Installing

The installation process requires you to complete your planning activities before starting the preparatory and installation tasks. The installation flow diagram and the process tables enable you to install the product smoothly.

Note

TrueSight Vulnerability Management is delivered to customers bundled as a set of Docker Containers. The Docker Containers and the software installed on them should not be taken out of TrueSight Vulnerability Management or used separately from TrueSight Vulnerability Management. Installing additional third-party software or updating existing software packages in the Docker Containers is not permitted, unless explicitly authorized by BMC Software.

TrueSight Vulnerability Management installation process – At a glance


Installation process

Step 1: Complete the planning activities

Use this information to plan a new deployment of TrueSight Vulnerability Management.

Description Procedure

Planning activities include pre-deployment considerations, recommendations, and deployment options for your environment.


Step 2: Prepare for the TrueSight Vulnerability Management installation

Complete the preinstallation tasks to ensure a successful installation.

Description Procedure

Download the installation files and complete the pre-installation tasks


Step 3: Install TrueSight Vulnerability Management

A TrueSight Vulnerability Management deployment consists of three nodes: database, Elasticsearch, and application. TrueSight Vulnerability Management currently supports PostgreSQL as a database. The application consists of multiple components and uses Elasticsearch to store read-only data for faster retrieval.

Description Procedure

Install the database, Elasticsearch, and application in the following order using a single script contained in the Stack Manager tool, which is shipped with the product:

  1. Database
  2. Elasticsearch
  3. Application

Install in one of the following modes:

  • Installing in the interactive mode: In this mode, you can use one of the following deployment methods:
    • You first create inputs files and then use them for installation.
    • You directly provide inputs on the command line during installation.
  • Installing silently: In this mode, you create an options file containing all the required inputs and then use the options file for installing the product on multiple computers in your network.

What next?

  • If you want to use your own certificate instead of using the default SSL certificate that TrueSight Vulnerability Management provides, see Adding a trusted certificate .
  • During installation, you need to specify details for at least one of the system connectors. After installation, if you want to set up other connectors, see Setting up connectors .
Was this page helpful? Yes No Submitting... Thank you

Comments