Remote access settings for enterprise-level Nightingale monitoring and analysis tools under Linux [Intranet penetration]

Preface

Nightingale Monitoring is an open source cloud-native observation and analysis tool that adopts the All-in-One design concept. It integrates data collection, visualization, monitoring and alarming, and data analysis. It is closely integrated with the cloud-native ecosystem and provides enterprises with out-of-the-box functionality. Level monitoring, analysis and alarm capabilities. Nightingale released the v1 version on github on March 20, 2020, and has accumulated more than 100 versions.

After local deployment, in order to solve the problem of being unable to access remotely, today we will introduce how to enable local nightingale combined with the cpolar intranet penetration tool to achieve remote access and improve operation and maintenance efficiency.

1. Linux deployment Nightingale

This example uses the fastest deployment method, docker compose. If it is a formal production environment, please refer to the official advanced deployment plan. If docker or docker compose is not installed, please install it in advance. In order to facilitate the cloning of the project, Git also needs to be installed together. good.

First clone the project using Git

git clone https://gitlink.org.cn/ccfos/nightingale.git

After cloning, you can see a nightingale file

image-20230914155835397

Enter the docker directory in the nightingale folder

cd nightingale/docker

Execute docker compose command to install and deploy

docker-compose up -d

After the download and installation is successful, you docker ps can see the running container by executing it.

image-20230914160521377

2. Local access test

The nightingale service has been successfully installed above. Now access it locally. Access the port in the browser or external browser and you 17000will see the login interface. Local access indicates success. Enter the default account root and password root.2020to log in successfully. Next we install the cpolar intranet Penetration tools enable remote access.

image-20230914160737036

3. Linux installation cpolar

Above, we successfully installed Nightingale through docker compose. Next, we installed the cpolar intranet penetration tool on Linux and forwarded the http public network address mapped by the local port through cpolar. We can easily achieve remote access without registering a domain name and purchasing a cloud. Server. The following are the steps to install cpolar

cpolar official website address: https://www.cpolar.com

  • Use one-click script installation command
curl -L https://www.cpolar.com/static/downloads/install-release-cpolar.sh | sudo bash
  • Add services to the system
sudo systemctl enable cpolar
  • Start cpolar service
sudo systemctl start cpolar

After cpolar is successfully installed, access Linux port 9200 on an external browser: [http://LAN ip:9200]. Log in using your cpolar account. After logging in, you can see the cpolar web configuration interface, which is connected to the web management interface. Just configure

image-20230831171159175

4. Configure Nightingale public network access address

Click Tunnel Management - Create Tunnel on the left dashboard to create a Nightingale cpolar tunnel!

  • Tunnel name: You can customize the name. Be careful not to duplicate the existing tunnel name.
  • Protocol: Select http
  • Local address: 17000
  • Domain name type: Choose a random domain name for free
  • Region: Select China vip

Click创建

image-20230914161654926

After the tunnel is successfully created, click the status on the left - online tunnel list to view the generated public network access address. There are two access methods, one is http and https

image-20230914161716913

5. Remote access to Nightingale management interface via public network

Use the above https public network address to access it in the browser of any device, and you can successfully see our Nightingale interface. In this way, a public network address that can be accessed remotely is created.

image-20230914161806467

Enter the username and password initialized above to log in successfully.

image-20230914161921357

6. Fixed Nightingale public network address

Since the tunnel created using cpolar above uses a random public network address, it will change randomly within 24 hours, which is not conducive to long-term remote access. Therefore, we can configure a second-level subdomain name for it. This address is a fixed address and will not change randomly [ps: cpolar.cn has been filed]

Note that you need to upgrade the cpolar package to a basic package or above, and the bandwidth corresponding to each package is different. [cpolar.cn has been registered]

Log in to the cpolar official website , click Reserve on the left, select to reserve the second-level subdomain name, set a second-level subdomain name, click Reserve, and copy the reserved second-level subdomain name after the reservation is successful.

image-20230914162109564

After the reservation is successful, copy the name of the second-level subdomain name that was successfully reserved.

image-20230914162138804

Return to the cpolar web UI management interface, click Tunnel Management - Tunnel List on the left dashboard, find the tunnel you want to configure, and click Edit on the right

image-20230914162216161

Modify the tunnel information and configure the successfully reserved second-level subdomain name into the tunnel.

  • Domain name type: Select a second-level subdomain name
  • Sub Domain: Fill in the successfully reserved second-level subdomain name

Click 更新(note, click once to update, no need to submit again)

image-20230914162255028

After the update is completed, open the online tunnel list. At this time, you can see that the public network address has changed and the address name has become a fixed second-level subdomain name.

image-20230914162316961

Finally, we use a fixed public network address to access Nightingale. We can see that the access is successful. In this way, a fixed and permanent public network address is set. To access a new address, you may need to log in again.

image-20230914162802084

Reprinted from cpolar pole cloud article: Linux enterprise-level Nightingale monitoring and analysis tool remote access

Guess you like

Origin blog.csdn.net/ljq_up/article/details/133857173