Summary
TQLConsole ThingSpaces Configurator can be used to deploy and manage the A-Stack Runtime Environment consisting of your models (projects) on a target host machine(s).
A-Stack Runtime Environment deploy and manage can be done using TQLConsole ThingsSpace Configurator User interface or using TQL Command Line Interface (TQL CLI).
It provides following functionalities :
- Deploy Cluster
- Start/Stop/Restart of application in cluster nodes
- Dynamic Editing of Application Configurations files per cluster peer basis
- Execute Shell Script(s) and TQL queries against each application node
- Application Monitoring for Memory, CPU Usage
- Perform On-Demand Garbage Collection on a per node basis
- Log Files Aggregation and ELK (Elastic Search, LogStash, Kibana Setup)
Preparing the Target Host(s)
Target Host(s) needs to be prepared before the TQL Applications can be deployed using ThingSpace Configurator.
Target Host(s) Requirements
- Target Host(s) OS - Please refer to A-Stack Runtime OS Support Matrix for details. Note the CPU, Memory and Storage of target host(s) is dependent on your Applications need.
- A-Stack Configurator Daemon:
- Port Requirement
- CPU, Memory footprint
- Always-on Vs On-Demand Mode
Download and Install A-Stack Configurator Daemon
- A-Stack Configurator Daemon can be downloaded from your account page.
- Install A-Stack Configurator Daemon
- Unzip the A-Stack Configurator Zip fie.
- Start the configurator using the TQL CLI Command.
- Please note that if you are starting multiple instances of A-Stack on same host; specify the Path parameter to the -engine command.
- Default SSL Certificate
- Testing if the Deamon is running
- Steps to generate SSL Certificate
#Steps to Create SSL Certificate
Update openssl.cnf file for SAN update -
1. Update openssl.cnf file located at /etc/pki/tls/openssl.cnf to add below configuration lines
These lines need to update in v3_req sectionsubjectAltName = @alt_names
alt_names
DNS.1 = localhost
DNS.2 = <Hostname>
IP.1 = <IP address>Execute below openssl commands to create and import ssl certificate -
1. openssl genrsa -des3 -out server.key 1024 -extensions v3_req -extfile /etc/pki/tls/openssl.cnf
2. openssl req -new -key server.key -out server.cer -extensions v3_req
3. cp server.key server.key.org
4. openssl rsa -in server.key.org -out server.key
5. openssl x509 -req -days 365 -in server.cer -signkey server.key -out server.crt -extensions v3_req -extfile /etc/pki/tls/openssl.cnf
6. openssl pkcs12 -export -in server.crt -inkey server.key -out serverKeystore.p12
7. export PATH=$PATH:/opt/jdk1.8.0_144/jre/bin – Find path till java keytool lib directory and pass it to export command
8. keytool -importkeystore -deststorepass test123 -destkeystore server.jks -srckeystore serverKeystore.p12 -srcstoretype PKCS12
Replace certificate in $TQL_HOME/sslcertificates folder; where $TQL_HOME is the directory where A-Stack Configurator Daemon is installed.
If certificate file name is different from server.jks then update its name in sff.local.config.xml file
Creating a Gold Copy of A-Stack Configurator
Docker Container
AWS EC2 AMI
The discovery result is divided into two parts: Local Engine and Cluster Nodes categorized the Group to which the nodes belong.
User can view the details of the node by clicking on any node on the graph. The details will be published on the right hand side.
View A-Stack General Information
Users can view general information about each of the node by clicking on public IP address of the node.
View A-Stack for CPU, Memory
Performing On-Demand GC
Users can perform On demand Garbage collection on the invidiual nodes by clicking on the "Perform GC" button
TQLConsole DevOps UseCase on AWS InfraStructure
Elastic Search, Log Stash and Kibana Setup
From the invididual nodes the user can setup the log files to be written to a common mount point file system - Say: AWS EFS
Following Search Fields are available: