How to manually deploy an aveksa ear file in RSA Identity Governance & Lifecycle
Originally Published: 2020-01-17
Article Number
Applies To
RSA Version/Condition: 7.0.x, 7.1.x, 7.2.x, 7.5.x
Issue
Resolution
Any of these ear files may be manually deployed using the jboss-cli.sh utility in $AVEKSA_HOME/wildfly/bin. The process is to undeploy the existing ear file, deploy the new ear file as aveksa.ear and update the $AVEKSA_HOME/archive/wildfly_deployment.properties file to point to the deployed ear file.
- Login as the oracle user.
- Determine the name of the existing deployed ear file.
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deployment-info"
- You should see the following output:
NAME RUNTIME-NAME PERSISTENT ENABLED STATUS aveksaWFArchitect.ear aveksaWFArchitect.ear true true OK aveksa.ear aveksa.ear true true OK
However, you may see output similar to the following if you have previously deployed the ear file manually and did not deploy the ear file as aveksa.ear.
NAME RUNTIME-NAME PERSISTENT ENABLED STATUS aveksaWFArchitect.ear aveksaWFArchitect.ear true true OK <name other than aveksa.ear> <name other than aveksa.ear> true true OK
- Undeploy the ear file (Standalone).
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="undeploy <name of deployed aveksa ear file>"
- Undeploy the ear file (Clustered).
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="undeploy <name of deployed aveksa ear file> --server-groups=img-server-group"
- Deploy the new ear file as aveksa.ear. (Standalone).
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deploy $AVEKSA_HOME/archive/<name of aveksa ear file to be deployed> --name=aveksa.ear --runtime-name=aveksa.ear"
- Deploy the new ear file as aveksa.ear. (Clustered).
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deploy $AVEKSA_HOME/archive/<name of aveksa ear file to be deployed> --name=aveksa.ear --runtime-name=aveksa.ear --server-groups=img-server-group"
- Check that the aveksa.ear file deployed correctly.
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deployment-info"
You should see the following output:
NAME RUNTIME-NAME PERSISTENT ENABLED STATUS aveksaWFArchitect.ear aveksaWFArchitect.ear true true OK aveksa.ear aveksa.ear true true OK
- Check that the variable name CURRENTLY_DEPLOYED_ARCHIVE in $AVEKSA_HOME/archive/wildfly_deployment.properties is defined as the currently deployed ear file. This variable is used when patching, upgrading, and/or customizing RSA Identity Governance & Lifecycle so it is important that the variable points to the correct ear file. For example, given the below deployment command:
$AVEKSA_HOME/wildfly/bin/jboss-cli.sh -c --controller="127.0.0.1:9999" --command="deploy $AVEKSA_HOME/archive/aveksa_7.1.1_161195_P04-2020-Jan-20-9.00_custom.ear --name=aveksa.ear --runtime-name=aveksa.ear"
The wildfly_deployment.properties file should look like the below where CURRENTLY_DEPLOYED_ARCHIVE is the name of the ear file you just deployed, and INITIAL_ARCHIVE is the name of the GA ear file.
CURRENTLY_DEPLOYED_ARCHIVE=aveksa_7.1.1_161195_P04-2020-Jan-20-9.00_custom.ear INITIAL_ARCHIVE=aveksa_7.1.1_161195-<date of installation>.ear
Related Articles
How to configure a global default Circuit Breaker threshold value in RSA Identity Governance & Lifecycle 83Number of Views Initialization operations completed with errors after RSA Identity Governance & Lifecycle 7.1P03 upgrade 102Number of Views Private key decryption error: Unsupported keysize or algorithm 24Number of Views The impact on RSA Authentication Manager 8.x of vulnerabilities reported in: OpenSSL Security Advisory - Dec 2015 - False … 66Number of Views RSA Identity Governance & Lifecycle - Unable to create change requests when running a form that has more than one Provisio… 61Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?