Compute > Instance > Installation Component Guide

NAT Instance

NAT instance is an instance that allows you to access internet over a specific IP address band in the private network instance. This feature is available only in the Pyeongchon region, Korea.

Key Features

  • The instance of a private network not connect with an internet gateway can access the internet via the NAT instance.
  • Accesses the Internet by changing the floating IP of the NAT instance to source IP.
  • The packets delivered to the NAT instance are delivered according to the routing setting of the routing table connected to the subnet of NAT instance.
  • Do not add a route setting that specifies the NAT instance as a gateway in the routing table connected to the subnet of the NAT instance.
  • The instance of a private network cannot receive the inbound traffic coming from the internet.
  • Specifies IP address bandwidth of destination to allow Internet access through the NAT instance.
  • Allows access to another instance by accessing the NAT instance.
  • Sets security group.
  • Sets network ACL.
  • Redundancy not supported.
  • The option of checking network source/target must be disabled in the Network Interface settings for the NAT instance to work.
  • If a private image is created with NAT instance, the function might not work normally.

[Note] Difference with NAT gateway

Classification NAT gateway NAT instance
Availability Redundancy supported Redundancy not supported
Maintenance Maintained by NHN Cloud Directly maintained by users
Security group Not settable Settable
Network ACL Settable Settable
SSH Unavailable Available

Source/target check setting

For the NAT instance to work normally, the option of checking network source/target must be disabled in the Network Interface settings.

Routing setting

Specifies the NAT instance as a route gateway. The packets delivered to the NAT instance are delivered according to the routing setting of the routing table connected to the subnet of NAT instance.

Caution on settings

  • Do not add a routing setting that specifies the NAT instance as a gateway in the routing table connected to the subnet of the NAT instance.
  • It is strongly recommended to separate the NAT instance subnet from the subnet of an instance that is going to use the NAT instance as a gateway and use a different routing table.
  • If the NAT instance subnet and the subnet of an instance that is going to use the NAT instance as a gateway are the same or they are connected to the same routing table, and you have to add a routing setting that specifies the NAT instance as a gateway, then a floating IP must be set for the NAT instance. Also, the target CIDR must be set to IP Prefix 0 (/0). Any other settings will only cause the communication to fail, and might impact the communication of all instances that use the routing table.

[Note] Routing setting for NAT instance

  • If the subnet of NAT instance is connected to Routing Table 1 and the instances that are going to use the NAT instance as a gateway are connected to Routing Table 2
    • In the routing setting of Routing Table 2, the NAT instance can be specified as a gateway for a specific CIDR (e.g. 8.8.8.8/32).
    • You should specify the NAT instance as a gateway in the route setting of Routing Table 1 except in the case of the NAT instance connected to a floating IP, in which case IP prefix 0 (/0) can be set for the target CIDR.
  • If the NAT instance subnet and the subnet of instances that are going to use the NAT instance as a gateway are both connected to Routing Table 1
    • If NAT instance is connected to a floating IP, IP Prefix 0 (/0) can be set for the target CIDR to route.
    • Without using the above settings, you should not specify the NAT instance as a gateway in the routing setting of Routing Table 1.

MS-SQL Instance

Allow Security Group TCP Port 3389 (RDP)

After instance is created, access the instance by using Remote Desktop Protocol (RDP). To that end, an instance must be associated with a floating IP and TCP port 3389 (RDP) must be allowed for security group.

mssqlinstance_02_201812

Click + Check Password to check password by using key pair configured along with instance creation. Click Associate and download .rdp file, to access the instance by using the acquired password.

Initial Settings after Microsoft SQL Image is Created

1. Set SQL Certification Mode

The default certification mode of the server is set with "Windows Certification Mode". To use Microsoft SQL database account, the mode must be changed to SQL Certification Mode.

Execute Microsoft SQL Server Management Studio and associate to an object under the instance name.

mssqlinstance_03_201812

  1. Right-click on an object.
  2. Choose Properties on the menu.
  3. On Server Properties , click Security.
  4. Change the Server Certification type into SQL Server and Windows Certification Mode.

※ To apply the changed SQL certification mode, restart Microsoft SQL.

2. Change Microsoft SQL Service Port

The default port 1433 for Microsoft SQL is widely known and might serve as a security vulnerability. A change is recommended to another port. ※ For Express, no default port is specified.

Execute SQL Server configuration manager as below.

mssqlinstance_04_201812

  1. Click Protocol for MSSQLSERVER below SQL Server Network Configuration from menu on the left.
  2. Right-click TCP/IP among protocol names.
  3. When the menu shows up, select Properties.
  4. Select the IP Address tab.
  5. Select IP ALL on the list and change the port number to another.

※ To apply the changed service port, restart Microsoft SQL.

3. Allow External Access to Microsoft SQL Database

To allow external access to Microsoft SQL Database, go to the Security Group tab of Network > VPC and add Microsoft SQL service port for security rules. Also, register Microsoft SQL service port (default port: 1433) to allow access, as well as remote IP.

Data Volume Assignment

Microsoft SQL data/log files (MDF/LDF) and backup files are recommended to be applied with separate block storages.

mssqlinstance_05_201812

Go to Compute > Instance > Block Storage and create a block storage. Universal SSD is a recommended volume type for improved performance.

mssqlinstance_06_201812

After a block storage is created, select the storage and click Association Management and associate it to an instance.


Access instance with RDP and execute Computer Management, and go to Storage>Disk Management.

mssqlinstance_07_201812

You can find the associated block storage is detected. To use it, initialize disk first. 1. Right-click the Disk 1 block and click Initialize Disk. 2. Select a partition type and click OK.


After initialization is completed, create disk volume.

mssqlinstance_08_201812

Click unassigned disk and right-click it. Select New Simple Volume and proceed with wizard for new simple volume.


In the Database Setting of Server Properties of Microsoft SQL Server Management Studio, change Default Database Location into the directory where the volume has been created.

mssqlinstance_09_201812

※ To apply the changed default database location, restart Microsoft SQL.

Restart Microsoft SQL

Change of Microsoft SQL settings sometimes requires a restart of the service. To apply changed settings, restart Microsoft SQL.

From SQL Server Configuration Manager, go to SQL Server Configuration Manager (local) > SQL Server Service > SQL Server (MSSQLSERVER) and right click it. When the menu shows up, click Restart to restart the service.

mssqlinstance_10_201812

Check/Set Automatic Microsoft SQL Service Execution

Check if Microsoft SQL is set for automatic start with OS running.

Go to SQL Server Configuration Manager (local) > SQL Server in the SQL Server Configuration Manager to find Start Mode.

mssqlinstance_11_201812

When the service start mode for SQL SERVER (MSSSQLSERVER) and SQL Server Agent (MSSQLSERVER) are not automatic, do the followings:

  1. Click the service and right-click it. Select Properties on the menu.
  2. Change Service on General > Start Mode to Automatic.

[Note] For the release status of Microsoft SQL Instance, see Instance Release Note.

MySQL Instance

Starting/Stopping MySQL

#Start mysql Service
shell> service mysqld start

#Stop mysql Service
shell> service mysqld stop

#Restart mysql Service
shell> service mysqld restart

Connecting to MySQL

For initial connection, connect to MySQL with default user name.

shell> mysql -uroot

Initial Settings for MySQL Instance

1. Setting Password

There's no password on root user on initial installation. Therefore, it is required to set password as soon as possible.

  • Set Password for MySQL Version 5.6
SET PASSWORD [FOR user] = password_option

mysql> set password=password('password');
  • Set Password for MySQL Version 5.7
ALTER USER USER() IDENTIFIED BY 'auth_string';

mysql> ALTER USER 'root'@'localhost' IDENTIFIED BY 'New Password';

Default MySQL validate_password_policy is as below:

  • validate_password_policy=MEDIUM
  • Must be more than 8 characters, and include numbers, lower/upper cases, and special characters.

2. Changing Port Number

The default MySQL port number is 3306. It is recommended to change the port number for security reasons.

shell> vi /etc/my.cnf


# Specify a port to use in the my.cnf file.

port = Port name to use


# Save vi editor Save editor


# Restart mysql service


shell> service mysqld restart


#Connect with the changed port number


shell> mysql -uroot -P[changed port number]

Description of my.cnf

The default path of my.cnf is /etc/my.cnf, and NHN Cloud recommended variables are set as below:

Name Description
default_storage_engine Specify a default storage engine: Default is InnoDB with Online-DDL and transactions available.
expire_logs_days Set log expiration period for logs provided by binlog settings. Default is three days.
innodb_log_file_size Specify the size of log files which save redo logs of transactions.
Recommended size is 256MB or higher in actual environment, and it is set as 512MB by default. In order for the changes to take effect, please restart the database.
innodb_file_per_table When a table is deleted or truncated, the table space is immediately returned to the OS.
innodb_log_files_in_group Set the number of innodb_log_file files and use them in circular fashion: requires at least two.
log_timestamps Default log time of MySQL 5.7 is displayed in UTC time format; therefore, change log time to system local time.
slow_query_log Enable the slow_query log option. Queries taking more than 10 seconds in accordance with long_query_time will be logged to the slow_query_log.
sysdate-is-now For sysdate, SQL with sysdate() used for replication results in discrepant time between Master and Slave, so sysdate() and now() functions will behave the same.

Description of MySQL Directory

Directory and file description of MySQL are as below:

Name Description
my.cnf /etc/my.cnf
DATADIR Path for MySQL Data File - /var/lib/mysql/
ERROR_LOG Path for MySQL error_log File - /var/log/mysqld.log
SLOW_LOG Path for MySQL Slow Query File - /var/lib/mysql/*slow.log

For detailed release status of MySQL Instance, please refer to Instance Release Notes.

PostgreSQL Instance

How to start/stop PostgreSQL

#Start postgresql service
shell> sudo systemctl start postgresql-13

#Stop postgresql service
shell> sudo systemctl stop postgresql-13

#Restart postgresql service
shell> sudo systemctl restart postgresql-13

Log in to PostgreSQL

In the beginning after creating an image, log in as shown below.

#Switch account to postgres and log in
shell> sudo su - postgres
shell> psql

Create PostgreSQL instance and perform initial setup

1. Change port

The image port provided is 5432, the default PostgreSQL port. Port change is recommended for security purposes.

shell> vi /var/lib/pgsql/13/data/postgresql.conf


#Specify the port to be used in the postgresql.conf file.

port =name of the port to use


#Save vi editor


#Restart postgresql service

shell> sudo systemctl restart postgresql-13


#Log in with the changed port as shown below

shell> psql -p[changed port number]

2. Change server log timezone

The default timezone recorded in the server log is set to UTC. It is recommended to change it to match the local time of the SYSTEM.

shell> vi /var/lib/pgsql/13/data/postgresql.conf


#Specify the timezone to be used in the postgresql.conf file.

log_timezone = timezone to use


#Save vi editor


#Restart postgresql service

shell> sudo systemctl restart postgresql-13


#Log in to postgresql

shell> psql


#Check the changed settings

postgres=# SHOW log_timezone;

3. Cancel public schema permission

Since all users are provided with CREATE and USAGE permissions for public schema by default, users who can log in to the DB can create objects in public schema. It is recommended to cancel the permissions so that no users can create objects in public schema.

#Log in to postgresql

shell> psql


#Run permission cancellation command

postgres=# REVOKE CREATE ON SCHEMA public FROM PUBLIC;

4. Allow remote login

To allow logins other than local host, you need to change the listen_addresses variable and client authentication setup file.

shell> vi /var/lib/pgsql/13/data/postgresql.conf


#Specify the address to be used in the postgresql.conf file.
#To allow all IPv4 addresses, 0.0.0.0
#To allow all IPv6 addresses, ::
#To allow all addresses, *

listen_addresses = address to allow


#Save vi editor


shell> vi /var/lib/pgsql/13/data/pg_hba.conf


#Client authentication control per IP address format
#Since old client library is not supported by scram-sha-256, it needs to be changed to md5

# TYPE  DATABASE        USER            ADDRESS                 METHOD
# IPv4 local connections:
host    all             all             127.0.0.1/32            scram-sha-256
host    allowed DB           allowed user          allowed address                   scram-sha-256
# IPv6 local connections:
host    all             all             ::1/128                 scram-sha-256
host    allowed DB           allowed user          allowed address                   scram-sha-256


#Restart postgresql service

shell> sudo systemctl restart postgresql-13

PostgreSQL directory description

PostgreSQL directory and file description is as follows:

Name Description
postgresql.cnf /var/lib/pgsql/{version}/data/postgresql.cnf
initdb.log PostgreSQL database cluster creation log - /var/lib/pgsql/{version}/initdb.log
DATADIR PostgreSQL data file path - /var/lib/pgsql/{version}/data/
LOG PostgreSQL log file path - /var/lib/pgsql/{version}/data/log/*.log

CUBRID Instance

How to Start/Stop the CUBRID service

You can start or stop the CUBRID service as follows by logging in with the “cubrid” Linux account.

# Start the CUBRID service/server
shell> sudo su - cubrid
shell> cubrid service start
shell> cubrid server start demodb

# Stop the CUBRID service/server
shell> sudo su - cubrid
shell> cubrid server stop demodb
shell> cubrid service stop

# Restart the CUBRID service/server
shell> sudo su - cubrid
shell> cubrid server restart demodb
shell> cubrid service restart

# Start/stop/restart the CUBRID broker
shell> sudo su - cubrid
shell> cubrid broker start
shell> cubrid broker stop
shell> cubrid broker restart

Connect to CUBRID

After creating an instance, initially connect as follows.

shell> sudo su - cubrid
shell> csql -u dba demodb@localhost

Initial Setup After Creating a CUBRID Instance

1. Set the Password

After initial installation, the CUBRID dba account password is not set. Therefore, you must set a password after installation.

shell> csql -u dba -c "ALTER USER dba PASSWORD 'new_password'" demodb@localhost

2. Change the Broker Port

The broker port for query_editor defaults to 30000, and the broker port for broker1 defaults to 33000. For security reasons, it is recommended to change the port.

1) Modify the broker file

Open the following file and enter the port address to change as shown below.

shell> vi /opt/cubrid/conf/cubrid_broker.conf

[%query_editor]
BROKER_PORT             =[port address to change]

[%BROKER1]
BROKER_PORT             =[port address to change]
2) Restart the broker

Restart the broker for the port change to take effect.

shell> cubrid broker restart

3. Change the Manager Server Port

The manager server port defaults to 8001. For security reasons, it is recommended to change the port.

1) Modify the cm.conf file

Open the following file and enter the port address to change as shown below.

shell> vi /opt/cubrid/conf/cm.conf

cm_port =[port address to change]
2) Restart the manager server

Restart the manager for the port change to take effect.

shell> cubrid manager stop
shell> cubrid manager start

CUBRID Directory Description

The CUBRID directory and file descriptions are as follows.

Name Description
database.txt CUBRID database location information file path - /opt/cubrid/databases
CONF PATH CUBRID server, broker, manager environment variable file path - /opt/cubrid/conf
LOG PATH CUBRID process log file path - /opt/cubrid/log
SQL_LOG CUBRID SQL Query file path /opt/cubrid/log/broker/sql_log
ERROR_LOG CUBRID ERROR SQL Query file path - /opt/cubrid/log/broker/error_log
SLOW_LOG CUBRID Slow Query file path - /opt/cubrid/log/broker/sql_log

cubrid.conf Description

A server configuration file that allows you to configure the memory of the database you want to operate, the number of threads according to the number of concurrent users, and the communication port between the broker and the server.

Name Description
service A parameter to register processes that start automatically when the CUBRID service starts.
By default, server, broker, and manager processes are registered.
cubrid_port_id The port used by the master process.
max_clients The maximum number of concurrently connected clients per database server process.
data_buffer_size A parameter to set the size of the data buffer that the database server caches in memory.
It is recommended to set the required memory size to a value within 2/3 of the system memory.

broker.conf Description

A broker configuration file that allows you to set the port used by the broker you want to operate, the number of application servers (CAS), SQL LOG, etc.

Name Description
BROKER_PORT The port used by the broker. The port seen by the actual driver such as JDBC is the port of the broker.
MAX_NUM_APPL_SERVER A parameter to set the maximum number of CASs that can be connected to the broker at the same time.
MIN_NUM_APPL_SERVER A parameter to set the minimum number of CAS processes waiting by default even if there is no connection request to the broker.
LOG_DIR A parameter that specifies the directory where SQL logs are stored.
ERROR_LOG_DIR A parameter that specifies the directory where error logs for the broker are stored.

cm.conf Description

A CUBRID manager configuration file that allows you to set the port used by the manager server process you want to operate, the monitoring collection cycle, etc.

Name Description
cm_port The port used by the manager server process.
cm_process_monitor_interval A cycle for monitoring information collection.
support_mon_statistic A parameter to set whether to use cumulative monitoring.
server_long_query_time A parameter that specifies the threshold (in seconds) for a late query when the slow_query item among the server's diagnostic items is set.

MariaDB Instance

How to Start/Stop MariaDB

# Start the MariaDB service
shell> sudo systemctl start mariadb.service

# Stop the MariaDB service
shell> sudo systemctl stop mariadb.service

# Restart the MariaDB service
shell> sudo systemctl restart mariadb.service

Connect to MariaDB

After creating an instance, initially connect to MariaDB as follows.

shell> mysql -u root

After changing the password, connect to MySQL as follows.

shell> mysql -u root -p
Enter password:

Initial Setup After Creating a MariaDB Instance

1. Set the Password

After initial installation, the MariaDB root account password is not set. Therefore, you must set a password after installation.

SET PASSWORD [FOR user] = password_option

MariaDB> SET PASSWORD = PASSWORD('password');

2. Change the Port

After initial installation, the port is 3306, which is MariaDB's default port. For security reasons, it is recommended to change the port.

1) Modify the /etc/my.cnf.d/server.cnf file

Open the /etc/my.cnf.d/server.cnf file and enter the port address to change under [mariadb] as follows.

shell> sudo vi /etc/my.cnf.d/server.cnf
[mariadb]
port=[port address to change]
2) Restart the instance

Restart the instance for the port change to take effect.

sudo systemctl restart mariadb.service

Tibero Instance

Create a Tibero Instance

Additional Block Storage

Create an additional volume in addition to the root volume. Tibero Machine Image (TMI) requires an additional volume of 150GB, so an additional block storage of 150G or more must be set.

Connect to Instance

After the instance creation is complete, use SSH to access the instance. The instance must have a floating IP associated and TCP port 22 (SSH) must be allowed in the security group. Connect to the instance using an SSH client and the set key pair. For a detailed guide on SSH connection, refer to SSH Connection Guide.

Install TMI

Run the dbca command in the /root path with the root account.

$ ./dbca OS_ACCOUNT DB_NAME DB_CHARACTERSET DB_PORT
[centos@tiberoinstance ~]$ sudo su root
[root@tiberoinstance centos]# cd
[root@tiberoinstance ~]# pwd
/root
[root@tiberoinstance ~]# ./dbca nhncloud tiberotestdb utf8 8639
No Item Argument value
1 OS_ACCOUNT OS account under which Tibero runs
2 DB_NAME DB_NAME used in Tibero (SID)
3 DB_CHARACTERSET DB character set used by Tibero
4 DB_PORT Service IP port used by Tibero

Complete Installation

When the dbca command is run, the progress is output and the database is created in the nomount mode. It takes less than 10 minutes. When finished, the output is as below.

SQL>
System altered.

SQL>
System altered.

SQL> Disconnected.
[root@tiberoinstance ~]#

Check the Operation and the Installation Log

Check if Tibero is running.

[root@tiberoinstance ~]# ps -ef | grep tbsvr
nhncloud 13933     1  0 09:10 ?        00:00:04 tbsvr          -t NORMAL -SVR_SID tiberotestdb
nhncloud 13944 13933  0 09:10 ?        00:00:00 tbsvr_FGWP006  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13945 13933  0 09:10 ?        00:00:00 tbsvr_FGWP007  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13946 13933  0 09:10 ?        00:00:00 tbsvr_FGWP008  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13947 13933  0 09:10 ?        00:00:08 tbsvr_FGWP009  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13948 13933  0 09:10 ?        00:00:00 tbsvr_PEWP000  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13949 13933  0 09:10 ?        00:00:00 tbsvr_PEWP001  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13950 13933  0 09:10 ?        00:00:00 tbsvr_PEWP002  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13951 13933  0 09:10 ?        00:00:00 tbsvr_PEWP003  -t NORMAL -SVR_SID tiberotestdb
nhncloud 13952 13933  0 09:10 ?        00:00:09 tbsvr_AGNT     -t NORMAL -SVR_SID tiberotestdb
nhncloud 13953 13933  0 09:10 ?        00:00:07 tbsvr_DBWR     -t NORMAL -SVR_SID tiberotestdb
nhncloud 13954 13933  0 09:10 ?        00:00:00 tbsvr_RCWP     -t NORMAL -SVR_SID tiberotestdb
root     21066 12596  0 11:06 pts/0    00:00:00 grep --color=auto tbsvr
[root@tiberoinstance ~]#

The installation log can be found in /root/.dbset.log.

[root@tiberoinstance ~]# ls -al
합계 36
dr-xr-x---.  4 root root  154  1월 13 09:12 .
dr-xr-xr-x. 23 root root 4096  1월 13 09:05 ..
-rw-------   1 root root  264  1월 12 19:08 .bash_history
-rw-r--r--.  1 root root   18 12월 29  2013 .bash_logout
-rw-r--r--.  1 root root  176 12월 29  2013 .bash_profile
-rw-r--r--.  1 root root  176 12월 29  2013 .bashrc
-rw-r--r--.  1 root root  100 12월 29  2013 .cshrc
-rw-r--r--   1 root root 7732  1월 13 09:12 .dbset.log
drwxr-----   3 root root   19  1월 13 09:04 .pki
drwx------   2 root root   29  1월  4 16:58 .ssh
-rw-r--r--.  1 root root  129 12월 29  2013 .tcshrc

Connect to Tibero

Change the Account

Log in with the OS_ACCOUNT created with the dbca command.

[root@tiberoinstance ~]# su - nhncloud
마지막 로그인: 목  1월 13 11:34:43 KST 2022 일시 pts/0

 #####   ###  ######    ###         #######  ###  ######   #######  ######   #######  #######  #######   #####   #######  ######   ######
#     #   #   #     #   ###            #      #   #     #  #        #     #  #     #     #     #        #     #     #     #     #  #     #
#         #   #     #   ###            #      #   #     #  #        #     #  #     #     #     #        #           #     #     #  #     #
 #####    #   #     #                  #      #   ######   #####    ######   #     #     #     #####     #####      #     #     #  ######
      #   #   #     #   ###            #      #   #     #  #        #   #    #     #     #     #              #     #     #     #  #     #
#     #   #   #     #   ###            #      #   #     #  #        #    #   #     #     #     #        #     #     #     #     #  #     #
 #####   ###  ######    ###            #     ###  ######   #######  #     #  #######     #     #######   #####      #     ######   ######

[nhncloud@tiberoinstance ~]$

Check Connection

[nhncloud@tiberoinstance ~]$ tbsql sys/tibero

tbSQL 6

TmaxData Corporation Copyright (c) 2008-. All rights reserved.

Connected to Tibero.

SQL> select * from v$instance;

INSTANCE_NUMBER INSTANCE_NAME
--------------- ----------------------------------------
DB_NAME
----------------------------------------
HOST_NAME                                                       PARALLEL
--------------------------------------------------------------- --------
   THREAD# VERSION
---------- --------
STARTUP_TIME
----------------------------------------------------------------
STATUS           SHUTDOWN_PENDING
---------------- ----------------
TIP_FILE
--------------------------------------------------------------------------------
              0 tiberotestdb
tiberotestdb
tiberoinstance.novalocal                                        NO
         0 6
2022/01/13
NORMAL           NO
/db/tibero6/config/tiberotestdb.tip


1 row selected.

SQL>

Tibero Default Accounts

The default accounts provided by Tibero are as follows.

Schema Password Description
sys tibero SYSTEM schema
syscat syscat SYSTEM schema
sysgis sysgis SYSTEM schema
outln outln SYSTEM schema
tibero tmax SAMPLE schema with the DBA privilege
tibero1 tmax SAMPLE schema with the DBA privilege
  • SYS: Performs administrator tasks for the database.
  • SYSCAT: Creates DATA DICTIONARY & CATALOGVIEW.
  • SYSGIS: Creates GIS-related tables and performs GIS-related tasks.
  • OUTLN: Performs tasks such as storing related hints so that the same SQL can always be executed with the same plan.
  • TIBERO/TIBERO1: An example user with the DBA privilege.

JEUS Instance

The images provided by default include CentOS 7.8 with JEUS8Fix1 (Domain Administrator Server 2022.03.22) and CentOS 7.8 with JEUS8Fix1 (Managed Server 2022.03.22). To install Domain Administrator Server, use CentOS 7.8 with JEUS8Fix1 (Domain Administrator Server 2022.03.22) image. To install Managed Server, use the CentOS 7.8 with JEUS8Fix1 (Managed Server 2022.03.22) image.

JEUS is installed in ~/apps/jeus8.

The following properties are set during installation.

Property Default value
Domain name jeus_domain
WebAdmin port 9736
Admin server name adminServer
Admin user ID administrator
Admin user password jeusadmin
Node manager java

Check the Startup

To configure or control JEUS, you must start the node manager and then control it through WebAdmin or jeusadmin.

Connect to the Instance

After the instance creation is complete, use SSH to access the instance. The instance must have a floating IP associated and TCP port 22 (SSH) must be allowed in the security group.

Start the Node Manager

Connect to the shell and run the node manager with the startNodeManager command. Since the node managers need to communicate with each other, add an allow rule for the default port 7730 to the security group.

Start JEUS

To run Domain Administrator Server, use the startDomainAdminServer command.

startDomainAdminServer -uadministrator -pjeusadmin

JEUS WebAdmin

Run WebAdmin as follows:

  1. Set a floating IP on the instance where DAS is installed.
  2. Add an allow rule for port 9736 to that instance's security group.
  3. If you connect to in http://{floatingIP}:9736/webadmin in a web browser, you can see the WebAdmin screen.

WebtoB Instance

The image provided by default is CentOS 7.8 with WebtoB5Fix4 (2022.03.22). WebtoB is installed in ~/apps/webtob.

Check the Startup

Connect to the Instance

After the instance creation is complete, use SSH to access the instance. The instance must have a floating IP associated and TCP port 22 (SSH) must be allowed in the security group.

Compile the Configuration File

Compile the configuration file using the wscfl command.

wscfl -i http.m

Start WebtoB

Start WebtoB using wsboot.

wsboot

You can use wsadmin to view or control the status.

TOP