Performing a Typical Installation using the Console

Install and configure Sybase Event Stream Processor Server from the command line, without using the graphical user interface.

Prerequisites

If installing on Sun-64 (SPARC) or Sun-64 (Ultra-SPARC T) do not set file descriptors to unlimited, instead run the command: ulimit -n 1024 in the command shell (sh, ksh, and bash shells are supported).

Task
  1. From the command line, navigate to the directory where the installation file (setup.bin) resides.
  2. Type ./setup.bin -i console and press Enter.
  3. When prompted, press Enter to continue.
  4. Select the installation location. To accept the default location, press Enter. To specify a custom location:
    1. Enter an absolute path to the location. Select a file path that does not contain any spaces.
    2. Press Enter.
    3. Type Y or N to indicate whether the location is correct.
      Note: The console accepts both Y and Yes as affirmative, and everything else as a negative response.
    4. If the directory you specified does not exist, the installer asks if you want to create it. Press Y. If the directory already exists, the installer warns you that any software in the folder will be replaced.
      In either case, press Enter to continue.
  5. Enter 1 to select a typical installation, which installs the base adapters, Event Stream Processor Server, and the Event Stream Processor Studio. Press Enter.
    If you have a previous version installed in the selected location, you can either uninstall the previous version, or overwrite it. Enter your selection and press Enter.
  6. Indicate whether to install a licensed version or an evaluation version and press Enter.
    Note: If you install the evaluation version, the software is active for 30 days, after which you are prompted for a valid license key. Proceed to step 10.
  7. If you are installing a licensed version, indicate the licensing model you want to use:
    License Type Process
    Specify License Keys
    • Type 1 and press Enter.
    • Specify the absolute path to the license file and press Enter, or press Enter to accept the default.

    If you are using a served license and receive an error that the installer detects a SySAM server already running on your machine, click Previous to return to the SySAM License Entry panel and select the Previously Deployed License Server option.

    If you enter an invalid key, you are prompted by a warning message. You cannot proceed until you enter a valid key or select a different licensing option.

    Previously Deployed License Server
    • Type 2 and press Enter.
    • Press Enter to accept the default host name, or enter the Host Name and Port Number.

    If the license server file is not found, you receive a warning message indicating that the installer cannot verify a license server running on the selected host. When prompted, enter Y to reenter the license server or n to select a different licensing option.

    Continue Without a License Key Type 3 and press Enter. At the prompt asking if you want to continue, press Enter.

    The software will be active for a 30-day grace period, after which you are prompted for a valid license key in order to use the software.

  8. Enter the number corresponding to the license type you want to configure. Press Enter.
  9. Indicate whether to configure alerts about SySAM events that may require an administrator's attention. To configure alerts:
    1. Enter Y to indicate that you want to configure alerts.
    2. Enter the SMTP server host that handles your e-mail messages.
    3. Enter the SMTP server port.
    4. Enter the default e-mail address of the person or group from which e-mail messages are sent.
    5. Enter the e-mail addresses of the default recipients.
    6. Enter the default severity level (informational, warning, or error) for e-mail messages.
    Note: To change the SySAM alert settings after installation, edit the lines in the ESP_HOME/sysam/esp_license.prop file:
    • email.smtp.host=smtp
    • email.smtp.port=25
    • email.sender=sender@domain.com
    • email.recipients=user@domain.com
    • email.severity=INFORMATIONAL

    Setting email.severity to NONE disables e-mail alerts, causing all other lines to be ignored. To enable e-mail alerts, set email.severity with ERROR, WARNING, or INFORMATIONAL. Replace SMTP with your SMTP host name, 25 with the port number of your SMTP mail server, sender@domain.com with your e-mail address, and user@domain.com with e-mail recipients. Separate multiple e-mail recipients with a comma (,).

  10. Enter the number corresponding to your geographic location and press Enter.
  11. Read through the license agreement. Press Enter as necessary to move through the text. Stop reading the text at any point by typing back and pressing Enter.
  12. Indicate that you agree to the license terms and press Enter.
  13. Configure cluster information. The installation creates a single-node cluster:
    1. Enter a name for the cluster node, or press Enter to select the default.
    2. Enter the host name of the machine hosting the node, or press Enter to accept the default (localhost).
    3. Enter the RPC port for the node you are configuring or press Enter to accept the default.
    4. Indicate whether the RPC port supports connections through secure socket layers (SSL) or not. When you enable SSL, connections to the cluster use HTTPS rather than HTTP.
    5. Enter the port number for the cluster cache, or press Enter to accept the default.
    6. Provide a name for the cluster.
    7. Indicate whether you want to provide a password for accessing the cluster now. All nodes within the cluster use the same password. If you select No, you must provide a password when you start the cluster node. If you select Yes, enter a password for the cluster.
    8. Enter the number corresponding to the security type to apply to your cluster:
      1 - LDAP: Provides LDAP authentication. Enter information for the following fields as determined by your LDAP implementation:
      • Server type
      • Provider URL
      • Default search base
      • Authentication scope
      2 - Kerberos: Provides Kerberos authentication. Enter information for the following fields as determined by your Kerberos implementation:
      • Realm
      • KDC
      3 - RSA: Provides RSA authentication. The following RSA values are set by default:
      • Digester
      • Provider
      • Algorithm
      4 - None: Provides open security, which allows any name and password combination to log in. Therefore, no additional configuration is required.
    Note: After installation, you can modify your cluster configuration to add additional nodes and clusters. For information, see the Administrators Guide.
  14. Indicate the location of the keystore file or press Enter to accept the default.
    A keystore is a third-party application that generates encryption keys. These keys encrypt/decrypt data within Event Stream Processor, such as passwords required to read or write to databases. By default, the keystore type is set to JKS and the algorithm is RSA.
  15. Indicate whether you want to provide a password to access the keystore file and key. If you select No, you are prompted for one at startup. If you select Yes, enter a password for the keystore.
  16. Enter an absolute path to the workspace location for Studio projects, or press Enter to accept the default location.
  17. At the preinstallation summary, confirm that you have enough disk space for the installation. Press Enter to continue.
  18. Press Enter to install the files.
  19. When installation is complete, press Enter.
  20. Indicate whether to run Event Stream Processor Studio immediately or later. Press Enter.
    If you run the Studio immediately, the Studio launches and you exit the installer. If you select to run the Studio later, you exit the installer.
Tip: If Studio does not start, try manually deleting the .metadata folder in the workspace directory.