Initial Setup

Alex edited this page Nov 2, 2015 · 45 revisions

Table of Contents


There are multiple ways to install FITeagle 2:

  • Native installation with maven for development
  • Native installation with binaries for production
  • Docker based deployment for production

Firewall Setup

Allow incoming TCP connections to port 8443 (SSL). In particular disallow access to TCP port 9990.

Software Setup

Depending on the type of system and type of installation, some software packages have to be installed. Here is an example for Ubuntu 14.04 for a binary installation:

sudo add-apt-repository ppa:webupd8team/java
sudo apt-add-repository ppa:andrei-pozolotin/maven3
sudo apt-get update
sudo apt-get install oracle-java8-installer maven3 unzip
sudo adduser fiteagle 
su fiteagle


Native Deployment

Installing, running and testing FITeagle 2 is as easy as executing:

# Source based
curl -fsSkL | bash -s init deployFT2 deployFT2sfa testFT2sfa
# Binary based
bash <(curl -fsSkL

This should look like this:

After about 3 to 10 minutes everything has been downloaded, extracted, configured and tested. As a result, the SFA tests should all be green and pop up on your screen:

It's probably a good idea to make the start of FITeagle permanent on this system. An example for Ubuntu 14.04:

sudo ln -s /home/fiteagle/bootstrap/bin/fiteagled /etc/init.d/fiteagled
sudo update-rc.d fiteagled defaults

Quick-Start Docker deployment

Note: for the docker deployment a x64 based linux system is needed.


  • install docker. for ubuntu type apt-get install docker-io
  • Allow a single incoming TCP connection that will be forwared to the running fiteagle docker image.

We provide a script to setup, deploy and maintain a Docker installation of FITeagle. Start the process by running

curl -fsSL | bash -s -- -f

now the FITeagle2 service is reachable via https://localhost:8443/

Please refer to the more detailed instructions how to configure thr Docker based FITeagle instance.

Further Testing

After FITeagle has been downloaded, configured and tested, you can further test the installation using SFA specific user tools:

  1. Execute ./bootstrap/ runJfed or download the client from
  2. Login using the certificate located at integration-test/conf/cli.pem and use the password testing1
  3. Click on "New" > "RSpec Editor"
  4. Paste the following RSpec
<rspec type="request" xmlns=""
    xmlns:xsi="" xsi:schemaLocation=" ">
    <node client_id="motor-2"
        component_manager_id="urn:publicid:IDN+localhost+authority+cm" component_name="MotorGarage-1">
        <sliver_type name=""/>
        <location x="410.0"
            xmlns="" y="185.0"/>
        <interface client_id="motor-1:if0">
            <ip address="" netmask="" type="ipv4"/>
    <node client_id="motor-1"
        component_manager_id="urn:publicid:IDN+localhost+authority+cm" component_name="MotorGarage-1">
        <sliver_type name=""/>
        <location x="10.0"
            xmlns="" y="185.00000000000003"/>
        <interface client_id="motor-2:if0">
            <ip address="" netmask="" type="ipv4"/>
    <link client_id="link0">
        <component_manager name="urn:publicid:IDN+localhost+authority+cm"/>
        <interface_ref client_id="motor-2:if0"/>
        <interface_ref client_id="motor-1:if0"/>
        <link_type name=""/>
  1. Click on "Topology Editor", click on "Run" > Name: firstTest > no project. It should look like this:
  2. Press on "Start Experiment", this should look like this:
  3. Now a topology of resources have been provisioned. Depending on the resource, the next phase is the control of the instances. This could be an SSH login to a VM or a managed control of the resources via FRCP or REST. Depending on the additional installed APIs/Delivery Mechanisms, one example would be: curl -kH "Accept: text/turtle" https://localhost:8443/native/api/resources/MotorGarage-1 to get information about the MotorGarage resources. It's also possible to add and change information this way.
  4. Finally, to release the resources again, click on "Terminate" in the GUI. This should look like this:

New Adapter

To create and test a new resource adapter, follow this:

  1. Checkout the sources and go to the directory: git clone && cd adapters

  2. Create new adapter: ./ CoffeeMachine Coffee

  3. Test that it works: cd coffee && mvn clean test package

  4. Deploy the adapter to a running FITeagle instance (or copy the file target/coffee.war to the proper directory): mvn wildfly:deploy

  5. Provision and test the resource using the workflow above with the following RSpec:

<?xml version="1.0" encoding="UTF-8"?>
<rspec type="request" xmlns="">
  <node client_id="LatteMacchiato" 
    <sliver_type name=""/>

This should result in:



The following directories should have been created (depending on the type of chosen setup, some might be missing):

  • adapters: The southbound resource adaption layer.
  • api: A lightweight shared API specification for each FITeagle module.
  • bootstrap: Everything needed to get everything up and running as quick as possible. E.g., the script you executed above.
  • core: The core modules used in FITeagle. E.g., user management, reservations, configuration, authentication, ...
  • integration-test: Used for testing purposes, also includes a test certificate
  • native: Everything native to FITeagle that does not relate to other standards.
  • server: The running WildFly installation, log files, etc.
  • sfa: The SFA northbound delivery mechanism.
  • tmp: Downloaded binaries and configuration files. Acts also as a cache for the next setup.

Setup certificate

For local testing a dummy server certificate had been created. In order to officially join a federation, you have to create a new one:

  1. Edit the file bootstrap/bin/createNewServerCert.cfg
  2. Edit the file bootstrap/bin/
  3. Execute bootstrap/bin/ using the password jetty6
  4. Execute cp ssl.keystore server/wildfly/standalone/configuration/jetty-ssl.keystore)
  5. Restart FITeagle: ./bootstrap/ restartJ2EE.
  6. Test it by opening https://localhost:8443 and look at the certificate.
  7. Send the public certificate to the federation operator

Own certificate

For local testing a dummy server certificate had been created. It is located at integration-test/conf/cli.pem and the password is testing1. In order to officially use a federation, you have to create a new by going to the Identity Provider of your federation.

Trusted CAs

In order to configure which CAs are trusted wrt to user certificates, please have a look at the current list of CAs:

keytool -keystore server/wildfly/standalone/configuration/jetty-ssl.truststore --storepass jetty6 -list

Setup meta information

To setup information about the testbed, edit the file ~/.fiteagle/ and ~/.fiteagle/Federation.ttland change the name spaces to the one that applies to your setup.

Further information about the property files are documented here

Setup resources

A detailed guide on how to integrate new resources / services is shown on on this wiki page.

You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.