Overview
The Azure installation script enables you to install Orchestrator on one or multiple nodes.
Important!
All the steps are mandatory in the installation procedures listed below. Orchestrator does not work without installing Identity Server.
Single Node Installation
To install Orchestrator on an Azure App Service perform the following steps:
Orchestrator Steps
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathOrchestrator
. When creating the web app, make sure to select the Stack.NET Core 3.1
. For more information, see Microsoft's official documentation. - Open the newly created web app in the Azure Portal, and on the Configuration tab, select General Settings, then make the following configuration changes:
- Set Platform to 64-bit.
- Set Web Sockets to On.
- Set the database connection string in the Application Settings of the web app, with the name
Default
. For example,Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
.
Important!
- The Azure SQL user provided here must have access at the server level, database level access is not sufficient for a successful installation.
- Make sure to set the
TrustServerCertificate
attribute in the database connection string toTrue
.- To set a database connection string for the Test Automation module, follow the steps described for the
-testAutomationFeatureEnabled
parameter in Publish-Orchestrator.ps1 Parameters.
- Create an Azure AD application and service principal that can access your Orchestrator App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
Identity Server Steps
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathIdentity
. When creating the web app, make sure to select the Stack.NET Core 3.1
. For more information, see Microsoft's official documentation. - Set the database connection string in the Application Settings of the web app, with the name
DefaultConnection
. For example,Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
.
Important!
Make sure to set the
TrustServerCertificate
attribute in the database connection string toTrue
.
- Navigate to Settings > Configuration > General Settings tab and select 64-bit for the Platform.
- Create an Azure AD application and service principal that can access your Identity App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
General Steps
- Download the
UiPathOrchestrator.zip
archive to your local machine. This contains all the scripts necessary to install Orchestrator, Identity Server, and Webhooks Service. UiPath provides theUiPathOrchestrator.zip
archive on request. Contact us for details. - Extract the content of the zip file into a folder on your machine.
- Run the
Publish-Orchestrator.ps1
script, in PowerShell, using the parameters described here. Check out this example. - Run the
Publish-IdentityServer.ps1
script, in PowerShell, using the parameters described here and complete the process as described here. - Run the
MigrateTo-IdentityServer.ps1
script, in PowerShell, using the parameters described here. Check out this example. - Install the Webhooks Service.
- Start the Orchestrator and Identity app services. Enjoy using Orchestrator on your Azure Portal.
Multi-node Installation
To install Orchestrator on multiple nodes on an Azure App Service perform the following steps:
Orchestrator Steps
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathOrchestrator
. When creating the web app, make sure to select the Stack.NET Core 3.1
. For more information, see Microsoft's official documentation. - Open the newly created web app in the Azure Portal, and on the Configuration tab, select General Settings, then make the following configuration changes:
- Set Platform to 64-bit.
- Set Web Sockets to On.
- Set the database connection string in the Application Settings of the web app, with the name "Default". For example,
Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
.
Important!
- The Azure SQL user provided here must have access at the server level, database level access is not sufficient for a successful installation.
- Make sure to set the
TrustServerCertificate
attribute in the database connection string toTrue
.
- Create an Azure AD application and service principal that can access your Orchestrator App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
- In the Scale out (App Service plan) tab, select the Scale to a specific instance count option and provide the desired Instance count.
Identity Server Steps
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathIdentity
. When creating the web app, make sure to select the Stack.NET Core 3.1
. For more information, see Microsoft's official documentation. - Set the database connection string in the Application Settings of the web app, with the name
DefaultConnection
. For example,Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
.
Important!
Make to set the
TrustServerCertificate
attribute in the database connection string toTrue
.
- Navigate to Settings > Configuration > General Settings tab and select 64-bit for the Platform.
- Create an Azure AD application and service principal that can access your Identity App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
General Steps
- Download the
UiPathOrchestrator.zip
archive to your local machine. This contains all the scripts necessary to install Orchestrator, Identity Server, and Webhooks Service. UiPath provides theUiPathOrchestrator.zip
archive on request. Contact us for details. - Extract the content of the zip file into a folder on your machine.
- Run the
Publish-Orchestrator.ps1
script, in PowerShell, using the parameters described here. Check out this example. - Run the
Publish-IdentityServer.ps1
script, in PowerShell, using the parameters described here and complete the process as described here. - Run the
MigrateTo-IdentityServer.ps1
script, in PowerShell, using the parameters described here. Check out this example. - Install the Webhooks Service.
- Start the Orchestrator and Identity app services. Enjoy using Orchestrator on your Azure Portal.
Updated 11 days ago