RHEL 9
PHP 8.1 and MariaDB 10.5
subscription-manager repos --enable codeready-builder-for-rhel-9-x86_64-rpms
dnf install https://dl.fedoraproject.org/pub/epel/epel-release-latest-9.noarch.rpm
dnf install https://rpms.remirepo.net/enterprise/remi-release-9.rpm
dnf module switch-to php:remi-8.1
dnf module install php:remi-8.1
dnf install curl httpd perl-Compress-Zlib php php-gd php-ldap php-mysqlnd php-pecl-zip php-xml rpm-build policycoreutils haproxy perl php-json mariadb-server mariadb
rpm -i csi-7.6.1.29-0.el9.x86_64.php8.rpm
Create MySQL user. For more details, see Installing the Software Vulnerability Manager On-Premises Edition in Dual Mode.
At the time of instalaltionProcess.sh use the MySQL user which has created.
Note:Make sure that the password is set for the MySQL user.
After setting up DB, modify my.cnf
sql-mode="ERROR_FOR_DIVISION_BY_ZERO,NO_AUTO_CREATE_USER,NO_ENGINE_SUBSTITUTION"
Restart mariadb service
systemctl restart mariadb.service
After Software Vulnerability Manager is installed, run the command:
cd /usr/local/Secunia/csi/install
You can then execute the installer using the command:
./installationProcess.sh
When the installationProcess.sh is run, it will stop the httpd service, go through the installation/upgrade process, and Software Vulnerability Manager will be unavailable to Agents. Once the installation/upgrade process is complete, it will start the httpd service again.
Disable the sample SSL file and restart httpd to reflect your changes using the commands:
echo "" > /etc/httpd/conf.d/ssl.conf
systemctl restart httpd.service
If you answered yes to using SSL (HTTPS) during the installation, it is necessary to configure the firewall to accept incoming traffic on port 443 by issuing the following commands:
firewall-cmd --zone=public --add-service=https --permanent
firewall-cmd --reload
For further information regarding the setup of SSL, refer to SSL and LDAP Support.
If you answered no to using SSL (HTTPS) during the installation, it is necessary to configure the firewall to accept incoming traffic on port 80 by issuing the following commands:
firewall-cmd --zone=public --add-service=http --permanent
firewall-cmd --reload