{"id":2212,"date":"2015-07-14T09:57:46","date_gmt":"2015-07-14T07:57:46","guid":{"rendered":"http:\/\/vm.piszki.pl\/?p=2212"},"modified":"2015-07-14T13:09:56","modified_gmt":"2015-07-14T11:09:56","slug":"vrealize-operations-manger-6-trend-micro-deep-security-management-pack","status":"publish","type":"post","link":"https:\/\/vm.piszki.pl\/?p=2212","title":{"rendered":"vRealize Operations Manger 6: Trend Micro Deep Security Management Pack"},"content":{"rendered":"<p align=\"justify\">Na stronie <a href=\"https:\/\/solutionexchange.vmware.com\/store\" target=\"_blank\">VMware VSX<\/a> mo\u017cemy znale\u017a\u0107 ciekawy dodatek do vRealize Operations Manager, jest to <a href=\"https:\/\/solutionexchange.vmware.com\/store\/products\/trend-micro-deep-security-management-pack-for-vcenter-operations\" target=\"_blank\">Trend Micro Deep Security Management<\/a> (pack). W instrukcji instalacji jest wyra\u017anie napisane, \u017ce ostatni\u0105 wspieran\u0105 wersj\u0105 jest tak naprawd\u0119 VMware Operations Manager 5.8.4. Na szcz\u0119\u015bcie jest to cz\u0119\u015bciowa prawda, po wykonaniu drobnej modyfikacji w skrypcie instaluj\u0105cym certyfikat mo\u017cemy ca\u0142o\u015b\u0107 rozwi\u0105zania \u015bmia\u0142o instalowa\u0107 i u\u017cywa\u0107 w vRealize Operations Manager 6.0.1. Procedura jest bardzo prosta i nie odbiega mocno od oficjalnej instrukcji instalacji.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops5.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border: 0px;\" title=\"vcops5\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops5_thumb.png\" alt=\"vcops5\" width=\"240\" height=\"114\" border=\"0\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p align=\"justify\">W pierwszym kroku musimy zalogowa\u0107 si\u0119 poprzez konsol\u0119 do vROPS, ustawi\u0107 has\u0142o dla roota i w\u0142\u0105czy\u0107 SSH. Na konsoli musimy prze\u0142\u0105czy\u0107 konsol\u0119 Linux (ALT+F1), startowe has\u0142o roota jest puste (wciskamy po prostu enter).<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops1.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"vcops1\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops1_thumb.png\" alt=\"vcops1\" width=\"526\" height=\"204\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Po uruchomieniu SSH, przegrywamy do vROPS certyfikat Deep Security Manager (je\u015bli mamy wi\u0119cej w klastrze to wystarczy z jednego, dowolnego noda). W kolejnym kroku musimy zmodyfikowa\u0107 skrypt instaluj\u0105cy certyfikat lub zrobi\u0107 to <a href=\"http:\/\/pubs.vmware.com\/vrealizeoperationsmanager-6\/index.jsp?topic=%2Fcom.vmware.vcom.core.doc%2FGUID-DA37B380-E6CA-4941-B143-1AD6339264F9.html\" target=\"_blank\">r\u0119cznie<\/a>.<\/p>\n<p>Lini\u0119: KEYSTORE=&#8221;$ALIVE_BASE\/user\/conf\/truststore&#8221;<\/p>\n<p>Zamieniamy na: KEYSTORE=&#8221;\/storage\/vcops\/user\/conf\/ssl\/tcserver.keystore&#8221;<\/p>\n<p>Has\u0142o do keystore znajduje si\u0119 w pliku: <a name=\"GUID-DA37B380-E6CA-4941-B143-1AD6339264F9__filepath_A21844FC5DCF426A83682EDD8BD72174\"><\/a>\/storage\/vcops\/user\/conf\/ssl\/storePass.properties (umieszczamy je w skrypcie zamiast has\u0142a \u201coxygen\u201d).<\/p>\n<p>Uruchamiamy skrypt, instalujemy certyfikat:<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops2.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"vcops2\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops2_thumb.png\" alt=\"vcops2\" width=\"494\" height=\"70\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">W nast\u0119pnym kroku instalujemy DeepSecurityAdapter-1.0.0.pak w vRealize Operations Manager (Administration \u2013&gt; Solutions \u2013&gt; +). Je\u015bli mamy wi\u0119cej ni\u017c jedn\u0105 instancj\u0119 vROPS (klaster) to w trakcie konfiguracji Adaptera musimy wybra\u0107 w\u0142a\u015bciwego noda (czyli tego na kt\u00f3rym zainstalowali\u015bmy certyfikat DSM).<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops3.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"vcops3\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops3_thumb.png\" alt=\"vcops3\" width=\"352\" height=\"435\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Po odczekaniu czasu potrzebnego na analiz\u0119, mo\u017cemy cieszy\u0107 si\u0119 informacjami na stosownych dashboardach.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops4.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border: 0px;\" title=\"vcops4\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2015\/05\/vcops4_thumb.png\" alt=\"vcops4\" width=\"477\" height=\"169\" border=\"0\" \/><\/a><\/p>\n<div style='text-align:left' class='yasr-auto-insert-visitor'><\/div>","protected":false},"excerpt":{"rendered":"<p>Na stronie VMware VSX mo\u017cemy znale\u017a\u0107 ciekawy dodatek do vRealize Operations Manager, jest to Trend Micro Deep Security Management (pack). W instrukcji instalacji jest wyra\u017anie napisane, \u017ce ostatni\u0105 wspieran\u0105 wersj\u0105 jest tak naprawd\u0119 VMware Operations Manager 5.8.4. Na szcz\u0119\u015bcie jest &hellip; <a href=\"https:\/\/vm.piszki.pl\/?p=2212\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1536,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[45],"tags":[16,85],"class_list":["post-2212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-poradniki","tag-deep-security","tag-operations-manager"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2212"}],"collection":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2212"}],"version-history":[{"count":7,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2212\/revisions"}],"predecessor-version":[{"id":2362,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2212\/revisions\/2362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/media\/1536"}],"wp:attachment":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}