...
Install PostgreSQL from yum repository
Code Block yum install -y postgresql postgresql-server
Initialize a new PostgreSQL installation
Code Block postgresql-setup initdb
By default PostgreSQL server is only accessible via Unix Domain Sockets or loopback IP interface (127.0.0.1) to the local users, the users are authenticated by the operating system, i.e. the OS user postgres can connect as PostreSQL user postgres without any additional authentication from the PostgreSQL server side. To allow PgAdmin4 and FIXICC H2 to work we need to enable access via a network
To enable network access to PostgreSQL server edit file /var/lib/pgsql/data/pg_hba.conf and add the following lines:
Code Block host all all 0.0.0.0/0 md5
host all all ::0/0 md5
It allows all users to connect from any host via TCP or SSL socket using hashed passwords.
Remove lines that enable ident connection to localhost:
Code Block # IPv4 local connections:
host all all 127.0.0.1/32 ident
# IPv6 local connections:
host all all ::1/128
ident
ident
To enable listening of all network interfaces edit file /var/lib/pgsql/data/postgresql.conf , replace line:
Code Block # listen_addresses = 'localhost'
with
Code Block listen_addresses = '*'
Enable auto-start and start postgresql server (check service status)
Code Block systemctl enable --now postgresql
systemctl status postgresql
FIXICC-H2 installation and configuration
Install dependencies
Code Block yum install -y java-1.8.0-openjdk
Download latest package from https://clientspace.b2bits.com/product-58 (fixicc-h2-*.el7.x86_64.rpm)
Install rpm package fixicc-h2-*.el7.x86_64.rpm
Code Block rpm -i fixicc-h2-*.el7.x86_64.rpm
Login into postgres server
Code Block sudo -u postgres psql
Create a user and a database for FIXICC H2 in postgresql
Code Block CREATE USER fixicch2 WITH CREATEDB PASSWORD 'fixicch2';
CREATE DATABASE fixicch2;
GRANT ALL PRIVILEGES ON DATABASE fixicch2 TO fixicch2;
Exit psql console
Code Block postgres=# \q
Generate keystore for FIXICC-H2
Code Block keytool -genkey -noprompt -alias jetty -keyalg RSA -dname 'CN=admin, OU=EPM-BFIX, O=EPAM Systems, L=Unknown, S=Unknown, C=Unknown' -keystore /etc/fixicc-h2/keystore.jks -storepass fixicch2 -keypass fixicch2
chown fixicc-h2:fixicc-h2 /etc/fixicc-h2/keystore.jks
Edit /etc/fixicc-h2/local.app.properties and set properties as follows
Code Block cuba.rest.anonymousEnabled = true
cuba.anonymousLogin = anonymous
cuba.dbmsType = postgres
cuba.dataSourceProvider = application
cuba.dataSource.username = fixicch2
cuba.dataSource.password = fixicch2
cuba.dataSource.dbName = fixicch2
cuba.dataSource.host = 127.0.0.1
cuba.dataSource.port = 5432
fixicch2.fixServerType = all
fixicch2.consulEnabled=false
fixicch2.secure_http_port = 8443
fixicch2.key_store_path = keystore.jks
fixicch2.trust_store_path = keystore.jks
Edit /usr/lib/systemd/system/fixicc-h2.service as follows (NOTE: there is a version number in the file path, please specify the current version of FIXICCH2, e.g. 23Q1)
Code Block [Unit]
Description=FIXICC-H2
After=syslog.target network.target
[Service]
Type=simple
User=fixicc-h2
Group=fixicc-h2
SuccessExitStatus=143
Environment=FIXICC_H2_KEY_STORE_PASSWORD=fixicch2 FIXICC_H2_KEY_MANAGER_PASSWORD=fixicch2 FIXICC_H2_TRUST_STORE_PASSWORD=fixicch2
ExecStart=/bin/bash -c '/usr/bin/java -Dapp.home=/etc/fixicc-h2/ -Dfixicch2.secure_http_port=8443 -Dfixicch2.key_store_path=/etc/fixicc-h2/keystore.jks -Dfixicch2.trust_store_path=/etc/fixicc-h2/keystore.jks -jar /usr/lib64/fixicc-h2/22H1/app.jar'
ExecReload=/bin/kill -HUP $MAINPID
[Install]
WantedBy=multi-user.target
Enable auto-start and start FIXICC-H2 server (check service status)
Code Block systemctl enable --now fixicc-h2
systemctl status fixicc-h2
FIXICC-H2 UI should be available on https://server_ip:8443/app/
...
FIXEdge installation and configuration
Install dependencies
Code Block yum install -y libtool-ltdl
Note |
---|
NOTE for RHEL systems! |
Download latest package from https://clientspace.b2bits.com/product-30 (fixedge-*.el7.x86_64.rpm)
Install rpm package fixedge-*.el7.x86_64.rpm
Code Block rpm -i fixedge-*.el7.x86_64.rpm
Copy your engine.license file into /etc/fixedge/ directory
Code Block cp ./engine.license /etc/fixedge/
Add below config at the end of /etc/fixedge/FIXEdge.properties
Code Block # FIXICC-H2 Integration
AdminRESTAPI.Enabled = true
AdminRESTAPI.Port = 8903
AdminRESTAPI.HTTPSServer.PrivateKey = AdminRESTAPI.key
AdminRESTAPI.HTTPSServer.Certificate = AdminRESTAPI.crt
Components.Service.FIXICCH2 = configuration-service
Components.Service.FIXICCH2.Host = 127.0.0.1
Components.Service.FIXICCH2.Port = 8443
Components.Service.FIXICCH2.SSL = true
Components.Service.FIXICCH2.SSL.CertificateAuthority = /etc/fixedge/fixicc-h2.crt
Components.Service.FIXICCH2.ReconnectInterval = 1000
Components.Component.Configuration = FIXICCH2
Extract fixicc-h2 certificate
Code Block keytool -export -alias jetty -file /etc/fixicc-h2/fixicc-h2.der -keystore /etc/fixicc-h2/keystore.jks -storepass fixicch2 -keypass fixicch2
openssl x509 -inform der -in /etc/fixicc-h2/fixicc-h2.der -out /etc/fixicc-h2/fixicc-h2.crt
cp /etc/fixicc-h2/fixicc-h2.crt /etc/fixedge/fixicc-h2.crt
chown fixedge:fixedge /etc/fixedge/fixicc-h2.crt
Enable auto-start and start FIXEdge server (check service status)
Code Block systemctl enable --now fixedge
systemctl status fixedge
After startup fixedge server navigate to "Show all servers" and you will see "Misbehaving" status for the FIXEdge1 server. Press on "Edit" button and provide the parameters like below, Then, press "OK":
...
Download latest package from https://clientspace.b2bits.com/product-36 (fixeye-agent-*.el7.x86_64.rpm)
Install rpm package fixeye-agent-*.el7.x86_64.rpm
Code Block rpm -i fixeye-agent-*.el7.x86_64.rpm
Copy your fixeye-agent.license file into /etc/fixeye/ directory
Code Block cp ./fixeye-agent.license /etc/fixeye/
Edit /etc/fixeye/fixeye-agent.config as follows
Code Block -rest-port 8882 -rest-pkey "/etc/fixeye/AdminRESTAPI.key" -rest-cert "/etc/fixeye/AdminRESTAPI.crt" --propfile "/etc/fixeye/fixeye-agent.properties" -f "/var/lib/fixedge/*.in" "/var/lib/fixedge/*.out" --pidfile "/var/log/fixeye/fixeye-agent.pid" -licfile "/etc/fixeye/fixeye-agent.license"
Copy RESTAPI certificate for fixeye
Code Block cp /etc/fixedge/AdminRESTAPI.crt /etc/fixeye/AdminRESTAPI.crt
cp /etc/fixedge/AdminRESTAPI.key /etc/fixeye/AdminRESTAPI.key
chown fixeye:fixeye /etc/fixeye/AdminRESTAPI.crt
chown fixeye:fixeye /etc/fixeye/AdminRESTAPI.key
Add fixeye user to the fixedge group
Code Block usermod -a -G fixedge fixeye
Enable auto-start and start fixeye-agent server (check service status)
Code Block systemctl enable --now fixeye-agent
systemctl start fixeye-agent