[arm-allstar] Supermon configuration
ve2gqf at gmail.com
ve2gqf at gmail.com
Fri Sep 21 09:28:11 EDT 2018
Thank's Paul,
In fact password was not ***, but I had test with other password (uppercase, lowercase) pwd, but there is n change !
Another idea ?
Manager.conf has bindport 0.0.0.0 Yes
Secret set correctly at both allmon.ini and manager.conf Yes
The RPI is on site, and I have access throut a VPN, no FW on the RPI.
Thank's Gilles VE2GQF
Le 2018-09-20 à 08:49, "Paul - KN2R via ARM-allstar" a écrit :
> Maybe it does not like the characters with asterisk "*" in password. Change those and see if it works.
>
> Paul / KN2R
>
>
>
> -----Original Message-----
> From: ARM-allstar [mailto:arm-allstar-bounces at hamvoip.org] On Behalf Of "Doug Crompton via ARM-allstar"
> Sent: Wednesday, September 19, 2018 11:01 AM
> To: ARM Allstar
> Cc: Doug Crompton
> Subject: Re: [arm-allstar] Supermon configuration
>
> Giles,
>
> I am not sure what could be wrong. This does work. Did you follow all the directions in the howto at hamvoip.org?
>
> Manager.conf has bindport 0.0.0.0
> Secret set correctly at both allmon.ini and manager.conf
>
> What is the path for this control? Is it within your LAN or out on the Internet?
> If out on the Internet you need to port forward 5038 TCP.
>
>
> *73 Doug*
>
> *WA3DSP*
>
> *http://www.crompton.com/hamradio <http://www.crompton.com/hamradio>*
>
>
>
>
> On Wed, Sep 19, 2018 at 10:48 AM "ve2gqf--- via ARM-allstar" < arm-allstar at hamvoip.org> wrote:
>
>> Thank you very much Doug for your response,
>>
>> I have made these corrections, without success.
>>
>> If it can helps :
>>
>> [root at VE2RQF-900 asterisk]# tcpdump port 5038
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol
>> decode listening on eth0, link-type EN10MB (Ethernet), capture size
>> 262144 bytes
>> 06:55:42.260508 IP VE2RQF-900.51582 > 192.168.27.134.5038: Flags [S],
>> seq 4033407941, win 29200, options [mss 1460,sackOK,TS val 3964593032
>> ecr 0,nop,wscale 7], length 0
>> 06:55:43.265404 IP VE2RQF-900.51582 > 192.168.27.134.5038: Flags [S],
>> seq 4033407941, win 29200, options [mss 1460,sackOK,TS val 3964594037
>> ecr 0,nop,wscale 7], length 0
>> 06:55:45.345406 IP VE2RQF-900.51582 > 192.168.27.134.5038: Flags [S],
>> seq 4033407941, win 29200, options [mss 1460,sackOK,TS val 3964596117
>> ecr 0,nop,wscale 7], length 0
>> 06:56:38.029448 IP VE2RQF-900.51600 > 192.168.27.134.5038: Flags [S],
>> seq 2964414919, win 29200, options [mss 1460,sackOK,TS val 3964648802
>> ecr 0,nop,wscale 7], length 0
>> 06:56:39.115401 IP VE2RQF-900.51600 > 192.168.27.134.5038: Flags [S],
>> seq 2964414919, win 29200, options [mss 1460,sackOK,TS val 3964649888
>> ecr 0,nop,wscale 7], length 0
>>
>> Another suggestion ?
>>
>> 73's Gilles VE2GQF
>>
>>
>> Le 2018-09-18 à 23:21, "Doug Crompton via ARM-allstar" a écrit :
>>> Giles,
>>>
>>> It seems you changed a few lines in manager.conf that did not need
>>> to be changed and did not change the one line you needed to change!
>>> Here is
>> what
>>> it should look like -
>>>
>>> *manager.conf*
>>> [general]
>>> displaysystemname = yes
>>> enabled = yes
>>> ;webenabled = yes
>>> port = *5038*
>>>
>>> ;httptimeout = 60
>>> ; a) httptimeout sets the Max-Age of the http cookie ; b)
>>> httptimeout is the amount of time the webserver waits
>>> ; on a action=waitevent request (actually its httptimeout-10)
>>> ; c) httptimeout is also the amount of time the webserver keeps
>>> ; a http session alive after completing a successful action
>>>
>>> ;bindaddr = 127.0.0.1 ; Local interface only!
>>> bindaddr = 0.0.0.0 ; Not secure
>>> ;
>>> ;displayconnects = yes
>>> ;
>>> ; Add a Unix epoch timestamp to events (not action responses) ;
>>> ;timestampevents = yes
>>>
>>> [admin]
>>> secret = *xxxx*
>>> read = all,system,call,log,verbose,command,agent,user,config
>>> write = all,system,call,log,verbose,command,agent,user,config
>>>
>>> Note - webenabled is commented, disolayconnects is commented and
>>> most importantly
>>> bindaddr=0.0.0.0 is uncommented and bindaddr=127.0.0.1 is commented
>>> without this bindaddr change the manager cannot be accessed outside
>>> of
>> this
>>> server.
>>> Also note that if you port forward the manager port you could open
>> yourself
>>> up to
>>> security problems. See the supermon howto at hamvoip.org for a
>>> firewall script to avoid that.
>>>
>>>
>>> *73 Doug*
>>>
>>> *WA3DSP*
>>>
>>> *http://www.crompton.com/hamradio
>>> <http://www.crompton.com/hamradio>*
>>>
>>> On Tue, Sep 18, 2018 at 9:23 PM "ve2gqf--- via ARM-allstar" <
>>> arm-allstar at hamvoip.org> wrote:
>>>
>>>> Hi Doug,
>>>>
>>>> I trying to run supermon on VE2RQF all looks good but I have an issue.
>>>> Supermon can't connect to Asterisk Manager. there is no firewall,
>>>> no
>> port
>>>> blocked.
>>>>
>>>> [ VE2RQF-900 ] [ WAN IP: 70.82.65.122 <
>>>> http://192.168.27.66/supermon/custom/iplog.txt> ] [ LAN IP:
>> 192.168.2.153
>>>> ] [ AstP: 4569 ] [ MgrP: 5038 ] [
>>>> SShP: 222 ]
>>>> [ Tuesday, September 18, 2018 EDT 19:16:05 up 2 days, 2:00, 5
>>>> users,
>> load
>>>> average: 0.06, 0.09, 0.09 ]
>>>>
>>>> / Node 47646 <http://stats.allstarlink.org/nodeinfo.cgi?node=47646> =>
>>>> VE2RQF 927.300- Sherbrooke, Quebec Bubble Chart
>>>> <http://stats.allstarlink.org/getstatus.cgi?47646> lsNodes <
>>>> http://192.168.27.66/cgi-bin/lsnodes_web?node=47646> /
>>>> Node Node Information Received Link Direction
>>>> Connected Mode
>>>> Connecting to Asterisk Manager...
>>>>
>>>>
>>>> my config files are below
>>>>
>>>> allmon.ini
>>>> [47646]
>>>> host=127.0.0.1:*5038*
>>>> user=admin
>>>> passwd=*xxxx*
>>>> menu=yes
>>>> hideNodeURL=no
>>>>
>>>> *manager.conf*
>>>> [general]
>>>> displaysystemname = yes
>>>> enabled = yes
>>>> webenabled = yes
>>>> port = *5038*
>>>>
>>>> ;httptimeout = 60
>>>> ; a) httptimeout sets the Max-Age of the http cookie ; b)
>>>> httptimeout is the amount of time the webserver waits
>>>> ; on a action=waitevent request (actually its httptimeout-10)
>>>> ; c) httptimeout is also the amount of time the webserver keeps
>>>> ; a http session alive after completing a successful action
>>>>
>>>> bindaddr = 127.0.0.1 ; Local interface only!
>>>> ;bindaddr = 0.0.0.0 ; Not secure
>>>> ;
>>>> displayconnects = yes
>>>> ;
>>>> ; Add a Unix epoch timestamp to events (not action responses) ;
>>>> ;timestampevents = yes
>>>>
>>>> [admin]
>>>> secret = *xxxx*
>>>> read = all,system,call,log,verbose,command,agent,user,config
>>>> write = all,system,call,log,verbose,command,agent,user,config
>>>>
>>>> Can you say what I have missed ?
>>>>
>>>> Thank's,
>>>>
>>>> Gilles ve2gqf
>>>>
>>>>
>>>>
>>>> ---
>>>> L'absence de virus dans ce courrier électronique a été vérifiée par
>>>> le logiciel antivirus Avast.
>>>> https://www.avast.com/antivirus
>>>> _______________________________________________
>>>>
>>>> ARM-allstar mailing list
>>>> ARM-allstar at hamvoip.org
>>>> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>>>>
>>>> Visit the BBB and RPi2/3 web page - http://hamvoip.org
>>> _______________________________________________
>>>
>>> ARM-allstar mailing list
>>> ARM-allstar at hamvoip.org
>>> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>>>
>>> Visit the BBB and RPi2/3 web page - http://hamvoip.org
>>
>> ---
>> L'absence de virus dans ce courrier électronique a été vérifiée par le
>> logiciel antivirus Avast.
>> https://www.avast.com/antivirus
>>
>> _______________________________________________
>>
>> ARM-allstar mailing list
>> ARM-allstar at hamvoip.org
>> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>>
>> Visit the BBB and RPi2/3 web page - http://hamvoip.org
> _______________________________________________
>
> ARM-allstar mailing list
> ARM-allstar at hamvoip.org
> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>
> Visit the BBB and RPi2/3 web page - http://hamvoip.org
>
> _______________________________________________
>
> ARM-allstar mailing list
> ARM-allstar at hamvoip.org
> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>
> Visit the BBB and RPi2/3 web page - http://hamvoip.org
---
L'absence de virus dans ce courrier électronique a été vérifiée par le logiciel antivirus Avast.
https://www.avast.com/antivirus
More information about the ARM-allstar
mailing list