Deploy the WebSphere® Message Broker Hypervisor Edition virtual machine image
on a VMware ESXi hypervisor, when using
a Linux system without the IBM® Hardware
Appliances. As part of the deployment,
you must load the virtual machine image on a hypervisor and configure
both the operating system and the virtual machine image.
Before you begin
Ensure that a VMware ESXi hypervisor is available.
Procedure
To deploy the WebSphere Message Broker Hypervisor Edition virtual machine image,
complete the following steps:
- Download the WebSphere Message Broker Hypervisor Edition package from Passport Advantage® to
your local machine.
- Load the WebSphere Message Broker Hypervisor Edition virtual machine image
on the target VMware ESXi hypervisor as follows:
- Extract the package into an empty directory. The package
is supplied as a tar file that has been compressed
into GNU compressed file format. The package can be extracted using
the tar command with the -z (gzip) option. Use tar version
1.20 or higher.
- From the VMware vSphere
Client, select the Summary tab. In the Datastore
panel, right-click the datastore in which you want to store the virtual
machine image, and select Browse Datastore from
the menu.
- Using the Datastore Browser, create a directory in which
to store the virtual machine image and then either upload the entire
directory or upload the following individual files:
os.vmdk
os-flat.vmdk
app.vmdk
app-flat.vmdk
wmbhve.vmx
Note: The Datastore Browser does not show the
files os-flat.vmdk and app-flat.vmdk by
default because it represents them as being part of os.vmdk and app.vmdk.
- Register the virtual image on the hypervisor. In the
Datastore Browser, right-click the file wmbhve.vmx and
select Add to inventory, which starts a wizard.
- Enter a name for the virtual machine image and select Next.
- Select the Resource Pool in which to run the virtual
machine and then select Next.
- Check that the virtual machine options are correct and
select Finish.
- Configure the network settings:
- In the Inventory, right-click the virtual machine which
has been added, and select Edit Settings from
the menu.
- Select Network Adapter 1 in the
hardware panel. In the Network Connection panel, select the network
to which the virtual machine will connect from the Network label pull-down
menu.
- Click OK.
- Select the virtual machine in the Inventory and click the Power
On button in the toolbar. Navigate to the Console tab
to open the virtual machine console.
Note: If a pop-up
window appears asking whether the virtual machine image has been moved
or copied, select "I copied it" and click OK.
- Log in to the operating system by using the default root
credentials. The user name is root and the password
is password. The client presents the language selection
screen.
- Specify the language that you want, click OK and
press Enter. The license screen opens.
- Review and accept all license agreements for Red Hat Linux and WebSphere products to proceed with installing
the virtual machine image. After you accept the license agreements,
the network screen opens.
- Specify the type of network protocol you want to use:
Note: If you plan to use multiple virtual machines, ensure that
the network is properly configured between the machines.
- Select the appropriate network protocol. The virtual
machine image supports both static addressing and Dynamic Host Configuration
Protocol (DHCP) addressing.
- If you are using DHCP, enter values for the Host name
and Domain fields.
- If you are using static addressing, enter values for
the IP address and Subnet mask fields. Optionally, enter values for
the Default gateway and DNS server fields. The value for the DNS server
must be an IP address.
- Click OK and press Enter.
Confirm the network settings by selecting Yes and
press Enter.
The Password Configuration screen opens and prompts you
to specify passwords.
- Enter and confirm a password for the root user.
The password should be changed from the default value.
- Enter and confirm a password for the virtuser user.
This user is the default non-root user for the installation.
Results
The system then continues with the boot sequence. The values
that have been entered are saved and do not need to be entered again.
The operating system configuration is now complete.