This topic is for system administrators. It describes how to install a new instance of PhixFlow.
Prerequisites
Your IT system must meet the PhixFlow Minimum system requirements.
If you are setting up an installation of PhixFlow for evalution, or a platform for development or testing that requires minimal planning, you can go straight into the installation process below.
If you are installing a large and/ or long-running installation of PhixFlow, please complete the planning steps described in Planning your PhixFlow System and Infrastructure planning and delivery.
Summary Installation Instructions
The pages in this topic guide you through a complete PhixFlow installation. A summary of the steps is:
Required or recommended | Page with details | Summary |
---|---|---|
Required | Install Java | Download and install Java. |
Required | Download and install the Apache Tomcat web-application (webapp) server. | |
Optional | Log management recommendations | Optional configuration for management of server log files on long-running (more than 4 weeks) instances of PhixFlow. |
Recommended | Install reverse proxy and configure HTTPS:
| Set up a reverse proxy to help manage the load on the PhixFlow server, offer secure connections over HTTPS, and help with certificate management for multiple instances of PhixFlow. |
Required | Unpack PhixFlow Release Package | If you do not already have the PhixFlow package to install, you can download it from our support FTP site. Please email support@phixflow.com. Log on to the webapp host and unpack the release package. |
Required | Install the PhixFlow Database Schema | Create a database user and tables. Populate the tables with initial configuration data and set the customer name. See also the details in Database URLs. |
Optional | MS SQL Server Integrated Authentication | Enable server support for integrated user authentication. |
Required | Install the PhixFlow Webapp | Copy the PhixFlow webapp from the unpacked release package into Tomcat and configure it. |
Required | Configure a Keystore and Aliases | Create a keystore for the database credentials and their aliases. Configure the following files to use the keystore:
|
Required | Start PhixFlow and Configure | Check that the application is running by starting the client and logging in with the username startup and password: Startup. |
After Installation
Once PhixFlow is installed, see Administration for details of the configuration steps required immediately after installation, as well as the ongoing configuration and maintenance tasks.