RHEL 9

PHP 8.1 and MariaDB 10.5

subscription-manager repos --enable codeready-builder-for-rhel-9-x86_64-rpms

dnf install https://dl.fedoraproject.org/pub/epel/epel-release-latest-9.noarch.rpm

dnf install https://rpms.remirepo.net/enterprise/remi-release-9.rpm

dnf module switch-to php:remi-8.1

dnf module install php:remi-8.1

dnf install curl httpd perl-Compress-Zlib php php-gd php-ldap php-mysqlnd php-pecl-zip php-xml rpm-build policycoreutils haproxy perl php-json mariadb-server mariadb 

rpm -i csi-7.6.1.29-0.el9.x86_64.php8.rpm

Create MySQL user. For more details, see Installing the Software Vulnerability Manager On-Premises Edition in Dual Mode.

At the time of instalaltionProcess.sh use the MySQL user which has created.

Note:Make sure that the password is set for the MySQL user.

After setting up DB, modify my.cnf

sql-mode="ERROR_FOR_DIVISION_BY_ZERO,NO_AUTO_CREATE_USER,NO_ENGINE_SUBSTITUTION"

Restart mariadb service

systemctl restart mariadb.service

After Software Vulnerability Manager is installed, run the command:

cd /usr/local/Secunia/csi/install

You can then execute the installer using the command:

./installationProcess.sh

When the installationProcess.sh is run, it will stop the httpd service, go through the installation/upgrade process, and Software Vulnerability Manager will be unavailable to Agents. Once the installation/upgrade process is complete, it will start the httpd service again.

Disable the sample SSL file and restart httpd to reflect your changes using the commands:

echo "" > /etc/httpd/conf.d/ssl.conf

systemctl restart httpd.service

If you answered yes to using SSL (HTTPS) during the installation, it is necessary to configure the firewall to accept incoming traffic on port 443 by issuing the following commands:

firewall-cmd --zone=public --add-service=https --permanent

firewall-cmd --reload

For further information regarding the setup of SSL, refer to SSL and LDAP Support.

If you answered no to using SSL (HTTPS) during the installation, it is necessary to configure the firewall to accept incoming traffic on port 80 by issuing the following commands:

firewall-cmd --zone=public --add-service=http --permanent

firewall-cmd --reload