Create rsyslog client certificate for the GREP11 Server¶
Overview of this section¶
In the last section you created the following:
- self-signed CA for the rsyslog service
- server certificate for the rsyslog service
In this section you will use your self-signed CA (1 above) to create:
- client certificate for your (not-yet-created) HPVS 2.1.x GREP11 Server
Your GREP11 Server will be a client to the rsyslog service. (It serves clients who want to make GREP11 requests, but for logging it is a client to the rsyslog service).
Please read the instructions carefully
You'll be switching between both of your userids in this section:
- your studentnn userid on the RHEL host where nn is unique to you and between 01 and 20
- your student userid on your Ubuntu KVM guest
We'll do our part by telling you when to switch. Please do your part by reading the instructions carefully!
If necessary, log in to the RHEL host¶
If you are following the lab in order in one sitting, you are already logged in and have switched to the correct terminal tab and window, the one that looks like this:
But if you need to log in for any reason, the command is ssh -l ${StudentID} 192.168.22.64
Create certificate for client access to rsyslog¶
Steps 1 through 5 will be performed on the RHEL host.
-
Create a working directory and switch to it:
mkdir -p ~/grep11Lab/x509Work/rsyslogClient && \ cd ~/grep11Lab/x509Work/rsyslogClient
-
Create a new private key:
openssl genrsa -out client-key.pem 4096
Example output when creating RSA private key
Generating RSA private key, 4096 bit long modulus (2 primes) ..++++ ................................................................................++++ e is 65537 (0x010001)
You should see output similar to what is shown above on the RHEL 8.5 host. This same command was very quiet on your Ubuntu KVM guest.
-
Create a configuration file:
cat << EOF > client.cnf [ req ] default_bits = 2048 default_md = sha256 prompt = no encrypt_key = no distinguished_name = dn [ dn ] C = US O = IBM WSC IBM Z and LinuxONE CN = SE-enabled HPVS 2.1.x Grep11 Server EOF
-
Create a certificate signing request (CSR):
openssl req \ -config client.cnf \ -key client-key.pem \ -new \ -out grep11Lab-client-req.csr
-
Now you are going to use a pattern that is similar to a real-world pattern:
You are going to send your CSR, which you just created on the RHEL host, to the Rsyslog CA which you created on your Ubuntu KVM guest:
scp grep11Lab-client-req.csr \ student@${StudentGuestIP}:./x509Work/rsyslog/clients/.
Example output when sending file
grep11Lab-client-req.csr 100% 1691 9.2MB/s 00:00
-
Switch to your terminal tab or window for your KVM Ubuntu guest. Yes, this one:
-
If you are doing the lab in one sitting, in order, then you are already logged in. If you need to login for any reason the command is
ssh -p ${Student_SSH_Port} -l student 192.168.22.64
. Steps 8 through 12 will be performed on your Ubuntu KVM guest. -
You are now the CA registrar. Switch to your working directory and find the certificate signing request(CSR) that your customer (i.e., you) sent to you.
cd ${HOME}/x509Work/rsyslog/clients \ && ls -l grep11Lab-client*.csr
Make sure your csr is listed
-rw-r--r-- 1 student student 1691 Feb 14 01:47 grep11Lab-client-req.csr
-
You will do your due diligence and check the contents of the CSR:
openssl req -noout -text \ -in grep11Lab-client-req.csr
Example human-readable display of CSR
Certificate Request: Data: Version: 1 (0x0) Subject: C = US, O = IBM WSC IBM Z and LinuxONE, CN = SE-enabled HPVS 2.1.x Grep11 Server Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (4096 bit) Modulus: 00:b0:38:b1:27:ee:a2:9f:35:10:dd:74:b2:46:e6: b8:2a:e4:c9:7f:7d:b3:1d:45:96:7d:bc:9d:5a:90: 06:64:da:b8:23:73:f3:99:46:54:a3:2a:a8:8e:db: 10:96:7e:de:04:65:81:ee:68:f1:5e:4d:a1:3d:db: 2e:44:3a:ff:e2:fe:60:86:ad:90:b9:91:f1:4b:94: c9:43:4a:85:56:32:2a:ab:c9:2a:71:de:b7:fc:40: e2:1b:aa:17:08:3a:65:4a:b8:70:d8:5c:b4:b6:ca: 4f:8d:a1:d0:03:04:20:4e:7e:23:26:20:85:45:e4: 21:ec:bb:f8:38:64:36:6d:7c:a1:8a:d8:af:14:1b: 72:bf:e8:cd:2f:2d:2c:0b:5a:39:4e:53:41:f8:a0: 33:91:be:90:64:18:1c:cf:c2:d9:a0:bf:78:db:88: 19:6b:be:0c:10:76:fc:96:fb:01:14:f5:90:8a:4d: a8:0c:0b:10:29:1d:fb:45:e1:f2:59:b5:33:e5:20: f8:76:22:c8:4d:d1:55:dc:de:10:79:66:b8:ff:fa: ee:e4:03:a5:77:9d:50:a1:f2:60:35:84:e1:44:ef: f4:be:be:a9:1b:17:5e:26:4a:ea:24:7d:ff:80:d2: d6:95:4f:1b:b6:5e:22:c6:f2:81:17:bb:fe:ce:f6: 44:29:79:4e:ad:76:04:db:a7:8d:a4:db:8c:e3:cd: bf:48:37:99:4c:1c:e0:26:0f:9f:8b:a4:1f:48:71: 44:d0:5f:ae:c6:93:83:ab:b8:7b:7b:b8:f3:1d:f1: 7d:34:3b:d5:32:f0:74:d9:ee:0b:cd:e7:a9:54:49: 2b:23:dc:1a:57:ae:a3:03:d8:9c:47:14:75:0c:47: c6:be:e3:84:61:e7:15:b8:fe:0b:5f:53:a0:f6:a8: 92:e4:2c:c9:51:43:de:3f:be:0f:a6:c7:44:1f:81: c9:c0:9d:d3:3a:42:2f:b0:52:59:47:c6:da:96:93: ba:e7:11:f4:dd:ba:75:46:86:b5:ef:ee:49:34:92: 36:03:32:00:99:71:ed:83:1a:cd:3f:e3:79:7b:ee: 04:49:59:aa:01:ce:4d:67:0e:0f:88:e6:62:82:1e: 0b:07:01:cf:74:38:20:7b:0d:69:f5:2e:09:e5:84: 20:f3:82:15:7f:a4:0d:ae:35:da:de:f2:a9:30:6e: 3e:e3:72:26:b3:18:10:6c:d7:df:4c:fc:bf:e3:33: 8c:c6:e3:83:04:db:c9:a9:a8:41:d2:97:be:a0:ec: bd:f1:89:18:eb:c5:e7:0b:fc:47:30:c8:e1:cd:e6: 54:cd:f1:e7:c3:23:51:48:4f:fd:89:49:43:6d:96: e0:cc:69 Exponent: 65537 (0x10001) Attributes: (none) Requested Extensions: Signature Algorithm: sha256WithRSAEncryption Signature Value: 8d:0b:7b:fd:eb:6b:04:85:4f:b6:a8:81:8f:03:77:aa:26:7d: 58:44:3a:af:1b:de:fe:73:52:38:7c:8b:e9:2d:47:34:93:31: 9d:04:0b:08:3a:3c:92:72:cf:60:c6:3b:83:6c:9a:8d:7b:08: 4b:13:44:8b:3c:14:58:f7:b6:26:8c:c8:d5:29:f7:f8:fb:98: a6:9f:78:6a:9a:f4:10:88:16:55:b8:83:ee:7d:1b:95:4c:02: 77:10:9c:ca:61:01:c7:33:7f:65:81:6e:5e:18:25:a7:68:26: e0:5e:b5:6d:89:00:31:ed:21:bf:32:c8:13:4b:00:c6:a3:b5: 5f:4d:13:4c:86:51:31:59:02:92:fd:88:30:3a:1f:ac:da:8b: 82:25:b2:3d:7e:1d:1f:e3:55:aa:7a:26:1f:85:b6:86:87:34: 9a:36:5e:55:0b:a9:6b:dd:77:56:4f:54:3e:27:ec:ac:a7:aa: ea:bb:86:40:a2:e8:af:88:77:5b:41:ec:42:0f:06:1e:7a:36: 85:5f:36:14:d4:02:30:3c:27:8d:85:61:0c:93:83:a0:0d:cd: e7:c3:ac:02:d9:49:2e:58:a5:a1:24:33:56:a6:6c:e1:dc:dc: 5b:11:32:65:84:08:70:7e:b2:52:2f:34:5e:83:46:45:8e:91: dc:4a:2d:31:2d:3e:3a:4a:03:a2:c4:02:d9:7f:6a:89:42:10: da:a4:7a:24:c2:2a:b5:fb:25:c8:1b:45:5f:f1:85:91:ca:0a: 44:74:8f:60:44:86:e5:49:ab:d9:d1:d8:fa:0c:6d:1f:a8:7c: 7c:6f:3f:66:0b:d9:46:5a:5c:4d:6e:79:7a:c2:eb:d2:02:a9: 80:1e:66:53:b9:fd:5d:cf:6e:86:e7:58:7f:a4:74:31:cd:9f: b6:c2:b0:24:69:70:2f:9e:6e:4f:2d:74:53:8b:15:74:6c:08: bd:f0:b9:d2:e4:e0:a4:14:cf:b1:77:4d:6d:88:8a:ee:c7:6c: 4b:15:c9:91:85:7d:a2:fa:cd:10:27:b3:27:fc:3b:f2:d1:86: 57:33:0d:27:02:f2:c6:ab:46:8e:00:de:88:1f:59:d0:fd:6f: 30:39:94:ba:af:17:89:37:df:0d:9e:1a:a7:d6:49:de:f5:40: 61:e3:fa:52:70:3d:57:76:9f:fa:15:30:be:64:85:27:61:b0: 02:9f:f6:20:c3:2d:1a:84:44:48:f6:08:db:f8:80:b9:ea:38: 16:52:fe:2a:c0:f1:d9:8f:80:37:9f:fd:e2:ec:1e:99:c3:01: 2d:b6:11:dd:5a:29:c8:02:2c:aa:d7:3f:78:c5:f2:fe:29:d7: 98:f4:d1:1d:7e:9e:5d:8d
-
Time to mint the certificate
Due diligence check
For the purposes of this lab assume you've done a background check on the customer, checked their reviews on Yelp and NextDoor, looked at their Facebook page and LinkedIn profiles. You're a little concerned with some of those college fraternity party pictures on Facebook, but, what the heck, their check has cleared the bank, so you decide to go ahead and mint the certificate.
openssl x509 -req -in grep11Lab-client-req.csr \ -days 365 -CA ../CA/ca.crt -CAkey ../CA/ca-key.pem \ -CAcreateserial -out grep11Lab-client.crt
Output from creating the certificate
Certificate request self-signature ok subject=C = US, O = IBM WSC IBM Z and LinuxONE, CN = SE-enabled HPVS 2.1.x Grep11 Server
-
Your quality control department asks you to display the certificate before sending it to the customer:
openssl x509 -noout -text -in grep11Lab-client.crt
It should look similar to this [click to expand]
Certificate: Data: Version: 1 (0x0) Serial Number: 29:4a:dd:c7:66:81:ab:5a:1d:bb:20:76:a0:25:34:90:21:93:40:6b Signature Algorithm: sha256WithRSAEncryption Issuer: C = US, O = IBM WSC IBM Z and LinuxONE, CN = CA for rsyslog for SE-enabled KVM guests Validity Not Before: Feb 14 01:58:14 2023 GMT Not After : Feb 14 01:58:14 2024 GMT Subject: C = US, O = IBM WSC IBM Z and LinuxONE, CN = SE-enabled HPVS 2.1.x Grep11 Server Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (4096 bit) Modulus: 00:b0:38:b1:27:ee:a2:9f:35:10:dd:74:b2:46:e6: b8:2a:e4:c9:7f:7d:b3:1d:45:96:7d:bc:9d:5a:90: 06:64:da:b8:23:73:f3:99:46:54:a3:2a:a8:8e:db: 10:96:7e:de:04:65:81:ee:68:f1:5e:4d:a1:3d:db: 2e:44:3a:ff:e2:fe:60:86:ad:90:b9:91:f1:4b:94: c9:43:4a:85:56:32:2a:ab:c9:2a:71:de:b7:fc:40: e2:1b:aa:17:08:3a:65:4a:b8:70:d8:5c:b4:b6:ca: 4f:8d:a1:d0:03:04:20:4e:7e:23:26:20:85:45:e4: 21:ec:bb:f8:38:64:36:6d:7c:a1:8a:d8:af:14:1b: 72:bf:e8:cd:2f:2d:2c:0b:5a:39:4e:53:41:f8:a0: 33:91:be:90:64:18:1c:cf:c2:d9:a0:bf:78:db:88: 19:6b:be:0c:10:76:fc:96:fb:01:14:f5:90:8a:4d: a8:0c:0b:10:29:1d:fb:45:e1:f2:59:b5:33:e5:20: f8:76:22:c8:4d:d1:55:dc:de:10:79:66:b8:ff:fa: ee:e4:03:a5:77:9d:50:a1:f2:60:35:84:e1:44:ef: f4:be:be:a9:1b:17:5e:26:4a:ea:24:7d:ff:80:d2: d6:95:4f:1b:b6:5e:22:c6:f2:81:17:bb:fe:ce:f6: 44:29:79:4e:ad:76:04:db:a7:8d:a4:db:8c:e3:cd: bf:48:37:99:4c:1c:e0:26:0f:9f:8b:a4:1f:48:71: 44:d0:5f:ae:c6:93:83:ab:b8:7b:7b:b8:f3:1d:f1: 7d:34:3b:d5:32:f0:74:d9:ee:0b:cd:e7:a9:54:49: 2b:23:dc:1a:57:ae:a3:03:d8:9c:47:14:75:0c:47: c6:be:e3:84:61:e7:15:b8:fe:0b:5f:53:a0:f6:a8: 92:e4:2c:c9:51:43:de:3f:be:0f:a6:c7:44:1f:81: c9:c0:9d:d3:3a:42:2f:b0:52:59:47:c6:da:96:93: ba:e7:11:f4:dd:ba:75:46:86:b5:ef:ee:49:34:92: 36:03:32:00:99:71:ed:83:1a:cd:3f:e3:79:7b:ee: 04:49:59:aa:01:ce:4d:67:0e:0f:88:e6:62:82:1e: 0b:07:01:cf:74:38:20:7b:0d:69:f5:2e:09:e5:84: 20:f3:82:15:7f:a4:0d:ae:35:da:de:f2:a9:30:6e: 3e:e3:72:26:b3:18:10:6c:d7:df:4c:fc:bf:e3:33: 8c:c6:e3:83:04:db:c9:a9:a8:41:d2:97:be:a0:ec: bd:f1:89:18:eb:c5:e7:0b:fc:47:30:c8:e1:cd:e6: 54:cd:f1:e7:c3:23:51:48:4f:fd:89:49:43:6d:96: e0:cc:69 Exponent: 65537 (0x10001) Signature Algorithm: sha256WithRSAEncryption Signature Value: 9f:41:62:18:0f:db:0a:84:f6:59:bc:cd:22:e4:73:d6:18:b0: d0:4e:2a:da:8f:5c:46:06:f1:80:f3:4b:5d:cf:fe:a2:a3:97: cc:bd:96:8e:d2:d4:58:ab:ac:56:dd:6f:12:3b:52:a8:df:e5: 4b:26:8e:92:b3:ed:28:9a:c3:28:6d:8b:f9:13:b0:01:fa:ed: 8f:48:08:08:07:ac:8f:61:00:fc:53:41:9e:d2:53:c5:b8:d7: f4:f2:c9:cc:87:58:2d:48:f3:34:be:fe:0d:dc:9e:b6:11:74: 18:da:92:db:db:b3:c6:4f:10:63:6c:4c:fb:5f:86:36:9a:a8: 58:a9:d3:d9:7c:e0:8d:2f:96:f3:64:85:bf:8d:39:28:d2:06: 8b:63:93:d6:42:e3:ad:6d:5b:2e:d3:5a:3d:3c:af:1e:a2:61: a0:d7:c7:a0:4f:b7:16:f1:3b:94:44:23:d8:16:6f:d7:38:36: 84:10:31:ac:e7:17:43:2a:24:04:26:5b:46:50:03:05:7c:8d: cc:77:f5:c1:c1:e3:a2:04:4a:6d:7c:b2:c7:1e:e3:68:b0:4e: 24:92:63:dd:bd:87:3c:af:8c:63:a5:ea:2f:41:90:67:79:e3: 31:89:41:54:be:aa:44:89:45:65:85:2e:5e:b9:8c:af:7c:7e: 0f:08:9a:9b:97:7c:6f:fc:9f:30:e8:0c:30:c4:be:7a:0c:7d: d0:45:71:f2:a7:35:c3:f9:f1:b7:2c:9e:1d:a1:da:3b:70:59: 5b:05:93:a3:fc:59:41:c5:db:bf:0f:20:ec:15:ef:64:61:7e: 52:3b:6a:a1:69:0b:73:93:52:a4:a3:79:ca:b3:0c:b8:cd:2b: 59:b5:19:03:2e:21:b8:b5:d3:8d:05:2e:d6:0d:b0:9a:7d:e9: f9:e7:2b:96:3a:a5:e3:05:b6:d8:0a:e2:ea:2f:b0:02:42:ba: a5:9c:1d:d8:29:7f:3b:bd:7c:73:1a:4a:ae:ca:3a:1d:50:16: 3a:42:3c:0c:23:6a:15:ed:57:01:88:f3:dc:b7:e3:3e:55:48: 31:07:4f:38:9c:dc:10:71:e8:8c:82:d3:9e:a6:97:ca:70:20: e9:70:31:b2:46:09:79:03:20:93:b0:16:af:07:67:eb:0c:4f: b0:c0:a9:e8:eb:bc:ab:74:37:93:76:89:92:82:f3:48:a5:a1: 16:62:39:2d:d5:79:67:e2:ea:6e:a9:6e:40:e1:7f:da:01:df: f0:4f:6f:a0:36:80:ae:ab:a2:4d:07:6e:ba:14:bf:85:82:50: e1:3d:df:64:bc:91:3d:60:c4:90:8c:3b:6f:0f:11:31:a6:5f: 4f:36:5a:69:04:05:88:b5
-
Now you send the certificate to the customer:
scp grep11Lab-client.crt \ ${StudentID}@192.168.22.64:./grep11Lab/x509Work/rsyslogClient/.
Example output from sending file
grep11Lab-client.crt 100% 1907 9.7MB/s 00:00
-
Now switch back to your terminal tab or window for your session on the RHEL host. A gentle reminder of what that tab or window looks like:
-
If you are doing the lab in one sitting, in order, then you are still logged in on the RHEL host. If you need to login for any reason the command is
ssh -l ${StudentID} 192.168.22.64
. Steps 15 and 16 will be performed on the RHEL 8.5 host. -
Switch to the directory where the CA "sent" your new certificate and list the files:
cd ${HOME}/grep11Lab/x509Work/rsyslogClient/ && \ ls -ltr
File listing shows your client certificate (client.crt)
total 16 -rw------- 1 student02 hpvs_students 3247 Feb 13 20:42 client-key.pem -rw-r--r-- 1 student02 hpvs_students 192 Feb 13 20:44 client.cnf -rw-r--r-- 1 student02 hpvs_students 1691 Feb 13 20:45 grep11Lab-client-req.csr -rw-r--r-- 1 student02 hpvs_students 1907 Feb 13 21:06 grep11Lab-client.crt
-
Display your certificate in human-readable form to make sure your CA did their job correctly:
openssl x509 -noout -text \ -issuer \ -subject \ -in grep11Lab-client.crt
Example display of certificate
Certificate: Data: Version: 1 (0x0) Serial Number: 29:4a:dd:c7:66:81:ab:5a:1d:bb:20:76:a0:25:34:90:21:93:40:6b Signature Algorithm: sha256WithRSAEncryption Issuer: C = US, O = IBM WSC IBM Z and LinuxONE, CN = CA for rsyslog for SE-enabled KVM guests Validity Not Before: Feb 14 01:58:14 2023 GMT Not After : Feb 14 01:58:14 2024 GMT Subject: C = US, O = IBM WSC IBM Z and LinuxONE, CN = SE-enabled HPVS 2.1.x Grep11 Server Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (4096 bit) Modulus: 00:b0:38:b1:27:ee:a2:9f:35:10:dd:74:b2:46:e6: b8:2a:e4:c9:7f:7d:b3:1d:45:96:7d:bc:9d:5a:90: 06:64:da:b8:23:73:f3:99:46:54:a3:2a:a8:8e:db: 10:96:7e:de:04:65:81:ee:68:f1:5e:4d:a1:3d:db: 2e:44:3a:ff:e2:fe:60:86:ad:90:b9:91:f1:4b:94: c9:43:4a:85:56:32:2a:ab:c9:2a:71:de:b7:fc:40: e2:1b:aa:17:08:3a:65:4a:b8:70:d8:5c:b4:b6:ca: 4f:8d:a1:d0:03:04:20:4e:7e:23:26:20:85:45:e4: 21:ec:bb:f8:38:64:36:6d:7c:a1:8a:d8:af:14:1b: 72:bf:e8:cd:2f:2d:2c:0b:5a:39:4e:53:41:f8:a0: 33:91:be:90:64:18:1c:cf:c2:d9:a0:bf:78:db:88: 19:6b:be:0c:10:76:fc:96:fb:01:14:f5:90:8a:4d: a8:0c:0b:10:29:1d:fb:45:e1:f2:59:b5:33:e5:20: f8:76:22:c8:4d:d1:55:dc:de:10:79:66:b8:ff:fa: ee:e4:03:a5:77:9d:50:a1:f2:60:35:84:e1:44:ef: f4:be:be:a9:1b:17:5e:26:4a:ea:24:7d:ff:80:d2: d6:95:4f:1b:b6:5e:22:c6:f2:81:17:bb:fe:ce:f6: 44:29:79:4e:ad:76:04:db:a7:8d:a4:db:8c:e3:cd: bf:48:37:99:4c:1c:e0:26:0f:9f:8b:a4:1f:48:71: 44:d0:5f:ae:c6:93:83:ab:b8:7b:7b:b8:f3:1d:f1: 7d:34:3b:d5:32:f0:74:d9:ee:0b:cd:e7:a9:54:49: 2b:23:dc:1a:57:ae:a3:03:d8:9c:47:14:75:0c:47: c6:be:e3:84:61:e7:15:b8:fe:0b:5f:53:a0:f6:a8: 92:e4:2c:c9:51:43:de:3f:be:0f:a6:c7:44:1f:81: c9:c0:9d:d3:3a:42:2f:b0:52:59:47:c6:da:96:93: ba:e7:11:f4:dd:ba:75:46:86:b5:ef:ee:49:34:92: 36:03:32:00:99:71:ed:83:1a:cd:3f:e3:79:7b:ee: 04:49:59:aa:01:ce:4d:67:0e:0f:88:e6:62:82:1e: 0b:07:01:cf:74:38:20:7b:0d:69:f5:2e:09:e5:84: 20:f3:82:15:7f:a4:0d:ae:35:da:de:f2:a9:30:6e: 3e:e3:72:26:b3:18:10:6c:d7:df:4c:fc:bf:e3:33: 8c:c6:e3:83:04:db:c9:a9:a8:41:d2:97:be:a0:ec: bd:f1:89:18:eb:c5:e7:0b:fc:47:30:c8:e1:cd:e6: 54:cd:f1:e7:c3:23:51:48:4f:fd:89:49:43:6d:96: e0:cc:69 Exponent: 65537 (0x10001) Signature Algorithm: sha256WithRSAEncryption 9f:41:62:18:0f:db:0a:84:f6:59:bc:cd:22:e4:73:d6:18:b0: d0:4e:2a:da:8f:5c:46:06:f1:80:f3:4b:5d:cf:fe:a2:a3:97: cc:bd:96:8e:d2:d4:58:ab:ac:56:dd:6f:12:3b:52:a8:df:e5: 4b:26:8e:92:b3:ed:28:9a:c3:28:6d:8b:f9:13:b0:01:fa:ed: 8f:48:08:08:07:ac:8f:61:00:fc:53:41:9e:d2:53:c5:b8:d7: f4:f2:c9:cc:87:58:2d:48:f3:34:be:fe:0d:dc:9e:b6:11:74: 18:da:92:db:db:b3:c6:4f:10:63:6c:4c:fb:5f:86:36:9a:a8: 58:a9:d3:d9:7c:e0:8d:2f:96:f3:64:85:bf:8d:39:28:d2:06: 8b:63:93:d6:42:e3:ad:6d:5b:2e:d3:5a:3d:3c:af:1e:a2:61: a0:d7:c7:a0:4f:b7:16:f1:3b:94:44:23:d8:16:6f:d7:38:36: 84:10:31:ac:e7:17:43:2a:24:04:26:5b:46:50:03:05:7c:8d: cc:77:f5:c1:c1:e3:a2:04:4a:6d:7c:b2:c7:1e:e3:68:b0:4e: 24:92:63:dd:bd:87:3c:af:8c:63:a5:ea:2f:41:90:67:79:e3: 31:89:41:54:be:aa:44:89:45:65:85:2e:5e:b9:8c:af:7c:7e: 0f:08:9a:9b:97:7c:6f:fc:9f:30:e8:0c:30:c4:be:7a:0c:7d: d0:45:71:f2:a7:35:c3:f9:f1:b7:2c:9e:1d:a1:da:3b:70:59: 5b:05:93:a3:fc:59:41:c5:db:bf:0f:20:ec:15:ef:64:61:7e: 52:3b:6a:a1:69:0b:73:93:52:a4:a3:79:ca:b3:0c:b8:cd:2b: 59:b5:19:03:2e:21:b8:b5:d3:8d:05:2e:d6:0d:b0:9a:7d:e9: f9:e7:2b:96:3a:a5:e3:05:b6:d8:0a:e2:ea:2f:b0:02:42:ba: a5:9c:1d:d8:29:7f:3b:bd:7c:73:1a:4a:ae:ca:3a:1d:50:16: 3a:42:3c:0c:23:6a:15:ed:57:01:88:f3:dc:b7:e3:3e:55:48: 31:07:4f:38:9c:dc:10:71:e8:8c:82:d3:9e:a6:97:ca:70:20: e9:70:31:b2:46:09:79:03:20:93:b0:16:af:07:67:eb:0c:4f: b0:c0:a9:e8:eb:bc:ab:74:37:93:76:89:92:82:f3:48:a5:a1: 16:62:39:2d:d5:79:67:e2:ea:6e:a9:6e:40:e1:7f:da:01:df: f0:4f:6f:a0:36:80:ae:ab:a2:4d:07:6e:ba:14:bf:85:82:50: e1:3d:df:64:bc:91:3d:60:c4:90:8c:3b:6f:0f:11:31:a6:5f: 4f:36:5a:69:04:05:88:b5 issuer=C = US, O = IBM WSC IBM Z and LinuxONE, CN = CA for rsyslog for SE-enabled KVM guests subject=C = US, O = IBM WSC IBM Z and LinuxONE, CN = SE-enabled HPVS 2.1.x Grep11 Server
Click the Next link at the bottom of the page to continue to the next part of the lab, where you will create the contract that HPVS 2.1.x expects, so that you can run your GREP11 Server.
Created: February 14, 2023