...
Install dependencies
Code Block language bash yum install java-1.8.0-openjdk
- Download latest package from https://clientspace.b2bits.com/product-58 (fixicc-h2-*-*.el7.x86_64.rpm)
Install rpm package fixicc-h2-*-*.el7.x86_64.rpm
Code Block language bash rpm -i fixicc-h2-*-*.el7.x86_64.rpm
Login into postgres server
Code Block language bash sudo -u postgres psql
Create a user and a database for FIXICC H2 in postgresql
Code Block language sql CREATE USER fixicch2 WITH CREATEDB PASSWORD 'fixicch2'; CREATE DATABASE fixicch2; GRANT ALL PRIVILEGES ON DATABASE fixicch2 TO fixicch2;
Exit psql console
Code Block language bash postgres=# \q
Generate keystore for FIXICC-H2
Code Block language bash keytool -genkey -noprompt -alias jetty -keyalg RSA -dname 'CN=admin, OU=EPM-BFIX, O=EPAM Systems, L=Unknown, S=Unknown, C=Unknown' -keystore /etc/fixicc-h2/keystore.jks -storepass fixicch2 -keypass fixicch2 chown fixicc-h2:fixicc-h2 /etc/fixicc-h2/keystore.jks
Edit /etc/fixicc-h2/local.app.properties and set properties as follows
Code Block language css cuba.rest.anonymousEnabled = true cuba.anonymousLogin = anonymous cuba.dbmsType = postgres cuba.dataSourceProvider = application cuba.dataSource.username = fixicch2 cuba.dataSource.password = fixicch2 cuba.dataSource.dbName = fixicch2 cuba.dataSource.host = 127.0.0.1 cuba.dataSource.port = 5432 fixicch2.consul.encrypted_connection = true fixicch2.consul.host = 127.0.0.1 fixicch2.consul.port = 8501 fixicch2.consul.insecure_connection_enabled = true fixicch2.fixServerType = all fixicch2.consul.check.tls_skip_verify=true fixicch2.secure_http_port = 8443 fixicch2.key_store_path = keystore.jks fixicch2.trust_store_path = keystore.jks
Edit /usr/lib/systemd/system/fixicc-h2.service as follows
Code Block language css [Unit] Description=FIXICC-H2 After=syslog.target network.target [Service] Type=simple User=fixicc-h2 Group=fixicc-h2 SuccessExitStatus=143 Environment=FIXICC_H2_KEY_STORE_PASSWORD=fixicch2 FIXICC_H2_KEY_MANAGER_PASSWORD=fixicch2 FIXICC_H2_TRUST_STORE_PASSWORD=fixicch2 ExecStart=/bin/bash -c '/usr/bin/java -Dapp.home=/etc/fixicc-h2/ -Dfixicch2.secure_http_port=8443 -Dfixicch2.key_store_path=/etc/fixicc-h2/keystore.jks -Dfixicch2.trust_store_path=/etc/fixicc-h2/keystore.jks -jar /usr/lib64/fixicc-h2/22H1/app.jar' ExecReload=/bin/kill -HUP $MAINPID [Install] WantedBy=multi-user.target
Enable and start fixicc-h2 server:
Code Block language bash systemctl enable --now fixicc-h2 systemctl start fixicc-h2
FIXICC-H2 UI should be available on https://server_ip:8443/app/
Note default user:password is admin:admin
...
Install dependencies
Code Block language bash yum install libtool-ltdl
Note title NOTE for RHEL systems! - check whether /usr/lib64/libnsl.so.1 exists on your system (create symlink if needed `ln -s /usr/lib64/libnsl.so.2 /usr/lib64/libnsl.so.1`) - Download latest package from https://clientspace.b2bits.com/product-30 (fixedge-*-*.el7.x86_64.rpm)
Install rpm package fixedge-*-*.el7.x86_64.rpm
Code Block language bash rpm -i fixedge-*-*.el7.x86_64.rpm
Copy your engine.license file into /etc/fixedge/ directory
Code Block language bash cp ./engine.license /etc/fixedge/
Add below config at the end of /etc/fixedge/FIXEdge.properties
Code Block language css # FIXICC-H2 Integration AdminRESTAPI.Enabled = true AdminRESTAPI.Port = 8903 AdminRESTAPI.HTTPSServer.PrivateKey = AdminRESTAPI.key AdminRESTAPI.HTTPSServer.Certificate = AdminRESTAPI.crt Components.Service.ConsulAPI = Consul Components.Service.ConsulAPI.Checks = Components.Service.ConsulAPI.Host = localhost Components.Service.ConsulAPI.Port = 8501 Components.Service.ConsulAPI.SSL = true Components.Service.ConsulAPI.SSL.CertificateAuthority = /etc/fixedge/consul.crt Components.Service.ConsulAPI.Services.Host = localhost Components.Component.ServiceDiscovery = ConsulAPI Components.Service.FIXICCH2 = configuration-service Components.Service.FIXICCH2.Host = 127.0.0.1 Components.Service.FIXICCH2.Port = 8443 Components.Service.FIXICCH2.SSL = true Components.Service.FIXICCH2.SSL.CertificateAuthority = /etc/fixedge/fixicc-h2.crt Components.Service.FIXICCH2.ReconnectInterval = 1000 Components.Component.Configuration = FIXICCH2
Copy consul certificate
Code Block language bash cp /etc/consul.d/consul.crt /etc/fixedge/consul.crt chown fixedge:fixedge /etc/fixedge/consul.crt
Extract fixicc-h2 certificate
Code Block language bash keytool -export -alias jetty -file /etc/fixicc-h2/fixicc-h2.der -keystore /etc/fixicc-h2/keystore.jks -storepass fixicch2 -keypass fixicch2 openssl x509 -inform der -in /etc/fixicc-h2/fixicc-h2.der -out /etc/fixicc-h2/fixicc-h2.crt cp /etc/fixicc-h2/fixicc-h2.crt /etc/fixedge/fixicc-h2.crt chown fixedge:fixedge /etc/fixedge/fixicc-h2.crt
Enable and start fixedge server:
Code Block language bash systemctl enable --now fixedge systemctl start fixedge
- After startup fixedge server should appear in fixicc-h2 UI
...
- Download latest package from https://clientspace.b2bits.com/product-36 (fixeye-agent-2.3.0.168-1*.el7.x86_64.rpm)
Install rpm package fixeye-agent-2.3.0.168-1.*.el7.x86_64.rpm
Code Block language bash rpm -i fixeye-agent-2.3.0.168-1*.el7.x86_64.rpm
Copy your fixeye-agent.license file into /etc/fixeye/ directory
Code Block language bash cp ./fixeye-agent.license /etc/fixeye/
Edit /etc/fixeye/fixeye-agent.config as follows
Code Block language bash -rest-port 8882 -rest-pkey "/etc/fixeye/AdminRESTAPI.key" -rest-cert "/etc/fixeye/AdminRESTAPI.crt" --propfile "/etc/fixeye/fixeye-agent.properties" -f "/var/lib/fixedge/*.in" "/var/lib/fixedge/*.out" --pidfile "/var/log/fixeye/fixeye-agent.pid" -licfile "/etc/fixeye/fixeye-agent.license"
Replace corresponding properties in /etc/fixeye/fixeye-agent.properties with the following
Code Block language css Consul.Enabled=true Consul.Host=localhost Consul.Port=8501 Consul.ReconnectInterval=1000 Consul.ServerName=FIXEdge1 Consul.Services.Host=localhost Consul.Services.HealthChecks.Interval=5 Consul.Services.HealthChecks.Timeout=5 Consul.SSL=true Consul.SSL.CertificateAuthority=/etc/fixeye/consul.crt
Copy consul certificate
Code Block language bash cp /etc/consul.d/consul.crt /etc/fixeye/consul.crt chown fixeye:fixeye /etc/fixeye/consul.crt
Copy consul certificate
Code Block language bash cp /etc/fixedge/AdminRESTAPI.crt /etc/fixeye/AdminRESTAPI.crt cp /etc/fixedge/AdminRESTAPI.key /etc/fixeye/AdminRESTAPI.key chown fixeye:fixeye /etc/fixeye/AdminRESTAPI.crt chown fixeye:fixeye /etc/fixeye/AdminRESTAPI.key
Add fixeye user to the fixedge group
Code Block language bash usermod -a -G fixedge fixeye
Enable and start fixeye-agent server:
Code Block language bash systemctl enable --now fixeye-agent systemctl start fixeye-agent
...