background image

Check_MK rack1 Mark III - Manual

Valid since version 1.4.0

Содержание rack1 Mark III

Страница 1: ...Check_MK rack1 Mark III Manual Valid since version 1 4 0 ...

Страница 2: ......

Страница 3: ...14 6 Firmware installation 15 7 Device settings 16 7 1 Changing the language 16 7 2 Changing the network configuration 16 7 3 Configuring host and domain names 16 7 4 Configuring name resolution 16 7 5 Configuring time synchronisation 17 7 6 Forwarding syslog entries 17 7 7 Changing the default web page 17 7 8 Configuring outgoing emails 17 7 9 Changing access to Check_MK agents 18 8 Remote access via ...

Страница 4: ... 3Backup format 32 11 4Encryption 32 11 5Compression 33 11 6Recovery 34 11 6 1Disaster recovery 35 11 7Monitoring 35 11 8Special features with clusters 35 12Mounting network file systems 36 12 1Mounting a network file system 36 13Failover cluster 38 13 1Prerequisites 38 13 2Migration of existing installations 39 13 3Configuration of the cluster 39 13 3 1Network configuration 39 13 3 2Host names 43 13 ...

Страница 5: ...1Administration in web interface 53 15 2Exchanging a defective hard drive 53 15 3Both hard drives defective 54 16Management interface 55 17Diagnostics 56 17 1Logs 56 17 2Available Memory 57 18Service support 58 18 1Manual 58 18 2Internet 58 18 3Firmware 58 18 4Hardware support 58 18 5Software support 58 19Appendices 59 1 CE declaration of conformity 59 2 Licences 59 3 VMware Tools 60 4 VirtualBox ...

Страница 6: ...e configuration dialogue box configure the following settings as a minimum Network configuration Access to the web interface Once you have configured these settings you can access the web interface from a computer connected to the network by entering the URL http ipaddress into the web browser Log into the web interface using the password you just configured Select the item instance administration on t...

Страница 7: ...ing are included with your Check_MK rack1 Mark III Check_MK rack1 Mark III appliance Two internal power supply units Two hard drives in a caddy 1 TB Documentation Two power cords One set of mounting rails Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 8: ...ou what language to choose This language will be saved for the entire device You will then be displayed a message asking you to initialise the data medium Confirm this dialogue box and wait for device startup to be resumed and for the status screen to then be displayed Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 9: ... device has been started up you will see the status screen on the local console This screen will show you general status information and the most important configuration options of your device Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 10: ...nce these values have been entered the configuration will be activated meaning the device will be immediately reachable via the network and at the entered IP address One way of testing this is to send a ping from another device in the network 3 1 2 Access to the web interface A large part of the device s configuration is carried out via the web interface Access to this web interface is protected by ...

Страница 11: ...rough access to the server room or in the case of Check_MK virt1 through access to the management interface of the virtualisation solution is able to change the basic configuration of the device In order to protect such access you have the option to activate a login that must be used in conjunction with the device password before settings can be made or the current status viewed If you have already...

Страница 12: ...enabled access to the web interface through the configuration you performed previously you can now open the web interface over a web browser on a computer that is connected with the device via the network For this purpose enter the URL http ipaddress for the device in this case http 10 1 2 9 into the address bar of the browser You will now see the login screen of the web interface Copyright Mathias...

Страница 13: ...specified for the web interface the main menu will open From here you can get to all features of the web interface On this menu select the item device settings In this dialogue box you can see and change the most important device settings Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 14: ...server If emails are to be sent from your device such as notifications in the event of problems being detected you must configure the option Outgoing emails To do this enter the SMTP relay server responsible for this device and any access data required All emails generated on the device will be sent to this server Under this setting you can also configure all emails generated by the operating system ...

Страница 15: ...the monitoring instance Start by entering an instance ID which serves to identify the monitoring instance The instance ID may only contain letters numbers and _ must start with a letter or _ and may be a maximum of 16 characters in length Now select the Check_MK version with which to create the monitoring instance You can leave all other settings as they are for the time being You can change these...

Страница 16: ...ou can either click on the instance ID or enter the URL for the monitoring instance http ipaddress instanz id in this case http 10 1 2 9 sysmon into the address bar of your browser You will now see the login screen of the monitoring instance where you can log in using the access data you entered when creating the instance Once you have logged in you can set up Check_MK in the usual manner The snap...

Страница 17: ...m which you want to migrate the site from Now you need to enter the site ID of the site you want to be migrated The migration of the site is done via SSH To get access to the source site you need to provide the credentials of a user which is able to connect to the source system and access all files of the source site You can use the root user of the source system or if you have configured a password...

Страница 18: ...13 61 After completion of the migration you can finish the migration by clicking on Complete Now you can configure and control the new site in the instance administration dialogue Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 19: ... any instance and is not the last installed version you have the option to delete it from the appliance Using this dialogue box you can also upload new Check_MK versions onto the device in order to use them in new instances or to update existing instances To do this download the desired Check_MK version from our website1 onto your computer search for Check_MK appliance in the Distribution column T...

Страница 20: ...r data during the update Change in the first digit You must back up the data of your device manually and restore it after the update An update cannot be performed without data migration Update to higher number for the second digit The update can be carried out without data migration You are advised to back up your data beforehand anyway Downgrade to lower number for the second digit You must back u...

Страница 21: ... correct the settings on the console 7 3 Configuring host and domain names Host and domain names serve to identify a computer in the network When sending emails for example these names are used to form the sender address In addition the configured host name is added as a source host to all log entries that are sent to a syslog server This makes it easier to assign the entries 7 4 Configuring name res...

Страница 22: ...f the device in the default setting However it is also possible for you to be forwarded directly to a monitoring instance of your choice You can configure this using the setting HTTP access without URL Via this setting select the monitoring instance to open instead of the web interface 7 8 Configuring outgoing emails So that you can send emails from the device in the case of events during monitoring...

Страница 23: ...nce on the device and directly add the device to the monitoring It is also possible to make the Check_MK agent accessible from another device meaning the device can also be monitored by another Check_MK system e g in a distributed environment of a central server For this purpose you can configure a list of IP addresses that are allowed to contact the Check_MK agent Copyright Mathias Kettner GmbH 20...

Страница 24: ...dual monitoring instances enabling you to view and control the entire environment of the instance This access is controlled via the instance administration In the settings dialogue of each individual instance you can activate and deactivate access as well as set a password to protect access 8 2 Activating console via SSH It is possible to activate access to the console of the device via the networ...

Страница 25: ...tus screen 8 3 Activating root access via SSH It is possible to activate access to the device as a root system user Once the device has initialised however this access will be deactivated Once activated you can log onto the device as a root user via SSH Caution Commands you execute on the device as root can cause lasting alteration or damage not only to your data but also to the delivered system T...

Страница 26: ...ss via the configuration dialogue of the console To do this select the menu item root access via SSH When you activate this option you will be asked to enter a password You must enter this password if you Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 27: ...tically enabled directly after confirming this dialogue You can now connect to the device as a root user using an SSH Client e g PuTTY You can check whether access is currently enabled by looking at the Access box of the console s status screen Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 28: ...yourself You can choose one of the options above that fits your requirements and possibilities Certificates signed by certification authorities generally have the advantage that clients can automatically verify the au thenticity of the host device at the time of access This is normally the case with official certification authorities If a user accesses the web interface via HTTPS and the certificate is ...

Страница 29: ...files or directly in PEM encoded text form You can now transfer the signed certificate to the device via the Upload certificate dialogue If you have received a certificate chain you can upload it via this dialogue too Once you have confirmed the dialogue with Upload you can continue configuring the types of access 9 1 2 Creating a new certificate and signing it yourself To create a new certificate select ...

Страница 30: ...ing access types Once you have installed a certificate you can now configure the access types according to your require ments If you wish to protect access to your device via HTTPS you are recommended to select the option Forced HTTPS The device will only respond via HTTPS but will redirect all incoming HTTP requests to HTTPS This means that users who inadvertently access the web interface via HTTP ...

Страница 31: ... Displaying current configuration certificates On the access type configuration page you can see the types of access currently active as well as infor mation regarding the current certificate Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 32: ...wn You can restart or shut down the device over both the web interface and the console In the web interface you will find the menu items Restart device and Shut down device under the point Control device in the main menu The device will execute the action immediately after the command has been selected In the console you can get to the device control menu by pressing F2 Copyright Mathias Kettner Gm...

Страница 33: ...s standard with most Linux distributions You can use the following command to wake up an appliance wol de ad be ef ca fe Of course you need to replace the example MAC address de ad be ef ca fe with the MAC address of your device 10 3 Restoring factory configuration You can reset your device to factory settings This means that any changes you have made to the device e g your device settings monitori...

Страница 34: ...k III Manual 29 61 on Yes Your data will now be deleted from the device and the device then restarted immediately The device will now start with a fresh configuration Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 35: ...and restarted after the backup 11 1 Automatic backup To set up an automatic data backup configure one or more backup jobs A backup data set must be created on the target system for each backup job When each new backup is completed the previ ous backup will be deleted meaning that on the target system double the storage allocation will be temporarily required The backup does not manage multiple gene...

Страница 36: ... job on the Appliance backup page The scheduled time for the next execution will be shown at the end of this line As soon as the job has started or respectively completed its status will be shown in this view You can also manually start or if needed interrupt running backups here To test your newly created job click on the Play icon You will see in the table that your job is currently running By c...

Страница 37: ...onitoring instances The monitoring instances are saved in separate archives that use the site SITENAME naming schema Depending on the backup s mode these data sets are saved with the tar file extension for uncom pressed and unencrypted tar gz for compressed but unencrypted and tar gz enc for compressed and encrypted archives 11 4 Encryption If you want to encrypt your backup you can configure this d...

Страница 38: ... backup will be automatically encrypted 11 5 Compression It is possible to compress the data during the copy procedure This can be useful if you need to save bandwidth or if space on the target system is limited But please be aware however that the compression requires noticeably more CPU time and therefore the backup procedure will take longer As a rule it is advisable not to activate compression...

Страница 39: ...e next page select the backup target from where you want to source the backed up data Once the backup target has been selected a list of all of its available backups will be shown Next click on the arrow beside the backup data you wish to use and the restore will initiate and following confirmation of a security query the restore will start While the restore is running you can view its progress by ...

Страница 40: ...m Check_MK version 1 4 0i1 for every configured backup job the Service Discovery on the appliance has a new service Backup JOB ID This service informs of potential problems with the backup and displays useful values such as size and duration 11 8 Special features with clusters The complete configuration of the backups including the encryption keys will be synchronised between the cluster nodes The c...

Страница 41: ...n devices to identify the file system Next select if and how the file system is to be mounted Recommended is automatic mounting when accessed and respectively automatic unmounting when inactive Next configure the type of share to be mounted and finally depending on this the necessary settings for mounting the share for example the file server s network address and the exported file path in the case of N...

Страница 42: ...Check_MK rack1 Mark III Manual 37 61 If there are problems you may find possible error messages in the system log Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 43: ...e inactive node takes control of the resources If the active device can no longer access the external network and unlike the inactive node has a connection to this network the inactive node takes control of the resources If you carry out a firmware update you can update the nodes individually While one node is being updated the other node will continue performing the monitoring 13 1 Prerequisites I...

Страница 44: ...tes The configuration of a cluster with two Check_MK rack1 is shown in the following A cluster is built which looks as shown in the diagram below The interface designations LAN1 LAN2 etc used in the diagram correspond to the designations of the physical interfaces on the device In the operating system LAN1 corresponds to the device eth0 LAN2 to the device eth1 etc This configuration complies with th...

Страница 45: ... the device will be shown to you on the following page Only the interface eth0 corresponding to LAN1 will currently have a configuration which was applied by the Basic mode Now create the first bonding interface bond0 by clicking on Create bonding For this purpose enter into the dialogue that follows all data as shown in the diagram below and confirm the dialogue with Save Copyright Mathias Kettner G...

Страница 46: ...Check_MK rack1 Mark III Manual 41 61 Now create the second bonding interface bond1 with the appropriate configuration Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 47: ...ck1 Mark III Manual 42 61 After you have created the two bonding interfaces you will be able to review all settings made in the network configuration dialogue Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 48: ... In our example we configure node1 as a host name on the first device and node2 on the second device 13 3 3 Connecting the cluster Having completed preparations you can now continue setting up the cluster To do this open the Clustering module in the main menu of the first device here node1 in the web interface and click on Manually set up cluster Now enter the appropriate configuration in the cluster ...

Страница 49: ... This password is used once to establish the connection between the two devices Then confirm the security prompt if you are sure that you want to overwrite the data of the target device with the IP address displayed Once this connection is successful cluster setup is commenced You can have the current status dis played on the cluster page Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 50: ...s you may have will be started on the first node From now on you can using the cluster IP address here 10 3 3 30 access the resources of the cluster e g your monitoring instances regardless of the node by which the resources are currently being held 13 4 The state of the cluster When the first synchronisation is complete your cluster will be fully operational You can view the state at any time on th...

Страница 51: ...st 13 5 Special cases in the cluster 13 5 1 Access to resources All requests to the monitoring instances e g web interface access as well as incoming messages e g SNMP traps or syslog messages to the event console or requests to Livestatus should normally always be sent via the cluster IP address Only in exceptional cases e g diagnostics or updates of a particular node should you need to access th...

Страница 52: ...ace of the active node If to do this you also access the cluster IP address directly you will always be referred to the device with which you can configure these things 13 6 Administrative tasks 13 6 1 Firmware updates in the cluster The firmware version of a device is not synchronised in cluster operation The update is thus carried out for each node You have the advantage however that one node can ...

Страница 53: ... cluster page once more and remove the maintenance state of the updated device The device will then automatically merge into cluster operation upon which the cluster becomes fully functional again It is recommended to run the same firmware version on both nodes You should therefore repeat the same procedure for the other node next Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 54: ...ntinue using and then restore the factory settings on the other device Once you have disconnected a node from the cluster the monitoring instances will not be started auto matically If you wish to start the monitoring instances you need to do so next via the web interface 13 6 3 Exchanging a device If the hard drives of the old device are in good order you can take these from the old device and in...

Страница 55: ...ter log Please note that these entries just like the other system messages are lost when restarting the device If you would like to keep the messages for longer you can download the current log file over your browser or set up a permanent forwarding of log messages to a syslog server Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 56: ...ut the modem into operation you must insert a functioning SIM card attach the modem to a free USB connector on your appliance using the enclosed USB cable and connect the modem to the mains using the enclosed power adapter As soon as this has been done the device will automatically detect the modem and set it up Open the web interface of the device and select the module SMS administration The curr...

Страница 57: ...ding on the page SMS administration The entries in these lists will be kept for a maximum of 30 days and then automatically deleted It is possible via the menu item Send test SMS to send a test SMS to a number of your choice You will find further information on possible SMS sending errors in the SMS log Copyright Mathias Kettner GmbH 2018 mathias kettner de ...

Страница 58: ... one 15 1 Administration in web interface You can view the state of the RAID in the web interface of your device To do this select the item RAID setup in the main menu of the web interface This screen also gives you the option to repair the RAID if necessary 15 2 Exchanging a defective hard drive If a hard drive is detected as being defective this will be displayed in the web interface with defect...

Страница 59: ...bay of the device If the device is switched on while you are exchanging the hard drive the RAID rebuild will start auto matically You can view the progress in the web interface Failsafe operation is only restored once the RAID has been completely repaired The hard drive must be at least the same size as the RAID itself You can verify this in the RAID status view 15 3 Both hard drives defective If ...

Страница 60: ...IPMI LAN connector with your network Important For security reasons we recommend connecting the IPMI LAN with a dedicated management network where possible The management interface is delivered deactivated You can activate and configure it via the setting management interface in the device settings You must assign a separate IP address for the management interface and specify dedicated access data ...

Страница 61: ...e In order to make diagnostics on the device easier there is a view that displays the device s various log files You can go to this view by clicking on the menu item Log files in the main menu of the web interface You can select the logs of the device here and view their current content Note The system log is reinitialised each time the device is started up If you would like to keep the log entries ...

Страница 62: ...f memory is reserved for the mandatory system processes The exact amount of reserved memory depends on your device configuration Standalone device no cluster configuration 100 MB Geclustert 300 MB If you want to know exactly how much memory is available to your monitoring sites and how much is cur rently used you can monitor your device using Check_MK After service discovery the host automatically m...

Страница 63: ... data of your current support contract 18 4 Hardware support In the event of hardware failure please contact us by email at cma support mathias kettner de or call us on 49 89 18 90 435 20 The problem will be handled by the distributor directly and in accordance with the maintenance agreed upon 18 5 Software support In the case of a software fault whether firmware or Check_MK monitoring software ple...

Страница 64: ... are free from defects of title The following table will provide you with information on the respective software licences of the compo nents used Designation Version Licence information Debian 7 Wheezy Free Software1 OMD 1 2 4 2 GPL v23 pnp4nagios 0 6 21 GPL v23 nagvis 1 8 GPL v23 rrdtool 1 4 8 GPL v23 check_mk 1 2 4 GPL v23 mk livestatus 1 2 4 GPL v23 cmc 1 2 4 Proprietary dokuwiki 2013 05 10a GP...

Страница 65: ...5 Legal notice All information contained in this documentation has been compiled with great care but must not be construed as a warranty for product characteristics Mathias Kettner GmbH shall only be liable to the extent set forth in the Terms and Conditions of Sale and Delivery This manual is the property of Mathias Kettner GmbH and is protected by copyright This document may be neither copied tr...

Страница 66: ...nstance 10 Instance Administration 12 instance administration 10 13 instance login via SSH 19 IP address 39 IP address 5 16 L LAN 39 language 3 16 Logs 56 M MAC address 28 management interface 55 monitoring instances 10 mounts 36 N name resolution 16 netmask 5 16 39 network 39 network configuration 5 NTP 17 NTP server 17 NTP servers 9 R RAID 1 53 Restarting 27 root 20 S Shutting down 27 SMS 51 SMTP...

Страница 67: ......

Страница 68: ...Mathias Kettner GmbH Kellerstraße 29 81667 München Germany http mathias kettner de ...

Отзывы: