Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19
20 == **1.2  Steps** ==
21
22
23 * Create account in ThingsSpeak and creat channel.
24 * Download script from dragino site and move it to properly directory
25
26
27 (% class="box infomessage" %)
28 (((
29 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
30 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
31 Connecting to 162.241.22.11:80
32 Writing to 'monitor_gateway.sh'
33 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
34 Download completed (1860 bytes)
35 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
36 root@dragino-1baf44:~~#
37 root@dragino-1baf44:~~#
38 )))
39
40
41
42 * change the script monitor_gateway.sh with properly users setting:
43
44
45 (% class="box infomessage" %)
46 (((
47 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
48 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
49 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
50 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
51 )))
52
53
54
55 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
56
57 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
58
59
60 (% class="box infomessage" %)
61 (((
62 # For details see man 4 crontabs
63 # Example of job definition:
64 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
65 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
66 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
67 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
68 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
69 # | | | | |
70 # * * * * * user-name command to be executed
71 #*/10 * * * *  checklog
72 ~* 23 * * *  /etc/init.d/auto_update start
73 */20 * * * *  /usr/bin/monitor_gateway.sh     
74 )))
75
76 * Reboot device.
77
78
79
80
81 == **1.3  Monitor Public IP** ==
82
83
84 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
85
86 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
87
88
89 [[image:image-20220531145559-2.png]]
90
91 Find Public IP
92
93
94
95 = **2.  Remote Access** =
96
97 == **2.1  Remote Access via Remote.it.** ==
98
99
100 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
101
102
103 (% style="color:red" %)**Important Notice:**
104
105 * Remote.it access will give full control of your device to remote support.
106 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
107
108 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
109 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
110
111
112
113 (% style="color:blue" %)**1. Install the Remote.it software**
114
115 Users can directly click** "Install"** on the Web UI to install Remote. it.
116
117
118 [[image:image-20220725134300-1.png||height="438" width="905"]]
119
120
121
122 (% style="color:blue" %)**2. Enter the license key**
123
124 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
125
126 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
127
128
129 (% class="box infomessage" %)
130 (((
131 **57F60715-606F-510D-A3D2-739860EBDB98**
132 )))
133
134 [[image:image-20220725113010-1.png||height="455" width="899"]]
135
136
137
138 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
139
140 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
141
142
143 [[image:image-20220725115720-2.png||height="658" width="900"]]
144
145
146 === **2.1.1  How to register hp0d with Remote.it** ===
147
148
149 **Prerequisites:**
150
151 Users must have an account and APP for remote.it
152
153 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
154
155
156 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
157
158 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
159
160
161 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
162
163
164
165 (% style="color:blue" %)**2.Copy the register device command**
166
167
168 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
169
170
171
172 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
173
174
175 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
176
177
178
179 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
180
181
182 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
183
184
185 === **2.1.2  Trouble Shooting** ===
186
187
188 ==== **What should users do when gateway Remote.it installation fails** ====
189
190 [[image:image-20220907162028-4.png||height="564" width="1148"]]
191
192
193 Step 1. Users can download the archive and upload it to the gateway:** [[attach:backup.tar.gz||target="_blank"]]**
194
195 [[image:image-20220907161050-2.png]]
196
197
198 Step 2. Back to the Remote.it screen, and click **"Install"** again.
199
200 [[image:image-20220907161352-3.png]]
201
202
203 Step 3. Follow the [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]] steps to reconfigure
204
205
206 == **2.2  RSSH Introduction** ==
207
208
209 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
210
211 (% style="color:red" %)**Important Notice:**
212
213 (% class="box warningmessage" %)
214 (((
215 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
216 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
217 )))
218
219
220 **Below gateway support reverse SSH access:**
221
222 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
223 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
224 * LG02, OLG02
225 * LG308, DLOS8
226 * LPS8
227 * LIG16
228 * MS14 series if installed with the same firmware.
229
230
231
232
233 === **2.2.1  End User Guide to use SSH access** ===
234
235
236 Go to this the Reverse SSH page as below:
237
238
239 [[image:image-20220531150151-3.png]]
240
241 Get the RSSH configure page
242
243
244
245 [[image:image-20220531150338-4.png]]
246
247 Connection OK.
248
249
250 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
251 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
252 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
253 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
254 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
255
256 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
257
258
259
260 === **2.2.2  Set Up RSSH Server** ===
261
262
263 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
264
265
266
267 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
268
269
270 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
271
272 [[image:image-20220531150750-5.png]]
273
274
275 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
276
277 [[image:image-20220531150811-6.png]]
278
279
280 **Debug** :
281
282 (((
283 (% class="box" %)
284 (((
285 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
286 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
287 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
288 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
289 )))
290 )))
291
292 [[image:image-20220531151516-7.png]]
293
294
295 (((
296 (% class="box" %)
297 (((
298 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
299 please insatell sqlite3.
300 )))
301 )))
302
303 [[image:image-20220531151628-8.png]]
304
305
306 (% style="color:blue" %)**How to install Sqlit3:**
307
308 (% class="box infomessage" %)
309 (((
310 **~ Step 1:** Download the SQLit3 installation package
311 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
312
313 **Step 2: **tar the SQLit3 installation package
314 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
315
316 **Step 3:** Generate the makefile
317 cd sqlite-autoconf-3350300/;./configure
318
319 **Step 4:** Compile makefile
320 sudo make
321
322 **Step 5:** Install makefile
323 sudo make install
324
325 **Check:**
326 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
327 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
328
329 **debug:**
330 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
331 Please execute the command /sbin/ldconfig.
332 After that execute the command ./sqlite3 test.db again.
333 )))
334
335
336
337 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
338
339
340 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
341
342 user must enter the root account and run the following commands
343
344 (% class="box infomessage" %)
345 (((
346 **$ ./create_sqlite3_db.sh
347 $ ./rssh_serv -p  3721 2>&1 &
348 $ ps -ef | grep rssh_serv check 3721 port**
349 )))
350
351 [[image:image-20220531151958-10.png]]
352
353
354 **Debug:**
355
356 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
357 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
358 }}}
359
360 {{{ if fail to open dpvlry or to bind to it
361 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
362 }}}
363
364
365
366 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
367
368
369 (% class="box infomessage" %)
370 (((
371 **1):**  sudo useradd XXXXX (custom user name)
372 **2):**  sudo passwd xxxxxx
373 **3):**  cp /bin/bash /bin/rbash
374 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
375 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
376 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
377 )))
378
379 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
380
381
382
383 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
384
385
386 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
387
388
389 **Debug:**
390
391 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
392
393
394
395 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
396
397
398
399 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
400
401
402 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
403
404 [[image:image-20220531152419-11.png]]
405
406
407
408 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
409
410
411 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
412
413 [[image:image-20220531152549-12.png]]
414
415
416
417 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
418
419
420 This is same as connect Dragino Support Server but just change the server address to customize server address.
421
422 [[image:image-20220531152633-13.png]]
423
424
425
426 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
427
428
429 Rssh Host connection Ok
430
431 [[image:image-20220531152815-14.png]]
432
433
434 User can use common ps | grep ssh to check it in the gateway.
435
436 [[image:image-20220531152840-15.png]]
437
438
439
440 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
441
442
443 Check what gateways link to server.
444
445 (% class="box infomessage" %)
446 (((
447 **$ ./connect-gw.sh -l**
448 )))
449
450 [[image:image-20220531153016-16.png]]
451
452
453
454 Access the gateway
455
456 (% class="box infomessage" %)
457 (((
458 **$ ./connect-gw.sh <GWID>**
459 )))
460
461 [[image:image-20220531153219-17.png]]
462
463
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0