output Log .............................................................................................................
Recommended publications
  • Meister® Insight Enterprise Development and Lifecycle Challenges
    Meister ® Take Control of Your Build Process ® ® OpenMake Meister enables development teams to control the software build process, providing standardization, acceleration, and auditing. Meister delivers speed, transparency, consistency and repeatability across the soft- ware development lifecycle. Meister saves time and money by shortening development cycles and consolidating time consuming redundant tasks. With Meister, organizations have a simplified process for managing the applica- tion build across diverse languages and platforms. Standardized Build Best Practices Meister is the only solution that gives you complete Meister Build Automation control over the software build. It manages depen- dencies, automatically generates build scripts, exe- cutes accelerated, incremental builds, and provides Build Acceleration detailed audit reports. Meister replaces expensive By directing calculating and managing software de- to maintain homegrown and open source build sys- pendencies, Meister accelerates builds, enabling tems with standardized build services for integrating, teams to implement agile and other fast-moving compilers, linkers, archive tools and other common development processes. Builds are further acceler- development tools into a seamless distributed life- ated by Meister, which can determine which build cycle management system. Teams benefit by imple- tasks can be run in parallel – taking full advan- menting build best practices in a standardized way tage of separate processors on multi-core machine across all languages and platforms. Meister is also hardware. With Meister, agile teams can achieve a programmable environment, so build engineers 10 minute incremental builds for most projects, en- can use the Meister API to develop custom Build suring that continuous integration and unit testing Services that tightly integrate their particular combi- runs smoothly and efficiently for maximum benefit.
    [Show full text]
  • Udeploy® Administration Guide 4.8.5 Udeploy Administration Guide: 4.8.5
    uDeploy® Administration Guide 4.8.5 uDeploy Administration Guide: 4.8.5 Publication date August 2013 Copyright © 2011, 2013 UrbanCode, an IBM Company, Inc. About ............................................................................................................................... 1 Product Documentation ............................................................................................... 1 Product Support ......................................................................................................... 1 Document Conventions ................................................................................................ 1 Documentation notices for IBM uDeploy ................................................................................ 2 Installing and Upgrading Servers and Agents .......................................................................... 5 Installation Recommendations ....................................................................................... 6 System Requirements .................................................................................................. 6 Server Minimum Installation Requirements ............................................................. 6 Recommended Server Installation .......................................................................... 6 Agent Minimum Requirements ............................................................................. 7 32- and 64-bit JVM Support ................................................................................
    [Show full text]
  • Enabling Devops on Premise Or Cloud with Jenkins
    Enabling DevOps on Premise or Cloud with Jenkins Sam Rostam [email protected] Cloud & Enterprise Integration Consultant/Trainer Certified SOA & Cloud Architect Certified Big Data Professional MSc @SFU & PhD Studies – Partial @UBC Topics The Context - Digital Transformation An Agile IT Framework What DevOps bring to Teams? - Disrupting Software Development - Improved Quality, shorten cycles - highly responsive for the business needs What is CI /CD ? Simple Scenario with Jenkins Advanced Jenkins : Plug-ins , APIs & Pipelines Toolchain concept Q/A Digital Transformation – Modernization As stated by a As established enterprises in all industries begin to evolve themselves into the successful Digital Organizations of the future they need to begin with the realization that the road to becoming a Digital Business goes through their IT functions. However, many of these incumbents are saddled with IT that has organizational structures, management models, operational processes, workforces and systems that were built to solve “turn of the century” problems of the past. Many analysts and industry experts have recognized the need for a new model to manage IT in their Businesses and have proposed approaches to understand and manage a hybrid IT environment that includes slower legacy applications and infrastructure in combination with today’s rapidly evolving Digital-first, mobile- first and analytics-enabled applications. http://www.ntti3.com/wp-content/uploads/Agile-IT-v1.3.pdf Digital Transformation requires building an ecosystem • Digital transformation is a strategic approach to IT that treats IT infrastructure and data as a potential product for customers. • Digital transformation requires shifting perspectives and by looking at new ways to use data and data sources and looking at new ways to engage with customers.
    [Show full text]
  • OWASP Presentation Template
    Tips for Building a Successful Application Security Program Reducing Software Risk Denver Chapter January 16, 2013 About Me • Dave Ferguson – Veracode Solutions Architect – Certifications: CISSP, CSSLP • In the Past – Principal Consultant with FishNet Security – Software Applications Developer • Industry Involvement – OWASP • Member, Contributor, Former KC chapter leader • Forgot Password Cheat Sheet – Blog • http://appsecnotes.blogspot.com applications end points network data 4 applications end points $35 billion spent in 2011 network data 5 Solaris iOS ColdFusion Linux ASP.NET JSP PHP Ruby C# C/C++ Java Android Blackberry J2ME Windows Windows VB.net Phone 6 Applications Are Complex Why Is Software a Target? 75% percent of attacks » $300 billion in software take place at the produced or sold each year application layer. 75% » One of the world's largest manufacturing industries 62% of companies experienced security breaches in critical applications within the last year. 62% » No uniform standards or insight into security risk or liability of the final product Upon first test, 8 in 10 58% applications contained XSS 80% and/or SQL injection flaws. 7 "Developers and defenders need to be right every time. An attacker only has to be right once." 8 Big Companies Are Hacked via Web Apps x Source: Verizon Business 2012 Data Breach Investigations Report 9 What kind of application vulnerabilities are out there? 10 Web Apps 11 Source: Veracode State of Software Security Report, Volume 4 Non-Web Apps 12 Source: Veracode State of Software Security Report, Volume 4 Programming Language Breakdown Source: Veracode State of Software Security Report, Volume 4 14 Targeting the Software Supply Chain Lockheed says Cyber Attacks Up Sharply, Suppliers Targeted By Andrea Shalal-Esa | Reuters – Mon, Nov 12, 2012 The Information Security Forum Announces Top Five Security Threats in 2013 Posted November 29, 2012 2.
    [Show full text]
  • Continuous Delivery
    DZONE RESEARCH PRESENTS 2014 GUIDE TO CONTINUOUS DELIVERY BROUGHT TO YOU IN PARTNERSHIP WITH dzone.com/research/continuousdelivery © DZONE, INC. 2014 WELCOME TABLE OF CONTENTS Dear Reader, SUMMARY & HIGHLIGHTS 3 In recent years, we have grown accustomed to a KEY RESEARCH FINDINGS 4 constant stream of information that has fueled our news feeds, flooded our inboxes, and triggered INTRODUCING: CONTINUOUS DELIVERY constant notifications... and in all of the noise, BY STEVE SMITH 6 something has been lost. Clarity, concision, and relevance have become innocent bystanders in an CONTINUOUS DELIVERY PITFALLS age of information overload. While it is true the BY J. PauL REED 10 task of gathering information has become easier, finding the right information, when and where you THE CONTINUOUS DELIVERY need it, has become increasingly complex and, at TOOLCHAIN times, overwhelming. BY MattHEW SKELtoN 14 The guide you hold in your hands (or on your CONTINUOUS DELIVERY VISUALIZED 16 device) is a vital part of DZone’s fight against this growing trend. We recognize that as a technology INFRASTRUCTURE AS CODE: WHEN professional, having actionable knowledge at AUTOMATION ISN’t ENOUGH 22 your fingertips is a necessity. Your business BY MitcH PRONSCHINSKE challenges will not be put on hold while you try to identify the right questions to ask and sort CONTINUOUS DELIVERY MATURITY CHECKLIST 24 through endless information. In publishing our 2014 Guide to Continuous Delivery, we have worked SOLUTION DIRECTORY 25 hard to curate and aggregate a wealth of useful topic knowledge and insight into a concise and informative publication. While this is only our second publication of this CREDITS nature, we have come a long way so far and we have big plans for the future.
    [Show full text]
  • Encyclopedia of Agile
    Aligning Projects, Enhancing Teams. Encyclopedia of Agile An Indexed glossary of terms used in Agile Software Development Compiled By [email protected] The intention of compiling this Encyclopedia of Agile was to create a document that can be used both as an offline reference, and as an online linked reference to some of the top thought leaders in the software industry. The terms and definitions found in this encyclopedia are public domain. The wording of the definitions were taken from the following sources, with reference links to these sources for more in depth coverage of the terminology definitions and etymology. While the content is not new, or original, I hope that you find the various indexes and references helpful in your search for understanding of all things Agile. http://www.wikipedia.org/ Agile Glossary Agile Glossary Agile Glossary Agile Glossary Scrum.org ScrumAlliance Compiled By [email protected] Scrum Terminology Index Types Of Stories Scrum Roles User ScrumMaster Technical Certified ScrumMaster Defect Product Owner Spike Team Tracer Bullet Delivery Team Research Cross-Functional Team Scrum Activities Planning Release Planning Sprint Planning Backlog Grooming Sprint a.k.a Iteration Daily Scrum a.k.a. Daily Standup Sprint Review a.k.a Demo Retrospective a.k.a Kaizen Scrum Artifacts Backlog Product Backlog Sprint Backlog Burndown Chart Burnup Chart Action Items Parking Lot Product Vision Statement Team Agreements Definition of Done Working Agreements www.cprime.com i Agile Terminology Index * Card-Conversation-Confirmation
    [Show full text]
  • Automated Build Service to Facilitate Continuous Delivery
    MASTER’S THESIS | LUND UNIVERSITY 2015 Automated build service to facilitate Continuous Delivery Ture Karlsson Department of Computer Science Faculty of Engineering LTH ISSN 1650-2884 LU-CS-EX 2015-27 Automated build service to facilitate Continuous Delivery Ture Karlsson [email protected] June 12, 2015 Master’s thesis work carried out at IKEA IT AB. Supervisors: Magnus Glantz, [email protected] Ulf Asklund, [email protected] Examiner: Martin Höst, [email protected] Abstract Continuous delivery can be seen as an evolution from agile software develop- ment methods and high demands to deliver working software quickly. It aims to always be able to deliver working and reliable software in short iterations by continuously integrate, build and test the software. This puts high demands on automation and the focus of this thesis is to automate the pipeline between source code and deployable software artifacts. The problem definition of this thesis is to improve and unify the deployment pipeline of software running on Linux at IKEA IT. The project resulted in a service that supports continuous delivery by providing automated building, testing, signing and deployment of software. It runs in production environment at IKEA IT and provides a high level of automation. It was evaluated with help from end users and the eval- uation showed that the service is useful for the intended users and automate several steps they earlier have had to do manually. Keywords: MSc, build service, continuous delivery, RPM Package Manager, DevOps 2 Acknowledgements I would like to give a big thank you to Magnus Glantz at IKEA IT for all the inspiration and for giving me this opportunity.
    [Show full text]
  • Introducing Continuous Integration in an Enterprise Scale Environment
    UPTEC IT08 014 Examensarbete 30 hp November 2008 Introducing Continuous Integration in an Enterprise Scale Environment Staffan Persson This page intentionally left blank. Abstract Introducing Continuous Integration in an Enterprise Scale Environment Staffan Persson Teknisk- naturvetenskaplig fakultet UTH-enheten This thesis investigates how continuous integration best should be incorporated into a current development environment in order to acquire a shorter time for the Besöksadress: regression testing feedback loop. The product in target is a high availability enterprise Ångströmlaboratoriet Lägerhyddsvägen 1 scale software product within mobile telecom. It utilizes a large commercial relational Hus 4, Plan 0 database for customer associated data and employs approximately one hundred designers. Postadress: Box 536 751 21 Uppsala A continuous integration system needs automatic database integration, compilation, testing, inspection, deployment, and feedback. Measures that are valuable to the build Telefon: process regardless of build time should be given the highest priorities of 018 – 471 30 03 implementation. Feedback has been developed in the form of Continuous Integration Telefax: Web. The first priority at this stage is to introduce unit testing of the database which 018 – 471 30 00 also has to be automatically built whenever updated or changed. Hemsida: The amount of time used to integrate should be as close to ten minutes as possible. http://www.teknat.uu.se/student This goal is reachable if the build process is split into at least two integrations by differentiating unit tests from component tests and, if the software’s functionally divided parts are built separately on local integration servers. Starting integrations automatically could potentially allow broken source code to reside in the source code repository.
    [Show full text]
  • Deployment Automation User's Guide Copyright © 2011-2020 Micro Focus Or One of Its Affiliates
    Deployment Automation User's Guide Copyright © 2011-2020 Micro Focus or one of its affiliates. All rights reserved. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contains Confidential Information. Except as specifically indicated otherwise, a valid license is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Part number: 6.3.1 Publication date: 2020-02-27 2 Deployment Automation Table of Contents Part 1: Introduction .......................................................................................... 19 Chapter 1: Welcome to Deployment Automation ................................................ 21 About This Documentation.............................................................................. 21 Chapter 2: Deployment Automation Overview ................................................... 23 User Interface Overview................................................................................. 24 Examples and the Community .......................................................................
    [Show full text]
  • IBM Udeploy® User Guide 5.0.0 IBM Udeploy User Guide: 5.0.0
    IBM uDeploy® User Guide 5.0.0 IBM uDeploy User Guide: 5.0.0 Publication date January 2013 Copyright © 2013 UrbanCode, an IBM Company, Inc. UrbanCode, an IBM Company, AnthillPro, IBM uDeploy and any other product or service name or slogan or logo contained in this documentation are trademarks of UrbanCode, an IBM Company and its suppliers or licensors and may not be copied, imitated, or used, in whole or in part, without the prior written permission of UrbanCode, an IBM Company or the applicable trademark holder. Ownership of all such trademarks and the goodwill associated therewith remains with UrbanCode, an IBM Company or the applicable trademark holder. Reference to any products, services, processes, or other information, by trade name, trademark, or otherwise does not constitute or imply endorsement, sponsorship, or recommendation thereof by UrbanCode, an IBM Company. All other marks and logos found in this documentation are the property of their respective owners. For a detailed list of all third party intellectual property mentioned in our product documentation, please visit: http://www.UrbanCode, an IBM Company.com/html/company/legal/ trademarks.html. Document Number: 5.0.0.1u About This Book ................................................................................................................ 1 Product Documentation ............................................................................................... 1 Product Support ........................................................................................................
    [Show full text]
  • Resume Template Is the Copyright of Qwikresume.Com
    CONTACT DETAILS Robert Smith 1737 Marshville Road, Alabama AWS DevOps Engineer (123)-456-7899 [email protected] www.qwikresume.com PERSONAL STATEMENT 8+ Plus years of Build & Release and DevOps Engineer Extensive SKILLS Experience in implementing and making teams adapt to Release/Change Build Tools Ant, Maven, Management Process Experience with Continuous Integration Tools (TFS, Gradle, NANT DevOps Jenkins, Hudson & Team City) Experience with software development Docker, Nagios, Chef, methodologies such as Waterfall, Agile & Scrum. Good Knowledge in bash Puppet, Openstack & (shell) /Perl/Expect and exposure to Jython, Python scripting. Hands-on experience on Build and deployment of SOA applications like Oracle Service AWS Working Knowledge Bus (OSB), Oracle Policy Modeling (OPM) and Oracle Business Process Scripting Languages Management (BPM). Linux Sheel Scripting And Advanced Shell WORK EXPERIENCE Scripting Configuration Management Perforce, AWS DevOps Engineer Subversion, GIT, PVCS ABC Corporation - June 2012 – Present Version Manager, Bit Responsibilities: Bucket CI Tools Jenkins, AntHillPro, Teamcity, . Building and maintaining cloud formation templates, chef cookbooks, Bamboo. Operating and scripts to automate and deploy AWS resources and configuration Systems Windows, Unix, changes. RHEL And Solaris . Integrating subversion into Hudson/Jenkins to automate the code check- Databases Oracle, out process used Hudson/Hudson/Jenkins for automating builds and MySql, MSAccess, SQL automating deployments maintained the shell and Perl scripts for the Server Change automation purposes. Management Remedy, . Integrating Jira with git hub version control maintained and and Service Now. administered Jira and assigned the roles for the users. Updating all the activities in Jira for the application team in order to track the status of the user stories or defects.
    [Show full text]
  • RESUME OF: Chris Macgowan
    RESUME OF: Chris Macgowan Chris Macgowan 952 Linwood Avenue Saint Paul, Minnesota 55105 United States Tel: 612.401.2342 email: [email protected] web: http://www.macgowan.com OBJECTIVE: A challenging position as Software Engineer with an emphasis on Object Technology. SOFTWARE ENGINEERING SKILLS: Strong understanding of the relationships between software design, software development, user interface, product testing, implementation, maintenance, support and the many factors that are involved in developing a complete software solution. Developed various applications running under Windows and Linux/Unix. Applied design methodologies and wrote technical specifications using OOAD artifacts and UML. These applications were developed using Java, C++, STL, C#, .NET, MFC, ATL and COM. Web Technologies include Java, HTML, PHP, jQuery, JavaScript and CSS. Developed, documented and applied automated tests using Java, C#, C/C++, JUnit, PERL, Selenium, Ranorex and WinRunner. Database experience includes MySQL, Oracle, Microsoft SQL Server, DB2/2, Informix and Microsoft Access. Developed firmware and hardware for embedded systems based on 8-bit microprocessors/microcontrollers. Member and/or leader of various software development teams. Helped develop in-company standards for quality processes, design methods, test procedures and product specifications. Coordinated and managed product testing and support. Authored and edited user and technical documentation. EMPLOYMENT EXPERIENCE: Thomson Reuters Legal Contract Software Engineer August 2013 to January 2015 Eagan, Minnesota Member of the Platform Quality Assurance Automation Group (QED), responsible for design, development, testing and implementation of software components to support test automation for various Legal Platform Software Products. Lead a small team that designed, developed and tested the RetroLoad Test Automation Application. The RetroLoad Process was designed to move legacy data from a mainframe system into Oracle databases.
    [Show full text]