News
Abstract
The IBM® Security Identity Governance and Intelligence virtual appliance can be
installed on a Kernel-based Virtual Machine (KVM).
The Identity Governance and Intelligence virtual appliance for KVM is distributed
as a preinstalled disk image of the virtual appliance in the .iso format.
To deploy the .iso virtual appliance image to KVM, use the KVM console.
Content
Hardware requirements
CPU speed - 3154 MHz
Disk space - 500 GB hard disk space
RAM - 64 GB system memory
Software requirements
- RHEL 7.0 64-bit operating system with enabled support for virtualization.
- A network bridge is required to set up network interface for the KVMs.
Installing the virtual appliance with KVM
Procedure
1. On you operating system command line, run the virt-manager command to
open the Virtual Machine Manager.
2. Click Create a New Virtual Machine.
3. On the wizard, enter a name for the virtual machine.
4. Select Local install media (ISO image or CDROM).
5. Click Forward.
6. Select Use ISO image and click Browse to select the product ISO file.
7. Select the operating system as Linux with Version Generic 2.6.x kernel.
8. Click Forward.
9. Enter the memory size. For example, 10240 MB.
10. Set the number of CPUs. For example, 8.
11. Click Forward.
12. Enter the disk size of the virtual machine. For example, 50 GB.
13. Click Forward.
14. Select the network bridge.
15. Select Customize configuration before install.
16. Click Finish.
17. Click Add Hardware.
18. Select Network.
19. Select the network bridge and click Finish.
20. Click Add Hardware again.
21. Select Network.
22. Select the network bridge and click Finish.
23. On the KVM console, follow the steps to complete the installation.
24. Press Enter after the disk partitioning and installation is complete. Wait for the
appliance login prompt to be displayed.
25. Provide the following user credentials when the system restarts.
- The Unconfigured login is admin.
- The Password is admin.
Set up the initial virtual appliance.
[{"Product":{"code":"SSGHJR","label":"IBM Security Identity Governance and Intelligence"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF004","label":"Appliance"}],"Version":"5.2.1","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]
Was this topic helpful?
Document Information
Modified date:
18 June 2018
UID
swg21987390