Installing BMC Helix Platform Common Services 23.4.00
The following video (3:23) provides a summary of installing BMC Helix Platform Common Services:
Before you begin
- Make sure that you have created a namespace to install BMC Helix Platform Common services.
Verify that nothing is installed in the namespace by using the following command:
kubectl get all -n <namespace>- Make sure that you have configured the nginx-configuration configmap.
For information about the nginx-configuration configmap parameter value requirements, see System-requirements. - Make sure that you have permission to create ServiceAccount, Role, and RoleBinding in the BMC Helix Platform namespace.
If you do not have permission, create a Service account, Role, and RoleBinding.
To create ServiceAccount, Role, and RoleBinding
To install BMC Helix Platform Common Services, you must have permission to create ServiceAccount, Role, and RoleBinding in the BMC Helix Platform namespace.
If you do not have permission, an administrator must perform the following steps to create a Service account, Role, and RoleBinding to enable you to install BMC Helix Platform Common Services:
- In the commons/yaml_files/serviceAccount.yaml and commons/yaml_files/role_rolebinding.yaml file replace the following values:
- __SERVICE_ACCOUNT__ with the name of the service account that you want to create.
- __NAMESPACE__ with the BMC Helix Platform namespace.
- __SERVICE_ACCOUNT__ with the name of the service account that you want to create.
To create a service account, run the following command:
kubectl apply -f serviceAccount.yamlTo create role and rolebinding, run the following command:
kubectl apply -f role_rolebinding.yaml- When you set the CUSTOM_SERVICEACCOUNT_NAME parameter in the infra.config file, replace helix-onprem-sa value with the service account name that you created.
Task 1: To download and extract the deployment manager
- Log in to the controller or bastion machine from where the Kubernetes cluster is accessible.
- Download the deployment manager helix-on-prem-deployment-manager-23.4.00.sh from BMC Electronic Product Distribution (EPD) and extract it, if you haven't already.
- Download the helix-on-prem-deployment-manager-hotfix-23.4.00.001.tar.gz hotfix.
The Proactive problem management (PPM) module of BMC Helix ITSM Insights is unavailable if you use BMC Helix Service Management version 22.1.06 with BMC Helix Platform Common Services version 23.4.00 on an SSL-enabled restricted environment. The hotfix helix-on-prem-deployment-manager-hotfix-23.4.00.001.tar.gz contains a fix for this issue.
To download the files from EPD, see Downloading-the-installation-files. - Go to the directory where you downloaded the deployment manager from the EPD and give the execute permission to the helix-on-prem-deployment-manager-23.2.02.sh file.
Self-extract the deployment manager. Run the following command:
./helix-on-prem-deployment-manager-23.2.02.sh
cd helix-on-prem-deployment-manager
Task 2: To prepare for password encryption
- Go to the commons/certs directory and open the secrets.txt file.
Add the following passwords to this file:
Property
Description
Example
IMAGE_REGISTRY_PASSWORD
Password for the Docker registry.
5016adc4-993f-4fc5-8fb0-8ef6b02ca9d3
SMTP_PASSWORD
Password to connect to the SMTP server.
In the configs/infra.config file, if the value of the SMTP_AUTH parameter file is NONE, leave the SMTP_PASSWORD value blank as shown below:
SMTP_PASSWORD=""
password123
SMART_SYSTEM_PASSWORD
Password to connect to the BMC Discovery appliance.
password123
PG_PASSWD
Password to connect to the PostgreSQL database.
password123
KIBANA_PASSWORD
Password to connect to BMC Helix Logging (EFK).
kibana123
MINIO_ACCESS_KEY
Password to access MinIO.
admin
MINIO_SECRET_KEY
Password to connect to MinIO.
bmcAdm1n
ES_JKS_PASSWORD
Password to connect to Elasticsearch.
Important:
- If you are using a custom CA certificate, specify the password, else specify the value as ES_JKS_PASSWORD=""
- This password must have minimum seven characters.
""
Save the secrets.txt file
Sample secrets.txt file
# cat commons/certs/secrets.txt
#Please put the passwords in this file
IMAGE_REGISTRY_PASSWORD=password123
SMTP_PASSWORD=""
SMART_SYSTEM_PASSWORD=password123
PG_PASSWD=pGtest2020
KIBANA_PASSWORD=kibana123MINIO_ACCESS_KEY=adminMINIO_SECRET_KEY=bmcAdm1nES_JKS_PASSWORD=test@1234
################## End OF THE FILE ####################
Task 3: To install BMC Helix Platform Common Services
In the helix-on-prem-deployment-manager/configs/infra.config file, modify the following parameters that are environment-specific.
In the helix-on-prem-deployment-manager/configs/deployment.config file, modify the following parameters:
Parameter
Required value
Infra services options
DEPLOYMENT_SIZEitsmcompact or itsmsmall
If you are installing BMC Helix Platform Common Service in a nonproduction environment, specify the value as itsmcompact.
If you are installing BMC Helix Platform Common Service in a production environment, specify the value as itsmsmall.
BMC Helix Service Managementdoes not require BMC Helix Platform Common Services resources with deployment sizes such as medium or large. To optimize resources, the deployment sizes, itsmcompact and itsmsmall, are provided for BMC Helix Service Management installation. The itsmcompact size does not support high availability. Use itsmcompact for nonproduction environments. The itsmsmall size supports high availability, so use this size for production environments.
INFRAyes_PTPOSTGRESSyes_KAFKAyes_REDISyes_RSSOyes_ELASTICSEARCHyes_VICTORIAMETRICSyesImportant: If you are not using BMC Helix ITSM Insights, set this parameter to No.
_MINIOyesBMC Helix Dashboard services
HELIX_DASHBOARD_SERVICESyesBMC Helix ITSM Insights
(Optional)ITSMINSIGHT_SERVICES
yesIf you are not using BMC Helix ITSM Insights, set the ITSMINSIGHT_SERVICES and _VICTORIAMETRICS parameter values to No.
AR System services
ARSERVICESyesImportant: Make sure that you specify the value as yes. This option registers the BMC Helix Innovation Suite services in BMC Helix Platform.
BMC Helix Logging
BMC_HELIX_LOGGINGyesInstall the product by running the following command:
./deployment-manager.sh
After the BMC Helix Platform Common Service are deployed, the tenant administrator receives the following emails:
- An email with details about the BMC Helix Platform account
- An email to change the BMC Helix Platform account password at the first login
All installation logs are located in the following directory:
helix-on-prem-deployment-manager/logs
To apply the hotfix
The Proactive problem management (PPM) module of BMC Helix ITSM Insights is unavailable with BMC Helix Platform Common Services version 23.4.00 on an SSL-enabled restricted environment. To resolve this issue, you must apply the helix-on-prem-deployment-manager-hotfix-23.4.00.001.tar.gz hotfix.
If you are using a local repository for synchronizing your images with BMC DTR, make sure your local image repository has the following images:
- bmc.com/bmc/lp0lz:aif-core-service-f0261352-490
- bmc.com/bmc/lp0lz:aif-clustering-job-86b0d26-3847
- bmc.com/bmc/lp0lz:aif-job-manager-service-0f16b53-442
Perform the following steps to apply the hotfix:
- Log in to the controller from where the Kubernetes cluster is accessible.
To add permissions to get, list, watch, update, and patch the deployments aif-job-manager-service and aif-core-service, run the following command:
kubectl -n <namespace> patch role <CUSTOM_SERVICEACCOUNT_NAME>-role --type='json' -p='[{"op": "add", "path": "/rules/5/resourceNames/0", "value": "tas" }]'
kubectl -n <namespace> patch role <CUSTOM_SERVICEACCOUNT_NAME>-role --type='json' -p='[{"op": "add", "path": "/rules/5/resourceNames/1", "value": "aif-job-manager-service" }]'
kubectl -n <namespace> patch role <CUSTOM_SERVICEACCOUNT_NAME>-role --type='json' -p='[{"op": "add", "path": "/rules/5/resourceNames/2", "value": "aif-core-service" }]'Role name (<CUSTOM_SERVICEACCOUNT_NAME>) is the value that you set for the parameter CUSTOM_SERVICEACCOUNT_NAME in the configs/infra.config file.
To verify that the role is updated, run the following command:
kubectl -n <BMC Helix Platform namespace> get role <CUSTOM_SERVICEACCOUNT_NAME>-role -o jsonpath={.rules[5]}Sample output:
- apiGroups:
- apps
resourceNames:
- tas
- aif-job-manager-service <<<< this line should be present after patching the role.
- aif-core-service <<<< this line should be present after patching the role.
resources:
- deployments
verbs:
- get
- list
- watch
- update
- patch
~~~Extract the helix-on-prem-deployment-manager-hotfix-23.4.00.001.tar.gz to the workspace folder of 23.4.00, run the following command:
tar xvf helix-on-prem-deployment-manager-hotfix-23.4.00.001.tar.gz 3.Run the hotfix script hf_script.sh:
bash hf_script.sh < full path of the 23.4.00 platform common services directory >/helix-on-prem-deployment-managerFor example:
bash hf_script.sh /data/23.4.00/helix-on-prem-deployment-managerA copy of the directory helix-on-prem-deployment-manager gets created in the same path. In the example, a new directory /data/23.4.00/helix-on-prem-deployment-manager_HF1.YYYYMMDDHHMMSS gets created.
No changes are made to the original directory passed as a command line parameter.
Sample configuration files
Where to go from here
Next task | Proceed with Setting-up-the-installation-environment |
---|---|
Back to process | If you are finished setting up the installation environment, return to the appropriate installation, update, or upgrade process: |