当前位置:网站首页>Observation configuring wmic
Observation configuring wmic
2022-06-25 06:14:00 【allway2】
WMI Poller
To install Windows Get advanced statistics for your device , You need to install WMI Console Application .
Optional features
WMI There's no need to poll Windows equipment , But it helps to collect information about Exchange and MSSQL Some additional data for .
install WMIC
In the use of WMI Before the poller , You need to WMIC Install to your Observium On a host .
WMI The source code is fairly old , Many packages can lead to Python There is a problem with the dependency , So using precompiled static binaries is the easiest . Download the following file , Unzip and wmic Binary files are put into /usr/bin
wget https://www.observium.org/files/wmic_1.3.16_static_64bit.tar.gz
tar zxvf wmic_1.3.16_static_64bit.tar.gz
mv wmic winexe /usr/bin
You can rtunning Test whether it can execute on your system wmic --version
:
[email protected]:~# ./wmic --version
Version 4.0.0tp4-SVN-build-UNKNOWN
[email protected]:~#
To configure WMI Security to allow users to poll WMI
There are several ways to solve this problem :
- Create a domain user and place them where you want to use WMI In the administrators group of all servers polled
- Use the domain administrator account
- Create a WMI Private domain user with read permission
choice (1) or (2) It's a test WMI The first choice of , Because it's the fastest . By default ,WMI Security allows any administrator of the system to control . If you are a domain administrator , You can test to ensure that WMIC Work normally immediately after installation ( The explanation is as follows ).
On the other hand , choice (3) Is a safer but more complex option . It is recommended that you take this route to reduce security risks .
Set up WMI User access rights
- choice Start > function .
- stay “ function ” Dialog box “ open ” Type... In the field wmimgmt.msc .
- single click determine To display Windows Manage infrastructure (WMI) Control panel .
- stay WMI In the left pane of the control panel , highlight WMI control ( Local ) entry , Right click , And then choose “ attribute ” Menu options . This will show WMI Control ( Local ) Properties dialog box .
- stay WMI Control ( Local ) Select... In the properties dialog box Security tab .
- stay Security In the namespace tree within the tab , an Root Folder . This action lists the available WMI The name space .
- single click CIMV2 Namespace to highlight it .
- single click Security To display ROOT\CIMV2 Security dialog for .
- single click “ROOT\CIMV2 The security of ” In the dialog box “ add to ” To display “ Select users or groups ” Dialog box .
- Add a domain user account that will be used as your proxy data collection user account . This should be a domain account ( Not a local computer account ), But it does not need to be an account with administrative access .
- single click “ determine ” close “ Select users or groups ” Dialog box and return to “ROOT\CIMV2 The security of ” Dialog box . The user account you selected should now be listed at the top of the dialog In the name list .
- Select the newly added user ( If not already selected ) And enable the following permissions :
- Enable account
Remote enable .
If the permission has not been checked , Please click on the “ allow ” Box to enable this permission . You should have selected enable account permissions , But you need choice Remote enable jurisdiction .13. single click “ determine ” close “ROOT\CIMV2 The security of ” Dialog box .
It is now time to properly set permissions for the proxy data collection user account .
Try querying on one of your servers
wmic --domain=DOMAIN --user=USER --password=PASSWORD //SERVER.DOMAIN.COM "SELECT * FROM Win32_ComputerSystem"
For command line only : Please note that , If your password is included in Ubuntu Any character used on the command line , It must be escaped ( namely , If your password is Bob!1000
You need to enter Bob\!1000
).
Output example
When WMIC Properly installed and WMI When the user has the correct permissions , You should see the following valid output :
$ /usr/bin/wmic --user='user' --password='password' --workgroup='OBSERVIUM' --delimiter=## --namespace='root\CIMV2' //win.server "SELECT Name FROM Win32_ComputerSystem"
CLASS: Win32_ComputerSystem
Name
WIN
Access denied
If WMI The user does not have permission to read WMI Monitoring parameters , You will see the following error :
$ /usr/bin/wmic --user='user' --password='password' --workgroup='OBSERVIUM' --delimiter=## --namespace='root\CIMV2' //win.server "SELECT Name FROM Win32_ComputerSystem"
[librpc/rpc/dcerpc_util.c:1290:dcerpc_pipe_auth_recv()] Failed to bind to uuid 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57 - NT_STATUS_NET_WRITE_FAULT
[librpc/rpc/dcerpc_connect.c:790:dcerpc_pipe_connect_b_recv()] failed NT status (c0000022) in dcerpc_pipe_connect_b_recv
[wmi/wmic.c:196:main()] ERROR: Login to remote object.
NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied
Check the user name 、 password 、 Domain parameters and WMI User permissions !
Configure observation
Global configuration
nano /opt/observium/config.php
// Enable default WMI Paramaters
$config['wmi']['domain'] = "domainname"; // NetBIOS Name Shorthand Domain/Workgroup (ie. notdomain.local.com)
$config['wmi']['user'] = "username";
$config['wmi']['pass'] = "passw0rd";
$config['poller_modules']['wmi'] = 1;
Device configuration
If you need to select a specific WMI The module polls or passes a specific user to the device / password , You can change it on the device edit page .
边栏推荐
- Uname command – displays system information
- An example of recursion, the full permutation problem of 1~n
- Analysis report on production and sales demand and sales prospect of global and Chinese phosphating solution Market 2022-2028
- Leetcode topic [array] -36- effective Sudoku
- Websocket in the promotion of vegetable farmers
- Es11 new methods: dynamic import(), bigint, globalthis, optional chain, and null value merging operator
- Research Report on demand and Competitive Prospect of global and Chinese welding personal protective equipment industry 2022-2027
- Understanding the dynamic mode of mongodb document
- CSDN cerebral palsy bug has wasted nearly two hours of hard work
- PIP connects to Tsinghua source by default
猜你喜欢
[open source sharing] deeply study KVM, CEPH, fuse features, including open source projects, code cases, articles, videos, architecture brain maps, etc
Es11 new methods: dynamic import(), bigint, globalthis, optional chain, and null value merging operator
The e-book "action guide for large organizations to further promote zero code application platform" was officially released!
[Suanli network] problems and challenges faced by the development of Suanli network
Use generator-easy-ui5 to quickly create the engineering structure of SAP ui5 applications
Summary of 6 common methods of visual deep learning model architecture
Vegetables sklearn - xgboost (2)
Tencent and China Mobile continued to buy back with large sums of money, and the leading Hong Kong stocks "led" the market to rebound?
Part 34 of SAP ui5 application development tutorial - device adaptation of SAP ui5 application based on device type
What happens when redis runs out of memory
随机推荐
How SAP ui5 device type detection device API works
MySQL uses the where condition to find strange results: solve
Simple student management system
Differences and connections between sap ui5 and openui5
Tail command – view the contents at the end of the file
Data7202 statistical analysis
Global and China financial guarantee marketing strategy and channel dynamic construction report 2022
JS implementation mouse can achieve the effect of left and right scrolling
Trial version of routing history and routing back and history of SAP ui5
Laravel8 fill data
[golang] leetcode intermediate - Search rotation sort array & search two-dimensional matrix II
What changes have taken place in the project file after SAP ui5 tools ran the Fiori add deploy config command
Pre knowledge of asynchronous operation
证券如何在线开户?在线开户是安全么?
Vegetables sklearn - xgboost (2)
Tablespace free space
Cnpm installation
How the sap ui5 framework performs single step debugging of batch requests
3-7sql injection website instance step 3: attack type and attack strategy
Huawei machine test question: splicing URL