This section explains the tasks required before setup for the admin server.
Stop ServerView Resource Orchestrator if linking to it to operate the admin server:
[Windows]
<ServerView Resource Orchestrator installation directory>\SVROR\Manager\bin\rcxmgrctl stop |
[Linux]
/opt/FJSVrcvmr/bin/rcxmgrctl stop |
Only when using Red Hat Enterprise Linux 7, temporarily disable SELinux.
Use the following command to confirm the current SELinux configuration.
getenforce
When the configuration is "Enforcing" (enabled), use the following command to disable SELinux.
setenforce 0
Systemwalker Software Configuration Manager uses the following port numbers. The default port numbers are configured in the following definition file. If any of those default port numbers are being used by other software, change the corresponding values in the definition file before performing setup.
Definition file
[Windows]
<Systemwalker Software Configuration Manager installation directory>\SWCFMGM\config\swcfmg_serverport.properties
[Linux]
/etc/opt/FJSVcfmgm/config/swcfmg_serverport.properties
Setting value | Meaning of the setting value | Default value |
---|---|---|
WebServerPort | Web server for the management console | 31500 |
SubWebServerAhsExtPort | Sub-web server for the management console | 31600 |
SubWebServerAhsIntPort | Port for internal use | 31601 |
SubWebServerMongrel1Port | Port for internal use | 31501 |
SubWebServerMongrel2Port | Port for internal use | 31502 |
APSHTTPListenerAdminPort | Port for internal use | 12031 |
APSHTTPListenerPort | Port for internal use | 28081 |
APSJMXAdminPort | Port for internal use | 8689 |
APSHTTPSListenerPort | Port for internal use | 9181 |
APSMessageBrokerPort | Port for internal use | 7681 |
APSIIOPPort | Port for internal use | 23603 |
APSIIOPSSLPort | Port for internal use | 23604 |
APSIIOPMutualAuthPort | Port for internal use | 23605 |
CFMGMQHTTPListenerAdminPort | Port for internal use | 21020 |
CFMGMQHTTPListenerPort | Port for internal use | 21021 |
CFMGMQHTTPSListenerPort | Port for internal use | 21022 |
CFMGMQIIOPPort | Port for internal use | 21024 |
CFMGMQIIOPSSLPort | Port for internal use | 21025 |
CFMGMQIIOPMutualAuthPort | Port for internal use | 21026 |
CFMGMQJMXAdminPort | Port for internal use | 21023 |
CFMGMQJPDAPort | Port for internal use | 21027 |
CFMGManagerHTTPListenerAdminPort | Port for internal use | 27571 |
CFMGManagerHTTPListenerPort | Port for internal use | 11080 |
CFMGManagerHTTPSListenerPort | Port for internal use | 27573 |
CFMGManagerIIOPPort | Port for internal use | 27575 |
CFMGManagerIIOPSSLPort | Port for internal use | 27576 |
CFMGManagerIIOPMutualAuthPort | Port for internal use | 27577 |
CFMGManagerJMXAdminPort | Port for internal use | 27574 |
CFMGManagerJPDAPort | Port for internal use | 27579 |
PGSQLDBPort | Port for internal use | 9658 |
CMDBManagerHTTPListenerPort | Port for internal use | 13306 |
CMDBManagerHTTPListenerAdminPort | Port for internal use | 13310 |
CMDBManagerJMXAdminPort | Port for internal use | 13311 |
CMDBGuiHTTPListenerPort | Port for internal use | 13305 |
CMDBGuiHTTPListenerAdminPort | Port for internal use | 13312 |
CMDBGuiJMXAdminPort | Port for internal use | 13313 |
BPMServerHTTPListenerAdminPort | Port for internal use | 27551 |
BPMServerHTTPListenerPort | Port for internal use | 27552 |
BPMServerHTTPSListenerPort | Port for internal use | 27553 |
BPMServerIIOPPort | Port for internal use | 27555 |
BPMServerIIOPSSLPort | Port for internal use | 27556 |
BPMServerIIOPMutualAuthPort | Port for internal use | 27557 |
BPMServerJMXAdminPort | Port for internal use | 27554 |
BPMServerJPDAPort | Port for internal use | 27559 |
BPMConsoleHTTPListenerAdminPort | Port for internal use | 27561 |
BPMConsoleHTTPListenerPort | Port for internal use | 27562 |
BPMConsoleHTTPSListenerPort | Port for internal use | 27563 |
BPMConsoleIIOPPort | Port for internal use | 27565 |
BPMConsoleIIOPSSLPort | Port for internal use | 27566 |
BPMConsoleIIOPMutualAuthPort | Port for internal use | 27567 |
BPMConsoleJMXAdminPort | Port for internal use | 27564 |
BPMConsoleJPDAPort | Port for internal use | 27569 |
RBAServerHTTPListenerAdminPort | Port for internal use | 21028 |
RBAServerHTTPListenerPort | Port for internal use | 21029 |
RBAServerHTTPSListenerPort | Port for internal use | 21030 |
RBAServerIIOPPort | Port for internal use | 21032 |
RBAServerIIOPSSLPort | Port for internal use | 21033 |
RBAServerIIOPMutualAuthPort | Port for internal use | 21034 |
RBAServerJMXAdminPort | Port for internal use | 21031 |
RBAServerJPDAPort | Port for internal use | 21035 |
RBAOpeExeHTTPListenerAdminPort | Port for internal use | 21036 |
RBAOpeExeHTTPListenerPort | Port for internal use | 21037 |
RBAOpeExeHTTPSListenerPort | Port for internal use | 21038 |
RBAOpeExeIIOPPort | Port for internal use | 21040 |
RBAOpeExeIIOPSSLPort | Port for internal use | 21041 |
RBAOpeExeIIOPMutualAuthPort | Port for internal use | 21042 |
RBAOpeExeJMXAdminPort | Port for internal use | 21039 |
RBAOpeExeJPDAPort | Port for internal use | 21043 |
SSL communication is used when accessing the management console of Systemwalker Software Configuration Manager from a browser. To configure the environment for SSL communication, create the SSL server certificate before setting up the admin server.
Open the command prompt on the admin server.
Execute the following command to move to the installation folder.
[Windows]
cd "%SWCFMGM_HOME%\config"
[Linux]
cd /etc/opt/FJSVcfmgm/config
Create a new Apache certificate.
For Common Name, be sure to enter the host name of the admin server (FQDN).
[Windows]
set OPENSSL_CONF=%SWCFMGM_HOME%\config\openssl.cnf "%SWCFMGM_HOME%\bin\ssl\openssl.exe" req -new -x509 -sha256 -newkey rsa:2048 -nodes -out ssl\server.crt -keyout ssl\server.key -days 5479
[Linux]
openssl req -new -x509 -sha256 -newkey rsa:2048 -nodes -out ssl/server.crt -keyout ssl/server.key -days 5479
Example
[Windows]
cd "%SWCFMGM_HOME%config" <RETURN> set OPENSSL_CONF=%SWCFMGM_HOME%\config\openssl.cnf <RETURN> "%SWCFMGM_HOME%\bin\ssl\openssl.exe" req -new -x509 -sha256 -newkey rsa:2048 -nodes -out ssl\server.crt -keyout ssl\server.key -days 5479 <RETURN> Loading 'screen' into random state - done Generating a 2048 bit RSA private key ................+++ ...........................+++ writing new private key to 'ssl\server.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) []: <RETURN> State or Province Name (full name) []: <RETURN> Locality Name (eg, city) []: <RETURN> Organization Name (eg, company) []: <RETURN> Organizational Unit Name (eg, section) []: <RETURN> Common Name (eg, YOUR name) []:Host name of the Admin Server (FQDN) (*) <RETURN> Email Address []: <RETURN>
[Linux]
# cd /etc/opt/FJSVcfmgm/config/ <RETURN> # openssl req -new -x509 -sha256 -newkey rsa:2048 -nodes -out ssl/server.crt -keyout ssl/server.key -days 5479 <RETURN> Generating a 2048 bit RSA private key ................+++ ...........................+++ writing new private key to 'ssl/server.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]: <RETURN> State or Province Name (full name) []: <RETURN> Locality Name (eg, city) [Default City]: <RETURN> Organization Name (eg, company) [Default Company Ltd]: <RETURN> Organizational Unit Name (eg, section) []: <RETURN> Common Name (eg, your name or your server's hostname) []:Host name of the Admin Server (FQDN) (*) <RETURN> Email Address []: <RETURN> #
* Note: Enter the host name (FQDN) to be entered on the Web browser.
Example: Host name: myhost.company.com
Point
When the site certificate expires, you are no longer able to log in to Systemwalker Software Configuration Manager. When the site certificate expires, update the site certificate referring to "Appendix B Corrective Actions If the Site Certificate has Expired".