Skip to content

Commit ab5ebf9

Browse files
authored
Release 21.1.0.0.1 (#56)
Merge the 21.1.0.0.1 release files from our internal repository.
1 parent e7169fb commit ab5ebf9

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+1790
-1608
lines changed

.github/workflows/build-essbase-stack-release.yml

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,22 +11,19 @@ jobs:
1111
runs-on: ubuntu-latest
1212
steps:
1313
- uses: actions/checkout@v2
14-
- name: Terraform Init
15-
uses: hashicorp/terraform-github-actions@master
14+
- uses: hashicorp/setup-terraform@v1
1615
with:
17-
tf_actions_version: 0.12.17
18-
tf_actions_subcommand: 'init'
19-
tf_actions_working_dir: terraform
16+
terraform_version: ~0.13.0
17+
- name: Terraform Init
2018
env:
2119
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
20+
working-directory: ./terraform
21+
run: terraform init
2222
- name: 'Terraform Validate'
23-
uses: hashicorp/terraform-github-actions@master
24-
with:
25-
tf_actions_version: 0.12.17
26-
tf_actions_subcommand: 'validate'
27-
tf_actions_working_dir: terraform
2823
env:
2924
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
25+
working-directory: ./terraform
26+
run: terraform validate -no-color
3027
- name: Build artifacts
3128
run: |
3229
/bin/bash -e build.sh

.github/workflows/build-essbase-stack.yml

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,22 +14,19 @@ jobs:
1414
runs-on: ubuntu-latest
1515
steps:
1616
- uses: actions/checkout@v2
17-
- name: Terraform Init
18-
uses: hashicorp/terraform-github-actions@master
17+
- uses: hashicorp/setup-terraform@v1
1918
with:
20-
tf_actions_version: 0.12.17
21-
tf_actions_subcommand: 'init'
22-
tf_actions_working_dir: terraform
19+
terraform_version: ~0.13.0
20+
- name: Terraform Init
2321
env:
2422
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
23+
working-directory: ./terraform
24+
run: terraform init
2525
- name: 'Terraform Validate'
26-
uses: hashicorp/terraform-github-actions@master
27-
with:
28-
tf_actions_version: 0.12.17
29-
tf_actions_subcommand: 'validate'
30-
tf_actions_working_dir: terraform
3126
env:
3227
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
28+
working-directory: ./terraform
29+
run: terraform validate -no-color
3330
- name: Build artifacts
3431
run: |
3532
/bin/bash -e build.sh

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ build
1313

1414
# .tfvars files
1515
*.tfvars
16-
!essbase-byol.auto.tfvars
16+
!essbase.auto.tfvars*

CHANGELOG.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,34 @@ All notable changes to this project will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
55
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
66

7-
## [Unreleased]
7+
## [21.1.0.0.1]
8+
9+
### Changed
10+
- Essbase 21.1 GA Release
11+
- Fusion Middleware 12.2.1.4.0
12+
- Migrate scripts to terraform 0.13 syntax.
13+
- Switch from encrypted keys to secrets in vault.
14+
- Support for flex compute shapes.
15+
- Support for existing Autonomous Databases configured with private endpoint.
16+
- Rename variable `security_mode` to `identity_provider`
17+
- Disable bastion creation when using an existing network.
18+
- Support selection of timezone for the compute instance.
19+
20+
### Image Details
21+
- [Oracle-Linux-7.9-2021.01.12-0](https://docs.oracle.com/en-us/iaas/images/image/b6a7b057-03a8-4624-b08b-c12caa2c63a0/)
22+
- Oracle Fusion Middleware 12.2.1.4.0 GA
23+
- Oracle Essbase 21.1.0.0.0 GA
24+
- Oracle JDK 8 update 281 Server JRE
25+
- Applied patches:
26+
- 28186730 - OPatch 13.9.4.2.5 for FMW/WLS 12.2.1.3.0 and 12.2.1.4.0
27+
- 32253037 - WebLogic Patch Set Update 12.2.1.4.201209
28+
- 31544353 - ADR for WebLogic Server 12.2.1.4.0 July CPU 2020
29+
- 32124456 - Coherence 12.2.1.4.7 Cumulative Patch
30+
- 31676526 - RCU Patches for ADB
31+
- 30540494 - RCU Patches for ADB
32+
- 30754186 - RCU Patches for ADB
33+
- 31666198 - OPSS Bundle Patch 12.2.1.4.200724
34+
- 32357288 - ADF Bundle Patch 12.2.1.4.210107
835

936
## [19.3.0.3.4]
1037

LICENSE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Copyright (c) 2019-2020 Oracle and/or its affiliates. All rights reserved.
1+
Copyright (c) 2019-2021 Oracle and/or its affiliates. All rights reserved.
22

33
The Universal Permissive License (UPL), Version 1.0
44

README.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@
88
![essbase-stack](https://github.com/oracle-quickstart/oci-essbase/workflows/essbase-stack/badge.svg)
99

1010
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)
11-
](https://console.us-phoenix-1.oraclecloud.com/resourcemanager/stacks/create?region=home&zipUrl=https://github.com/oracle-quickstart/oci-essbase/releases/download/v19.3.0.3.4/essbase-stack-v19.3.0.3.4-byol.zip)
11+
](https://console.us-phoenix-1.oraclecloud.com/resourcemanager/stacks/create?region=home&zipUrl=https://github.com/oracle-quickstart/oci-essbase/releases/download/v21.1.0.0.1/essbase-stack-v21.1.0.0.1-byol.zip)
1212

1313
[Oracle Essbase][essbase] is a business analytics solution that uses a proven, flexible, best-in-class architecture for analysis, reporting, and collaboration. It delivers instant value and greater productivity for your business users, analysts, modelers, and decision-makers, across all lines of business within your organization. You can interact with Essbase, through a web or Microsoft Office interface, to analyze, model, collaborate, and report.
1414

1515
This Quick Start automates the deployment of Oracle Essbase on [Oracle Cloud Infrastructure (OCI)][oci]. It can also deploy additional stack components required – Autonomous Database, Load Balancer, Storage, Virtual Cloud Network (VCN) as part of the deployment.
1616

17-
For more details on deploying the Essbase stack on Oracle Cloud Infrastructure, please visit the [Administering Oracle Essbase](https://docs.oracle.com/en/database/other-databases/essbase/19.3/essad/index.html) guide.
17+
For more details on deploying the Essbase stack on Oracle Cloud Infrastructure, please visit the [Administering Oracle Essbase](https://docs.oracle.com/en/database/other-databases/essbase/21/essad/index.html) guide.
1818

1919
### Default Topology
2020

@@ -30,11 +30,11 @@ The above digram shows the full topology supported by the terraform scripts. In
3030

3131
## Before You Begin with Oracle Essbase
3232

33-
Refer to the [documentation](https://docs.oracle.com/en/database/other-databases/essbase/19.3/essad/you-begin-oracle-essbase.html) for the pre-requisite steps to using Essbase on OCI.
33+
Refer to the [documentation](https://docs.oracle.com/en/database/other-databases/essbase/21/essad/you-begin-oracle-essbase.html) for the pre-requisite steps to using Essbase on OCI.
3434

35-
### Encrypt Values using KMS
35+
### Create Secrets with OCI Vault
3636

37-
Oracle Cloud Infrastructure [Key Management (KMS)][kms] enables you to manage sensitive information when creating a stack. You are required to use KMS to encrypt credentials during provisioning by creating a key. Passwords chosen for Essbase administrator and Database must meet their respective password requirements.
37+
Oracle Cloud Infrastructure [Vault][vault] enables you to manage sensitive information when creating a stack. You are required to store your credentials in the vault prior to provisioning the Essbase stack. Passwords chosen for Essbase administrator and Database must meet their respective password requirements.
3838

3939
### Create Dynamic Group
4040

@@ -57,6 +57,7 @@ allow group group_name to manage buckets in compartment compartment_name
5757
allow group group_name to manage objects in compartment compartment_name
5858
allow group group_name to use vaults in compartment compartment_name
5959
allow group group_name to use keys in compartment compartment_name
60+
allow group group_name to use secrets in compartment compartment_name
6061
```
6162

6263
Some policies may be optional, depending on expected use. For example, if you're not using a load balancer, you don't need a policy that allows management of load balancers.
@@ -73,6 +74,7 @@ allow dynamic-group group_name to manage autonomous-backups in compartment compa
7374
allow dynamic-group group_name to read buckets in compartment compartment_name
7475
allow dynamic-group group_name to manage objects in compartment compartment_name
7576
allow dynamic-group group_name to use keys in compartment compartment_name
77+
allow dynamic-group group_name to use secrets in compartment compartment_name
7678
```
7779

7880
## Using the Terraform command line tool
@@ -97,7 +99,7 @@ terraform init
9799

98100
### Configure
99101

100-
Choose the Essbase image that corresponds to the desired [license](#License), by removing the `.disabled` extension on appropriate `essbase-<license>.auto.tfvars.disabled` file. Set the remaining [variables](./VARIABLES.md) needed to drive the stack creation. This can be done by creating the terraform.tfvars from the [template file](./terraform/terraform.tfvars.template), or using environment variables as described here.
102+
By default, the Essbase image selected is the BYOL [license](#License). To use the UCM [license](#License), replace the `essbase.auto.tfvars` file with `essbase.auto.tfvars.ucm`. Set the remaining [variables](./VARIABLES.md) needed to drive the stack creation. This can be done by creating the terraform.tfvars from the [template file](./terraform/terraform.tfvars.template), or using environment variables as described here.
101103

102104
Let's make sure the plan looks good:
103105

@@ -149,7 +151,7 @@ allow group group_name to manage orm-jobs in compartment compartment_name
149151

150152
## Post-Deployment Tasks
151153

152-
Refer to the [documentation](https://docs.oracle.com/en/database/other-databases/essbase/19.3/essad/complete-deployment-tasks.html) for a list of post-deployment tasks.
154+
Refer to the [documentation](https://docs.oracle.com/en/database/other-databases/essbase/21/essad/complete-deployment-tasks.html) for a list of post-deployment tasks.
153155

154156
## License
155157

@@ -171,8 +173,8 @@ The Oracle Essbase product requires an on-premises purchased license and active
171173

172174
If you have an issue or a question, please take a look at our [FAQs](./FAQs.md) or [open an issue](https://github.com/oracle-quickstart/oci-essbase/issues/new).
173175

174-
[essbase]: https://docs.oracle.com/en/database/other-databases/essbase/19.3/index.html
176+
[essbase]: https://docs.oracle.com/en/database/other-databases/essbase/21/index.html
175177
[oci]: https://cloud.oracle.com/cloud-infrastructure
176178
[orm]: https://docs.cloud.oracle.com/iaas/Content/ResourceManager/Concepts/resourcemanager.htm
177-
[kms]: https://docs.cloud.oracle.com/iaas/Content/KeyManagement/Concepts/keyoverview.htm
179+
[vault]: https://docs.cloud.oracle.com/iaas/Content/KeyManagement/Concepts/keyoverview.htm
178180
[tf]: https://www.terraform.io

VARIABLES.md

Lines changed: 8 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,6 @@
2222
| compartment_ocid | Y | | The target compartment OCID in which all provisioned resources will be created. |
2323
| stack_display_name | N | | Display name prefix for all generated resources. If not specified, this will be automatically generated. |
2424

25-
## Vault Variables
26-
| Name | Required | Default | Description |
27-
| ---- | -------- | ------- | ----------- |
28-
| kms_key_id | Y | | The OCID for the encryption key used for the provided credentials. |
29-
| kms_crypto_endpoint | Y | | The crypto endpoint for the vault. |
30-
3125
## Notification Details
3226
| Name | Required | Default | Description |
3327
| ---- | -------- | ------- | ----------- |
@@ -73,7 +67,7 @@
7367
| config_volume_size | N | 64 | Define the target size of the configuration volume, which stored the Essbase system data, such as logs. |
7468
| temp_volume_size | N | 64 | Defined the target size of runtime temporary data. |
7569
| essbase_admin_username | N | admin | The name of the Essbase system administrator. |
76-
| essbase_admin_password_encrypted | Y | | The password for the Essbase system administrator, encrypted with the provided vaule key. Use a password that starts with a letter, is between 8 and 30 characters long, contains at least one number, and, optionally, any number of the special characters (`$` `#` `_`). For example, `Ach1z0#d`. |
70+
| essbase_admin_password_id | Y | | The OCID for the vault secret that holds the password for the Essbase system administrator. Use a password that starts with a letter, is between 8 and 30 characters long, contains at least one number, and, optionally, any number of the special characters (`$` `#` `_`). For example, `Ach1z0#d`. |
7771
| rcu_schema_prefix | N | | Schema prefix to use when running RCU. A value with be automatically generated if not specified. |
7872
| create_public_essbase_instance | N | false | Create the Essbase compute instance with a public IP address. |
7973
| enable_essbase_monitoring | N | false | If enabled, the Essbase compute instance will emit telemetry data to the OCI Monitoring service. |
@@ -82,21 +76,21 @@
8276
## Security Details
8377
| Name | Required | Default | Description |
8478
| ---- | -------- | ------- | ----------- |
85-
| security_mode | N | idcs | Choose embedded LDAP or integration with Identity Cloud Service (IDCS). The use of embedded LDAP is not recommended for production workloads. |
86-
| idcs_tenant | if `security_mode=idcs` | | The ID of your Identity Cloud Service instance, which typically has the format idcs-<guid>, and is part of the host name that you use to access Identity Cloud Service. |
87-
| idcs_client_id | if `security_mode=idcs` | | The client ID for the IDCS application. |
88-
| idcs_client_secret_encrypted | if `security_mode=idcs` | | The client secret for the IDCS application, encrypted with the provided vault key. |
89-
| idcs_external_admin_username | if `security_mode=idcs` | | A user id to be registered as an Essbase administrator. This user must exist in the provided Identity Cloud Service instance. |
79+
| identity_provider | N | idcs | Choose embedded LDAP or integration with Identity Cloud Service (IDCS). The use of embedded LDAP is not recommended for production workloads. |
80+
| idcs_tenant | if `identity_provider=idcs` | | The ID of your Identity Cloud Service instance, which typically has the format idcs-<guid>, and is part of the host name that you use to access Identity Cloud Service. |
81+
| idcs_client_id | if `identity_provider=idcs` | | The client ID for the IDCS application. |
82+
| idcs_client_secret_id | if `identity_provider=idcs` | | The OCID for the vault secret that holds the client secret for the IDCS application. |
83+
| idcs_external_admin_username | if `identity_provider=idcs` | | A user id to be registered as an Essbase administrator. This user must exist in the provided Identity Cloud Service instance. |
9084

9185
## Database Details
9286
| Name | Required | Default | Description |
9387
| ---- | -------- | ------- | ----------- |
9488
| use_existing_db | N | false | Select this option to enable support of an existing database for the internal Essbase repository. |
9589
| existing_db_type | N | Autonomous Database | Select which database you will use |
9690
| existing_db_id | N | | Target ATP database in which to create the Essbase schema. |
97-
| db_admin_password_encrypted | if `existing_db_type=Autonomous Database` | | The password for the database administrator, encrypted with the provided vault key. Use a password that starts with a letter, is between 12 and 30 characters long, contains at least one number, and at least one of the special characters (`$` `#` `_`). For example, `BEstr0ng_#12`. |
91+
| db_admin_password_id | if `existing_db_type=Autonomous Database` | | The OCID for the vault secret that holds the password for the database administrator. Use a password that starts with a letter, is between 12 and 30 characters long, contains at least one number, and at least one of the special characters (`$` `#` `_`). For example, `BEstr0ng_#12`. |
9892
| db_license_model | N | LICENSE_INCLUDED | |
9993
| existing_oci_db_system_database_id | N | | The database within the DB System in which to create the Essbase schema. |
10094
| existing_oci_db_system_database_pdb_name | N | | The name of the pdb in the target database. Required if not using the default pdb created during database provision. |
10195
| oci_db_admin_username | N | SYS | The username for the database administrator. |
102-
| oci_db_admin_password_encrypted | if `existing_db_type=OCI` | | The password for the database administrator, encrypted with the provided vault key. Use a password that starts with a letter, is between 12 and 30 characters long, contains at least one number, and at least one of the special characters (`$` `#` `_`). For example, `BEstr0ng_#12`. |
96+
| oci_db_admin_password_id | if `existing_db_type=OCI` | | The OCID for the vault secret that holds the password for the database administrator. Use a password that starts with a letter, is between 12 and 30 characters long, contains at least one number, and at least one of the special characters (`$` `#` `_`). For example, `BEstr0ng_#12`. |

build.sh

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,7 @@ mkdir -p $folder
1414
cd $folder
1515
cp -R $SCRIPT_DIR/terraform/* .
1616
rm -rf .terraform
17-
rm -rf essbase-ucm*
18-
for file in *.disabled; do mv $file ${file//.disabled/}; done
17+
rm -rf *.ucm
1918
ls -la
2019
zip -r $SCRIPT_DIR/build/essbase-stack-byol.zip *
2120
cd $SCRIPT_DIR
@@ -28,8 +27,7 @@ mkdir -p $folder
2827
cd $folder
2928
cp -R $SCRIPT_DIR/terraform/* .
3029
rm -rf .terraform
31-
rm -rf essbase-byol*
32-
for file in *.disabled; do mv $file ${file//.disabled/}; done
30+
for file in *.ucm; do mv $file ${file//.ucm/}; done
3331
ls -la
3432
zip -r $SCRIPT_DIR/build/essbase-stack-ucm.zip *
3533
cd $SCRIPT_DIR

terraform/LICENSE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Copyright (c) 2019, 2020 Oracle and/or its affiliates.
1+
Copyright (c) 2019, 2021 Oracle and/or its affiliates.
22

33
The Universal Permissive License (UPL), Version 1.0
44

terraform/bastion.auto.tfvars

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
## Copyright (c) 2020, Oracle and/or its affiliates.
1+
## Copyright (c) 2020, 2021, Oracle and/or its affiliates.
22
## Licensed under the Universal Permissive License v1.0 as shown at https://oss.oracle.com/licenses/upl.
33

4-
bastion_listing_id="ocid1.appcataloglisting.oc1..aaaaaaaapijjaj2lugi5nfhs4nmgtsjpcvz6zppgt6ndhobbcwkttdbfefeq"
5-
bastion_listing_resource_version="19.3.0.3.4-2010151027"
6-
bastion_listing_resource_id="ocid1.image.oc1..aaaaaaaaxidkhbnhzf2mwwuw6wgswqibk4hkzhz3ccpoa47qs4ddu6a4tqxa"
4+
bastion_listing_id = "ocid1.appcataloglisting.oc1..aaaaaaaapijjaj2lugi5nfhs4nmgtsjpcvz6zppgt6ndhobbcwkttdbfefeq"
5+
bastion_listing_resource_version = "19.3.0.3.4-2010151027"
6+
bastion_listing_resource_id = "ocid1.image.oc1..aaaaaaaaxidkhbnhzf2mwwuw6wgswqibk4hkzhz3ccpoa47qs4ddu6a4tqxa"

0 commit comments

Comments
 (0)