06.05.2013 Views

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Installing and Configuring on Unix<br />

proxyHost: This parameter is applicable only if useProxy is set to y. In this case, specify the IP<br />

address of the proxy server against proxyHost. If useProxy is set to n instead, set this<br />

parameter to n as well.<br />

proxyPort: This parameter too is applicable only if useProxy is set to y. In this case, specify the<br />

port number at which the proxy server listens against proxyPort. If useProxy is set to n instead,<br />

set this parameter to n as well.<br />

setAuthentication: This flag is applicable only if useProxy is set to y. In this case, use this flag to<br />

indicate whether the proxy server requires authentication or not. Set this flag to y if<br />

authentication is required. If authentication is not required, set this flag to n. Similarly, if<br />

useProxy is set to n, set the setAuthentication flag also to n.<br />

proxyUsername: This parameter is applicable only if setAuthentication is set to y. In this case,<br />

against proxyUsername, provide the user name for authenticating communication via the proxy<br />

server. If setAuthentication is set to n, then set proxyUsername to none.<br />

ProxyPassword: This parameter is applicable only if setAuthentication is set to y. In this case,<br />

against proxyPassword, provide the password that corresponding to the specified<br />

<br />

proxyUsername. If setAuthentication is set to n, then set proxyUsername to none.<br />

useSSL: Set this flag to y, if you want the <strong>eG</strong> agent to communicate with the manager via<br />

SSL. If not, set this flag to n.<br />

trustedCertificates: This flag is applicable only if useSSL is set to y. To allow trusted certificates<br />

only, set this flag to y. To enable the agent to accept any certificate, set this flag to n. If<br />

useSSL is set to n instead, the trustedCertificates flag should be set to n as well.<br />

setNickName: If you want to set a nick name for the agent, set this flag to y. If not, set this<br />

flag to n.<br />

nickNameToUse: This flag is applicable only if setNickName is set to y. In such a case, specify the<br />

nick name to be assigned to the agent. By default, the host name of the agent host will be set<br />

as the nick name. You can change this nick name, if need be.<br />

Note:<br />

You cannot configure specific applications (such as ColdFusion/Sybase) for monitoring in<br />

the silent mode. For this purpose, you will have to follow the separate configuration<br />

instructions provided for these applications in the <strong>eG</strong> <strong>Installation</strong> <strong>Guide</strong>.<br />

5. Once all the aforesaid parameters are configured with the values relevant to your agent<br />

installation, save the file.<br />

Note:<br />

Make sure that the <strong>eG</strong>user account exists on the target system before you run the silent_install<br />

script.<br />

6. Provide execute permissions for the silent_install script and run the script on the target host. To<br />

grant execute permissions, issue the following command from the directory that holds the<br />

silent_install script (say, \tmp): chmod +x silent_install<br />

56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!