Enable RMI
By default, the Meridian server’s RMI port is disabled for security reasons.
When enabled, it lets you access Meridian via jconsole
and remotely manage your instance.
To enable RMI, you must add some settings to the default Meridian installation.
Add the following code to ${OPENNMS_HOME}/etc/opennms.conf
:
# Configure remote JMX
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Dcom.sun.management.jmxremote.port=18980" (1)
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Dcom.sun.management.jmxremote.local.only=false"
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Dcom.sun.management.jmxremote.authenticate=true"
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Dcom.sun.management.jmxremote.ssl=false"
# Listen on all interfaces
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Dopennms.poller.server.serverHost=0.0.0.0" (2)
# Accept remote RMI connections on this interface
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Djava.rmi.server.hostname=<your-server-ip-address>" (3)
1 | Configures Meridian to listen for RMI on port 18980 . |
2 | Configures Meridian to listen for RMI on all interfaces. Note that originally, RMI was used only for the legacy remote poller; despite this property name mentioning the "OpenNMS poller server," it applies to RMI as a whole. |
3 | Allows Meridian to accept and complete RMI connections. You must include this option, otherwise Meridian will accept connections but will not be able to complete a valid connection. |
If ${OPENNMS_HOME}/etc/opennms.conf does not exist in your install, you can create it and add the code above.
|
Allow user authentication
Authentication is allowed only for users who are assigned the admin
or jmx
roles (ROLE_ADMIN
, ROLE_JMX
).
To assign the admin
role to a user, add ROLE_ADMIN
to their entry in users.xml
.
Similarly, to assign the jmx
role to a user, add ROLE_JMX
to their entry in users.xml
.
If the ROLE_USER
role is required to allow access to the web UI, ensure that the user’s account has it as well (see Assign User Permissions).
You should also ensure that ${OPENNMS_HOME}/etc/jmxremote.access
has the appropriate access settings for each role:
admin readwrite
jmx readonly
The following types of access are available in Meridian:
-
readwrite
: Lets a user retrieve JMX metrics and run MBeans. -
readonly
: Lets a user retrieve JMX metrics, but does not allow them to run MBeans.
Enable SSL
To enable SSL on the RMI port, you need an existing keystore for your Meridian server. For information on configuring a keystore, see Secure Jetty with HTTPS.
After your keystore is set up and configured, you must change the com.sun.management.jmxremote.ssl
to true
and tell Meridian where your keystore is:
# Configure SSL Keystore
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Djavax.net.ssl.keyStore=/opt/opennms/etc/opennms.keystore"
ADDITIONAL_MANAGER_OPTIONS="$ADDITIONAL_MANAGER_OPTIONS -Djavax.net.ssl.keyStorePassword=changeit"
Connect to RMI over SSL
Note that if you use a self-signed or otherwise untrusted certificate, you must configure a client-side truststore when you try to connect over SSL-enabled RMI. For information on creating and configuring a truststore, see Secure Jetty with HTTPS.
After you set up a truststore, you may use it to connect to your Meridian RMI server.
For example, when using jconsole
to connect to the Meridian RMI interface, run the following command to retrieve JVM statistics:
jconsole -J-Djavax.net.ssl.trustStore=/path/to/opennms.truststore -J-Djavax.net.ssl.trustStorePassword=changeit