Installing i2 Explore for iBase

You can install i2 Explore for iBase using an Installation Manager.

Before you begin

i2 Explore for iBase requires the iBase database and security database that it is connecting to be "upsized" to SQL server. In addition to this, the machine on which you are installing i2 Explore for iBase must have either SQL server or SQL server client tools installed.

i2 Explore for iBase uses the iBase search 360 feature - this capability must be enabled on the iBase database that you are connecting to before starting the installation process.

i2 Explore for iBase only supports iBase installations with users and groups configured in iBase, it does not currently support iBase installations that use Active Directory or Entra ID.

An internet connection is preferred but not required to install i2 Explore for iBase. If you do not have an internet connection, you will need to supply other prerequisites detailed in the Installing in an offline environment section.

Installation

The installer will collect information from you and install the i2 Explore for iBase deployment tooling on to disk. After this, you will follow Starting the application to deploy the i2 Explore for iBase application.

To use i2 Explore for iBase a new database, called "ISTORE", needs to be created in the iBase SQL Server instance that hosts your iBase database. There are two options available for creating this database:

  1. Supply the user name and password for an administrator SQL Server login that has permission to create a new database and create a login and user in the iBase SQL Server instance. The deploy process creates the ISTORE database and views, and adds appropriate users to this database.

  2. Do not supply a user name and password, and run the scripts to create the ISTORE database, logins and users manually. This should be done when the installer has completed. See the Manually creating the ISTORE database section in Starting the application for information on how to do this.

Unpack the i2 Explore For iBase v1.2.zip file to a location of your choice. This will create the following files:

  • Setup.exe: The installer for the i2 Explore for iBase deployment tooling.

  • i2 Explore for iBase.msi: The MSI installer file.

Run the Setup.exe file to start the installation process.

The installer will prompt you for the following information:

Destination folder

  • Install i2 Explore for iBase to: The directory where the Explore for iBase application will be installed.

    • The default location is C:\i2.

iBase database SQL Server

  • The fully qualified domain name of the iBase database server: The host name or IP address of the server that is running the iBase database.

  • The iBase database port: The port number that the iBase database is listening on.

  • The admin user name used to create the ISTORE database and users: The user name for the administrator user in the iBase SQL Server instance. This is required to create the ISTORE database and views, and add appropriate users to this database.

  • Database admin user password: The password for the administrator user in the iBase SQL Server instance. This is required to create the ISTORE database and views, and add appropriate users to this database.

    • This value can be changed in the following file at any time after this installation has completed:

      • <installation_location>/explore-for-ibase/analyze-deployment-tooling/configs/explore-for-ibase/configuration/secrets/sqlserver/admin_PASSWORD

These properties can be changed after the installer has completed. See Updating the configuration manually.

SQL Server tools and data folders

  • The SQL Server install location: The location of the SQL Server installation, or the SQL server client tools on the host machine (e.g. "C:/Program Files/Microsoft SQL Server/Client SDK/ODBC/170").

  • The iBase database location: The location of the iBase database data files. This may be on a different machine from the i2 Explore server (e.g. "C:/Program Files/Microsoft SQL Server/MSSQL16.MSSQLSERVER/MSSQL/DATA").

  • The Operating System that the iBase database is on: Valid values are UNIX or WIN.

These properties can be changed after the installer has completed. See Updating the configuration manually.

iBase database connection

  • The iBase security database name: The name of the iBase security database that the Explore for iBase application will connect to.

    • This is the SQL Server database name, which can be found in the security database properties dialog in iBase designer (under the File menu).

  • The iBase database name: The name of the iBase database that the Explore for iBase application will connect to.

    • This is the SQL Server database name, which can be found in the database properties dialog in iBase designer (under the File menu).

These properties can be changed after the installer has completed. See Updating the configuration manually.

i2 Explore server connection

  • The fully qualified domain name of the i2 Explore host server: The fully qualified domain name (FQDN) of the server that is running the i2 Analyze application.

    • Default value: The deployment will use the name of the host it is running on

  • The i2 Explore service port: The port number that the i2 Analyze service will listen on.

  • The Solr service port: The port number that the Solr service will listen on.

  • The Zookeeper service port: The port number that the Zookeeper service will listen on.

These properties can be changed after the installer has completed. See Updating the configuration manually.

Server certificates

  • CA trust certificate: The CA trust certificate for certificates that are received from the i2 Explore server, which is used to verify the identity of the i2 Explore server.

  • The signed certificate for i2 Explore host machine: This is the certificate that is used to secure the connection to the i2 Explore service. This certificate MUST be signed by the CA trust certificate.

  • Private key for i2 Explore host machine: This is the private key that is used to secure the connection to the i2 Explore service.

These properties can be changed after the installer has completed. See Configuring TLS connection to iBase.