Running the installation program in silent mode

You can silently install IBM® Content Classification according to options that are specified in a response file. Silent installations are useful when you want to install the same configuration on different computers.

Start of change

Before you begin

For AIX®, Linux, or Solaris: Open the /etc/hosts file on the computer on which you plan to install Content Classification and verify that there are localhost entries for the unqualified computer name. For example:

127.0.0.1  localhost ComputerName
::1  localhost ComputerName

Ensure that only the unqualified computer name is listed in the localhost entries. The domain name should not be specified. For example, the entries should not specify ComputerName.DomainName.

End of change

About this task

Each time that you run the installation program in graphical or console mode, the installation program saves your settings in a response file that you can edit and use to run silent installations on other computers. The installation program saves the settings in the SilentInstall/ICM88_response.txt file under the IBM Content Classification installation directory.

Alternatively, you can create a response file by editing the sample ICM88_response_template.txt file. This file is included in the installation package and is also installed in the SilentInstall directory. The sample response file is configured to install all components in the default installation directory by using the default settings. For information about customizing the settings, see the comments in the sample response file.

After you edit the response file, run the installation program in silent mode and specify the full path to the response file. For example, enter the following command on Windows:

classificationsetup88_win32.exe -i silent -f C:\ICM88_response.txt

The values that you specify in the response file are applied when the installation program runs.

Important: Start of change Install Content Classification components behind a firewall. For more information, see Firewall configuration. End of change