Sciencelogic Installation 11-1-0 PDF
Sciencelogic Installation 11-1-0 PDF
1
Introduction to Installing SL1
Overview
This manual describes how to install and configure SL1. This manual includes the following topics:
What is SL1? 6
What is SL1 Extended? 7
The SL1 Agent 9
Third-Party Software 9
5
What is SL1?
In a Distributed system, there are four general functions that an SL1 appliance can perform: user interface,
Database Server, Data Collector, and Message Collectors. In large SL1 systems, dedicated appliances perform
each function. In smaller systems, some appliances perform multiple functions. In the All-In-One Appliance
system, a single SL1 appliance performs all four functions.
User Interface
Administrators and users access the user interface through a web browser. In the user interface, you can view
collected data and reports, define organizations and user accounts, define policies, view events, and create and
view tickets, among other tasks. The appliance that provides the user interface also generates all scheduled
reports and provides access to the ScienceLogic API. The following appliances provide the user interface:
l All-In-One Appliance. An All-In-One Appliance performs all functions, including providing the user
interface.
l Database Server. A Database Server can provide the user interface in addition to its database function.
l Administration Portal. A dedicated Administration Portal appliance can provide the user interface.
NOTE: The Administration Portal communicates only with the Database Server and no other SL1 appliance.
All connections between the Administration Portal and the Database Server are encrypted in both
directions.
Database Server
The appliance that provides the database function is responsible for:
6 What is SL1?
The following appliances can perform these database functions:
Data Collection
The SL1 appliances that retrieves data from monitored devices . In a distributed system, appliances that perform
the data collection function also perform some pre-processing of collected data and execute automation actions.
NOTE: The SL1 Agent can also be used to collect data from devices on which it can be installed. See the
System Requirements page of the Support Site for a complete list of operating systems and versions
supported by the agent. You can collect data from devices using only Data Collectors, using only the
SL1 Agent, or using a combination of both.
Message Collection
The SL1 appliances that receive and process inbound, asynchronous syslog and trap messages from monitored
devices.
o In distributed systems that use the SL1 agent, the Message Collector passes agent data to the
Database server. On these distributed systems, the Message Collector must be a stand-alone
appliance, not a combination Data Collector/Message Collector.
l Data Collector. A Data Collector can also perform the message collection function in addition to the data
collection function.
Compute
Compute nodes are the SL1 appliances that transport, process, and consume the data from Data Collectors and
the SL1 Agent. SL1 uses Docker and Kubernetes to deploy and manage these services. T
Load Balancer
The SL1 appliance that brokers communication with services running on the Compute Cluster. Services running
on the Compute Cluster are managed by Kubernetes. Therefore, a single service could be running on one
Compute node in the Compute Cluster; to provide scale, multiple instances of a single service could be running
on one, many, or all nodes in the Compute Cluster. To provide scale and resiliency, you can include multiple
Load Balancers in your configuration.
Storage
SL1 Extended includes a Storage Cluster that includes multiple Storage Nodes and a Storage Manager. These
SL1 appliances provide a NoSQL alternative to the SL1 relational database. The Storage Cluster can store
performance and log data collected by the Data Collectors and the SL1 Agent.
Management
The Management Node allows administrators to install, configure, and update packages on the Compute
Nodes cluster, Storage Nodes , and the Load Balancer. The Management Node also allows administrators to
deploy and update services running on the Computer Cluster.
Similar to a Data Collector or Message Collector, the SL1 Agent collects data about infrastructure and
applications.
The agent can be configured to communicate with either the Message Collector or the Compute Cluster.
Third-Party Software
ScienceLogic does not support users installing third-party software on SL1 systems or users making unauthorized
changes to the configuration of SL1. Doing so voids any warranties, express or implied.
2
Preparing Hardware Appliances for SL1
Overview
This chapter describes how to prepare hardware appliances before installing SL1.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
Hardware Specifications 11
Prerequisites for SL1 Hardware Appliances 11
Initial Configuration for SL1 Hardware Appliances 11
Changing the Password for em7admin 11
Changing Network Settings 11
Ports for SL1 Hardware Appliances 13
10
Hardware Specifications
For details about supported ScienceLogic Hardware Appliances, see the ScienceLogic Support Site.
https://support.sciencelogic.com/s/system-requirements?tabset-e65a2=2
l Install the SL1 appliance in a server rack and connect the power cables according to the instructions
provided with the hardware.
l Connect the SL1 appliance to your network.
l Connect a monitor and keyboard to the SL1 appliance.
1. Either go to the console of the SL1 appliance or use SSH to access the server.
2. Log in as user em7admin with the appropriate password. The default password is em7admin.
3. At the shell prompt, type the following:
passwd
11 Hardware Specifications
1. Either go to the console of the SL1 appliance or use SSH to access the server.
2. Login as user em7admin with the appropriate password.
3. Enter the following at the command line:
sudo ifconfig
5. Examine the output, find the first interface in the output, and note its name.
6. Use the vi editor to edit the settings for the interface. To do this, enter the following at the command line:
sudo vi /etc/sysconfig/network-scripts/ifcfg-ens32
TYPE=Ethernet
BOOTPROTO=none
DNS1=10.64.20.33
DEFROUTE=yes
IPV4_FAILURE_FATAL=no
IPV6INIT=yes
IPV6_AUTOCONF=yes
IPV6_DEFROUTE=yes
IPV6_FAILURE_FATAL=no
NAME=ens32
UUID=d471435d-9adf-47c9-b3f3-32f61dccbad8
DEVICE=ens32
ONBOOT=yes
IPADDR=10.64.68.20
PREFIX=24
GATEWAY=10.64.68.1
IPV6_PEERDNS=yes
IPV6_PEERROUTES=yes
l DNS1=IP address of the DNS server that will be used by the SL1 appliance.
l IPADDR=IP address of the SL1 appliance.
l PREFIX=netmask for the SL1 appliance.
l GATEWAY=IP address of the network gateway that will be used by the SL1 appliance.
3
Preparing Virtual Machines for SL1
Overview
This chapter describes how to prepare virtual appliances before installing SL1.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
14
Virtual Machine Specifications
For details about supported hypervisors and the requirements and specifications for each SL1 appliance, see the
ScienceLogic Support Site: https://support.sciencelogic.com/s/system-requirements
NOTE: You must have already allocated an IP address for each SL1 appliance.
1. Database Server
2. Administration Portal (if applicable)
3. Data Collectors
4. Message Collectors (if applicable)
1. Using the vSphere client, connect to your VMware system as a user that has permissions to deploy a new
virtual machine and use the Create New Virtual Machine wizard to create a new virtual machine.
5. On the Network page, you must select VMXNET 3 in the Adapter field.
6. After completing the Create New Virtual Machine wizard, edit the settings for the virtual machine:
l Set the CPU and memory allocation to the values recommended in
https://support.sciencelogic.com/s/system-requirements
l Configure the CD/DVD drive to use the SL1 ISO file.
l If your appliance can connect to the Internet, use the yum utility to install the necessary packages.
l If you have an appliance that is not able to reach the Internet, you can retrieve the required packages from a
similar appliance that does have Internet access.
NOTE: When you install SL1 version 11.1.0 and higher, the installer checks if you are installing on a VM in
a vSphere environment. If true, the installer will automatically install VMware Tools.
1. Log in to the appliance as the em7admin user using the console or SSH.
2. Execute the following command:
sudo yum install open-vm-tools
If the installation was successful, the "Active" line in the output indicates VMware tools is "active (running)".
CAUTION: If the libtool-ltdl and libxslt packages were already installed on the host where you run the yum
downloadonly command in step 1, below, then those dependent packages will be listed as
missing and prevent you from installing VMware Tools. To work around this, remove those two
packages from the host before running the following procedure.
2. Once the download is complete, gather the downloaded RPM files into an archive file by running the
following command, where "vmtools.tgz" can be any filename you choose:
cd /var/tmp && tar cvfz vmtools.tgz vmtools
3. Transfer the archive file to the appliance that does not have Internet access, and extract the RPMs by running
the following command:
tar zxvf [name of the archive file]
6. To ensure that vmtoolsd starts automatically after a reboot, run the following command:
sudo systemctl enable vmtoolsd
If the installation was successful, the "Active" line in the output indicates VMware tools is "active (running)".
4
Required Ports
Overview
This chapter describes the required open ports on each SL1 appliance. These open ports allow communication
between appliances in an SL1 system.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
20
Open Ports on the ScienceLogic All-In-One Appliance
HTTP Interface HTTP from browser session on user workstation. ScienceLogic TCP 80
recommends disabling HTTP during deployment.
HTTPS Secure Interface Used for browser sessions on a user workstation, API requests TCP 443
from external systems, and requests from the ScienceLogic
Agent running on a monitored device.
Database Web Admin Optional. Administrative Web Interface (phpMyAdmin) from TCP 8008
browser session on user workstation to Database.
Web Configurator Configuration Utility from browser session on user workstation. TCP 7700
SNMP Optional. SNMP information about the All-In-One Appliance UDP 161
can be collected by SL1.
SNMP Traps Optional. Can receive SNMP traps from managed devices. UDP 162
Syslog messages Optional. Can receive syslog messages from managed devices. UDP 514
SMTP Optional. To receive inbound Email for tickets, events, and TCP 25
email round-trip monitoring.
DRBD Replication This port is open only if your All-In-One Appliance is configured TCP 7788
for Disaster Recovery.
HTTP Interface Optional. Can be used if the Database Server also serves as an TCP 80
Administration Portal.
HTTPS Secure Interface Optional. Can be used if the Database Server also serves as an TCP 443
Administration Portal.
Database Web Admin Optional. Administrative Web Interface (PHPMyAdmin) from TCP 8008
browser session on user workstation.
SSH Optional. Can be manually closed. For ssh sessions from user TCP 22
workstation.
Web Configurator Configuration Utility from browser session on user workstation. TCP 7700
SNMP Optional. SNMP information about the Database Server can be UDP 161
collected by SL1.
ScienceLogic HA Optional. Communication between Database Server and other TCP 694
Database Server(s) in a high-availability cluster.
High Availability One of two ports used by the cluster management process to UDP 5555
test cluster availability. This port is open only if your Database
Server appliance is configured for High Availability.
High Availability One of two ports used by the cluster management process to UDP 5556
test cluster availability. This port is open only if your Database
Server appliance is configured for High Availability.
DRBD Replication This port is open only if your Database Server appliance is TCP 7788
configured for High Availability, Disaster Recovery, or both.
PhoneHome This port is open only if your Database Server appliance is TCP 7705
Configuration configured for PhoneHome communication from Data
Collectors and Message Collectors. The port number is
configurable.
HTTPS Secure Interface Used for browser sessions on a user workstation and API TCP 443
requests from external systems.
Web Configurator Configuration Utility from browser session on user workstation. TCP 7700
SNMP Optional. SNMP information about the Administration Portal UDP 161
can be collected by SL1.
Data Pull Requests from Database Servers to retrieve collected data. In a TCP 7707
Phone Home configuration, this port is accessed via
an SSH tunnel created by the Data Collector.
Web Configurator Configuration Utility from browser session on user workstation. TCP 7700
SNMP Optional. SNMP information about the Data Collector can be UDP 161
collected by SL1.
SNMP Traps Optional. Can receive SNMP traps from managed devices. UDP 162
Syslog messages Optional. Can receive syslog messages from managed devices. UDP 514
HTTPS Secure Interface Optional. Data from the ScienceLogic Agent running on a TCP 443
monitored device.
Data Pull Requests from Database Servers to retrieve collected data. In a TCP 7707
Phone Home configuration, this port is accessed via
an SSH tunnel created by the Message Collector.
Web Configurator Configuration Utility from browser session on user workstation. TCP 7700
SNMP Optional. SNMP information about the Message Collector can UDP 161
be collected by SL1.
SNMP Traps Optional. Can receive SNMP traps from managed devices. UDP 162
Syslog messages Optional. Can receive syslog messages from managed devices. UDP 514
HTTPS Secure Interface Optional. Data from the ScienceLogic Agent running on a TCP 443
monitored device.
5
Installing SL1 on Hardware Appliances and
Virtual Appliances
Overview
This chapter describes how to install SL1 on hardware Appliances or on virtual machines.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
Prerequisites 26
Upgrading 26
Installing the Database Server 26
Installing the Administration Portal, Data Collector and/or Message Collector 30
Licensing the SL1 Appliances 32
Additional Steps for SL1 10.1 32
25
Prerequisites
To perform the steps in this section:
l You must have already performed the prerequisites for all the ScienceLogic Hardware Appliances in your
SL1 stack or for all the Virtual Appliances in your SL1 stack.
l You must have a valid customer account that allows you to download the SL1 ISO. For details, contact your
Customer Success Manager.
l You must download the SL1 ISO.
l Mount the SL1 ISO on each virtual appliance.
l You must have access to the files for your SSL certificate.
l You must have a valid customer account that allows you to access the Artifactory page on the ScienceLogic
Support Site. For details, contact your Customer Success Manager.
CAUTION: ScienceLogic does not support vmotion or VMware Snapshots for backups of data. For backup
purposes, ScienceLogic supports only SL1 backups to remote storage. vmotion andVMware
Snapshots can cause SL1 outages. For details on SL1 backups, see the chapter on Backup
Management in the System Administration manual.
Upgrading
For detailed upgrade instructions, see the chapter on Upgrading SL1, in the System Administration manual.
26 Prerequisites
1. Boot the appliance from the SL1 ISO. The Installation window appears.
NOTE: If you are using Hyper-V, check that the ScienceLogic installation ISO mounted correctly and
that the Virtual Machine displays the install screen. To do this, right-click the Virtual Machine
in inventory and select Connect or View and then Connect via Console.
9. Select [Continue].
10. The System Password window appears:
You can use the following instructions to build the Administration Portal, and one or more Data Collectors and
Message Collectors.
5. After the installer for the selected appliance type is loaded, the Network Configuration window appears.
9. Type the password for the em7admin user on the operating system and select [Continue].
10. Type the password for the em7admin user again and select [Continue].
11. If you are using a VMware instance, after the appliance reboots, follow the instructions to install VMware
tools.
12. Follow the instructions to configure the appliance in the Web Configuration Tool.
For SL1 versions later than 10.1.5.1, jemalloc is included with the platform. For SL1 versions prior to
10.1.0, jemalloc is included with the platform.
To avoid problems with memory usage on Database Servers, perform the following steps after upgrading
MariaDB for 10.1.x.
NOTE: Perform these steps first on the active Database Server and then on each additional Database
Server in your SL1 System.
If the Database Server is not currently running jemalloc, the shell will display the following:
If the file does not exist, contact ScienceLogic Customer Support to request the file jemalloc-3.6.0-
1.el7.x86_64.rpm.
To install the RPM, use a file-transfer utility, copy the file to a directory on the SL1 appliance. Then enter the
following commands at the shell prompt:
cd /usr/lib64
sudo yum install jemalloc-3.6.0-1.el7.x86_64.rpm
To restart the standalone Database Server or the primary Database Server in a cluster, enter the
following:
sudo systemctl restart mariadb
b. Select 1.
c. When prompted to put the Database Server into maintenance, select y.
d. Open an SSH session to the primary Database Server. To pause SL1, enter the following command at
the shell prompt:
sudo touch /tmp/.proc_mgr_pause
e. In the SSH session for the secondary Database Server, restart MariaDB:
crm resource restart mysql
f. After MariaDB has restarted successfully on the secondary Database Server, return to the SSH session
on the primary Database Server. Remove the pause file for SL1 using the following command:
sudo rm /tmp/.proc_mgr_pause
g. In the SSH session on the secondary Database Server, take the Database Server out of maintenance.
At the shell prompt, enter:
coro_config
h. Select 1.
i. When prompted to take the Database Server out of maintenance, select y.
9. To verify that jemalloc is running on the Database Server, enter the following command at the shell prompt:
silo_mysql -e 'show global variables like "version_malloc_library"'
If the Database Server is currently running jemalloc, the shell will display something like the following:
10. Perform these steps on each Database Server in your SL1 system.
6
Licensing and Configuring an Appliance
Overview
This chapter describes how to license an SL1 appliance and add it to your SL1 system.
Upon installation, SL1 appliances are automatically licensed for 30 days. During these 30 days, you can perform
the steps to obtain a permanent license from ScienceLogic.
SL1 appliances automatically generate a Registration Key file. This file is used by ScienceLogic to generate a
unique License Key file. You must not edit or alter the Registration Key file. While performing the steps
described in this chapter, you must obtain a License Key file by providing the Registration Key file to ScienceLogic.
For distributed SL1 systems, you must license the Database Server first. All other SL1 appliances in a distributed
SL1 system depend on the Database Server for registration.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
35
Defining the NTP Server 45
Creating a Bonded Interface 47
Defining a Proxy Server 49
36
Logging in to the Web Configuration Utility
Perform the following steps to log in to the Web Configuration Utility:
1. You can log in to the Web Configuration Utility using any web browser supported by SL1. The address of the
Web Configuration Utility is in the following format:
https://ip-address-of-appliance:7700
NOTE: For AWS instances, ip-address-of-appliance is the public IP for the AWS instance. To locate
the public IP address for an AWS instance, go to AWS, go to the Instances page, and
highlight an instance. The Description tab in the lower pane will display the public IP.
2. When prompted to enter your user name and password, log in as the "em7admin" user with either the
default password of em7admin or the password you configured.
NOTE: If you want to change the password for the Web Configuration Utility on all SL1 appliances, you must
log in to the Web Configuration Utility on each appliance and perform the steps in this section.
NOTE: You cannot change the username for the Web Configuration Utility. The username remains
em7admin.
1. Log in to the Web Configuration Utility. The Configuration Utilities page appears.
2. Click the [Device Settings] button. The Settings page appears.
4. Click [Save]
5. Perform steps 1-4 for each appliance for which you want to change the password for the Web Configuration
Utility.
1. Log in to the Web Configuration Utility. The Configuration Utilities page appears.
2. Click the [Licensing] button. The Licensing Step 1 page appears.
3. In the Licensing Step 1 page, click the [Generate a Registration Key] button.
4. When prompted, save the Registration Key file to your local disk.
5. Log in to the ScienceLogic Support Site (https://support.sciencelogic.com).
l Click your user name and from the menu select My Support and Customer Success.
l On the next page, click the [Submit a License Request] button.
l Fill out the Appliance Information form and click the [Submit License Request] button.
l In the Upload Appliance Registration Key field, click the[ Upload Files ]button and navigate to the
file where you saved the Registration Key file.
l ScienceLogic Customer Support will generate a license for the All-In-One Appliance or Database
Server.
7. In the Licensing Step 2 page, click the [Upload] button to upload the license file.
8. After navigating to and selecting the license file, click the [Submit] button to finalize the license. If the
license key is correct and has been saved successfully, the message "Success: Thank you for licensing your
ScienceLogic product!" appears.
o For an All-In-One Appliance with multiple Administration Portals, enter the IP address for the
All-In-One Appliance.
o If the Administration Portal and Database Server are AWS instances, supply the private IP
address for the Database Server. To find the private IP of an AWS instance, go to AWS, go to
the Instances page, and highlight an instance. The Description tab in the lower pane will
display the private IP.
l Database Username. Username for the database account that the Administration Portal will use to
communicate with the Database Server.
l Accept the default values in all other fields.
4. Click the [Save] button. You may now log out of the Web Configuration Utility.
NOTE: The instructions for configuring a Data Collector or Message Collector for PhoneHome configuration
differ from the instructions in this section. For details on configuring a Data Collector or Message
Collector for PhoneHome configuration, see the chapter on PhoneHome.
You must perform the following steps in the Web Configuration Utility to configure a Data Collector or a
Message Collector:
1. Log in to the Web Configuration Utility on the Data Collector or the Message Collector. The
Configuration Utilities page appears.
l Database IP Address. The IP address of the ScienceLogic Database Server(s). If more than one
Database Server will manage this appliance, type the IP addresses of the Database Servers,
separated by commas. If the Data Collector or the Message Collector and the Database Server are
AWS instances, supply the private IP address for the Database Server. To find the private IP of an
AWS instance, go to AWS, go to the Instances page, and highlight an instance. The Description tab
in the lower pane will display the private IP.
4. Click the [Save] button. You may now log out of the Web Configuration Utility.
5. Perform these steps for each Data Collector and Message Collector in your PhoneHome configuration.
To register a Data Collector or Message Collector with the main Database Server, perform the following steps:
1. In the address bar of your browser, type the IP address of the SL1 appliance that provides the user interface
for your SL1 system. The user interface is provided by either the Database Server or an Administration Portal.
The login screen appears.
2. Log in as the "em7admin" user with the password "em7admin".
3. If this is your first successful login, you will be asked to agree to the End-user License Agreement. Read the
End-user License Agreement then click the [I Agree to The Terms Outlined Above] button.
l Host Name. Enter the hostname of the Data Collector or Message Collector.
l IP Address. Enter the IP address of the Data Collector or Message Collector. If the Data Collector or
the Message Collector are AWS instances, supply the private IP address for the Data Collector or the
Message Collector. To find the private IP of an AWS instance, go to AWS, go to the Instances page,
and highlight an instance. The Description tab in the lower pane will display the private IP.
l Model Type. If you are configuring a Data Collector, select Data Collection Unit [5] from the drop-
down list. If you are configuring a Message Collector, select Message Collection Unit [6] from the
drop-down list.
l Description. Enter a description for the Data Collector or Message Collector. This field is optional.
6. Click the [Save] button. If the save is successful, the message "Appliance Registered" appears.
7. If you are using an AWS RDS system, select the wrench icon ( ) for the newly created Data Collector or
Message Collector. Supply values in the DB User field and the DB Password field.
NOTE: A device configured with Transport Layer Security (TLS) support for an rsyslog server can successfully
exchange messages with a SL1 appliance configured with TLS support for an rsyslog client.
1. Either go to the console of the SL1 appliance or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. Install the required Transport Layer Security (TLS) certificates by typing the following lines at the shell prompt:
NOTE: You might need to create a ca.d directory to contain the certificates needed for TLS encryption.
sudo vi /etc/rsyslog.d/siteconfig.conf
where:
l facility specifies a valid facility value. These categories provide a general description of the originator
of the message.
l priority specifies a valid priority value. These values specify severity.
l ip address of syslog server specifies the IP address of the syslog server that will monitor this SL1
appliance, usually a Data Collector or Message Collector.
NOTE: For details on valid facility and priority values, see https://docs.oracle.com/cd/E37670_
01/E36387/html/ol_log_sec.html.
From the Device Settings page of the Web Configuration Utility, you can edit the following time server files:
l chrony.d/servers.conf. This configuration file contains additional settings for the various chrony time
servers.
l chrony.conf. This configuration file contains settings related to the time server (chrony.d) used by SL1.
To configure a time server file:
1. Log in to the Web Configuration Utility. The Configuration Utilities page appears.
3. In the Edit Files section, click chrony.d/servers.conf. The Chrony.d/servers.conf Editor modal page
appears:
4. In the Chrony.d/servers.conf modal page, copy the first line that begins with server, such as server
0.rhel.pool.ntp.org iburst maxpoll 10.
5. Paste that line above the first line that begins with server.
6. Replace the hostname portion of the line with the IP address or fully qualified domain name of your
preferred time server.
7. You can delete the additional lines or leave them as additional time servers.
8. To save your changes, click Save and then close the modal window.
9. If you need to configure the time server (chrony.d) used by SL1, click chrony.conf in the Edit Files section of
the Settings page.
To the operating system, a bonded interface appears as a normal network interface. However, the bonded
interface uses a round-robin protocol to assign network traffic to the slave interfaces that make up the bonded
interface.
1. Log in to the Web Configuration Utility. The Configuration Utilities page appears.
2. Click the [Interfaces] button. The Interfaces page appears.
l Device ID. Required. ID for the bonded interface. Enter a string with the format:
bondN
where N is a number. For example, you could enter bond0, bond1, or bond64.
If the device ID already exists in the SL1 System, the SL1 system will display an error message.
For details on bonding options, see the Red Hat documentation on Bonding Interface Parameters:
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_
Guide/sec-Specific_Kernel_Module_Capabilities.html#s3-modules-bonding-directives
l Server URL. Type the URL of the proxy server. For example, "http://10.2.12.51".
l Port. Type the port on the proxy server to which the SL1 appliance will talk.
7. Click [Save].
7
Configuring SL1 for PhoneHome
Communication
Overview
This chapter explains how to configure SL1 to use PhoneHome Communication.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
51
Using the Command-Line Interface 74
Troubleshooting the PhoneHome Configuration 79
52
What is PhoneHome Communication?
SL1 supports two methods for communication between Database Servers and the Data Collectors and Message
Collectors in a system:
The traditional method. The Database Server initiates communication with each Data Collector and Message
Collector. The Database Server periodically pushes configuration data to the Data Collectors and Message
Collectors and retrieves data from the Data Collectors and Message Collectors. The collector administrator must
allow ingress communication from the Database Server on port 7707. The communication is encrypted using SSL
whenever possible.
The benefit of the traditional method is that communication to the Database Server is extremely limited, so the
Database Server remains as secure as possible.
The benefits of this method are that no firewall rules must be added on the network that contains the Data
Collectors, and no new TCP ports are opened on the network that contains the Data Collectors.
The PhoneHome configuration uses public key/private key authentication to maintain the security of the
Database Server. Each Data Collector is aligned with an SSH account on the Database Server and uses SSH to
communicate with the Database Server. Each SSH account on the Database Server is highly restricted, has no
login access, and cannot access a shell or execute commands on the Database Server.
NOTE: If you use a proxy in your PhoneHome configuration, perform the steps in the proxy section before
configuring the other steps in the PhoneHome configuration. The remaining configuration steps
require the proxy for communication.
1. Configure one or more Database Servers for PhoneHome. Each Database Server must have SL1
installed, have an IP address, and be licensed with ScienceLogic.
NOTE: If you are using a High Availability and Disaster Recovery configuration, see Configuring
PhoneHome for High Availability and Disaster Recovery to configure Database Servers.
2. Configure the Data Collectors and Message Collectors for PhoneHome. Each Data Collector or
Message Collector must have SL1 installed and have an IP address.
3. Define the Database Server associated with each Data Collector or Message Collector appliance.
4. Register the Data Collectors and Message Collectors in SL1.
5. As needed, define port forwarding for each collector to use SSH from the Database Server to access that
Data Collector or Message Collector.
6. See the Troubleshooting section for additional help.
Prerequisites 55
In 8.14.0 or later releases, PhoneHome configuration is stored in tables on the Database Server. The information
is accessible to all Database Servers in the SL1 system. Any Database Server in the SL1 system can provide
network access.
To configure a Database Server for PhoneHome communication, you must first perform the following required
steps:
1. Go to the console of the Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. For the Database Server, you must open a port to accept incoming connection requests. To do this, type the
following at the shell prompt:
where port_number is an unused port number greater than 1000. The Configuration Utility uses port 7705
as the default port. If you want to use the default port, specify 7705 in this command. To use a different
port, specify that port number in this command.
4. To define the Database Server (to itself), type the following at the shell prompt:
Created local: #0
Reloading sshd configurations
Created database: #11
Changing password for user: "phonehome11"
Created Device Id: "11"
Created token: "phonehome://11@71.97.6.197/ee4sdRRK8yNu"
6. Note the ID number for the database (11 in our example).
7. If the database is behind a firewall, you need to define the public-facing IP address of the Database Server
and also define the port to use for SSH communication from PhoneHome servers to the Database Server. To
do this, type the following at the shell prompt:
where appliance_ID is the value you noted in step 6, IP_address is the public-facing IP address, and port_
number is the port you want to use for SSH communication to and from the Database Server.
For example:
Before configuring a Data Collector and a Message Collector for use in a PhoneHome configuration, you must
first perform the following required steps:
NOTE: If your PhoneHome configuration uses proxy servers, do not use this section to configure a Data
Collector or Message Collector. See the section on proxy servers instead.
1. On the Data Collector or Message Collector, log in to the Web Configuration Utility using any web browser
supported by SL1. The address of the Web Configuration Utility is in the following format:
https://<IP_address_of_collector>:7700
2. Type the address of the Web Configuration Utility in the Address bar of your browser, replacing <IP_
address_of_collector> with the IP address of the Data Collector or Message Collector.
3. When prompted to enter your user name and password, log in as the "em7admin" user with either the
default password of em7admin or the password you configured.
l Hostname/IP. Type the Hostname or IP address of the Database Server that is configured for
PhoneHome.
l Port (if not 7705). Optional. Port number for SSH communications with the Database Server that is
configured for PhoneHome. If you are using a port other than 7705 on the Database Server, type the
port number in this field. Otherwise, leave this field blank.
NOTE: Do not close the browser window or navigate away from this page while the connection request is
being processed.
8. In a new browser window, open the ScienceLogic Web Configuration Utility for the Database Server. To do
this, type the following, replacing "ip-address-of-database" with the IP address of the Database Server:
https://<IP_address_of_database>:7700
9. When prompted to enter your username and password, log in as the "em7admin" user with either the default
password of em7admin or the password you configured. The main Configuration Utility page appears.
10. Click the [PhoneHome] button. The PhoneHome Database - Master page appears.
11. Note that the list of Collectors includes a request. Click the [Accept] button for that collector. The Status for
the Collector now displays as Approved.
13. Click the [Check Approval] button. Note that the Status message is now Configured - ID [phonehome_
user_number].
14. If you refresh the page, the status field displays the message Synced and Connected.
If you have a large number of collectors, you can perform the following steps to approve multiple collectors at the
same time:
1. On each Data Collector or Message Collector, follow steps 1-7 in the previous procedure to send the
connection request for each collector.
2. Open the ScienceLogic Web Configuration Utility for the Database Server and click the
[PhoneHome]button.
3. Click the [Accept All Collector Requests] button.
4. Open the ScienceLogic Web Configuration Utility for each collector, click the [PhoneHome]button, and
then click the [Check Approval] button.
5. Repeat step 4 until you have approved all of your collectors.
NOTE: Perform the steps in this section after you have successfully established a PhoneHome connection
between Data Collectors or Message Collectors and the main Database Server. The steps in this
section ensure that the SL1 system uses the loopback address that is assigned to each Data Collector
and Message Collector upon successful completion of a phonehome connection request.
1. In the address bar of your browser, type the IP address of the SL1 appliance that provides the user interface
for your SL1 system. The user interface is provided by either the Database Server or an Administration Portal.
The login page appears:
2. Log in as the "em7admin" user with the password "em7admin" (or the password you configured).
3. If this is your first successful login, you will be asked to agree to the End-user License Agreement. Read the
End-user License Agreement and then click the [I Agree to The Terms Outlined Above] button.
TIP: If you go to the Web Configuration Utility of the Database Server and click the PhoneHome button, you
can view a list of all the connected collectors, along with their IDs. The ID indicates the loopback
address. For example, if the ID of a given collector is 12, then its loopback address is 127.0.0.12.
l Model Type. Select the type of appliance (Data Collector or Message Collector) you are registering.
l Description. Type a description for the Data Collector or Message Collector. This field is optional.
1. Either go to the console of the Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. For each Data Collector and/or Message Collector, type the following at the shell prompt:
where:
For example:
4. For every other server in the PhoneHome configuration, go to the console of the Database Server or use
SSH to access the server.
5. Log in as user em7admin with the password you configured during setup.
6. Type the following at the shell prompt:
7. Now, whenever you are SSHed in to the Database Server, you can SSH to the Data Collector or Message
Collector.
8. To use the forward port, append "100" to the front of the port you defined in step #3 and use the loopback
IP of the Data Collector or Message Collector using port 10022:
If you want to use custom AutoSSH settings for a specific Data Collector or Message Collector in your
configuration, you can create the file /etc/phonehome/local.conf and define custom AutoSSH options for that
server.
1. Log in to the console of the Data Collector or Message Collector as the root user.
2. Open the file /etc/phonehome/local.confg with a text editor like vi:
vi /etc/phonehome/local.conf
3. Add one or more custom settings for AutoSSH. You can define:
l TCPKeepAlive = "yes or no". Specifies whether the client will send a null packet to the server (to keep
the connection alive). Uses the TCP layer to send the packet. The default value is "no". If you set this
value to zero (0), this feature is disabled. Your connection will drop if idle for too long.
l ServerAliveInterval = "number of seconds". The number of seconds the client will wait before sending
a null packet to the server (to keep the connection alive). Uses the SSH layer to send the packet. The
default value is "10". If you set this value to zero (0), this feature is disabled.
l StrictHostKeyChecking = "yes or no". If this flag is set to “yes”, AutoSSH will never automatically add
host keys to AutoSSH configuration and will refuse to connect to hosts whose host key has changed.
This option forces the user to manually add all new hosts. If this flag is set to “no”, ssh will
automatically add new host keys to the known hosts files. The default value is "no".
l ServerAliveCountMax = "number of messages". The maximum number of unacknowledged null
packets the client will send to the server (to keep the connection alive). After the maximum number of
unacknowledged null packets, the client will drop the SSH connection to the server. The default value
is "2". If you set this value to zero (0), this feature is disabled. Your connection will drop if idle for too
long.
l CUSTOM_PARAMS = "-o parameter = argument". Any additional SSH parameters can be
configured with this option. For example:
CUSTOM_PARAMS="-o ExitOnForwardFailure=yes"
NOTE: To determine the format for entries in the /etc/phonehome/local.confg file, see the file
/opt/em7/backend/phonehome/em7_ph_tunnels.
NOTE: You can use the same Database Servers in both a PhoneHome configuration and a traditional
configuration.
After performing the steps in this section, go the section on Configuring the Data Collectors and Message
Collectors to complete the configuration.
1. Go to the console of the primary Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. For the primary Database Server, you must first open a port to accept incoming connection requests. To do
this, type the following at the shell prompt:
sudo phonehome open-control-port port_number
where port_number is an unused port number greater than 1000. The default value in the Configuration
Utility is 7705. If you want to use the default port later in the Configuration Utility, specify "7705" in this
command.
4. To define the primary Database Server (to itself), type the following at the shell prompt:
sudo phonehome add database
6. Note the ID number for the primary Database Server (11 in our example).
For example:
8. Start the PhoneHome watchdog. To do so, type the following at the shell prompt:
sudo systemctl enable em7_ph_watchdog
sudo systemctl start em7_ph_watchdog
9. If your SL1 System uses multiple databases for high availability and/or disaster recovery, you must create a
record for the secondary Database Server on the primary Database Server. To do so, type the following at
the shell prompt:
sudo phonehome add database
11. Note the ID number for the secondary Database Server. You will need this value later in the configuration.
12. Copy and save the token for the secondary Database Server. You will need this value later in the
configuration.
13. To define the public-facing IP address of the secondary Database Server and the port to use for SSH
communications from PhoneHome servers to the secondary Database Server, type the following at the shell
prompt:
sudo phonehome set appliance_ID -ip=IP_address -port=port_number
where:
1. Either go to the console of the secondary Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. For the secondary Database Server, you must first open a port to accept incoming connection requests. To
do this, type the following at the shell prompt:
sudo phonehome open-control-port port_number
where:
l port_number is an unused port number greater than 1000. The default value in the
Configuration Utility is 7705. If you want to use the default value, specify "7705".
NOTE: ScienceLogic recommends that you use the same port number on each database in your PhoneHome
configuration.
4. To register the secondary Database Server, type the following at the shell prompt:
where:
l appliance_token is the URL you saved during step 11 in the section Configuring the Primary
Database for High Availability and Disaster Recovery.
Started synchronization
Synchronized: collectors
Synchronized: databases
Reloading sshd configurations
Finished synchronizations
NOTE: If your PhoneHome configuration uses proxy servers, do not use this section to configure a Data
Collector or Message Collector. See the section on proxy servers instead.
1. Either go to the console of the Database Server (or the new Collectors) or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. At the shell prompt, type the following:
sudo phonehome sync
4. Perform these steps on each Database Server, Data Collector, and Message Collector in your PhoneHome
configuration.
1. On the primary Database Server, perform the steps from the section Configuring the Primary Database
Server. These are the steps that define the secondary Database Server, including saving the token and
saving the new configuration.
2. On the new secondary Database Server, perform the steps from the section Configuring the Secondary
Database Server for High Availability and Disaster Recovery.
2. Either go to the console of the SL1 appliance or use SSH to access the new secondary Database Server. Log
in as "root".
4. At the shell prompt, type the following:
phonehome status
5. The new secondary Database Server should be connected to each Data Collector in the PhoneHome
configuration.
l Ensure that the SSH port is open on each Data Collector that acts as a proxy server.
l Ensure that the SSH port is open on each Database Server in the PhoneHome configuration.
NOTE: If you use a proxy in your PhoneHome configuration, perform the steps in this section before you
configure the other steps in this chapter. The other steps in the PhoneHome configuration will
require the proxy for communication.
1. Configure a Database Server for PhoneHome configuration as either a stand-alone Database Server
(Configuring the Database Servers) or a High Availability Database Server (Configuring the Database
Servers for High Availability)
2. Edit the ssh_config file.
3. Use the command line to configure Data Collectors that connect via proxy.
4. Copy the SSH key to each proxy.
5. Synchronize the Data Collectors with the Database Server.
NOTE: Perform these steps on the Data Collector that will be part of the PhoneHome configuration, not on
the Data Collector that will serve as a proxy server.
2. Log in as user em7admin with the password you configured during setup.
3. Open the file /etc/ssh/ssh_config with vi or another text editor:
sudo vi /etc/ssh/ssh_config
4. Add the following lines to the file:
Host hostname_of_primary_Database_Server
where:
proxy_hostname is the hostname of the proxy server that directly communicates with the Database
Server. If you have a chain of proxy servers, this value is the hostname of the last proxy server in that chain
(the proxy server that connects to the Database Server).
NOTE: If you use hostnames to configure proxy servers, you must use hostnames for all PhoneHome
configuration. If you use IP addresses to configure proxy servers, you must use IP addresses for all
PhoneHome configuration. You cannot mix hostnames and IP addresses in ssh_config and in
PhoneHome configuration.
5. If applicable, for all secondary databases, add the following lines to the file:
Host hostname_of_secondary_Database_Server
ProxyCommand ssh -q em7admin@proxy_hostname nc %h %p
where:
proxy_hostname is the hostname of the proxy server that directly communicates with the secondary
Database Server. If you have a chain of proxy servers, this value is the hostname of the last proxy server in
that chain (the proxy server that connects to the Database Server).
Host hostname_of_proxy_server
ProxyCommand ssh -q em7admin@proxy_hostname nc %h %p
where:
hostname_of_proxy_server is the hostname of the current proxy server (the proxy server you are creating an
entry for). For example, you could create an entry for "ProxyServer2".
proxy_hostname is the hostname of the proxy server that is previous in the chain and communicates with
the current proxy server. If your entry is for "ProxyServer2", you would specify "ProxyServer1" in this field.
PhoneHome Data Collector -> ProxyServer1 -> ProxyServer2 -> ProxyServer3 -> Database Server
Host ProxyServer2
ProxyCommand ssh -q em7admin@ProxyServer1 nc %h %p
Host ProxyServer3
ProxyCommand ssh -q em7admin@ProxyServer2 nc %h %p
Host EM7_DB1
ProxyCommand ssh -q em7admin@ProxyServer3 nc %h %p
PhoneHome Data Collector -> ProxyServer1 -> ProxyServer2 -> ProxyServer3 -> primary Database
Server
PhoneHome Data Collector -> ProxyServer1 -> ProxyServer2 -> ProxyServer3 -> secondary Database
Server
Host ProxyServer2
ProxyCommand ssh -q em7admin@ProxyServer1 nc %h %p
Host ProxyServer3
ProxyCommand ssh -q em7admin@ProxyServer2 nc %h %p
Host EM7_DB1
ProxyCommand ssh -q em7admin@ProxyServer3 nc %h %p
Host EM7_DB2
ProxyCommand ssh -q em7admin@ProxyServer3 nc %h %p
1. Either go to the console of the Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. For the Database Server, you must first open a port to accept incoming connection requests. To do this, type
the following at the shell prompt:
sudo phonehome open-control-port port_number
where:
4. To define the Data Collector (to the Database Server), type the following at the shell prompt:
NOTE: Perform these steps on the Data Collector that will be part of the PhoneHome configuration, not on
the Data Collector that will serve as a proxy server.
8. Register the Data Collector with the Database Server . To do this, type the following at the shell prompt:
where:
1. Either go to the console of the Data Collector that will be part of the PhoneHome configuration (not the
proxy server) or use SSH to access the server.
1. Either go to the console of the Database Server or use SSH to access the server.
2. Log in as user em7admin with the password you configured during setup.
3. At the shell prompt, type the following:
The watchdog service can also detect configuration changes. If the PhoneHome configuration changes, the
watchdog service will detect the changes and synchronize the configuration data on each device in the
PhoneHome configuration.
The watchdog service is started automatically on each Data Collector, Message Collector, and secondary
Database Server.
1. Log in to the console of the Data Collector, Message Collector, and secondary Database Server as the root
user.
2. At the command line, type the following:
Current settings:
autosync: yes
interval: 20
4. You can change any of these settings by typing the following at the command line:
where setting is one of the settings displayed with the view command and value is the value to assign to
that setting.
5. For details about the watchdog service, type the following at the command line:
For details about the arguments and settings for watchdog, see the section on Using the Command Line
Interface.
1. Either go to the console of the SL1 appliance or use SSH to access the server. Log in as "root".
NOTE: For details on enabling and using SSH with SL1, see the manual Security.
phonehome argument
l add appliance_type or request_file. Run this command on the primary Database Server. Adds an
appliance to the current PhoneHome configuration.
o request_file. When the Data Collector or Message Collector sends a request to the Database
Server, the Database Server creates a request file in the directory
/home/phonehomerequest/requests. You can specify the full pathname of a request file to
accept a request and add a new Data Collector or Message Collector to the PhoneHome
configuration.
NOTE: The phonehome add request_file command performs the same operations as selecting the[
Accept] button for a request in ScienceLogic Web Configuration Utility.
l check -json yes. Run this command on any appliance in the PhoneHome configuration. Executes
diagnostic steps to aid in troubleshooting.
The phonehome command first tries to connect to the primary Database Server.
If you issue this command from a Data Collector or Message Collector, the command checks the
status of the database port, the SSH port, and port for the web configuration tool for each Database
Server.
l clear clear_type. Clears the PhoneHome configuration, as specified in the clear_type argument.
o client. Run this command on the secondary Database Server, Data Collector, or Message
Collector. Removes the PhoneHome connection (SSH tunnel). The appliance can then no
longer connect to the primary Database Server.
o users. Run this command on the primary Database Server. Removes the PhoneHome
configuration for all appliances except the primary Database Server.
o all. Run this command on the primary Database Server. Removes the PhoneHome
configuration for each Data Collector, Message Collector, secondary Database Server, and
the primary Database Server.
l close-control-port port_number. Run this command on Database Servers (primary and secondary).
Blocks future connection requests from Data Collectors and secondary Database Servers.
l connect. Run this command from the Data Collectors, Message Collectors, or secondary Database
Server. Starts communication between the primary Database Server and the Data Collector,
Message Collector, or secondary Database Server.
l delete appliance_ID. Run this command on the primary Database Server. Deletes an appliance from
the current PhoneHome configuration.
o appliance_ID. Enter the numeric ID of the appliance. You can find this ID with the phonehome
status command.
l disconnect. Run this command from the Data Collector(s), Message Collector(s), or secondary
Database Server. Stops communication between the primary Database Server and the Data
Collector, Message Collector, or secondary Database Server.
l help. Run this command from any appliance in the PhoneHome configuration. Displays information
about each parameter for the phonehome command.
l help extra. Run this command from any appliance in the PhoneHome configuration. Displays
information about the basic steps to configure a PhoneHome configuration.
o appliance_ID. Enter the numeric ID of the appliance. You can find this ID with the phonehome
status command.
l open-control-port port_number. Run this command on Database Servers (primary and secondary).
Adds an entry for the specified SSH port to the /etc/sysconfig/iptables file on the current server.
l reconnect. Run this command from the Data Collector(s), Message Collector(s), or secondary
Database Server. Stops and then restarts communication between the primary Database Server and
the Data Collector(s),Message Collector(s), or secondary Database Server.
l register device_token. Run this command from the Data Collector(s),Message Collector(s), or
secondary Database Server. Registers the appliance with the primary Database Server.
After you generate a token for a Data Collector or Message Collector (either with phonehome
token or phonehome add), go to the Data Collector or Message Collector and use the
phonehome register command to register the Data Collector or Message Collector with the
primary Database Server. The Data Collector or Message Collector will then upload its public key
to the primary Database Server and download its configuration for PhoneHome from the primary
Database Server. After executing this command, the Data Collector or Message Collector will
automatically connect to the Database Server.
In configurations that have multiple Database Servers: After you generate a token for a secondary
Database Server (either with phonehome token or phonehome add), go to the secondary
Database Server and use the phonehome register command to register the secondary Database
Server with the primary Database Server. The secondary Database Server will then upload its public
key to the primary Database Server and download its configuration for PhoneHome from the
primary Database Server.
o device_token. Enter the token you generated for the Data Collector, Message Collector, or
secondary Database Server.
l reload. Can be run on any appliance in the PhoneHome configuration. Stops the em7_sshd and
em7_ph_service processes, finds and applies any configuration changes, and restarts the service.
l request [protocol]://[database_IP] [no_verify]. Run this command from the Data Collector or
Message Collector to send a request to the Database Server.
o protocol. Enter the protocol to use to send the request to the Database Server. Choices are
phonehome or https.
o database_IP. The IP address of the Database Server in the PhoneHome configuration.
o no_verify. Optional. If you specified https in the protocol option, you can specify no_verify to
disable SSL verification.
You can use the phonehome request command and the phonehome add request_file command to add a
Data Collector or Message Collector to a PhoneHome Configuration. Go to the Data Collector or Message
Collector and use the phonehome request command to send a request to join the PhoneHome configuration.
Go to the Database Server and use the phonehome add request_file command to accept the request from the
Data Collector or Message Collector. Go to the Data Collector or Message Collector again and execute the
phonehome request command a second time to retrieve the request approval and set up the connection.
l set appliance_ID -parameter=value. Run on the primary Database Server. For a specific device,
assigns a value to a parameter:
o appliance_ID. Enter the numeric ID of the appliance. You can find this ID with the phonehome
status command.
o parameter. Can be one of the following parameters, preceded by a dash:
o name. Specifies the name of the device in the Name field in the Web Configuration Utility.
o ssh. Specifies whether or not to enable port forwarding for the SSH port for this device. Possible
values are "yes" or "no".
o ip. Specifies the IP address of the device in the IP Address field in the Web Configuration
Utility.
o forwards. Enables port forwarding for one or more ports. Specify one or more port numbers,
separated by a space.
o value. Value to assign to the parameter, surrounded by double quotes.
For example:
o appliance_ID. Enter the numeric ID of the appliance. You can find this ID with the phonehome
status command.
l status. Can be run on any appliance in the PhoneHome configuration. Displays the name and status
of each currently defined PhoneHome appliance.
l sync. Run this command from the Data Collectors or Message Collectors. Downloads the current
configuration for PhoneHome from the primary Database Server to the Data Collector or Message
Collector.
l token appliance_ID. Run this command from the primary Database Server. This command creates a
URL that allows the Data Collector(s), Message Collector(s), or secondary Database Server to log in
to the primary Database Server, upload a public key to the primary Database Server, and download
the configuration for PhoneHome from the primary Database Server.
o appliance_ID. Enter the numeric ID of the Data Collector, Message Collector, or secondary
Database Server. You can find this ID with the phonehome status command.
l view appliance_id -jsonyes. Run this command from the primary Database Server. Displays the
name, type, loopback IP, port status, revision number, and SSH status of the Data Collector,
Message Collector, or secondary Database Server specified in appliance_ID.
o appliance_ID. Enter the numeric ID of the appliance that you want. You can find this ID with the
phonehome status command.
o -json yes. Displays output in json format.
l wake appliance_id. Run this command from the primary Database Server. Depending on the
specified appliance_ID, stops and then restarts communication between the Database Server and
the Data Collector, Message Collector, or secondary Database Server.
o appliance_ID. Enter the numeric ID of the appliance that you want. You can find this ID with the
phonehome status command.
l watchdog option. Run this command from the Data Collector, Message Collector, or secondary
Database Server. The watchdog service runs automatically on each Data Collector, Message
Collector, or secondary Database Server and checks the connection to the primary Database Server.
If the connection is stale, the watchdog service automatically forces the primary Database Server to
reconnect to the Data Collector, Message Collector, or secondary Database Server. The watchdog
service can also detect configuration changes. If the PhoneHome configuration changes, the
watchdog service will detect the changes and synchronize the configuration data on each device in
the PhoneHome configuration.
You can use this command to control the watchdog service. The options are:
o interval seconds. Specify the interval, in seconds, at which to execute the watchdog service. The
default value is "50".
o autosync (yes, no). Specifies whether or not you want the watchdog service to cause configuration
data to be synchronized automatically at regular intervals.
o autoreconnect (yes, no). Specifies whether or not you want the watchdog service to reconnect stale
connections automatically.
o state (enabled, disabled). Specifies whether or not the watchdog service is running.
o timeoutcount number. Specifies the number of failed calls to the watchdog service before stopping
and restarting the watchdog. The default value is "3".
o check (ssh, db, default). Specifies which port the watchdog service checks. The default value is
"db".
o run -verbose (yes, no). Manually starts the watchdog service if it is not already running.
o -verbose (yes, no). Specifies whether or not to display verbose logging to standard output.
Available Commands
l This command checks the SSH connectivity between the Data Collector and the PhoneHome primary
Database Server
Basic Troubleshooting
For example:
nmap -p 7705 71.197.6.197
Can't register a Confirm that the PhoneHome port is At the command line of the Database Server:
server or sync a open on the firewall on the Database iptables -nL
server Server.
You should see output that specifies that the
port accepts connections.
To open the port, run this command:
sudo phonehome open-control-port
Can't register a Ensure that the Data Collector has line- sudo tcptraceroute <IP_address_
server or sync a of-sight with the Database Server of_database>
server
Can't register a Ensure the Data Collector can initiate an sudo -u phonehome0 -s ssh -vvv -o
server or sync a SSH session to the phonehome port on StrictHostKeyChecking=no -p
server the Database Server <control_port_(usually_7705)>
phonehome<device_id_of_
collector>@<IP_address_of_
database>
Output should include:
8
Installing SL1 on AWS
Overview
This chapter describes how to install SL1 on an Amazon Web Services EC2 instances. An instance is a virtual
server that resides in the AWS cloud.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
83
Accessing the Appliance Using SSH 108
Gathering Information Required for Accessing the Appliance Using SSH 108
Configuring SSH 108
UNIX and LINUX Users 109
Windows Users 109
Web Configuration Tool 109
Rebooting Data Collectors and Message Collectors 109
Additional Steps for SL1 10.1 110
NOTE: For more information about monitoring Amazon Web Services in SL1, see the Monitoring Amazon
Web Services manual.
84
AWS Instance Specifications
For details about AWS and the requirements and specifications for each SL1 appliance, see the ScienceLogic
Support Site. https://support.sciencelogic.com/s/system-requirements?tabset-e65a2=f5872
1. Database Server
2. Administration Portal (if applicable)
3. Data Collectors
4. Message Collectors (if applicable)
The ScienceLogic AMIs are defined by ScienceLogic. ScienceLogic has created an AMI for each type of
ScienceLogic appliance. You can use a ScienceLogic AMI to create Elastic Compute Cloud (EC2) instances for
each type of ScienceLogic appliance.
NOTE: Elastic Compute Cloud (EC2) instances are virtual servers that come in a variety of configurations
and can be easily changed as your computing needs change. For more information on EC2, see
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/concepts.html.
The ScienceLogic AMIs are private and are for ScienceLogic customers only. After you collect specific information
about your AWS account, you can send a request (and the collected information) to ScienceLogic, and
ScienceLogic will share the ScienceLogic AMIs with you.
NOTE: As of 8.10.0 and later releases, ScienceLogic AMIs support Enhanced Network Adapters (ENAs).
NOTE: If you are an Amazon Web Service GovCloud user, you will need to contact ScienceLogic
Support to get the ScienceLogic AMI.
3. Scroll down to the AMI Request section and click the [Submit AMI Request] button. The
Request Amazon AMI page appears.
4. Fill out the Request Amazon AMI form and click the [Submit AMI Request] button.
5. Repeat steps 2-4 for each type of SL1 appliance you want to install on AWS.
6. ScienceLogic Customer Support will send you an email confirming that they have shared the ScienceLogic
AMI with your AWS account.
7. To view the ScienceLogic AMIs in your AWS account, go to the AWS Management Console page. Under
the heading Compute, click [EC2].
8. In the EC2 Dashboard page, go to the left navigation bar. Under the heading Images, click [AMIs].
9. In the main pane, under Filters, click [Owned by me] and then select Private images.
11. If you do not see AMIs with names that begin with "EM7", your EC2 Dashboard might have a default region
that does not match the region for the ScienceLogic AMIs. To change the current region in the EC2
dashboard, click the region pull-down in the upper right and choose another region. Do this until you find
the ScienceLogic AMIs.
NOTE: A region is a geographic location. AWS has data centers that include multiple regions. You can
specify that an instance reside in a specific region. For more details on regions, see
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html.
This chapter assumes that you will launch each new EC2 instance into a VPC subnet with a primary IP address
that is static and private.
For details about the recommended instance type for each ScienceLogic appliance, see System Requirements
page on the ScienceLogic Support Site.
You can use multiple AWS instances to create a distributed SL1 System. For each instance, you must specify the
correct instance type, storage size, and security rules. All these parameters are described in this chapter.
3. In the Choose Instance Type page, choose the instance type recommended for the AMI. Choose the size
and type that fulfills your needs.
NOTE: For details about the recommended instance type for each ScienceLogic appliance, see the
ScienceLogic Support Site. https://support.sciencelogic.com/s/system-requirements?tabset-
e65a2=f5872
l IAM role. If your organization uses IAM roles, select the appropriate role.
l Shutdown behavior. Select Stop.
l Enable termination protection. Selecting this checkbox is not required. Configure this checkbox
according to your organization's procedures.
l Monitoring. Do not select this checkbox.
l EBS-optimized instance. Do not select this checkbox.
l Tenancy. Select Shared tenancy (multi-tenant hardware).
10. In the Tag Instance page, assign a descriptive tag to this instance. For example, you could enter "Name" in
the Key field and "ScienceLogic AIO" in the Value field. This is optional.
12. A security group is a reusable set of firewall rules. In the Configure Security Group page, do the
following:
13. Use the following tables to create security rules for each type of SL1 appliance. After completing each row,
click the [Add Rule] button.
14. Click the [Review and Launch] button and review the details of the new instance. Fix any problems to meet
the requirements of your organization.
15. Click the [Launch] button.
16. Amazon EC2 instances use public-key cryptography for authentication. Select create a new key pair now.
You can enter a name for the private key. AWS will store the public key on its servers and automatically
download the file that contains the private key to your browser. The private key is stored in a file that ends in
.pem. You will need this file again when you configure SSH access to your AWS instances.
NOTE: Do not select an existing key unless you have previously downloaded and saved the key. You cannot
retrieve an existing key a second time.
All-In-One Appliance
Inbound
SSH (edit the default TCP 22 If you will always log in from a SSH. For SSH sessions from the
SSH rule) single IP address, select My IP. user workstation to the
If you will log in to the instance appliance. This is necessary to
from multiple IP addresses, start the installation wizard.
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
HTTP TCP 80 If you will always log in from a HTTP from browser session on
single IP address, select My IP. user workstation.
If you will log in to the instance
from multiple IP addresses,
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
HTTPS TCP 443 If you will always log in from a HTTPS from browser session
single IP address, select My IP. on user workstation.
If you will log in to the instance
from multiple IP addresses,
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7700 If you will always log in from a ScienceLogic Web
single IP address, select My IP. Configurator. Configuration
If you will log in to the instance Utility from browser session on
from multiple IP addresses, user workstation. This is
enter those IP addresses, necessary to license the
separated by commas, in this appliance.
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 162 Specify a list of IP addresses SNMP Traps. Necessary to
for all managed devices from receive SNMP traps from
which you want to receive managed devices.
SNMP traps.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 514 Specify a list of IP addresses Syslog messages. Necessary to
for all managed devices from receive syslog messages from
which you want to receive managed devices.
Syslog messages.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 123 Enter the IP address of the NTP NTP. Communication between
server. the All-In-One Appliance and
Configure this list according to configured NTP server.
your requirements, your AWS
configuration, and your
security rules.
Database Server
Inbound
SSH (edit the default TCP 22 If you will always log in from a SSH. For ssh sessions from
SSH rule) single IP address, select My IP. user workstation to the
If you will log in to the instance appliance. This is necessary to
from multiple IP addresses, start the installation wizard.
enter those IP addresses,
separated by commas, in this
field.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
HTTP TCP 80 If you will always log in from a HTTP from browser session on
NOTE: Required only if single IP address, select My IP. user workstation.
you are using the If you will log in to the instance
Administration Portal on from multiple IP addresses,
the Database enter those IP addresses,
separated by commas, in this
field.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
Custom TCP Rule TCP 123 Enter the IP address of the NTP. Communication between
NTP server. the Database Server and
Configure this list according configured NTP server.
to your requirements, your
AWS configuration, and your
security rules.
Custom UDP Rule UDP 161 Specify an IP address for each SNMP Agent. Allows SNMP
Data Collector that you will information about the
allow to can collect SNMP Database Server to be
information about the collected by SL1.
Database Server.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
HTTPS TCP 443 If you will always log in from a HTTPS from browser session
NOTE: Required only if single IP address, select My IP. on user workstation.
you are using the If you will log in to the instance
Administration Portal on from multiple IP addresses,
the Database enter those IP addresses,
separated by commas, in this
field.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
Custom TCP Rule TCP 7700 If you will always log in from a ScienceLogic Web
single IP address, select My IP. Configurator. Configuration
If you will log in to the instance Utility from browser session on
from multiple IP addresses, user workstation. This is
enter those IP addresses, necessary to license the
separated by commas, in this appliance.
field.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
Custom TCP Rule TCP 7706 Specify an IP address for each MySQL. Communication from
Data Collector that you will Administration Portal
allow to collect SNMP
information about the
Database Server.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
Custom TCP Rule TCP 8008 If you will always log in from a Administrative Web Interface
single IP address, select My IP. (PHPMyAdmin) from browser
If you will log in to the instance session on user workstation
from multiple IP addresses,
enter those IP addresses,
separated by commas, in this
field.
Configure this list according
to your requirements, your
AWS configuration, and your
security rules.
SSH (edit the default TCP 22 If you will always log in from a SSH. For ssh sessions from
SSH rule) single IP address, select My IP. user workstation to the
If you will log in to the instance appliance. This is necessary to
from multiple IP addresses, start the installation wizard.
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
HTTP TCP 80 If you will always log in from a HTTP from browser session on
single IP address, select My IP. user workstation.
If you will log in to the instance
from multiple IP addresses,
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
HTTPS TCP 443 If you will always log in from a HTTPS from browser session
single IP address, select My IP. on user workstation.
If you will log in to the instance
from multiple IP addresses,
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 123 Enter the IP address of the NTP NTP. Communication between
server. the Administration Portal and
Configure this list according to configured NTP server.
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7700 If you will always log in from a ScienceLogic Web
single IP address, select My IP. Configurator. Configuration
If you will log in to the instance Utility from browser session on
from multiple IP addresses, user workstation. This is
enter those IP addresses, necessary to license the
separated by commas, in this appliance.
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 161 Specify an IP address for each SNMP Agent. Allows SNMP
Data Collector that you will information about the
allow to can collect SNMP Administration Portal to be
information about the collected by SL1.
Administration Portal.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Data Collector
Inbound
SSH (edit the default TCP 22 If you will always log in from a SSH. For ssh sessions from
SSH rule) single IP address, select My IP. user workstation to the
If you will log in to the instance appliance. This is necessary to
from multiple IP addresses, start the installation wizard.
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 123 Enter the IP address of the NTP NTP. Communication between
server. the Data Collector and
Configure this list according to configured NTP server.
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 161 Specify an IP address for each SNMP Agent. Allows SNMP
Data Collector that you will information about the Data
allow to collect SNMP Collector to be collected by
information about this Data SL1.
Collector.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 162 Specify a list of IP addresses SNMP Traps. Necessary to
for all managed devices from receive SNMP traps from
which you want to receive managed devices.
SNMP traps.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 514 Specify a list of IP addresses Syslog messages. Necessary to
for all managed devices from receive syslog messages from
which you want to receive managed devices.
Syslog messages.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7700 If you will always log in from a ScienceLogic Web
single IP address, select My IP. Configurator. Configuration
If you will log in to the instance Utility from browser session on
from multiple IP addresses, user workstation. This is
enter those IP addresses, necessary to license the
separated by commas, in this appliance.
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7707 Specify the IP address of the Data Pull. Allows the Database
Database Server that you want Server to retrieve data from the
to retrieve data from the Data Data Collector
Collector.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Message Collector
Inbound
SSH (edit the default TCP 22 If you will always log in from a SSH. For ssh sessions from
SSH rule) single IP address, select My IP. user workstation to the
If you will log in to the instance appliance. This is necessary to
from multiple IP addresses, start the installation wizard.
enter those IP addresses,
separated by commas, in this
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 123 Enter the IP address of the NTP NTP. Communication between
server. the Message Collector and
Configure this list according to configured NTP server.
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 161 Specify an IP address for each SNMP Agent. Allows SNMP
Data Collector that you will information about the
allow to collect SNMP Message Collector to be
information about this collected by SL1.
Message Collector.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 162 Specify a list of IP addresses SNMP Traps. Necessary to
for all managed devices from receive SNMP traps from
which you want to receive managed devices.
SNMP traps.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom UDP Rule UDP 514 Specify a list of IP addresses Syslog messages. Necessary to
for all managed devices from receive syslog messages from
which you want to receive managed devices.
Syslog messages.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7700 If you will always log in from a ScienceLogic Web
single IP address, select My IP. Configurator. Configuration
If you will log in to the instance Utility from browser session on
from multiple IP addresses, user workstation. This is
enter those IP addresses, necessary to license the
separated by commas, in this appliance.
field.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
Custom TCP Rule TCP 7707 Specify the IP address of the Data Pull. Allows the Database
Database Server that you want Server to retrieve data from the
to retrieve data from the Message Collector.
Message Collector.
Configure this list according to
your requirements, your AWS
configuration, and your
security rules.
AWS can assign a public-facing IP address to your new instance. However, the IP address will change each time
the instance is stopped or terminated. If you will be accessing an All-In-One Appliance or an Administration
Portal appliance from the internet, ScienceLogic recommends you use an Elastic IP address (EIP).
An EIP is a permanent static address that belongs to an account (not an instance) and can be reused. An EIP
address is required only if you want the public IP address to remain constant. When you assign an EIP to an
instance, the instance still retains its private IP address in its VPC.
If you use an AWS VPN to access the All-In-One Appliance or Administration Portal appliance, that is you can
access the All-In-One Appliance or Administration Portal appliance only through your corporate network, you do
not have to assign an EIP to the All-In-One Appliance or Administration Portal appliance .
l In the left navigation pane, under the Network & Security heading, click [Elastic IPs].
l Click the [Allocate New Address] button and then click the [Yes, Allocate] button.
l Right-click the new address and select Associate Address from the drop-down menu.
l Select the new SL1 appliance instance in the Instance field, then click the [Associate] button. The
SL1 appliance instance is now associated with the new EIP.
This chapter assumes that you have access to SSH on the command line (for UNIX users) or have installed PuTTY
(for Windows users).
Configuring SSH
Before you can use SSH with the SL1 appliance instance, you must ensure that SSH can use the .pem file
downloaded earlier during the configuration. For details on downloading the .pem file, see the last few steps in
the section on Launching the EC2 Instance.
NOTE: You should store the .pem file in a secure location. ScienceLogic recommends you store the .pem file
in $HOME/.ssh. ScienceLogic also recommends you change the permissions on the .pem file to
allow only read-only access by the owner of the .pem file.
To connect using the .pem file generated by AWS, enter the following at the shell prompt:
where:
l ~/.ssh/my-aws-key.pem. Replace with the name and full path to your .pem file.
l hostname or IP address. Replace with the hostname or public-facing IP address of the SL1 appliance
instance.
You can also configure your SSH client to automatically select the correct key file when accessing the SL1
appliance instance. For details, see the man page for ssh_config for your flavor of UNIX.
Windows Users
You can connect with your SL1 appliance instance using PuTTY and SSH as the em7admin user. However, you
must first convert the private key for your instance into a format that PuTTY can use. See the following for detailed
instructions on using PuTTY SSH and converting your private key:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html
l 10.1.0
l 10.1.1
l 10.1.2
l 10.1.3
l 10.1.4
l 10.1.4.1
l 10.1.4.2
l 10.1.5
l 10.1.5.1
For SL1 versions later than 10.1.5.1, jemalloc is included with the platform. For SL1 versions prior to
10.1.0, jemalloc is included with the platform.
To avoid problems with memory usage on Database Servers, perform the following steps after upgrading
MariaDB for 10.1.x.
NOTE: Perform these steps first on the active Database Server and then on each additional Database
Server in your SL1 System.
If the Database Server is not currently running jemalloc, the shell will display the following:
If the file does not exist, contact ScienceLogic Customer Support to request the file jemalloc-3.6.0-
1.el7.x86_64.rpm.
To install the RPM, use a file-transfer utility, copy the file to a directory on the SL1 appliance. Then enter the
following commands at the shell prompt:
cd /usr/lib64
sudo yum install jemalloc-3.6.0-1.el7.x86_64.rpm
To restart the standalone Database Server or the primary Database Server in a cluster, enter the
following:
sudo systemctl restart mariadb
b. Select 1.
c. When prompted to put the Database Server into maintenance, select y.
d. Open an SSH session to the primary Database Server. To pause SL1, enter the following command at
the shell prompt:
sudo touch /tmp/.proc_mgr_pause
e. In the SSH session for the secondary Database Server, restart MariaDB:
crm resource restart mysql
f. After MariaDB has restarted successfully on the secondary Database Server, return to the SSH session
on the primary Database Server. Remove the pause file for SL1 using the following command:
sudo rm /tmp/.proc_mgr_pause
g. In the SSH session on the secondary Database Server, take the Database Server out of maintenance.
At the shell prompt, enter:
coro_config
If the Database Server is currently running jemalloc, the shell will display something like the following:
10. Perform these steps on each Database Server in your SL1 system.
9
Installing SL1 in Azure
Overview
This chapter describes how to deploy a ScienceLogic virtual machine in Azure from a VHD image file.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all the menu options, click the Advanced menu icon ( ).
The steps to create these components in Azure are described throughout this chapter. This chapter includes the
following topics:
113
Obtaining the Container URL for an Azure Storage Account and Creating the BLOB_URI 118
Uploading a VHD Image File to an Azure Storage Account 119
Downloading the ScienceLogic VHD File 119
Uploading the VHD File to an Azure Container 119
Creating the Disk Image 120
Creating an Azure Virtual Machine 120
Setting the Virtual Machine Allocation Method to Static 122
Configuring Ports on SL1 Appliances 124
Configuring the Virtual Machine 126
Additional Steps for SL1 10.1 128
Troubleshooting 130
NOTE: If you are configuring a Database, ScienceLogic recommends allocating four times the memory for
the Database as compared to the memory for the Data Collectors.
TIP: A single Azure image file can be used to create multiple virtual machines. For example, you can use the
same Azure VHD file for the Database Server to create multiple Database Servers.
114
System Requirements
For details about supported hypervisors and the requirements and specifications for each SL1 appliance, see the
ScienceLogic Support Site: https://support.sciencelogic.com/s/system-requirements
1. Database Server
2. Administration Portal (if applicable)
3. Data Collectors
4. Message Collectors (if applicable)
1. Download and install the Azure CLI tool from the Microsoft website:
https://docs.microsoft.com/en-us/cli/azure/install-azure-cli-windows?view=azure-cli-latest
2. After installation completes, search for and click on "PowerShell" in Windows to start the program.
3. In PowerShell, type "az login". You will be prompted to sign into your Microsoft Azure account.
After you log in, you will see information about your Azure subscription within the PowerShell window.
1. Log in to the Azure Portal, and then click Resource groups on the left menu.
2. Click the [Add] button and add information for a new Resource group. Click the [Create resource group]
button to create the Resource group.
3. After creating the Resource group, click Storage accounts on the left menu.
5. After creating the Storage account, click Storage accounts on the left menu, and then select the newly
created Storage account.
6. Under the Services section of the Storage account pane, click Blobs. The Blob service blade information
appears.
To create the BLOB_URI value, append the destination (that is, where you want the VHD to be stored in the
container) to the container URL.
Example:
https://azuretest.blob.core.windows.net
https://azuretest.blob.core.windows.net/vhds/em7inazure.vhd
Where "/vhds" is the directory on the container, and "em7inazure.vhd" is the name of the VHD image file you will
be uploading.
support.sciencelogic.com
To upload the ScienceLogic VHD file to your Blob container, perform the following steps:
1. Open Microsoft Azure PowerShell and log in to your Azure account using the cmdlet Add-AzureRmAccount:
Login-AzureRmAccount
2. You created a resource group and storage container blob to which you will upload your VHD image file in
Configuring an Azure Resource Group and Storage Account. You identified the BLOB_URI in
Obtaining the Container URL for an Azure Storage Account. Now you are ready to upload your
VHD image file.
3. Add your VHD file to the storage account with the following cmdlet:
Add-AzureRmVhd -Destination '<BLOB_URI>' -LocalFilePath '<VHD_LOCAL_FILE_
PATH>' -ResourceGroupName '<RESOURCE_GROUP>'
Where:
l BLOB_URI specifies the BLOB_URI where you will upload your VHD file.
l VHD_LOCAL_FILE_PATH specifies the path on your machine for the VHD file you want to upload
l RESOURCE_GROUP specifies the resource group you created and that will be used when you
create the Azure VM.
NOTE: The following steps require that you have an ARM resource group and storage account with the VHD
file uploaded.
1. Open Microsoft Azure PowerShell and log in to your Azure account using the cmdlet Add-AzureRmAccount:
Login-AzureRmAccount
Where:
NOTE: The following steps require that you have an ARM resource group and storage account with the VHD
file uploaded.
1. Open Microsoft Azure PowerShell and log in to your Azure account using the cmdlet Add-AzureRmAccount:
Login-AzureRmAccount
NOTE: The virtual machine that you create must be in the same resource group as the storage
account.
Where:
1. In the Azure Portal, navigate to the Virtual machine pane and verify that the virtual machine has a public IP
address and a virtual network/subnet set.
3. In the “Connected devices” section of the Virtual network pane, click the Network interface. The Network
interface pane appears.
4. Click the Public IP address value, and then click the [Dissociate] button.
5. In the Network interface pane, click on Settings > IP addresses. Then, do one of the following:
l If you are not using a VPN, complete steps 6 through 9. Ignore step 10.
l If you are using a VPN, skip ahead to step 10.
1. In the Azure Portal, navigate to the Network security groups pane, and then click the [Add] button. The
Create network security group pane appears.
2. Type the information for the Network security group (name, subscription, resource group, and location),
then click [Create].
3. In the Network security groups pane, click the newly created Network security group, and then click the
[Settings] button.
4. In the Settings pane, click Inbound security rules.
NOTE: ScienceLogic recommends that you limit the Source port range for security reasons.
1. Use SSH to access the virtual machine using its public IP address and the username and password that were
defined in step 2 of the section Creating an Azure Virtual Machine.
2. Run em7_install.sh in a special operational mode:
sudo /opt/em7/share/scripts/em7_install.sh --instance-init-only
3. On the Administration Portal (and the Database Server only if you are using the Administration Portal on the
Database Server), run the following command to start the web server:
sudo service nginx start
NOTE: Upon installation, SL1 appliances are automatically licensed for 30 days. During these 30 days, you
can perform the steps to obtain a permanent license from ScienceLogic.
n If you are not using a VPN, enter the public IP address of the Database Server.
n If you are using a VPN, use the private IP address of the Database Server.
n If you are not using a VPN, enter the public IP address of the Database Server.
n If you are using a VPN, use the private IP address of the Database Server. .
7. Open a browser session to SL1 (to the Administration Portal). Go to the Appliance Manager page (System
> Settings > Appliances).
8. If you are using an All-In-One Appliance, you will see two entries for the All-In-One Appliance.
9. If you are using a distributed system, you will see two entries for the Database Server.
l Select the bomb icon for the Database Server for which the bomb icon ( ) is enabled.
l 10.1.0
l 10.1.1
l 10.1.2
l 10.1.3
l 10.1.4
l 10.1.4.1
l 10.1.4.2
l 10.1.5
l 10.1.5.1
For SL1 versions later than 10.1.5.1, jemalloc is included with the platform. For SL1 versions prior to
10.1.0, jemalloc is included with the platform.
To avoid problems with memory usage on Database Servers, perform the following steps after upgrading
MariaDB for 10.1.x.
NOTE: Perform these steps first on the active Database Server and then on each additional Database
Server in your SL1 System.
If the Database Server is not currently running jemalloc, the shell will display the following:
If the file does not exist, contact ScienceLogic Customer Support to request the file jemalloc-3.6.0-
1.el7.x86_64.rpm.
To install the RPM, use a file-transfer utility, copy the file to a directory on the SL1 appliance. Then enter the
following commands at the shell prompt:
cd /usr/lib64
sudo yum install jemalloc-3.6.0-1.el7.x86_64.rpm
To restart the standalone Database Server or the primary Database Server in a cluster, enter the
following:
sudo systemctl restart mariadb
b. Select 1.
c. When prompted to put the Database Server into maintenance, select y.
d. Open an SSH session to the primary Database Server. To pause SL1, enter the following command at
the shell prompt:
sudo touch /tmp/.proc_mgr_pause
e. In the SSH session for the secondary Database Server, restart MariaDB:
crm resource restart mysql
f. After MariaDB has restarted successfully on the secondary Database Server, return to the SSH session
on the primary Database Server. Remove the pause file for SL1 using the following command:
sudo rm /tmp/.proc_mgr_pause
h. Select 1.
i. When prompted to take the Database Server out of maintenance, select y.
9. To verify that jemalloc is running on the Database Server, enter the following command at the shell prompt:
silo_mysql -e 'show global variables like "version_malloc_library"'
If the Database Server is currently running jemalloc, the shell will display something like the following:
10. Perform these steps on each Database Server in your SL1 system.
Troubleshooting
If the Data Collector continuously displays a message saying the collector is working when running a Dynamic
Application, DO NOT restart the Azure virtual machine, as doing so could cause you to lose SSH access to the
machine.
1. Using the command line interface, verify whether you can run the Dynamic Application in debug mode by
typing the following command:
2. Restart the data pull processes (em7_hfpulld, em7_lfpulld, em7_mfpulld) by typing the following command:
130 Troubleshooting
Chapter
9
Updating SL1
Overview
For information on updating an existing SL1 system, see the manual Updating, Monitoring, and Maintaining
SL1. The Updating, Monitoring, and Maintaining SL1 manual describes how to update the software on your SL1
appliances.
Contact ScienceLogic to get access to the Updating, Monitoring, and Maintaining SL1 manual.
Troubleshooting 131
© 2003 - 2022, ScienceLogic, Inc.
All rights reserved.
LIMITATION OF LIABILITY AND GENERAL DISCLAIMER
ALL INFORMATION AVAILABLE IN THIS GUIDE IS PROVIDED "AS IS," WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED. SCIENCELOGIC™ AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.
Although ScienceLogic™ has attempted to provide accurate information on this Site, information on this Site
may contain inadvertent technical inaccuracies or typographical errors, and ScienceLogic™ assumes no
responsibility for the accuracy of the information. Information may be changed or updated without notice.
ScienceLogic™ may also make improvements and / or changes in the products or services described in this
Site at any time without notice.
Other
If any provision of this agreement shall be unlawful, void, or for any reason unenforceable, then that
provision shall be deemed severable from this agreement and shall not affect the validity and enforceability
of any remaining provisions. This is the entire agreement between the parties relating to the matters
contained herein.
In the U.S. and other jurisdictions, trademark owners have a duty to police the use of their marks. Therefore,
if you become aware of any improper use of ScienceLogic Trademarks, including infringement or
counterfeiting by third parties, report them to Science Logic’s legal department immediately. Report as much
detail as possible about the misuse, including the name of the party, contact information, and copies or
photographs of the potential misuse to: legal@sciencelogic.com
800-SCI-LOGIC (1-800-724-5644)
International: +1-703-354-1010