Open a terminal window on the designated node to be the database server (begin with the primary database server).

  1. Access the RPM files required for installation from the same directory where you download the files using the following command. For example, if you create a Siemplify user and RPMS are downloaded in the home directory of the user:
    cd /home/siemplify
  1. Use the root user for the installation process. Change to root user using:
    sudo su -
  1. Open the HA DB rpms.zip file with the command:
    unzip HA DB rpms.zip
  1. Install the PostgreSQL with Repmgr using the command:
    yum install postgresql10*.rpm repmgr*.rpm unixODBC*.rpm libicu*.rpm tcl*.rpm -y
    You are notified when the installation is complete.
  1. Enable postgresql using the command:
    systemctl enable postgresql-10
  1. Create a PostgreSQL password using the command
    passwd postgres
    You will be asked to enter a new password as shown in the screenshot below.
  1. Access the postgresql shell to generate SSH keys. This ensures remote communication between the DB machines. Open the postgresql shell, using the command:
    su - postgres
  1. On the shell, generate SSH keys using the command:
    ssh-keygen -t rsa
  1. After you generate the SSH keys, add them to the other DB machine using the command:
    ssh-copy-id postgres@OTHER_IP (IP of the other DB machine)
  1. Once the keys are copied, exit the postgres shell and return to the root using the command:
    exit
  1. Install the policycoreutils-python package using the command:
    yum install -y policycoreutils-python
    This contains the management tools for the SELinux environment. SELinux is an access control system built into the Linux kernel. It enforces resource policies that defines the level of access that users, programs, and services have for a system.
  1. Next, check for the operations that SELinux denied permission to run during the installation and the reason for this using the command:
    audit2allow -w -a
    If all the operations ran smoothly, you can ignore the next step and continue to the Configure PosgreSQL procedure in the next article.
  1. If the operations were denied permissions, you will see this in the screenshot below. If this happens run the following commands to allow SSH key sharing:
    audit2allow -a -M sshd_read_postgres_ssh_authorized_keys
    semodule -i sshd_read_postgres_ssh_authorized_keys.pp

Need more help with this?
Click here to open a Support ticket

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.