Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19
20 == **1.2  Steps** ==
21
22
23 * Create account in ThingsSpeak and creat channel.
24 * Download script from dragino site and move it to properly directory
25
26 (% class="box infomessage" %)
27 (((
28 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
29 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
30 Connecting to 162.241.22.11:80
31 Writing to 'monitor_gateway.sh'
32 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
33 Download completed (1860 bytes)
34 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
35 root@dragino-1baf44:~~#
36 root@dragino-1baf44:~~#
37 )))
38
39
40
41 * change the script monitor_gateway.sh with properly users setting:
42
43 (% class="box infomessage" %)
44 (((
45 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
46 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
47 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
48 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
49 )))
50
51
52
53 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
54
55 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
56
57 (% class="box infomessage" %)
58 (((
59 # For details see man 4 crontabs
60 # Example of job definition:
61 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
62 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
63 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
64 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
65 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
66 # | | | | |
67 # * * * * * user-name command to be executed
68 #*/10 * * * *  checklog
69 ~* 23 * * *  /etc/init.d/auto_update start
70 */20 * * * *  /usr/bin/monitor_gateway.sh     
71 )))
72
73 * Reboot device.
74
75
76 == **1.3  Monitor Public IP** ==
77
78
79 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
80
81 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
82
83
84 [[image:image-20220531145559-2.png]]
85
86 Find Public IP
87
88
89
90 = **2.  Remote Access** =
91
92 == **2.1  Remote Access via Remote.it.** ==
93
94
95 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
96
97
98 (% style="color:red" %)**Important Notice:**
99
100 * Remote.it access will give full control of your device to remote support.
101 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
102
103 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
104 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
105
106 (% style="color:blue" %)**1. Install the Remote.it software**
107
108 Users can directly click** "Install"** on the Web UI to install Remote. it.
109
110
111 [[image:image-20220725134300-1.png||height="438" width="905"]]
112
113
114
115 (% style="color:blue" %)**2. Enter the license key**
116
117 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
118
119 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
120
121
122 (% class="box infomessage" %)
123 (((
124 **57F60715-606F-510D-A3D2-739860EBDB98**
125 )))
126
127 [[image:image-20220725113010-1.png||height="455" width="899"]]
128
129
130
131 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
132
133 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
134
135
136 [[image:image-20220725115720-2.png||height="658" width="900"]]
137
138
139
140 === **2.1.1  How to register hp0d with Remote.it** ===
141
142
143 **Prerequisites:**
144
145 Users must have an account and APP for remote.it
146
147 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
148
149
150 (% style="color:blue" %)**1.  Click "+" in the APP to add a device**
151
152 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
153
154
155 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
156
157
158
159 (% style="color:blue" %)**2.  Copy the register device command**
160
161
162 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
163
164
165
166 (% style="color:blue" %)**3.  Enter the command copied from the previous step on the HP0D Linux command line**
167
168
169 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
170
171
172
173 (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**
174
175
176 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
177
178
179
180 === **2.1.2  Trouble Shooting** ===
181
182
183 ==== **What should users do when gateway Remote.it installation fails** ====
184
185
186 [[image:image-20220907162028-4.png||height="564" width="1148"]]
187
188
189 (% style="color:blue" %)**Step 1:  **(%%)Users can download the archive and upload it to the gateway:** [[attach:backup.tar.gz||target="_blank"]]**
190
191 [[image:image-20220907161050-2.png]]
192
193
194
195 (% style="color:blue" %)**Step 2:  **(%%)Back to the Remote.it screen, and click **"Install"** again.
196
197 [[image:image-20220907161352-3.png]]
198
199
200 (% style="color:blue" %)**Step 3:**(%%) Follow the [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]] steps to reconfigure
201
202
203 == **2.2  RSSH Introduction** ==
204
205
206 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
207
208 (% style="color:red" %)**Important Notice:**
209
210 (% class="box warningmessage" %)
211 (((
212 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
213 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
214 )))
215
216
217 **Below gateway support reverse SSH access:**
218
219 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
220 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
221 * LG02, OLG02
222 * LG308, DLOS8
223 * LPS8
224 * LIG16
225 * MS14 series if installed with the same firmware.
226
227
228
229
230 === **2.2.1  End User Guide to use SSH access** ===
231
232
233 Go to this the Reverse SSH page as below:
234
235
236 [[image:image-20220531150151-3.png]]
237
238 Get the RSSH configure page
239
240
241
242 [[image:image-20220531150338-4.png]]
243
244 Connection OK.
245
246
247 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
248 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
249 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
250 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
251 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
252
253 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
254
255
256
257 === **2.2.2  Set Up RSSH Server** ===
258
259
260 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
261
262
263
264 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
265
266
267 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
268
269 [[image:image-20220531150750-5.png]]
270
271
272 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
273
274 [[image:image-20220531150811-6.png]]
275
276
277 **Debug** :
278
279 (((
280 (% class="box" %)
281 (((
282 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
283 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
284 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
285 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
286 )))
287 )))
288
289 [[image:image-20220531151516-7.png]]
290
291
292 (((
293 (% class="box" %)
294 (((
295 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
296 please insatell sqlite3.
297 )))
298 )))
299
300 [[image:image-20220531151628-8.png]]
301
302
303 (% style="color:blue" %)**How to install Sqlit3:**
304
305 (% class="box infomessage" %)
306 (((
307 **~ Step 1:** Download the SQLit3 installation package
308 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
309
310 **Step 2: **tar the SQLit3 installation package
311 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
312
313 **Step 3:** Generate the makefile
314 cd sqlite-autoconf-3350300/;./configure
315
316 **Step 4:** Compile makefile
317 sudo make
318
319 **Step 5:** Install makefile
320 sudo make install
321
322 **Check:**
323 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
324 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
325
326 **debug:**
327 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
328 Please execute the command /sbin/ldconfig.
329 After that execute the command ./sqlite3 test.db again.
330 )))
331
332
333
334 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
335
336
337 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
338
339 user must enter the root account and run the following commands
340
341 (% class="box infomessage" %)
342 (((
343 **$ ./create_sqlite3_db.sh
344 $ ./rssh_serv -p  3721 2>&1 &
345 $ ps -ef | grep rssh_serv check 3721 port**
346 )))
347
348 [[image:image-20220531151958-10.png]]
349
350
351 **Debug:**
352
353 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
354 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
355 }}}
356
357 {{{ if fail to open dpvlry or to bind to it
358 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
359 }}}
360
361
362
363 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
364
365
366 (% class="box infomessage" %)
367 (((
368 **1):**  sudo useradd XXXXX (custom user name)
369 **2):**  sudo passwd xxxxxx
370 **3):**  cp /bin/bash /bin/rbash
371 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
372 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
373 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
374 )))
375
376 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
377
378
379
380 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
381
382
383 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
384
385
386 **Debug:**
387
388 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
389
390
391
392 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
393
394
395
396 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
397
398
399 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
400
401 [[image:image-20220531152419-11.png]]
402
403
404
405 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
406
407
408 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
409
410 [[image:image-20220531152549-12.png]]
411
412
413
414 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
415
416
417 This is same as connect Dragino Support Server but just change the server address to customize server address.
418
419 [[image:image-20220531152633-13.png]]
420
421
422
423 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
424
425
426 Rssh Host connection Ok
427
428 [[image:image-20220531152815-14.png]]
429
430
431 User can use common ps | grep ssh to check it in the gateway.
432
433 [[image:image-20220531152840-15.png]]
434
435
436
437 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
438
439
440 Check what gateways link to server.
441
442 (% class="box infomessage" %)
443 (((
444 **$ ./connect-gw.sh -l**
445 )))
446
447 [[image:image-20220531153016-16.png]]
448
449
450
451 Access the gateway
452
453 (% class="box infomessage" %)
454 (((
455 **$ ./connect-gw.sh <GWID>**
456 )))
457
458 [[image:image-20220531153219-17.png]]
459
460
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0