Product Readmes
Abstract
The IBM Counter Fraud Management (ICFM) 1.5.0.5 Virtual Machines (VMs) are distributed as five Open Virtualization Format (OVA) image files. These images comprise a set of pre-configured servers ready to deploy an environment of IBM Counter Fraud Management 1.5.0.5 with APAR PO05499 on an ESXi server (hypervisor for VMware).
Content
Quick links
- VM architecture and image details
- Importing the OVA files into a VMware ESXi server
- Initial startup and configuration of the IBM Counter Fraud Management 1.5.0.5 VMs
- System verification
- Post deployment
- Known issues
VM architecture and image details
Figure 1 depicts the contents of each image. (Click the image to enlarge it.)
Table 1 outlines the file names and descriptions required to deploy a complete ICFM 1.5.0.5 environment.
| Description | Server | File Name | File Size |
|---|---|---|---|
| IBM Counter Fraud Management Hypervisor DB 1.5.0.5 Linux | Data Node | CN7MKEN.ova | 39.8 GB |
| IBM Counter Fraud Management Hypervisor 1.5.0.5 Linux | Core Node | CN7MLEN.ova | 76.6 GB |
| IBM Counter Fraud Management Hypervisor CM 1.5.0.5 Linux | Case Node | CN7MPEN.ova | 89.4 GB |
| IBM Counter Fraud Management Hypervisor IDD V1.5.0.5 Linux | Investigate, Detect, and Discover Node (IDDN) | CN7MMEN.ova | 71.3 GB |
To deploy these images, the images must be imported into an ESXi server and then configured for the hosting environment. For instructions, see Importing the OVA files into a VMware ESXi server and Initial startup and configuration of the IBM Counter Fraud Management 1.5.0.5 VMs.
Importing the OVA files into a VMware ESXi server
Initial startup and configuration of the IBM Counter Fraud Management 1.5.0.5 VMs
To complete the next steps, fill in the environment specifics where these images will be deployed in Table 2.
| Data Node | Core Node | Case Node | Investigate, Detect, and Discover Node | |
|---|---|---|---|---|
| Server host name | data | core | case | lddn |
| LUKS password | default_luks_password | default_luks_password | default_luks_password | default_luks_password |
| Root password | ||||
| IP address | ||||
| Server Netmask | ||||
| Gateway IP | ||||
| Primary DNS Server | ||||
| Secondary DNS Server | ||||
| Tertiary DNS Server | ||||
| DNS Search Path | ||||
| /etc/hosts entries | Update only the entries highlighted in bold:
| |||
Instructions
For each of the Red Hat Enterprise Linux servers (data, core, case, iddn), follow these steps:
System verification
After the Linux servers are deployed, start the IBM Counter Fraud Management services in the sequential order listed. Before starting the next service, ensure that the previous service started successfully (in other words, wait for the current service to complete startup before starting the next service).
Post deployment
- Configuring Operational and Investigator reports
- Configuring Counter Fraud to use existing customer host names
Configuring Operational and Investigator reports
Reports are provided for IBM Counter Fraud Management. To report the auditing of Counter Fraud case data, follow these steps:
Results
Configuring Counter Fraud to use existing customer host names
Counter Fraud provides generic host names for the following nodes:
- data.icfm.ibm.com
- core.icfm.ibm.com
- case.icfm.ibm.com
- iddn.icfm.ibm.com
You must reconfigure Counter Fraud dashboards to work with a customer's actual host names. To do so, for each dashboard, you must update the URL to the reporting server to match a customer's environment. This procedure is performed when updating mapping services during the import of theCounter Fraud case management solution. However, you might need to change a URL value after import, or provide a missing value.
After you import the solution package, if you need to add a missing value (or update a URL), follow steps for the specific dashboard you wan to configure.
You can configure dashboard URLs during the import process, or manually configure using these instructions. To configure a dashboard URL:
Known issues
Known issues associated with the 1.5.0.5 VMs are documented below. As problems are discovered, relevant information and problem workarounds are added to this list.
This document was last updated: 02/01/2016
Related Information
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg27047242