Veritas Data Insight Installation Guide
- Understanding the Veritas Data Insight architecture
- About the Collector worker node
- About Veritas Data Insight installation tiers
- Preinstallation
- Installing Veritas Data Insight
- Upgrading Veritas Data Insight
- Post-installation configuration
- Installing Windows File Server agent
- Getting started with Data Insight
- Uninstalling Veritas Data Insight
- Appendix A. Installing Data Insight using response files
Enabling CA signed certificates for inter-node communication
If you want to opt for CA signed certificates, perform the following steps on the Management Server
- Create a backup of <Data_Dir>\keys\commd.keystore.
- Create a backup of <Install_Dir>\jre\lib\security\cacerts.
- Import CA Issued Certifcate file (pfx) to the commd keystore. There are separate commands for FIPS and non FIPS mode. Execute either one command as per your FIPS configuration status.
For FIPS Mode, execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore "C:\DataInsight\data\keys\commd_new.keystore" -srcalias <certificate Entry Name> -destalias tomcat -deststoretype bcfks -destkeypass changeit -provider com.safelogic.cryptocomply.jcajce.provider.CryptoComplyFipsProvider -providerpath "C:\Program Files\DataInsight\jre\lib\ext\ccj-3.0.1.jar"
For Non-FIPS Mode execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore "C:\DataInsight\data\keys\commd_new.keystore" -srcalias <certificate Entry Name> -destalias tomcat -deststoretype jks -destkeypass changeit
- Create a copy of <Install_Dir>\jre\lib\security\cacerts and rename the copy as <Install_Dir>\jre\lib\security\cacerts_new.
- You need to delete the self-signed certificate from the cacerts keystore by executing a command. There are separate commands for FIPS and non FIPS mode. Execute either one command as per your FIPS configuration status.
For FIPS Mode, execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -delete -alias tomcatTrustedCA -storepass changeit -keystore "C:\Program Files\DataInsight\jre\lib\security\cacerts_new" -storetype bcfks -provider com.safelogic.cryptocomply.jcajce.provider.CryptoComplyFipsProvider -providerpath "C:\ProgramFiles\DataInsight\jre\lib\ext\ccj-3.0.1.jar"
For Non-FIPS Mode execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -delete -alias tomcatTrustedCA -storepass changeit -keystore "C:\Program Files\DataInsight\jre\lib\security\cacerts_new"
To automatically copy the updated commd.keystore and cacerts from the Management Server to all remote Data Insight Nodes, perform the following steps:
- On the Management Server, execute the Batch Script available at <Install_Dir>\bin\certificate_operations.bat
- Press 1, which is Copy CA-Signed Certificate to all secondary nodes.
- Wait for the utility to complete copying of the Keystores and return to the main screen.
- Check if there are any failures reported by the utility. If any, follow the instructions on the screen to resolve it.
- Exit the utility.
- Restart all Data Insight services on the Management Server using Services.msc.
- After 10 minutes, log in to Data Insight and navigate to Settings-> Inventory-> Servers.
- Check the Health column of all the remote nodes. If it is green and servers are online, the updated keystore files have been copied successful.
- If any of the remote nodes appears offline, restart the DataInsightComm service from services.msc on the remote node.
To manually copy the updated commd.keystore and cacerts from the Management Server to all remote Data Insight nodes, perform the following steps on the Management Server.
- Rename <Data_Dir>\data\keys\commd_new.keystore to commd.keystore.
- Rename <Install_Dir>\jre\lib\security\cacerts_new to cacerts.
- Copy <Data_Dir>\keys\commd.keystore from the Management Server and paste it to the same location on all remote servers.
- Copy <Install_Dir>\jre\lib\security\cacerts from the Management Server.
For Windows remote servers, paste it to <Install_Dir>\jre\lib\security\cacerts.
For Linux remote servers, paste it to <Install_Dir>\jre\jre\lib\security\cacerts
- Restart all Data Insight services on the Management Server and all remote Data Insight nodes using services.msc.
- After 10 minutes, log in to Data Insight and navigate to Settings-> Inventory-> Servers.
- Check the Health column of all the remote nodes. If it is green and servers are online, the updated keystore files have been copied successful.
- If any of the remote nodes appears offline, restart the DataInsightComm service from services.msc on the remote node.
To apply the CA provided certificate to secure web portal communications, perform the following steps on the Management Server
Caution:
For signed certificate in .p7b format, See Generating Management Console certificate. and follow the steps given.
- Rename C:\DataInsight\data\keys\webserver.keystore to webserver-org.keystore.
- Import CA Issued Certifcate file (pfx) to the webserver.keystore.
- There are separate commands for FIPS and non FIPS mode. Execute either one command as per your FIPS configuration status.
For FIPS Mode, execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore "C:\DataInsight\data\keys\webserver.keystore" -srcalias <certificate Entry Name> -destalias tomcat -deststoretype bcfks -destkeypass changeit -provider com.safelogic.cryptocomply.jcajce.provider.CryptoComplyFipsProvider -providerpath "C:\Program Files\DataInsight\jre\lib\ext\ccj-3.0.1.jar"
For Non-FIPS Mode, execute the following command: "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore C:\DataInsight\data\keys\webserver.keystore -srcalias <certificate Entry Name> -destalias tomcat -deststoretype jks -destkeypass changeit
- Restart the DataInsightWebService on the Management Server.
To apply the CA provided certificate to secure Self Service portal communications, perform the following steps on the Server designated as the Self Service Portal
- Rename C:\DataInsight\data\keys\portal.keystore to portal-org.keystore.
- Import CA Issued Certifcate file (pfx) to the webserver portal. There are separate commands for FIPS and non FIPS mode. Execute either one command as per your FIPS configuration status.
For FIPS Mode, execute the following command "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore "C:\DataInsight\data\keys\portal.keystore" -srcalias <certificate Entry Name> -destalias tomcat -deststoretype bcfks -destkeypass changeit -provider com.safelogic.cryptocomply.jcajce.provider.CryptoComplyFipsProvider -providerpath "C:\Program Files\DataInsight\jre\lib\ext\ccj-3.0.1.jar"
For Non-FIPS Mode execute the following command "C:\Program Files\DataInsight\jre\bin\keytool.exe" -importkeystore -srckeystore "<Location of .pfx file>" -destkeystore C:\DataInsight\data\keys\portal.keystore -srcalias <certificate Entry Name> -destalias tomcat -deststoretype jks -destkeypass changeit
- Restart the DataInsightPortalService on the Server designated as the Self Service Portal.