Installing and Configuring Solace Messaging for Pivotal Cloud Foundry
This topic describes how to install and configure Solace Messaging for Pivotal Cloud Foundry (PCF). Before installing Solace Messaging for PCF, you must complete the prerequisites.
Review the resource and IP requirements for installing the Solace Messaging for PCF tile.
|Product||Resource||Instances||CPU||Ram (MB)||Ephemeral (MB)||Persistent (MB)||Static IP||Dynamic IP|
|Solace Messaging for PCF||Solace Service Broker||1||1||1024||1024||0||0||1|
|Solace Messaging for PCF||Large-VMR||1*||4||12288||10240||40960*||1||0|
|Solace Messaging for PCF||Medium-VMR||1*||2||4096||10240||20480*||1||0|
|Solace Messaging for PCF||Community-VMR||1*||4||4096||10240||20480*||1||0|
* Note: You can modify the number of Instances and Persistent disk size when configuring the Solace Messaging for PCF tile. Solace recommends not changing the other parameters. For more information, see the Configure Solace Messaging for PCF tile below.
The Solace Messaging for PCF Service Broker requires the following:
- BOSH stemcell v3263 ubuntu-trusty.
- Java buildpack v3.7.1 or higher.
- The MySQL for PCF tile. When configuring the tile, set the maximum storage in the Service Plan section to 100 MB. For information on how to install and configure the tile, see the MySQL for PCF documentation.
To install Solace Messaging for PCF, perform the following steps:
- Download the product file from Pivotal Network.
- Upload the product file on the Ops Manager Installation Dashboard.
- Click Add next to the uploaded Solace Messaging tile in the Ops Manager Available Products view to add it to your staging area.
- Click the Solace Messaging tile.
- Follow the steps in the section below to configure the tile.
To configure Solace Messaging for PCF, perform the following steps:
- From the Settings tab of the Solace Messaging tile, click Assign AZs and Networks.
- Under Network, choose the network where Solace Messaging should run.
- Click Save.
- Click Message Routing Config.
Under Admin user password, pick a password for the Virtual Message Routers
Under Support user password, pick a password for the Virtual Message Routers
Under Starting Port, enter a port where the messaging services on the VMRs (e.g. MQTT, REST, or SMF) will start listening from, for example,
The exact port numbers chosen for each service will be based on this starting port and specified in the
VCAP_SERVICESenviornment variable passed to applications. For an example, see Example Environment Variable.
(Optional) Click TLS Config. By configuring TLS, you allow messaging between applications and the Solace VMRs to be encrypted. Applications requiring encryption would then need to use the TLS-specific URLs passed in the
VCAP_SERVICESenvironment variable. For more information about the
VCAP_SERVICESenvironment variable, see Example Environment Variable. If TLS is not configured, the TLS specific URLs continue to be passed in the
VCAP_SERVICESenvironment variable but fail to connect to a VMR if used.
(Optional) Configure Message Router’s RSA certificate (Server Certificate) either by pasting in a certificate and private key in PEM format or asking one to be generated by clicking Generate RSA Certificate. Generated certificates are equivalent to self-signed certificates.
Note: The server certifcate configured will be used by all Solace VMRs deployed and as such all VMRs deployed in a PCF instances will have the same identification.
Note: Communication between the Solace Messaging Service Broker and VMRs is also encrypted if a TLS certificate is configured. The Service Broker uses the Container Certificate Trust Store Framework to validate the server certificate returned by VMRs. So if the framework is not operational when the tile is deployed the Service Broker will be unable to validate server certificates sent by the VMRs and the tile will fail to deploy. In development environments it may be acceptable to not require server certificate validation in which case the Disable RSA Server Certificate validation on the Service Broker (For development only) checkbox can be selected. This checkbox should never be selected in production deployments, instead the framework should be made operational.
(Optional) Click Save.
(Optional) Click Service Access
(Optional) Enable the Enable global access to plans of service solace_messaging option.
Note: To control access to Solace Messaging service plans on a case-by-case basis, do not enable this option.
(Optional) Click Save.
Click Resource Config.
Use the drop-down menus to configure the number of instances of the
Community-VMRjobs required. This controls the number of VMR instances of each type that are statically created when the tile is deployed. VMRs are then dynamically allocated at service instance creation time post-deployment.
Medium-VMRjob instances are used by service instances created from the
Note: The number of job instances can be increased after the tile is deployed without impacting already bound applications however reducing the number of instances can result in application failure and total message loss.
Note: The size of the persistent disk can be changed both before and after deployment. Increasing the size of the persistent disks will impact the service of already bound applications however messages will not be lost. Reducing the size of the persistent disk post-deployment is not recommended and can result in message loss, inoperable VMRs, and/or undefined behaviors. Solace recommends keeping the default values for VM Type.
Note: The maximum number of service instances that can concurrently exist for the
sharedservice plan is equal to five times the number of
Click Installation Dashboard at the top left corner of the screen to leave the tile configuration and go back to dashboard.
Click Apply Changes to deploy the tile.
After the tile has deployed, see the Creating and Binding Solace Messaging Service Instances topic for information about creating instances of the Solace Messaging service and binding them to applications.