47
Symantec eDiscovery Platform™ Sub-Node Installation Guide 8.0

Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Embed Size (px)

Citation preview

Page 1: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Symantec eDiscovery Platform™

Sub-Node Installation Guide

8.0

Page 2: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Symantec eDiscovery Platform™: Sub-Node Installation Guide

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Last updated: 2014-09-17

Legal Notice

Copyright © 2014 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, the Checkmark Logo, Clearwell and Symantec eDiscovery Platform are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Software file accompanying this Symantec product for more information on the Third Party Programs.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street, Mountain View, CA 94043 http://www.symantec.com

Page 3: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Contents

Chapter 1 Overview ............................................................................................................... 5

About this guide............................................................................................................................ 5 Audience .......................................................................................................................................... 5 Related documents ...................................................................................................................... 5 Product documentation ............................................................................................................. 6 Comment on the documentation ........................................................................................... 9 Technical Support ......................................................................................................................... 9

Contacting Technical Support ...................................................................................... 10 Licensing Portal ................................................................................................................. 11 Customer service .............................................................................................................. 11

Chapter 2 Getting Started .................................................................................................. 13

Overview ....................................................................................................................................... 13 Virtual machine environment: Best Practices ................................................................... 13 Basic concepts............................................................................................................................. 15 Sub-Node architecture overview .......................................................................................... 18

Single Cluster Node setup ............................................................................................. 18 Multiple Cluster Node setup ......................................................................................... 19

Setting up your environment................................................................................................. 20 Pre-installation requirements ....................................................................................... 20 Setup requirements ......................................................................................................... 20

Chapter 3 Installation and Configuration .................................................................... 23

Overview ....................................................................................................................................... 23 Installation workflow ................................................................................................................ 23

Installing DB Node ............................................................................................................ 24 Installing Cluster Node .................................................................................................... 24 Installing Utility Node ...................................................................................................... 25 Installing Sub-Nodes ....................................................................................................... 25

Installing Symantec eDiscovery Platform on a Sub-Node ............................................. 26 Configuring the Sub-Nodes .......................................................................................... 39

Performing post-installation steps ....................................................................................... 42

Page 4: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

4 Contents

Validate the Sub-Node Installation ............................................................................. 42 Set up your system for audio processing .................................................................. 42 Verify the Audio Services ................................................................................................ 43 Verify the services on Sub-Nodes ................................................................................ 43 Verify the Windows services on Utility Nodes ......................................................... 43 Configure Muhimbi Document Converter Services ............................................... 44 Verify the Cluster Node configuration ....................................................................... 45 Update Virus Scanning Software (if applicable) ...................................................... 46

Page 5: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Chapter 1

Overview

About this guide This document provides installation and configuration instructions for successfully installing and setting up the Symantec eDiscovery Platform application from scratch (not a product upgrade) utilizing multiple low-capacity virtual machines. This guide assumes that the user is comfortable performing common system operations and is familiar with the Windows operating system and virtual machine (VM) environment setup configurations.

This document does not cover specific information for configuring ESXi server and deploying virtual machines. The purpose of this guide is to help understand the Sub-Node installation and related concepts. For information on configuring ESXi server and virtual machines, refer to the appropriate documentation on VM environment or contact your Administrator responsible for managing the VM environment.

If you plan to install the Symantec eDiscovery Platform application on a single virtual machine or a physical appliance with a minimum required configuration of 32 GB RAM, see the Symantec eDiscovery Platform Installation Guide 8.0.

Audience This document is intended for anyone who wants to install and configure the Symantec eDiscovery Platform application using multiple low-capacity virtual machines.

Related documents This document only provides the conceptual and procedural information required to install and configure Sub-Nodes. You also need to understand a

Page 6: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

6 Overview

Product documentation

distributed architecture deployment as well as installation and configuration of appliances as Utility Nodes.

See the following documents for information related to procedures in this document:

• Symantec eDiscovery Platform Installation guide 8.0

• Symantec eDiscovery Platform Utility Node Guide 8.0

• Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0

Product documentation The table below lists the end-user documentation that is available for the Symantec eDiscovery Platform product.

Symantec eDiscovery Platform Documentation

Document Comments

Installation and Configuration

Installation Guide Describes prerequisites, and how to perform a full install of the Symantec eDiscovery Platform application.

Upgrade Overview Guide Provides critical upgrade information, by version, useful prior to upgrading an appliance to the current product release

Upgrade Guide Describes prerequisites and upgrade information for the current customers with a previous version of Symantec eDiscovery Platform.

Sub-Node Installation Guide Describes deployment of Symantec eDiscovery Platform utilizing multiple low-capacity virtual machines. Includes prerequisites and directions for configuration and installation.

Utility Node Guide For customers using utility nodes, describes how to install and configure appliances as utility nodes for use with an existing Symantec eDiscovery Platform setup.

Native Viewer Installation Guide Describes how to install and configure the Brava Client for native document rendering and redaction for use during analysis and review.

Distributed Architecture Deployment Guide

Provides installation and configuration information for the Review and Processing Scalability feature in a distributed

Page 7: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Overview

Product documentation

7

Document Comments

architecture deployment

Getting Started

Navigation Reference Card Provides a mapping of review changes from 8.x compared to 7.x and the user interface changes from 7.x compared to 6.x

Administrator’s QuickStart Guide Describes basic appliance and case configuration

Reviewer’s QuickStart Guide A reviewer’s reference to getting started using the Analysis & Review module in Symantec eDiscovery Platform

Tagging Reference Card Describes how tag sets and filter type impact filter counts

User and Administration

Legal Hold User Guide Describes how to set up and configure an appliance for Legal Holds, and use the Legal Hold module as an administrator in Symantec eDiscovery Platform.

Identification and Collection Guide Describes how to prepare and collect data for processing, using the Identification and Collection module

Case Administration Guide Describes case setup, processing, and management, plus pre-processing navigation, tips, and recommendations. Includes processing exceptions reference and associated reports, plus file handling information for multiple languages, and supported file types and file type mapping.

System Administration Guide Includes system backup, restore, and support features, configuration, and anti-virus scanning guidelines for use with Symantec eDiscovery Platform.

Load File Import Guide Describes how to import load file sources into Symantec eDiscovery Platform

User Guide Describes how to perform searches, analysis, and review, including detailed information and syntax examples for performing advanced searches

Audio Search User Guide Describes how to use the Audio Search feature to process, analyze, and search and export search media content

Rights Management Guide Describes how to process, analyze, search, print decrypted RMS-protected content and export in either encrypted or decrypted format.

Page 8: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

8 Overview

Product documentation

Document Comments

Export and Production Guide Describes how to use, produce, and troubleshoot exports

Transparent Predictive Coding User Guide

Describes how to use the Transparent Predictive Coding feature to train the system to predict results from control data and tag settings.

Reference and Support

Legal Hold Legal Hold administrator’s reference of how to create and manage holds

Collection A quick reference card of how to collect data in Symantec eDiscovery Platform

OnSite Collection A quick reference for performing OnSite collection tasks

Review and Redaction Reviewer’s reference card of all redaction functions

Keyboard Shortcuts A quick reference card listing all supported shortcuts

Production Administrator’s reference card for production exports

User Rights Management A quick reference card for managing user accounts

Audio Search A quick reference card for performing multimedia search tasks

Audio Processing A quick reference card for processing multimedia sources

Online Help

Includes all the above documentation (excluding Installation and Configuration) accessed by clicking Help in the Symantec eDiscovery Platform user interface.

Release

Release Notes Provides latest updated information specific to the current product release

For the latest product information: http://www.symantec.com/business/products

Page 9: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Overview

Comment on the documentation

9

Comment on the documentation Let us know what you like and dislike about the documentation. Were you able to find the information you needed quickly? Was the information clearly presented? Report errors and omissions, or tell us what you would find useful in future versions of our guides and online help.

Please include the following information with your comment:

The title and product version of the guide on which you want to comment.

The topic (if relevant) on which you want to comment.

Your name.

Email your comment to [email protected]. Please use this address to comment on product documentation. We appreciate your feedback.

Technical Support The primary role of the Technical Support team is to respond to our customers to help resolve technical issues affecting features or functionality of the Symantec eDiscovery Platform. This includes configuration, workflow, and internal system issues, but does not include assistance with legal-related or case-specific queries. For additional help with technical issues, refer also to the Symantec Knowledge Base for the Symantec eDiscovery Platform available online at:

http://www.symantec.com/business/support/index?page=landing&key=60705

For information about Symantec's support offerings, visit us online at:

http://www.symantec.com/business/support/

Refer also to Symantec Connect: Symantec’s online Archiving and eDiscovery community (including product forums, updates, and “Ideas” - a feature request forum) online at:

http://www.symantec.com/connect/archiving-and-ediscovery

Page 10: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

10 Overview

Technical Support

Contacting Technical Support Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the system on which the problem occurred, in case it is necessary to replicate the problem.

When you contact Technical Support, please have the following information available:

Product version and patch level

Service tag number

Available memory, disk space

Operating system

Problem description:

Affected case name

Screenshots demonstrating behavior

Accurate reproduction steps

Error messages and log files

Troubleshooting that was performed before contacting Symantec

Information regarding recent software or hardware configuration changes

Your Symantec Support ID (SID), a 12-digit number in the format: ####-####-####

Note: You must have administrative access to the system in order to perform most troubleshooting. Be sure to have this available, as well as a system/network administrator resource in the event access is required.

To contact Symantec Technical Support:

Customer Support Portal — (Symantec Products)

Contact Numbers: http://www.symantec.com/business/support/techsupp_contact_phone.jsp

Page 11: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Overview

Technical Support

11

Licensing Portal If your Symantec product requires registration or a license key, access our Licensing Portal:

Symantec Licensing Portal

https://my.symantec.com

Note: Access to the MySymantec Technical Support Portal requires a SymAccount. If you do not already have one, register for a new SymAccount from the MySymantec Technical Support Portal.

Customer service To contact Symantec Customer Care, use any of the following methods:

MySymantec Customer Support Portal

https://my.symantec.com

Note: Access to the MySymantec Technical Support Portal requires a SymAccount. If you do not already have one, register for a new SymAccount from the MySymantec Technical Support Portal.

Phone — Toll-Free (North America):

1-800-721-3934

For regional contact numbers: http://www.symantec.com/business/support/assistance_care.jsp

Customer Service is available to assist with non-technical questions, such as the following types of issues:

Questions regarding product licensing or serialization

Product registration updates, such as address or name changes

General product information (features, language availability, local dealers)

Latest information about product updates and upgrades

Information about upgrade assurance and support contracts

Information about the Symantec Buying Programs

Advice about Symantec's technical support options

Non-technical pre-sales questions

Issues that are related to manuals

Issues related to SymAccount passwords

Page 12: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement
Page 13: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Chapter 2

Getting Started

Overview Symantec eDiscovery Platform 8.0 can be installed in two ways:

• Using a single physical appliance or a virtual machine having a minimum required configuration as that of Symantec eDiscovery Platform 8100 or 8200 appliance. All system components and processes run on the same appliance.

• Using multiple low-capacity virtual machines in a Sub-Node VM environment. Each component or process can run on a different virtual machine with a much lower RAM requirement.

This guide describes how to install the Symantec eDiscovery Platform application utilizing multiple smaller virtual machines. For information on installing the Symantec eDiscovery Platform application on a single physical machine or VM, see the Symantec eDiscovery Platform Installation Guide.

Virtual machine environment: Best Practices This document only provides information on the VM environment relevant to Sub-Node installation. It is assumed that you have a full functioning setup of ESXi server and multiple virtual machines as listed in Setup Requirements. Consult your VM Lab Administrator for details on the ESXi server and virtual machines to be used for installing the Symantec eDiscovery Platform application and its components.

Your VM Lab Administrator should have considered the following guidelines while setting up your ESXi and VM environment.

Page 14: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

14 Getting Started

Virtual machine environment: Best Practices

ESXi server: • Consult the hardware compatibility list located at

http://www.vmware.com/resources/compatibility/search.php .

• The BIOS of the machine should be up to date.

• All virtualization features such as VT-x should be enabled in the BIOS.

• For best performance, power-saving features should be disabled.

• Unused hardware features, such as parallel ports, should be disabled.

• All VMs should use SAN infrastructure for storage.

• When planning the amount of physical memory required on an ESXi host, keep in mind that ESXi needs additional memory for its own functioning beyond the memory allocated to virtual machines.

• Ideally the machine should have at least two physical NICs. One NIC should be dedicated to the service console and ESXi infrastructure. Consider dedicating a NIC to each VM that needs to access different physical machines.

• For best performance, all of the Symantec eDiscovery Platform nodes in a cluster should use the same virtual switch.

Virtual Machines: • The maximum number of vCPUs for your VM depends on the CPU cores

available on your host machine. CPU cores are distributed among the VMs. For example, if you have a host machine with 24 cores, and you create a set of VMs with 8 vCPUs allocated, then at most 3 VMs will be able to simultaneously run. However, the hypervisor requires significant processing time to maintain the virtualization environment. So, in this scenario, often only 2 VMs will be able to run simultaneously.

• For best performance, Symantec eDiscovery Platform VMs should have all of its memory reserved.

• Snapshots have a negative impact on performance. You should avoid keeping them longer than necessary.

• VM snapshots MUST not be used as replacements for Case Backups.

• The database host should be within the same hypervisor and virtual switch if possible.

Page 15: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Getting Started

Basic concepts

15

Basic concepts

Distributed Architecture The distributed architecture (DA) is a clustered environment configuration which is set up to communicate with a shared remote database that enables the Distributed Review and/or Distributed Processing features.

For more information, see the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

DB Node In a distributed processing setup, there must be a shared remote database that can be accessed by all the nodes including Cluster Node, Utility Nodes and Sub-Nodes on the cluster.

For more information, see the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

Utility Node A Utility Node is defined to be any machine that has software required to run any combination of IGC, Retriever or Stellent software. Utility Node is used to perform retrievals, image conversions, or file conversions. Using utility nodes for these tasks helps improve performance when users run jobs such as review cache, metadata or production, or production exports.

For more information, see the Symantec eDiscovery Platform Utility Node Guide 8.0.

Cluster Node A Cluster Node acts as a “Parent Cluster Node” in a given node group. All UI interaction happens on the Cluster Node which hosts and runs the Web server. Being a parent node, the Cluster Node manages all components (processes) including those running on its Sub-Nodes. The D: drive of the Cluster Node is shared among Sub-Nodes, and all the Sub-Nodes mount that share on the D: drive from a network share, with full control given to the user of the Symantec eDiscovery Platform application process.

All administration operations including backups/restores, user management are performed on the first Cluster Node in the node groups.

Page 16: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

16 Getting Started

Basic concepts

Sub-Node In a node group where the Cluster Node acts as a parent node, multiple Sub-Nodes act as child nodes. Sub-Nodes are used to run components/processes on behalf of their parent Cluster Node. While the Cluster Node runs a Tomcat process, the Sub-Nodes run a 'SubShell' process. The SubShell process acts as an agent of the Web server running on the parent Cluster Node and is responsible for starting and stopping the processes. All Sub-Nodes in a node group use a mapped D: drive of the Cluster Node in that node group. Sub-Nodes have the same user accounts as on the Cluster Node. However, Sub-Nodes may not have all services running depending on their intended use.

Node Group Node group is a group of a parent Cluster Node and its child Sub-Nodes. In a node group, there can be only one Cluster Node while the Sub-Nodes can be many. The Cluster Node cannot have a parent node while the Sub-Nodes cannot have child nodes.

Node Role A node role is used to indicate that a given Sub-Node can only be used for a given set of components. Here, component means a process of the Symantec eDiscovery Platform application. A Sub-Node in a node group may not have a node role assigned, or it may have one or multiple node roles assigned. The following table shows how the component names are mapped with the node role name using the system properties.

Property Name of the Node Role

esa.asm.component.32bitcomp.node-roles 32bitcomp

esa.asm.component.Muhimbi.node-roles muhimbi

esa.asm.component.TiffValidation.node-roles tiffvalidation

esa.asm.component.apcomponent.node-roles ap

esa.asm.component.conversionprocessormanager.node-roles conversion

esa.asm.component.imaginganalysis.node-roles imaginganalysis

esa.asm.component.indexer.node-roles indexer

esa.asm.component.indexstatistics.node-roles indexstatistics

esa.asm.component.remote32biticpjob.node-roles remote32biticpjob

esa.asm.component.remoteicpjob.node-roles remoteicpjob

esa.asm.component.remotejob.node-roles remotejob

Page 17: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Getting Started

Basic concepts

17

Property Name of the Node Role

esa.asm.component.remotetextengine.node-roles text

esa.asm.component.scaleoutpredictionjob.node-roles predictionjob

esa.asm.component.searchanalytics.node-roles analytics

esa.asm.component.searchcachecomponent.node-roles searchcache

esa.asm.component.thread.node-roles thread

esa.asm.component.topicclassifier.node-roles topic

esa.asm.component.validator.node-roles validator

esa.asm.component.xmlexport.node-roles xmlexport

esa.asm.component.ProcessPoolComponent.node-roles exportprocesspool

esa.asm.component.processpool_component.node-roles processpool

Page 18: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

18 Getting Started

Sub-Node architecture overview

Sub-Node architecture overview

Single Cluster Node setup In a single Cluster Node setup, a single Cluster Node and multiple Sub-Nodes form a node group. All nodes in the cluster including the Cluster Node, Utility Nodes, and Sub-Nodes communicate with the shared DB node used for MySQL. The Cluster Node also communicates with multiple Utility Nodes that are used by the cluster for operations like Crawlers, Retrievers, imaging services, and text extraction. The Cluster Node and its sub-Nodes share a common :D drive.

Page 19: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Getting Started

Sub-Node architecture overview

19

Multiple Cluster Node setup In a multiple Cluster Node setup, multiple node groups are used. Each node group consists of a parent Cluster Node and multiple Sub-Nodes. All nodes in the cluster including the Cluster Nodes, Utility Nodes, and Sub-Nodes communicate with the shared DB node used for MySQL. Each Cluster Node also communicates with multiple Utility Nodes that are used by the cluster for operations like Crawlers, Retrievers, imaging services, and text extraction. The DB Node and Utility Nodes are thus shared by all node groups. The first Cluster Node can be designated as a Master Cluster Node to be used for system administration.

Page 20: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

20 Getting Started

Setting up your environment

Setting up your environment

Pre-installation requirements Create virtual machines as listed in the Setup requirements section and set

up the VM environment.

Get familiar with the distributed architecture deployment and Utility Node installation.

Understand the distributed architecture of Symantec eDiscovery Platform version 8.0. Read the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

Understand the Utility Nodes installation and configuration. Read the Symantec eDiscovery Platform Utility Node Guide 8.0.

Create domain user accounts on all nodes in the cluster. Refer to the Guidelines for Domain User Accounts section in the Symantec eDiscovery Platform Installation Guide 8.0.

Setup requirements

Machine Configurations

Node Count vCPUs RAM C: Drive

D: Drive Installer and Purpose

DB Node 1 8 24 • Database installer

• Install MySQL

• Shared remote database

Cluster Node 1 or more 4 8 80 GB 1 TB • Node installer

• Case Home, UI, System administration

Utility Nodes 3 or more 4 8 80 GB 200 GB • Utility Node installer

• Export, Production, Crawler, and Retriever

Sub-Nodes 3 or more for each cluster node

4 8 60 GB D: drive not required; uses shared D: drive of Cluster Node

• Sub-Node installer

• Processing, Text Engine, QE Cache, Post Process Pool

Page 21: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Getting Started

Setting up your environment

21

Note: Cluster Node acts as a Case Home and is used for review operations. For additional review capacity, you can add more Cluster Nodes and provision them for the review operations.

Operating System All nodes in a cluster require Windows Server 2008 R2 SP1 64-bit (Standard or Enterprise edition).

IMPORTANT! Enterprise edition is required for systems with more than 32 GB.

Software Requirements All nodes in a cluster require the following software components. If these components are installed, then they require reboots before the installation proceeds.

Microsoft .NET Framework 3.5 SP1(reboot), .NET Framework 4

IMPORTANT! For Windows Server 2008 R2, you must install Microsoft .NET Framework 3.5 SP1. Click Start > Administrative Tools > Server Manager > Features > Add Features, and expand .NET Framework 3.5.1 Features and select .NET Framework 3.5.1. You must not select other features including WCF Activation.

Page 22: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement
Page 23: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Chapter 3

Installation and Configuration

Overview This section describes how to install the Symantec eDiscovery Platform application in a VM environment. Make sure you have completed all the prerequisites before you start the installation.

Installation workflow • Complete all prerequisites:

a. Create virtual machines with required configuration as listed in the Setup requirements section.

b. Create user accounts on all nodes. See Pre-installation requirements.

• Install MySQL on the DB Node. See Installing DB Node.

• Install the Symantec eDiscovery Platform application on all Cluster Nodes and configure them as a cluster. See Installing Cluster Node.

• Install the Symantec eDiscovery Platform Utility Node software on all Utility Nodes and configure them to be part of the cluster. See Installing Utility Node.

• Install the Symantec eDiscovery Platform Sub-Node software on all Sub- Nodes. See Installing Symantec eDiscovery Platform on a Sub-Node.

• Configure the Sub-Nodes as described in the Configuring the Sub-Nodes section.

Page 24: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

24 Installation and Configuration

Installation workflow

Installing DB Node You need a physical machine or a virtual machine with at least 8 CPUs and 24 GB RAM for installing a DBMS for the shared remote database. Irrespective of the number of node groups in a cluster, only one DB Node is required to install MySQL.

Locate and run the DBDistArchConfig.exe remote database installer to install the Database from the Symantec eDiscovery Platform installer folder: D:\<version>\utilities\DBMS\DBDistArchConfig.exe

Follow the procedures and configuration parameters described in the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

Installing Cluster Node Depending on your cluster requirements, you may need one or more Cluster Nodes. In each node group, there should be only one Cluster Node. The D: drive of the Cluster Node in a node group must be shared and mapped with the Sub-Nodes in that node group.

On Cluster Nodes, you must install the Symantec eDiscovery Platform running the installer:

D:\<version>\InstallClearwell.bat

Install the Symantec eDiscovery Platform application on all Cluster Nodes in your cluster. To connect all Cluster Nodes, follow the procedures described in the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

Make sure that you complete the IGC installation on the Cluster Node even if IGC processes are delegated to Utility Nodes. IGC needs to be present on the Cluster Node for the IGC license validation.

All Cluster Nodes must use the shared MySQL database.

Installing Review Node (Optional)

By default, the Cluster Node is designated as a “Case Home” for a given case which is used for review operation. You can provision additional nodes for review operations. For more details, see the Symantec eDiscovery Platform Distributed Architecture Deployment Guide 8.0.

Page 25: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installation workflow

25

Installing Utility Node Locate the Utility Node installer file at D:\<version>_V80_utilitynode\InstallClearWell.bat.

Follow the procedures described in the Symantec eDiscovery Platform Utility Node Guide 8.0.

Installing Sub-Nodes Perform the following steps:

1. Installing Symantec eDiscovery Platform on a Sub-Node

2. Configuring the Sub-Nodes

3. Performing post-installation steps

Page 26: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

26 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

Installing Symantec eDiscovery Platform on a Sub-Node

To install Symantec eDiscovery Platform on a Sub-Node:

1. Log in to the machine as the Administrator. This must be the same user account that will be used for IGC services. Unzip the installer into a temporary directory. After the files are unzipped, double-click on the InstallSubNode.bat file (as shown).

The Open File dialog appears.

2. Click Run.

3. If Microsoft .NET Framework 3.5 SP1 is not installed, then you will be required to install it before installation can proceed. At the prompt to begin installation, click Install.

You must reboot after installation of Microsoft .NET.

4. After installing Microsoft .NET and rebooting the system, proceed with re-launching the installer InstallSubNode.bat. The Clearwell screen appears displaying the version being installed. Click Next.

5. Read and acknowledge acceptance of the terms of the Symantec license agreement. Click Next.

Page 27: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

27

6. For Setup type, leave the default selection, Complete, and click Next.

Selecting “Custom” displays the Select Features screen showing the third party components to be installed on the Sub-Node. Click Next.

Note: Be sure you have a valid Microsoft Office 2010 license key ready to enter.

Note: Third party components are not configurable.

A warning is issued to install Apple QuickTime 7.5.1 or later and to enable Desktop Experience to support audio processing. This is optional for users that have an Enterprise Audio Processing license. Symantec recommends to install Apple QuickTime 7.5.1 or later to process audio content in video files that cannot be processed by the default codecs. The audio/media files include MOV, QT, MP3, and MP4 files.

Note: Users with an Enterprise Audio Processing license should enable Desktop Experience only after the Clearwell installation is complete.

Page 28: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

28 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

Click OK to continue the installation.

The system asks if you want to enable Nexidia services on this Sub-Node.

Note: You must not enable Nexidia services on more than one Sub-Node in a node group.

If you already have enabled Nexidia services on another Sub-Node in the same node group, click No. Else, click Yes to enable Nexidia services on this Sub-Node.

Page 29: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

29

A pre-requisite warning about free space requirement and Windows updates is issued. Click Yes to continue the installation.

A warning is issued about Symantec Enterprise vault API Runtime version. Click OK to continue the installation.

Note: Select “Custom” only to view the individual software components that will be installed, but do not change any of the default selections which are required as part of the installation.

Page 30: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

30 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

7. Check that the time zone settings are correct, and click OK.

Page 31: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

31

8. Default credentials for the various services are populated, but can be changed. When finished, click Next.

Note: For the EsaSubShellService service, use the same domain user account used for the EsaApplicationService service on the Cluster Node. These domain user accounts must have administrative privileges and should be members of the Local Administrator group on the appliance.

Note: Credentials can be changed on the Clearwell Service Information screen, if required. See the Guidelines for Domain user Accounts section in the Symantec eDiscovery Platform Installation Guide 8.0.

Page 32: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

32 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

9. A warning is issued if the “Log On As” account used for the Muhimbi Document Converter Service Account (Image Helper Service Account) overlaps with other service accounts or the IGC service account. Make sure you use a “Log On Account” as mentioned in the Guidelines for Domain User Accounts section. Click OK to continue the installation.

10. A confirmation message about service account appears. Click OK to continue

the installation.

11. If you have selected the Let Clearwell manage Firewall option on the

Clearwell Service Information screen and also have preferred to enable Nexidia services on this Sub-Node, a warning appears to disable the firewall. Click Yes.

12. A message appears, asking “Do you have an Office 2010 license key?” If you

click Yes, the Microsoft Office 2010 License Key screen appears, continue to step 19.

If you click No, an evaluation version without a license is installed and you can skip to step 20.

Page 33: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

33

13. Enter your Microsoft Office 2010 25-digit license key. Click Next.

IMPORTANT! If you enter an invalid license key, an error message appears prompting you to re-enter the key. If you do not have a valid license key, then the installation proceeds using an evaluation copy license. Once the installation completes, you will need to activate your license with a valid license key in order to run the product.

14. Enter the FQDN or IP address of the Cluster Node.

15. Since the D: drive is shared among the Cluster Node and the Sub-Nodes, the

installer asks if you want to remap the D: drive. Click Yes to remap the drive. Else, click No.

Page 34: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

34 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

16. The Ready to Install Clearwell Software screen displays the program files selected for installation. Click Next.

17. The installer will go through various steps – no intervention is required.

18. When the installer prompts for Lotus Notes initialization, click Yes to initialize Lotus Notes.

Page 35: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

35

Initialization instructions and screenshots are documented in the next steps, but are also shown in the dialog message that displays.

Click OK to continue. You must perform the next steps to manually initialize Lotus Notes.

Note: Even if you have a Domino server, you must complete the Lotus Notes installation to complete the installation of Symantec Clearwell eDiscovery Platform.

19. Use Remote Desktop to the server with a second connection in order to proceed with the initialization of Lotus Notes. Logon to the appliance with the account credential provided in the NSF Retriever or Crawler service (if not already done so).

Page 36: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

36 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

Go to Start > (All) Programs > Lotus Applications > Lotus Notes 8.5 to launch the Notes client. Click Next.

20. Enter “Clearwell” in the name field and clear (deselect) the option I want to

connect to a Domino server. Click Next.

Note: If you are using a Domino server, then keep the option I want to connect to a Domino server selected and then enter the Domino settings on the following screens.

Page 37: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

37

21. Select Directory server (LDAP). Click Next.

22. In the field for Directory LDAP server, type “ldap.ign.ibm.com”.

Click Next to complete Lotus Notes setup.

Note: You might receive a popup box stating: "Lotus Notes is not currently set as your default email program. Would you like to set it now?" Make sure that Lotus Notes is not set as the default mail client during the Lotus Notes client installation. Microsoft Office Outlook should be the default mail client.

Page 38: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

38 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

23. On the Getting started screen, close Lotus Notes and select the option In the future, exit without prompting.

24. Go back to the InstallShield dialog and click OK to continue.

25. Clearwell continues the installation. After installation completes, select Finish to reboot the system.

26. After the Sub-Node installation is complete, configure the Sub-Nodes. Follow

the steps described in the following sections.

Page 39: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

39

Configuring the Sub-Nodes When your environment demands to use a particular Sub-Node for a specific component or a set of components, then you can manually assign node roles to the Sub-Nodes in your setup.

To configure the Sub-Nodes:

1. Logon to Symantec eDiscovery Platform.

2. On the Systems tab, click the Support Features tab.

3. Select the Configure SubNodes option from the support feature list.

4. Select Export from the Action list and then click Submit. This action exports

the current/default configuration as an XML file.

For example, the default XML file may look like the following:

<?xml version='1.0' encoding='UTF-8'?> <ClusterTopology> <ClusterNode hostname="ClusterNode1.teneo-test.local" master="true"> <NodeRole> <Role>syscomp</Role> </NodeRole> </ClusterNode> <ClusterNode hostname=“ClusterNode2.teneo-test.local”/> </ClusterTopology>

5. Update the XML file to add the Sub-Nodes to their corresponding parent Cluster Nodes.

Page 40: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

40 Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

6. Update the XML file as shown below (an example) to connect Sub-Nodes in a configuration mentioned in the Multiple Cluster Node setup section.

<?xml version='1.0' encoding='UTF-8'?> <ClusterTopology> <ClusterNode hostname=" ClusterNode1.teneo-test.local " master="true"> <NodeRoles> <Role>syscomp</Role> </NodeRoles> <SubNode hostname=" SubNode1.teneo-test.local "> <NodeRoles> <Role>remotejob</Role> <Role>searchcache</Role> <Role>validator</Role> <Role>thread</Role> </NodeRoles> </SubNode> <SubNode hostname=" SubNode2.teneo-test.local "> <NodeRoles> <Role>conversion</Role> <Role>processpool</Role> <Role>indexstatistics</Role> <Role>imaginganalysis</Role> </NodeRoles> </SubNode> <SubNode hostname=" SubNode3.teneo-test.local "> <NodeRoles> <Role>32bitcomp</Role> <Role>tiffvalidation</Role> <Role>indexer</Role> <Role>remote32biticpjob</Role> <Role>remoteicpjob</Role> <Role>predictionjob</Role> <Role>topic</Role> <Role>exportprocesspool</Role> </NodeRoles> </SubNode> <SubNode hostname=" SubNode4.teneo-test.local "> <NodeRoles> <Role>xmlexport</Role> <Role>ap</Role> <Role>text</Role> <Role>analytics</Role> </NodeRoles> </SubNode> </ClusterNode> </ClusterTopology>

Page 41: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Installing Symantec eDiscovery Platform on a Sub-Node

41

7. Import the above xml configuration by either pasting the contents of the XML file or by specifying the fully qualified XML file name in the Enter Fully Qualified Path of XML File(IMPORT) text box on the UI. Click Submit.

8. Export the newly imported Sub-Node configuration to verify that the updated configuration is as per expectations. Perform the steps listed in Validate the Sub-Node Installation.

Note: Alternatively, you can also assign node roles to the Sub-Nodes using the command: b cluster-admin setNodeRoles subNodeHost:port roleOne,roleTwo,roleThree Here, the length of the comma-separated list of node roles must not exceed a limit of 255 characters.

Page 42: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

42 Installation and Configuration

Performing post-installation steps

Performing post-installation steps The following steps should be performed after the Sub-Node installation is complete.

Validate the Sub-Node Installation Validate the Sub-Node configuration by using the following command.

b subnode-admin check Host: Port

This command shows if there’s a node role misconfiguration, if any Sub-Nodes are down, and if nodes are down that would affect the ability to start any components.

You can also perform the following checks to validate the Sub-Node configuration:

• For each of the nodes, make sure that the applicable services are running.

• Make sure that you can login to Cluster Node as an administrator.

• Process a small set of documents and run post processing.

• Search for a few known documents and review the documents.

• Export and produce documents.

Check the log files to make sure that the components such as Indexer, Search analytics are starting on Sub-Nodes and Crawlers and export related components are running on Utility Nodes.

Check the following log file on Cluster-Nodes:

subshell-<hostname>.yyyy-mm-dd.log

These log files provide information about which components are running on each of the Sub-Nodes.

You can also see the server log files with names like server.yyyy-mm.dd.log for informational messages indicating start and completion times of components.

Set up your system for audio processing If you want to use this Sub-Node for audio processing and have installed the Nexidia services, set you your system for audio processing. Follow the procedures described in the Optional: Setting Up Your System for Audio Processing section of the Symantec eDiscovery Platform Installation Guide 8.0.

Page 43: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Performing post-installation steps

43

Verify the Audio Services On Sub-Nodes, make sure that Audio services are running on only one Sub-Node in a given node group. If this was not done during installation, the following commands can be used post-installation to enable or disable the audio services.

To enable and start the audio services, run the following command:

b start-audio-services

To stop the audio services and disable them, run the following command:

b stop-audio-services

Verify the services on Sub-Nodes After the Sub-Node installation is successfully completed, verify that the EsaSubShellService service is started on all Sub-Nodes.

Verify the Windows services on Utility Nodes Verify that the following Windows services are running on each Utility Node.

EsaApplicationService : FireDaemon

EsaIGCBravaLicenseService

EsaIGCJobProcessor

EsaNsfCrawlerService

EsaNsfRetrieverService

EsaPstCrawlerService

EsaPstRetrieverService

EsaImageHelper (If Muhimbi Document Converter Service is enabled)

Page 44: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

44 Installation and Configuration

Performing post-installation steps

Configure Muhimbi Document Converter Services You must not enable the Muhimbi Document Converter services on the Cluster Node and Sub-Nodes. You should enable this service only on a Utility Node.

See the Symantec eDiscovery Platform Utility Node Guide 8.0 for more details.

To disable the Muhimbi Image Helper Service on the parent Cluster Node:

1. From the System > Support Features screen, choose the ESA Image Helper Service Management support feature.

2. Select the parent cluster node where you want to disable the

EsaImageHelper service: <machine name>.

3. Select the following parameter: DISABLE_SERVICE.

4. Click Submit.

Note: After clicking Submit, the text message “Node is DISABLED” should display to confirm that the service has been disabled.

Page 45: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Performing post-installation steps

45

Verify the Cluster Node configuration You must disable the Document Imaging, Text Extraction, and Document Retrieval roles on the Cluster Node. These roles should only be enabled on Utility Nodes.

To configure roles on the Utility Node:

1. Logon to Symantec eDiscovery Platform.

2. On the System tab, click the Appliance tab.

3. Click on the appliance link.

4. Click the Appliance Roles tab.

5. Clear the check boxes for “Document Imaging, “Text Extraction “ and “Document Retrieval”. If you disable Document Retrieval, the Crawling is also disabled on the Cluster Nodes.

Page 46: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

46 Installation and Configuration

Performing post-installation steps

Update Virus Scanning Software (if applicable) Be sure to update your virus scanning exclusion rules after the install to account for any changes in folders and directory structure. For more information, see the Symantec e Discovery Platform Installation Guide 8.0.

You should perform this step on all nodes in a given cluster including the Cluster Node and its Sub-Nodes. Since the Sub-Nodes only have a C: drive, you can consider only those directories that reside on the C: drive.

EXCLUDE the following:

Muhimbi Document Converter For the Document Converter to work properly, allow access to port 41734.

D:\Clearwell Packages\Muhimbi Document Converter

JDK Software C:\jdk-7u51-windows-x32

C:\jdk-7u51-windows-x64

MySQL Database Software D:\mysql

D:\mysqltemp

D:\CW\<current_version>

And the subfolder: D:\CW\<current_version>\scratch\temp\esadb\attCacheDir\

Platform Installation D:\CWShared

Rights Management This directory only exists if you use the Rights Management feature

C:\Users\<username>\AppData\Local\Microsoft\DRM

Page 47: Symantec eDiscovery Platform™ - Veritas · Symantec eDiscovery Platform™: Sub-Node Installation Guide . The software described in this book is furnished under a license agreement

Installation and Configuration

Performing post-installation steps

47

Antivirus Exclusions for Audio Search By default, the Audio Search software is installed into the following directories and subdirectories. To avoid interference with critical media operations, be sure to disable virus and malware scanning software. In particular, Malwarebytes Anti-Malware, Kasperky Endpoint Security, and Microsoft Security Essentials are known to interfere with media operations. See (Optional) Setting Up Your System for Audio Processing for directory details.

C:\Program Files(86)\Nexidia

C:\Program Files(86)\Nexidia\Language Packs

C:\Program Files\Nexidia\Search Grid 2.0

D:\Nexidia

C:\Users\<username>\AppData\Local\Temp