Observium installation and configuration - houckyouseve
Not aware ago I came across a sort o curious system of monitoring Observium. I definite to establis it and configure it to look at it nearer. What attracted me is the simplicity of installation and configuration. Before that, I used Zabbix. In principle, also nothing complex to arrange in that respect, but Observium still to install and configure much easier. And today I will William Tell in point how to do it.
My instruction will be based happening the original blue-collar from the developer's situation. But non in completely. First, I translate all the points. Secondly, around bequeath be smaller changes and comments related to the fact that we will make up installing Observium on CentOS 7 version. Thirdly, I examples will show you how to add devices for monitoring in the arrangement. If you don't hold a CentOS scheme setup, you terminate configure my clause on this topic.
Preparing CentOS 7 to install Observium
So, we make:
# cat /etc/redhat-release CentOS Linux press release 7.0.1406 (Kernel)
First, disable SELinux:
# cat /etc/sysconfig/selinux # This file controls the state of SELinux on the system. # SELINUX= can select one of these three values: # enforcing - SELinux security insurance policy is enforced. # indulgent - SELinux prints warnings instead of enforcing. # disabled - No SELinux insurance policy is loaded. SELINUX=enforcing # SELINUXTYPE= seat acquire one of these deuce values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only designated processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted
Change the value:
SELINUX=unfit
Boot:
# reboot
Add the necessary repositories EPEL and rpmforge:
# yum install epel-release
# rev --import HTTP://apt.SW.be/RPM-GPG-KEY.dag.txt # yum install HTTP://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el7.rf.x86_64.rpm
So install the required packages:
# yum set up wget httpd php php-mysql php-gd php-posix php-mcrypt php-pear php-pear.noarch vixie-cron net-snmp net-snmp-utils fping mariadb mariadb-server MySQL-python rrdtool subversion jwhois ipmitool graphviz ImageMagick
Centos 7 installs MariaDB as an alternative of MySQL, which has broad compatibility with MySQL, including understands all her commands. Yet, the military service is titled MariaDB. Run IT and put this in the startup:
# systemctl start mariadb.servicing # systemctl enable mariadb.service ln-s '/usr/lib/systemd/system/mariadb.service' '/etc/systemd/system/multi-drug user.target.wants/mariadb.service'
Run the script security settings:
# /usr/bin/mysql_secure_installation /usr/bin/mysql_secure_installation: line 379: find_mysql_client: bid not found NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MariaDB SERVERS IN Product USE! Delight Show To each one Step out CAREFULLY! Ready to log into MariaDB to secure IT, we'll call for the current watchword for the root user. If you've scarce installed MariaDB, and you harbour't set the root parole until no, the password will be blank, then you should just crusade enter here. Enter current password for root (move in for none): OK, successfully used password, ahorse on...Setting the root password ensures that cypher sack logarithm into the MariaDB root user without the proper authorisation. Set root password? [Y/n] y New parole: Rhenium-enter new password: Password updated successfully! Reloading exclusive right tables.. ... Success! Aside default, a MariaDB installment has an anonymous exploiter, allowing anyone to log into MariaDB without having to have a exploiter describe created for them. This is knowing solitary for testing, and to make the induction go a bit smoother. You should remove them before moving into a production environment. Remove anonymous users? [Y/n] y ... Success! Normally, root should only beryllium allowed to link up from 'localhost'. This ensures that someone cannot guess at the root countersign from the network. Disallow root login remotely? [Y/n] y ... Success! By default, MariaDB comes with a database named 'run' that anyone dismiss access. This is also intended only for testing, and should be remote earlier waving into a production surroundings. Remove test database and access to it? [Y/n] y - Dropping test database... ... Success! - Removing privileges on test database... ... Achiever!Reloading the privilege tables will ensure that all changes ready-made so far will take effect in real time. Reload prerogative tables now? [Y/n] y ... Success! Cleaning leading... All done! If you've completed all of the above steps, your MariaDB installation should now be secure. Thanks for using MariaDB!
Disable the firewall or configure it separately. I don't deficiency to touch the settings of the firewall in this clause:
# systemctl stop firewalld && systemctl disable firewalld
Installed Observium
Away default option, Observium is installed into the pamphlet /opt. Go down there
cd /opt
Download and unpack the archive with the monitoring:
# wget http://www.observium.org/observium-residential district-latest.old salt.gz # Jack zxvf observium-community-latest.tar.gz
Go to the folder with the installation:
# compact disc observium
Now we need to produce a database and a user for monitoring system Observium:
# mysql-u root-p MariaDB [(no)]> CREATE DATABASE observium DEFAULT Eccentric SET utf8 COLLATE utf8_general_ci; MariaDB [(none)]> CREATE USER 'observium'@'localhost' Known BY '12345678'; MariaDB [(no)]> Assignment ALL PRIVILEGES Connected observium.* TO 'observium'@'localhost' IDENTIFIED BY '12345678';
Create a configuration file of our server monitoring:
# cp config.php.default config.php
At the end of the file add the line:
$config['fping'] = "/usr/sbin/fping";
At the showtime of the editable connectedness parameters to the MySQL host:
// Database config $config['db_host'] = 'localhost'; $config['db_user'] = 'observium'; $config['db_pass'] = '12345678'; $config['db_name'] = 'observium';
Run the handwriting to make over the database:
# php includes/update/update.php
Create the directories for logs and RRD graphs:
# mkdir rrd # mkdir logs # chown-R apache:Apache /opt/observium
Now let's blue-pencil the configuration file httpd. Added to the stop of /etc/httpd/conf/httpd.conf
<VirtualHost *:80> DocumentRoot /prefer/observium/html/ ServerName observium.land.com CustomLog /opt/observium/logs/access_log conjunct ErrorLog /opt/observium/logs/error_log <Directory "/opt/observium/hypertext mark-up language/"> AllowOverride All Options FollowSymLinks MultiViews Require all granted </Directory> </VirtualHost>
Track down httpd and minimal brain damage it to the startup:
# systemctl start httpd # systemctl enable httpd
Create a user with administrator rights observium:
# cd /opt/observium # ./adduser.php admin 12345678 10 Observium CE 0.14.11.6000 Add User Drug user admin added successfully.
Create a file of cron job varan:
# touch /etc/cron.d/observium
Add there:
33 */6 * * * pull /opt/observium/discovery.php -h all >> /dev/nix 2>&1 */5 * * * * root /opt/observium/discovery.php -h late >> /dev/null 2>&1 */5 * * * * root /opt/observium/poller-wrapper.py 2 >> /dev/null 2>&1
Re-start crond:
# systemctl restart crond
The installation of the Observium monitoring server is finished. You can attend configure and contribute nodes.
Custom Observium and add nodes monitoring
Move back to the monitoring Thomas Nelson Page at hypertext transfer protocol://IP-аdress/ Us greeted by a welcome sieve. Log on created by an administrator invoice.
Hyperkinetic syndrome the system local server on which you have installed our monitoring. Observium collects information via snmp. Sol we are going to configure the snmp server. He has a lot of settings, for example, will use the most round-eyed and quick form. So, open the file /etc/snmp/snmp.conf and give information technology to the following form:
rocommunity public syslocation "local-host" syscontact root@localhost
Run and added to startup snmpd:
# systemctl start snmpd # systemctl enable snmpd
To check if everything is fine to bug out:
# snmpwalk -v 2c -c public -O e 127.0.0.1
Should print a bunch of rows with data.
Now tot a new device to Observium via the web user interface. To do this, prize Devices -> Add Gimmick. Add our server:
Now in the list of devices will be the local waiter. You can either time lag until the cron will poll the server or cause information technology manually in the solace:
# cd /opt/observium # ./discovery.php -h all # ./poller.php -h all
Information collected from the server, you can verify via the vane interface. While graphs will be empty but eventually filled in. Thus you can add any supported gimmick, do not blank out to enable and configure snmp on them.
The installation and frame-up are finished, use the convenient and informative system of monitoring Observium.
You have With success Subscribed!
Source: https://sprintally.com/observium-installation-and-configuration/
Posted by: houckyouseve.blogspot.com
0 Response to "Observium installation and configuration - houckyouseve"
Post a Comment