+ All Categories
Home > Documents > osft.pdf

osft.pdf

Date post: 27-Oct-2014
Category:
Upload: sayed-nazish-abbas-zaidi
View: 35 times
Download: 3 times
Share this document with a friend
Popular Tags:
12
1 Oracle® Secure File Transfer User Guide Release 2.2 for all platforms July 2011 This guide describes the Oracle® Secure File Transport (SFT). SFT is an automated, configurable method for sending data collected by Explorer software, or other system telemetry data, to Oracle Corporation. It is intended for all SFT users. This guide covers the following topics: Overview Supported Versions Installing Secure File Transfer Sending Explorer Files to Oracle Using Command Line Options Uninstalling Secure File Transfer Troubleshooting Documentation Accessibility Overview Oracle Secure File Transport (SFT) supports data transfer between customer environments and Oracle. The SFT tool is used to periodically deliver Explorer data collector files for proactive reporting and for sending Explorer, core, log, or other files for support services diagnostics. SFT is designed to support customer network environments in which Explorer clients do not have Internet access and to provide a central point to manage Explorer telemetry. SFT is a daemon process that runs in the background, periodically scanning a specified directory for new files and forwarding that data to the configured destination, Oracle Corporation. A daemon process runs in the background, rather than under your direct control. The daemon process restarts automatically on system reboots and continues running until it receives a system-wide interrupt command. SFT is intended as an aggregation and transfer point for telemetry data from other hosts. It detects and validates configured file types then invokes a transfer process to send the data to the configured destination. SFT is distributed as a Solaris package (SUNWsftransport) that is installed under a standard location, /opt/SUNWsftransport. SFT is launched through a command line interface. SFT is a separate download that runs on versions 9 and 10 of the Solaris Operating System (OS) running Java 1.6.0 or higher. All transfers between your system and Oracle use industry-standard Secure Sockets Layer (SSL) encryption, which ensures the security of the transfer of your data.
Transcript
Page 1: osft.pdf

1

Oracle® Secure File TransferUser Guide

Release 2.2 for all platforms

July 2011

This guide describes the Oracle® Secure File Transport (SFT). SFT is an automated, configurable method for sending data collected by Explorer software, or other system telemetry data, to Oracle Corporation. It is intended for all SFT users.

This guide covers the following topics:

■ Overview

■ Supported Versions

■ Installing Secure File Transfer

■ Sending Explorer Files to Oracle

■ Using Command Line Options

■ Uninstalling Secure File Transfer

■ Troubleshooting

■ Documentation Accessibility

OverviewOracle Secure File Transport (SFT) supports data transfer between customer environments and Oracle. The SFT tool is used to periodically deliver Explorer data collector files for proactive reporting and for sending Explorer, core, log, or other files for support services diagnostics. SFT is designed to support customer network environments in which Explorer clients do not have Internet access and to provide a central point to manage Explorer telemetry.

SFT is a daemon process that runs in the background, periodically scanning a specified directory for new files and forwarding that data to the configured destination, Oracle Corporation. A daemon process runs in the background, rather than under your direct control. The daemon process restarts automatically on system reboots and continues running until it receives a system-wide interrupt command.

SFT is intended as an aggregation and transfer point for telemetry data from other hosts. It detects and validates configured file types then invokes a transfer process to send the data to the configured destination.

SFT is distributed as a Solaris package (SUNWsftransport) that is installed under a standard location, /opt/SUNWsftransport.

SFT is launched through a command line interface. SFT is a separate download that runs on versions 9 and 10 of the Solaris Operating System (OS) running Java 1.6.0 or higher. All transfers between your system and Oracle use industry-standard Secure Sockets Layer (SSL) encryption, which ensures the security of the transfer of your data.

Page 2: osft.pdf

2

The /usr/bin/gzip and /usr/bin/tar commands are required for transfer of Explorer files and should have been included with your Solaris OS. SFT runs as a software bundle within Oracle Automated Service Manager (ASM). You must be a superuser to launch the OASM process or use any of the SFT or OASM command line options.

SFT ArchitectureThe following architecture diagram shows the configuration and communication routes of a typical SFT network:

SFT can support any number of Explorer clients. You may want to use multiple SFT instances for manageability and to ensure that files are sent to Oracle without unreasonable delay. A single SFT instance can support up to 32 concurrent transfers. You need to define the concurrency appropriate to your specific needs and infrastructure. The number of concurrent transfers depends on the volume of Explorer files you need to send, the average size of the files, and your network bandwidth. If a single SFT instance does not satisfy the file transfer volume, then additional Sun SFT instances should be installed on other hosts.

Supported Data TypesSFT supports two data types:

■ Explorer data packages. These files should retain their filenames as created by Explorer (explorer.{hostid}.*.tar.gz). SFT does some checks to validate the Explorer file before attempting to send it. Any validation failures are logged and the file is moved to the directory for failed transfers.

■ Any files to assist in support case resolution such as core files, log files, configuration files, etc. These files must be named with the service request (SR) number, optionally preceded by the word case, and followed by additional file description and an extension.

The preferred format is:

#-name.ext

where name is the file name and extension is the file extension.

Sample filenames include:

1-234567890-core.gzcase_2-1234567_messages.Z

Page 3: osft.pdf

3

CASE-3-1234567890-vmcore.bz2Case1-12345678.resolv.conf1-12345678-core.dumpcase-2-123456789.nsswitch.conf

If a file in the transfer directory does not match the filename pattern for any active slot, the file simply remains in the transfer directory and no information about that file is logged.

Supported VersionsSFT 2.2 supports the following platforms and software:

SFT also supports basic proxy authentication and Windows NT challenge/response (NTLM) version 1. When NTLM is in use, SFT may generate some extra log output. To mask extra output from NTLM:

1. Open the /etc/opt/SUNWsftransport/logging.properties file.

2. Change the following entry from:

org.apache.commons.httpclient.level = INFO

to

org.apache.commons.httpclient.level = WARNING

3. Restart the OASM process by entering the following command:

/opt/SUNWsasm/bin/sasm restart

Installing Secure File TransferInstall Secure File Transfer (SFT) on a system that has direct or proxied access to the Internet. Oracle products running Explorer software need to be able to transfer files to the system where SFT is installed.

Prerequisites■ Firewall limits

SFT communicates with Oracle's servers using HTTPS and encrypts information that it sends using 128-bit SSL encryption. The system where SFT is running requires outbound access to port 443.

If your firewall limits the hostnames that may be contacted, SFT communicates only with transport.oracle.com. Check the

Note: Only validated files that are awaiting transfer are reported with the sftransport --info command.

Platform/Software Supported Releases

Sun Solaris version 9 & 10

Java 1.6.0 or later

Page 4: osft.pdf

4

/etc/opt/SUNWsftransport/sftransport.xml file to confirm which is in use for active slots.

If your firewall limits communication by target IP address, you may want to perform a lookup for the addresses of these hostnames. However, keep in mind that Oracle reserves the right to change the IP addresses of these hostnames.

■ Oracle Single Sign On Account

To run SFT, you must have a Oracle Single Sign On Account. To register for a Oracle Single Sign On Account, go to the following Web site:

http://www.oracle.com

then follow the links to Register for an Account.

See the sftransport(1m) man page for information about command line options and the sftransport(4) man page for a detailed description of the configuration file.

Your username and password will be requested when registering Oracle Automated Service Manager for data transport using the /opt/SUNWsasm/bin/sasm transport -r command.

To install SFT:1. Open the following Web page:

http://support.oracle.com

2. Click Patches and Updates then click Advanced Search. Enter the query Transport, then review the results for the SFT software.

3. Download SFT 2.2.0.0 software to the installation directory.

4. Unzip the package by using a command similar to the following:

gunzip p12312312_Generic.zip

where p12312312_Generic.zip is the download name. This package also contains the Oracle Automated Service Manager (OASM) package.

5. Install the OASM software using the following commands:

a. Unzip the file containing OASM using the following command:

gunzip SUNWsftransport-2.2-with-SASM.tar.gz

b. Extract the files from the tar using the following command:

tar -xvf SUNWsftransport-2.2-with-SASM.tar

c. Initiate the OASM installation using the following command:

Note: Your username is stored in a configuration file, but the given password is used only for a one time registration process and is not stored anywhere by SFT or Oracle Automated Service Manager.

Note: If OASM is already installed, skip the following steps.

Page 5: osft.pdf

5

pkgadd -d SUNWsasm-1.x.pkg

then follow the prompts.

d. To enable the Oracle connection, register OASM using the following command:

/opt/SUNWsasm/bin/sasm transport -r

Then follow the prompts.

6. Install the SFT service to the OASM instance using the following command:

pkgadd -d SUNWsftransport-2.2.pkg

Then responding to the prompts.

To run SFT:■ To run SFT, enter the following command:

/opt/SUNWsftransport/bin/sftransport -- start

This ensures that the Oracle Automated Service Manager (OASM) is running and activates the SFT bundle. OASM tracks active bundles and ensures they are active each time OASM restarts. When the system starts, OASM is started by the following services:

application/management/sasm service (for Solaris 10)/etc/init.d/sasm (for Solaris 9)

To configure SFT to run with a specific Java install■ In the /opt/SUNWsftransport/bin/sftransport and

/opt/SUNWsasm/bin/sasm files, change the JAVA= entry to the value of the installation directory.

For example, the following line configures SFT to run with JDK 1.6.0_13:

JAVA=/usr/jdk/jdk1.6.0_13

To configure the HTTP Listener to receive files from Explorer:The HTTP Listener is a separate daemon process from the main transfer process that receives data. It can be setup and enabled during the SFT installation procedure. If the Listener is enabled, the Listener port can be verified or changed during the SFT installation.

You can send core files and other case-data files from Explorer to the SFT transfer directory using the HTTP Listener.

1. In the /etc/opt/SUNWexplo/default/explorer configuration file, set the EXP_TRANSPORT variable to http://server:port.

2. Run Explorer with the -p command line option.

Note: You must have an active Oracle Single Sign On account to register OASM.

Page 6: osft.pdf

6

3. Configure then run Explorer with the -T http://server:port command line option.

To configure the HTTPS Listener to receive files from Explorer:The HTTPS Listener provides the same basic functionality as the HTTP listener, with added SSL encryption.

1. In the /etc/opt/SUNWexplo/default/explorer configuration file, set the EXP_TRANSPORT variable to http://server:port.

2. Run Explorer with the -p command line option.

3. Configure then run Explorer with the -T http://server:port command line option.

4. Generate the SSL certificate for the SFT host by following the SSL Certificate directions located at:

http://docs.codehaus.org/display/JETTY/How+to+configure+SSL

5. Modify the /etc/opt/SUNWsftransport/listener.xml configuration file to enable SSL as follows:

a. The listener.xml file has a section for SslSocketConnector that is commented out by default; un-comment this section and add the appropriate port and key/password configuration.

b. Ensure no conflict with port 443, the default port on the SFT host. If port 443 is already being used then change the Listener port to another acceptable value.

c. Comment out the jetty.nio.SelectChannelConnector <Item> element, so that jetty.security.SslSocketConnector is the only active connector. For more information, see the Jetty documentation.

Sending Explorer Files to OracleOracle SFT has the ability to recognize two use cases for Explorer files, each of which is processed differently:

■ Proactive files - proactive Explorer files are routed to the Risk Analysis Engine.

■ Reactive/on-demand files - by default, SFT gives priority to the reactive/on-demand files

Reactive Explorer files are routed to Support Services personnel for analysis. When working with Support Services, you might be asked to send an Explorer file for extended diagnostics and troubleshooting. Once SFT is installed and configured, it can be used to send high-priority Explorer files.

To prioritize an Explorer file:■ To send an Explorer file for customer support (that is, reactive) purposes, enter the

following command:

explorer -sr {SR number} -options

where {SR number} is the iSupport service request (SR) number.

This causes SFT to prioritize the delivery of this Explorer file ahead of other files that might be queued, and it will deliver the file to an Oracle location where it can be readily accessed by Support Services.

Page 7: osft.pdf

7

To retrieve Explorer documentation:Complete Explorer documentation is available as follows:

1. Open the following Web page:

https://supporthtml.oracle.com/ep/faces/secure/km/DocumentDisplay.jspx?id=870962.5&h=Y

2. Retrieve the Oracle Services Tools Bundle with Sun Explorer Data Collector.

To send files from Explorer to the HTTP Listener:■ If a system has Explorer installed, use this command to send core files and other

case-data files to the SFT transfer directory using the HTTP Listener:

/opt/SUNWexplo/bin/curl.{sparc or i386} -T {file} "{Listener-URL}/?file={filename}"

where

{file} includes a path to the file location on the local system

{filename} in the target URL is the filename only, using the correct filename format that includes service request (SR) number. This file name does not have to match the filename on the local system.

For example:

/opt/SUNWexplo/bin/curl.sparc -T /var/core.gz "http://my-sft-server:8080/?file=1-2345678.gz"

To send a file with priority:When you select transferPath during the pkgadd, a subdirectory called priority is created in the transferPath directory. Files placed in this priority subdirectory are given preference over other files being transferred in the transferPath directory. However, since validation and file transfers occur in parallel, some non-priority items might finish transferring before a priority file. Sun Explorer files that are generated for a specific support case (using the explorer -C option to provide a case number) are treated as priority files whether placed in the priority subdirectory or the main transfer directory.

Using Command Line OptionsThis section describes command line options for modifying the SFT configuration and for managing the HTTP Listener.

To modify the SFT configuration:The following table describes the command line options you can use to change the SFT configuration:

Note: Oracle recommends that you compress files to reduce the size of the data transfer, as shown by core.gz.

Page 8: osft.pdf

8

To manage the HTTP Listener:The following table shows commands and scripts you can use to manage the HTTP Listener:

Uninstalling Secure File TransferThis section describes how to uninstall Secure File Transfer (SFT).

To uninstall SFT:■ To uninstall SFT, enter the following command:

pkgrm SUNWsftransport

This command removes SFT only, leaving configuration files, log files and configured data directories in place. This is to retain all custom settings when upgrading SFT.

For a complete uninstall, follow the instructions printed during the pkgrm operation to remove the remaining files and directories

Option Alternative Description

-v --version Print version

-h --help Print this usage message

-p --printconfig Print configuration settings

-i --info Print daemon status/current transfers

-s --start Start daemon

-e --shutdown Stop daemon, allow active transfers to finish (graceful shutdown)

-a --abort Stop daemon, abandon active transfers

-l --start-listener (Solaris 9 only) Start HTTP Listener

-L --stop-listener (Solaris 9 only) Stop HTTP Listener

svcadm (Solaris 10 only) Enables or disables the svc:/application/management/sasm service.

You can also use svcadm to manage the network/sftransport-listener service.

Operating System Command/Script Description

Solaris 9 --start-listener command Starts the HTTP Listener

--stop-listener command Stops the HTTP Listener

/etc/rc3.d/S73sftransport Manages HTTP Listener restart

/etc/rc2.d/K27sftransport Manages HTTP Listener restart

Solaris 101

1 The svcadm manages the Listener restart on system reboot if Listener is enabled. Ensure that there will be no conflict using port 80 (the default port) on the Sun SFT host. If this port is already being used, then change the listener port to another acceptable value

svcadm Manages the separate network/sftrans-port-listener service.

Page 9: osft.pdf

9

TroubleshootingThis section describes how to troubleshoot SFT errors such as file transfer failure. With SFT, you can:

■ Configure file transfer failure settings, including:

- E-mail notification of file transfer failure

- Number of failure retries

- Interval between retries

■ View information about errors in the SFT log files.

■ View the SFT man pages.

You can configure SFT to send e-mail notifications in the event of file transfer failure. SFT also provides the ability to configure the total number of retries in the event of transfer failure, and the wait time between these retries.

To configure e-mail notification of file transfer failure:■ Follow the instructions in the

/etc/opt/SUNWsftransport/logging.properties file.

This file provides

To configure failure retry settings:■ Edit the following attributes in the sftransport.xml file:

- transferTries attribute - This attribute defines the total number of attempts made to resend a file in the event of file transfer failure, including the original attempt.

If the transfer fails before completion, such as when the network connection is lost, the first retry resumes from the point at which the transfer failed.

If this attribute is set to 1, no retries are attempted.

- secondsBetweenTries attribute - This attribute defines the wait time, in seconds, before a transfer is retried after failure.

The recommended value is 60 seconds, which allows time to clear up the original attempt. The value must be greater than 1 to enable the attribute.

To view SFT log files:The SFT log files contain all information about file transfer attempts and any errors that occurred. Log files, which are in XML format, can be viewed with any text viewer.

To use an internet browser-based log viewer, see the /opt/SUNWsftransport/logviewer/README.txt file. This file describes how to use:

■ SFT Listener Process - use the SFT listener process, which is included with SFT, to view the logs.

To enable the log viewing, then

a. Enable -logviewer during the SFT installation process

b. Append /logviewer/sftransport_log.cgi to the SFT listener URL.

Page 10: osft.pdf

10

■ Another Web server - use another Web server, such as Apache2, to view the logs. Apache2 is bundled with the Solaris10 operating system and can be configured in the httpd.conf file.

For example, to enable the listener, add the following lines to the httpd.conf file:

AddHandler cgi-script .cgi<Directory /var/apache2/htdocs/SFT> Options +ExecCGI</Directory>

For more information, see the Apache documentation at:

http://httpd.apache.org/docs/2.0/howto/cgi.html

On Solaris 10, you can use svcs -x sftransport -listener command to show the listener log location.

For more information, see To configure the HTTP Listener to receive files from Explorer:.

To view the SFT man pages:You can access SFT man pages, which are included with the SFT Solaris package, using the following commands:

man -M sftransport_install_dir/man sftransport

man -M sftransport_install_dir/man -s 4 sftransport

Documentation AccessibilityOur goal is to make Oracle products, services, and supporting documentation accessible to all users, including users that are disabled. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Accessibility standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For more information, visit the Oracle Accessibility Program Web site at http://www.oracle.com/accessibility/.

Accessibility of Code Examples in DocumentationScreen readers may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, some screen readers may not always read a line of text that consists solely of a bracket or brace.

Accessibility of Links to External Web Sites in DocumentationThis documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites.

Access to Oracle SupportOracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/support/contact.html or visit

Page 11: osft.pdf

11

http://www.oracle.com/accessibility/support.html if you are hearing impaired.

Oracle® Secure File Transfer Guide User Guide Release 2.2 for all platforms

Copyright © 2011, 2012, Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:

U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.

This software is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications which may create a risk of personal injury. If you use this software in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure the safe use of this software. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software in dangerous applications.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

This software and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.

Page 12: osft.pdf

12


Recommended