Version 72.1 by Kilight Cao on 2023/04/11 14:54

Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = 1.  Monitor Gateway =
9
10 == 1.1  Introduction ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19 == 1.2  Steps ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39
40 * change the script monitor_gateway.sh with properly users setting:
41
42 (% class="box infomessage" %)
43 (((
44 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
45 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
46 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
47 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
48 )))
49
50
51
52 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
53
54 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
55
56 (% class="box infomessage" %)
57 (((
58 # For details see man 4 crontabs
59 # Example of job definition:
60 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
61 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
62 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
63 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
64 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
65 # | | | | |
66 # * * * * * user-name command to be executed
67 #*/10 * * * *  checklog
68 ~* 23 * * *  /etc/init.d/auto_update start
69 */20 * * * *  /usr/bin/monitor_gateway.sh     
70 )))
71
72 * Reboot device.
73
74
75 == 1.3  Monitor Public IP ==
76
77
78 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
79
80 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
81
82
83 [[image:image-20220531145559-2.png]]
84
85 Find Public IP
86
87
88 = 2.  Remote Access =
89
90 = 2.1  Remote Access via Remote.it. =
91
92
93 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
94
95
96 (% style="color:red" %)**Important Notice:**
97
98 * Remote.it access will give full control of your device to remote support.
99 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
100 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
101 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
102
103 (% style="color:blue" %)**1. Install the Remote.it software**
104
105 Users can directly click** "Install"** on the Web UI to install Remote. it.
106
107
108 [[image:image-20220725134300-1.png||height="438" width="905"]]
109
110
111
112 (% style="color:blue" %)**2. Enter the license key**
113
114 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
115
116 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
117
118
119 (% class="box infomessage" %)
120 (((
121 **fd173d1d-faed-493e-a868-c511a38aba45**
122 )))
123
124 [[image:image-20220725113010-1.png||height="455" width="899"]]
125
126
127
128 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
129
130 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
131
132
133 [[image:image-20220725115720-2.png||height="658" width="900"]]
134
135
136
137 == 2.1.1  How to save the registered remote after the gateway's firmware update. ==
138
139
140 Before version [[lgw~~-~~-build-v5.4.1668240318-20221112-1606>>http://repo.dragino.com/release/miscellaneous/remoteit/dragino-lgw--v5.4.1668240318-squashfs-sysupgrade.bin]], once the gateway firmware is upgraded the remote configuration is gone.
141
142 This issue is now corrected:
143
144
145
146 === **The gateway version is lower than** **lgw~-~-build-v5.4.1668240318-20221112-1606:** ===
147
148
149 **~1. upload the [[backup file>>http://repo.dragino.com/release/miscellaneous/remoteit/backup.tar.gz]] to update the configuration.**
150
151 [[image:image-20221112162644-4.png]]
152
153
154
155 **2. Check the 'Preserver Settings' check box when you upgrade the gateway with the firmware. **
156
157 [[image:image-20221112162543-2.png]]
158
159
160
161 === **The gateway version is greater or equal to**  **lgw~-~-build-v5.4.1668240318-20221112-1606:** ===
162
163
164
165 **~1. Only to do: Check the 'Preserver Settings' check box when you upgrade the gateway with the firmware. **
166
167 [[image:image-20221112162547-3.png]]
168
169
170 == 2.1.2  How to register hp0d with Remote.it ==
171
172
173 **Prerequisites:**
174
175 Users must have an account and APP for remote.it
176
177 **[[https:~~/~~/app.remote.it>>https://app.remote.it]]**
178
179
180 === (% style="color:blue" %)**1.  Click "+" in the APP to add a device**(%%) ===
181
182
183 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
184
185
186 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
187
188
189
190 === (% style="color:blue" %)**2.  Copy the register device command**(%%) ===
191
192
193 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
194
195
196
197 === (% style="color:blue" %)**3.  Enter the command copied from the previous step on the HP0D Linux command line**(%%) ===
198
199
200 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
201
202
203
204 === (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**(%%) ===
205
206
207 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
208
209
210 == 2.1.3  How to register the gateway with Remote.it via SSH Access for Linux console ==
211
212
213 **Prerequisites:**
214
215 Users must have an account and APP for remote.it
216
217 **[[https:~~/~~/app.remote.it>>https://app.remote.it]]**
218
219 For detailed examples, please see: **[[OpenWrt How to Connect Guide (remote.it)>>url:https://www.remote.it/getting-started/openwrt]]**
220
221
222 === (% style="color:blue" %)**1.  Click "+" in the APP to add a device**(%%) ===
223
224
225 Then click Add "OpenWrt" and the APP will generate a command to register the device.
226
227 [[image:image-20230320110123-4.png||height="657" width="1191"]]
228
229
230 === (% style="color:blue" %)**2.  Copy the register device command**(%%) ===
231
232
233 [[image:image-20230320110309-5.png||height="635" width="1197"]]
234
235
236 === (% style="color:blue" %)**3.  Enter the command copied from the previous step on the gateway Linux command line**(%%) ===
237
238 === [[image:image-20230320105212-1.png||height="758" width="820"]] ===
239
240
241 === (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**(%%) ===
242
243
244 [[image:image-20230320112057-6.png||height="603" width="1135"]]
245
246
247 == 2.1.4  Trouble Shooting ==
248
249
250 === **1. What should users do when gateway Remote.it installation fails** ===
251
252
253 [[image:image-20220907162028-4.png||height="564" width="1148"]]
254
255
256 (% style="color:blue" %)**Step 1:  **(%%)Users can download the archive and upload it to the gateway:** [[attach:backup.tar.gz||target="_blank"]]**
257
258 [[image:image-20220907161050-2.png]]
259
260
261
262 (% style="color:blue" %)**Step 2:  **(%%)Back to the Remote.it screen, and click **"Install"** again.
263
264 [[image:image-20220907161352-3.png]]
265
266
267 (% style="color:blue" %)**Step 3:**(%%) Follow the [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]] steps to reconfigure
268
269
270
271 = 2.2  RSSH Introduction =
272
273
274 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
275
276 (% style="color:red" %)**Important Notice:**
277
278 (% class="box warningmessage" %)
279 (((
280 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
281 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
282 )))
283
284
285 **Below gateway support reverse SSH access:**
286
287 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
288 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
289 * LG02, OLG02
290 * LG308, DLOS8
291 * LPS8
292 * LIG16
293 * MS14 series if installed with the same firmware.
294
295
296 === 2.2.1  End User Guide to use SSH access ===
297
298
299 Go to this the Reverse SSH page as below:
300
301
302 [[image:image-20220531150151-3.png]]
303
304 Get the RSSH configure page
305
306
307
308 [[image:image-20220531150338-4.png]]
309
310 Connection OK.
311
312
313 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
314 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
315 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
316 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
317 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
318
319 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
320
321
322
323 === 2.2.2  Set Up RSSH Server ===
324
325
326 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
327
328
329
330 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
331
332
333 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
334
335 [[image:image-20220531150750-5.png]]
336
337
338 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
339
340 [[image:image-20220531150811-6.png]]
341
342
343 **Debug** :
344
345 (((
346 (% class="box" %)
347 (((
348 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
349 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
350 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
351 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
352 )))
353 )))
354
355 [[image:image-20220531151516-7.png]]
356
357
358 (((
359 (% class="box" %)
360 (((
361 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
362 please insatell sqlite3.
363 )))
364 )))
365
366 [[image:image-20220531151628-8.png]]
367
368
369 (% style="color:blue" %)**How to install Sqlit3:**
370
371 (% class="box infomessage" %)
372 (((
373 **~ Step 1:** Download the SQLit3 installation package
374 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
375
376 **Step 2: **tar the SQLit3 installation package
377 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
378
379 **Step 3:** Generate the makefile
380 cd sqlite-autoconf-3350300/;./configure
381
382 **Step 4:** Compile makefile
383 sudo make
384
385 **Step 5:** Install makefile
386 sudo make install
387
388 **Check:**
389 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
390 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
391
392 **debug:**
393 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
394 Please execute the command /sbin/ldconfig.
395 After that execute the command ./sqlite3 test.db again.
396 )))
397
398
399
400 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
401
402
403 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
404
405 user must enter the root account and run the following commands
406
407 (% class="box infomessage" %)
408 (((
409 **$ ./create_sqlite3_db.sh
410 $ ./rssh_serv -p  3721 2>&1 &
411 $ ps -ef | grep rssh_serv check 3721 port**
412 )))
413
414 [[image:image-20220531151958-10.png]]
415
416
417 **Debug:**
418
419 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
420 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
421 }}}
422
423 {{{ if fail to open dpvlry or to bind to it
424 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
425 }}}
426
427
428
429 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
430
431
432 (% class="box infomessage" %)
433 (((
434 **1):**  sudo useradd XXXXX (custom user name)
435 **2):**  sudo passwd xxxxxx
436 **3):**  cp /bin/bash /bin/rbash
437 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
438 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
439 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
440 )))
441
442 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
443
444
445
446 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
447
448
449 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
450
451
452 **Debug:**
453
454 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
455
456
457 === 2.2.3  How does user get the gateway to connect to a user's private server ===
458
459
460
461 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
462
463
464 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
465
466 [[image:image-20220531152419-11.png]]
467
468
469
470 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
471
472
473 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
474
475 [[image:image-20220531152549-12.png]]
476
477
478
479 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
480
481
482 This is same as connect Dragino Support Server but just change the server address to customize server address.
483
484 [[image:image-20220531152633-13.png]]
485
486
487
488 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
489
490
491 Rssh Host connection Ok
492
493 [[image:image-20220531152815-14.png]]
494
495
496 User can use common ps | grep ssh to check it in the gateway.
497
498 [[image:image-20220531152840-15.png]]
499
500
501
502 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
503
504
505 Check what gateways link to server.
506
507 (% class="box infomessage" %)
508 (((
509 **$ ./connect-gw.sh -l**
510 )))
511
512 [[image:image-20220531153016-16.png]]
513
514
515
516 Access the gateway
517
518 (% class="box infomessage" %)
519 (((
520 **$ ./connect-gw.sh <GWID>**
521 )))
522
523 [[image:image-20220531153219-17.png]]
524
525