Forum Replies Created

Viewing 15 posts - 16 through 30 (of 262 total)
  • Author
    Posts
  • Avatar photoTelium Support Group
    Participant
    Post count: 268

    We include the installation manual in the download package. Untar the HAast package you just downloaded and look in the /docs folder. You will see a file called detailed_installation_guide.pdf

    The installation guide is over 100 pages in length, and takes you through all of the steps required to get HAast up and running.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    If you have chosen USB Dongle activation, then there a few more steps required to pair your new dongle with your license. Once your dongle arrives plug it into the computer and restart the HAast service. Reconnect to the product’s telnet interface and issue the “license usbdongle” command. For example:


    [root@pbx_qa_17:/usr/local/haast] $ telnet 172.31.224.14 3001
    Trying 172.31.224.14…
    Connected to 172.31.254.14.
    Escape character is ‘^]’.
    HAast telnet interface on ‘PBX QA 17’
    HAast>license usbdongle
    Your USB dongle has been detected but is not yet paired with your license.
    To pair your USB dongle with your license send the following dongle ID to
    support@telium.io to receive a pairing code :
    5010-5473-C839-94B9

    Copy the pairing code and paste it into an email to support@telium.io and include your license number. We will reply with an activation code that you must enter. For example:


    When ready enter the pairing code below (or . to abort)
    activation code>46A9-9907-43DB-4F06
     
    Your activation code has been accepted. Please restart the HAast service to use the activated license.

    Now exit the telnet session and restart the HAast service. HAast will restart fully licensed and you are ready to use your licensed product. You can also verify the license by repeating the “license usbdongle” command, and it should indicate that the dongle has been paired to your license. For example


    [root@pbxqa17:/usr/local/haast] $ telnet 172.31.224.14 3001
    Trying 172.31.224.14…
    Connected to 172.31.224.14.
    Escape character is ‘^]’.
    HAast telnet interface on ‘PBX QA 17’
    HAast>license usbdongle
    Serial number: 3040504215618650775
    Paired: yes, on Tue Jun 14 17:52:40 2022 EDT
    Locked out: no
    HAast>

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    Yes. HAast fully supports containers. Normally HAast will run inside the container with Asterisk; however, we have seen deployments where HAast runs on the host and starts a container (containing Asterisk) on demand.

    If this is you first exposure to HAast we recommend installing HAast inside the container with Asterisk (and optionally a GUI).

    Note: Due to excessive support incidents helping customers understand and setup containers, Telium has removed support for this topic.  Customers are welcome to use containers, but the technical support team cannot answer questions about their setup, configuration, or use.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    All of the libraries and components used by HAast are IPv6 capable, and HAast is designed to accept IPv6 settings. However, due to lack of customer demand IPv6 functionality is not currently tested or certified.

    You are welcome to try IPv6 settings with HAast and everything may work. However, we do not officially support IPv6 yet. As of May 2022 we have not had any customer need IPv6 (though a few customers have inquired).

    If IPv6 is essential for your implementation Telium would undertake a (for fee) project to certify HAast (only the platform and architecture of HAast you are using). There is not enough overall demand to justify doubling the entire QA process indefinitely for IPv6.

    If you are an OEM or volume license customer please contact your account manager to discuss your needs.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    I completely understand your frustration. However, even though you have been in discussions with your CUSTOMER for 6 months you have not included Telium in your plans (you did not give TELIUM 6 months lead time, you gave us 2 weeks). The equipment you ordered today must be shipped to us internationally, setup and tested, and then shipped to you. Our professional services staff (project engineers) staff are usually booked weeks ahead.

    In the future you may wish to involve Telium in the process earlier, order equipment further in advance, and book Telium engineering time further in advance. We also recommend a 60 day burn-in period for all hardware before deployment (particularly for emergency services or mission critical systems). We are happy to do this for you, but this adds even more lead time to the project. Our VARs and integrators typically schedule projects to go live at least 90 days out to account for all of the lead times and uncertainties involved in a project. Giving Telium 2 weeks notice is just too short for what you are asking. In fairness the frustration you are experiencing is not because of Telium; it’s because something has gone wrong in the project plan well before you placed the order with Telium.

    You are always welcome to contact your account manager, or escalate to our VP Engineering or VP Sales for help. We try very hard to exceed the expectations of our customers (and we have a stellar reputation to prove it). We will always do whatever we can to help.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    You have described two very different needs in your question, so I’ll try to answer them separately. If you choose Hardware Fingerprint activation on AWS, then your license is tied to your instance ID and MAC address. So you can safely move the instance between hosts (i.e. hypervisors, not guest VM’s), change instance size, etc. The license will remain activated (tied to that instance). You can safely start/stop the instance, just don’t ever delete it or delete the NIC as that will invalidate your license.

    If you plan to have multiple AWS instances ready to start but will only use one at a time, then you should choose Cloud activation. Cloud activation is not tied to any (virtual/physical) hardware so whichever instance is running is the one that will use the license. However, do not start more than one instance at a time (i.e. don’t try to use a single license on multiple instances simultaneously) or that will invalidate your license.

    I should point out that we use a third party license product, and they have no obligation to issue a new license once an existing one has been invalidated. In other words, if you invalidate your license you will most likely have to buy an entirely new license (full price). So plan your deployment carefully to avoid wasting a license. We have no ability to “un-invalidate” a license – we are at the mercy of the license vendor, and we understand their need to prevent license fraud as that’s the only way they can stay in business.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    The standard in Linux is to leave credentials in plain text config files, and then protect the files using file permissions (owner/group/world).

    However, we realize there are some cases where even the administrator should not be aware of certain credentials so HAast includes a “key chain” feature where HAast can store certain configuration values in an encrypted file (called a keychain). Once a key (comprised of a name and value) has been added to the keychain its value cannot be viewed by the user; it can only be referenced by its name.

    To use a keychain entry in the config file replace the value with the key name prefixed with @. For example, if the config file contains:

    [peerlink]
    secret=”MySecretPassword”

    It could be replaced with

    [peerlink]
    secret=@PeerLinkSecret

    Next you should add the key to the keychain, holding the value you wish to keep hidden:

    [root@qa121]# telnet localhost 3001
    Connected to localhost.
    Escape character is ‘^]’.
    HAast telnet interface on ‘QA121’
    HAast>keychain add PeerLinkSecret
    Enter the key value exactly as you want it to be stored.
    key value>MySecretPassword
    The value associated with key name [PeerLinkSecret] has been set
    HAast>

    Then just restart the HAast service and your credentials will be protected by the keychain.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    There are a few ways to address your problem.

    First, you can limit access to the HAAst config files (or even entire /etc/xdg/telium directory) so that only the root user can read them. Using the chmod command will allow you to set these files to readonly (r – -) for root:

    chmod 400 haast.conf

    Second, you can also encrypt the password before placing it into the config file. For example, using md5sum we can generate a hash of your obvious password:

    [root@qa14 dev]# echo "MyObviousPassword" | md5sum
    7f1e7328e9c668dbc73485eecd91b7ba -

    Then you would use 7f1e7328e9c668dbc73485eecd91b7ba as your password entered into the haast.conf file on both nodes.

    Third, you can store sensitive config file information in the HAast keychain.   To use a keychain value in a configuration item simply replace the value with @KEYNAME. Applicable configuration items show @KEYNAME as an option in the documentation. Note that a KEYNAME can contain only letters, numbers, and underscore, and case of the letters is ignored.  See section 3.1 of the installation guide (as of Jan 2021) for further details of the keychain.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    No! Unlike most of the other configuration generators, FreePBX does something a little unusual. Every time you add a module (or even upgrade a module) to your system FreePBX might change the structure of the database / add tables to hold the additional data.

    So if you now sync from your primary node to your secondary node, settings would be lost because the associated tables/fields are missing on the secondary node. Conversely, if you now sync from your secondary node to your primary node, settings would be missing because the necessary source settings are absent. (See image below). This is why the HAAst installation guide and maintenance manual provide specific installation/upgrade instructions relating to FreePBX. Every year we have at least one customer that damages their FreePBX cluster because they did not follow the installation/maintenance guides.

    Similarly, updating a module might change table structure, and that’s why we say to disable any automatic updates in FreePBX. Most other configuration generators are smart enough to detect a configuration mismatch between versions/modules, but FreePBX does not and will probably break (dialplan failure) unless the two nodes are kept identical (in terms of modules enabled/installed/versions).

    FreePBX Synchronization

    Even if HAAst were to copy the metadata (table structure) as well, you would still have problems since the PHP code which makes up FreePBX will not understand the settings (if the code version doesn’t match the settings version). This may result in the PBX failing to process calls as the dialplan crashes, and/or failure to configure, and/or failing to complete an APPLY button push.

    To read more about how to properly setup your nodes with FreePBX see sections 3.6 and 10.1.5 of the Detailed Installation Guide, and sections 7 and 8 of the Maintenance and Operations Guide.

    If you have already corrupted your FreePBX setup and your cluster won’t process calls (due to dialplan fialure) see this forum post

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    HAAst is written entirely in C/C++, so it is highly efficient with a minimal footprint. Since HAAst runs on the same hardware platform as Asterisk, we cannot describe HAAst’s minimum requirements in absolute terms (since HAAst alone on a server makes no sense).

    However, if you have a properly sized server (for the target Asterisk volume), HAAst will consume:

    • Maximum 2% of available CPU
    • 400MB of memory (in use, not swapped)
    • 50MB of disk storage

    In case you meant from a hardware compatibility standpoint, HAAst can run with many different CPU’s and system boards/chipsets. Since HAAst communicates with the system board to determine health, check with our support team if you are using a non X86/X86_64 standard PC motherboard. As well, releases for non-X86/X86_64 CPU’s are targeted at specific processors for optimization/power management reasons, so please check with our support team for the specific CPU you are targeting.

    For more information see FAQ 1070

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    Since Red Hat 8 uses SystemD, the best way to delay HAAst start is with a service timer. Create the file haast.timer in the /etc/systemd/system directory with the following contents

    [Unit]
    Description=Delay HAAst start by 1 minute on bootup
    
    [Timer]
    OnBootSec=1min
    Unit=haast.service
    
    [Install]
    WantedBy=basic.target

    Then, enable the HAAst timer and disable the service:

    systemctl enable haast.timer
    systemctl disable haast.service

    And finally, in your haast.service file change the WantedBy line to read:

    [Install]
    WantedBy=haast.timer

    Next inform systemd of your changes:

    systemctl daemon-reload

    And your HAAst start will delay by 1 minute on bootup. You can adjust the delay as you need.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    You don’t mention the version of FreePBX you are running but we can guess the cause; based on the timing of your message we are aware of a particular corrupt SIP packet attack which appeared in June 2020.

    Please upgrade your SecAst to version 1.7.1 and your system will no longer be vulnerable to this attack. If you want want to send us detailed Asterisk/SecAst/Firewall logs we can help you confirm the cause and the resolution. (Please send by email, don’t post in the forum)

    Avatar photoTelium Support Group
    Participant
    Post count: 268
    in reply to: Qt_5 not defined #14335

    This error is the result of incompatibilities between the Qt library expected by SecAst, and the Qt library installed on your system (or possibly because you are missing the Qt library altogether). SecAst version 1.7.0 is built against Qt version 5.9.8, so that is the library version you should install (at this date).

    There is often a gap between the Qt version we use for a software release, and what is available across all Linux distributions / repos. (Each distribution / repo makes a slightly different version available). This problem should resolve itself once the repos catch caught up. Note that even version 5.9.8 is many releases behind the most current Qt version, so we are staying well away from leading edge.

    As of July 13 2020 the Qt library available from Ubuntu 18’s official repos is 5.9.5. If you are a customer with a SecAst maintenance agreement we can build a release for you using Qt library 5.9.5 (or whatever version you need) at no charge. If you are using the free edition you can either wait (for your repo to catch up), or install the Qt open source libraries from: http://www.qt.io/download-open-source as those will always offer the very latest libraries

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    Files with “debuglog” and “debuglog.tef” extensions contain diagnostic information to do with the operation of the services. (Eg: SecAst, HAAst, PBXsync, etc)

    Files with “debuglog” extension are plain text, and you can view them in any editor or from the command prompt using the ‘cat’ command.

    Files with “debuglog.tef” extension are binary files, (TEF stands for Telium Engineering Format). These files are read by our diagnostic tools to help diagnose a problem. You cannot view the contents of these files as you would require our engineering tools to do so.

    Avatar photoTelium Support Group
    Participant
    Post count: 268

    Many configuration generators are trying to compete with one another on secondary features – covering everything from security, faxing, messaging, email, router, SBC, security, high availability, and more. Most users disable/ignore these add-ons as they can be poorly designed or integrated (the real strength of configuration generators is in managing the Asterisk configuration files). If you are planning to use their add-ons compare each carefully to stand alone products so you know what you are getting. (You may even find that a commercial module that you are buying is just a collection of open source packages).

    Next there are more sophisticated PBX’s which use Asterisk as the media engine/call processing engine but extend the functionality using a variety of other programs. PBX’s like Amtelco’s Genesis / ISS fall into this category. Telium is also pleased to work directly with manufacturers of more sophisticated PBX’s suchs as Amtelco Genesis / ISS to ensure full compatibility and deep product integration.

    And finally there are some ‘closed’ PBX’s which are Asterisk based, but according to their vendors they are not compatible with ANY add-ons (unless sold from that same manufacturer). In reality we have helped customers install HAAst/SecAst/and many other 3rd party products onto these systems. However, we don’t want to upset these vendors so we leave it up to the customer to determine if they can/want to reset the root password and install other products. (It’s your product, so you probably have a right to modify it as you see fit). But we don’t offer any assistance that might violate the DMCA in the USA, or similar laws in other countries. (e.g. you can find instructions on how to unlock/remove vendor protections on the internet, but we can’t give those instructions to you). Also if you are an authorized vendor of such closed systems read your reseller agreement carefully; your customer can do what he wants with the PBX but you might violate your reseller agreement if you unlock the box for them.

    HAAst tries to work well with every configuration generator. We are pleased to add support for new products/databases, but we also deprecate support for little used configuration generators / databases / features. If you are a large corporation or critical call center using Asterisk directly (no configuration generator) then HAAst can fully support you as well. You don’t need a configuration generator or add-on to use HAAst, SecAst, etc.

    So if you are designing a telephony solution we recommend:

    1. Pure asterisk (no configuration generator) if you are ok doing some basic diaplan coding
    2. If you need a configuration generator pick one that is fully open source (avoid anything with ‘distro’ in the name)
    3. Use flat-files to hold config information
    4. If you need a database (or your config generator needs a database) insist on MariaDB/MySQL

    If you need to stray from this advice be sure to understand the compromises you are making

Viewing 15 posts - 16 through 30 (of 262 total)