An open API service indexing awesome lists of open source software.

https://github.com/oracle-quickstart/oci-siebel-monitoring


https://github.com/oracle-quickstart/oci-siebel-monitoring

Last synced: 4 months ago
JSON representation

Awesome Lists containing this project

README

        

# Siebel-SENSORS
Oracle Logging Analytics can help you identify Siebel CRM issues to make your business operations smooth to delight your customers. This resource manager stack configures logging analytics to enable these functional sensors such as:

Anomaly Detection
Which component is failing
And 100s of more issues
This OCI Resource Manager stack creates a instance in the subnet from which Siebel Database is accessible, configures Management Agent and Logging Analytics to run regular Business checks. It installs four new dashboards covering different tiers of Siebel deployment. Note: This stack doesn't start standard Logs collection and Logging Analytics Siebel Discovery from the UI should be used to discover and enable logs collection.

As part of this deployment, a compute instance is created and Oracle Cloud Agent is configured to collect log data. Users can select the Siebel products that they are using and Siebel sensor sources for those products are created. Siebel Database entity and source-entity associations are also created.

## Prerequisites
- VCN and subnet from where database can be accessed.
- The subnet should have access to OCI Services (via a Service Gateway)
- Quota to create the following resources: 1 Compute instance, 1 dynamic group, 1 policy
- Store Siebel DB password in OCI Vault in base encoded form.
- Store schedule file in OCI Object Storage bucket.
- Create database user with access to select from tables used in the sensors. Use USER_ACCESS_TABLES.md file.

If you don't have the required permissions and quota, contact your tenancy administrator. See [Policy Reference](https://docs.cloud.oracle.com/en-us/iaas/Content/Identity/Reference/policyreference.htm), [Service Limits](https://docs.cloud.oracle.com/en-us/iaas/Content/General/Concepts/servicelimits.htm), [Compartment Quotas](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcequotas.htm).

## Deploy Using OCI Resource Manager

1. Click [![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle-quickstart/oci-ebs-monitoring/releases/download/v0.9/ebs-v0.9.zip)

# If you aren't already signed in, when prompted, enter the tenancy and user credentials.

2. Review and accept the terms and conditions.

3. Select the region where you want to deploy the stack.

4. Follow the on-screen prompts and instructions to create the stack.

5. After creating the stack, click **Terraform Actions**, and select **Plan**.

6. Wait for the job to be completed, and review the plan.

To make any changes, return to the Stack Details page, click **Edit Stack**, and make the required changes. Then, run the **Plan** action again.

7. If no further changes are necessary, return to the Stack Details page, click **Terraform Actions**, and select **Apply**.

## Deploy Using the Terraform CLI

### Clone the Module
Now, you'll want a local copy of this repo. You can make that with the commands:

git clone https://github.com/oracle-quickstart/oci-siebel-monitoring
cd oci-siebel-monitoring
ls

### Set Up and Configure Terraform

1. Complete the prerequisites described [here](https://github.com/cloud-partners/oci-prerequisites).

2. Create a `terraform.tfvars` file, and specify the following variables:

```
# Authentication
tenancy_ocid=""
auth_type="user"
# Config file is ~/.oci/config
config_file_profile="DEFAULT"

# Region
region = ""

# Compartment
compartment_ocid = ""

# Siebel DB Info
subnet_ocid=""
db_compartment=""
db_cred_compartment=""

db_host=""
db_port=
db_service=""
db_username=""
db_credentials=""
db_user_role="NORMAL"

#Agent Compute Instance Info
instance_name="SiebelAgentVM"
availability_domain=""
instance_shape="VM.Standard.E2.1"
user_ssh_secret=""

# Set to false if you want to manually create dynamic group and policies
setup_policies=true

# Location of schedule file
bucket_name=""
file_name="logan_schedule_database_sql_Siebel.csv"

# Log Analytics Resources
resource_compartment=""
create_log_group=false
log_group_ocid=""
la_entity_name = ""

# Selected products
#products="Siebel CRM"

products="Siebel Communications,Siebel CRM,Siebel Email Response,Siebel Loyalty Engine,Siebel Loyalty Manager,Siebel Marketing,Siebel Product Configurator,Siebel Remote,Siebel Reports,Siebel Tools,Siebel Workflow"

### Create the Resources
Run the following commands:

terraform init
terraform plan
terraform apply

```
Outputs:

### Destroy the Deployment
When you no longer need the deployment, you can run this command to destroy the resources:

terraform destroy

### Dynamic Groups and Policies (if adding manually)

1. Create a dynamic group instance dynamic group with matching rule:
- ANY {instance.compartment.id = ''}
2. Create dynamic group mgmtagent dynamic group with matching rule:
- ALL {resource.type='managementagent', resource.compartment.id=''}
3. Create a policy at tenancy level with the following statements:
- Allow DYNAMIC-GROUP to {LOG_ANALYTICS_LOG_GROUP_UPLOAD_LOGS} in tenancy
- ALLOW DYNAMIC-GROUP TO MANAGE management-agents IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO USE METRICS IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO MANAGE management-agents IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO MANAGE management-agent-install-keys IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO MANAGE OBJECTS IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO READ BUCKETS IN COMPARTMENT ID
- ALLOW DYNAMIC-GROUP TO READ secret-family in COMPARTMENT ID } where target.secret.id = ''