Performing a Custom Installation in GUI Mode

Install the ESP Server, Studio, Sybase Control Center for Sybase Event Stream Processor, and any combination of external and enterprise adapters on various machines within your network.

  1. Click the installer file, setup.bin. On the Introduction screen, click Next.
  2. Select an installation folder. Change the default folder by typing the filepath to the desired folder or by clicking Choose and selecting a folder. When finished, click Next.
    If the selected folder does not exist, click Yes when prompted to create the folder. If the folder already exists, you see a warning that any software in the folder will be replaced. Click Next to proceed with the installation in the existing folder.
  3. Choose the Custom install set. Click Next.
  4. Select the options you want to install and clear the options you do not.
    Note: If the target installation machine hosts other Sybase products, you may have already installed the SySAM License Utilities. You need not install them again.
  5. Click Next.
    If, in step 4, you selected external adapters only (no enterprise adapters, Server, or Studio), the installer summarizes your installation preferences and prompts you to install. Click Install to complete the installation. Otherwise, continue to step 6.
  6. Select to install either a licensed copy or an evaluation version.
    Note: If you are installing an evaluation version, proceed to step 10.
  7. If you are installing a licensed version, select one of these options:
    Specify License Keys, Use Previously Deployed License Server, or Continue Installation Without a License Key.
    License Type Process
    Specify License Keys
    • Enter the license key manually or browse for and load a license key.
    • Click Next.

    If you are using a served license and receive an error that the installer detects a SySAM server already running on your machine, click Previous to return to the SySAM License Entry panel and select the Previously Deployed License Server option.

    If the license server file is not found, you receive a warning message indicating that the installer cannot verify a license server running on the selected host, and prompting you to reenter the host name and port number you provided. If the installer cannot verify the license server, select a different licensing option to continue with the installation.

    Previously Deployed License Server Enter the host name and port number or IP address.

    If the license server file is not found, you receive a warning message indicating that the installer cannot verify a license server running on the selected host. Reenter the host name and port number. If the installer cannot verify the license server, select a different licensing option to continue with the installation.

    Continue Without a License Key

    The software will be active for a 30-day grace period, after which you are prompted for a valid license key.

  8. From the drop-down list, select the type of product license you want to configure and click Next.
  9. Select Yes or No to indicate whether you want to configure e-mail alerts about SySAM events that may require an administrator's attention.
    If you select Yes, enter the SMTP server host name, SMTP server port number, sender e-mail address, recipient e-mail address, and message severity, or accept the defaults. Click Next.
    Note: To change the SySAM alert settings after installation, edit these lines in the ESP_HOME/sysam/esp_license.prop file:
    • email.smtp.host=smtp
    • email.smtp.port=25
    • email.sender=sender@domain.com
    • email.recipients=user@domain.com
    • email.severity=INFORMATIONAL

    Setting email.severity to NONE disables e-mail alerts, causing all other lines to be ignored. To enable e-mail alerts, set email.severity with ERROR, WARNING, or INFORMATIONAL. Replace SMTP with your SMTP host name, 25 with the port number of your SMTP mail server, sender@domain.com with your e-mail address, and user@domain.com with e-mail recipients. Separate multiple e-mail recipients with a comma (,).

  10. Use the drop-down list to select your geographic location and to view the corresponding End-User License Agreement. Accept the terms and conditions to continue. Click Next.
    Note: If you are installing enterprise adapters only, repeat steps 6 through 10 for each enterprise adapter you are installing. Then proceed to step 16.
  11. Configure cluster information:
    1. Create a name for your new cluster, or enter the name of an existing cluster.
    2. Create a name for the new node. If the node will be part of an existing multi-node cluster, all nodes names in the cluster must be unique.
    3. Enter the cache port for the node. The cluster cache is an internal cache for sharing cluster state and configuration information. It is for internal use only.
    4. By default, the installer sets the actual host name of the machine hosting this cluster node. If it cannot determine the actual host name, it sets "localhost" as the default value. Use the default "localhost" name only if this is a single node cluster that will only be accessed from within the machine you are installing on.
    5. Enter the RPC port for the cluster node. The Studio, SDK, and various other product tools use this port to access the cluster.
    6. Indicate whether the RPC port supports connections through Secure Sockets Layer (SSL) or not. When you enable SSL, connections to the cluster use HTTPS rather than HTTP. If you are creating a new cluster, you can decide whether you want to use SSL or not. If you are connecting to an existing cluster, ensure this selection matches the configuration of the existing cluster.
    7. Click Next.
    Note: After installation, you can modify your cluster configuration to add additional nodes and clusters. For information, see the Administrators Guide.
  12. Indicate whether you want to specify a password for the cluster now or when you start the cluster. All nodes within a cluster have the same cluster password. To set a password now, select Yes, then enter the password. Your password must be at least six characters long. If you are connecting to an existing cluster, use the password defined for that cluster.
  13. Configure security for the cluster, then click Next. If you are connecting to an existing cluster, select the security type the existing cluster uses, and provide credentials for that cluster:
    Authentication Type Description
    Native OS Provides authentication based on your OS. Choose this authentication type if you wish to use the same credentials that you use to log on to your machine. No additional configuration is required.
    LDAP Provides LDAP authentication. Enter the following information as determined by your LDAP implementation:
    • Server type
    • Provider URL
    • Default search base
    • Authentication scope
    Kerberos Provides Kerberos authentication. Enter the following information as determined by your Kerberos implementation:
    • Realm
    • KDC
    • Service Principal Name
    • Keytab Location
    Note: If any of these four fields are not defined during the installation process, they can be set up post-installation. See Administrators Guide > Security in Event Stream Processor > Authentication > Configuring the Server for Kerberos for details.
    RSA Provides RSA authentication.
  14. Set the keystore properties for the cluster. These keys encrypt/decrypt data within Event Stream Processor, such as passwords required to read or write to databases. If you are connecting to an existing cluster, use the keystore properties already defined for that cluster:
    1. Indicate the location of the keystore file. Event Stream Processor needs access to the keystore for encryption/decryption.
    2. Select Yes or No to indicate whether you want to enter a password to access the keystore file and key. If you select No, you are prompted for the password at startup.
    3. (Optional) Enter and confirm the password for the keystore. Your password must be at least six characters long.
    4. Click Next.
  15. Select a workspace folder to store projects. Change the default folder by typing the filepath to the desired folder or by clicking Choose and selecting a folder. When finished, click Next.
    If you are installing enterprise adapters, repeat steps 6 through 10 for each adapter.
  16. Review installation information before continuing. Click Previous to go back and make changes. Click Install to proceed with the installation.
  17. If you are installing Sybase Control Center for Event Stream Processor:
    1. Specify values for the HTTP Port and the HTTPS Port for Sybase Control Center that do not conflict with ports used by other applications and services on the system, or accept the default values.
    2. Specify a value for the RMI Port for the RMI Service that is not used by other applications and services on the system, or accept the default value.
    3. Enter and confirm a password for the SCC administrator. Minimum length is six characters.
      This password is encrypted and written to the SCC csi.properties file.
    4. Enter and confirm a password for the SCC agent administrator.
    5. Select Yes or No to indicate whether you want to start the Sybase Control Center service.
  18. A message indicates Event Stream Processor was successfully installed into the location of your choice, and to restart the system to complete the installation. Click Done to quit the installer.