Installing BMC Helix Platform Common services 25.2.00
The following video (3:23) provides a summary of installing BMC Helix Platform Common Services:
Before you begin
- Make sure that you have created a namespace to install BMC Helix Platform Common Services services.
Verify that nothing is installed in the namespace by using the following command:
kubectl get all -n <namespace>- Make sure that you have configured the nginx-configuration configmap.
For information about the nginx-configuration configmap parameter value requirements, see System-requirements. - Make sure that you have permission to create ServiceAccount, Role, and RoleBinding in the BMC Helix Platform namespace.
If you do not have permission, create a Service account, Role, and RoleBinding.
To create ServiceAccount, Role, and RoleBinding
To install BMC Helix Platform Common Services, you must have permission to create ServiceAccount, Role, and RoleBinding in the BMC Helix Platform namespace.
If you do not have permission, an administrator must perform the following steps to create a Service account, Role, and RoleBinding to enable you to install BMC Helix Platform Common Services:
- In the commons/yaml_files/serviceAccount.yaml and commons/yaml_files/role_rolebinding.yaml file replace the following values:
- __SERVICE_ACCOUNT__with the name of the service account that you want to create.
- __NAMESPACE__with the BMC Helix Platform namespace.
To create a service account, run the following command:
kubectl apply -f serviceAccount.yamlTo create role and rolebinding, run the following command:
kubectl apply -f role_rolebinding.yaml- When you set the CUSTOM_SERVICEACCOUNT_NAME parameter in the infra.config file, replace helix-onprem-sa value with the service account name that you created.
Task 1: To download and extract the deployment manager
- Log in to the controller or bastion machine from where the Kubernetes cluster is accessible.
- Download the deployment manager helix-on-prem-deployment-manager-25.2.00-70.sh from BMC Electronic Product Distribution (EPD) and extract it to a temporary directory, if you haven't already.
Download the deployment manager by selecting the BMC Helix Platform Common Services for Service Management Version 25.2.00 option. To download the files from EPD, see Downloading-the-installation-files. - Extract the BMC_Helix_PCS_for_Service_Management_Version_25.2.00.000.tar.gz file to the 25.2.00 workspace folder.
tar -xvf BMC_Helix_PCS_for_Service_Management_Version_25.2.00.000.tar.gz Run the following command to change the permission of the downloaded file:
chmod a+x helix-on-prem-deployment-manager-<release_version>.shTo extract the deployment manager, run the following command:
./helix-on-prem-deployment-manager-25.2.00-70
cd helix-on-prem-deployment-managerThe updated files will replace the affected files in the workspace directory.
Task 2: To prepare for password encryption
Go to the commons/certs directory and open the secrets.txt file.
Add the following passwords to this file and then save it:
Property Description IMAGE_REGISTRY_PASSWORD Password for the Docker registry.
Important: Do not use special characters in the password.
SMTP_PASSWORD Password to connect to the SMTP server.
In the configs/infra.config file, if the value of the SMTP_AUTH parameter file is NONE, leave the SMTP_PASSWORD value blank as shown:
SMTP_PASSWORD=""
Important: Do not use special characters in the password.
SMART_SYSTEM_PASSWORD Password to connect to BMC Discovery.
Important: Do not use special characters in the password.
KIBANA_PASSWORD Password to connect to Kibana.
Important: Do not use special characters in the password.
PG_PASSWD Password to connect to the PostgreSQL database.
Important: Do not use special characters in the password.
MINIO_ACCESS_KEY MinIO access key.
Any username can be set as an access key.
Important: Do not use special characters in the password.
MINIO_SECRET_KEY MinIO secret key.
Any password can be set as the secret key.
Important: Do not use special characters in the password.
ES_JKS_PASSWORD This password is used for the Keystore that is created when custom CA-signed certificates are used and mounted inside the Elasticsearch pods.
Important:
ES_JKS_PASSWORD is required only when you are using a Custom CA certificate, else keep the value as ES_JKS_PASSWORD="". This password must have a minimum of seven characters. Do not use special characters in the password.
LOG_ES_PASSWD (Optional) Starting with BMC Helix Platform Common Services version 24.3, applications will use a non-default user for Elasticsearch connections for Log Elasticsearch (Log ES).
To use a non-default password, change the default value of the LOG_ES_PASSWD parameter.
Important:
The password must meet the following requirements:
Must have a minimum of 8 characters. Must contain at least one uppercase letter [A–Z] and one lowercase letter [a–z]. Must contain at least one digit [0–9]. Must contain at least one special character. Must not end with a #. Must not contain 'admin' and 'bmcuser'.
Sample secrets.txt file:
#Please put the passwords in this file
IMAGE_REGISTRY_PASSWORD=Harbor12345
SMTP_PASSWORD=test123
SMART_SYSTEM_PASSWORD=bmcAdm1n
PG_PASSWD=pGTest2020
MINIO_ACCESS_KEY=admin
MINIO_SECRET_KEY=bmcAdm1n
# ES_JKS_PASSWORD is required only when you are using Custom CA certificate, else keep value as ES_JKS_PASSWORD=""
ES_JKS_PASSWORD=""
LOG_ES_PASSWD=Es_L0g#p@SS
Task 3: To install BMC Helix Platform Common Services
In the helix-on-prem-deployment-manager/configs/infra.config file, modify the following parameters that are environment-specific:
In the helix-on-prem-deployment-manager/configs/deployment.config file, modify the following parameters:
Parameter
Required value
Infra services options
DEPLOYMENT_SIZE itsmcompact, itsmsmall, or itsmxlarge
If you are installing BMC Helix Platform Common Service in a nonproduction environment, specify the value as itsmcompact.
If you are installing BMC Helix Platform Common Service in a production environment, specify the value as itsmsmall.
If you are installing BMC Helix Service Management extra large size, specify the value as itsmxlarge
BMC Helix Service Managementdoes not require BMC Helix Platform Common Services resources with deployment sizes such as medium or large. To optimize resources, the deployment sizes, itsmcompact and itsmsmall, are provided for BMC Helix Service Management installation. The itsmcompact size does not support high availability. Use itsmcompact for nonproduction environments. The itsmsmall size supports high availability, so use this size for production environments.
INFRA yes _PTPOSTGRESS yes _KAFKA yes _REDISCLUSTER yes _RSSO yes _ELASTICSEARCH yes _VICTORIAMETRICS yes Important: If you are not using BMC Helix ITSM Insights, set this parameter to No.
_MINIO yes BMC Helix Dashboard services
HELIX_DASHBOARD_SERVICES yes BMC Helix ITSM Insights
(Optional)ITSMINSIGHT_SERVICES
yes If you are not using BMC Helix ITSM Insights, set the ITSMINSIGHT_SERVICES and _VICTORIAMETRICS parameter values to No.
AR System services
ARSERVICES yes Important: Make sure that you specify the value as yes. This option registers the BMC Helix Innovation Suite services in BMC Helix Platform.
Install the product by running the following command:
./deployment-manager.shAfter the BMC Helix Platform Common Service are deployed, the tenant administrator receives the following emails:
-
- An email with details about the BMC Helix Platform account
- An email to change the BMC Helix Platform account password at the first login
All installation logs are located in the helix-on-prem-deployment-manager/logs directory.
-
Sample configuration files
Where to go from here
Next task | Proceed with Installing-BMC-Helix-Logging |
---|---|
Back to process | If you are finished setting up the installation environment, return to the appropriate installation, update, or upgrade process: |