<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Itaal</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Itaal"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Itaal"/>
	<updated>2026-05-06T22:55:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Operating_systems_2016&amp;diff=123834</id>
		<title>Operating systems 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Operating_systems_2016&amp;diff=123834"/>
		<updated>2017-07-09T10:34:56Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Operating systems subject related info=&lt;br /&gt;
&lt;br /&gt;
Lecturer: &lt;br /&gt;
&lt;br /&gt;
Katrin Loodus (katrin.loodus@itcollege.ee) &lt;br /&gt;
&lt;br /&gt;
Room 516 (5th floor), phone (6285) 834&lt;br /&gt;
&lt;br /&gt;
All subject related infotmation will be put up on Wiki page, due to the possibility to have access to the materials even after the subject has concluded. Materials, such as tests, lectures and links to additional materials, will remain available throughout the subject teaching period. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Aim of this course=&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to introduce the basics of operating systems and IT system life cycle from the viewpoint of the IT system administrator of operating systems. This subject provides hands-on skills needed to complete other field specific subjects in the curriculum.&lt;br /&gt;
&lt;br /&gt;
Lectures give a theoretical background and the labs give hands-on skills on the same topic using Ubuntu Linux Server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This subject is oriented on hands-on practical assignments to compliment the theoretical side of the subject.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Learning outcome 1: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject is able to perform the most common administrative tasks (user management, software management, disk usage, process management) in at least one of the most popular operating system on a server.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 2: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject understands and is able to explain orally the basic concepts of operating systems and its security aspects.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 3: &lt;br /&gt;
&lt;br /&gt;
The student is able to document an operating system&#039;s service from an IT systems administrator&#039;s viewpoint.&lt;br /&gt;
&lt;br /&gt;
=Deadlines for assignments 2016=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;03.04.2016&#039;&#039;&#039; - Submission of wiki article&#039;s topic (Sending an e-mail with the chosen topic is mandatory!)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;08.05.2016 23:59&#039;&#039;&#039; - Submission of wiki article and sending an e-mail to the lecturer in order to get it graded&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;10.05.2016&#039;&#039;&#039; - Pre practical test for students, who have done all of their labs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;23.05.2016&#039;&#039;&#039; - Last option to defend lab work (Lab1 and/or Lab2)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;24.05.2016&#039;&#039;&#039; - Practical test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;09.06.2016 at 09:00&#039;&#039;&#039; - Both practical and oral exams are in room 319&lt;br /&gt;
&lt;br /&gt;
All dates are inclusive.&lt;br /&gt;
&lt;br /&gt;
=(Occasional) Homework=&lt;br /&gt;
&lt;br /&gt;
==Week 0 &amp;amp; 1==&lt;br /&gt;
&lt;br /&gt;
Get familiar with the Unix command line by trying out this Codeacadamy [https://www.codecademy.com/learn/learn-the-command-line short course].&lt;br /&gt;
&lt;br /&gt;
==Week 11==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
This homework is voluntary! &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please test these online courses (especially user management) in https://rangeforce.com environment and send the lecturer feedback you feel you would like to share. It can be about the content, the environment, spelling, storyline etc. &lt;br /&gt;
&lt;br /&gt;
The promo code to get access to the courses is &#039;&#039;&#039;EIK2016&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please send the feedback to my e-mail address: &#039;&#039;&#039;kloodus@itcollege.ee&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
==Reading materials==&lt;br /&gt;
&lt;br /&gt;
[http://www.tecmint.com/10-useful-free-linux-ebooks-for-newbies-and-administrators/ 10 Free Linux Administration e-books]&lt;br /&gt;
&lt;br /&gt;
=Timetable for lectures 2016=&lt;br /&gt;
&lt;br /&gt;
Public chat for any subject related questions that were left unasked during the lecture: https://chatlink.com/#osadmin_ITKolledz&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
Link to lecture and lab captures:&amp;lt;/span&amp;gt; [https://echo360.e-ope.ee/ess/portal/section/d38715c3-2cc6-43ee-bc1c-818df79d0b41 Go to captures]&lt;br /&gt;
&lt;br /&gt;
==Lecture 0==&lt;br /&gt;
February 09th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.odp Lecture 0 - Introduction to subject (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~kloodus/opsys/test_answers_spring2016.txt Test answers].&lt;br /&gt;
&lt;br /&gt;
==Lecture 1==&lt;br /&gt;
&lt;br /&gt;
February 12th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.odp Lecture 1 - Operating systems introduction (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
* Lecture will be on the February 12th at 8:15 in room 219&lt;br /&gt;
&lt;br /&gt;
* Practice will be on the same day at 10:00 in room 410&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; Homereading materials:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/playlist?list=PLmbPuZ0NsyGS8ef6zaHd2qYylzsHxL63x Introduction to operating systems (videos)]&lt;br /&gt;
&lt;br /&gt;
[https://en.wikipedia.org/wiki/Operating_system Operating systems (wikipedia article)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 2==&lt;br /&gt;
&lt;br /&gt;
February 16th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.odp Lecture 2 - User management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
==Lecture 3==&lt;br /&gt;
&lt;br /&gt;
February 23rd 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.odp Lecture 3 - File permissions (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 4==&lt;br /&gt;
March 1st 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.odp Lecture 4 - User environment and processes (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 5==&lt;br /&gt;
&lt;br /&gt;
March 8th 2016 Lecture 5 - [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.odp Filesystem Hierarchy (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 6==&lt;br /&gt;
&lt;br /&gt;
March 15th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.odp Lecture 6 - Software management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 7==&lt;br /&gt;
&lt;br /&gt;
March 22nd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.odp Lecture 7 - Documentation (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 8==&lt;br /&gt;
&lt;br /&gt;
April 5th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.odp Lecture 8 - Security session (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 9==&lt;br /&gt;
&lt;br /&gt;
April 12th 2016 - No lecture nor labs - Lecturer is away &lt;br /&gt;
&lt;br /&gt;
Substitute lecture and lab time will be announced later&lt;br /&gt;
&lt;br /&gt;
==Lecture 10==&lt;br /&gt;
&lt;br /&gt;
April 19th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.odp Lecture 10 - Disks, partitions and swap area (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 11==&lt;br /&gt;
&lt;br /&gt;
April 26th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.odp Lecture 11 - RAID; LVM, SAN and NAS technologies (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 12==&lt;br /&gt;
May 3rd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.odp Lecture 12 - DAS, SAN, NAS and CAS (group work) technologies (cont.) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
[[http://www.slideshare.net/pranayakumar1986/network-storage Additional reading materials]]&lt;br /&gt;
&lt;br /&gt;
==Lecture 13==&lt;br /&gt;
&lt;br /&gt;
May 10th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.odp Lecture 13 - Backup and recovery (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 14 and Lecture 9==&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;17th&#039;&#039;&#039; 2016 - Lecture 14 - Miscellaneous topics (will be held in a computer class 319)&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;19th 2016 at 10:00 in room 320&#039;&#039;&#039; - [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.odp Lecture 9 - Monitoring (substitute lecture) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 15==&lt;br /&gt;
May 24th 2016 - Lecture 15 - working in IT - merits and demerits &lt;br /&gt;
&lt;br /&gt;
We will not have a lecture in the ordinary sense, instead we&#039;ll have a seminar or discussion on important aspects of working in IT. The ethical, social and personal aspects of it. Terms like &amp;quot;imposter syndrome&amp;quot;, burnout, teamwork and better work environment will be some of the topics covered. Life is not only technical competence, it&#039;s a lot about human interaction as well.&lt;br /&gt;
&lt;br /&gt;
=Lab works=&lt;br /&gt;
&lt;br /&gt;
==Lab 0==&lt;br /&gt;
&lt;br /&gt;
Installing Ubuntu Server 14.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Introduction to Unix command line&#039;&#039;&#039; (cd, ls, cat, full path, relative path etc)&lt;br /&gt;
&lt;br /&gt;
==Lab 1== &lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing users&#039;&#039;&#039; (adduser, addgroup, passwd, /etc/passwd, /etc/shadow)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a user noodle&lt;br /&gt;
&lt;br /&gt;
2) Add a new group food and add a the user noodle to a group called food.&lt;br /&gt;
&lt;br /&gt;
3) Divert the user noodle&#039;s password hash via cowsay to a file called cownoodle.txt.&lt;br /&gt;
&lt;br /&gt;
4) Lock the user noodle and be ready to show me the indication of the user being locked. &lt;br /&gt;
&lt;br /&gt;
5) Change the user&#039;s current home directory into /home/unknown so that the files will also be moved to the new location.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 points - &#039;&#039;&#039;Managing files&#039;&#039;&#039; (mkdir, cp, mv, rm, touch, nano, less, chmod, chown, rwx, 644 etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a folder march in root user directory and for every march day a subfolder with a name day1, day2, day3 … day31. (Example: /root/march/day1 or /root/march/day2 etc)&lt;br /&gt;
&lt;br /&gt;
2) Modify the march folder owner so that it will be student and the new group audio.&lt;br /&gt;
&lt;br /&gt;
3) Modify the march folder&#039;s and its subfolders so that the user can do anything, group can do ls in the folder and cd into it and others can&#039;t do anything with it.&lt;br /&gt;
&lt;br /&gt;
4) Create a hard link called network to a file /etc/network/interfaces &lt;br /&gt;
&lt;br /&gt;
5) Copy /var/log directory into march folder so that the timestamp and user info will be preserved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4 points - &#039;&#039;&#039;Processes and environment variables&#039;&#039;&#039; (kill, using directing input/output/error: |, &amp;lt;, &amp;gt;, &amp;gt;&amp;gt;; env, PATH, HOME etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Divert the list with the student user&#039;s groups via cowsay into a fail studgroup.txt.&lt;br /&gt;
&lt;br /&gt;
2) Create a environment variable called MYHOME that has the value of the system&#039;s HOME environment variable. (Hint: you have tu use variable symbol here!)&lt;br /&gt;
&lt;br /&gt;
3) Send 2 htop&#039;s to the background and be ready to present how you send a kill signal to the first htop by job number and term signal to the second htop by a process number. &lt;br /&gt;
&lt;br /&gt;
4) Create an alias called bye that logs you out of the terminal. Make this alias permanent. &lt;br /&gt;
&lt;br /&gt;
5) Execute a programm called espdiff and diver the standardoutput to a file called okay.txt and the standard error to a file called notokay.txt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing software&#039;&#039;&#039; (installation, updating, deleting, apt and dpkg utils)&lt;br /&gt;
&lt;br /&gt;
==Lab 2==&lt;br /&gt;
&lt;br /&gt;
7 points - &lt;br /&gt;
&#039;&#039;&#039;Managing disks by creating partitions&#039;&#039;&#039; (fdisk, mkfs, blkid, mount, umount)&lt;br /&gt;
&lt;br /&gt;
5 points - &lt;br /&gt;
&#039;&#039;&#039;Managing swap&#039;&#039;&#039; (mkswap, swapon, swapoff)&lt;br /&gt;
&lt;br /&gt;
=Practical tests=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1FGZcqmQQDF1l32uPUJ6n8x2Tc4gK8nuxS-C9esgRqaQ/edit?usp=sharing First practical test 10th of May 2016]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ZCqOOMkx0dwP0QXLIK_yk_08a8whfJmQbYR1mAoSh7M/edit Second pracical test 24th of May 2016]&lt;br /&gt;
&lt;br /&gt;
=Exams=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ofiylCw9YAS8_S9YHEc8cZOvEfCfMfs2wDoc44eDyCU/edit?usp=sharing Practical exam]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1gkEDb1g1em9UGhj9n_LIwnhp17gY85U9aPtMfGk56_8/edit# Topics] of the oral exam in Spring 2016&lt;br /&gt;
&lt;br /&gt;
=Wiki article information=&lt;br /&gt;
&lt;br /&gt;
* Choose a topic from personal experience or from topics found on the wiki page&lt;br /&gt;
&lt;br /&gt;
*Send the topic to the lecturer kloodus@itcollege.ee&lt;br /&gt;
&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
&lt;br /&gt;
*Inform the lecturer when the article is finished&lt;br /&gt;
&lt;br /&gt;
*Receive feedback with corrections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bare in mind that this is an open environment, so everything you write in your wiki article, will be public :) &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Helpful tips and requirements what is expected of your wiki article: https://docs.google.com/document/d/1TGmcv4CL0csigtzA_1Ti4Ndvvc6AjNchZwJe2Jc7OQc/edit# &lt;br /&gt;
&lt;br /&gt;
===List of the topics chosen:===&lt;br /&gt;
&lt;br /&gt;
[[User:akerge|Artur Kerge]] is doing an article on [[Irssi]].&lt;br /&gt;
&lt;br /&gt;
[[OpenVPN_Access_Server|OpenVPN Access Server]] by  [[User:aovtsinn|Artur Ovtsinnikov]]&lt;br /&gt;
&lt;br /&gt;
[[Securing_database_with_command_line_linux#Aim_of_this_page| Securing database with command line Linux]] by  [[User:malyhass|Mohanad Aly]]&lt;br /&gt;
&lt;br /&gt;
[[SSH_for_beginners|SSH for beginners]] by [[User:ebarrier|Etienne Barrier]]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Linux_File_Permissions#References| Linux File Permissions] by Sheela Raj&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/User_talk:Lphanvan  Attack A Website by Using Local Method ([[Local Attack]])] by Ender Phan&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Cowsay_English Cowsay] by Meelis Hass&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Sguil Sguil] by Kustas Kurval&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Radare2 Radare 2 - An Open Source alternative to IDA] by IT&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Install_Icinga2_on_Ubuntu_16.04&amp;diff=116366</id>
		<title>Install Icinga2 on Ubuntu 16.04</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Install_Icinga2_on_Ubuntu_16.04&amp;diff=116366"/>
		<updated>2017-01-05T08:58:02Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Author: Etienne Barrier&lt;br /&gt;
&lt;br /&gt;
Co-Author: Indrek Taal (Add nodes to Icinga 2)&lt;br /&gt;
&lt;br /&gt;
Last modified: 05.01.2017&lt;br /&gt;
&lt;br /&gt;
==Preliminary notes==&lt;br /&gt;
This tutorial shows how to install Icinga 2 on Ubuntu 16.04 LTS, using PostgreSQL (as for database) and Apache 2 (as for webserver).&lt;br /&gt;
&lt;br /&gt;
This tutorial does NOT show:&lt;br /&gt;
* how to install Icinga version 1&lt;br /&gt;
* how to install/configure databses other than PostgreSQL (for example MySQL, MariaDB, etc.)&lt;br /&gt;
* how to install/configure webservers other than Apache2 (for example Nginx)&lt;br /&gt;
* how to use Icinga2&lt;br /&gt;
&lt;br /&gt;
It is assumed that you are already familiar with the basics of Linux command line terminal commands. But this tutorial is made so that you can copy paste the commands to your terminal.&lt;br /&gt;
&lt;br /&gt;
Versions used in this tutorial:&lt;br /&gt;
* Icinga 2 (version: r2.5.4-1)&lt;br /&gt;
* Ubuntu 16.04.1 LTS (Xenial)&lt;br /&gt;
* PostgreSQL (version: 9.5.2)&lt;br /&gt;
* Apache 2 (version: 2.4.18)&lt;br /&gt;
* Php (version 7.0)&lt;br /&gt;
&lt;br /&gt;
Depending on the versions you use, the commands and/or the path shown in this tutorial might be different.&lt;br /&gt;
&lt;br /&gt;
All commands in this tutorial are made as root. You must be root or be able to use &amp;quot;sudo&amp;quot; command to install and configure Icinga.&lt;br /&gt;
&lt;br /&gt;
The version of Icinga used (version 2) is referred sometimes as “Icinga” or “Icinga 2” accross the tutorial.&lt;br /&gt;
&lt;br /&gt;
This tutorial is based on the following tutorials:&lt;br /&gt;
*[http://docs.icinga.org/icinga2/latest/doc/module/icinga2/chapter/getting-started Official Icinga 2 documentation]&lt;br /&gt;
*[https://github.com/Icinga/icingaweb2/blob/master/doc/02-Installation.md Official Icinga Web 2 installation documentation]&lt;br /&gt;
*[http://linoxide.com/ubuntu-how-to/install-icinga2-ubuntu-16-04 Linoxide &amp;quot;how to&amp;quot;]&lt;br /&gt;
*[https://lowendbox.com/blog/server-monitoring-with-icinga-2-part-1-the-server-ubuntu-host Lowendbox blog post]&lt;br /&gt;
*[https://lowendbox.com/blog/server-monitoring-with-icinga-2-part-2-the-node-ubuntu-host Lowendbox blog post 2]&lt;br /&gt;
&lt;br /&gt;
For any comments, please write to ebarrier{at]itcollege[dot)ee.&lt;br /&gt;
&lt;br /&gt;
==What is Icinga?==&lt;br /&gt;
Icinga 2 is an open source monitoring system which checks the availability of your network resources, notifies users of outages, and generates performance data for reporting.&amp;lt;ref&amp;gt;[http://docs.icinga.org/icinga2/latest/doc/module/icinga2/toc#!/icinga2/latest/doc/module/icinga2/chapter/about-icinga2#what-is-icinga2] Icinga2 official documentation&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Icinga started as a Nagios fork and did quite well, mostly considering Icinga Web which was better than Nagios’ web interface. Icinga 2 is a complete rewrite and even adds a fancy new (optional) web interface which is responsive and customizable. On top of that, the communication between the monitoring server and the nodes it monitors has become more secure as NRPE has been ditched (it’s still available, just not prefered).&amp;lt;ref&amp;gt;[https://lowendbox.com/blog/server-monitoring-with-icinga-2-part-1-the-server-ubuntu-host] &amp;quot;Lowendbox&amp;quot; blog article about Icinga 2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Icinga is made of two parts - Icinga 2 and Icinga Web 2. The first one is the core of the software and the second is a web interface.&lt;br /&gt;
&lt;br /&gt;
==Install Icinga 2 core==&lt;br /&gt;
Add Icinga&#039;s repository to the package management configuration.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ add-apt-repository ppa:formorer/icinga&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install Icinga 2 package.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icinga2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check that Icinga is up and running&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service icinga2 status&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it is not running, start it.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service icinga2 start&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Make sure Icinga will start automatically on startup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ systemctl enable icinga2.service&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install plugins==&lt;br /&gt;
===Nagios plugins===&lt;br /&gt;
To be able to check external services, Icinga needs monitoring plugins to know about them and to make sure they work properly. Available monitoring plugins are available on the [https://www.monitoring-plugins.org Monitoring Plugins Project website].&lt;br /&gt;
&lt;br /&gt;
We install the main set of plugins that come from [https://www.nagios.org Nagios] monitoring solution. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note that Icinga service runs as user and group called &amp;quot;Nagios&amp;quot; (for historical reasons).&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install nagios-plugins&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Vim and Nano configuration syntax highlighting===&lt;br /&gt;
Icinga provides packages to highlight its configuration files using Nano and Vim utilities. &lt;br /&gt;
&lt;br /&gt;
The package for Nano is included by default when installinIcinga2.&lt;br /&gt;
&lt;br /&gt;
For Vim, do:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ apt install vim-icinga2 vim-addon-manager&amp;lt;/code&amp;gt;&lt;br /&gt;
$ vim-addon-manager -w install icinga2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install Apache web server==&lt;br /&gt;
Install Apache 2. Apache is a web server system that allows to access Icinga web interface.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install apache2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apply a firewall rule to accept incoming tcp packets with destination port 80 (http). You may ignore this point if you have your own set of rules that you manage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
$ iptables-save&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install Icinga Web 2==&lt;br /&gt;
To install Icinga Web 2 package,add its repository to the package management system. &lt;br /&gt;
&lt;br /&gt;
For other Ubuntu versions than Xenial, just replace “xenial” below with the desired distribution&#039;s code name (see the [http://packages.icinga.org/ubuntu packages list]).&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -O - http://packages.icinga.org/icinga.key | apt-key add -&lt;br /&gt;
$ add-apt-repository &#039;deb http://packages.icinga.org/ubuntu icinga-xenial main&#039;&lt;br /&gt;
$ apt update&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install Icinga Web 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icingaweb2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install and configure PostgreSQL databases==&lt;br /&gt;
Icinga needs two databases to work: one main to store monitoring information (DB IDO: Database Icinga Data Output) and one to store Icinga users and groups information for its web interface.&lt;br /&gt;
We will install both of them manually.&lt;br /&gt;
&lt;br /&gt;
===Install PostgreSQL===&lt;br /&gt;
Install PostgreSQL database system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install postgresql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Install IDO module for PostgreSQL===&lt;br /&gt;
Install Icinga IDO module for PostgreSQL.&lt;br /&gt;
It installs files and directories to enable the export and storage of monitoring information into a database.&lt;br /&gt;
We will install the database manually in our tutorial.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icinga2-ido-pgsql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A wizard will start.&lt;br /&gt;
&lt;br /&gt;
Say &amp;quot;&#039;&#039;&#039;No&#039;&#039;&#039;&amp;quot; to enable the IDO module for PostgreSQL, we do it manually later.&lt;br /&gt;
&lt;br /&gt;
The wizard proposes to create and configure the database with &amp;quot;dbconfig-common&amp;quot;. Choose “&#039;&#039;&#039;No&#039;&#039;&#039;” because we will do it manually (see below).&lt;br /&gt;
&lt;br /&gt;
===Create Icinga users database===&lt;br /&gt;
Create the users database for Icinga.&lt;br /&gt;
&lt;br /&gt;
First go to the /tmp directory because that is the default unix socket location for PostgreSQL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ cd /tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a role (similar to a user) for the database. The database will require to login and we choose a password. You can choose a different role name (&amp;quot;icingaweb&amp;quot;) and a different password (&amp;quot;icingawebpass&amp;quot;) than what is given as an example below. &#039;&#039;Remember them for later!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres psql -c &amp;quot;CREATE ROLE icingaweb WITH LOGIN PASSWORD &#039;icingawebpass&#039;&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create the database (“icingawebdb”) and we assign its owner as being “icingaweb” (created earlier) with UTF8 encoding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres createdb -O icingaweb -E UTF8 icingawebdb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Create IDO database===&lt;br /&gt;
Create the main database for Icinga.&lt;br /&gt;
&lt;br /&gt;
Make sure you are in the /tmp directory (default unix socket location for PostgreSQL).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ cd /tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a role (similar to a user) for the database. &lt;br /&gt;
&lt;br /&gt;
The database will require to login and we choose a password.&lt;br /&gt;
&lt;br /&gt;
You can choose a different role name (&amp;quot;icingaido&amp;quot;) and a different password (&amp;quot;icingaidopass&amp;quot;) than what is given as an example below. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Remember them for later!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres psql -c &amp;quot;CREATE ROLE icingaido WITH LOGIN PASSWORD &#039;icingaidopass&#039;&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create the database (“icingaidodb”) and we assign its owner as being “icingaido” (created earlier) with UTF8 encoding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres createdb -O icingaido -E UTF8 icingaidodb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Edit the file &#039;&#039;/etc/icinga2/features-available/ido-mysql.conf&#039;&#039; and insert the values you have chosen for the IDO database.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
object IdoMysqlConnection &amp;quot;ido-mysql&amp;quot; {&lt;br /&gt;
  user = &amp;quot;icingaido&amp;quot;,&lt;br /&gt;
  password = &amp;quot;icingaidopass&amp;quot;,&lt;br /&gt;
  host = &amp;quot;localhost&amp;quot;,&lt;br /&gt;
  database = &amp;quot;icingaidodb&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Configure databases authentication===&lt;br /&gt;
PostgreSQL handles authentication to databases from a file which states which users can connect to which database using certain methods.&lt;br /&gt;
Previously we have created a roles and databases. We must tell PostgreSQL how these databases can be accessed and by whom.&lt;br /&gt;
&lt;br /&gt;
Edit the pg_hba.conf in &#039;&#039;/etc/postgresql/*/main/pg_hba.conf&#039;&#039; and add the roles and databases we defined earlier user with md5 authentication method.&lt;br /&gt;
&#039;md5&#039; means that the user needs to authenticate with a password to access the database.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# TYPE  DATABASE         USER           ADDRESS               METHOD&lt;br /&gt;
#icinga&lt;br /&gt;
local   icingaidodb      icingaido                            md5&lt;br /&gt;
host    icingaidodb      icingaido      127.0.0.1/32          md5&lt;br /&gt;
host    icingaidodb      icingaido      ::1/128               md5&lt;br /&gt;
&lt;br /&gt;
local   icingawebdb      icingaweb                            md5&lt;br /&gt;
host    icingawebdb      icingaweb      127.0.0.1/32          md5&lt;br /&gt;
host    icingawebdb      icingaweb      ::1/128               md5&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Restart PostgreSQL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service postgresql restart&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Import database schemas===&lt;br /&gt;
So far Icinga can access both databases, but they are empty (not a single table, index, function).&lt;br /&gt;
&lt;br /&gt;
Import the respective schemas for each of them.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Import the web database schema&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This will populate the web database with tables and indexes,...&lt;br /&gt;
The password we setup for this role will be asked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
$ psql -U icingaweb -d icingawebdb &amp;lt; /usr/share/icingaweb2/etc/schema/pgsql.schema.sql&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Password for user icingaweb:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A list of statements such as “CREATE TABLE”, “CREATE INDEX” appears.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Import the IDO database schema&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This will populate the IDO database with tables, indexes,...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ psql -U icingaido -d icingaidodb &amp;lt; /usr/share/icinga2-ido-pgsql/schema/pgsql.sql&lt;br /&gt;
Password for user icingaido:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A long list of statements such as “CREATE FUNCTION”, “CREATE TABLE”, “CREATE INDEX” appears.&lt;br /&gt;
&lt;br /&gt;
==Enable Icinga features==&lt;br /&gt;
Enable Icinga IDO for PostgreSQL and &#039;command&#039; modules and restart Icinga.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ icinga2 feature enable ido-pgsql command&lt;br /&gt;
$ service icinga2 restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check that ido-pgsql and command modules are enabled.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ icinga2 feature list&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By default the command module file is owned by the group &amp;quot;nagios&amp;quot; with read/write permissions. Add Apache user (&amp;quot;www-data&amp;quot;) to the group &amp;quot;nagios&amp;quot; to enable sending commands to Icinga 2 through the web interface.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ usermod -a -G nagios www-data&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Set up the web interface==&lt;br /&gt;
Open a browser and go to http://[server_ip]/icingaweb2/setup.&lt;br /&gt;
&lt;br /&gt;
1. First is the welcome page asking to insert a token.&lt;br /&gt;
&lt;br /&gt;
To get a token, do in your terminal &amp;lt;code&amp;gt;$ icingacli setup token create&amp;lt;/code&amp;gt; and insert it on the page. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: in case you need to see the token again, do &amp;lt;code&amp;gt;$ icingacli setup token show&amp;lt;/code&amp;gt;.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 01 token.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Choose the modules to install for Icinga Web 2.&lt;br /&gt;
&lt;br /&gt;
For a normal usage, we suggest “Doc” and “Monitoring” modules.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 02 modules.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Icinga checks that all the requirements it needs are met. You may have some missing, in that case, you must fix them. We are not going to detail how to fix all of them but two that are likely to be missing.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 03 modules incomplete.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;“The PHP config ‘date.timezone’ is not defined”&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:The page already guides you how to fix the Default TimeZone.&lt;br /&gt;
&lt;br /&gt;
:Go to /etc/php/7.0/apache2/php.ini file, uncomment and set the line &#039;&#039;&#039;date.timezone =&#039;&#039;&#039; with your time zone. &lt;br /&gt;
&lt;br /&gt;
:For example &amp;lt;code&amp;gt;date.timezone = Europe/Tallinn&amp;lt;/code&amp;gt; (see the [http://php.net/manual/en/timezones.php list of php time zones]).&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;“The PHP module PDO-PostgreSQL is missing”&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:Install the missing module.&amp;lt;code&amp;gt;$ apt install php-pgsql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In /etc/php/7.0/apache2/php.ini, add these lines to enable the extension/module&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
extension=pdo_pgsql.so&lt;br /&gt;
extension=pgsql.so&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart the web server to apply the new configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service apache2 restart&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Click the button “Refresh” at the bottom of the page to check the the requirements are now met.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 04 modules complete.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. Choose “Database” for authentication unless you specifically want to authenticate using LDAP or another way.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 05 authentication.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Enter the credentials that we set up for users and groups database, and check that the configuration is correct by clicking on “Validate configuration”.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 06 database resource.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Use the default backend name “icingaweb2”.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 07 authentication backend.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7. Choose the credentials that will be asked when you will log into Icinga’s web interface to access the monitoring dashboard. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remember these credentials!&#039;&#039;&#039; (for point 16 below).&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 08 administration.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Leave the default application and logging configuration unless you know what you are doing.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 09 application configuration.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9. Check that the configuration is correct and continue.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 10 summary.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. You arrive to the configuration of the monitoring module.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 11 monitoring welcome.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Leave the defaults values for the monitoring backend (&amp;quot;IDO&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 12 monitoring backend.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insert values you chose for the IDO database and check that the configuration is correct by clicking on “Validate configuration”. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The values are also in the file /etc/icinga2/features-enabled/ido-pgsql.conf.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 13 monitoring IDO resource.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Leave the defaults values for the command transport.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 14 command transport.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Leave the defaults values for the monitoring security.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 15 monitoring security.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Check that the configuration is correct and finish.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 16 monitoring summary.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 17 congratulations.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Login to Icinga 2 using the credentials on point 7.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 18 login.png|border|300px|center]]&lt;br /&gt;
&lt;br /&gt;
==Add nodes to Icinga 2==&lt;br /&gt;
&lt;br /&gt;
===The server node===&lt;br /&gt;
&lt;br /&gt;
In order to be able to add hosts securely, we have to go to the server and run the following command:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node wizard&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will start a wizard which will first ask you whether this is a satellite setup or not. Since this is the server or master you have to say ‘No’ here, to input an ‘n’:&lt;br /&gt;
&lt;br /&gt;
    Please specify if this is a satellite setup (‘n’ installs a master setup) [Y/n]: n&lt;br /&gt;
&lt;br /&gt;
It then starts generating keys are certificates required for secured TLS communication. In addition to that, it adds these to the configuration, plus it ensures this server is listed as the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/base: Writing private key to ‘/var/lib/icinga2/ca/ca.key’.&lt;br /&gt;
    information/base: Writing X509 certificate to ‘/var/lib/icinga2/ca/ca.crt’.&lt;br /&gt;
    information/cli: Initializing serial file in ‘/var/lib/icinga2/ca/serial.txt’.&lt;br /&gt;
    information/cli: Generating new CSR in ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/base: Writing private key to ‘/etc/icinga2/pki/icinga-server.key’.&lt;br /&gt;
    information/base: Writing certificate signing request to ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/base: Writing private key to ‘/etc/icinga2/pki/icinga-server.key’.&lt;br /&gt;
    information/base: Writing certificate signing request to ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/cli: Signing CSR with CA and writing certificate to ‘/etc/icinga2/pki/icinga-server.crt’.&lt;br /&gt;
    information/cli: Copying CA certificate to ‘/etc/icinga2/pki/ca.crt’.&lt;br /&gt;
    information/cli: Dumping config items to file ‘/etc/icinga2/zones.conf’.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/zones.conf.orig’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It then asks you for the host and port for the API. We have no reason to change these, so leave these empty:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the API bind host/port (optional):&lt;br /&gt;
    Bind Host []:&lt;br /&gt;
    Bind Port []:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It then finalizes setting up this server as a master my editing some more configuration files:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Enabling the APIlistener feature.&lt;br /&gt;
    Enabling feature api. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/features-available/api.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants.conf.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/constants.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    Done.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Now restart your Icinga 2 daemon to finish the installation!&lt;br /&gt;
&lt;br /&gt;
With that done, restart Icinga 2 in order to use the new settings:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 restart&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the master is good for now. Let’s move on to the host node!&lt;br /&gt;
&lt;br /&gt;
===The host node===&lt;br /&gt;
&lt;br /&gt;
On the host node, we’re first going to have to ensure the Icinga 2 repository is present:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ add-apt-repository ppa:formorer/icinga&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Press ENTER when it asks you to.&lt;br /&gt;
&lt;br /&gt;
Note: If this command gives you an error, run ‘sudo apt-get install software-properties-common’ to get the ‘add-apt-repository’ command!&lt;br /&gt;
&lt;br /&gt;
Once the repository has been added, update apt:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo apt-get update&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And install Icinga 2:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo apt-get install icinga2&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With that out of the way, we can initiate the same wizard as we did on the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node wizard&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This time we answer ‘Yes’ when it asks us if this is a satellite setup by just hitting ENTER:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify if this is a satellite setup (‘n’ installs a master setup) [Y/n]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After which is starts a different wizard:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Starting the Node setup routine…&lt;br /&gt;
    Please specifiy the common name (CN) [icinga-node]:&lt;br /&gt;
    Please specifiy the local zone name [icinga-node]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It asks you for the common name and the local zone name for this server. These default to the system’s hostname in fully qualified domain name format. These master uses the common name to connect to the server and the local zone name to identify it in configuration files. I just let these be.&lt;br /&gt;
&lt;br /&gt;
It then goes on to ask you about your master node:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the master endpoint(s) this node should connect to:&lt;br /&gt;
    Master Common Name (CN from your master setup): icinga-server&lt;br /&gt;
    Do you want to establish a connection to the master from this node? [Y/n]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please enter the Common Name of your master node (in my case ‘icinga-server’). This is usually the hostname unless you’ve changed it. Then press ENTER when asked if you want to establish a connection to the master from this node. This triggers the next question:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please fill out the master connection information:&lt;br /&gt;
    Master endpoint host (Your master’s IP address or FQDN): icinga-server&lt;br /&gt;
    Master endpoint port [5665]:&lt;br /&gt;
    Add more master endpoints? [y/N]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Enter the master’s IP address or Fully Qualified Domain Name (FQDN) here and accept the default port. Also press ENTER in order to not add more endpoints: we’re just working with one master right now.&lt;br /&gt;
&lt;br /&gt;
Then it’s on to the connection for CSR auto-signing, the bit of magic that makes setting up a secure connection a bit easier for you:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the master connection for CSR auto-signing (defaults to master endpoint host):&lt;br /&gt;
    Host [icinga-server]:&lt;br /&gt;
    Port [5665]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept the defaults here as well, because the master we have entered before is also our server for CSR auto-signing.&lt;br /&gt;
&lt;br /&gt;
After this, Icinga 2 is going to save some configuration on the host node and start the setup of a secure connection. As part of this process the master is contacted:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/base: Writing private key to ‘/etc/icinga2/pki/icinga-node.key’.&lt;br /&gt;
    information/base: Writing X509 certificate to ‘/etc/icinga2/pki/icinga-node.crt’.&lt;br /&gt;
    information/cli: Generating self-signed certifiate:&lt;br /&gt;
    information/cli: Fetching public certificate from master (icinga-server, 5665):&lt;br /&gt;
&lt;br /&gt;
    information/cli: Writing trusted certificate to file ‘/etc/icinga2/pki/trusted-master.crt’.&lt;br /&gt;
    information/cli: Stored trusted master certificate in ‘/etc/icinga2/pki/trusted-master.crt’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The certificate that has been set up needs to be signed in order to prove that you’re actually in command of both servers and approve of this secure communication:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the request ticket generated on your Icinga 2 master.&lt;br /&gt;
    (Hint: # icinga2 pki ticket –cn ‘icinga-node’):&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This means you need to run the following command on the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 pki ticket –cn ‘icinga-node’&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And copy the output from that command, which looks like ‘ff84267fca3b0b29c4c88d94706c76f4247cac34’ to the host node.&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Processing self-signed certificate request. Ticket ‘ff84267fca3b0b29c4c88d94706c76f4247cac34’.&lt;br /&gt;
&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/pki/icinga-node.crt.orig’.&lt;br /&gt;
    information/cli: Writing signed certificate to file ‘/etc/icinga2/pki/icinga-node.crt’.&lt;br /&gt;
    information/cli: Writing CA certificate to file ‘/etc/icinga2/pki/ca.crt’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With all certificates signed and in place, we’re asked about the API again:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the API bind host/port (optional):&lt;br /&gt;
    Bind Host []:&lt;br /&gt;
    Bind Port []:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Just like at the master, we’re not going to touch these here.&lt;br /&gt;
&lt;br /&gt;
The wizard now asks you whether to accept the configuration and commands from the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Accept config from master? [y/N]: y&lt;br /&gt;
    Accept commands from master? [y/N]: y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Select ‘Yes’ for both. Unfortunately, the Icinga 2 documentation is a bit fuzzy on this part. There are several ways to setup up a client, for example with a local configuration or as an execution bridge. I’m aiming for the latter of the two here: the master is in control and sends commands, the host node just executes them and returns the results. This is closest to what NRPE does and should keep all the data on the master.&lt;br /&gt;
&lt;br /&gt;
With this done, everything is being put in place to make this work:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Disabling the Notification feature.&lt;br /&gt;
    Disabling feature notification. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Enabling the Apilistener feature.&lt;br /&gt;
    Enabling feature api. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/features-available/api.conf.orig’.&lt;br /&gt;
    information/cli: Generating local zones.conf.&lt;br /&gt;
    information/cli: Dumping config items to file ‘/etc/icinga2/zones.conf’.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/zones.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants.conf.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/constants.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    Done.&lt;br /&gt;
&lt;br /&gt;
    Now restart your Icinga 2 daemon to finish the installation!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
After which you need to restart Icinga 2 on the host node:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 restart&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And it’s back to the master.&lt;br /&gt;
Back to the server node (the master)&lt;br /&gt;
&lt;br /&gt;
With the host node set up properly, only a few things remain on the master to be set up. First of all, we want to list the nodes on the master to see if our new host node is in there:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node list&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The output should include the node you’ve just added.&lt;br /&gt;
&lt;br /&gt;
Then, we update the configuration on the master so the host node is being included in checks, or in other words is being added to the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node update-config&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it did not work first time try changing permission of icinga2 directory to 755 ( with -R ).&lt;br /&gt;
&lt;br /&gt;
The only thing that remains right now is to reload Icinga 2:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 reload&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Summary from the author==&lt;br /&gt;
The installation is really difficult.&lt;br /&gt;
&lt;br /&gt;
Although the official documentation is well written and gives detailed commands for different distributions and databases, it lacks crucial explanations to understand to the user what it is being done.&lt;br /&gt;
&lt;br /&gt;
Here are a few problems we encountered:&lt;br /&gt;
# The installation documentation for [http://docs.icinga.org/icinga2/latest/doc/module/icinga2/chapter/getting-started Icinga 2] and [https://github.com/Icinga/icingaweb2/blob/master/doc/02-Installation.md Official Icinga Web 2] are not at the same place and are not consistent in their format and style.&lt;br /&gt;
# Icinga2 IDO package has a wizard to create and configure the IDO database (which non-experienced users will probably follow), but it is not absolutely clear in the documentation that if you follow the wizard, you do not need to create the IDO database manually afterwards.&lt;br /&gt;
# If you follow the wizard, the IDO database name and user will have default values. The user will only have to choose the password. But when the user arrives to web interface where he must enter the credentials of this database, there is no indication that he can find them in a configuration file.&lt;br /&gt;
# According to Icinga documentation, the users database can be created automatically by the web interface at the end of the procedure. But experience showed that it never worked (errors occur). The user is left with the documentation that does not explain how to create this users database manually (which we took a long time to figure out).&lt;br /&gt;
# In case of problem during installation, a user who is not familiar with his database system will have trouble debugging. The web interface does not provide useful solutions.&lt;br /&gt;
&lt;br /&gt;
I would not recommend Icinga with the experience I have, unless you follow this guide.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist|30em}}&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116349</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116349"/>
		<updated>2017-01-05T08:25:55Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
[[File:Splunk.jpg]]&amp;lt;ref&amp;gt;[http://www.slideshare.net/Splunk/getting-started-with-splunk-enterprise-56028566 Getting Started with Splunk Enterprise]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Splunk&amp;lt;ref&amp;gt;[http://docs.splunk.com/Documentation/Splunk/6.5.1/Installation/Whatsinthismanual Splunk Enterprise Installation Manual]&amp;lt;/ref&amp;gt; is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log &lt;br /&gt;
=== Why splunk ? ===&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
===Open Source Splunk Alternative ===&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
&lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets&lt;br /&gt;
Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
===Use Splunk Web===&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar.&lt;br /&gt;
===Edit configuration files===&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
===Use Splunk CLI===&lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
&#039;&#039;&#039;./splunk help&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder===&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times.&lt;br /&gt;
Key configuration files are: &lt;br /&gt;
*&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
*&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
*&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
*&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
===Best practices for deploying configuration updates across universal forwarders===&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
*Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
*Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
*Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/).&lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer.&lt;br /&gt;
 &lt;br /&gt;
===Configure the universal forwarder to connect to a receiving indexer===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder to connect to a deployment server===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure a data input on the forwarder===&lt;br /&gt;
Determine what data you want to collect. &lt;br /&gt;
*From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
*The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
&lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
&lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       *&#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      *&#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
===Configure forwarding with outputs.conf===&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. &lt;br /&gt;
===Edit outputs.conf to configure forwarding===&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. &lt;br /&gt;
&lt;br /&gt;
#On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
#Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
#Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
*vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
*notepad outputs.conf &lt;br /&gt;
Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
#Save the outputs.conf file and close it. &lt;br /&gt;
#Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/bin&lt;br /&gt;
*./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\bin&lt;br /&gt;
*.\splunk restart&lt;br /&gt;
&lt;br /&gt;
===TL;DR===&lt;br /&gt;
&lt;br /&gt;
==Install Splunk==&lt;br /&gt;
&lt;br /&gt;
#Run the dpkg command to install Splunk Light into the default directory.&lt;br /&gt;
&lt;br /&gt;
 pkg -i splunk_package_name.deb&lt;br /&gt;
&lt;br /&gt;
You cannot install the DEB package into another directory.&lt;br /&gt;
&lt;br /&gt;
#Start Splunk.&lt;br /&gt;
&lt;br /&gt;
./splunk start --accept-license&lt;br /&gt;
&lt;br /&gt;
==Configure the universal forwarder to connect to a deployment server==&lt;br /&gt;
&lt;br /&gt;
#For Forwarder, from a shell or command prompt on the forwarder, run the command:&lt;br /&gt;
&lt;br /&gt;
./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#Configure a data input on the forwarder&lt;br /&gt;
&lt;br /&gt;
./splunk add monitor /var/log&lt;br /&gt;
&lt;br /&gt;
#Restart the universal forwarder&lt;br /&gt;
./splunk restart&lt;br /&gt;
&lt;br /&gt;
==Configure your inputs==&lt;br /&gt;
&lt;br /&gt;
#Edit inputs.conf&lt;br /&gt;
&lt;br /&gt;
Ex.&lt;br /&gt;
# The following configuration directs Splunk to listen on TCP port 9995 for raw data from 10.1.1.10. &lt;br /&gt;
# All data is assigned the host &amp;quot;webhead-1&amp;quot;, the sourcetype &amp;quot;access_common&amp;quot; and the&lt;br /&gt;
# the source &amp;quot;//10.1.1.10/var/log/apache/access.log&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[tcp://10.1.1.10:9995]&lt;br /&gt;
host = webhead-1&lt;br /&gt;
sourcetype = access_common&lt;br /&gt;
source = //10.1.1.10/var/log/apache/access.log&lt;br /&gt;
&lt;br /&gt;
More examples and info.&lt;br /&gt;
http://docs.splunk.com/Documentation/Splunk/6.5.1/admin/Inputsconf&lt;br /&gt;
https://docs.splunk.com/Documentation/Splunk/6.5.1/Data/Monitorfilesanddirectorieswithinputs.conf&lt;br /&gt;
&lt;br /&gt;
==Splunk Web==&lt;br /&gt;
&lt;br /&gt;
#Login to Splunk Web&lt;br /&gt;
&lt;br /&gt;
The Splunk Web interface is at http://localhost:8000&lt;br /&gt;
&lt;br /&gt;
#Enter credentsials&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
username: admin&lt;br /&gt;
password: changeme&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
{{reflist|30em}}&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116347</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116347"/>
		<updated>2017-01-05T08:25:12Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
[[File:Splunk.jpg]]&amp;lt;ref&amp;gt;[http://www.slideshare.net/Splunk/getting-started-with-splunk-enterprise-56028566 ]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Splunk&amp;lt;ref&amp;gt;[http://docs.splunk.com/Documentation/Splunk/6.5.1/Installation/Whatsinthismanual Splunk Enterprise Installation Manual]&amp;lt;/ref&amp;gt; is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log &lt;br /&gt;
=== Why splunk ? ===&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
===Open Source Splunk Alternative ===&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
&lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets&lt;br /&gt;
Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
===Use Splunk Web===&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar.&lt;br /&gt;
===Edit configuration files===&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
===Use Splunk CLI===&lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
&#039;&#039;&#039;./splunk help&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder===&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times.&lt;br /&gt;
Key configuration files are: &lt;br /&gt;
*&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
*&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
*&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
*&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
===Best practices for deploying configuration updates across universal forwarders===&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
*Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
*Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
*Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/).&lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer.&lt;br /&gt;
 &lt;br /&gt;
===Configure the universal forwarder to connect to a receiving indexer===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder to connect to a deployment server===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure a data input on the forwarder===&lt;br /&gt;
Determine what data you want to collect. &lt;br /&gt;
*From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
*The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
&lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
&lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       *&#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      *&#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
===Configure forwarding with outputs.conf===&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. &lt;br /&gt;
===Edit outputs.conf to configure forwarding===&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. &lt;br /&gt;
&lt;br /&gt;
#On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
#Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
#Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
*vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
*notepad outputs.conf &lt;br /&gt;
Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
#Save the outputs.conf file and close it. &lt;br /&gt;
#Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/bin&lt;br /&gt;
*./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\bin&lt;br /&gt;
*.\splunk restart&lt;br /&gt;
&lt;br /&gt;
===TL;DR===&lt;br /&gt;
&lt;br /&gt;
==Install Splunk==&lt;br /&gt;
&lt;br /&gt;
#Run the dpkg command to install Splunk Light into the default directory.&lt;br /&gt;
&lt;br /&gt;
 pkg -i splunk_package_name.deb&lt;br /&gt;
&lt;br /&gt;
You cannot install the DEB package into another directory.&lt;br /&gt;
&lt;br /&gt;
#Start Splunk.&lt;br /&gt;
&lt;br /&gt;
./splunk start --accept-license&lt;br /&gt;
&lt;br /&gt;
==Configure the universal forwarder to connect to a deployment server==&lt;br /&gt;
&lt;br /&gt;
#For Forwarder, from a shell or command prompt on the forwarder, run the command:&lt;br /&gt;
&lt;br /&gt;
./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#Configure a data input on the forwarder&lt;br /&gt;
&lt;br /&gt;
./splunk add monitor /var/log&lt;br /&gt;
&lt;br /&gt;
#Restart the universal forwarder&lt;br /&gt;
./splunk restart&lt;br /&gt;
&lt;br /&gt;
==Configure your inputs==&lt;br /&gt;
&lt;br /&gt;
#Edit inputs.conf&lt;br /&gt;
&lt;br /&gt;
Ex.&lt;br /&gt;
# The following configuration directs Splunk to listen on TCP port 9995 for raw data from 10.1.1.10. &lt;br /&gt;
# All data is assigned the host &amp;quot;webhead-1&amp;quot;, the sourcetype &amp;quot;access_common&amp;quot; and the&lt;br /&gt;
# the source &amp;quot;//10.1.1.10/var/log/apache/access.log&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[tcp://10.1.1.10:9995]&lt;br /&gt;
host = webhead-1&lt;br /&gt;
sourcetype = access_common&lt;br /&gt;
source = //10.1.1.10/var/log/apache/access.log&lt;br /&gt;
&lt;br /&gt;
More examples and info.&lt;br /&gt;
http://docs.splunk.com/Documentation/Splunk/6.5.1/admin/Inputsconf&lt;br /&gt;
https://docs.splunk.com/Documentation/Splunk/6.5.1/Data/Monitorfilesanddirectorieswithinputs.conf&lt;br /&gt;
&lt;br /&gt;
==Splunk Web==&lt;br /&gt;
&lt;br /&gt;
#Login to Splunk Web&lt;br /&gt;
&lt;br /&gt;
The Splunk Web interface is at http://localhost:8000&lt;br /&gt;
&lt;br /&gt;
#Enter credentsials&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
username: admin&lt;br /&gt;
password: changeme&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
{{reflist|30em}}&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Install_Icinga2_on_Ubuntu_16.04&amp;diff=116321</id>
		<title>Install Icinga2 on Ubuntu 16.04</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Install_Icinga2_on_Ubuntu_16.04&amp;diff=116321"/>
		<updated>2017-01-04T10:42:00Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Author: Etienne Barrier&lt;br /&gt;
&lt;br /&gt;
Last modified: 17.11.2016&lt;br /&gt;
&lt;br /&gt;
==Preliminary notes==&lt;br /&gt;
This tutorial shows how to install Icinga 2 on Ubuntu 16.04 LTS, using PostgreSQL (as for database) and Apache 2 (as for webserver).&lt;br /&gt;
&lt;br /&gt;
This tutorial does NOT show:&lt;br /&gt;
* how to install Icinga version 1&lt;br /&gt;
* how to install/configure databses other than PostgreSQL (for example MySQL, MariaDB, etc.)&lt;br /&gt;
* how to install/configure webservers other than Apache2 (for example Nginx)&lt;br /&gt;
* how to use Icinga2&lt;br /&gt;
&lt;br /&gt;
It is assumed that you are already familiar with the basics of Linux command line terminal commands. But this tutorial is made so that you can copy paste the commands to your terminal.&lt;br /&gt;
&lt;br /&gt;
Versions used in this tutorial:&lt;br /&gt;
* Icinga 2 (version: r2.5.4-1)&lt;br /&gt;
* Ubuntu 16.04.1 LTS (Xenial)&lt;br /&gt;
* PostgreSQL (version: 9.5.2)&lt;br /&gt;
* Apache 2 (version: 2.4.18)&lt;br /&gt;
* Php (version 7.0)&lt;br /&gt;
&lt;br /&gt;
Depending on the versions you use, the commands and/or the path shown in this tutorial might be different.&lt;br /&gt;
&lt;br /&gt;
All commands in this tutorial are made as root. You must be root or be able to use &amp;quot;sudo&amp;quot; command to install and configure Icinga.&lt;br /&gt;
&lt;br /&gt;
The version of Icinga used (version 2) is referred sometimes as “Icinga” or “Icinga 2” accross the tutorial.&lt;br /&gt;
&lt;br /&gt;
This tutorial is based on the following tutorials:&lt;br /&gt;
*[http://docs.icinga.org/icinga2/latest/doc/module/icinga2/chapter/getting-started Official Icinga 2 documentation]&lt;br /&gt;
*[https://github.com/Icinga/icingaweb2/blob/master/doc/02-Installation.md Official Icinga Web 2 installation documentation]&lt;br /&gt;
*[http://linoxide.com/ubuntu-how-to/install-icinga2-ubuntu-16-04 Linoxide &amp;quot;how to&amp;quot;]&lt;br /&gt;
*[https://lowendbox.com/blog/server-monitoring-with-icinga-2-part-1-the-server-ubuntu-host Lowendbox blog post]&lt;br /&gt;
&lt;br /&gt;
For any comments, please write to ebarrier{at]itcollege[dot)ee.&lt;br /&gt;
&lt;br /&gt;
==What is Icinga?==&lt;br /&gt;
Icinga 2 is an open source monitoring system which checks the availability of your network resources, notifies users of outages, and generates performance data for reporting.&amp;lt;ref&amp;gt;[http://docs.icinga.org/icinga2/latest/doc/module/icinga2/toc#!/icinga2/latest/doc/module/icinga2/chapter/about-icinga2#what-is-icinga2] Icinga2 official documentation&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Icinga started as a Nagios fork and did quite well, mostly considering Icinga Web which was better than Nagios’ web interface. Icinga 2 is a complete rewrite and even adds a fancy new (optional) web interface which is responsive and customizable. On top of that, the communication between the monitoring server and the nodes it monitors has become more secure as NRPE has been ditched (it’s still available, just not prefered).&amp;lt;ref&amp;gt;[https://lowendbox.com/blog/server-monitoring-with-icinga-2-part-1-the-server-ubuntu-host] &amp;quot;Lowendbox&amp;quot; blog article about Icinga 2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Icinga is made of two parts - Icinga 2 and Icinga Web 2. The first one is the core of the software and the second is a web interface.&lt;br /&gt;
&lt;br /&gt;
==Install Icinga 2 core==&lt;br /&gt;
Add Icinga&#039;s repository to the package management configuration.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ add-apt-repository ppa:formorer/icinga&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt update&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install Icinga 2 package.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icinga2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check that Icinga is up and running&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service icinga2 status&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it is not running, start it.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service icinga2 start&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Make sure Icinga will start automatically on startup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ systemctl enable icinga2.service&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install plugins==&lt;br /&gt;
===Nagios plugins===&lt;br /&gt;
To be able to check external services, Icinga needs monitoring plugins to know about them and to make sure they work properly. Available monitoring plugins are available on the [https://www.monitoring-plugins.org Monitoring Plugins Project website].&lt;br /&gt;
&lt;br /&gt;
We install the main set of plugins that come from [https://www.nagios.org Nagios] monitoring solution. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note that Icinga service runs as user and group called &amp;quot;Nagios&amp;quot; (for historical reasons).&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install nagios-plugins&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Vim and Nano configuration syntax highlighting===&lt;br /&gt;
Icinga provides packages to highlight its configuration files using Nano and Vim utilities. &lt;br /&gt;
&lt;br /&gt;
The package for Nano is included by default when installinIcinga2.&lt;br /&gt;
&lt;br /&gt;
For Vim, do:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ apt install vim-icinga2 vim-addon-manager&amp;lt;/code&amp;gt;&lt;br /&gt;
$ vim-addon-manager -w install icinga2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install Apache web server==&lt;br /&gt;
Install Apache 2. Apache is a web server system that allows to access Icinga web interface.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install apache2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apply a firewall rule to accept incoming tcp packets with destination port 80 (http). You may ignore this point if you have your own set of rules that you manage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT&lt;br /&gt;
$ iptables-save&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install Icinga Web 2==&lt;br /&gt;
To install Icinga Web 2 package,add its repository to the package management system. &lt;br /&gt;
&lt;br /&gt;
For other Ubuntu versions than Xenial, just replace “xenial” below with the desired distribution&#039;s code name (see the [http://packages.icinga.org/ubuntu packages list]).&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -O - http://packages.icinga.org/icinga.key | apt-key add -&lt;br /&gt;
$ add-apt-repository &#039;deb http://packages.icinga.org/ubuntu icinga-xenial main&#039;&lt;br /&gt;
$ apt update&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install Icinga Web 2.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icingaweb2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Install and configure PostgreSQL databases==&lt;br /&gt;
Icinga needs two databases to work: one main to store monitoring information (DB IDO: Database Icinga Data Output) and one to store Icinga users and groups information for its web interface.&lt;br /&gt;
We will install both of them manually.&lt;br /&gt;
&lt;br /&gt;
===Install PostgreSQL===&lt;br /&gt;
Install PostgreSQL database system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install postgresql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Install IDO module for PostgreSQL===&lt;br /&gt;
Install Icinga IDO module for PostgreSQL.&lt;br /&gt;
It installs files and directories to enable the export and storage of monitoring information into a database.&lt;br /&gt;
We will install the database manually in our tutorial.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ apt install icinga2-ido-pgsql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A wizard will start.&lt;br /&gt;
&lt;br /&gt;
Say &amp;quot;&#039;&#039;&#039;No&#039;&#039;&#039;&amp;quot; to enable the IDO module for PostgreSQL, we do it manually later.&lt;br /&gt;
&lt;br /&gt;
The wizard proposes to create and configure the database with &amp;quot;dbconfig-common&amp;quot;. Choose “&#039;&#039;&#039;No&#039;&#039;&#039;” because we will do it manually (see below).&lt;br /&gt;
&lt;br /&gt;
===Create Icinga users database===&lt;br /&gt;
Create the users database for Icinga.&lt;br /&gt;
&lt;br /&gt;
First go to the /tmp directory because that is the default unix socket location for PostgreSQL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ cd /tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a role (similar to a user) for the database. The database will require to login and we choose a password. You can choose a different role name (&amp;quot;icingaweb&amp;quot;) and a different password (&amp;quot;icingawebpass&amp;quot;) than what is given as an example below. &#039;&#039;Remember them for later!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres psql -c &amp;quot;CREATE ROLE icingaweb WITH LOGIN PASSWORD &#039;icingawebpass&#039;&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create the database (“icingawebdb”) and we assign its owner as being “icingaweb” (created earlier) with UTF8 encoding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres createdb -O icingaweb -E UTF8 icingawebdb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Create IDO database===&lt;br /&gt;
Create the main database for Icinga.&lt;br /&gt;
&lt;br /&gt;
Make sure you are in the /tmp directory (default unix socket location for PostgreSQL).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ cd /tmp&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a role (similar to a user) for the database. &lt;br /&gt;
&lt;br /&gt;
The database will require to login and we choose a password.&lt;br /&gt;
&lt;br /&gt;
You can choose a different role name (&amp;quot;icingaido&amp;quot;) and a different password (&amp;quot;icingaidopass&amp;quot;) than what is given as an example below. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Remember them for later!&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres psql -c &amp;quot;CREATE ROLE icingaido WITH LOGIN PASSWORD &#039;icingaidopass&#039;&amp;quot;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create the database (“icingaidodb”) and we assign its owner as being “icingaido” (created earlier) with UTF8 encoding.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ sudo -u postgres createdb -O icingaido -E UTF8 icingaidodb&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Edit the file &#039;&#039;/etc/icinga2/features-available/ido-mysql.conf&#039;&#039; and insert the values you have chosen for the IDO database.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
object IdoMysqlConnection &amp;quot;ido-mysql&amp;quot; {&lt;br /&gt;
  user = &amp;quot;icingaido&amp;quot;,&lt;br /&gt;
  password = &amp;quot;icingaidopass&amp;quot;,&lt;br /&gt;
  host = &amp;quot;localhost&amp;quot;,&lt;br /&gt;
  database = &amp;quot;icingaidodb&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Configure databases authentication===&lt;br /&gt;
PostgreSQL handles authentication to databases from a file which states which users can connect to which database using certain methods.&lt;br /&gt;
Previously we have created a roles and databases. We must tell PostgreSQL how these databases can be accessed and by whom.&lt;br /&gt;
&lt;br /&gt;
Edit the pg_hba.conf in &#039;&#039;/etc/postgresql/*/main/pg_hba.conf&#039;&#039; and add the roles and databases we defined earlier user with md5 authentication method.&lt;br /&gt;
&#039;md5&#039; means that the user needs to authenticate with a password to access the database.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# TYPE  DATABASE         USER           ADDRESS               METHOD&lt;br /&gt;
#icinga&lt;br /&gt;
local   icingaidodb      icingaido                            md5&lt;br /&gt;
host    icingaidodb      icingaido      127.0.0.1/32          md5&lt;br /&gt;
host    icingaidodb      icingaido      ::1/128               md5&lt;br /&gt;
&lt;br /&gt;
local   icingawebdb      icingaweb                            md5&lt;br /&gt;
host    icingawebdb      icingaweb      127.0.0.1/32          md5&lt;br /&gt;
host    icingawebdb      icingaweb      ::1/128               md5&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Restart PostgreSQL&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service postgresql restart&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Import database schemas===&lt;br /&gt;
So far Icinga can access both databases, but they are empty (not a single table, index, function).&lt;br /&gt;
&lt;br /&gt;
Import the respective schemas for each of them.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Import the web database schema&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This will populate the web database with tables and indexes,...&lt;br /&gt;
The password we setup for this role will be asked.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
$ psql -U icingaweb -d icingawebdb &amp;lt; /usr/share/icingaweb2/etc/schema/pgsql.schema.sql&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Password for user icingaweb:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A list of statements such as “CREATE TABLE”, “CREATE INDEX” appears.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Import the IDO database schema&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This will populate the IDO database with tables, indexes,...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ psql -U icingaido -d icingaidodb &amp;lt; /usr/share/icinga2-ido-pgsql/schema/pgsql.sql&lt;br /&gt;
Password for user icingaido:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A long list of statements such as “CREATE FUNCTION”, “CREATE TABLE”, “CREATE INDEX” appears.&lt;br /&gt;
&lt;br /&gt;
==Enable Icinga features==&lt;br /&gt;
Enable Icinga IDO for PostgreSQL and &#039;command&#039; modules and restart Icinga.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ icinga2 feature enable ido-pgsql command&lt;br /&gt;
$ service icinga2 restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check that ido-pgsql and command modules are enabled.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ icinga2 feature list&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By default the command module file is owned by the group &amp;quot;nagios&amp;quot; with read/write permissions. Add Apache user (&amp;quot;www-data&amp;quot;) to the group &amp;quot;nagios&amp;quot; to enable sending commands to Icinga 2 through the web interface.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ usermod -a -G nagios www-data&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Set up the web interface==&lt;br /&gt;
Open a browser and go to http://[server_ip]/icingaweb2/setup.&lt;br /&gt;
&lt;br /&gt;
1. First is the welcome page asking to insert a token.&lt;br /&gt;
&lt;br /&gt;
To get a token, do in your terminal &amp;lt;code&amp;gt;$ icingacli setup token create&amp;lt;/code&amp;gt; and insert it on the page. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note: in case you need to see the token again, do &amp;lt;code&amp;gt;$ icingacli setup token show&amp;lt;/code&amp;gt;.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 01 token.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Choose the modules to install for Icinga Web 2.&lt;br /&gt;
&lt;br /&gt;
For a normal usage, we suggest “Doc” and “Monitoring” modules.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 02 modules.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Icinga checks that all the requirements it needs are met. You may have some missing, in that case, you must fix them. We are not going to detail how to fix all of them but two that are likely to be missing.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 03 modules incomplete.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;“The PHP config ‘date.timezone’ is not defined”&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:The page already guides you how to fix the Default TimeZone.&lt;br /&gt;
&lt;br /&gt;
:Go to /etc/php/7.0/apache2/php.ini file, uncomment and set the line &#039;&#039;&#039;date.timezone =&#039;&#039;&#039; with your time zone. &lt;br /&gt;
&lt;br /&gt;
:For example &amp;lt;code&amp;gt;date.timezone = Europe/Tallinn&amp;lt;/code&amp;gt; (see the [http://php.net/manual/en/timezones.php list of php time zones]).&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;“The PHP module PDO-PostgreSQL is missing”&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:Install the missing module.&amp;lt;code&amp;gt;$ apt install php-pgsql&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In /etc/php/7.0/apache2/php.ini, add these lines to enable the extension/module&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
extension=pdo_pgsql.so&lt;br /&gt;
extension=pgsql.so&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart the web server to apply the new configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$ service apache2 restart&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Click the button “Refresh” at the bottom of the page to check the the requirements are now met.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 04 modules complete.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. Choose “Database” for authentication unless you specifically want to authenticate using LDAP or another way.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 05 authentication.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Enter the credentials that we set up for users and groups database, and check that the configuration is correct by clicking on “Validate configuration”.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 06 database resource.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Use the default backend name “icingaweb2”.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 07 authentication backend.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7. Choose the credentials that will be asked when you will log into Icinga’s web interface to access the monitoring dashboard. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remember these credentials!&#039;&#039;&#039; (for point 16 below).&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 08 administration.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Leave the default application and logging configuration unless you know what you are doing.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 09 application configuration.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9. Check that the configuration is correct and continue.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 10 summary.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. You arrive to the configuration of the monitoring module.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 11 monitoring welcome.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Leave the defaults values for the monitoring backend (&amp;quot;IDO&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 12 monitoring backend.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12. Insert values you chose for the IDO database and check that the configuration is correct by clicking on “Validate configuration”. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The values are also in the file /etc/icinga2/features-enabled/ido-pgsql.conf.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 13 monitoring IDO resource.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13. Leave the defaults values for the command transport.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 14 command transport.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. Leave the defaults values for the monitoring security.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 15 monitoring security.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. Check that the configuration is correct and finish.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 16 monitoring summary.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 17 congratulations.png|border|1000px|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16. Login to Icinga 2 using the credentials on point 7.&lt;br /&gt;
&lt;br /&gt;
[[File:Icinga2 18 login.png|border|300px|center]]&lt;br /&gt;
&lt;br /&gt;
==Add nodes to Icinga 2==&lt;br /&gt;
&lt;br /&gt;
===The server node===&lt;br /&gt;
&lt;br /&gt;
In order to be able to add hosts securely, we have to go to the server and run the following command:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node wizard&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will start a wizard which will first ask you whether this is a satellite setup or not. Since this is the server or master you have to say ‘No’ here, to input an ‘n’:&lt;br /&gt;
&lt;br /&gt;
    Please specify if this is a satellite setup (‘n’ installs a master setup) [Y/n]: n&lt;br /&gt;
&lt;br /&gt;
It then starts generating keys are certificates required for secured TLS communication. In addition to that, it adds these to the configuration, plus it ensures this server is listed as the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/base: Writing private key to ‘/var/lib/icinga2/ca/ca.key’.&lt;br /&gt;
    information/base: Writing X509 certificate to ‘/var/lib/icinga2/ca/ca.crt’.&lt;br /&gt;
    information/cli: Initializing serial file in ‘/var/lib/icinga2/ca/serial.txt’.&lt;br /&gt;
    information/cli: Generating new CSR in ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/base: Writing private key to ‘/etc/icinga2/pki/icinga-server.key’.&lt;br /&gt;
    information/base: Writing certificate signing request to ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/base: Writing private key to ‘/etc/icinga2/pki/icinga-server.key’.&lt;br /&gt;
    information/base: Writing certificate signing request to ‘/etc/icinga2/pki/icinga-server.csr’.&lt;br /&gt;
    information/cli: Signing CSR with CA and writing certificate to ‘/etc/icinga2/pki/icinga-server.crt’.&lt;br /&gt;
    information/cli: Copying CA certificate to ‘/etc/icinga2/pki/ca.crt’.&lt;br /&gt;
    information/cli: Dumping config items to file ‘/etc/icinga2/zones.conf’.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/zones.conf.orig’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It then asks you for the host and port for the API. We have no reason to change these, so leave these empty:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the API bind host/port (optional):&lt;br /&gt;
    Bind Host []:&lt;br /&gt;
    Bind Port []:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It then finalizes setting up this server as a master my editing some more configuration files:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Enabling the APIlistener feature.&lt;br /&gt;
    Enabling feature api. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/features-available/api.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants.conf.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/constants.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    Done.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Now restart your Icinga 2 daemon to finish the installation!&lt;br /&gt;
&lt;br /&gt;
With that done, restart Icinga 2 in order to use the new settings:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 restart&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the master is good for now. Let’s move on to the host node!&lt;br /&gt;
&lt;br /&gt;
===The host node===&lt;br /&gt;
&lt;br /&gt;
On the host node, we’re first going to have to ensure the Icinga 2 repository is present:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ add-apt-repository ppa:formorer/icinga&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Press ENTER when it asks you to.&lt;br /&gt;
&lt;br /&gt;
Note: If this command gives you an error, run ‘sudo apt-get install software-properties-common’ to get the ‘add-apt-repository’ command!&lt;br /&gt;
&lt;br /&gt;
Once the repository has been added, update apt:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo apt-get update&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And install Icinga 2:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo apt-get install icinga2&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With that out of the way, we can initiate the same wizard as we did on the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node wizard&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This time we answer ‘Yes’ when it asks us if this is a satellite setup by just hitting ENTER:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify if this is a satellite setup (‘n’ installs a master setup) [Y/n]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After which is starts a different wizard:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Starting the Node setup routine…&lt;br /&gt;
    Please specifiy the common name (CN) [icinga-node]:&lt;br /&gt;
    Please specifiy the local zone name [icinga-node]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It asks you for the common name and the local zone name for this server. These default to the system’s hostname in fully qualified domain name format. These master uses the common name to connect to the server and the local zone name to identify it in configuration files. I just let these be.&lt;br /&gt;
&lt;br /&gt;
It then goes on to ask you about your master node:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the master endpoint(s) this node should connect to:&lt;br /&gt;
    Master Common Name (CN from your master setup): icinga-server&lt;br /&gt;
    Do you want to establish a connection to the master from this node? [Y/n]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please enter the Common Name of your master node (in my case ‘icinga-server’). This is usually the hostname unless you’ve changed it. Then press ENTER when asked if you want to establish a connection to the master from this node. This triggers the next question:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please fill out the master connection information:&lt;br /&gt;
    Master endpoint host (Your master’s IP address or FQDN): icinga-server&lt;br /&gt;
    Master endpoint port [5665]:&lt;br /&gt;
    Add more master endpoints? [y/N]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Enter the master’s IP address or Fully Qualified Domain Name (FQDN) here and accept the default port. Also press ENTER in order to not add more endpoints: we’re just working with one master right now.&lt;br /&gt;
&lt;br /&gt;
Then it’s on to the connection for CSR auto-signing, the bit of magic that makes setting up a secure connection a bit easier for you:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the master connection for CSR auto-signing (defaults to master endpoint host):&lt;br /&gt;
    Host [icinga-server]:&lt;br /&gt;
    Port [5665]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept the defaults here as well, because the master we have entered before is also our server for CSR auto-signing.&lt;br /&gt;
&lt;br /&gt;
After this, Icinga 2 is going to save some configuration on the host node and start the setup of a secure connection. As part of this process the master is contacted:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/base: Writing private key to ‘/etc/icinga2/pki/icinga-node.key’.&lt;br /&gt;
    information/base: Writing X509 certificate to ‘/etc/icinga2/pki/icinga-node.crt’.&lt;br /&gt;
    information/cli: Generating self-signed certifiate:&lt;br /&gt;
    information/cli: Fetching public certificate from master (icinga-server, 5665):&lt;br /&gt;
&lt;br /&gt;
    information/cli: Writing trusted certificate to file ‘/etc/icinga2/pki/trusted-master.crt’.&lt;br /&gt;
    information/cli: Stored trusted master certificate in ‘/etc/icinga2/pki/trusted-master.crt’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The certificate that has been set up needs to be signed in order to prove that you’re actually in command of both servers and approve of this secure communication:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the request ticket generated on your Icinga 2 master.&lt;br /&gt;
    (Hint: # icinga2 pki ticket –cn ‘icinga-node’):&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This means you need to run the following command on the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 pki ticket –cn ‘icinga-node’&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And copy the output from that command, which looks like ‘ff84267fca3b0b29c4c88d94706c76f4247cac34’ to the host node.&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Processing self-signed certificate request. Ticket ‘ff84267fca3b0b29c4c88d94706c76f4247cac34’.&lt;br /&gt;
&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/pki/icinga-node.crt.orig’.&lt;br /&gt;
    information/cli: Writing signed certificate to file ‘/etc/icinga2/pki/icinga-node.crt’.&lt;br /&gt;
    information/cli: Writing CA certificate to file ‘/etc/icinga2/pki/ca.crt’.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With all certificates signed and in place, we’re asked about the API again:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Please specify the API bind host/port (optional):&lt;br /&gt;
    Bind Host []:&lt;br /&gt;
    Bind Port []:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Just like at the master, we’re not going to touch these here.&lt;br /&gt;
&lt;br /&gt;
The wizard now asks you whether to accept the configuration and commands from the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;Accept config from master? [y/N]: y&lt;br /&gt;
    Accept commands from master? [y/N]: y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Select ‘Yes’ for both. Unfortunately, the Icinga 2 documentation is a bit fuzzy on this part. There are several ways to setup up a client, for example with a local configuration or as an execution bridge. I’m aiming for the latter of the two here: the master is in control and sends commands, the host node just executes them and returns the results. This is closest to what NRPE does and should keep all the data on the master.&lt;br /&gt;
&lt;br /&gt;
With this done, everything is being put in place to make this work:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;information/cli: Disabling the Notification feature.&lt;br /&gt;
    Disabling feature notification. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Enabling the Apilistener feature.&lt;br /&gt;
    Enabling feature api. Make sure to restart Icinga 2 for these changes to take effect.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/features-available/api.conf.orig’.&lt;br /&gt;
    information/cli: Generating local zones.conf.&lt;br /&gt;
    information/cli: Dumping config items to file ‘/etc/icinga2/zones.conf’.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/zones.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants.conf.&lt;br /&gt;
    information/cli: Created backup file ‘/etc/icinga2/constants.conf.orig’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    information/cli: Updating constants file ‘/etc/icinga2/constants.conf’.&lt;br /&gt;
    Done.&lt;br /&gt;
&lt;br /&gt;
    Now restart your Icinga 2 daemon to finish the installation!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
After which you need to restart Icinga 2 on the host node:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 restart&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And it’s back to the master.&lt;br /&gt;
Back to the server node (the master)&lt;br /&gt;
&lt;br /&gt;
With the host node set up properly, only a few things remain on the master to be set up. First of all, we want to list the nodes on the master to see if our new host node is in there:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node list&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The output should include the node you’ve just added.&lt;br /&gt;
&lt;br /&gt;
Then, we update the configuration on the master so the host node is being included in checks, or in other words is being added to the master:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo icinga2 node update-config&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it did not work first time try changing permission of icinga2 directory to 755 ( with -R ).&lt;br /&gt;
&lt;br /&gt;
The only thing that remains right now is to reload Icinga 2:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;pre&amp;gt;$ sudo service icinga2 reload&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Summary from the author==&lt;br /&gt;
The installation is really difficult.&lt;br /&gt;
&lt;br /&gt;
Although the official documentation is well written and gives detailed commands for different distributions and databases, it lacks crucial explanations to understand to the user what it is being done.&lt;br /&gt;
&lt;br /&gt;
Here are a few problems we encountered:&lt;br /&gt;
# The installation documentation for [http://docs.icinga.org/icinga2/latest/doc/module/icinga2/chapter/getting-started Icinga 2] and [https://github.com/Icinga/icingaweb2/blob/master/doc/02-Installation.md Official Icinga Web 2] are not at the same place and are not consistent in their format and style.&lt;br /&gt;
# Icinga2 IDO package has a wizard to create and configure the IDO database (which non-experienced users will probably follow), but it is not absolutely clear in the documentation that if you follow the wizard, you do not need to create the IDO database manually afterwards.&lt;br /&gt;
# If you follow the wizard, the IDO database name and user will have default values. The user will only have to choose the password. But when the user arrives to web interface where he must enter the credentials of this database, there is no indication that he can find them in a configuration file.&lt;br /&gt;
# According to Icinga documentation, the users database can be created automatically by the web interface at the end of the procedure. But experience showed that it never worked (errors occur). The user is left with the documentation that does not explain how to create this users database manually (which we took a long time to figure out).&lt;br /&gt;
# In case of problem during installation, a user who is not familiar with his database system will have trouble debugging. The web interface does not provide useful solutions.&lt;br /&gt;
&lt;br /&gt;
I would not recommend Icinga with the experience I have, unless you follow this guide.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist|30em}}&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116320</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116320"/>
		<updated>2017-01-03T07:22:23Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
[[File:Splunk.jpg]]&lt;br /&gt;
&lt;br /&gt;
Splunk is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log &lt;br /&gt;
=== Why splunk ? ===&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
===Open Source Splunk Alternative ===&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
&lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets&lt;br /&gt;
Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
===Use Splunk Web===&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar.&lt;br /&gt;
===Edit configuration files===&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
===Use Splunk CLI===&lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
&#039;&#039;&#039;./splunk help&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder===&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times.&lt;br /&gt;
Key configuration files are: &lt;br /&gt;
*&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
*&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
*&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
*&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
===Best practices for deploying configuration updates across universal forwarders===&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
*Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
*Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
*Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/).&lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer.&lt;br /&gt;
 &lt;br /&gt;
===Configure the universal forwarder to connect to a receiving indexer===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder to connect to a deployment server===&lt;br /&gt;
&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
*&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Configure a data input on the forwarder===&lt;br /&gt;
Determine what data you want to collect. &lt;br /&gt;
*From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
*The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
&lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
&lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       *&#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      *&#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
===Configure forwarding with outputs.conf===&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. &lt;br /&gt;
===Edit outputs.conf to configure forwarding===&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. &lt;br /&gt;
&lt;br /&gt;
#On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
#Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
#Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
*vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
*notepad outputs.conf &lt;br /&gt;
Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
#Save the outputs.conf file and close it. &lt;br /&gt;
#Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
*cd $SPLUNK_HOME/bin&lt;br /&gt;
*./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
*cd %SPLUNK_HOME%\bin&lt;br /&gt;
*.\splunk restart&lt;br /&gt;
&lt;br /&gt;
===TL;DR===&lt;br /&gt;
&lt;br /&gt;
==Install Splunk==&lt;br /&gt;
&lt;br /&gt;
#Run the dpkg command to install Splunk Light into the default directory.&lt;br /&gt;
&lt;br /&gt;
 pkg -i splunk_package_name.deb&lt;br /&gt;
&lt;br /&gt;
You cannot install the DEB package into another directory.&lt;br /&gt;
&lt;br /&gt;
#Start Splunk.&lt;br /&gt;
&lt;br /&gt;
./splunk start --accept-license&lt;br /&gt;
&lt;br /&gt;
==Configure the universal forwarder to connect to a deployment server==&lt;br /&gt;
&lt;br /&gt;
#For Forwarder, from a shell or command prompt on the forwarder, run the command:&lt;br /&gt;
&lt;br /&gt;
./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#Configure a data input on the forwarder&lt;br /&gt;
&lt;br /&gt;
./splunk add monitor /var/log&lt;br /&gt;
&lt;br /&gt;
#Restart the universal forwarder&lt;br /&gt;
./splunk restart&lt;br /&gt;
&lt;br /&gt;
==Configure your inputs==&lt;br /&gt;
&lt;br /&gt;
#Edit inputs.conf&lt;br /&gt;
&lt;br /&gt;
Ex.&lt;br /&gt;
# The following configuration directs Splunk to listen on TCP port 9995 for raw data from 10.1.1.10. &lt;br /&gt;
# All data is assigned the host &amp;quot;webhead-1&amp;quot;, the sourcetype &amp;quot;access_common&amp;quot; and the&lt;br /&gt;
# the source &amp;quot;//10.1.1.10/var/log/apache/access.log&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[tcp://10.1.1.10:9995]&lt;br /&gt;
host = webhead-1&lt;br /&gt;
sourcetype = access_common&lt;br /&gt;
source = //10.1.1.10/var/log/apache/access.log&lt;br /&gt;
&lt;br /&gt;
More examples and info.&lt;br /&gt;
http://docs.splunk.com/Documentation/Splunk/6.5.1/admin/Inputsconf&lt;br /&gt;
https://docs.splunk.com/Documentation/Splunk/6.5.1/Data/Monitorfilesanddirectorieswithinputs.conf&lt;br /&gt;
&lt;br /&gt;
==Splunk Web==&lt;br /&gt;
&lt;br /&gt;
#Login to Splunk Web&lt;br /&gt;
&lt;br /&gt;
The Splunk Web interface is at http://localhost:8000&lt;br /&gt;
&lt;br /&gt;
#Enter credentsials&lt;br /&gt;
&lt;br /&gt;
username: admin&lt;br /&gt;
password: changeme&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116303</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116303"/>
		<updated>2017-01-02T15:14:25Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
[[File:Splunk.jpg]]&lt;br /&gt;
&lt;br /&gt;
Splunk is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log &lt;br /&gt;
=== Why splunk ? ===&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
===Open Source Splunk Alternative ===&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
&lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets&lt;br /&gt;
Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
*All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
===Use Splunk Web===&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar. Most tasks in the Splunk documentation set are described for Splunk Web.&lt;br /&gt;
===Edit configuration files===&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
===Use Splunk CLI===&lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
./splunk help&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder===&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times. See &amp;quot;About configuration files&amp;quot; and &amp;quot;Configuration file precedence&amp;quot; in the Splunk Enterprise Admin manual, for details on how configuration files work. &lt;br /&gt;
Key configuration files are: &lt;br /&gt;
&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
===Best practices for deploying configuration updates across universal forwarders===&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
*Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
*Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
*Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/).&lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer. &lt;br /&gt;
Configure the universal forwarder to connect to a receiving indexer&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
Configure the universal forwarder to connect to a deployment server&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
===Configure a data input on the forwarder===&lt;br /&gt;
The Splunk Enterprise Getting Data In manual has information on what data a universal forwarder can collect. &lt;br /&gt;
1. Determine what data you want to collect. &lt;br /&gt;
2. From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       &#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      &#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
===Configure forwarding with outputs.conf===&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. See Add data and configure inputs in Getting Data In. &lt;br /&gt;
===Edit outputs.conf to configure forwarding===&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. &lt;br /&gt;
&lt;br /&gt;
1. On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
2. Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
3. Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
notepad outputs.conf &lt;br /&gt;
4. Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
5. Save the outputs.conf file and close it. &lt;br /&gt;
6. Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/bin&lt;br /&gt;
./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\bin&lt;br /&gt;
.\splunk restart&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Splunk.jpg&amp;diff=116302</id>
		<title>File:Splunk.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Splunk.jpg&amp;diff=116302"/>
		<updated>2017-01-02T15:13:25Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116301</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116301"/>
		<updated>2017-01-02T15:12:28Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Splunk is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log &lt;br /&gt;
=== Why splunk ? ===&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
===Open Source Splunk Alternative ===&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
&lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets&lt;br /&gt;
Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
*All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
===Use Splunk Web===&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar. Most tasks in the Splunk documentation set are described for Splunk Web.&lt;br /&gt;
===Edit configuration files===&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
===Use Splunk CLI===&lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
./splunk help&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
&lt;br /&gt;
===Configure the universal forwarder===&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times. See &amp;quot;About configuration files&amp;quot; and &amp;quot;Configuration file precedence&amp;quot; in the Splunk Enterprise Admin manual, for details on how configuration files work. &lt;br /&gt;
Key configuration files are: &lt;br /&gt;
&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
===Best practices for deploying configuration updates across universal forwarders===&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
*Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
*Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
*Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/).&lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer. &lt;br /&gt;
Configure the universal forwarder to connect to a receiving indexer&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
Configure the universal forwarder to connect to a deployment server&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
===Configure a data input on the forwarder===&lt;br /&gt;
The Splunk Enterprise Getting Data In manual has information on what data a universal forwarder can collect. &lt;br /&gt;
1. Determine what data you want to collect. &lt;br /&gt;
2. From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       &#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      &#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
===Configure forwarding with outputs.conf===&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. See Add data and configure inputs in Getting Data In. &lt;br /&gt;
===Edit outputs.conf to configure forwarding===&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. &lt;br /&gt;
&lt;br /&gt;
1. On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
2. Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
3. Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
notepad outputs.conf &lt;br /&gt;
4. Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
5. Save the outputs.conf file and close it. &lt;br /&gt;
6. Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/bin&lt;br /&gt;
./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\bin&lt;br /&gt;
.\splunk restart&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116300</id>
		<title>Splunk</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Splunk&amp;diff=116300"/>
		<updated>2017-01-02T14:45:50Z</updated>

		<summary type="html">&lt;p&gt;Itaal: Created page with &amp;quot; ==== Splunk ====    Splunk is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==== Splunk ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Splunk is a powerful log database that can be used for analysis of any sort of log data through its easy to use search engine. Security logs, Syslog, Web server logs and Windows logs are just the beginning. One of the great features of Splunk is that you can feed pretty much any log into it and start searching.&lt;br /&gt;
Splunk is not open source, it is commercial however it does have a Free option that allows up to 500mb of data to be added into the system per day. For larger volume than 500mb per day the licensing costs start to add up. Splunk installation under Ubuntu is so easy, you can fire up an instance to do ad-hoc analysis of static log files.&lt;br /&gt;
&lt;br /&gt;
=== Why splunk ? ====&lt;br /&gt;
Their features site says it - to Collect and Index All Log Files while having very flexible data input choises. Good example of use is for Mashine Learning.&lt;br /&gt;
https://www.splunk.com/en_us/products/splunk-light/features.html&lt;br /&gt;
Open Source Splunk Alternative&lt;br /&gt;
If you are interesting in a purely Open Source log search engine, take a look at  Greylog2.&lt;br /&gt;
=== About Splunk Free=== &lt;br /&gt;
Splunk Free is the totally free version of Splunk. The Free license lets you index up to 500 MB per day and will never expire. &lt;br /&gt;
The 500 MB limit refers to the amount of new data you can add (we call this indexing) per day. But you can keep adding data every day, storing as much as you want. For example, you could add 500 MB of data per day and eventually have 10 TB of data in Splunk Enterprise. &lt;br /&gt;
If you need more than 500 MB/day, you&#039;ll need to purchase an Enterprise license. See How Splunk licensing works for more information about licensing. &lt;br /&gt;
Splunk Free regulates your license usage by tracking license violations. If you go over 500 MB/day more than 3 times in a 30 day period, Splunk Free continues to index your data, but disables search functionality until you are back down to 3 or fewer warnings in the 30 day period. &lt;br /&gt;
=== Is Splunk Free for you? === &lt;br /&gt;
Splunk Free is designed for personal, ad hoc search and visualization of IT data. You can use Splunk Free for ongoing indexing of small volumes (&amp;lt;500 MB/day) of data. Additionally, you can use it for short-term bulk-loading and analysis of larger data sets--Splunk Free lets you bulk-load much larger data sets up to 3 times within a 30 day period. This can be useful for forensic review of large data sets. &lt;br /&gt;
=== What is included with Splunk Free? === &lt;br /&gt;
Splunk Free is a single-user product. All Splunk Enterprise features are supported, with the following exceptions: &lt;br /&gt;
*Distributed search configurations (including search head clustering) are not available. &lt;br /&gt;
*Forwarding in TCP/HTTP formats is not available. This means you can forward data to other Splunk platform instances, but not to non-Splunk software. &lt;br /&gt;
*Deployment management capabilities are not available. &lt;br /&gt;
*Alerting (monitoring) is not available. &lt;br /&gt;
*Indexer clustering is not available. &lt;br /&gt;
*Report acceleration summaries are not available. &lt;br /&gt;
*While a Splunk Free instance can be used as a forwarder (to a Splunk Enterprise indexer) it cannot be the client of a deployment server. &lt;br /&gt;
*There is no authentication or user and role management when using Splunk Free. This means: &lt;br /&gt;
*There is no login. The command line or browser can access and control all aspects of Splunk Free with no user/password prompt. &lt;br /&gt;
*All accesses are treated as equivalent to the admin user. There is only one role (admin), and it is not configurable. You cannot add more roles or create user accounts. &lt;br /&gt;
*Searches are run against all public indexes, &#039;index=*&#039;. &lt;br /&gt;
*Restrictions on search, such as user quotas, maximum per-search time ranges, and search filters, are not supported. &lt;br /&gt;
*The capability system is disabled. All available capabilities are enabled for all users accessing Splunk Free.&lt;br /&gt;
&lt;br /&gt;
=== Ways you can configure Splunk software === &lt;br /&gt;
Splunk software maintains its configuration information in a set of configuration files. You can configure Splunk by using any (or all!) of these methods: &lt;br /&gt;
*Use Splunk Web. &lt;br /&gt;
*Use Splunk&#039;s Command Line Interface (CLI) commands. &lt;br /&gt;
*Edit Splunk&#039;s configuration files directly. &lt;br /&gt;
*Use App setup screens that use the Splunk REST API to update configurations.&lt;br /&gt;
*All of these methods change the contents of the underlying configuration files. You may find different methods handy in different situations. &lt;br /&gt;
==Use Splunk Web==&lt;br /&gt;
You can perform most common configuration tasks in Splunk Web. Splunk Web runs by default on port 8000 of the host on which it is installed: &lt;br /&gt;
If you&#039;re running Splunk on your local machine, the URL to access Splunk Web is http://localhost:8000. &lt;br /&gt;
If you&#039;re running Splunk on a remote machine, the URL to access Splunk Web is http://&amp;lt;hostname&amp;gt;:8000, where &amp;lt;hostname&amp;gt; is the name of the machine Splunk is running on. &lt;br /&gt;
Administration menus can be found under Settings in the Splunk Web menu bar. Most tasks in the Splunk documentation set are described for Splunk Web.&lt;br /&gt;
Edit configuration files&lt;br /&gt;
Most of Splunk&#039;s configuration information is stored in .conf files. These files are located under your Splunk installation directory (usually referred to in the documentation as $SPLUNK_HOME) under /etc/system. In most cases you can copy these files to a local directory and make changes to these files with your preferred text editor.  &lt;br /&gt;
== Use Splunk CLI== &lt;br /&gt;
Many configuration options are available via the CLI. These options are documented in the CLI chapter in this manual. You can also get CLI help reference with the help command while Splunk is running: &lt;br /&gt;
./splunk help&lt;br /&gt;
&lt;br /&gt;
=== Feed Splunk Data and Search!=== &lt;br /&gt;
Start getting data in the system and then you can search on that data. Data can be input from simple files for some one off analysis, it can read known log files or can listen on a port similar to a syslog server. It is very flexible, for example running it on a TCP port you could even use netcat to pipe a file over the network into Splunk server, or have a syslog server forward some of its logs to the Splunk instance. This would leave you with your existing syslog infrastructure intact for archival purposes but you also have the Splunk instance for easy analysis.&lt;br /&gt;
Now you are up to the point where it depends on your network and requirements, so think about how you are going to use it, feed it some data and start searching for stuff. The stuff could be configuration issues, errors, utilization trends or security events. If you want to do some easy testing, just grab a web server log file or other log and feed it in directly with the a file or directory option.&lt;br /&gt;
Configure the universal forwarder&lt;br /&gt;
Before a forwarder can forward data, it must have a configuration. A configuration: &lt;br /&gt;
*Tells the forwarder what data to send. &lt;br /&gt;
*Tells it where to send the data.&lt;br /&gt;
&lt;br /&gt;
Because the universal forwarder does not have Splunk Web, you must give the forwarder a configuration either during the installation (on Windows systems only) or later, as a separate step. To perform post-installation configuration, you can: &lt;br /&gt;
*Use the CLI. The CLI lets you do nearly all configuration in a small number of steps, but does not give you full access to the feature set of the forwarder. &lt;br /&gt;
*Create or modify configuration files on the forwarder directly. &lt;br /&gt;
*Use a deployment server. The deployment server can ease distribution of configurations, but does not make a forwarder forward data by itself. You must use the deployment server to deliver configurations to the forwarders so that they collect the data you want and send it to the place you want.&lt;br /&gt;
&lt;br /&gt;
=== About configuring the universal forwarder with configuration files === &lt;br /&gt;
Configuration files are text files that the universal forwarder reads when it starts up or when you reload a configuration. Forwarders must read configuration files to know where to get and send data. These files give you full access to the forwarder feature set, but editing configuration files can be difficult or mistake-prone at times. See &amp;quot;About configuration files&amp;quot; and &amp;quot;Configuration file precedence&amp;quot; in the Splunk Enterprise Admin manual, for details on how configuration files work. &lt;br /&gt;
Key configuration files are: &lt;br /&gt;
&#039;&#039;&#039;inputs.conf&#039;&#039;&#039; controls how the forwarder collects data. &lt;br /&gt;
&#039;&#039;&#039;outputs.conf&#039;&#039;&#039; controls how the forwarder sends data to an indexer or other forwarder. &lt;br /&gt;
&#039;&#039;&#039;server.conf&#039;&#039;&#039; for connection and performance tuning. &lt;br /&gt;
&#039;&#039;&#039;deploymentclient.conf&#039;&#039;&#039; for connecting to a deployment server.&lt;br /&gt;
You make changes to configuration files by editing them with a text editor. You can use any editor that you want as long as it can write files in ASCII/UTF-8 format. &lt;br /&gt;
The forwarder works with configurations for forwarding data in outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf. &lt;br /&gt;
The universal forwarder has a SplunkUniversalForwarder app, which includes preconfigured settings that let the forwarder run in a streamlined mode. Do not edit any configuration files within that app unless you receive specific instructions. &lt;br /&gt;
Best practices for deploying configuration updates across universal forwarders&lt;br /&gt;
You can use the following methods to deploy configuration updates across your set of universal forwarders: &lt;br /&gt;
Edit or copy the configuration files for each universal forwarder manually (This is only useful for small deployments.) &lt;br /&gt;
Use the Splunk deployment server to push configured apps to your set of universal forwarders. &lt;br /&gt;
Use your own deployment tools (puppet or Chef on *nix or System Center Configuration Manager on Windows) to push configuration changes.&lt;br /&gt;
=== Configure the universal forwarder from the CLI === &lt;br /&gt;
The CLI lets you configure most forwarding parameters without having to edit configuration files. It does not give you full access to all forwarding parameters, and you must edit configuration files in those cases. &lt;br /&gt;
When you make configuration changes with the CLI, the universal forwarder writes the configuration files. This prevents typos and other mistakes that can occur when you edit configuration files directly. &lt;br /&gt;
The forwarder writes configurations for forwarding data to outputs.conf in $SPLUNK_HOME/etc/system/local/). See Configure forwarding with outputs.conf, for information on outputs.conf. &lt;br /&gt;
Examples for using the CLI to configure a universal forwarder&lt;br /&gt;
Following are example procedures on how to configure a universal forwarder to connect to a receiving indexer. &lt;br /&gt;
Configure the universal forwarder to connect to a receiving indexer&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server &amp;lt;host name or ip address&amp;gt;:&amp;lt;listening port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, to connect to the receiving indexer with the hostname idx.mycompany.com and that host listens on port 9997 for forwarders, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add forward-server idx1.mycompany.com:9997&#039;&#039;&#039;&lt;br /&gt;
Configure the universal forwarder to connect to a deployment server&lt;br /&gt;
From a shell or command prompt on the forwarder, run the command: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll &amp;lt;host name or ip address&amp;gt;:&amp;lt;management port&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
For example, if you want to connect to the deployment server with the hostname ds1.mycompany.com on the default management port of 8089, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk set deploy-poll ds1.mycompany.com:8089&#039;&#039;&#039;&lt;br /&gt;
Configure a data input on the forwarder&lt;br /&gt;
&lt;br /&gt;
The Splunk Enterprise Getting Data In manual has information on what data a universal forwarder can collect. &lt;br /&gt;
1. Determine what data you want to collect. &lt;br /&gt;
2. From a shell or command prompt on the forwarder, run the command that enables that data input. For example, to monitor the /var/log directory on the host with the universal forwarder installed, type in: &lt;br /&gt;
&#039;&#039;&#039;./splunk add monitor /var/log&#039;&#039;&#039;&lt;br /&gt;
The forwarder asks you to authenticate and begins monitoring the specified directory immediately after you log in. &lt;br /&gt;
&#039;&#039;&#039;Restart&#039;&#039;&#039; the universal forwarder&lt;br /&gt;
Some configuration changes might require that you restart the forwarder. &lt;br /&gt;
To restart the universal forwarder, use the same CLI restart command that you use to restart a full Splunk Enterprise instance: &lt;br /&gt;
On Windows: Go to %SPLUNK_HOME%\bin and run this command:&lt;br /&gt;
       &#039;&#039;&#039;splunk restart&#039;&#039;&#039; &lt;br /&gt;
On *nix systems: From a shell prompt on the host, go to $SPLUNK_HOME/bin, and run this command:&lt;br /&gt;
      &#039;&#039;&#039;./splunk restart&#039;&#039;&#039;&lt;br /&gt;
Configure forwarding with outputs.conf&lt;br /&gt;
The &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; file defines how forwarders send data to receivers. You can specify some output configurations at installation time (Windows universal forwarders only) or the CLI, but most advanced configuration settings require that you edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039;. &lt;br /&gt;
The topics that describe various forwarding topologies, such as load balancing and intermediate forwarding, provide detailed examples on configuring outputs.conf to support those topologies. &lt;br /&gt;
Although outputs.conf is a required file for configuring forwarders, it addresses only the outputs from the forwarder, where you want the forwarder to send the data it collects. To specify the data that you want to collect from the forwarder, you must separately configure the inputs, as you would for any Splunk instance. See Add data and configure inputs in Getting Data In. &lt;br /&gt;
Edit &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; to configure forwarding&lt;br /&gt;
This procedure details the steps you must take to edit the default &#039;&#039;&#039;outputs.conf&#039;&#039;&#039; which is in $SPLUNK_HOME/etc/system/local. You might have to edit the file in other places, as sections in this topic explain. For an example of what an outputs.conf file looks like, see &amp;quot;Examples of outputs.conf&amp;quot; later in this topic. &lt;br /&gt;
1. On the host that forwards that data that you want to collect, open a shell or command prompt or PowerShell window. &lt;br /&gt;
2. Go to the configuration directory for the forwarder.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/etc/system/local &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\etc\system\local &lt;br /&gt;
3. Open outputs.conf for editing with a text editor.&lt;br /&gt;
Unix &lt;br /&gt;
vi outputs.conf &lt;br /&gt;
Windows &lt;br /&gt;
notepad outputs.conf &lt;br /&gt;
4. Edit outputs.conf. Add a minimum of at least one forwarding target group or a single receiving host. &lt;br /&gt;
5. Save the outputs.conf file and close it. &lt;br /&gt;
6. Restart the universal forwarder to complete your changes.&lt;br /&gt;
Unix  &lt;br /&gt;
cd $SPLUNK_HOME/bin&lt;br /&gt;
./splunk restart &lt;br /&gt;
Windows&lt;br /&gt;
cd %SPLUNK_HOME%\bin&lt;br /&gt;
.\splunk restart&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105049</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105049"/>
		<updated>2016-08-25T00:18:53Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Radare2.jpg]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Radare&#039;&#039;&#039; &amp;lt;nowiki&amp;gt;[1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables:&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Radare2&#039;&#039;&#039;&lt;br /&gt;
It is the core of of the hexadecimal editor and debugger. It allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on.&lt;br /&gt;
&lt;br /&gt;
Radare2 implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, visualizing. It can be scripted with a variety of languages, including Ruby, Python, Lua, and Perl.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rabin2&#039;&#039;&#039;&lt;br /&gt;
It allows you to extract information from executable binaries, such as ELF, PE, Java CLASS, and Mach-O. rabin2 is used by the core to get exported symbols, imports, file information, cross references (xrefs), library dependencies, sections, etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rasm2&#039;&#039;&#039;&lt;br /&gt;
It is a command line assembler and disassembler for multiple architectures (including Intel x86 and x86-64, MIPS, ARM, PowerPC, Java, and MSIL).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rahash2&#039;&#039;&#039;&lt;br /&gt;
An implementation of a block-based hash tool. From small text strings to large disks, rahash2 supports multiple algorithms, including MD4, MD5, CRC16, CRC32, SHA1, SHA256, SHA384, SHA512, par, xor, xorpair, mod255, hamdist, or entropy. rahash2 can be used to check the integrity of, or track changes to, big files, memory dumps, and disks.&lt;br /&gt;
&lt;br /&gt;
Radiff2&lt;br /&gt;
It is a binary diffing utility that implements multiple algorithms. It supports byte-level or delta diffing for binary files, and code-analysis diffing to find changes in basic code blocks obtained from the radare code analysis, or from the IDA analysis using the rsc idc2rdb script.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rafind2&#039;&#039;&#039;&lt;br /&gt;
It is a program that allows you to find byte patterns in files.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ragg2&#039;&#039;&#039;&lt;br /&gt;
A frontend for r_egg. ragg2 compiles programs written in a simple high-level language into tiny binaries for x86, x86-64, and ARM.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rarun2&#039;&#039;&#039;&lt;br /&gt;
A launcher for running programs within different environments, with different arguments, permissions, directories, and overridden default file descriptors.&lt;br /&gt;
&lt;br /&gt;
Rarun2 is useful for:&lt;br /&gt;
&lt;br /&gt;
    Crackmes&lt;br /&gt;
    Fuzzing&lt;br /&gt;
    Test suites&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rax2&#039;&#039;&#039;&lt;br /&gt;
A minimalistic mathematical expression evaluator for the shell that is useful for making base conversions between floating point values, hexadecimal representations, hexpair strings to ASCII, octal to integer, etc. It also supports endianness settings and can be used as an interactive shell if no arguments are given.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting radare2==&lt;br /&gt;
&lt;br /&gt;
You can get radare from the website, http://radare.org/, or the GitHub repository, https://github.com/radare/radare2.&lt;br /&gt;
&lt;br /&gt;
Binary packages are available for a number of operating systems (Ubuntu, Maemo, Gentoo, Windows, iPhone, and so on). Yet, you are highly encouraged to get the source and compile it yourself to better understand the dependencies, to make examples more accessible and of course to have the most recent version.&lt;br /&gt;
&lt;br /&gt;
A new stable release is typically published every month. Nightly tarballs are sometimes available at http://bin.rada.re/.&lt;br /&gt;
&lt;br /&gt;
The radare development repository is often more stable than the &#039;stable&#039; releases. To obtain the latest version:&lt;br /&gt;
&lt;br /&gt;
$ git clone https://github.com/radare/radare2.git&lt;br /&gt;
&lt;br /&gt;
==Install==&lt;br /&gt;
&lt;br /&gt;
The easiest way to install radare2 from git is by running the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;$ sys/install.sh&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you want to install radare2 in the home directory without using root privileges and sudo, simply run:&lt;br /&gt;
&lt;br /&gt;
--[[User:Itaal|itaal]] ([[User talk:Itaal|talk]]) 03:17, 25 August 2016 (EEST)$ sys/user.sh&lt;br /&gt;
&lt;br /&gt;
==Basic Radare Usage==&lt;br /&gt;
&lt;br /&gt;
To be allowed to write files, specify the -w option to radare when opening a file. The w command can be used to write strings, hexpairs (x subcommand), or even assembly opcodes (a subcommand). Examples:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt; w hello world         ; string&lt;br /&gt;
&amp;gt; wx 90 90 90 90        ; hexpairs&lt;br /&gt;
&amp;gt; wa jmp 0x8048140      ; assemble&lt;br /&gt;
&amp;gt; wf inline.bin         ; write contents of file&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Appending a &#039;&#039;&#039;?&#039;&#039;&#039; to a command will show its help message, for example, &#039;&#039;&#039;p?&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
To enter visual mode, press V&amp;lt;enter&amp;gt;. Use q to quit visual mode and return to the prompt. In visual mode you can use HJKL keys to navigate (left, down, up, and right, respectively). You can use these keys in cursor mode toggled by c key. To select a byte range in cursor mode, hold down SHIFT key, and press navigation keys HJKL to mark your selection. While in visual mode, you can also overwrite bytes by pressing i. You can press TAB to switch between the hex (middle) and string (right) columns. Pressing q inside the hex panel returns you to visual mode.&lt;br /&gt;
&lt;br /&gt;
==Basic Visual Debugger Session==&lt;br /&gt;
&lt;br /&gt;
Radare is mostly command line usage debugger with additional possibility to use the most awesome visual memory representation to date. Makes you feel &#039;&#039;&#039;1337&#039;&#039;&#039; real fast.&lt;br /&gt;
A simpler method to use debugger in radare is to switch it to visual mode. That way you will not have to remember many commands nor to keep program state in your mind. To enter visual mode use V:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[0xB7F0C8C0]&amp;gt;&amp;lt;/nowiki&amp;gt; &#039;&#039;&#039;V&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The initial view after entering visual mode is a hexdump view of current target program counter (e.g., EIP for x86). Pressing p will allow you to cycle through the rest of visual mode views. You can press &#039;&#039;&#039;p&#039;&#039;&#039; and &#039;&#039;&#039;P&#039;&#039;&#039; to rotate through the most commonly used print modes. Use &#039;&#039;&#039;F7&#039;&#039;&#039; or s to step into and &#039;&#039;&#039;F8&#039;&#039;&#039; or &#039;&#039;&#039;S&#039;&#039;&#039; to step over current instruction. With the c key you can toggle the cursor mode to mark a byte range selection (for example, to later overwrite them with nop). You can set breakpoints with &#039;&#039;&#039;F2&#039;&#039;&#039; key.&lt;br /&gt;
&lt;br /&gt;
In visual mode you can enter regular radare commands by prepending them with &#039;&#039;&#039;:&#039;&#039;&#039;. For example, to dump a one block of memory contents at &#039;&#039;&#039;ESI: x @ esi&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To get help on visual mode, press &#039;&#039;&#039;?&#039;&#039;&#039;. To scroll help screen, use arrows. To exit help view, press &#039;&#039;&#039;q&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
A frequently used command is &#039;&#039;&#039;dr&#039;&#039;&#039;, to read or write values of target&#039;s general purpose registers. You can also manipulate the hardware and extended/floating point registers.&lt;br /&gt;
&lt;br /&gt;
==Challenge==&lt;br /&gt;
&lt;br /&gt;
Use Radare2 to find out this programs function and crack it.&lt;br /&gt;
&lt;br /&gt;
https://1drv.ms/u/s!APP7wJujw7BWrR0&lt;br /&gt;
&lt;br /&gt;
Information to find out:&lt;br /&gt;
-Endian info&lt;br /&gt;
-Interpeter&lt;br /&gt;
-Arhitecture&lt;br /&gt;
-What system calls are made ?&lt;br /&gt;
Finally, crack the executable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hints:&lt;br /&gt;
PEheader&lt;br /&gt;
r2 automated analysis&lt;br /&gt;
r2 visual modes&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[1] http://rada.re/r/&lt;br /&gt;
[2] https://en.wikipedia.org/wiki/Radare2#Supported_architectures.2Fformats&lt;br /&gt;
[3] https://github.com/radare/radare2/wiki/Implementing-a-new-architecture&lt;br /&gt;
[4] https://github.com/radare/radare2/wiki/Implementing-a-new-analysis-plugin&lt;br /&gt;
[5] http://solidsec.blogspot.de/2015/09/reversing-elf-binaries-remote-debugging.html&amp;lt;/nowiki&amp;gt;&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105048</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105048"/>
		<updated>2016-08-25T00:17:45Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Radare&#039;&#039;&#039; &amp;lt;nowiki&amp;gt;[1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Radare2.jpg]]&lt;br /&gt;
The framework is essentially composed by 7 executables:&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Radare2&#039;&#039;&#039;&lt;br /&gt;
It is the core of of the hexadecimal editor and debugger. It allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on.&lt;br /&gt;
&lt;br /&gt;
Radare2 implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, visualizing. It can be scripted with a variety of languages, including Ruby, Python, Lua, and Perl.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rabin2&#039;&#039;&#039;&lt;br /&gt;
It allows you to extract information from executable binaries, such as ELF, PE, Java CLASS, and Mach-O. rabin2 is used by the core to get exported symbols, imports, file information, cross references (xrefs), library dependencies, sections, etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rasm2&#039;&#039;&#039;&lt;br /&gt;
It is a command line assembler and disassembler for multiple architectures (including Intel x86 and x86-64, MIPS, ARM, PowerPC, Java, and MSIL).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rahash2&#039;&#039;&#039;&lt;br /&gt;
An implementation of a block-based hash tool. From small text strings to large disks, rahash2 supports multiple algorithms, including MD4, MD5, CRC16, CRC32, SHA1, SHA256, SHA384, SHA512, par, xor, xorpair, mod255, hamdist, or entropy. rahash2 can be used to check the integrity of, or track changes to, big files, memory dumps, and disks.&lt;br /&gt;
&lt;br /&gt;
Radiff2&lt;br /&gt;
It is a binary diffing utility that implements multiple algorithms. It supports byte-level or delta diffing for binary files, and code-analysis diffing to find changes in basic code blocks obtained from the radare code analysis, or from the IDA analysis using the rsc idc2rdb script.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rafind2&#039;&#039;&#039;&lt;br /&gt;
It is a program that allows you to find byte patterns in files.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ragg2&#039;&#039;&#039;&lt;br /&gt;
A frontend for r_egg. ragg2 compiles programs written in a simple high-level language into tiny binaries for x86, x86-64, and ARM.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rarun2&#039;&#039;&#039;&lt;br /&gt;
A launcher for running programs within different environments, with different arguments, permissions, directories, and overridden default file descriptors.&lt;br /&gt;
&lt;br /&gt;
Rarun2 is useful for:&lt;br /&gt;
&lt;br /&gt;
    Crackmes&lt;br /&gt;
    Fuzzing&lt;br /&gt;
    Test suites&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rax2&#039;&#039;&#039;&lt;br /&gt;
A minimalistic mathematical expression evaluator for the shell that is useful for making base conversions between floating point values, hexadecimal representations, hexpair strings to ASCII, octal to integer, etc. It also supports endianness settings and can be used as an interactive shell if no arguments are given.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting radare2==&lt;br /&gt;
&lt;br /&gt;
You can get radare from the website, http://radare.org/, or the GitHub repository, https://github.com/radare/radare2.&lt;br /&gt;
&lt;br /&gt;
Binary packages are available for a number of operating systems (Ubuntu, Maemo, Gentoo, Windows, iPhone, and so on). Yet, you are highly encouraged to get the source and compile it yourself to better understand the dependencies, to make examples more accessible and of course to have the most recent version.&lt;br /&gt;
&lt;br /&gt;
A new stable release is typically published every month. Nightly tarballs are sometimes available at http://bin.rada.re/.&lt;br /&gt;
&lt;br /&gt;
The radare development repository is often more stable than the &#039;stable&#039; releases. To obtain the latest version:&lt;br /&gt;
&lt;br /&gt;
$ git clone https://github.com/radare/radare2.git&lt;br /&gt;
&lt;br /&gt;
==Install==&lt;br /&gt;
&lt;br /&gt;
The easiest way to install radare2 from git is by running the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;$ sys/install.sh&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you want to install radare2 in the home directory without using root privileges and sudo, simply run:&lt;br /&gt;
&lt;br /&gt;
--[[User:Itaal|itaal]] ([[User talk:Itaal|talk]]) 03:17, 25 August 2016 (EEST)$ sys/user.sh&lt;br /&gt;
&lt;br /&gt;
==Basic Radare Usage==&lt;br /&gt;
&lt;br /&gt;
To be allowed to write files, specify the -w option to radare when opening a file. The w command can be used to write strings, hexpairs (x subcommand), or even assembly opcodes (a subcommand). Examples:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt; w hello world         ; string&lt;br /&gt;
&amp;gt; wx 90 90 90 90        ; hexpairs&lt;br /&gt;
&amp;gt; wa jmp 0x8048140      ; assemble&lt;br /&gt;
&amp;gt; wf inline.bin         ; write contents of file&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Appending a &#039;&#039;&#039;?&#039;&#039;&#039; to a command will show its help message, for example, &#039;&#039;&#039;p?&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
To enter visual mode, press V&amp;lt;enter&amp;gt;. Use q to quit visual mode and return to the prompt. In visual mode you can use HJKL keys to navigate (left, down, up, and right, respectively). You can use these keys in cursor mode toggled by c key. To select a byte range in cursor mode, hold down SHIFT key, and press navigation keys HJKL to mark your selection. While in visual mode, you can also overwrite bytes by pressing i. You can press TAB to switch between the hex (middle) and string (right) columns. Pressing q inside the hex panel returns you to visual mode.&lt;br /&gt;
&lt;br /&gt;
==Basic Visual Debugger Session==&lt;br /&gt;
&lt;br /&gt;
Radare is mostly command line usage debugger with additional possibility to use the most awesome visual memory representation to date. Makes you feel &#039;&#039;&#039;1337&#039;&#039;&#039; real fast.&lt;br /&gt;
A simpler method to use debugger in radare is to switch it to visual mode. That way you will not have to remember many commands nor to keep program state in your mind. To enter visual mode use V:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[0xB7F0C8C0]&amp;gt;&amp;lt;/nowiki&amp;gt; &#039;&#039;&#039;V&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The initial view after entering visual mode is a hexdump view of current target program counter (e.g., EIP for x86). Pressing p will allow you to cycle through the rest of visual mode views. You can press &#039;&#039;&#039;p&#039;&#039;&#039; and &#039;&#039;&#039;P&#039;&#039;&#039; to rotate through the most commonly used print modes. Use &#039;&#039;&#039;F7&#039;&#039;&#039; or s to step into and &#039;&#039;&#039;F8&#039;&#039;&#039; or &#039;&#039;&#039;S&#039;&#039;&#039; to step over current instruction. With the c key you can toggle the cursor mode to mark a byte range selection (for example, to later overwrite them with nop). You can set breakpoints with &#039;&#039;&#039;F2&#039;&#039;&#039; key.&lt;br /&gt;
&lt;br /&gt;
In visual mode you can enter regular radare commands by prepending them with &#039;&#039;&#039;:&#039;&#039;&#039;. For example, to dump a one block of memory contents at &#039;&#039;&#039;ESI: x @ esi&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To get help on visual mode, press &#039;&#039;&#039;?&#039;&#039;&#039;. To scroll help screen, use arrows. To exit help view, press &#039;&#039;&#039;q&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
A frequently used command is &#039;&#039;&#039;dr&#039;&#039;&#039;, to read or write values of target&#039;s general purpose registers. You can also manipulate the hardware and extended/floating point registers.&lt;br /&gt;
&lt;br /&gt;
==Challenge==&lt;br /&gt;
&lt;br /&gt;
Use Radare2 to find out this programs function and crack it.&lt;br /&gt;
&lt;br /&gt;
https://1drv.ms/u/s!APP7wJujw7BWrR0&lt;br /&gt;
&lt;br /&gt;
Information to find out:&lt;br /&gt;
-Endian info&lt;br /&gt;
-Interpeter&lt;br /&gt;
-Arhitecture&lt;br /&gt;
-What system calls are made ?&lt;br /&gt;
Finally, crack the executable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hints:&lt;br /&gt;
PEheader&lt;br /&gt;
r2 automated analysis&lt;br /&gt;
r2 visual modes&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[1] http://rada.re/r/&lt;br /&gt;
[2] https://en.wikipedia.org/wiki/Radare2#Supported_architectures.2Fformats&lt;br /&gt;
[3] https://github.com/radare/radare2/wiki/Implementing-a-new-architecture&lt;br /&gt;
[4] https://github.com/radare/radare2/wiki/Implementing-a-new-analysis-plugin&lt;br /&gt;
[5] http://solidsec.blogspot.de/2015/09/reversing-elf-binaries-remote-debugging.html&amp;lt;/nowiki&amp;gt;&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:Radare2.jpg&amp;diff=105047</id>
		<title>File:Radare2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:Radare2.jpg&amp;diff=105047"/>
		<updated>2016-08-25T00:09:03Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105046</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105046"/>
		<updated>2016-08-24T21:36:51Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
Radare2&lt;br /&gt;
It is the core of of the hexadecimal editor and debugger. It allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on.&lt;br /&gt;
&lt;br /&gt;
Radare2 implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, visualizing. It can be scripted with a variety of languages, including Ruby, Python, Lua, and Perl.&lt;br /&gt;
&lt;br /&gt;
Rabin2&lt;br /&gt;
It allows you to extract information from executable binaries, such as ELF, PE, Java CLASS, and Mach-O. rabin2 is used by the core to get exported symbols, imports, file information, cross references (xrefs), library dependencies, sections, etc.&lt;br /&gt;
&lt;br /&gt;
Rasm2&lt;br /&gt;
It is a command line assembler and disassembler for multiple architectures (including Intel x86 and x86-64, MIPS, ARM, PowerPC, Java, and MSIL).&lt;br /&gt;
&lt;br /&gt;
Rahash2&lt;br /&gt;
An implementation of a block-based hash tool. From small text strings to large disks, rahash2 supports multiple algorithms, including MD4, MD5, CRC16, CRC32, SHA1, SHA256, SHA384, SHA512, par, xor, xorpair, mod255, hamdist, or entropy. rahash2 can be used to check the integrity of, or track changes to, big files, memory dumps, and disks.&lt;br /&gt;
&lt;br /&gt;
Radiff2&lt;br /&gt;
It is a binary diffing utility that implements multiple algorithms. It supports byte-level or delta diffing for binary files, and code-analysis diffing to find changes in basic code blocks obtained from the radare code analysis, or from the IDA analysis using the rsc idc2rdb script.&lt;br /&gt;
&lt;br /&gt;
Rafind2&lt;br /&gt;
It is a program that allows you to find byte patterns in files.&lt;br /&gt;
&lt;br /&gt;
Ragg2&lt;br /&gt;
A frontend for r_egg. ragg2 compiles programs written in a simple high-level language into tiny binaries for x86, x86-64, and ARM.&lt;br /&gt;
&lt;br /&gt;
Rarun2&lt;br /&gt;
A launcher for running programs within different environments, with different arguments, permissions, directories, and overridden default file descriptors.&lt;br /&gt;
&lt;br /&gt;
Rarun2 is useful for:&lt;br /&gt;
&lt;br /&gt;
    Crackmes&lt;br /&gt;
    Fuzzing&lt;br /&gt;
    Test suites&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Rax2&lt;br /&gt;
A minimalistic mathematical expression evaluator for the shell that is useful for making base conversions between floating point values, hexadecimal representations, hexpair strings to ASCII, octal to integer, etc. It also supports endianness settings and can be used as an interactive shell if no arguments are given.&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://radare.org/&lt;br /&gt;
[2] https://en.wikipedia.org/wiki/Radare2#Supported_architectures.2Fformats&lt;br /&gt;
[3] https://github.com/radare/radare2/wiki/Implementing-a-new-architecture&lt;br /&gt;
[4] https://github.com/radare/radare2/wiki/Implementing-a-new-analysis-plugin&lt;br /&gt;
[5] http://solidsec.blogspot.de/2015/09/reversing-elf-binaries-remote-debugging.html&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105045</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105045"/>
		<updated>2016-08-24T21:35:25Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
Radare2&lt;br /&gt;
It is the core of of the hexadecimal editor and debugger. It allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on.&lt;br /&gt;
&lt;br /&gt;
Radare2 implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, visualizing. It can be scripted with a variety of languages, including Ruby, Python, Lua, and Perl.&lt;br /&gt;
&lt;br /&gt;
Rabin2&lt;br /&gt;
It allows you to extract information from executable binaries, such as ELF, PE, Java CLASS, and Mach-O. rabin2 is used by the core to get exported symbols, imports, file information, cross references (xrefs), library dependencies, sections, etc.&lt;br /&gt;
&lt;br /&gt;
Rasm2&lt;br /&gt;
It is a command line assembler and disassembler for multiple architectures (including Intel x86 and x86-64, MIPS, ARM, PowerPC, Java, and MSIL).&lt;br /&gt;
&lt;br /&gt;
Rahash2&lt;br /&gt;
An implementation of a block-based hash tool. From small text strings to large disks, rahash2 supports multiple algorithms, including MD4, MD5, CRC16, CRC32, SHA1, SHA256, SHA384, SHA512, par, xor, xorpair, mod255, hamdist, or entropy. rahash2 can be used to check the integrity of, or track changes to, big files, memory dumps, and disks.&lt;br /&gt;
&lt;br /&gt;
Radiff2&lt;br /&gt;
It is a binary diffing utility that implements multiple algorithms. It supports byte-level or delta diffing for binary files, and code-analysis diffing to find changes in basic code blocks obtained from the radare code analysis, or from the IDA analysis using the rsc idc2rdb script.&lt;br /&gt;
&lt;br /&gt;
Rafind2&lt;br /&gt;
It is a program that allows you to find byte patterns in files.&lt;br /&gt;
&lt;br /&gt;
Ragg2&lt;br /&gt;
A frontend for r_egg. ragg2 compiles programs written in a simple high-level language into tiny binaries for x86, x86-64, and ARM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Radare2 - The Reverse Engineering Framework (Tool For Hackers)&lt;br /&gt;
9:33 AM HackingTools , SecurityTools&lt;br /&gt;
Radare2&lt;br /&gt;
&lt;br /&gt;
Radare2 is a portable framework for reverse engineering and analyzing binaries. It is actually a rewrite from the scratch of radare -- a forensics tool.&lt;br /&gt;
&lt;br /&gt;
(Download link is at the end of this article)&lt;br /&gt;
&lt;br /&gt;
It consists of the following command-line utilities:&lt;br /&gt;
&lt;br /&gt;
    radare2&lt;br /&gt;
&lt;br /&gt;
    rabin2&lt;br /&gt;
&lt;br /&gt;
    rasm2&lt;br /&gt;
&lt;br /&gt;
    rahash2&lt;br /&gt;
&lt;br /&gt;
    radiff2&lt;br /&gt;
&lt;br /&gt;
    rafind2&lt;br /&gt;
&lt;br /&gt;
    ragg2&lt;br /&gt;
&lt;br /&gt;
    rarun2&lt;br /&gt;
&lt;br /&gt;
    rax2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Radare2&lt;br /&gt;
It is the core of of the hexadecimal editor and debugger. It allows you to open a number of input/output sources as if they were simple, plain files, including disks, network connections, kernel drivers, processes under debugging, and so on.&lt;br /&gt;
&lt;br /&gt;
Radare2 implements an advanced command line interface for moving around a file, analyzing data, disassembling, binary patching, data comparison, searching, replacing, visualizing. It can be scripted with a variety of languages, including Ruby, Python, Lua, and Perl.&lt;br /&gt;
&lt;br /&gt;
Rabin2&lt;br /&gt;
It allows you to extract information from executable binaries, such as ELF, PE, Java CLASS, and Mach-O. rabin2 is used by the core to get exported symbols, imports, file information, cross references (xrefs), library dependencies, sections, etc.&lt;br /&gt;
&lt;br /&gt;
Rasm2&lt;br /&gt;
It is a command line assembler and disassembler for multiple architectures (including Intel x86 and x86-64, MIPS, ARM, PowerPC, Java, and MSIL).&lt;br /&gt;
&lt;br /&gt;
Rahash2&lt;br /&gt;
An implementation of a block-based hash tool. From small text strings to large disks, rahash2 supports multiple algorithms, including MD4, MD5, CRC16, CRC32, SHA1, SHA256, SHA384, SHA512, par, xor, xorpair, mod255, hamdist, or entropy. rahash2 can be used to check the integrity of, or track changes to, big files, memory dumps, and disks.&lt;br /&gt;
&lt;br /&gt;
Radiff2&lt;br /&gt;
It is a binary diffing utility that implements multiple algorithms. It supports byte-level or delta diffing for binary files, and code-analysis diffing to find changes in basic code blocks obtained from the radare code analysis, or from the IDA analysis using the rsc idc2rdb script.&lt;br /&gt;
&lt;br /&gt;
Rafind2&lt;br /&gt;
It is a program that allows you to find byte patterns in files.&lt;br /&gt;
&lt;br /&gt;
Ragg2&lt;br /&gt;
A frontend for r_egg. ragg2 compiles programs written in a simple high-level language into tiny binaries for x86, x86-64, and ARM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Rarun2&lt;br /&gt;
A launcher for running programs within different environments, with different arguments, permissions, directories, and overridden default file descriptors.&lt;br /&gt;
&lt;br /&gt;
Rarun2 is useful for:&lt;br /&gt;
&lt;br /&gt;
    Crackmes&lt;br /&gt;
    Fuzzing&lt;br /&gt;
    Test suites&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Rax2&lt;br /&gt;
A minimalistic mathematical expression evaluator for the shell that is useful for making base conversions between floating point values, hexadecimal representations, hexpair strings to ASCII, octal to integer, etc. It also supports endianness settings and can be used as an interactive shell if no arguments are given.&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://radare.org/&lt;br /&gt;
[2] https://en.wikipedia.org/wiki/Radare2#Supported_architectures.2Fformats&lt;br /&gt;
[3] https://github.com/radare/radare2/wiki/Implementing-a-new-architecture&lt;br /&gt;
[4] https://github.com/radare/radare2/wiki/Implementing-a-new-analysis-plugin&lt;br /&gt;
[5] http://solidsec.blogspot.de/2015/09/reversing-elf-binaries-remote-debugging.html&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105044</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105044"/>
		<updated>2016-08-24T21:29:51Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
&lt;br /&gt;
    rax - responsible for converting numbers (e.g. string to hexadecimal, decimal to hexadecimal etc);&lt;br /&gt;
    rahash - block based hashing utility; &lt;br /&gt;
    rabin - responsible for extracting information about binaries;&lt;br /&gt;
    rasm - assembly and disassembly from the shell;&lt;br /&gt;
    rafind - binary file search and edit tool;&lt;br /&gt;
    radiff - responsible for differential analysis. Very useful for analyzing patches;&lt;br /&gt;
    radare2 - main executable which combines all above mentioned binaries.&lt;br /&gt;
==References==&lt;br /&gt;
[1] http://radare.org/&lt;br /&gt;
[2] https://en.wikipedia.org/wiki/Radare2#Supported_architectures.2Fformats&lt;br /&gt;
[3] https://github.com/radare/radare2/wiki/Implementing-a-new-architecture&lt;br /&gt;
[4] https://github.com/radare/radare2/wiki/Implementing-a-new-analysis-plugin&lt;br /&gt;
[5] http://solidsec.blogspot.de/2015/09/reversing-elf-binaries-remote-debugging.html&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105043</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105043"/>
		<updated>2016-08-24T21:25:29Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2].&lt;br /&gt;
As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows.&lt;br /&gt;
Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo.&lt;br /&gt;
&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
&lt;br /&gt;
    rax - responsible for converting numbers (e.g. string to hexadecimal, decimal to hexadecimal etc);&lt;br /&gt;
    rahash - block based hashing utility; &lt;br /&gt;
    rabin - responsible for extracting information about binaries;&lt;br /&gt;
    rasm - assembly and disassembly from the shell;&lt;br /&gt;
    rafind - binary file search and edit tool;&lt;br /&gt;
    radiff - responsible for differential analysis. Very useful for analyzing patches;&lt;br /&gt;
    radare2 - main executable which combines all above mentioned binaries.&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105042</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105042"/>
		<updated>2016-08-24T21:24:16Z</updated>

		<summary type="html">&lt;p&gt;Itaal: /* = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2]. As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows. Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo. Figure 01 presents the main command line interface for Radare. &lt;br /&gt;
&lt;br /&gt;
==&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
==&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
&lt;br /&gt;
    rax - responsible for converting numbers (e.g. string to hexadecimal, decimal to hexadecimal etc);&lt;br /&gt;
    rahash - block based hashing utility; &lt;br /&gt;
    rabin - responsible for extracting information about binaries;&lt;br /&gt;
    rasm - assembly and disassembly from the shell;&lt;br /&gt;
    rafind - binary file search and edit tool;&lt;br /&gt;
    radiff - responsible for differential analysis. Very useful for analyzing patches;&lt;br /&gt;
    radare2 - main executable which combines all above mentioned binaries.&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105041</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105041"/>
		<updated>2016-08-24T21:23:40Z</updated>

		<summary type="html">&lt;p&gt;Itaal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2]. As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows. Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo. Figure 01 presents the main command line interface for Radare. &lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
This post aims to presenting a comparison between reverse engineering features from IDA pro [6] and Radare 2. We are going to discourse in which situation it is more appropriate to use each tool. This article can be used as a condensed user guide for Radare (a complete guide is available online [7]). This post can be used also as a reference guide once the above mentioned official guide is outdated and most examples do not work with the most recent version of Radare any longer. In this small tutorial we show the main functionalities of Radare in practice by solving a small &amp;quot;crack me&amp;quot; challenge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first comparison point is in case the analyst is more comfortable with command line interfaces and quick scripting features. Radare is very customizable and allow scripting characteristics and &amp;quot;piping&amp;quot; outputs to default Unix executables, such as: &amp;quot;wc&amp;quot;, &amp;quot;more&amp;quot;, &amp;quot;less&amp;quot; etc.  This feature will be discoursed in more details in future. &lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
&lt;br /&gt;
    rax - responsible for converting numbers (e.g. string to hexadecimal, decimal to hexadecimal etc);&lt;br /&gt;
    rahash - block based hashing utility; &lt;br /&gt;
    rabin - responsible for extracting information about binaries;&lt;br /&gt;
    rasm - assembly and disassembly from the shell;&lt;br /&gt;
    rafind - binary file search and edit tool;&lt;br /&gt;
    radiff - responsible for differential analysis. Very useful for analyzing patches;&lt;br /&gt;
    radare2 - main executable which combines all above mentioned binaries.&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105040</id>
		<title>Radare2</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Radare2&amp;diff=105040"/>
		<updated>2016-08-24T21:22:30Z</updated>

		<summary type="html">&lt;p&gt;Itaal: Created page with &amp;quot; Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2]...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Radare [1] is an open source and multi-platform framework for Reverse Engineering activities which supports assembly and disassembly many architectures and binary formats [2]. As any other reversing framework, Radare framework aims to recognize high level features on machine code, such as: data structures, functions and execution flows. Radare has buildings for the most populars Operating Systems, such as: Microsoft Windows, Mac OS X, Linux, BSD, iPhone OS, Solaris and MeeGo. Figure 01 presents the main command line interface for Radare. &lt;br /&gt;
&lt;br /&gt;
Figure 01: Radare command line interface&lt;br /&gt;
Radare offers few options of interactive graphical interfaces, such as: Web, GTK (Python) and ASCII-Art graph. Another very useful characteristic due to its designing is the capacity to easily implement new architectures, binary formats and analyses [3][4]. Radare provides an open API and with many bindings for many  programming languages, such as: Python, Java, Ruby, Go and Perl. Radare is also integrated with the most popular debuggers supporting local and remote debugging [5], such as: gdb, rap, webui, r2pipe, winedbg and windbg.&lt;br /&gt;
&lt;br /&gt;
This post aims to presenting a comparison between reverse engineering features from IDA pro [6] and Radare 2. We are going to discourse in which situation it is more appropriate to use each tool. This article can be used as a condensed user guide for Radare (a complete guide is available online [7]). This post can be used also as a reference guide once the above mentioned official guide is outdated and most examples do not work with the most recent version of Radare any longer. In this small tutorial we show the main functionalities of Radare in practice by solving a small &amp;quot;crack me&amp;quot; challenge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first comparison point is in case the analyst is more comfortable with command line interfaces and quick scripting features. Radare is very customizable and allow scripting characteristics and &amp;quot;piping&amp;quot; outputs to default Unix executables, such as: &amp;quot;wc&amp;quot;, &amp;quot;more&amp;quot;, &amp;quot;less&amp;quot; etc.  This feature will be discoursed in more details in future. &lt;br /&gt;
&lt;br /&gt;
The framework is essentially composed by 7 executables: &lt;br /&gt;
&lt;br /&gt;
    rax - responsible for converting numbers (e.g. string to hexadecimal, decimal to hexadecimal etc);&lt;br /&gt;
    rahash - block based hashing utility; &lt;br /&gt;
    rabin - responsible for extracting information about binaries;&lt;br /&gt;
    rasm - assembly and disassembly from the shell;&lt;br /&gt;
    rafind - binary file search and edit tool;&lt;br /&gt;
    radiff - responsible for differential analysis. Very useful for analyzing patches;&lt;br /&gt;
    radare2 - main executable which combines all above mentioned binaries.&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105039</id>
		<title>Operating systems</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105039"/>
		<updated>2016-08-24T21:11:44Z</updated>

		<summary type="html">&lt;p&gt;Itaal: /* Wiki article information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Operating systems subject related info=&lt;br /&gt;
&lt;br /&gt;
Lecturer: &lt;br /&gt;
&lt;br /&gt;
Katrin Loodus (katrin.loodus@itcollege.ee) &lt;br /&gt;
&lt;br /&gt;
Room 516 (5th floor), phone (6285) 834&lt;br /&gt;
&lt;br /&gt;
All subject related infotmation will be put up on Wiki page, due to the possibility to have access to the materials even after the subject has concluded. Materials, such as tests, lectures and links to additional materials, will remain available throughout the subject teaching period. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Aim of this course=&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to introduce the basics of operating systems and IT system life cycle from the viewpoint of the IT system administrator of operating systems. This subject provides hands-on skills needed to complete other field specific subjects in the curriculum.&lt;br /&gt;
&lt;br /&gt;
Lectures give a theoretical background and the labs give hands-on skills on the same topic using Ubuntu Linux Server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This subject is oriented on hands-on practical assignments to compliment the theoretical side of the subject.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Learning outcome 1: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject is able to perform the most common administrative tasks (user management, software management, disk usage, process management) in at least one of the most popular operating system on a server.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 2: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject understands and is able to explain orally the basic concepts of operating systems and its security aspects.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 3: &lt;br /&gt;
&lt;br /&gt;
The student is able to document an operating system&#039;s service from an IT systems administrator&#039;s viewpoint.&lt;br /&gt;
&lt;br /&gt;
=Deadlines for assignments 2016=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;03.04.2016&#039;&#039;&#039; - Submission of wiki article&#039;s topic (Sending an e-mail with the chosen topic is mandatory!)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;08.05.2016 23:59&#039;&#039;&#039; - Submission of wiki article and sending an e-mail to the lecturer in order to get it graded&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;10.05.2016&#039;&#039;&#039; - Pre practical test for students, who have done all of their labs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;23.05.2016&#039;&#039;&#039; - Last option to defend lab work (Lab1 and/or Lab2)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;24.05.2016&#039;&#039;&#039; - Practical test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;09.06.2016 at 09:00&#039;&#039;&#039; - Both practical and oral exams are in room 319&lt;br /&gt;
&lt;br /&gt;
All dates are inclusive.&lt;br /&gt;
&lt;br /&gt;
=(Occasional) Homework=&lt;br /&gt;
&lt;br /&gt;
==Week 0 &amp;amp; 1==&lt;br /&gt;
&lt;br /&gt;
Get familiar with the Unix command line by trying out this Codeacadamy [https://www.codecademy.com/learn/learn-the-command-line short course].&lt;br /&gt;
&lt;br /&gt;
==Week 11==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
This homework is voluntary! &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please test these online courses (especially user management) in https://rangeforce.com environment and send the lecturer feedback you feel you would like to share. It can be about the content, the environment, spelling, storyline etc. &lt;br /&gt;
&lt;br /&gt;
The promo code to get access to the courses is &#039;&#039;&#039;EIK2016&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please send the feedback to my e-mail address: &#039;&#039;&#039;kloodus@itcollege.ee&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
==Reading materials==&lt;br /&gt;
&lt;br /&gt;
[http://www.tecmint.com/10-useful-free-linux-ebooks-for-newbies-and-administrators/ 10 Free Linux Administration e-books]&lt;br /&gt;
&lt;br /&gt;
=Timetable for lectures 2016=&lt;br /&gt;
&lt;br /&gt;
Public chat for any subject related questions that were left unasked during the lecture: https://chatlink.com/#osadmin_ITKolledz&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
Link to lecture and lab captures:&amp;lt;/span&amp;gt; [https://echo360.e-ope.ee/ess/portal/section/d38715c3-2cc6-43ee-bc1c-818df79d0b41 Go to captures]&lt;br /&gt;
&lt;br /&gt;
==Lecture 0==&lt;br /&gt;
February 09th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.odp Lecture 0 - Introduction to subject (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~kloodus/opsys/test_answers_spring2016.txt Test answers].&lt;br /&gt;
&lt;br /&gt;
==Lecture 1==&lt;br /&gt;
&lt;br /&gt;
February 12th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.odp Lecture 1 - Operating systems introduction (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
* Lecture will be on the February 12th at 8:15 in room 219&lt;br /&gt;
&lt;br /&gt;
* Practice will be on the same day at 10:00 in room 410&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; Homereading materials:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/playlist?list=PLmbPuZ0NsyGS8ef6zaHd2qYylzsHxL63x Introduction to operating systems (videos)]&lt;br /&gt;
&lt;br /&gt;
[https://en.wikipedia.org/wiki/Operating_system Operating systems (wikipedia article)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 2==&lt;br /&gt;
&lt;br /&gt;
February 16th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.odp Lecture 2 - User management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
==Lecture 3==&lt;br /&gt;
&lt;br /&gt;
February 23rd 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.odp Lecture 3 - File permissions (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 4==&lt;br /&gt;
March 1st 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.odp Lecture 4 - User environment and processes (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 5==&lt;br /&gt;
&lt;br /&gt;
March 8th 2016 Lecture 5 - [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.odp Filesystem Hierarchy (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 6==&lt;br /&gt;
&lt;br /&gt;
March 15th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.odp Lecture 6 - Software management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 7==&lt;br /&gt;
&lt;br /&gt;
March 22nd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.odp Lecture 7 - Documentation (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 8==&lt;br /&gt;
&lt;br /&gt;
April 5th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.odp Lecture 8 - Security session (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 9==&lt;br /&gt;
&lt;br /&gt;
April 12th 2016 - No lecture nor labs - Lecturer is away &lt;br /&gt;
&lt;br /&gt;
Substitute lecture and lab time will be announced later&lt;br /&gt;
&lt;br /&gt;
==Lecture 10==&lt;br /&gt;
&lt;br /&gt;
April 19th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.odp Lecture 10 - Disks, partitions and swap area (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 11==&lt;br /&gt;
&lt;br /&gt;
April 26th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.odp Lecture 11 - RAID; LVM, SAN and NAS technologies (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 12==&lt;br /&gt;
May 3rd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.odp Lecture 12 - DAS, SAN, NAS and CAS (group work) technologies (cont.) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
[[http://www.slideshare.net/pranayakumar1986/network-storage Additional reading materials]]&lt;br /&gt;
&lt;br /&gt;
==Lecture 13==&lt;br /&gt;
&lt;br /&gt;
May 10th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.odp Lecture 13 - Backup and recovery (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 14 and Lecture 9==&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;17th&#039;&#039;&#039; 2016 - Lecture 14 - Miscellaneous topics (will be held in a computer class 319)&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;19th 2016 at 10:00 in room 320&#039;&#039;&#039; - [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.odp Lecture 9 - Monitoring (substitute lecture) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 15==&lt;br /&gt;
May 24th 2016 - Lecture 15 - working in IT - merits and demerits &lt;br /&gt;
&lt;br /&gt;
We will not have a lecture in the ordinary sense, instead we&#039;ll have a seminar or discussion on important aspects of working in IT. The ethical, social and personal aspects of it. Terms like &amp;quot;imposter syndrome&amp;quot;, burnout, teamwork and better work environment will be some of the topics covered. Life is not only technical competence, it&#039;s a lot about human interaction as well.&lt;br /&gt;
&lt;br /&gt;
=Lab works=&lt;br /&gt;
&lt;br /&gt;
==Lab 0==&lt;br /&gt;
&lt;br /&gt;
Installing Ubuntu Server 14.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Introduction to Unix command line&#039;&#039;&#039; (cd, ls, cat, full path, relative path etc)&lt;br /&gt;
&lt;br /&gt;
==Lab 1== &lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing users&#039;&#039;&#039; (adduser, addgroup, passwd, /etc/passwd, /etc/shadow)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a user noodle&lt;br /&gt;
&lt;br /&gt;
2) Add a new group food and add a the user noodle to a group called food.&lt;br /&gt;
&lt;br /&gt;
3) Divert the user noodle&#039;s password hash via cowsay to a file called cownoodle.txt.&lt;br /&gt;
&lt;br /&gt;
4) Lock the user noodle and be ready to show me the indication of the user being locked. &lt;br /&gt;
&lt;br /&gt;
5) Change the user&#039;s current home directory into /home/unknown so that the files will also be moved to the new location.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 points - &#039;&#039;&#039;Managing files&#039;&#039;&#039; (mkdir, cp, mv, rm, touch, nano, less, chmod, chown, rwx, 644 etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a folder march in root user directory and for every march day a subfolder with a name day1, day2, day3 … day31. (Example: /root/march/day1 or /root/march/day2 etc)&lt;br /&gt;
&lt;br /&gt;
2) Modify the march folder owner so that it will be student and the new group audio.&lt;br /&gt;
&lt;br /&gt;
3) Modify the march folder&#039;s and its subfolders so that the user can do anything, group can do ls in the folder and cd into it and others can&#039;t do anything with it.&lt;br /&gt;
&lt;br /&gt;
4) Create a hard link called network to a file /etc/network/interfaces &lt;br /&gt;
&lt;br /&gt;
5) Copy /var/log directory into march folder so that the timestamp and user info will be preserved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4 points - &#039;&#039;&#039;Processes and environment variables&#039;&#039;&#039; (kill, using directing input/output/error: |, &amp;lt;, &amp;gt;, &amp;gt;&amp;gt;; env, PATH, HOME etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Divert the list with the student user&#039;s groups via cowsay into a fail studgroup.txt.&lt;br /&gt;
&lt;br /&gt;
2) Create a environment variable called MYHOME that has the value of the system&#039;s HOME environment variable. (Hint: you have tu use variable symbol here!)&lt;br /&gt;
&lt;br /&gt;
3) Send 2 htop&#039;s to the background and be ready to present how you send a kill signal to the first htop by job number and term signal to the second htop by a process number. &lt;br /&gt;
&lt;br /&gt;
4) Create an alias called bye that logs you out of the terminal. Make this alias permanent. &lt;br /&gt;
&lt;br /&gt;
5) Execute a programm called espdiff and diver the standardoutput to a file called okay.txt and the standard error to a file called notokay.txt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing software&#039;&#039;&#039; (installation, updating, deleting, apt and dpkg utils)&lt;br /&gt;
&lt;br /&gt;
==Lab 2==&lt;br /&gt;
&lt;br /&gt;
7 points - &lt;br /&gt;
&#039;&#039;&#039;Managing disks by creating partitions&#039;&#039;&#039; (fdisk, mkfs, blkid, mount, umount)&lt;br /&gt;
&lt;br /&gt;
5 points - &lt;br /&gt;
&#039;&#039;&#039;Managing swap&#039;&#039;&#039; (mkswap, swapon, swapoff)&lt;br /&gt;
&lt;br /&gt;
=Practical tests=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1FGZcqmQQDF1l32uPUJ6n8x2Tc4gK8nuxS-C9esgRqaQ/edit?usp=sharing First practical test 10th of May 2016]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ZCqOOMkx0dwP0QXLIK_yk_08a8whfJmQbYR1mAoSh7M/edit Second pracical test 24th of May 2016]&lt;br /&gt;
&lt;br /&gt;
=Exams=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ofiylCw9YAS8_S9YHEc8cZOvEfCfMfs2wDoc44eDyCU/edit?usp=sharing Practical exam]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1gkEDb1g1em9UGhj9n_LIwnhp17gY85U9aPtMfGk56_8/edit# Topics] of the oral exam in Spring 2016&lt;br /&gt;
&lt;br /&gt;
=Wiki article information=&lt;br /&gt;
&lt;br /&gt;
* Choose a topic from personal experience or from topics found on the wiki page&lt;br /&gt;
&lt;br /&gt;
*Send the topic to the lecturer kloodus@itcollege.ee&lt;br /&gt;
&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
&lt;br /&gt;
*Inform the lecturer when the article is finished&lt;br /&gt;
&lt;br /&gt;
*Receive feedback with corrections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bare in mind that this is an open environment, so everything you write in your wiki article, will be public :) &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Helpful tips and requirements what is expected of your wiki article: https://docs.google.com/document/d/1TGmcv4CL0csigtzA_1Ti4Ndvvc6AjNchZwJe2Jc7OQc/edit# &lt;br /&gt;
&lt;br /&gt;
===List of the topics chosen:===&lt;br /&gt;
&lt;br /&gt;
[[User:akerge|Artur Kerge]] is doing an article on [[Irssi]].&lt;br /&gt;
&lt;br /&gt;
[[OpenVPN_Access_Server|OpenVPN Access Server]] by  [[User:aovtsinn|Artur Ovtsinnikov]]&lt;br /&gt;
&lt;br /&gt;
[[Securing_database_with_command_line_linux#Aim_of_this_page| Securing database with command line Linux]] by  [[User:malyhass|Mohanad Aly]]&lt;br /&gt;
&lt;br /&gt;
[[SSH_for_beginners|SSH for beginners]] by [[User:ebarrier|Etienne Barrier]]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Linux_File_Permissions#References| Linux File Permissions] by Sheela Raj&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/User_talk:Lphanvan  Attack A Website by Using Local Method ([[Local Attack]])] by Ender Phan&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Cowsay_English Cowsay] by Meelis Hass&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Sguil Sguil] by Kustas Kurval&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Radare2 Radare 2 - An Open Source alternative to IDA] by Indrek Taal&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105038</id>
		<title>Operating systems</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105038"/>
		<updated>2016-08-24T20:59:43Z</updated>

		<summary type="html">&lt;p&gt;Itaal: /* Wiki article information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Operating systems subject related info=&lt;br /&gt;
&lt;br /&gt;
Lecturer: &lt;br /&gt;
&lt;br /&gt;
Katrin Loodus (katrin.loodus@itcollege.ee) &lt;br /&gt;
&lt;br /&gt;
Room 516 (5th floor), phone (6285) 834&lt;br /&gt;
&lt;br /&gt;
All subject related infotmation will be put up on Wiki page, due to the possibility to have access to the materials even after the subject has concluded. Materials, such as tests, lectures and links to additional materials, will remain available throughout the subject teaching period. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Aim of this course=&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to introduce the basics of operating systems and IT system life cycle from the viewpoint of the IT system administrator of operating systems. This subject provides hands-on skills needed to complete other field specific subjects in the curriculum.&lt;br /&gt;
&lt;br /&gt;
Lectures give a theoretical background and the labs give hands-on skills on the same topic using Ubuntu Linux Server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This subject is oriented on hands-on practical assignments to compliment the theoretical side of the subject.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Learning outcome 1: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject is able to perform the most common administrative tasks (user management, software management, disk usage, process management) in at least one of the most popular operating system on a server.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 2: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject understands and is able to explain orally the basic concepts of operating systems and its security aspects.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 3: &lt;br /&gt;
&lt;br /&gt;
The student is able to document an operating system&#039;s service from an IT systems administrator&#039;s viewpoint.&lt;br /&gt;
&lt;br /&gt;
=Deadlines for assignments 2016=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;03.04.2016&#039;&#039;&#039; - Submission of wiki article&#039;s topic (Sending an e-mail with the chosen topic is mandatory!)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;08.05.2016 23:59&#039;&#039;&#039; - Submission of wiki article and sending an e-mail to the lecturer in order to get it graded&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;10.05.2016&#039;&#039;&#039; - Pre practical test for students, who have done all of their labs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;23.05.2016&#039;&#039;&#039; - Last option to defend lab work (Lab1 and/or Lab2)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;24.05.2016&#039;&#039;&#039; - Practical test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;09.06.2016 at 09:00&#039;&#039;&#039; - Both practical and oral exams are in room 319&lt;br /&gt;
&lt;br /&gt;
All dates are inclusive.&lt;br /&gt;
&lt;br /&gt;
=(Occasional) Homework=&lt;br /&gt;
&lt;br /&gt;
==Week 0 &amp;amp; 1==&lt;br /&gt;
&lt;br /&gt;
Get familiar with the Unix command line by trying out this Codeacadamy [https://www.codecademy.com/learn/learn-the-command-line short course].&lt;br /&gt;
&lt;br /&gt;
==Week 11==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
This homework is voluntary! &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please test these online courses (especially user management) in https://rangeforce.com environment and send the lecturer feedback you feel you would like to share. It can be about the content, the environment, spelling, storyline etc. &lt;br /&gt;
&lt;br /&gt;
The promo code to get access to the courses is &#039;&#039;&#039;EIK2016&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please send the feedback to my e-mail address: &#039;&#039;&#039;kloodus@itcollege.ee&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
==Reading materials==&lt;br /&gt;
&lt;br /&gt;
[http://www.tecmint.com/10-useful-free-linux-ebooks-for-newbies-and-administrators/ 10 Free Linux Administration e-books]&lt;br /&gt;
&lt;br /&gt;
=Timetable for lectures 2016=&lt;br /&gt;
&lt;br /&gt;
Public chat for any subject related questions that were left unasked during the lecture: https://chatlink.com/#osadmin_ITKolledz&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
Link to lecture and lab captures:&amp;lt;/span&amp;gt; [https://echo360.e-ope.ee/ess/portal/section/d38715c3-2cc6-43ee-bc1c-818df79d0b41 Go to captures]&lt;br /&gt;
&lt;br /&gt;
==Lecture 0==&lt;br /&gt;
February 09th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.odp Lecture 0 - Introduction to subject (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~kloodus/opsys/test_answers_spring2016.txt Test answers].&lt;br /&gt;
&lt;br /&gt;
==Lecture 1==&lt;br /&gt;
&lt;br /&gt;
February 12th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.odp Lecture 1 - Operating systems introduction (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
* Lecture will be on the February 12th at 8:15 in room 219&lt;br /&gt;
&lt;br /&gt;
* Practice will be on the same day at 10:00 in room 410&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; Homereading materials:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/playlist?list=PLmbPuZ0NsyGS8ef6zaHd2qYylzsHxL63x Introduction to operating systems (videos)]&lt;br /&gt;
&lt;br /&gt;
[https://en.wikipedia.org/wiki/Operating_system Operating systems (wikipedia article)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 2==&lt;br /&gt;
&lt;br /&gt;
February 16th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.odp Lecture 2 - User management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
==Lecture 3==&lt;br /&gt;
&lt;br /&gt;
February 23rd 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.odp Lecture 3 - File permissions (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 4==&lt;br /&gt;
March 1st 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.odp Lecture 4 - User environment and processes (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 5==&lt;br /&gt;
&lt;br /&gt;
March 8th 2016 Lecture 5 - [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.odp Filesystem Hierarchy (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 6==&lt;br /&gt;
&lt;br /&gt;
March 15th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.odp Lecture 6 - Software management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 7==&lt;br /&gt;
&lt;br /&gt;
March 22nd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.odp Lecture 7 - Documentation (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 8==&lt;br /&gt;
&lt;br /&gt;
April 5th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.odp Lecture 8 - Security session (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 9==&lt;br /&gt;
&lt;br /&gt;
April 12th 2016 - No lecture nor labs - Lecturer is away &lt;br /&gt;
&lt;br /&gt;
Substitute lecture and lab time will be announced later&lt;br /&gt;
&lt;br /&gt;
==Lecture 10==&lt;br /&gt;
&lt;br /&gt;
April 19th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.odp Lecture 10 - Disks, partitions and swap area (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 11==&lt;br /&gt;
&lt;br /&gt;
April 26th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.odp Lecture 11 - RAID; LVM, SAN and NAS technologies (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 12==&lt;br /&gt;
May 3rd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.odp Lecture 12 - DAS, SAN, NAS and CAS (group work) technologies (cont.) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
[[http://www.slideshare.net/pranayakumar1986/network-storage Additional reading materials]]&lt;br /&gt;
&lt;br /&gt;
==Lecture 13==&lt;br /&gt;
&lt;br /&gt;
May 10th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.odp Lecture 13 - Backup and recovery (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 14 and Lecture 9==&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;17th&#039;&#039;&#039; 2016 - Lecture 14 - Miscellaneous topics (will be held in a computer class 319)&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;19th 2016 at 10:00 in room 320&#039;&#039;&#039; - [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.odp Lecture 9 - Monitoring (substitute lecture) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 15==&lt;br /&gt;
May 24th 2016 - Lecture 15 - working in IT - merits and demerits &lt;br /&gt;
&lt;br /&gt;
We will not have a lecture in the ordinary sense, instead we&#039;ll have a seminar or discussion on important aspects of working in IT. The ethical, social and personal aspects of it. Terms like &amp;quot;imposter syndrome&amp;quot;, burnout, teamwork and better work environment will be some of the topics covered. Life is not only technical competence, it&#039;s a lot about human interaction as well.&lt;br /&gt;
&lt;br /&gt;
=Lab works=&lt;br /&gt;
&lt;br /&gt;
==Lab 0==&lt;br /&gt;
&lt;br /&gt;
Installing Ubuntu Server 14.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Introduction to Unix command line&#039;&#039;&#039; (cd, ls, cat, full path, relative path etc)&lt;br /&gt;
&lt;br /&gt;
==Lab 1== &lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing users&#039;&#039;&#039; (adduser, addgroup, passwd, /etc/passwd, /etc/shadow)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a user noodle&lt;br /&gt;
&lt;br /&gt;
2) Add a new group food and add a the user noodle to a group called food.&lt;br /&gt;
&lt;br /&gt;
3) Divert the user noodle&#039;s password hash via cowsay to a file called cownoodle.txt.&lt;br /&gt;
&lt;br /&gt;
4) Lock the user noodle and be ready to show me the indication of the user being locked. &lt;br /&gt;
&lt;br /&gt;
5) Change the user&#039;s current home directory into /home/unknown so that the files will also be moved to the new location.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 points - &#039;&#039;&#039;Managing files&#039;&#039;&#039; (mkdir, cp, mv, rm, touch, nano, less, chmod, chown, rwx, 644 etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a folder march in root user directory and for every march day a subfolder with a name day1, day2, day3 … day31. (Example: /root/march/day1 or /root/march/day2 etc)&lt;br /&gt;
&lt;br /&gt;
2) Modify the march folder owner so that it will be student and the new group audio.&lt;br /&gt;
&lt;br /&gt;
3) Modify the march folder&#039;s and its subfolders so that the user can do anything, group can do ls in the folder and cd into it and others can&#039;t do anything with it.&lt;br /&gt;
&lt;br /&gt;
4) Create a hard link called network to a file /etc/network/interfaces &lt;br /&gt;
&lt;br /&gt;
5) Copy /var/log directory into march folder so that the timestamp and user info will be preserved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4 points - &#039;&#039;&#039;Processes and environment variables&#039;&#039;&#039; (kill, using directing input/output/error: |, &amp;lt;, &amp;gt;, &amp;gt;&amp;gt;; env, PATH, HOME etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Divert the list with the student user&#039;s groups via cowsay into a fail studgroup.txt.&lt;br /&gt;
&lt;br /&gt;
2) Create a environment variable called MYHOME that has the value of the system&#039;s HOME environment variable. (Hint: you have tu use variable symbol here!)&lt;br /&gt;
&lt;br /&gt;
3) Send 2 htop&#039;s to the background and be ready to present how you send a kill signal to the first htop by job number and term signal to the second htop by a process number. &lt;br /&gt;
&lt;br /&gt;
4) Create an alias called bye that logs you out of the terminal. Make this alias permanent. &lt;br /&gt;
&lt;br /&gt;
5) Execute a programm called espdiff and diver the standardoutput to a file called okay.txt and the standard error to a file called notokay.txt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing software&#039;&#039;&#039; (installation, updating, deleting, apt and dpkg utils)&lt;br /&gt;
&lt;br /&gt;
==Lab 2==&lt;br /&gt;
&lt;br /&gt;
7 points - &lt;br /&gt;
&#039;&#039;&#039;Managing disks by creating partitions&#039;&#039;&#039; (fdisk, mkfs, blkid, mount, umount)&lt;br /&gt;
&lt;br /&gt;
5 points - &lt;br /&gt;
&#039;&#039;&#039;Managing swap&#039;&#039;&#039; (mkswap, swapon, swapoff)&lt;br /&gt;
&lt;br /&gt;
=Practical tests=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1FGZcqmQQDF1l32uPUJ6n8x2Tc4gK8nuxS-C9esgRqaQ/edit?usp=sharing First practical test 10th of May 2016]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ZCqOOMkx0dwP0QXLIK_yk_08a8whfJmQbYR1mAoSh7M/edit Second pracical test 24th of May 2016]&lt;br /&gt;
&lt;br /&gt;
=Exams=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ofiylCw9YAS8_S9YHEc8cZOvEfCfMfs2wDoc44eDyCU/edit?usp=sharing Practical exam]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1gkEDb1g1em9UGhj9n_LIwnhp17gY85U9aPtMfGk56_8/edit# Topics] of the oral exam in Spring 2016&lt;br /&gt;
&lt;br /&gt;
=Wiki article information=&lt;br /&gt;
&lt;br /&gt;
* Choose a topic from personal experience or from topics found on the wiki page&lt;br /&gt;
&lt;br /&gt;
*Send the topic to the lecturer kloodus@itcollege.ee&lt;br /&gt;
&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
&lt;br /&gt;
*Inform the lecturer when the article is finished&lt;br /&gt;
&lt;br /&gt;
*Receive feedback with corrections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bare in mind that this is an open environment, so everything you write in your wiki article, will be public :) &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Helpful tips and requirements what is expected of your wiki article: https://docs.google.com/document/d/1TGmcv4CL0csigtzA_1Ti4Ndvvc6AjNchZwJe2Jc7OQc/edit# &lt;br /&gt;
&lt;br /&gt;
===List of the topics chosen:===&lt;br /&gt;
&lt;br /&gt;
[[User:akerge|Artur Kerge]] is doing an article on [[Irssi]].&lt;br /&gt;
&lt;br /&gt;
[[OpenVPN_Access_Server|OpenVPN Access Server]] by  [[User:aovtsinn|Artur Ovtsinnikov]]&lt;br /&gt;
&lt;br /&gt;
[[Securing_database_with_command_line_linux#Aim_of_this_page| Securing database with command line Linux]] by  [[User:malyhass|Mohanad Aly]]&lt;br /&gt;
&lt;br /&gt;
[[SSH_for_beginners|SSH for beginners]] by [[User:ebarrier|Etienne Barrier]]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Linux_File_Permissions#References| Linux File Permissions] by Sheela Raj&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/User_talk:Lphanvan  Attack A Website by Using Local Method ([[Local Attack]])] by Ender Phan&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Cowsay_English Cowsay] by Meelis Hass&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Sguil Sguil] by Kustas Kurval&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Radare2 Radare2] by Indrek Taal&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105037</id>
		<title>Operating systems</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Operating_systems&amp;diff=105037"/>
		<updated>2016-08-24T20:59:23Z</updated>

		<summary type="html">&lt;p&gt;Itaal: /* Wiki article information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Operating systems subject related info=&lt;br /&gt;
&lt;br /&gt;
Lecturer: &lt;br /&gt;
&lt;br /&gt;
Katrin Loodus (katrin.loodus@itcollege.ee) &lt;br /&gt;
&lt;br /&gt;
Room 516 (5th floor), phone (6285) 834&lt;br /&gt;
&lt;br /&gt;
All subject related infotmation will be put up on Wiki page, due to the possibility to have access to the materials even after the subject has concluded. Materials, such as tests, lectures and links to additional materials, will remain available throughout the subject teaching period. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Aim of this course=&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to introduce the basics of operating systems and IT system life cycle from the viewpoint of the IT system administrator of operating systems. This subject provides hands-on skills needed to complete other field specific subjects in the curriculum.&lt;br /&gt;
&lt;br /&gt;
Lectures give a theoretical background and the labs give hands-on skills on the same topic using Ubuntu Linux Server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This subject is oriented on hands-on practical assignments to compliment the theoretical side of the subject.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Learning outcome 1: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject is able to perform the most common administrative tasks (user management, software management, disk usage, process management) in at least one of the most popular operating system on a server.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 2: &lt;br /&gt;
&lt;br /&gt;
A student who has completed the subject understands and is able to explain orally the basic concepts of operating systems and its security aspects.&lt;br /&gt;
&lt;br /&gt;
Learning outcome 3: &lt;br /&gt;
&lt;br /&gt;
The student is able to document an operating system&#039;s service from an IT systems administrator&#039;s viewpoint.&lt;br /&gt;
&lt;br /&gt;
=Deadlines for assignments 2016=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;03.04.2016&#039;&#039;&#039; - Submission of wiki article&#039;s topic (Sending an e-mail with the chosen topic is mandatory!)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;08.05.2016 23:59&#039;&#039;&#039; - Submission of wiki article and sending an e-mail to the lecturer in order to get it graded&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;10.05.2016&#039;&#039;&#039; - Pre practical test for students, who have done all of their labs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;23.05.2016&#039;&#039;&#039; - Last option to defend lab work (Lab1 and/or Lab2)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;24.05.2016&#039;&#039;&#039; - Practical test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;09.06.2016 at 09:00&#039;&#039;&#039; - Both practical and oral exams are in room 319&lt;br /&gt;
&lt;br /&gt;
All dates are inclusive.&lt;br /&gt;
&lt;br /&gt;
=(Occasional) Homework=&lt;br /&gt;
&lt;br /&gt;
==Week 0 &amp;amp; 1==&lt;br /&gt;
&lt;br /&gt;
Get familiar with the Unix command line by trying out this Codeacadamy [https://www.codecademy.com/learn/learn-the-command-line short course].&lt;br /&gt;
&lt;br /&gt;
==Week 11==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
This homework is voluntary! &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please test these online courses (especially user management) in https://rangeforce.com environment and send the lecturer feedback you feel you would like to share. It can be about the content, the environment, spelling, storyline etc. &lt;br /&gt;
&lt;br /&gt;
The promo code to get access to the courses is &#039;&#039;&#039;EIK2016&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please send the feedback to my e-mail address: &#039;&#039;&#039;kloodus@itcollege.ee&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
==Reading materials==&lt;br /&gt;
&lt;br /&gt;
[http://www.tecmint.com/10-useful-free-linux-ebooks-for-newbies-and-administrators/ 10 Free Linux Administration e-books]&lt;br /&gt;
&lt;br /&gt;
=Timetable for lectures 2016=&lt;br /&gt;
&lt;br /&gt;
Public chat for any subject related questions that were left unasked during the lecture: https://chatlink.com/#osadmin_ITKolledz&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
Link to lecture and lab captures:&amp;lt;/span&amp;gt; [https://echo360.e-ope.ee/ess/portal/section/d38715c3-2cc6-43ee-bc1c-818df79d0b41 Go to captures]&lt;br /&gt;
&lt;br /&gt;
==Lecture 0==&lt;br /&gt;
February 09th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.odp Lecture 0 - Introduction to subject (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture00%20-%20Introduction%20-%202016.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~kloodus/opsys/test_answers_spring2016.txt Test answers].&lt;br /&gt;
&lt;br /&gt;
==Lecture 1==&lt;br /&gt;
&lt;br /&gt;
February 12th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.odp Lecture 1 - Operating systems introduction (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture01%20-%20OS%20introduction.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
* Lecture will be on the February 12th at 8:15 in room 219&lt;br /&gt;
&lt;br /&gt;
* Practice will be on the same day at 10:00 in room 410&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; Homereading materials:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/playlist?list=PLmbPuZ0NsyGS8ef6zaHd2qYylzsHxL63x Introduction to operating systems (videos)]&lt;br /&gt;
&lt;br /&gt;
[https://en.wikipedia.org/wiki/Operating_system Operating systems (wikipedia article)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 2==&lt;br /&gt;
&lt;br /&gt;
February 16th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.odp Lecture 2 - User management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture02%20-%20user%20management.pdf (PDF) ]&lt;br /&gt;
&lt;br /&gt;
==Lecture 3==&lt;br /&gt;
&lt;br /&gt;
February 23rd 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.odp Lecture 3 - File permissions (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture03%20-%20managing%20files%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 4==&lt;br /&gt;
March 1st 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.odp Lecture 4 - User environment and processes (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture04%20-%20user%20environment%20and%20processes%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 5==&lt;br /&gt;
&lt;br /&gt;
March 8th 2016 Lecture 5 - [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.odp Filesystem Hierarchy (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture05%20-%20FHS%20and%20links%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 6==&lt;br /&gt;
&lt;br /&gt;
March 15th 2016 [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.odp Lecture 6 - Software management (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture06%20-%20Software%20management%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 7==&lt;br /&gt;
&lt;br /&gt;
March 22nd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.odp Lecture 7 - Documentation (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture07%20-%20Documentation%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 8==&lt;br /&gt;
&lt;br /&gt;
April 5th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.odp Lecture 8 - Security session (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture08%20-%20Security%20session%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 9==&lt;br /&gt;
&lt;br /&gt;
April 12th 2016 - No lecture nor labs - Lecturer is away &lt;br /&gt;
&lt;br /&gt;
Substitute lecture and lab time will be announced later&lt;br /&gt;
&lt;br /&gt;
==Lecture 10==&lt;br /&gt;
&lt;br /&gt;
April 19th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.odp Lecture 10 - Disks, partitions and swap area (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture10%20-%20Disks%20and%20Swap%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 11==&lt;br /&gt;
&lt;br /&gt;
April 26th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.odp Lecture 11 - RAID; LVM, SAN and NAS technologies (Open Document)] [http://enos.itcollege.ee/~kloodus/opsys/lecture11%20-%20RAID,LVM,SAN,NAS%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 12==&lt;br /&gt;
May 3rd 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.odp Lecture 12 - DAS, SAN, NAS and CAS (group work) technologies (cont.) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture12%20-%20DAS,SAN,NAS,CAS-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
[[http://www.slideshare.net/pranayakumar1986/network-storage Additional reading materials]]&lt;br /&gt;
&lt;br /&gt;
==Lecture 13==&lt;br /&gt;
&lt;br /&gt;
May 10th 2016 - [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.odp Lecture 13 - Backup and recovery (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture13%20-%20Backup%20and%20Recovery%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 14 and Lecture 9==&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;17th&#039;&#039;&#039; 2016 - Lecture 14 - Miscellaneous topics (will be held in a computer class 319)&lt;br /&gt;
&lt;br /&gt;
May &#039;&#039;&#039;19th 2016 at 10:00 in room 320&#039;&#039;&#039; - [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.odp Lecture 9 - Monitoring (substitute lecture) (OpenDocument)] [http://enos.itcollege.ee/~kloodus/opsys/lecture15%20-%20Monitoring%20-%202016.pdf (PDF)]&lt;br /&gt;
&lt;br /&gt;
==Lecture 15==&lt;br /&gt;
May 24th 2016 - Lecture 15 - working in IT - merits and demerits &lt;br /&gt;
&lt;br /&gt;
We will not have a lecture in the ordinary sense, instead we&#039;ll have a seminar or discussion on important aspects of working in IT. The ethical, social and personal aspects of it. Terms like &amp;quot;imposter syndrome&amp;quot;, burnout, teamwork and better work environment will be some of the topics covered. Life is not only technical competence, it&#039;s a lot about human interaction as well.&lt;br /&gt;
&lt;br /&gt;
=Lab works=&lt;br /&gt;
&lt;br /&gt;
==Lab 0==&lt;br /&gt;
&lt;br /&gt;
Installing Ubuntu Server 14.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Introduction to Unix command line&#039;&#039;&#039; (cd, ls, cat, full path, relative path etc)&lt;br /&gt;
&lt;br /&gt;
==Lab 1== &lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing users&#039;&#039;&#039; (adduser, addgroup, passwd, /etc/passwd, /etc/shadow)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a user noodle&lt;br /&gt;
&lt;br /&gt;
2) Add a new group food and add a the user noodle to a group called food.&lt;br /&gt;
&lt;br /&gt;
3) Divert the user noodle&#039;s password hash via cowsay to a file called cownoodle.txt.&lt;br /&gt;
&lt;br /&gt;
4) Lock the user noodle and be ready to show me the indication of the user being locked. &lt;br /&gt;
&lt;br /&gt;
5) Change the user&#039;s current home directory into /home/unknown so that the files will also be moved to the new location.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 points - &#039;&#039;&#039;Managing files&#039;&#039;&#039; (mkdir, cp, mv, rm, touch, nano, less, chmod, chown, rwx, 644 etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Create a folder march in root user directory and for every march day a subfolder with a name day1, day2, day3 … day31. (Example: /root/march/day1 or /root/march/day2 etc)&lt;br /&gt;
&lt;br /&gt;
2) Modify the march folder owner so that it will be student and the new group audio.&lt;br /&gt;
&lt;br /&gt;
3) Modify the march folder&#039;s and its subfolders so that the user can do anything, group can do ls in the folder and cd into it and others can&#039;t do anything with it.&lt;br /&gt;
&lt;br /&gt;
4) Create a hard link called network to a file /etc/network/interfaces &lt;br /&gt;
&lt;br /&gt;
5) Copy /var/log directory into march folder so that the timestamp and user info will be preserved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4 points - &#039;&#039;&#039;Processes and environment variables&#039;&#039;&#039; (kill, using directing input/output/error: |, &amp;lt;, &amp;gt;, &amp;gt;&amp;gt;; env, PATH, HOME etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Divert the list with the student user&#039;s groups via cowsay into a fail studgroup.txt.&lt;br /&gt;
&lt;br /&gt;
2) Create a environment variable called MYHOME that has the value of the system&#039;s HOME environment variable. (Hint: you have tu use variable symbol here!)&lt;br /&gt;
&lt;br /&gt;
3) Send 2 htop&#039;s to the background and be ready to present how you send a kill signal to the first htop by job number and term signal to the second htop by a process number. &lt;br /&gt;
&lt;br /&gt;
4) Create an alias called bye that logs you out of the terminal. Make this alias permanent. &lt;br /&gt;
&lt;br /&gt;
5) Execute a programm called espdiff and diver the standardoutput to a file called okay.txt and the standard error to a file called notokay.txt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3 points - &#039;&#039;&#039;Managing software&#039;&#039;&#039; (installation, updating, deleting, apt and dpkg utils)&lt;br /&gt;
&lt;br /&gt;
==Lab 2==&lt;br /&gt;
&lt;br /&gt;
7 points - &lt;br /&gt;
&#039;&#039;&#039;Managing disks by creating partitions&#039;&#039;&#039; (fdisk, mkfs, blkid, mount, umount)&lt;br /&gt;
&lt;br /&gt;
5 points - &lt;br /&gt;
&#039;&#039;&#039;Managing swap&#039;&#039;&#039; (mkswap, swapon, swapoff)&lt;br /&gt;
&lt;br /&gt;
=Practical tests=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1FGZcqmQQDF1l32uPUJ6n8x2Tc4gK8nuxS-C9esgRqaQ/edit?usp=sharing First practical test 10th of May 2016]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ZCqOOMkx0dwP0QXLIK_yk_08a8whfJmQbYR1mAoSh7M/edit Second pracical test 24th of May 2016]&lt;br /&gt;
&lt;br /&gt;
=Exams=&lt;br /&gt;
&lt;br /&gt;
==2016==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1ofiylCw9YAS8_S9YHEc8cZOvEfCfMfs2wDoc44eDyCU/edit?usp=sharing Practical exam]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1gkEDb1g1em9UGhj9n_LIwnhp17gY85U9aPtMfGk56_8/edit# Topics] of the oral exam in Spring 2016&lt;br /&gt;
&lt;br /&gt;
=Wiki article information=&lt;br /&gt;
&lt;br /&gt;
* Choose a topic from personal experience or from topics found on the wiki page&lt;br /&gt;
&lt;br /&gt;
*Send the topic to the lecturer kloodus@itcollege.ee&lt;br /&gt;
&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
&lt;br /&gt;
*Inform the lecturer when the article is finished&lt;br /&gt;
&lt;br /&gt;
*Receive feedback with corrections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bare in mind that this is an open environment, so everything you write in your wiki article, will be public :) &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Helpful tips and requirements what is expected of your wiki article: https://docs.google.com/document/d/1TGmcv4CL0csigtzA_1Ti4Ndvvc6AjNchZwJe2Jc7OQc/edit# &lt;br /&gt;
&lt;br /&gt;
===List of the topics chosen:===&lt;br /&gt;
&lt;br /&gt;
[[User:akerge|Artur Kerge]] is doing an article on [[Irssi]].&lt;br /&gt;
&lt;br /&gt;
[[OpenVPN_Access_Server|OpenVPN Access Server]] by  [[User:aovtsinn|Artur Ovtsinnikov]]&lt;br /&gt;
&lt;br /&gt;
[[Securing_database_with_command_line_linux#Aim_of_this_page| Securing database with command line Linux]] by  [[User:malyhass|Mohanad Aly]]&lt;br /&gt;
&lt;br /&gt;
[[SSH_for_beginners|SSH for beginners]] by [[User:ebarrier|Etienne Barrier]]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Linux_File_Permissions#References| Linux File Permissions] by Sheela Raj&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/User_talk:Lphanvan  Attack A Website by Using Local Method ([[Local Attack]])] by Ender Phan&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Cowsay_English Cowsay] by Meelis Hass&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Sguil Sguil] by Kustas Kurval&lt;br /&gt;
&lt;br /&gt;
[https://wiki.itcollege.ee/index.php/Radare2] by Indrek Taal&lt;/div&gt;</summary>
		<author><name>Itaal</name></author>
	</entry>
</feed>