Configuring existing EC2 with Netprobe

The ExistingEC2withNetprobe.yaml CloudFormation template configures Netprobe on existing EC2 instances using the AWS Systems Manager (SSM). It creates an SSM document and association to remotely install and configure Netprobe as a systemd service using IAM instance profile credentials.

Prerequisites Copied

Input parameters Copied

Target EC2 configuration Copied

Parameter Description Default Required
InstanceIds Comma-separated list of existing EC2 Instance IDs Yes

Gateway configuration Copied

Parameter Description Default Required
GatewayHost Gateway host for Netprobe connection Yes
GatewayPort Gateway port for Netprobe connection 7039 No

Netprobe configuration Copied

Parameter Description Default Required
NetprobeInstallDirectory Directory where Netprobe will be installed ~/geneos No
S3NetprobeURL S3 URL to the Netprobe tar.gz file Yes
NetprobePort Port number for Netprobe 7036 No
S3NetprobeSetupURL S3 URL to the Netprobe setup XML file Yes
S3NetprobeServiceURL S3 URL to the Netprobe systemd service file Yes

Verification and debugging Copied

Run the following commands if you need to verify or debug your deployment.

View template execution logs Copied

ssh -i <privatekey> <user>@<host> "sudo cat /var/log/amazon/ssm/amazon-ssm-agent.log"

Check the service status Copied

ssh -i <privatekey> <user>@<host> "systemctl is-active <service>.service"

Download the logs Copied

ssh -i <privatekey> <user>@<host> "sudo tar -cvz -C "cd <install_dir> && find <service> -type f -name '*.log' -print0 | sudo tar --null -czf - --files-from -" > <service>-logs.tar.gz
["Geneos"] ["Geneos > Netprobe"] ["User Guide"]

Was this topic helpful?