PREVIOUS Fedora

NEXT Relays

RHEL

Installation via Devo repository

  1. Add the Devo repository to the system repository list. This only needs to be performed once.
  2. Create the following file:

    /etc/yum.repos.d/logtrust.repo file

    [logtrust]
    name=logtrust
    baseurl=http://repository.logtrust.net/rpms/
    enabled=1
    gpgcheck=1
    gpgkey=http://repository.logtrust.net/PublicKey
  3. Import the Devo public key. This only needs to be performed once.

    sudo rpm --import http://repository.logtrust.net/PublicKey
  4. Install the Devo packages using the following command: 

    sudo yum install logtrust-system logtrust-monitor
  5. Configure the Devo packages using the following commands: 

    • logtrust-system

      sudo logtrust-system-configure
    • logtrust-monitor

      sudo logtrust-monitor-configure

Update via Devo repository

To upgrade to the latest version of any Devo packages, follow the same procedure as for a normal distribution package. Below is an example for RPM-based distributions:

# yum --enablerepo=logtrust clean metadata
# yum update logtrust-system
# logtrust-system-configure

Installation via .rpm packages

Download the logtrust-system and logtrust-monitor packages found here:

Install the packages using the following commands:

  • logtrust-system

    sudo rpm -ivh logtrust-system-0.1-1.noarch.rpm
    
  • logtrust-monitor

    sudo rpm -ivh logtrust-monitor-0.1-1.noarch.rpm
    

Modifying the configuration of a Devo package

After the packages have been installed, you can access the configuration options by running the following commands.

  • logtrust-system

    sudo logtrust-system-configure
    
  • logtrust-monitor

    sudo logtrust-monitor-configure
    

Uninstalling a Devo package

Run one of these two commands to uninstall a Devo package:

  • logtrust-system

    yum erase logtrust-system

    Or

    rpm -e logtrust-system
  • logtrust-monitor

    yum erase logtrust-monitor

    Or

    rpm -e logtrust-monitor

Tested versions

  • RHEL 6.3

Common errors in RHEL

  • SELinux is enabled in enforcing mode by default. Run getenforce to check the status. Rsyslog is one of the processes protected by SELinux policy. On its initial configuration, it only allows sending data to port 514/udp.
  • The SELinux policy must be modified to allow rsyslog to report its events to Devo. For more information, check out the syslog & SELinux configuration article.

Have we answered your question?

If not, please contact our technical support team via email by clicking the button below.

CONTACT US

PREVIOUS Fedora

NEXT Relays