Installation

Table Of Contents
2 Add a user for this database that has permission to create tables, views, and, in the case of Oracle,
triggers and sequences, as well as permission to read from and write to these objects.
For a Microsoft SQL Server database, do not use the Integrated Windows Authentication security model
method of authentication. Be sure to use the SQL Server Authentication method of authentication.
The database is created, but the schema is not installed until you congure the database in View
Administrator.
What to do next
Follow the instructions in “Congure the Event Database,” on page 128.
Prepare an SQL Server Database for Event Reporting
Before you can use View Administrator to congure an event database on Microsoft SQL Server, you must
congure the correct TCP/IP properties and verify that the server uses SQL Server Authentication.
Prerequisites
n
Create an SQL Server database for event reporting. See Add a Database and Database User for View
Events,” on page 127.
n
Verify that you have the required database privileges to congure the database.
n
Verify that the database server uses the SQL Server Authentication method of authentication. Do not
use Windows Authentication.
Procedure
1 Open SQL Server Conguration Manager and expand SQL Server YYYY Network .
2 Select Protocols for server_name.
3 In the list of protocols, right-click TCP/IP and select Properties.
4 Set the Enabled property to Yes.
5 Verify that a port is assigned or, if necessary, assign one.
For information on the static and dynamic ports and how to assign them, see the online help for the
SQL Server Conguration manager.
6 Verify that this port is not blocked by a rewall.
What to do next
Use View Administrator to connect the database to View Connection Server. Follow the instructions in
“Congure the Event Database,” on page 128.
Configure the Event Database
The event database stores information about View events as records in a database rather than in a log le.
You congure an event database after installing a View Connection Server instance. You need to congure
only one host in a View Connection Server group. The remaining hosts in the group are congured
automatically.
N The security of the database connection between the View Connection Server instance and an
external database is the responsibility of the administrator, although event trac is limited to information
about the health of the View environment. If you want to take extra precautions, you can secure this channel
through IPSec or other means, or you can deploy the database locally on the View Connection Server
computer.
View Installation
128 VMware, Inc.