Configuring IT Data Analytics communication to enable TLS 1.2
TrueSight IT Data Analytics communicates with TrueSight Presentation Server to perform the following:
- Get events from the Presentation Server.
- Send events to the Presentation Server when the notification is triggered and criteria is met.
- Cross-launch from the Presentation Server into IT Data Analytics.
TrueSight IT Data Analytics communicates with TrueSight Infrastructure Management to perform the following:
- Get events from the Infrastructure Management server.
- Send events to the Infrastructure Management Server when the notification is triggered and criteria is met.
- Cross-launch from Infrastructure Management Server into IT Data Analytics.
Perform the following steps to configure TrueSight Presentation Server, TrueSight Infrastructure Management, and TrueSight IT Data Analytics to enable TLS 1.2:
- Step 1: To configure the IT Data Analytics Server
- Step 2: To configure the Presentation Server
- Step 3: To configure the Infrastructure Management Server
- Step 4: To start the servers
- Step 5: To register IT Data Analytics with the Presentation Server
To configure the Presentation Server
Navigate to the <Presentation Server Install Directory>\truesightpserver\bin directory, and run the following command to check whether the TrueSight Presentation Server is running.
tssh server statusLog on to the TrueSight console and select Administration> Components.
Displays the components that are registered with the Presentation Server. Ensure that no TrueSight Infrastructure Management Server is registered with the TrueSight Presentation Server. If a TrueSight Infrastructure Management Server is registered delete the same. For more information, see To delete a component
Set the property in the database by running the following command:
tssh properties set tsps.cell.conntype ssl
tssh properties set pronet.jms.conntype ssl- Using a text editor, open the mcell.dir file located in <Presentation Server Install Directory>\conf directory.
Comment out the instances of the code lines having the encryption key value as mc as shown in the following code block:
#Type <name> encryption key <host>/<port>
#gateway.gateway_subtype ts_event_gateway mc tsps_server1.bmc.com:1900
#cell pncell_tsim_server1 mc tsim_server1.bmc.com:1828Set the encryption key value to *TLS as shown in the following code block:
#Type <name> encryption key <host>/<port>
gateway.gateway_subtype ts_event_gateway *TLS tsps_server1.bmc.com:1900
cell pncell_tsim_server1 *TLS tsim_server1.bmc.com:1828- Save and close the file.
Stop the Presentation Server by running the following command:
tssh server stop
To configure the Infrastructure Management Server cell
- Access the IT Data Analytics console.
- Go to Administration > External Configurations.
- From the list at the top-left of your screen, select TSIM Cell Configuration.
Provide the following details:
Field
Instruction
External Configuration Name
Provide a name to identify this external configuration.
Cell Name
Provide the name of the cell defined in the Infrastructure Management server with which you want to connect and collect event data.
For example, the cell name can be pncell_hostName.
Cell Host
Provide the host name of the server on which the cell is located.
Note: If you provide a fully-qualified domain name or host name, ensure that it resolves to the same IP as that of the computer that hosts the Infrastructure Management server.
Cell Port
Provide the port number of the server on which the cell is located.
Cell Encryption Key
Set the cell's encryption key as *TLS.
Tip: You can find the preceding details such as the cell name, its encryption key, host name, and port number in the mcell.dir file.
To access the mcell.dir file, navigate to the computer on which your cell exists, by using one of the following paths:- Windows: %MCELL_HOME%\etc\
- Linux: $MCELL_HOME/etc/
Enable HA
(Optional) If you are operating in a High Availability environment, select this check box, and then provide the host name and port number of the server on which the secondary cell is located.
Secondary Cell Host
Providing this information is applicable only if you select the Enable HA check box.
Enter the host name of the server on which the secondary cell is located.
Secondary Cell Port
Providing this information is applicable only if you select the Enable HA check box.
Enter the port number corresponding to the server on which the secondary cell is located.
- Click Save.
To configure the IT Data Analytics console server
To enable security for the Console Server with default certificate
- Navigate to the following location to locate the olaengineCustomConfig.properties file and the searchserviceCustomConfig.properties file.
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the olaengineCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- searchservice.port=9443
- protocol=https
Restart the Console Server and Search components.
For more information, see Starting or stopping product services.- Log in to the product by replacing "http" with "https" and port 9797 with port 9443.
For example, https://Host1:9443/console/.
To enable security for the Console Server with custom self-signed certificate
Before you begin enabling security for the Console Server with a custom self-signed certificate, ensure that you have generated a KeyStore in the JKS format.
- Generate a custom self-signed certificate.
- Locate the server.xml file at one of the following locations:
- Windows: %BMC_ITDA_HOME%\tomcat\conf
- Linux: $BMC_ITDA_HOME/tomcat/conf
In the server.xml file, add the following properties with appropriate values, depending on the KeyStore that you generated earlier (see the following example).
- keystoreFile="keystoreFilePath"
- keystorePass="keystorePassword"
keyAlias="AliasofKeystore"
<Connector
SSLEnabled="true"
ciphers="TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSVF"
clientAuth="false" keyAlias="truesightserver"
keystoreFile="conf/bmcitda2.jks" keystorePass="changeit"
maxThreads="150" port="9443"
protocol="org.apache.coyote.http11.Http11NioProtocol"
scheme="https" secure="true" sslProtocol="TLS"/>- keystoreFile="keystoreFilePath"
- Navigate to the following location to locate the olaengineCustomConfig.properties file and the searchserviceCustomConfig.properties file.
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the olaengineCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- consoleserver.port=9443
In the searchserviceCustomConfig.properties file, add the following properties:
- consoleserver.protocol=https
- searchservice.port=9443
- protocol=https
Import the self-signed certificate into the Console Server's Java Runtime Environment (JRE) by using the following command:
keytool -import -trustcacerts -alias <HostName-or-IP> -keystore $BMC_ITDA_HOME/jre/lib/security/cacerts -file <Certificate-Path>
In this command, the following variables apply:- <HostName-or-IP> refers to the host name or IP address of the computer on which the Console Server is located.
- <Certificate-Path> refers to the absolute path to the self-signed certificate of the Console Server.
Restart the Console Server and Search components.
For more information, see Starting or stopping product services.- Log in to the product.
Example for accessing the console: https://Host1:9443/console/.
Enabling security for the Search components
By enabling security for the Search components, you can secure the communication between the Console Server and Search components, as follows:
- Navigate to the following location on each of the Search components:
- Windows: %BMC_ITDA_HOME%\custom\conf\server
- Linux: $BMC_ITDA_HOME/custom/conf/server
- In the the searchserviceCustomConfig.properties file, add the following properties:
- searchservice.port=9443
- protocol=https
Restart the Search components.
For more information, see Starting or stopping product services.
To start the servers
Failed to execute the [excerpt-include] macro.
To register IT Data Analytics with the Presentation Server
Register TrueSight IT Data Analytics with the Presentation Server. For more information, see Registering-the-components-with-the-Presentation-Server.
Where to go from here
For more information about how to configure other communication channels to enable TLS 1.2, see Configuring-TrueSight-Infrastructure-Management-to-enable-TLS-1-2.