Skip to content

Commit 088082a

Browse files
committed
add mms prod quickstart front end; add kill-mp-web-installer
1 parent 29b7ed6 commit 088082a

File tree

3 files changed

+264
-0
lines changed

3 files changed

+264
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
#!/bin/bash
2+
sed -i "s|/opt/trend/dsm_app/start.sh &||g" /etc/rc.local
3+
sed -i "s|/opt/trend/dsm_app/start.sh &||g" /etc/rc.d/rc.local
4+
for pid in $(ps -ef | grep "/opt/trend/dsm_app/start.sh" | awk '{print $2}'); do kill -9 $pid; done
5+
kill -9 $(sudo netstat -plnt | grep :8080 | grep python | grep -oP '(\d*)\/python' | grep -oP '(\d*)')

DeepSecurity/DeepSecurity.cfproj

+6
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@
5454
<Compile Include="Quickstart\TMQuickStartBYOL.template">
5555
<SubType>Code</SubType>
5656
</Compile>
57+
<Compile Include="Quickstart\TMQuickStartMMS.template">
58+
<SubType>Code</SubType>
59+
</Compile>
5760
<Compile Include="Quickstart\TMQuickStartPocMMS.template">
5861
<SubType>Code</SubType>
5962
</Compile>
@@ -86,6 +89,9 @@
8689
<Content Include="Common\helpers\createCloudAccount">
8790
<SubType>Content</SubType>
8891
</Content>
92+
<Content Include="Common\helpers\kill-mp-web-installer">
93+
<SubType>Content</SubType>
94+
</Content>
8995
<Content Include="Common\helpers\reactivate-manager">
9096
<SubType>Content</SubType>
9197
</Content>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,253 @@
1+
{
2+
"AWSTemplateFormatVersion" : "2010-09-09",
3+
"Description" : "v2 Quick Start that deploys Trend Micro Deep Security into an exisintg VPC with a Multi-AZ Oracle RDS instance **WARNING** This template uses images from the AWS Marketplace and an active subscription is required - Please see the Quick Start documentation for more details. You will be billed for the AWS resources used if you create a stack from this template.",
4+
"Metadata" : {
5+
"AWS::CloudFormation::Interface" : {
6+
"ParameterGroups" : [
7+
{
8+
"Label" : { "default" : "Deep Security Manager Configuration" },
9+
"Parameters" : [ "DeepSecurityAdminName", "DeepSecurityAdminPass", "AWSKeyPairName", "ProtectedInstances" ]
10+
},
11+
{
12+
"Label" : { "default" : "Network Configuration" },
13+
"Parameters" : [ "AWSVPC", "DeepSecuritySubnet", "DatabaseSubnet1", "DatabaseSubnet2" ]
14+
}
15+
16+
],
17+
"ParameterLabels" : {
18+
"AWSIKeyPairName" : { "default" : "EC2 Key Pair for SSH access" },
19+
"AWSVPC" : { "default" : "VPC for Deep Security Components" },
20+
"DeepSecuritySubnet" : { "default" : "Public Subnet for Deep Security Managers" },
21+
"DeepSecurityAdminName" : { "default" : "Administrator username for Deep Security" },
22+
"DeepSecurityAdminPass" : { "default" : "Administrator password for Deep Security" },
23+
"DatabaseSubnet1" : { "default" : "Primary private subnet for RDS" },
24+
"DatabaseSubnet2" : { "default" : "Secondary private subnet for RDS" },
25+
"ProtectedInstances" : { "default" : "Number of instances you expect to protect with Deep Security Agents" }
26+
}
27+
}
28+
},
29+
"Parameters" : {
30+
"AWSKeyPairName" : {
31+
"Description" : "Select an existing key pair to use for connecting to your Deep Security Manager Instance.",
32+
"Type" : "AWS::EC2::KeyPair::KeyName",
33+
"MinLength" : "1",
34+
"MaxLength" : "255",
35+
"AllowedPattern" : "[-_a-zA-Z0-9]*",
36+
"ConstraintDescription" : "Select an existing EC2 Key Pair."
37+
},
38+
"AWSVPC" : {
39+
"Description" : "Select an existing VPC to deploy Deep Security Manager.",
40+
"Type" : "AWS::EC2::VPC::Id",
41+
"MinLength" : "1",
42+
"MaxLength" : "255",
43+
"AllowedPattern" : "[-_a-zA-Z0-9]*"
44+
},
45+
"DatabaseSubnet1" : {
46+
"Description" : "Select a private subnet for the RDS database. Must be a private subnet contained the in VPC chosen above.",
47+
"Type" : "AWS::EC2::Subnet::Id",
48+
"ConstraintDescription" : "RDS Subnet Groups must be comprised of 2 subnets in seperate availability zones within the specified VPC for deploying this template"
49+
},
50+
"DatabaseSubnet2" : {
51+
"Description" : "Select a second private subnet for the RDS database. Must be a private subnet contained the in VPC chosen above.",
52+
"Type" : "AWS::EC2::Subnet::Id",
53+
"ConstraintDescription" : "RDS Subnet Groups must be comprised of 2 subnets in seperate availability zones within the specified VPC for deploying this template"
54+
},
55+
"DeepSecuritySubnet" : {
56+
"Description" : "Select an existing Subnet for Deep Seucurity Manager. Must be a public subnet contained the in VPC chosen above.",
57+
"Type" : "AWS::EC2::Subnet::Id",
58+
"MinLength" : "1",
59+
"MaxLength" : "255",
60+
"AllowedPattern" : "[-_a-zA-Z0-9]*",
61+
"ConstraintDescription" : "Subnet ID must exist in the chosen VPC"
62+
},
63+
"DeepSecurityAdminName" : {
64+
"Default" : "MasterAdmin",
65+
"NoEcho" : false,
66+
"Description" : "The Deep Security Manager administrator username for Web Console Access.",
67+
"Type" : "String",
68+
"MinLength" : 1,
69+
"MaxLength" : 16,
70+
"AllowedPattern" : "[a-zA-Z][a-zA-Z0-9]*",
71+
"ConstraintDescription" : "Must begin with a letter and contain only alphanumeric characters. Min length 1, max length 16"
72+
},
73+
"DeepSecurityAdminPass" : {
74+
"NoEcho" : true,
75+
"Description" : "The Deep Security Manager administrator password. Must be 8-41 characters long and can only contain alphanumeric characters or the following special characters !^*-_+",
76+
"Type" : "String",
77+
"MinLength" : 8,
78+
"MaxLength" : 41,
79+
"AllowedPattern" : "[a-zA-Z0-9!^*\\-_+]*",
80+
"ConstraintDescription" : "Can only contain alphanumeric characters or the following special characters !^*-_+ Min length 8, max length 41"
81+
},
82+
"ProtectedInstances" : {
83+
"Description" : "Select how many instances would you like to protect.",
84+
"Type" : "String",
85+
"AllowedValues" : [
86+
"1-100",
87+
"101-500",
88+
"501-1000"
89+
]
90+
}
91+
},
92+
"Mappings" : {
93+
"DSMSIZE" : {
94+
"us-east-1" : {
95+
"MMS" : "c3.xlarge"
96+
},
97+
"us-west-1" : {
98+
"MMS" : "c3.xlarge"
99+
},
100+
"us-west-2" : {
101+
"MMS" : "c3.xlarge"
102+
},
103+
"eu-west-1" : {
104+
"MMS" : "c3.xlarge"
105+
},
106+
"eu-central-1" : {
107+
"MMS" : "c3.xlarge"
108+
},
109+
"sa-east-1" : {
110+
"MMS" : "c3.xlarge"
111+
},
112+
"ap-northeast-1" : {
113+
"MMS" : "c3.xlarge"
114+
},
115+
"ap-southeast-1" : {
116+
"MMS" : "c3.xlarge"
117+
},
118+
"ap-southeast-2" : {
119+
"MMS" : "c3.xlarge"
120+
},
121+
"ap-northeast-2" : {
122+
"MMS" : "m4.xlarge"
123+
}
124+
},
125+
"RDSStorageSize" : {
126+
"1-100" : {
127+
"Size" : "75"
128+
},
129+
"101-500" : {
130+
"Size" : "200"
131+
},
132+
"501-1000" : {
133+
"Size" : "300"
134+
}
135+
},
136+
"RDSInstanceSize" : {
137+
"us-east-1" : {
138+
"Oracle" : "db.m4.large"
139+
},
140+
"us-west-1" : {
141+
"Oracle" : "db.m4.large"
142+
},
143+
"us-west-2" : {
144+
"Oracle" : "db.m4.large"
145+
},
146+
"eu-west-1" : {
147+
"Oracle" : "db.m4.large"
148+
},
149+
"eu-central-1" : {
150+
"Oracle" : "db.m4.large"
151+
},
152+
"sa-east-1" : {
153+
"Oracle" : "db.m3.large"
154+
},
155+
"ap-northeast-1" : {
156+
"Oracle" : "db.m4.large"
157+
},
158+
"ap-southeast-1" : {
159+
"Oracle" : "db.m4.large"
160+
},
161+
"ap-southeast-2" : {
162+
"Oracle" : "db.m3.large"
163+
},
164+
"ap-northeast-2" : {
165+
"Oracle" : "db.m4.large"
166+
}
167+
}
168+
},
169+
"Resources" : {
170+
"MasterMP96" : {
171+
"Type" : "AWS::CloudFormation::Stack",
172+
"Properties" : {
173+
"TemplateURL" : "https://s3.amazonaws.com/cf-deepsecurity/96/v0.6/MP/MasterMP96.template",
174+
"Parameters" : {
175+
"AWSIKeyPairName" : {
176+
"Ref" : "AWSKeyPairName"
177+
},
178+
"AWSIVPC" : {
179+
"Ref" : "AWSVPC"
180+
},
181+
"DSISubnetID" : {
182+
"Ref" : "DeepSecuritySubnet"
183+
},
184+
"DBIRDSInstanceSize" : {
185+
"Fn::FindInMap" : [
186+
"RDSInstanceSize",
187+
{
188+
"Ref" : "AWS::Region"
189+
},
190+
"Oracle"
191+
]
192+
},
193+
"DBIStorageAllocation" : {
194+
"Fn::FindInMap" : [
195+
"RDSStorageSize",
196+
{
197+
"Ref" : "ProtectedInstances"
198+
},
199+
"Size"
200+
]
201+
},
202+
"DBPBackupDays" : "5",
203+
"DBPCreateDbInstance" : "Yes" ,
204+
"DBICAdminName" : "dsmadmin",
205+
"DBICAdminPassword" : {
206+
"Ref" : "DeepSecurityAdminPass"
207+
},
208+
"DBPEngine" : "Oracle",
209+
"DBPEndpoint" : "" ,
210+
"DBPName" :"dsm",
211+
"DSCAdminName" : {
212+
"Ref" : "DeepSecurityAdminName"
213+
},
214+
"DSCAdminPassword" : {
215+
"Ref" : "DeepSecurityAdminPass"
216+
},
217+
"DSIMultiNode" : "2" ,
218+
"DSIPLicenseKey" : "XX-XXXX-XXXXX-XXXXX-XXXXX-XXXXX-XXXXX",
219+
"DSIPHeartbeatPort" : "4120",
220+
"DSIPGUIPort" : "443",
221+
"DSIPInstanceType" : {
222+
"Fn::FindInMap" : [
223+
"DSMSIZE",
224+
{
225+
"Ref" : "AWS::Region"
226+
},
227+
"MMS"
228+
]
229+
},
230+
"DBISubnet1" : {
231+
"Ref" : "DatabaseSubnet1"
232+
},
233+
"DBISubnet2" : {
234+
"Ref" : "DatabaseSubnet2"
235+
},
236+
"DBIInstanceIdentifier" : "deep-security",
237+
"DSIPLicense" : "MMS",
238+
"DBPMultiAZ": "true"
239+
}
240+
}
241+
}
242+
},
243+
"Outputs" : {
244+
"DeepSecurityConsole" : {
245+
"Value" : {
246+
"Fn::GetAtt" : [
247+
"MasterMP96",
248+
"Outputs.DeepSecurityConsole"
249+
]
250+
}
251+
}
252+
}
253+
}

0 commit comments

Comments
 (0)