Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
The database installation process differs between version 10 and version 11.
Please follow the relevant instructions below.
Expand | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||
Version 11These instructions are written assuming configuration will be in the local.properties file. However, this isn't the only place that configuration options can be configured. Configuration Files
Step 1 Shutdown TomcatIf Tomcat is currently running then shut it down before proceeding with the following steps. Step 2 Copy the PhixFlow Webapp into TomcatTo install the PhixFlow web application into Tomcat: Copy Linux Make sure that the file ownership is set correctly for the installed webapp(s):
Step 3 Create Configuration FilesCopy the following example configuration files and, where required, update them for your system.
Step 4 Create PhixFlow File System
Windows Create folders as below that are accessible by the user running Tomcat (WEBAPP is the name of the installed PhixFlow, often just "phixflow"):
Create the soft-link in a CMD or Powershell session:
Linux
Step 5 Configure Essential PropertiesRefer to Server Configuration Properties for the full list of available configuration properties. Refer to Configure a Keystore and Aliases if a keystore is being used. The recommended minimum for a basic install in the local.properties file is as follows. This will create a new user called admin. The password will be autogenerated and written to the security.log file. It is strongly recommended that this password is changed immediately after installation.
The configuration settings are show below:
Step 6 Restart TomcatWhenever you make changes in Linux If you have followed PhixFlow's recommended installation for PhixFlow, you can use the commands:
Either do Minimum Set-up After Installation on page Administration, or instruct the people you are delivering this to to complete these steps immediately Multiple PhixFlow Webapps
To install multiple instances of PhixFlow on a single server, complete the installation steps above to create a first PhixFlow instance. Then install a further instance:
where Remember to set up a separate user and schema in the database for the new PhixFlow instance and to configure phixflow-datasource.xml with the user, password and connection-string. Renaming the Log FileBy default, the settings in logback.xml send log messages from all PhixFlow webapps to the same log file, For each webapp, edit the local.properties file and set the change the name of the log file to something that uniquely identifies which webapp it has been generated by - we recommend |
Expand | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Version 10Step1 Copy the PhixFlow Webapp into TomcatTo install the PhixFlow web application into Tomcat: Copy Linux Make sure that the file ownership is set correctly for the installed webapps:
Step 2 Create Configuration FilesCopy the following example configuration files and, where required, update them for your system.
phixflow-instance.xmlCopy the example file
phixflow-datasource.xmlThe PhixFlow webapp must be configured to provide user access to the PhixFlow database. In phixflow-datasource.xml, enter an alias username and password. The actual username and password are stored in an encrypted keystore; see Configure a Keystore and Aliases.
4. Replace the temporary values with:
Oracle: Oracle (> 12c with PDB containers): SQL Server: MySQL: These strings cover most cases of connecting to PhixFlow's own database. For information about how connection strings are constructed for the various database platforms supported by PhixFlow; see Database URLs. phixflow-secret.xmlIf you have not already done so Configure a Keystore and Aliases. Use phixflow-secret.xml to specify the keystore details. phixflow-login.xml
Copy the example file You will use this file if you need to configure PhixFlow to authenticate users’ usernames and passwords against an external domain, or Active Directory, or a SAML Single Sign-on server, such as the Active Directory Federation Services server. For more information, see the pages in the User Administration topic. logback.xml
Copy the example file The
phixflow-logging.xml
Copy the example file The Using Your own Logo in PhixFlowOptionally, you can configure PhixFlow to display your own company logo. The logo must be a vector graphic .svg file with the name Step 3 Restart TomcatWhenever you make changes in Linux If you have followed PhixFlow's recommended installation for PhixFlow, you can use the commands:
Create PhixFlow File System
Windows Create folders as below that are accessible by the user running Tomcat (WEBAPP is the name of the installed PhixFlow, often just "phixflow"):
Create the soft-link in a CMD or Powershell session:
Linux
Either do Minimum Set-up After Installation on page Administration, or instruct the people you are delivering this to to complete these steps immediately Multiple PhixFlow Webapps
To install multiple instances of PhixFlow on a single server, complete the installation steps above to create a first PhixFlow instance. Then install a further instance:
where Remember to set up a separate user and schema in the database for the new PhixFlow instance and to configure phixflow-datasource.xml with the user, password and connection-string. Renaming the Log FileBy default, the settings in logback.xml send log messages from all PhixFlow webapps to the same log file, For each webapp, edit the logback.xml file and change the name of the log file to something that uniquely identifies which webapp it has been generated by - we recommend
|
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
|