Skip to main content

How to install and configure Tableau Server Linux HA | Centos | Redhat |...




















PREPARATION
# Node
information
node1IP:
node2IP:
node3IP:

# TS
installer download


Step1:
Install Initial node

Step 2:
Generate bootstrap file on the initial node
tsm
topology nodes get-bootstrap-file --file <path\file>.json

scp
./bootstrap.json dpark@node2IP:~/
scp
./bootstrap.json dpark@node3IP:~/

Step 3:
Firewall Settings
Step 3-1:
Initial node Firewall settings

1. confirm gateway and tabadmincontroller port number(by default
8850)

tsm topology list-ports | grep -E "tabadmincontroller:primary |
gateway"

2. Check dynamic port range. typical range
is 8000 to 9000.

tsm configuration get -k ports.range.min
  tsm configuration get -k ports.range.max

3. Start firewalld:
  sudo systemctl start firewalld

4. Verify that the default zone is a high-security zone, such
as public.
firewall-cmd --get-default-zone

if change is needed,
sudo firewall-cmd --set-default-zone=public

5. Add ports for the gateway, tabadmincontroller port
and  port range (27000-27010) for  licensing communication between nodes

sudo firewall-cmd --permanent --add-port=80/tcp
  sudo firewall-cmd --permanent
--add-port=27000-27010/tcp

6. Configure the firewall to allow all traffic from the other nodes
in the cluster.

sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node2IP/32 port port=8000-9000 protocol=tcp accept'

sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node3IP/32 port port=8000-9000 protocol=tcp accept'

7. Reload the firewall and verify the settings.
sudo
firewall-cmd --reload
firewall-cmd
--list-all

Step 3-2:
additional nodes firewall setting

1. Start firewalld:
sudo
systemctl start firewalld

2. Verify that the default zone is a high-security zone, such
as public.
firewall-cmd
--get-default-zone

if change is needed,
sudo firewall-cmd --set-default-zone=public

3. Configure the firewall to
allow gateway and tabadmincontroller access from the other
nodes in the cluster.

on node 2:
sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node1IP/32 port port=80 protocol=tcp accept'
sudo
firewall-cmd --permanent --add-rich-rule='rule family=ipv4 source
address=node1IP/32 port port=8000-9000 protocol=tcp accept'

sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node3IP/32 port port=80 protocol=tcp accept'
sudo
firewall-cmd --permanent --add-rich-rule='rule family=ipv4 source
address=node3IP/32 port port=8000-9000 protocol=tcp accept'

on node 3:
sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node1IP/32 port port=80 protocol=tcp accept'
sudo
firewall-cmd --permanent --add-rich-rule='rule family=ipv4 source
address=node1IP/32 port port=8000-9000 protocol=tcp accept'

sudo firewall-cmd --permanent --add-rich-rule='rule family=ipv4
source address=node2IP/32 port port=80 protocol=tcp accept'
sudo
firewall-cmd --permanent --add-rich-rule='rule family=ipv4 source
address=node2IP/32 port port=8000-9000 protocol=tcp accept'


4. Reload the firewall and verify the settings.
sudo
firewall-cmd --reload
firewall-cmd
--list-all

Step 4:
Install Additional node with bootstrap

sudo yum
install tableau-server-version.x86_64.rpm

Step 5:
run initialize-tsm script

cd
/opt/tableau/tableau_server/packages/scripts.<version_code>/
sudo
./initialize-tsm -b /path/to/<bootstrap>.json --accepteula

Repeat
Step4 and 5 on third node.

Step 6:
Add process to the additional nodes.
On
initial node,
tsm
topology set-process -n node2 -pr clustercontroller -c 1
tsm
topology set-process -n node3 -pr clustercontroller -c 1
tsm
pending-changes apply --ignore-warnings

Step 7:
deploy coordination service
tsm stop

##check
if there is any pending list.
tsm
pending-changes list

tsm
pending-changes discard
or
tsm
pending-changes apply

# check
node name
tsm
topology list-nodes -v

#create
coordination service
tsm
topology deploy-coordination-service -n node1,node2,node3
tsm start

Step 8:
Configure Client File Service(CFS)
On
initial node

tsm
topology set-process -n node2 -pr clientfileservice -c 1
tsm
topology set-process -n node3 -pr clientfileservice -c 1

tsm
pending-changes apply


Step
9:  Configure process for second node

tsm
topology set-process -n node2 -pr gateway -c 1
tsm
topology set-process -n node2 -pr vizqlserver -c 2
tsm
topology set-process -n node2 -pr vizportal -c 2
tsm
topology set-process -n node2 -pr backgrounder -c 2
tsm
topology set-process -n node2 -pr cacheserver -c 2
tsm
topology set-process -n node2 -pr searchserver -c 1
tsm
topology set-process -n node2 -pr dataserver -c 2
tsm
topology set-process -n node2 -pr filestore -c 1
tsm
topology set-process -n node2 -pr pgsql -c 1

tsm
pending-changes apply

Step 10:
Configure process for third node

tsm
topology set-process -n node3 -pr gateway -c 1
tsm
topology set-process -n node3 -pr vizqlserver -c 2
tsm
topology set-process -n node3 -pr vizportal -c 2
tsm
topology set-process -n node3 -pr backgrounder -c 2
tsm
topology set-process -n node3 -pr cacheserver -c 2
tsm
topology set-process -n node3 -pr searchserver -c 1
tsm
topology set-process -n node3 -pr dataserver -c 2
tsm
topology set-process -n node3 -pr filestore -c 1

tsm
pending-changes apply

tsm start

Comments

Popular posts from this blog

How to configure LDAPS, LDAP over SSL, using CA Certificate Service on Domain Controller in Windows Server 2016

This post is to provide an instruction on how to set up LDAPS (LDAP over SSL) on Domain Controller using single-tier CA hierachy. Reasons for Enabling LDAPS By default, LDAP communications between client and server applications are not encrypted. This means that it would be possible to use a network monitoring device or software and view the communications traveling between LDAP client and server computers. This is especially problematic when an LDAP simple bind is used because credentials (username and password) is passed over the network unencrypted. This could quickly lead to the compromise of credentials.  Reasons for enabling Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) / Transport Layer Security (TLS) also known as LDAPS include: Some applications authenticate with Active Directory Domain Services (AD DS) through simple BIND. As simple BIND exposes the users’ credentials in clear text, use of Kerberos is preferred. If simp...

[Tableau] How to install Tableau Server on Centos 7 / Redhat

Step 1: Install Tableau Server package and start Tableau Services Manager 1. Log on as a user with sudo access to the computer where you want to install Tableau Server. 2. Downalod installer from below Tableau download page. https://www.tableau.com/products/server/download/linux // use WINSCP or any preferred utility to move Tableau Server installation file to Centos. 3. Use the package manager to install the Tableau Server package. sudo yum update sudo yum install tableau-server-<version>.x86_64.rpm -- Non-default location—To install to a non-default location, you must use rpm -i. You will also need to install all dependent packages. See the note below. Run the following command: sudo rpm -i --prefix /preferred/install/path tableau-server.rpm Refer to https://onlinehelp.tableau.com/current/server-linux/en-us/setup.htm -- 4. Navigate to the scripts directory: cd /opt/tableau/tableau_server/packages/scripts.'version'/ 5. Ru...

[AD LDAP] How to install LDAP in AD in Windows Server 2019 in VirtualBox