Satellite¶
Adding a Service to the Satellite Target¶
Adding a systemd service to neteye-satellite.target
(see Satellite Services),
can be useful in the scenario where a custom systemd service needs to be managed together
with the other services of the Satellite.
The main use case for this necessity is that the Satellite admins want that a service that they created will be always started automatically when the Satellite Node reboots.
To attach a new systemd service to the Satellite Target you can use the command
neteye satellite service add
. For example, if you want to add the service
telegraf-local@my_custom_instance.service
to the neteye-satellite.target
you can execute:
sat# neteye satellite service add telegraf-local@my_custom_instance
Warning
The service name passed to the neteye satellite service add
command
must not contain the .service
suffix, which would lead to an incorrect configuration.
The command neteye satellite service remove
allows instead to remove a service from the Satellite Target.
Removing a service from the Satellite Target can be useful if you previously added a custom service by mistake and
must not be used to remove a NetEye service from the Satellite Target.
For example, to remove telegraf-local@my_custom_instance.service
from the neteye-satellite.target
you can
execute:
sat# neteye satellite service remove telegraf-local@my_custom_instance
We remind you that you can verify which services are attached to the Satellite Target with the command:
sat# systemctl list-dependencies neteye-satellite.target
Icinga 2 advanced configuration¶
You can have a look at NetEye Satellite Nodes for more advanced configurations of Icinga 2 in the NetEye Satellite Nodes.
NGINX advanced configurations¶
NGINX is installed and enabled by default on Satellites and is responsible to expose local services, like Tornado Webhook collector, and to perform TLS termination. NGINX can be customised to some extent, to be employed in other scenarios like those described below.
Change NGINX Certificates¶
By default NGINX is configured with self-signed certificates generated at Satellite side. To use your own certificates you must not change the NGINX configuration, but you can overwrite the existing self-signed certificates in the following locations:
Certificate: it is mandatory and located in
/neteye/local/nginx/conf/tls/certs/neteye_cert.crt
Key: it is mandatory and located in
/neteye/local/nginx/conf/tls/private/neteye.key
CA or CA bundle: it is mandatory and located in
/neteye/local/nginx/conf/tls/certs/neteye_ca_bundle.crt
Setup a Reverse Proxy for Https Resource¶
In this scenario we assume that you want to forward all HTTPS requests for neteyeshare to the master.
If you are familiar with Httpd, the corresponding configuration would look like this:
ProxyPass /neteyeshare https://neteye4master.example.it/neteyeshare
ProxyPassReverse /neteyeshare https://neteye4master.example.it/neteyeshare
To configure NGINX as a reverse proxy you should create file
/neteye/local/nginx/conf/conf.d/http/locations/neteyeshare.conf
with the following content:
location /neteyeshare/ {
proxy_set_header X-Forwarded-Host $host:$server_port;
proxy_set_header X-Forwarded-Server $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass https://neteye4master.example.it/neteyeshare;
}
You need to restart NGINX to apply changes.
Setup a Server in NGINX¶
By default NGINX on Satellites listen only to port 443. It is possible to start a new server to listen on a different port, for example to set it up as reverse proxy.
In this case you need to create a new file
/neteye/local/nginx/conf/conf.d/http/my_custom_server.conf
with the following content:
server {
listen 80;
server_name my_custom_server;
location /api/v1/ {
proxy_set_header X-Forwarded-Host $host:$server_port;
proxy_set_header X-Forwarded-Server $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://127.0.0.1:8080/api/v1;
}
}
You need to restart NGINX to apply changes.
Change SSL settings¶
Unlike the previous scenarios, this settings must be configured and applied on the Master; then you need to follow the instructions in sections Generate the Satellite Configuration Archive and Configure the Master, Synchronize the Satellite Configuration Archive and Satellite Setup, to deploy configuration on Satellite.
To change NGINX SSL settings you can change optional parameters
proxy.ssl_protocol
and proxy.ssl_cipher_suite
described in
NetEye Satellite Configuration.
Suppose the Satellite configuration /etc/neteye-satellite.d/tenant_A/acmesatellite.conf
is the following:
{
"fqdn": "acmesatellite.example.com",
"name": "acmesatellite",
"ssh_port": "22",
"ssh_enabled": true
}
Let’s suppose you want to setup NGINX to support TLSv1.2
only. You have just
to set your satellite configuration file
/etc/neteye-satellite.d/tenant_A/acmesatellite.conf
file as follows:
{
"fqdn": "acmesatellite.example.com",
"name": "acmesatellite",
"ssh_port": "22",
"ssh_enabled": true,
"proxy": {
"ssl_protocol": "TLSv1.2"
}
}