ईवेंट्स
17 मार्च, 9 pm - 21 मार्च, 10 am
साथी डेवलपर्स और विशेषज्ञों के साथ वास्तविक दुनिया के उपयोग के मामलों के आधार पर स्केलेबल एआई समाधान बनाने के लिए मीटअप श्रृंखला में शामिल हों।
अभी पंजीकरण करेंयह ब्राउज़र अब समर्थित नहीं है.
नवीनतम सुविधाओं, सुरक्षा अपडेट और तकनीकी सहायता का लाभ लेने के लिए Microsoft Edge में अपग्रेड करें.
This tutorial walks you through the process of deploying WebLogic Server (WLS) with Azure Application Gateway. It covers the specific steps for creating a Key Vault, storing a TLS/SSL certificate in the Key Vault, and using that certificate for TLS/SSL termination. While all of these elements are well documented in their own right, this tutorial shows the specific way all of these elements come together to create a simple, yet powerful load-balancing solution for WLS on Azure.
Load balancing is an essential part of migrating your Oracle WebLogic Server cluster to Azure. The easiest solution is to use the built-in support for Azure Application Gateway. App Gateway is included as part of the WebLogic Cluster support on Azure. For an overview of WebLogic Cluster support on Azure, see What is Oracle WebLogic Server on Azure?.
In this tutorial, you learn how to:
OpenSSL on a computer running a UNIX-like command-line environment.
While there could be other tools available for certificate management, this tutorial uses OpenSSL. You can find OpenSSL bundled with many GNU/Linux distributions, such as Ubuntu.
An active Azure subscription.
The ability to deploy one of the WLS Azure Applications listed at Oracle WebLogic Server Azure Applications.
Here are some things to consider about migrating on-premise WLS installations and Azure Application Gateway. While the steps of this tutorial are the easiest way to stand up a load-balancer in front of your WebLogic Server Cluster on Azure, there are many other ways to do it. This list shows some other things to consider.
This section will show you how to provision a WLS cluster with Azure Application Gateway automatically created as the load balancer for the cluster nodes. The Application Gateway will use the provided TLS/SSL certificate for TLS/SSL termination. For advanced details on TLS/SSL termination with Application Gateway, see Overview of TLS termination and end to end TLS with Application Gateway.
To create the WLS cluster and Application Gateway, use the following steps.
First, begin the process of deploying a WebLogic Server configured or dynamic cluster as described in the Oracle documentation, but come back to this page when you reach Azure Application Gateway, as shown here.
You have several options to provide the TLS/SSL certificate to the application gateway, but can only choose one. This section explains each option so you can choose the best one for your deployment.
This option is suitable for production workloads where the App Gateway faces the public Internet, or for intranet workloads that require TLS/SSL. By choosing this option, an Azure Key Vault is automatically provisioned to contain the TLS/SSL certificate used by the App Gateway.
To upload an existing, signed, TLS/SSL certificate, use the following steps:
TLS/SSL certificates are associated with a DNS domain name at the time they're issued by the certificate issuer. Follow the steps in this section to configure the deployment with the DNS name for the certificate. You can use a DNS Zone you already have created or allow the deployment to create one for you. Select the DNS Configuration section to continue.
To use an existing Azure DNS Zone with the App Gateway, use the following steps:
To create an Azure DNS Zone to use with the App Gateway, use the following steps:
Finally, specify the names for the child DNS zones. The deployment will create two child DNS zones for use with WLS: one for the admin console, and one for the App Gateway. For example, if DNS Zone Name was contoso.net, you could enter admin and app as the values. The admin console would be available at admin.contoso.net
and the app gateway would be available at app.contoso.net
. Don't forget to set up DNS delegation as described in Delegation of DNS zones with Azure DNS.
The other options for providing an TLS/SSL certificate to the App Gateway are detailed in the following sections. If you're satisfied with your chosen option, you can skip to the section Continue with deployment.
This option is suitable for production or non-production workloads, depending on the TLS/SSL certificate provided. If you don't want the deployment to create an Azure Key Vault, you can identify an existing one or create one yourself. This option requires you to store the certificate and its password in the Azure Key Vault before continuing. If you have an existing Key Vault you want to use, skip to the section Create a TLS/SSL certificate. Otherwise, continue to the next section.
This section shows how to use the Azure portal to create an Azure Key Vault.
नोट
You may use the same name for both Resource group and Key vault name.
Key vault creation is fairly lightweight, typically completing in less than two minutes. When deployment completes, select Go to resource and continue to the next section.
This section shows how to create a self-signed TLS/SSL certificate in a format suitable for use by Application Gateway deployed with WebLogic Server on Azure. The certificate must have a non-empty password. If you already have a valid, non-empty password TLS/SSL certificate in .pfx format, you can skip this section and move on to the next. If your existing, valid, non-empty password TLS/SSL certificate is not in the .pfx format, first convert it to a .pfx file before skipping to the next section. Otherwise, open a command shell and enter the following commands.
नोट
This section shows how to base 64 encode the certificate before storing it as a secret in the Key Vault. This is required by the underlying Azure deployment that creates the WebLogic Server and Application Gateway.
Follow these steps to create and base 64 encode the certificate:
Create an RSA PRIVATE KEY
openssl genrsa 2048 > private.pem
Create a corresponding public key.
openssl req -x509 -new -key private.pem -out public.pem
You'll have to answer several questions when prompted by the OpenSSL tool. These values will be included in the certificate. This tutorial uses a self-signed certificate, therefore the values are irrelevant. The following literal values are fine.
Export the certificate as a .pfx file
openssl pkcs12 -export -in public.pem -inkey private.pem -out mycert.pfx
Enter the password twice. Take note of the password. You'll need it later when deploying WLS.
Base 64 encode the mycert.pfx file
base64 mycert.pfx > mycert.txt
Now that you have a Key Vault and a valid TLS/SSL certificate with a non-empty password, you can store the certificate in the Key Vault.
This section shows how to store the certificate and its password in the Key Vault created in the preceding sections.
To store the certificate, follow these steps:
myCertSecretData
, or whatever name you like.To store the password for the certificate, follow these steps:
myCertSecretPassword
, or whatever name you like.Now that you have a Key Vault with a signed TLS/SSL certificate and its password stored as secrets, return to the Azure Application Gateway section to identify the Key Vault for the deployment.
myCertSecretData
, or whatever name you entered previously.myCertSecretData
, or whatever name you entered previously.This will start the process of creating the WLS cluster and its front-end Application Gateway, which may take about 15 minutes. When the deployment completes, select Go to resource group. From the list of resources in the resource group, select myAppGateway.
The final option for providing a TLS/SSL certificate to the App Gateway is detailed in the next section. If you're satisfied with your chosen option, you can skip to the section Continue with deployment.
This option is suitable for test and development deployments only. With this option, both an Azure Key Vault and a self-signed certificate are automatically created, and the certificate is provided to App Gateway.
To request the deployment to perform these actions, use the following steps:
You can now continue with the other aspects of the WLS deployment as described in the Oracle documentation.
This section shows a technique to quickly validate the successful deployment of the WLS cluster and Application Gateway.
If you had selected Go to resource group and then myAppGateway at the end of the preceding section, you'll be looking at overview page for the Application Gateway. If not, you can find this page by typing myAppGateway
in the text box at the top of the Azure portal, and then selecting the correct one that appears. Be sure to select the one within the resource group you created for the WLS cluster. Then, complete the following steps.
If you're not going to continue to use the WLS cluster, delete the Key Vault and the WLS Cluster with the following steps:
Continue to explore options to run WLS on Azure.
ईवेंट्स
17 मार्च, 9 pm - 21 मार्च, 10 am
साथी डेवलपर्स और विशेषज्ञों के साथ वास्तविक दुनिया के उपयोग के मामलों के आधार पर स्केलेबल एआई समाधान बनाने के लिए मीटअप श्रृंखला में शामिल हों।
अभी पंजीकरण करेंप्रशिक्षण
मॉड्यूल
जावा अनुप्रयोगों में रहस्यों का प्रबंधन करें - शून्य ट्रस्ट और शून्य रहस्य - Training
इस मॉड्यूल में, आप Azure पर अपने जावा अनुप्रयोगों में रहस्यों के प्रबंधन के बारे में सीखते हैं। आप ज़ीरो ट्रस्ट और ज़ीरो सीक्रेट्स जैसे सर्वोत्तम अभ्यासों का अन्वेषण करेंगे और देखेंगे कि Azure कुंजी वॉल्ट का उपयोग करके उन्हें हैंड्स-ऑन Java प्रोजेक्ट पर कैसे लागू किया जाए.
Certification
Microsoft प्रमाणित: Azure व्यवस्थापक सहयोगी - Certifications
Microsoft Azure में मुख्य व्यावसायिक फ़ंक्शंस कॉन्फ़िगर, प्रबंधित, सुरक्षित और व्यवस्थापित करने के लिए मुख्य कौशल प्रदर्शित करें.
दस्तावेज़ीकरण
What is Azure Application Gateway
Learn how you can use an Azure application gateway to manage web traffic to your application.
Load-balancing options - Azure Architecture Center
Learn about Azure load-balancing services and considerations to select one for distributing traffic across multiple computing resources.
What is Azure Load Balancer? - Azure Load Balancer
Get an overview of Azure Load Balancer features, architecture, and implementation. Learn how the service works and how to use it in the cloud.