Welcome to docs.opsview.com

Differences

This shows you the differences between two versions of the page.

opsview4.6:securitywallet [2014/10/07 09:49]
aburzynski
opsview4.6:securitywallet [2014/10/22 11:34] (current)
tvoon
Line 43: Line 43:
==== Opsview DB ==== ==== Opsview DB ====
The process for the Opsview database is: The process for the Opsview database is:
-  * Run ''db_opsview db_exists''. This will return no output with an exit code of 0 as the credentials will be correct +  * Run ''/usr/local/nagios/bin/db_opsview db_exists''. This will return no output with an exit code of 0 as the credentials will be correct 
-  * Note the current database password, ''$dbpasswd'', used in the ''opsview.conf'' file +  * Note the current database password, ''$dbpasswd'', used in the ''/usr/local/nagios/etc/opsview.conf'' file 
-  * Run ''opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste +  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste 
-  * Edit ''opsview.conf'' and set the new encrypted value, eg:+  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set the new encrypted value, eg:
<code> <code>
$dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da"; $dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da";
</code> </code>
(The encrypted password will be based on your randomly generated key, so the value above will not work on other systems.) (The encrypted password will be based on your randomly generated key, so the value above will not work on other systems.)
-  * Run ''db_opsview db_exists'' to confirm the database connection works with the new password +  * Run ''/usr/local/nagios/bin/db_opsview db_exists'' to confirm the database connection works with the new password 
-  * Remove the previous ''$dbpasswd'' value. Run ''db_opsview db_exists'' to confirm the connection still works+  * Remove the previous ''$dbpasswd'' value. Run ''/usr/local/nagios/bin/db_opsview db_exists'' to confirm the connection still works
==== Runtime DB ==== ==== Runtime DB ====
The process for the Runtime database is: The process for the Runtime database is:
-  * Run ''db_runtime db_exists''. This will return no output with an exit code of 0 as the credentials will be correct +  * Run ''/usr/local/nagios/bin/db_runtime db_exists''. This will return no output with an exit code of 0 as the credentials will be correct 
-  * Note the current database password, ''$runtime_dbpasswd'', used in the ''opsview.conf'' file +  * Note the current database password, ''$runtime_dbpasswd'', used in the ''/usr/local/nagios/etc/opsview.conf'' file 
-  * Run ''opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste +  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste 
-  * Edit ''opsview.conf'' and set the new encrypted value, eg:+  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set the new encrypted value, eg:
<code> <code>
$runtime_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da"; $runtime_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da";
</code> </code>
-  * Run ''db_runtime db_exists'' to confirm the database connection works with the new password +  * Run ''/usr/local/nagios/bin/db_runtime db_exists'' to confirm the database connection works with the new password 
-  * Remove the previous ''$runtime_dbpasswd'' value. Run ''db_runtime db_exists'' to confirm the connection still works+  * Remove the previous ''$runtime_dbpasswd'' value. Run ''/usr/local/nagios/bin/db_runtime db_exists'' to confirm the connection still works
==== ODW DB ==== ==== ODW DB ====
The process for the ODW database is: The process for the ODW database is:
-  * Run ''db_odw db_exists''. This will return no output with an exit code of 0 as the credentials will be correct +  * Run ''/usr/local/nagios/bin/db_odw db_exists''. This will return no output with an exit code of 0 as the credentials will be correct 
-  * Note the current database password, ''$odw_dbpasswd'', used in the ''opsview.conf'' file +  * Note the current database password, ''$odw_dbpasswd'', used in the ''/usr/local/nagios/etc/opsview.conf'' file 
-  * Run ''opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste +  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste 
-  * Edit ''opsview.conf'' and set the new encrypted value, eg:+  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set the new encrypted value, eg:
<code> <code>
$odw_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da"; $odw_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da";
</code> </code>
-  * Run ''db_odw db_exists'' to confirm the database connection works with the new password +  * Run ''/usr/local/nagios/bin/db_odw db_exists'' to confirm the database connection works with the new password 
-  * Remove the previous ''$odw_dbpasswd'' value. Run ''db_odw db_exists'' to confirm the connection still works+  * Remove the previous ''$odw_dbpasswd'' value. Run ''/usr/local/nagios/bin/db_odw db_exists'' to confirm the connection still works
==== Dashboard DB ==== ==== Dashboard DB ====
The process for the Dashboard database is: The process for the Dashboard database is:
-  * Run ''db_dashboard db_exists''. This will return no output with an exit code of 0 as the credentials will be correct +  * Run ''/usr/local/nagios/bin/db_dashboard db_exists''. This will return no output with an exit code of 0 as the credentials will be correct 
-  * Note the current database password, ''$dashboard_dbpasswd'', used in the ''opsview.conf'' file +  * Note the current database password, ''$dashboard_dbpasswd'', used in the ''/usr/local/nagios/etc/opsview.conf'' file 
-  * Run ''opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste +  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the password when prompted. This will print the encrypted password to screen for cut-and-paste 
-  * Edit ''opsview.conf'' and set the new encrypted value, eg:+  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set the new encrypted value, eg:
<code> <code>
$dashboard_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da"; $dashboard_dbpasswd_encrypted = "53f0990f9ddfaec4769c6facbb93e66bdefcc80cb6913faa74559eeafb5863da";
</code> </code>
-  * Run ''db_dashboard db_exists'' to confirm the database connection works with the new password +  * Run ''/usr/local/nagios/bin/db_dashboard db_exists'' to confirm the database connection works with the new password 
-  * Remove the previous ''$dashboard_dbpasswd'' value. Run ''db_dashboard db_exists'' to confirm the connection still works+  * Remove the previous ''$dashboard_dbpasswd'' value. Run ''/usr/local/nagios/bin/db_dashboard db_exists'' to confirm the connection still works
Line 122: Line 122:
To convert your shared secret to be encrypted: To convert your shared secret to be encrypted:
  * Ensure your live Apache includes ''/usr/local/opsview-web/etc/apache-authtkt.conf''   * Ensure your live Apache includes ''/usr/local/opsview-web/etc/apache-authtkt.conf''
-  * Run ''opsview_crypt'' and enter the shared secret to encrypt+  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the shared secret to encrypt
  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$authtkt_shared_secret_encrypted="encryptedvalue";''   * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$authtkt_shared_secret_encrypted="encryptedvalue";''
  * Run /usr/local/opsview-web/bin/postinstall to generate the new Apache configuration file   * Run /usr/local/opsview-web/bin/postinstall to generate the new Apache configuration file
Line 135: Line 135:
To convert your shared secret to be encrypted: To convert your shared secret to be encrypted:
-  * Run ''opsview_crypt'' and enter the shared secret to encrypt+  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the shared secret to encrypt
  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$nrd_shared_secret_encrypted="encryptedvalue";''   * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$nrd_shared_secret_encrypted="encryptedvalue";''
  * Reload to send settings to all the slaves   * Reload to send settings to all the slaves
Line 145: Line 145:
To convert your shared secret to be encrypted: To convert your shared secret to be encrypted:
-  * Run ''opsview_crypt'' and enter the shared secret to encrypt+  * Run ''/usr/local/nagios/bin/opsview_crypt'' and enter the shared secret to encrypt
  * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$nsca_shared_password_encrypted="encryptedvalue";''   * Edit ''/usr/local/nagios/etc/opsview.conf'' and set ''$nsca_shared_password_encrypted="encryptedvalue";''
  * Reload to generate the nsca.cfg file   * Reload to generate the nsca.cfg file
Line 195: Line 195:
To restore previous databases user will have to now run To restore previous databases user will have to now run
<code> <code>
-nagios@opsview-master$ db_opsview db_restore < var/backups/sw-migration/opsview_backup.sql +nagios@opsview-master$ /usr/local/nagios/bin/db_opsview db_restore < var/backups/sw-migration/opsview_backup.sql 
-nagios@opsview-master$ db_dashboard db_restore < var/backups/sw-migration/dashboard_backup.sql+nagios@opsview-master$ /usr/local/nagios/bin/db_dashboard db_restore < var/backups/sw-migration/dashboard_backup.sql
</code> </code>
Navigation
Print/export
Toolbox