Bridge Installation for Linux

This document outlines the process for installing and configuring the OvalEdge Bridge Client on RHEL-based operating systems. The Bridge component enables secure connectivity between the OvalEdge cloud-hosted server and client data sources, whether hosted on-premise or in any public cloud environment.

OvalEdge’s cloud offering allows customers to utilize the platform as a hosted service without directly connecting to client data sources. This is achieved through the OvalEdge Bridge component, which enables secure communication between cloud and on-premise environments without modifying firewall rules.

The client component of the Bridge is installed within the client infrastructure, requiring only the whitelisting of the client’s IP address and port.

Purpose of the document

The purpose of this document is to outline the detailed procedure for installing, configuring, and validating the OvalEdge Bridge Client on RHEL-based systems, including prerequisites, system setup, connectivity validation, installation, and service management.

Prerequisites

Installation Files

The following files must be available before starting the Bridge Client installation:

File Name
Description

Bridge Secure Connectivity Pack (.zip)

Contains certificates and configuration files required for secure communication between the Bridge Client and Bridge Server.

Bridge Client Installer (.jar)

Required to execute the Bridge Client installation process.

Bridge Component File (.nar)

Must be placed in the NiFi lib folder after installation to enable communication with the OvalEdge SaaS platform.

circle-exclamation
circle-info

The OvalEdge GCS team provides these files via a secure channel (email) and must be copied to the Bridge Client VM before installation.

Hardware
Configuration

RAM

32 GB

SSD

250 GB

vCPU

8

Software
Version

OS

RHEL

Open JDK

17.0

Whitelisting Ports

Port Type
Port
Purpose

Inbound

9443

Required for NiFi UI configuration changes

Outbound

9443

Communication from Bridge Client to Bridge Server

circle-info
  • The Bridge Client IP must be whitelisted in all connector data sources.

  • Ensure outbound traffic on port 9443 is allowed to the Bridge Server.

  • Get a confirmation from GCS that the Bridge-Client IP is whitelisted in the Bridge-Server hosted in AWS.

OvalEdge Bridge Architecture and Communication Model

The Bridge works in a Pull Model where the Bridge client will be Polling (Checks for any commands that are stored at the Bridge Server, issued from the OE Platform, eg, establishing a connection to the dataSource) to execute, waiting in the queue (A queue is a Flow File that holds the data to be transmitted through Bridge) every 5 seconds.

The pull time can be configured, and the Bridge client pulls commands from the Bridge Server and transmits the metadata to the OE Platform for processing, securely over the whitelisted secure ports.

The Bridge is owned by OE, except for the client VM on which it is deployed in the client Data Center (OE provides all software components).

OE provides and maintains the bridge component. The Bridge Server is hosted along with the OE Platform and interacts with it. Users perform actions like crawling and profiling data sources and the Bridge Client Pools for the commands, and securely execute the same connection to the client data Sources over TLS 1.2 (Transport Layer Security) and SSL.

The Bridge Component, offered as part of the SaaS, reduces communication pain points with client data sources, whether hosted on a VM (provided by the client) or on-premises.

Bridge Components

Component
Description

Bridge Server

Hosted on the OvalEdge SaaS AWS environment and interacts directly with the OvalEdge platform.

Bridge Client

Installed on the client’s infrastructure (cloud or on-premise) and communicates securely with the Bridge Server.

circle-exclamation

Deployment Scenarios

Environment
Bridge Server Location
Bridge Client Location
Communication Requirement

Cloud-based Sources

OvalEdge SaaS AWS Server

Public cloud VM (provided by client)

The Client VM IP address must be whitelisted to communicate securely with the Bridge Server hosted on the SaaS VM.

On-Premise Sources

OvalEdge SaaS AWS Server

On-prem VM (provided by client)

The Client VM IP address must be whitelisted to communicate securely with the Bridge Server hosted on the SaaS VM.

Installation Steps

  1. Setting up the VM

  2. Configure system settings in the OvalEdge application

  3. Proceeding with Bridge Client Installation

1. Setting up the VM

Install Open JDK version 17

  • Run the following commands for RHEL OS:

  • Run the following command for Ubuntu OS:

  • Verify Installation:

Output:

  • Identify Public IP:

circle-exclamation
  • On the customer’s network, make sure that outbound traffic is permitted to the bridge server IP (which will be shared by the OvalEdge team) on port 9443

  • Verify Connectivity:

  • The bridge_server_domain will be provided by the OvalEdge team.

  • For the OvalEdge application to crawl data from the customer's data sources, the VM running the bridge client must be able to connect to them. The customer must ensure that the Bridge client VM is allowed to access the data sources.

circle-exclamation

2. Configure System Settings in the OvalEdge application

OvalEdge team must perform the following validations (bridge settings) before initiating the Bridge Client installation.

  • Navigate to Administration >system settings > system path ovaledge:temppath=/mnt/tmp/

  • Navigate to Administration > System Settings > Bridge.

  • Review the Bridge configuration values listed below. If any configuration value differs from the required configuration, update the value according to the standard configuration provided below.

ovaledge.bridge.mode

true

ovaledge.bridgesoftware.path

/mnt/BridgeSoftware/

bridge.type

nifi

bridge.server.host

<Ovaledge Team will provide the bridge server host>

bridge.nifiversion

nifi-1.28.1

3. Proceeding with Bridge Client Installation

  • Deploy a RHEL machine that serves as a mediator between the Bridge Server and data connectors.

  • Navigate to Administration > Connectors and click Manage Bridge.

  • Click "+" to add the Bridge.

    • Enter the public IP address of the Bridge Client machine in the Bridge IP Address field

  • A pop-up displays the Bridge ID, Security Code, and download links for the Bridge Secure Connectivity Pack and Bridge Installation Software.

  • Download the file and copy the security code to the Bridge Client VM.

circle-info

Download and copy the Bridge Secure Connectivity Pack ( zip file) to the bridge client VM. Note the Security Code displayed during the Bridge Installation process.

  • Note the Security Code in the format:

  • Click on the Ok button, and the new bridge is created and displayed on the Bridge page.

  • Download the Bridge Installation Software file shared by the OvalEdge GCS Team via email and move it to the bridge client VM.

circle-info

The installation file size is approximately 700 MB.

Install and Register the Bridge

Installation Steps

  1. Create three folders:

    1. bridge_artifacts

    2. bridge_client

    3. temp

  1. Copy the Bridge Secure Connectivity Pack (zip file) and ovaledge-bridge-client-installer.jar into the bridge_artifacts folder.

  2. Run the installation:

  1. Upon running the JAR file, press "1" and "Enter" to confirm your choice. Please follow this step for any future confirmations of this nature.

  1. When prompted, select the installation path for the Bridge Client.

    1. The default installation path is /usr/local/ovaledge_bridge.

    2. Enter the path of the folder created earlier, named bridge_client.

  1. Press "1" and "Enter" to confirm your choice

  1. Enter the Security Code noted during the bridge creation process in the OvalEdge application.

  1. Provide the same IP Address used when adding the bridge IP details in the OvalEdge application under the M/C IP Address field.

  1. Enter a suitable Bridge Name to identify the Bridge Client.

  1. Provide the Bridge Server URL shared by the OvalEdge team.

  1. For the Certificates Path, enter the location of the Bridge Secure Connectivity Pack (ZIP file) copied earlier to the VM.

  1. For the Bridge Temp Path, enter the location of the temp path on the VM

  1. Enter the required User Name and Email Address, then press 1 and Enter to confirm.

circle-info

The user details are mandatory and must be entered without spaces.

This information is recorded for reference purposes to identify the individual who performed the Bridge (NiFi) setup on the VM.

  1. For NIFI service creation, enter the service name.

  1. For the Is askEdgi option, specify whether the askEdgi feature should be enabled.

    1. Enter true to enable askEdgi.

    2. Enter False to proceed without enabling askEdgi.

  1. Press “1” again and Enter to proceed.

  1. Press “1” again and Enter to proceed.

  1. Confirm the action by entering Y and pressing Enter.

  1. When prompted, provide the configuration file path enclosed in square brackets, for example:

  1. Wait for the installation to complete. A message stating “Installation was successful” will appear.

  1. After successful installation, verify that the message “Bridge software installed successfully” is displayed.

  2. Copy the oe-bridge-bundle-nar-<version>.nar file to the NiFi lib folder.

  3. If any third-party JAR files are provided by the OvalEdge team, copy the JAR files to the appropriate NiFi library directory along with the Bridge NAR file.

  4. Restart the NiFi service from the NiFi bin folder using the command:

  1. After restarting, check the NiFi logs to confirm that the service has started correctly.

  2. Verify the bridge status from the OvalEdge application UI.

    1. The bridge status should display as green, indicating successful installation and connectivity.

  1. Add the bridge.temppath in the application Bridge settings.

    1. Navigate to Administration > System Settings> Bridge

  2. Provide the path that was created in the Bridge Client VM during the Bridge installation process.

Running Bridge as a Service

OvalEdge offers Bridge functionality as part of its cloud offering, allowing customers to use the platform as a hosted service without connecting to client data sources.

Bridge installation on a client machine is managed manually via commands, which causes a server outage when the machine stops. To overcome this, OvalEdge is providing Bridge-as-a-Service on the client's machine.

Bridge as a Service Benefits

The Bridge Component is deployed as a Service. The installation of the Bridge Component, which is server-hosted on SaaS and client-hosted on client cloud or on-prem, runs as a service to avoid manual intervention.

Exposing the Bridge as a service ensures that, if a VM is brought back, the Bridge components (Server and client, respectively) start without manual Intervention.

This ensures that the Bridge component's availability meets an SLA (Service Level Agreement) of 99.999%.

Steps to Configure Bridge as a Service

  1. Before creating NiFi as a service, stop the running NiFi instance

  2. Navigate to the NiFi bin folder.

  1. Become the root user.

  2. Navigate to:

  1. Create a new service file:

  1. Insert the following content:

circle-info
  • ExecStart: Path to NiFi bin/nifi.sh file.

  • ExecStop: Path to NiFi bin/nifi.sh file.

  • User: VM username.

  • Group: VM group name.

Service Management Commands

Action
Command

Reload Service

systemctl daemon-reload

Start Service

systemctl start nifi.service

Enable Service

systemctl enable nifi.service

Check Status

systemctl status nifi.service

Troubleshooting

  • If an error occurs while starting the NiFi service, execute the following:

  • After running these commands, attempt to restart the NiFi service again.


Copyright © 2025, OvalEdge LLC, Peachtree Corners GA USA

Last updated

Was this helpful?