This topic describes how to connect Kingdee K/3 WISE 15.0 or 15.1 that is deployed on an Elastic Cloud Service (ECS) instance to an ApsaraDB RDS for SQL Server instance. After the connection is established, you can configure a distributed transaction whitelist for the RDS instance and the ECS instance to implement transaction consistency and isolation.
Process
Upload a full backup file of the specified Kingdee K/3 WISE set of books to an Object Storage Service (OSS) bucket. Then, restore the data from the full backup file to the RDS instance. For more information, see Restore data to the RDS instance.
Modify the access settings of the RDS instance, ECS instance, and Windows operating system to open required ports. This allows you to smoothly run distributed transactions between the RDS instance and the ECS instance. For more information, see Enable distributed transactions.
Replace the original accounting data management tool of Kingdee K/3 WISE with a new one that is compatible with ApsaraDB RDS for SQL Server. For more information, see Initialize the new accounting data management tool.
Preparations
Install Kingdee K/3 WISE on an ECS instance that runs
Windows Server 2016
.Create an RDS instance that resides in the same region and virtual private cloud (VPC) as the ECS instance on which Kingdee K/3 WISE is installed. For more information, see Overview of VPCs and vSwitches and Create an ApsaraDB RDS for SQL Server instance.
NoteCreate a full backup file for the specified Kingdee K/3 WISE set of books.
Restore data to the RDS instance
Upload a full backup file of the set of books to an OSS bucket
Log on to the OSS console.
In the left-side navigation pane, click Buckets. On the Buckets page, click Create Bucket.
Configure the following parameters and retain the default values for other parameters. Then, click OK.
Parameter
Description
Bucket Name
Enter a name for the bucket.
Region
Select the region in which you want to create the bucket.
ImportantMake sure that the bucket resides in the same region as the ECS instance and RDS instance.
Storage Class
Select IA.
Redundancy Type
Select LRS.
ACL
Select Private.
Versioning
Select Not Activated.
Encryption Method
Select None.
Real-time Log Query
Select Not Activated.
NoteFor more information, see Create buckets.
In the left-side navigation pane, click Buckets. On the page that appears, click the bucket that you created.
In the left-side navigation pane of the page that appears, choose
. On the page that appears, click Upload Object.Drag the full backup file that you want to upload to the Files to Upload field. Alternatively, click Select Files and select the full backup file.
NoteFor more information, see Upload objects.
Create a privileged account for the RDS instance
- Go to the Instances page. In the top navigation bar, select the region in which the RDS instance resides. Then, find the RDS instance and click the ID of the instance.
In the left-side navigation pane, click Accounts.
Click Create Account.
Configure the following parameters and click OK.
Parameter
Description
Database Account
Enter a username for the account. The name can be up to 50 characters in length and can contain lowercase letters, digits, and underscores (_). It must start with a lowercase letter and end with a lowercase letter or a digit.
Account Type
Specify the type of the account. Select Privileged Account. For more information, see Account permissions in an ApsaraDB RDS for SQL Server instance.
New Password
Enter a password for the account. The password must meet the following requirements:
It is 8 to 32 characters in length.
It must contain at least three types of the following characters: uppercase letters, lowercase letters, digits, and special characters.
It can contain the following special characters: ! @ # $ % ^ & * ( ) _ + - =
Confirm Password
Enter the password for the account again.
Description
Enter a description that helps identify the account.
Restore the full backup file from the OSS bucket to the RDS instance
The AliyunServiceRoleForDBS service-linked role is created by using your Alibaba Cloud account when you use the backup feature of ApsaraDB RDS for the first time. For more information, see How do I create a service-linked role for DBS?
- Go to the Instances page. In the top navigation bar, select the region in which the RDS instance resides. Then, find the RDS instance and click the ID of the instance.
In the left-side navigation pane of the page that appears, click Backup and Restoration. On the page that appears, click Migrate OSS Backup Data to RDS.
NoteIf you cannot find the button, check whether the SQL Server version and edition of the RDS instance meet requirements. For more information, see Preparations.
Click Next twice to go to the Import Data step.
Configure the following parameters.
Parameter
Description
Database Name
Enter the name of the destination database on the RDS instance.
OSS Bucket
Select the OSS bucket in which the full backup file is stored.
OSS File
Specify the full backup file that you want to import. You can enter a prefix in the search box and click the search icon to search for the full backup file in fuzzy match mode. The system displays the name, size, and update time of each full backup file that is returned. Select the backup file that you want to migrate to the RDS instance.
Cloud Migration Method
Select Immediate Access (Full Backup).
Consistency Check Mode
Select Synchronous DBCC.
NoteIf you migrate backup data from OSS to ApsaraDB RDS for the first time, the system prompts you to authorize ApsaraDB RDS to access your resources in OSS. In this case, click Authorize and then Confirm Authorization Policy.
Click OK.
NoteWait until the full backup file is imported into the destination database on the RDS instance. You can click Databases in the left-side navigation pane to view the status of the destination database.
Enable distributed transactions
Configure the RDS instance
- Go to the Instances page. In the top navigation bar, select the region in which the RDS instance resides. Then, find the RDS instance and click the ID of the instance.
In the left-side navigation pane of the page that appears, click Whitelist and SecGroup. On the Whitelist Settings tab of the page that appears, click Modify to the right of the IP address whitelist that is labeled
default
and add the IP address of the ECS instance to the whitelist.NoteIf the ECS instance and RDS instance reside in the same VPC, enter the private IP address of the ECS instance. You can view the private IP address on the Instance Details page for the ECS instance in the ECS console.
If the ECS instance and RDS instance reside in different VPCs, you must enter the public IP address of the ECS instance. In addition, you must apply for a public endpoint for the RDS instance. For more information, see Apply for or release a public endpoint.
Click OK.
In the left-side navigation pane, click Data Security. On the page that appears, click the Distributed Transaction Whitelist tab.
Click Create Whitelist.
Configure the following parameters and click OK.
Parameter
Description
Whitelist Name:
Enter a name for the whitelist. The name must be 2 to 32 characters in length and can contain digits, lowercase letters, and underscores (_). The username must start with a lowercase letter and end with a lowercase letter or digit.
IP Addresses
Enter the IP address of the ECS instance and the name of the Windows-based computer on which the ECS instance resides. Make sure that you separate the IP address and the computer name with a comma (,). Example:
192.168.1.100,k3ecstest
.If you want to enter more than one entry, make sure that each entry is in a different line.
NoteTo view the computer name, open
of your computer and choose System and SecuritySystem.
Configure the ECS instance
Log on to the ECS console.
In the left-side navigation pane, choose
. In the top navigation bar, select the region in which the ECS instance resides.Find the ECS instance and click its ID.
Click the Security Groups tab.
Find the security group and click Configure Rules in the Actions column.
On the Inbound tab, click Add Rule.
Configure the following parameters and click OK.
Parameter
Description
Action
Select Allow.
Priority
Enter 1.
Protocol Type
Select Custom TCP.
Port Range
Enter 135.
NotePort 135 is the fixed port for the Remote Procedure Call (RPC) service.
Authorization Object
Enter the two IP addresses of the RDS instance in the Authorization Object field. You can view the IP addresses on the
tab of the Data Security page.Description
Enter a description that helps identify the rule. The description must be 2 to 256 characters in length and cannot start with http:// or https://.
Add another security group rule. Set the Port Range parameter for this rule to 1024/65535 and use the same settings of other parameters as the previous rule.
Configure your Windows operating system
Log on to the Windows Server 2016 operating system.
Open the hosts file in the C:\Windows\System32\drivers\etc directory.
Enter the two IP addresses of the RDS instance at the end of the hosts file. You can view these IP addresses on the Distributed Transaction Whitelist tab of the Data Security page in the ApsaraDB RDS console.
Save the hosts file.
Open Control Panel of your computer, choose
, and then double-click Component Services.Choose
.Right-click Local DTC and select Properties.
Click the Security tab and configure the parameters.
Click OK. In the MSDTC Service message, click Yes. Then, wait for the MSDTC service to restart.
Initialize the new accounting data management tool
Download the software package of the accounting data management tool that is used with Kingdee K/3 WISE 15.1 or 15.0.
NoteDifferent Kingdee K/3 WISE versions require different accounting data management tools. Only the accounting data management tools of Kingdee K/3 WISE 15.0 and 15.1 are provided.
Decompress the package and save it to the following installation directory of Kingdee K/3 WISE: K3ERP\KDSYSTEM\KDCOM.
Open Kingdee K/3 WISE.
In the dialog box that appears, configure the identity verification and data server information.
NoteYou must configure the internal endpoint of the RDS instance for the data server.
Configure the preset connection.
Register the set of books.
Select the specified database and click All.
Log on to Kingdee K/3 WISE
After all the settings are complete, you can run distributed transactions between the ECS and RDS instances. In addition, you can then log on to and use Kingdee K/3 WISE.
References
For more information about how to configure a whitelist, see Configure an IP address whitelist.
For more information about the terms, limits, and best practices of security groups, see Overview.
For more information about how to back up and restore an ApsaraDB RDS for SQL Server instance, see Methods to back up an ApsaraDB RDS for SQL Server instance or Methods to restore an ApsaraDB RDS for SQL Server instance.