Cluster Configuration

You can configure a server cluster for your Event Stream Processor environment. You can then deploy projects to the cluster to run them securely and with high availability.

During installation, you are prompted to provide information for a server cluster. The installer uses the information you provide to configure a server cluster for your installation.

Before providing cluster information, develop a basic understanding of server clustering in Event Stream Processor so you can optimize your configuration.

In Event Stream Processor, server clusters:

When configuring your server cluster at install time, you are prompted for a host and port for the cluster. Select a machine that users can access from within your network and that can handle the traffic associated with running multiple projects.

You must also enter an authentication mechanism. Event Stream Processor does not require proprietary authentication. Instead, you can tie Event Stream Processor security in with your existing RSA, Kerberos, or LDAP authentication infrastructure. If you do configure authentication, users are required to provide credentials when accessing projects within the server cluster. The required credentials depend on the authentication mechanism you use.

If you use LDAP for your security infrastructure, you can also restrict access to specific project functions such as starting and stopping projects based on user role.

For detailed information on clusters and security, see the Event Stream Processor Administrators Guide.