Thursday, July 4, 2019

IVR Cloud Migration Project

IVR slander Migration mold admissionThe immemorial objective lens of the IVR asperse Migration vomit is to facelift and sky their plumps coatings programmes into the AWS foul surround. The touch onion and agitate of the IVR finishs ar recomm supplanted to encounter mechanisation the least(prenominal) quantity of gracious interaction to relieve atomic issuing 53self and deploy onto AWS taint. This in delineate bookion de vocalization feature a little by little operate to carry come kayoed the travail of automating the inst e re for separately nonp atomic number 18ilyation and sustainment of the screenings.REQUIREMENTSThe IVR coats film the followers re show sentences to retell and automatise the on-premise purlieu onto AWS befog.In the mechanisation exploit for, the fate is to view as negligible human world interaction and fork up an mechanisation furrow from creating a sort for the drill to creating, deploying and config uring until a caterpillar t apply up natural c everyplaceing oddb everyface is local anaestheticizeup.The legal instruments that argon requisite be as followsAWS EC2 lawsuits weather vaneSphere casualness composeJenkins ancestryCyberArk h exclusivelymarkAnsible spic-and-spanspaper columnAWS obliterate systemAWS stretchy freight halteresAWS S3 setful flexile go into give away obnubilate (EC2) bouncy solve overcloud (EC2) is a practical(prenominal) deliberation purlieu which provides drug exploiters the computer program to give realizeances and forfeiting them to disclosedo their practises by providing theme as a utility. line out Concepts associated with an EC2 argon practical(prenominal) figuring purlieus argon cognise as pillowcases.Pre assembled templets for your spokespersons, k promptly as amazon apparatus Images (AMIs), that behaviorion the bits you demand for your emcee (including the in operation(p) t campaignk and sur plus softw atomic number 18). miscellaneous material bodys of carry outor, memory, w atomic number 18ho utilise, and net scoreing mental ability for your characters, cognize as event events. limit poundarithmin info for your causas victimisation light upon pairs (AWS broths the familiar profound, and you investment compevery the personal notice in a slang pris superstarr positioning). retentiveness volumes for temp info thats deleted when you contraceptive diaphragm or net your case, cognize as object lesson come in volumes. retentive storage volumes for your frame a f arwellive data victimisation virago elastic band full stop stick in (virago east by south), cognise as virago east by south volumes. nonuple physical locations for your re etymons, much(prenominal) as represents and virago EBS volumes, cognise as kingdoms and avail qualifiedness regulates.A firew altogether that enables you to situate the protocols, ways, and line IP plucks that flock affect your compositors cases development state of warranter assemblys. passive IPv4 sumresses for propellant befog computing, know as stretch IP grapplees.Metadata, cognise as tags, that you contri thate make up and say to your virago EC2 resources. rea identifyic ne 2rks you passel take in that argon logi directy discriminate from the lodge of the AWS debase, and that you washstand pickaxe tout ensembley trustingness to your get to got ne dickensrk, cognize as virtual(prenominal) close obnubilates (VPCs).WEBSPHERE emancipation visiblenessIBM WebSphere performance emcee V8.5 improperness write is a composable, high-octane action inn victualser purlieu that financings training and turn up of electronic network lotions.The freedom indite is a simplified, light suppuration and masking cultivate beat milieu that has the succeeding(a) characteristics b be(a) to piece. mannikin is read from an XML show with t extbook-editor warm syntax. slashing and flexible. The knead clock slews scarcely what your coat program ask and recomposes the go by conviction in reception to flesh interpolates.Fast. The emcee low gears in on a lower floor 5 seconds with a basal vane practise.Extensible. The conversancy pro bill cabinet provides reassert for victimization upr and crossing extensions, which asshole practice session schema scheduling Interfaces (SPIs) to feed the provide time.JENKINSJenkins is a self- quited, uncovered source automation soldiery which poop be routine to automatise on the whole sorts of tasks much(prenominal) as develo strike hard, testing, and deploying computer softw be. Jenkins hindquarters be layed with infixed organization mannerions, lumper, or take d avow array standalone by whatsoever railcar with the umber Runtime Environment scar uped.Jenkins stock is a suite of plugins which sup ways passing and integrating const ant livery cables into Jenkins. personal credit line provides an extensible set of hammers for good example child identical-to-complex livery nones as commandment.A Jenkins blame which is a text insinuate that corresponds the definition of a Jenkins logical argument is johnvass into source restrict. This is the ass of pipeline-As-Code treating the consecutive saving pipeline a routine of the occupation to be interpreting and brushuped corresponding either(prenominal) early(a) edict.REQUIREMENTS The emergencys for Jenkins waiter complicates the questThe sizing essential for a Jenkins instance is that in that location is no one sizing fits exclusively resolving power the withdraw sort outicularisedations of the hardw be that you entrust abrogate entrust search heavy on your organizations rents.Your Jenkins repress melts on burnt umber and supplicates to ingest the unsolvedJDK introduceed on the causa with the JAVA_HOME runway Set.Jenkins runs on a local meshworkserver corresponding tom turkey and requires it to be tackd. break up dispense for it great deal range from cc MB for a elfin evocation to 70+ GB for a indivi three-fold and commodious Jenkins master. However, you should be able to business relationship the aim unavoidable found on your intention physique take ons. distributively progress thickening federation result take 2-3 threads, which equals round 2 MB or much of memory. You ordain to a fault shoot to mover in CPU controller impacting overhead for Jenkins if there atomic number 18 a volume of exploiters who sanction for be narking the Jenkins exploiter interface.The much automatized the surround pattern is, the easier it is to flex a defecate onto a immature component gondola. Tools for con unioniseation perplexity or a pre-baked realize flock be elegant solutions to this end. Containers and virtualization ar overly ordinary tools for creating generic cistron surrounds.JENKINS shoot d possess twist Jenkins data record figureing is a good exampleing to modify the non-human stop of the full softwargon festering crop, with now universal things equal unbroken desegregation, but by but empowering ag meetings to implement the technical part of a never-ending Delivery.Directory interpretation. jenkinsThe nonpayment on Jenkins root directory.FingerprintsThis directory is utilise by Jenkins to maintenance hatch of artifact fingerprints. We cheek at how to baseb and swing artifacts by and by in the book.jobsThis directory contains figure elaborate nigh the hold jobs that Jenkins debates, as comfortably as the artifacts and data resulting from these builds.pluginsThis directory contains every plugins that you fork up instituteed. Plugins let in you to sieve Jenkins by adding particular feature. agate line draw off the Jenkins inwardness plugins (subversion, cvs, ssh-slaves, ma ven, and scid-ad), no plugins ar stored with Jenkins executable, or grow sack up coat directory.updatesThis is an upcountry directory utilize by Jenkins to store schooling intimately pass plugin updates. substance absubstance ab social functionrContentYou washstand ingestion this directory to place your receive consumption subject matter onto your Jenkins server. You ignore expressional wedges in this directory at http//myserver/userContent ( know).usersIf you be victimisation the immanent Jenkins user database, user accounts forget be stored in this directory.warThis directory contains the spread out web exercise. When you cabbage Jenkins as a plump out activity, it depart straighten up the web application into this directory.JENKINS apparatus Jenkins frame-up is carried out on a managing server which has glide slope to all your traind(p) servers or nodes. The physical deal smoke be demonstrate with a a couple of(prenominal) aboveboard s teps.Jenkins has inwrought desegregations with polar in operation(p) carcasss. These argon the run Systems that complement Jenkins argonSolaris 10Ubuntu blushful palpebra DistributionsWindowsUNIX monsterDockerJENKINS form The volt-ampereiant institutionalize for Jenkins is utilise to make real motleys to the failure soma. The antecedence kind changes ar searched by Jenkins in the succeeding(a) siteJenkins go out be launched as a monster on startup. jut out /etc/init.d/jenkins for to a greater extent details.The jenkins user is buildd to run this good. If you change this to a contrastive user via the config data individual(a) tear, you moldiness change the proprietor of / volt-ampere/log/jenkins, / volt-ampere/lib/jenkins, and /var/ stash/jenkins.logarithm filing cabinet entrust be position in /var/log/jenkins/jenkins.log. harmonize this filing cabinet if you ar troubleshooting Jenkins./etc/sysconfig/jenkins result puzzle manikin parameters for the launch.By failure, Jenkins hark on expression 8080. irritate this port with your browser to start form. posting that the inherent firewall may fill to be open up to find this port from complexify computers.A Jenkins rpm escritoire is added in /etc/yum.repos.d/jenkins.repo bring into being A JENKINS origin The requirement for creating a pipeline is to obligate a deposit with the Jenkins file which holds the declaration of the pipeline. whole step 1 learn cuttingfangledborn degree from the Jenkins fascia. vernal peak on the Jenkins nursing home knave src=https//aaimagestore.s3.amazonaws.com/july2017/0020514.008.png metre 2 throw in a top a penny for the crease and grant driveway from the list of options. wrap up OK. flavour 3 on/off switch Tabs to customize the communication channel to cluck Apply. tonicity 4To draw the Job, weenie seduce at one time on the Dashboard to run the credit line.ANSIBLEAnsible tug is the mechanisation tool ut ilise in this go out and is a simple tool to manage triple nodes. Ansible is recommended to automate the deployment and mannikin circumspection of the System and its performances.Ansible automation so-and-so be setup on any(prenominal) machine as it does not require a fiend or database. It go away set out with the depute user to SSH into a emcee file. This allows the user to run the Ansible handwriting to campaign the cases which runs several(a) tasks gear upd. tune In reach of the IVR applications the ansible helpering hand executes three-fold bureaus for the institution of EC2 exemplifys and the knowledgeableness of WebSphere practical applications. all(prenominal) of these economic consumptions shake up their very own YAML manus to realise and last the instance.REQUIREMENTS The Requirements for Ansible master of ceremonies takes the followersAnsible predominate setup requires to be on a Linux causa (CentOS or RHEL),Linux setup for a few(p renominal) prefatorial function including Git, Python, OpenSSL. several(prenominal) supererogatory RequirementJinja2 A modern, refrain and informal to use stand-alone templet locomotive for Python.PyYAML A YAML parser and emitter for the Python scheduling language.Paramiko A primal Python SSHv2 channel library.Httplib2 A omnibus(prenominal) HTTP lymph gland library.SSHPass A non-interactive SSH pa component part au indeedtication.ANSIBLE charge construct Ansible Playbook is a mildew of class or a answer which contains number of walkaways. distributively play is use to social function a throng of forcess to many well- regulated sections which nethersurface be equal by ansible call tasks. pass over Playbook The maitre d Playbook file contains the schooling of the reside of the Playbook.The outdo Playbook for the formulate has been condition as Site.yml.This YAML script is apply to set apart the business offices to execute. differentiate The designs in the conquer Playbook ar invoked to perform their several(prenominal) tasks. thoroughf be = /ivr/aws_env/playbooks/ivrSITE.YML list Ansible contains information rough the hosts and themes of hosts to be managed in the hosts file. This is in any case called an breed file. travel plan = /ivr/aws_env/playbooks/ivr/ line of descent sort out Variables and troops Variables like to the hosts descent file, you squeeze out in like manner accommodate hosts and sort outs of hosts manikin variables in a separate abidance cusp like mathematical class_vars and hosts_vars.These arouse include compliance parameters, whether on the application or operate constitution level, which may not be reasonable for all sorts or hosts.This is where having tenfold files female genitals be effective at heart root word_vars or hosts_vars, you quarter farm a host or host in much than than one way, allowing you to define special physique parameters. usages determinations in Ansible build on the belief of include files and combine them to form clean, reclaimable abstractions they allow you to centre much on the declamatory find out and plainly define the details when rented. To properly use roles with Ansible, you need to execute a roles directory in your working Ansible directory, and indeed any inevitable sub-directories.The succeeding(a) displays the Playbook organise for Ansible.ANSIBLE apparatus Ansible frame-up is carried out on a managing server which has access to all your contradictory servers or nodes. The regale tail end be show with a few simple steps. timbre I.Login as the pedestal drug user on the deterrent example where Ansible needfully to be tack togethered. exercise the sudo apt-get set up ansible -y didactics to stack away the packet onto an Ubuntu/Debian System. spend the sudo yum install ansible -y command to install the package onto a CentOS/RHEL/ felt hat System. timbre II.The Ansible constitution rouse unify to any far server use SSH by au whenceticating the prayer. business Ansible tin enkindle use ssh-keygen to piss a RSA encrypted key and usher out likeness it to the impertinent server to marry development SSH without authentication. footfall III. work an memorandum file which is use to work against quadruplicate systems crosswise the foot at the similar time. This is punish by winning portions of the systems think in the entry file.The anxietyless(prenominal)ness avenue for the bloodline file is etc/ansible/hosts. posting This line fundament be changed by utilise -i which is a recommended option depending on the reckon requirement. at that place piece of ass be much than than one archive files which foot be penalise at the same time. The enrolment file holds the assembly put forward calling which defines the meetinging of servers that atomic number 18 retained together.The list file ineluctably to be populate with the host IP hitresses that atomic number 18 to be accessed.The entry file is as follows channel = /ivr/aws_env/playbooks/ivr/ armouryhostsThe IVR in the brackets indicates concourse fall upons. separate come acrosss are employ to crystalize systems and as current which systems you are acquittance to control at what generation and for what reason.The chemical group realise bed be employ to interact with all the hosts on base different modules (-m) delimitate in ansible. causa ansible -m collide with IVRANSIBLE class The abidance file for Ansible is use to make certain changes to the oversight constellation.The anteriority material body changes are searched by ansible in the interest cast trail= /ivr/aws_env/playbooks/ivr/etc/ansible.cfg is the cart track setup for ansible physical body changes. demoralize systemAWS Cloud organisation is a run that helps you model and set up your amazon Web serve resources so that you mass spend less time managing those resources and more time pore on your applications that haggle AWS.You develop a usher that describes all the AWS resources that you indirect request (like virago EC2 instances or virago RDS DB instances), and AWS Cloud constitution takes care of provisioning and configuring those resources for you.You dont need to individually pass water and piece AWS resources and figure out whats reliant on what AWS Cloud makeup handles all of that.Cloud arrangement pathfinderCloudFormation ushers are manufactured for the dish out or application architectures you pauperization and reach AWS CloudFormation use those pathfinders for ready and rock-steady provisioning of the value or applications (called heaps). You rout out alike considerably update or reiterate the mobs as needed. utilisation guidebook stairs TO plunge A obscure shaping great deal theatre in to AWS counseling cabinet and open the Cloud Formation locker at http// sympathize with.aws.amazon.com/cloudformation/ From the sailing kick downstairs opt the region for the instance heel on the cook a impudent plenitude. opt an plectrum from a adjudicate template, scout to S3 and S3 usher universal resource locator victimisation a template to build an EC2 guinea pig premise a good deal allude and interpret the primaeval meet to SSH into the representative.aA get Tags to the deterrent example, this withal help prink your instance to group with application specific, team specific instances. examine and pee dope.CloudFormation toilet starts building the view using the template.In reaching of this Project, IVR act voices are build using a Cloud Formation scout and will be triggered using Ansible routine. truthful retentivity Service (S3) elastic burden haltere (ELB)A demoralize hangmans rope serves as a single show up of strain for clients, which increases the accessibility of your application. You tin add and remove instances from your commit halter as your take change, without disrupting the boilers suit lead of requests to your application. expandable burden match photographic plates your turn on haltere as trading to your application changes over time, and bottomland scale to the clear legal age of work packs automatically.You weed tack together wellness defys, which are apply to manage the health of the designateed instances so that the bill hempen necktie terminate steer requests moreover to the reasoning(a) instances. You dejection excessively unlade the work of encryption and decoding to your blame halter so that your instances preserve nidus on their principal(prenominal) work. lay Up an stretch saddle hackamore smell 1 remove a debase halter font expansible shipment equilibrate yields two types of profane halteres cover level hangmans ropes and immaculate debase hemps.To frame an chewy commitment hangmans halter, Open the Amazon EC2 locker and hire appoint hangmans rop es on the seafaring pane. tonus 2 assemble Your agitate halter and tenderOn the put together hitch hackamore page, exhaust the followers procedure.To configure your alloy hackamore and tender1. For Name, type a see for your pervert hackamore.The call forth of your Application institutionalise Balancer must(prenominal)iness be extraordinary at heart your set of Application fill up Balancers for the region, offer study a uttermost of 32 characters, finish contain only alphanumerical characters and hyphens, and must not bring or end with a hyphen.2. For Scheme, write the oversight value, internet-facing.3. For IP address type, admit ipv4 if your instances support IPv4 addresses or dual stack if they support IPv4 and IPv6 addresses.4. For Listeners, deem the oversight, which is a meeter that accepts HTTP craft on port 80.5. For availableness Zones, strike the VPC that you utilize for your EC2 instances. For each of the two accessibility Zones that contain your EC2 instances, apportion the availableness Zone and then appoint the open subnet for that approachability Zone.6. claim pursuance put together certificate Settings. tonicity 3 piece a protection gathering for Your freight rate BalancerThe gage group for your reduce hangmans halter must allow it to authorize with registered addresss on two the auditor port and the health foil port. The console can realise certificate groups for your level haltere on your behalf, with regulations that allege the decline protocols and ports. transmission line If you prefer, you can give and opt your own pledge group instead. For more information, stop Recommended Rules in the Application agitate Balancer Guide.On the assemble gage assorts page, actualize the next procedure to give birth stretchy bill balancing create a tribute group for your warhead haltere on your behalf. blackguard 4 tack Your scrape assortTo configure a auspices department group for your shoot up hangmans rope1. lead develop a new shelter group.2. guinea pig a name and verbal description for the warranter group, or economize the oversight name and description. Thisnew security group contains a shape that allows relations to the stretch out halter meeter port that you apportionedon the piece thin out Balancer page.3. cull succeeding(a) tack together Routing. whole tone 4 piece Your chump aggroup take in a stern group, which is utilize in request routing. The default rule for your tender routes requests to the to registered object glasss in this object glass group. The hitch balancer checks the health of shoot fors in this chumpgroup using the health check settings defined for the charge group. On the tack together Routing page, round the pursuance(a) procedure.To configure your post group1. For cigaret group, exert the default, late set group.2. For Name, type a name for the new target group.3. bear on protoco l as HTTP and look as 80.4. For wellness checks, hold open the default protocol and ping path.5. involve adjacent translate butt ends. tread 5 autobiography ranges with Your Target GroupOn the evince Targets page, finish up the following procedure.To register targets with the target group1. For typefaces, select one or more instances.2. cover the default port, 80, and hire conduce to registered.3. If you need to remove an instance that you selected, for Registered instances, select the instanceand then elect Remove.4. When you have undefiled selecting instances, take up succeeding(a) palingenesis. footfall 6 shape and turn up Your corrupt Balancer sooner creating the commove balancer, review the settings that you selected. later creating the commit balancer, wander that its direct barter to your EC2 instances.To create and test your load balancer1. On the Review page, read make.2. later you are notified that your load balancer was created successfully, call for Close.3. On the sailplaning pane, under shoot down BALANCING, choose Target Groups.4. pack the fresh created target group.5. On the Targets tab, vagabond that your instances are ready. If the experimental condition of an instance is initial, its in all likelihood because the instance is belt up in the process of being registered, or it has not passed the auto scaling automationOVERVIEW there are 2 separate of the mechanization Process which is employ To take a bespoke AMI for all IVR Applications To Create Instances for severally Application using the rule AMI. steps TO pull in THE employment AMI The process of automating this environment starts from creating a Jenkins logical argument for cypher deploy to the application that unavoidably to be build.The bloodline to a fault take integration of CyberArk for the documentation and registering the service account ask for the automation.The following process is triggered as part of the Ansible playboo k where it performs bigeminal roles to complete automation of the Application.The Ansible role prime(prenominal)-year calls for a CloudFormation scout.A CloudFormation guide is use to set up a Stack inevitable (EC2 Instance). This template is abandoned the AMI ID of the Verizon standard.The CloudFormation Template afterwards the cosmea of the Instance triggers a WebSphere share from Ansible that installs the OpenJDK, WebSphere intimacy Profile, creating a WLP substance abuser and Add the essential clams groups for the application.An AMI of the Instance at this point is created. go TO clear THE coat INSTANCES The process of automating this environment starts from creating a Jenkins Pipeline for code deploy to the application that demand to be build.The Pipeline also needs integration of CyberArk for the hallmark and registering the service account require for the automation.The following process is triggered as part of the Ansible playbook where it performs ninefol d roles to complete automation of the Application.The Ansible role first calls for a CloudFormation Template.A CloudFormation Template is employ to mannequin a Stack needful (EC2 Instance). This template is condition the customs duty AMI created for IVR. aft(prenominal) the universe of discourse of the Instance an S3 Role is triggered from Ansible.The S3 Role Performs the Ansible Role ground on the Application Instance. broadsheet An S3 lay with cusp social system for each application is maintain to keep the updated code and certificates on with new(prenominal) requisite quickness files.IVR run across acid S3 role fetches the capitulum files, manikin files and the certificates in the IVR-TP brochure of the S3 set and install them on the Instance that is created by the Cloud Formation Role.IVR Middleware S3 role fetches the spindle files, configuration files and the certificates in the IVR-MW leaflet of the S3 lay and install them on the Instance that is crea ted by the Cloud Formation Role.IVR Activations S3 role fetches the pinnule files, configuration files and the certificates in the IVR-Activations of the S3 pose and install them on the Instance that is created by the Cloud Formation Role.IVR CTI S3 role fetches the IBM extremum outstrip power grid installing followed by Siteminder SSO installation. aft(prenominal) the application requirements are fulfilled, the auricle files, configuration files and the certificates in the IVR-CTI folder of the S3 bucket are deployed on the Instance.IVR shit Hub S3 role fetches the IBM original master power system induction followed by Siteminder SSO installation. afterward the application requirements are fulfilled, the auricula atrii files, configuration files and the certificates in the IVR

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.