Introduction
In this blog post I discuss the provisioning and initial configuration required to ensure all OIC components are available to you. Per default Visual Builder, File Server and Process are not enabled. It's easy to do so, but you have to do it. You may also want to enable OIC activity stream logs to be sent to OCI Logging and OCI Logging analytics, you have to execute a couple of steps to enable this. Also OIC3 has native actions that allow you, as a developer, to transparently integrate with File Server and OCI Services such as Object Storage. Some setup is also required here. So, without further ado, let's begin.
OIC3 Provisioning
Provisioning a new OIC3 instance is simple -
Note the 3 options -- Standard
- Enterprise
- Healthcare
I have provisioned an EE so the steps I do afterwards are as follows -
- Enable File Server
- Enable Visual Builder
- Enable Process
- Enable Logging
I do the same for Process -
note the 2 work requests for adding VB and Process. Note the 2 associated Services - for VB and Process.
Enabling OCI Logging
Enabling Logging, i.e. sending the OIC3 activity stream logs to OCI Logging, is simple - I begin by creating a target log group in OCI Logging -Please be aware that you can use the same target OCI Logging log group for multiple OIC instances. This allows you to aggregate logs at OCI Logging level. These logs can be pushed to OCI Logging analytics, thus enabling OIC Fleet Management. Please see my multiple posts on this topic here.
Note the 2 new menu items - Visual Builder and Process.Visual Builder
I validate the Visual Builder link -
Naturally, I need client id and secret - this I can get from the Confidential App created for this new OIC3 instance -
Browse down the page to find -
Now I can create a Service Connection to OIC Integration -
We can also use the client id and secret to invoke an integration endpoint from Postman. We will also need the Scopes entry from the Oracle Cloud Services entry for this OIC3 instance, and the idcs token url. The latter is of the format - https://idcs-yourIDCS.identity.oraclecloud.com/oauth2/v1/token. You can find "your" IDCS url here-
Now to my test integration -
Process
Now to Process - you should have transparent access -
File Server
Finally, File Server -
Check out your user -
OCI Native Actions
To do this, I need to create a dynamic group in my Identity Domain - this group will have 1 member, my OIC instance. The group will then surface in a set of policies that will allow OIC transparent access, from a developer perspective, to OCI Object Storage.
The policies are as follows -
allow dynamic-group yourDynGroup to manage object-family in compartment yourCompartment
allow dynamic-group yourDynGroup to inspect compartments in compartment yourCompartment
First to creating the dynamic group; the OIC instance will be identified by it's client id, something we already have.
Browse down the entry to get the client id - make sure you are looking at the correct OIC instance!
I set up an object storage bucket in the compartment specified in the policy.
I set up an object storage bucket in the compartment specified in the policy.
- to list the contents of an ftp folder/directory
- for each file: get a reference to that file
- using the reference, write a copy of the file to another ftp directory/folder.
The Object Storage native action works on Buckets and Objects -
Here's an example with List Buckets - firstly, here are my object storage buckets in the target compartment for this test -
I run the integration -