If you do not have Internet access, then you can download the complete installation package and then configure the AppDefense Guest Module on the required guest Linux virtual machines (VM) pointing to the local repository.

Perform the steps as applicable for your Linux distribution. You must have administrator rights on the Linux VM.

Prerequisites

Procedure

  1. This step is a common step for any Linux distribution. Download and import the complete VMware package using the following URLs. Expand the repository using the unzip and untar command.
    https://appd-dl.vmware.com/repository/packages/appdefense.tar.gz
    https://appd-dl.vmware.com/repository/packages/guest-introspection-for-vmware-nsx.tar.gz
    https://appd-dl.vmware.com/repository/packages/guest-introspection-os-bundle.tar.gz
  2. For Ubuntu systems:
    1. Obtain and import the VMware packaging public keys using the following commands.
      curl -L file:/<Path to>/repository/appdefense/key/VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      
      apt-key add VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      file is the path where you saved the downloaded files.
    2. Create a file named appdefense.list under /etc/apt/sources.list.d.
    3. Create or edit /etc/sources.list/appdefense.list with the following contents.

      For Ubuntu 14.04:

       
      
      deb [arch=amd64] file:/<Path to>/repository/guest-introspection-os-bundle/ubuntu trusty main
      deb [arch=amd64] file:/<Path to>/repository/appdefense/latest/ubuntu trusty main 
      deb [arch=amd64] file:/<Path to>/repository/appdefense/latest/guest-introspection-for-vmware-nsx/ubuntu trusty main

      -Or-

      For Ubuntu 16.04:

      deb [arch=amd64] file:/<Path to>/repository/guest-introspection-os-bundle/ubuntu xenial main
      deb [arch=amd64] file:/<Path to>/repository/appdefense/latest/ubuntu trusty main 
      deb [arch=amd64] file:/<Path to>/repository/appdefense/latest/guest-introspection-for-vmware-nsx/ubuntu trusty main 
    4. Install the AppDefense Guest Module package using the following commands.
      apt-get update
      apt-get install vmw-glx
    Note: To upgrade or install a specific version, run the following command:
    apt-get install vmw-glx=<version> guest-introspection-for-vmware-nsx

    OR

    apt-get install --only-upgrade vmw-glx guest-introspection-for-vmware-nsx
  3. For RHEL systems:
    1. Obtain and import the VMware packaging public keys using the following commands.
      wget file:/<Path to>/repository/appdefense/key/VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      
      rpm --import VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      file is the path where you saved the downloaded files.
    2. Create a file named appdefense.repo under /etc/yum.repos.d.
    3. Edit the /etc/yum.repos.d/appdefense.repo file with the following contents:
        
      [repo-appdefense]
      name=AppDefense repo
      baseurl=file:/<Path to>/arepository/ppdefense/latest/
      enabled=1
      gpgcheck=1
      
      [guest-introspection-for-vmware-nsx]
      name=Guest Introspection for VMware NSX
      baseurl=file:/<Path to>/repository/guest-introspection-for-vmware-nsx/latest/rhel/x86_64/
      enabled=1
      gpgcheck=1
    4. For RHEL: To install a dependent component, add the following line in the appdefense.repo file created in the previous step c.
      
      [guest-introspection-os-bundle]
      
      name=Guest Introspection OS Bundle
      
      baseurl= file:/<Path to>/repository/guest-introspection-os-bundle/rhel/7.6/
      
      enabled=1
      
      gpgcheck=0
      
      
      Note: The baseurl parameter is represented as file:/ <Path to> /guest-introspection-os-bundle/rhel/<os_version>. The os_version can be RHEL version. For example, 7.6.
    5. Install the AppDefense Guest Module package using the following command.
      yum install vmw-glx
      Note: To upgrade or install a specific version, run the following command.
      • Clear the previous repository cache using the yum clean all command.
      • To install a specific version:
        yum install vmw-glx-<version> Guest-Introspection-for-VMware-NSX
      • To upgrade to the latest version:
        yum install vmw-glx Guest-Introspection-for-VMware-NSX
  4. For CentOS systems:
    1. Obtain and import the VMware packaging public keys using the following commands.
      wget file:/<Path to>/repository/appdefense/key/VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      
      rpm --import VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      file is the path where you saved the downloaded files.
    2. Create a file named appdefense.repo under /etc/yum.repos.d.
    3. Edit the /etc/yum.repos.d/appdefense.repo file with the following contents:
       
      [repo-appdefense]
      name=AppDefense repo
      baseurl=file:/<Path to>/repository/appdefense/latest/
      enabled=1
      gpgcheck=1
      
      [guest-introspection-for-vmware-nsx]
      name=Guest Introspection for VMware NSX
      baseurl=file:/<Path to>/repository/guest-introspection-for-vmware-nsx/latest/centos/x86_64/
      enabled=1
      gpgcheck=1
    4. For CentOS: To install a dependent component, add the following line in the appdefense.repo file created in the previous step c.
      
      [guest-introspection-os-bundle]
      
      name=Guest Introspection OS Bundle
      
      baseurl= file:/<Path to>/repository/guest-introspection-os-bundle/centos/7.6/
      
      enabled=1
      
      gpgcheck=0
      
      
      Note: The baseurl parameter is represented as file:/ <Path to> /guest-introspection-os-bundle/centos/<os_version>. The os_version can be CentOS version. For example, 7.6.
    5. Install the AppDefense Guest Module package using the following command.
      yum install vmw-glx Guest-Introspection-for-VMware-NSX
      Note: To upgrade or install a specific version, run the following command.
      • Clear the previous repository cache using the yum clean all command.
      • To install a specific version:
        yum install vmw-glx-<version> Guest-Introspection-for-VMware-NSX
      • To upgrade to the latest version:
        yum install vmw-glx Guest-Introspection-for-VMware-NSX
  5. For SLES systems:
    1. Obtain and import the VMware packaging public keys using the following commands.
      wget file:/<Path to>/repository/appdefense/key/VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      
      rpm --import VMWARE-APPD-PACKAGING-GPG-RSA-KEY.pub
      file is the path where you saved the downloaded files.
    2. Add the following repository.
       
      zypper ar "file:/<Path to>/repository/appdefense/latest/" appdefense
      
      zypper ar "file:/<Path to>/guest-introspection-for-vmware-nsx/latest/sles/x86_64/" guest-introspection-for-vmware-nsx
      file is the path where you saved the downloaded files.
    3. For SLES: To install a dependent component, add the following line in the appdefense.repo file created in the previous step b.
      zypper ar "file:/<Path to>/repository/guest-introspection-os-bundle/sles/12.3/"
      
      
      Note: The baseurl parameter is represented as file:/ <Path to> /guest-introspection-os-bundle/sles/<os_version>. The os_version can be SLES version. For example, 12.3.
    4. Install the AppDefense Guest Module package using the following command.
      zypper install vmw-glx
      Note: To upgrade or install a specific version, run the following commands.
      • Update repository using zypper refresh command.
      • Upgrade using following commands:
        zypper install vmw-glx-<version> Guest-Introspection-for-VMware-NSX 
        zypper update Guest-Introspection-for-VMware-NSX
  6. To verify if AppDefense Guest Module is installed, run the following command with the root privilege.
    /etc/init.d/vmw_glxd status
  7. To verify if the Guest Introspection is installed, run the following command with the root privilege.
    /etc/init.d/vmw_conn_notifyd status

Results

The status is running.

What to do next

If you are facing issues using the above steps to install or upgrade, you can use a script to perform all the install tasks for you. For details, refer to Issues with Linux Guest Module Install or Upgrade .