The following methods are available for stand-alone installation:
Interactive: The installation proceeds with user inputs. During installation, you can record the installation options (user inputs or default values) to a file, which later can be used for silent installation.
Silent: You can use this option if the installation options are pre-recorded. The Silent installation refers to the file that has the recorded installation input and performs the installation with the values captured in the file. The silent install is effective when you want to install many replicas of the same configuration in your environment. For more information, see Section 2.5, Silent Installation.
Both the interactive and silent installation of Sentinel can be done either as a root user or a non-root user.
When you install Sentinel, the following configurations are available:
Standard: In this configuration, the installation uses default values for the configuration setup. User input is required only for the password. For more information on installing Sentinel with the standard configuration, see Section 2.4.1, Standard Configuration.
Custom: In this configuration, the installation prompts you to specify the values for the configuration setup. You can either select the default values or specify the necessary values. For more information on installing Sentinel with a custom configuration, see Section 2.4.2, Custom Configuration.
Standard Configuration |
Custom Configuration |
---|---|
Installs with default 90-day evaluation key. |
Allows you to install with the 90-day license key or with a valid license key. |
Allows you to specify the admin password and uses the admin password as the default password for both dbauser and appuser. |
Allows you to specify the admin password. For dbauser and appuser, you can either specify new password or use admin password. |
Installs the default ports for all the components. |
Allows you to specify ports for different components. |
Authenticates users with the internal database. |
Gives the option to authenticate users either with the internal database or LDAP authentication. |
There are multiple components in Sentinel. All of the following components are installed by default:
Sentinel server
Correlation Engine
Collector Manager
Additional Correlation Engines or Collector Managers can be installed on different systems.