Recommended Agent: On-Premises
Supported Agents: On-Premises
Is Auto-Discovered By: N/A
Can Auto-Discover: N/A
Parent/Child Type Inspector: No
Inspection via: SSH
Data Summary: Here
Enhanced Inspector Count
Linux is considered to be an Enhanced Inspector. Liongard provides you with a limited number of Enhanced Inspectors for each Environment.
To view your Enhanced Inspector count per Environment, navigate to Admin > Environments screen > Review in the Enhanced Inspector column
If you would like additional Enhanced Inspectors, please reach out to your Account Manager.
Video isn't playing? Click here.
Currently, the Linux Agent only officially supports Ubuntu and Red Hat. Although most of the data collection is generic to any Linux distribution, thus far testing has only been completed on Ubuntu and Red Hat.
Local vs. Remote
Local linux inspections can be run by installing the Linux Agent and registering it with Liongard.
Remote linux inspections are done via SSH. Please note the user specified for SSH access must be able to perform
Remote Inspection From Windows
Yes, you can use a Windows agent to perform a remote inspection of Linux. The Windows agent doesn't need any special setup or dependencies. You only need to have SSH enabled on the Linux server and the Windows server be able to reach it over the network.
If you wish to perform a remote inspection you must enable SSH access to the linux server.
In Liongard, navigate to Admin > Inspectors > Navigate to the Linux Inspector > Select Add System.
Fill in the following information:
- Environment: Select the Environment this System Inspector should be associated to
- Friendly Name: Suggested "Linux [Environment Name]"
- Agent: Select the On-premises Agent installed for this Environment
- Inspector Version: Latest
- IP / Hostname (Remote Inspections Only): The IP/Hostname of the Linux server
- SSH Port (Remote Inspections Only): Port number SSH is listening on. Defaults to 22
- SSH Username (Remote Inspections Only): User to login as for SSH access. Please see note above about access permissions of the user
- SSH Password (Remote Inspections Only): The SSH user's password if password authentication is enabled. If it is not enabled. then fill out the private key fields only
- SSH Private Key (Remote Inspections Only): If key authentication is enabled, enter the private key used for access
- SSH Passphrase For Private Key (If Configured): If the private key requires a passphrase. Remote Inspections Only
- (Optional) File Integrity Monitoring Directories: If you want monitor file system level details, provide a semi-colon separated list of directories to monitor. Currently, the Inspector will provide hashes and show which files have changed over time
- Scheduling: The Inspector will default to run once a day at the time the Inspector is set up. Here you can adjust the schedule
Select Save. The Inspector will now be triggered to run within the minute.
If you would like this Inspector's data to be sent to ConnectWise and/or IT Glue, turn on Flexible Assets/Configurations for this Inspector:
- ConnectWise: Admin > Integrations > ConnectWise > Configuration Types > Confirm the "Configuration Auto-Updating" toggle is enabled
- IT Glue: Admin > Integrations > IT Glue > Flexible Assets > Confirm the "Flexible Asset Auto-Updating" toggle is enabled
For more information, please watch our How To video
To import Linux Inspectors via CSV Import, navigate to Admin > Inspectors > Linux > Select the down arrow icon in the top right-hand to Download CSV Import Template.
In the CSV Template, each row, starting on row three, will represent an Inspector. Fill in the following information for each Inspector you want to roll out:
- Agent.Name: This column is case sensitive. Copy and paste the associated Agent name from the Admin > Agents screen
- Inspector.Name: Enter "linux-inspector"
- Environment.Name: This column is case sensitive. Copy and paste the associated Environment name from the Dashboard screen
- Alias: Enter the Desired Friendly Name
- Config.SSH_HOST: (Remote Inspections Only) Enter the IP/Hostname of the Linux server
- SecureConfig.SSH_PORT: (Remote Inspections Only) Enter the port number SSH is listening on
- SecureConfig.SSH_USER: (Remote Inspections Only) Enter the username used to login as for SSH access. Please see note above about access permissions of the user
- SecureConfig.SSH_PASSWORD: (Remote Inspections Only) Enter the SSH user's password if password authentication is enabled. If it is not enabled, then fill out the SecureConfig.SSH_PRIVATE_KEY and SecureConfig.SSH_PASS_PHRASE fields and leave this field empty
- SecureConfig.SSH_PRIVATE_KEY: (Remote Inspections Only) Enter the Private Key, if enabled. If not, then fill out the SecureConfig.SSH_PASSWORD field, and leave this field empty
- SecureConfig.SSH_PASS_PHRASE: (Remote Inspections Only) Enter the Passphrase for the Private Key, if enabled. If not, then fill out the SecureConfig.SSH_PASSWORD field, and leave this field empty
- Config.DIRS: (Optional) If you would like to monitor file system-level details, enter a directory to monitor. If you would like to inspect multiple of directories, you will need to add a column to the left called "Config.DIRS", "Config.DIRS", etc., and in each column enter the additional directory that you would like to inspect.
- Currently, the Inspector will provide hashes and show which files have changed over time
- FreqType: Enter "days"
- FreqInterval: Enter "1"
When ready to Import the CSV Template of Inspectors, navigate to Admin > Inspectors > Linux > Select the up arrow icon in the top right-hand to Import CSV > Select your saved template.
After the successful import notification, reload your browser to find your imported Inspectors.
These Inspectors will automatically trigger themselves to run within a minute.
Updated about a month ago