Configuring the event processor for a secure connection
To prepare the event processor (EP) for secure connections, configure the secure HTTP connector. You can configure the EP for a secure connection in either a high availability or non-high availability environment.
In a high availability environment, every event processor's keystore certificate must be trusted by your other event processors in the cluster. In every event processor's truststore, you must include the certificate. You can use the same keystore and truststore files for every event processor in your high availability environment. You might receive a browser security warning when you access the web console on an event processor where the common name does not match the host name that you are connecting to.
- If necessary, stop the EP.
Use one of the following methods to run the configCC utility:
Microsoft Windows UNIX Double-click configCC.bat in installation directory\bin. Run the configCC.sh utility from installation directory/bin.
- Answer N (no) to questions in other sections until you reach the secure HTTP server section of configCC.
- Specify a port for the secure HTTP connector server to listen on.
- Restart the IBM Sterling Control Center Monitor EP.