This topic provides guidance for installing Package Security Manager (On-prem) in an air-gapped environment.
To successfully install Package Security Manager in an air-gapped environment, you must have already prepared your environment according to the Air gap environment preparation instructions.
Obtain Package Security Manager installer location and your Package Security Manager license from your Anaconda representative before proceeding.
Download Package Security Manager:
Copy
Ask AI
# Replace <INSTALLER_LOCATION> with the provided installer URLcurl -O <INSTALLER_LOCATION>
Make it executable:
Copy
Ask AI
# Replace <INSTALLER> with the installer you just downloadedchmod +x <INSTALLER>
Run one of the following installation commands. Choose the command that corresponds with your setup:
Copy
Ask AI
# Replace <INSTALLER> with the installer you just downloaded# Replace <FQDN> with the fully qualified domain name of your Package Security Manager instancesudo bash <INSTALLER> --keep -- --domain <FQDN> --default-user anaconda --custom-cve-source file://opt/anaconda/repo/airgap/cve.zip 2>&1 | tee as.install.output
To include Grafana monitoring dashboards in your installation of Package Security Manager, add the following argument to your installation command:
Copy
Ask AI
--grafana-monitor-stack
Copy
Ask AI
# Replace <INSTALLER> with the installer you just downloaded# Replace <FQDN> with the fully qualified domain name of your Package Security Manager instancesudo bash <INSTALLER> --keep -- --domain <FQDN> --default-user anaconda --custom-cve-source file://opt/anaconda/repo/airgap/cve.zip 2>&1 | tee as.install.output
To include Grafana monitoring dashboards in your installation of Package Security Manager, add the following argument to your installation command:
Copy
Ask AI
--grafana-monitor-stack
If you are using TLS/SSL certificates, run this command to install Package Security Manager:
Copy
Ask AI
# Replace <INSTALLER> with the installer you just downloaded# Replace <FQDN> with the fully qualified domain name of your Package Security Manager instance# Replace <PATH_TO_CERT> with the path to your TLS/SSL cert# Replace <PATH_TO_KEY> with the path to your TLS/SSL keysudo bash <INSTALLER> --keep -- --domain <FQDN> --tls-cert <PATH_TO_CERT> --tls-key <PATH_TO_KEY> --default-user anaconda --custom-cve-source file://opt/anaconda/repo/airgap/cve.zip 2>&1 | tee as.install.output
To include Grafana monitoring dashboards in your installation of Package Security Manager, add the following argument to your installation command:
Copy
Ask AI
--grafana-monitor-stack
You must be using Postgres version 9.6 or later and Redis version 6.0 or later.
Copy
Ask AI
# Replace `<INSTALLER>` with the installer file you just downloaded# Replace `<FQDN>` with the fully qualified domain name of your Package Security Manager instance# Replace `<PATH_TO_CERT>` with the path to your TLS/SSL cert# Replace `<PATH_TO_KEY>` with the path to your TLS/SSL key# Replace `<EXTERNAL_PS/RD_INSTANCE_IP4>` with your external instance IP4 address (in both locations)# Replace `<ASSIGNED_PORT>` with the port used for communication# Replace `<POSTGRES_USERID>` with your postgres user ID# Replace `<POSTGRES_PASSWORD>` with your postgres passwordchmod +x `<INSTALLER>`bash `<INSTALLER>` --keep -- --domain `<FQDN>` --tls-cert `<PATH_TO_CERT>` --tls-key `<PATH_TO_KEY>` -e redis://`<EXTERNAL_PS/RD_INSTANCE_IP4>` -h `<EXTERNAL_PS/RD_INSTANCE_IP4>` -p `<ASSIGNED_PORT>` -u `<POSTGRES_USERID>` -pw `<POSTGRES_PASSWORD>` --default-user --custom-cve-source file://opt/anaconda/repo/airgap/cve.zip anaconda -y 2>&1 | tee as.install.output
To include Grafana monitoring dashboards in your installation of Package Security Manager, add the following argument to your installation command:
Copy
Ask AI
--grafana-monitor-stack
The installation process creates three distinct user profiles: one for administrating Package Security Manager, one for administrating Keycloak, and one for accessing Prometheus. Login credentials for these profiles are shown during the installer output. Use these credentials for your initial logins, and update them as soon as possible.
In a standard installation, Package Security Manager points to a web URL that contains artifacts for your users to view or download. However, on an air-gapped network, you’ll need to provide network directory folder locations for Package Security Manager to look in when searching for artifacts, and populate those folders with artifacts.
The .zip files you downloaded during environment preparation will be the source of your packages for Package Security Manager. Choose a set of commands that correlate with the files you downloaded during environment preparation to move the files to their correct folder location:
Open your Package Security Manager installation directory.
Copy
Ask AI
# Replace <INSTALLER> with your installation directorycd <INSTALLER>
Stop Package Security Manager by running the following command:
Copy
Ask AI
docker compose down
Move your airgap .zip files to the correct locations by running the following commands. Choose a set of commands that correlates with your setup:
Save your work and close the file, then apply your changes to Package Security Manager by running the following:
Copy
Ask AI
docker compose up -d
Monitor the status of your instance by running the following command:
Copy
Ask AI
docker ps
Once the containers are healthy and running, access your instance of Package Security Manager by navigating to https:://<FQDN>.example.com and complete your installation by entering your license.
Because air-gapped users do not have access to the internet, Anaconda provides Miniconda installers for your company’s use through Package Security Manager.
Download a valid installers.zip file from the s3 bucket: