OP5 Monitor

Fundamentals

About OP5 Appliance System

OP5 Appliance System uses CentOS 6 as the operating system. CentOS is an enterprise-class Linux distribution derived from Red Hat Enterprise Linux sources. This means that CentOS 6 is binary compatible with Red HatEnterprise Linux 6. The OP5 Appliance System contains a basic but minimal CentOS server installation as a base. On top of that we add common tools and applications needed by OP5 Appliance System products. The OP5 Appliance System also contains a number of custom-made tools and applications.

All applications are distributed as RPM packages, and made available to customers on the ITRS Support site and in our yum repositories.

System access

There are three ways to access an OP5 Appliance System system:

  1. Direct access to the console by connecting a monitor and a keyboard.
  2. Using SSH.
  3. By HTTPS using a standard web browser.

The portal page

The third way, HTTPS access, is used to access the OP5 Monitor product and portal page. You can use the portal page to configure your system, gather information about installed software, and retrieve information regarding new patches from ITRS Support web. You can reach the portal by directing your web browser to OP5 Monitor, https://<server-address>. The portal page also contains links to any installed OP5 Appliance System products.

Note: The portal page is only available on Red Hat Enterprise Linux version 6.

Console and SSH access

To use SSH, you must install SSH client software on your computer. Most Linux distributions come with an SSH client, and there are several SSH clients available free of charge for Windows.

We recommend PuTTY, which you can find on the PuTTY website.

You need to access the system through the console or SSH to install upgrades and patches.

System accounts

To change the configuration of OP5 Appliance System, you need to log on. The root account is the superuser of the system and equal to the Administrator account in Windows.

The default password for user root is monitor. You need to change the root password as soon as possible after installation, to block unauthorised access.

Note that when you are logged on to the system as root, you have the power to wipe the system out, so we recommend you take a backup before performing any changes. For more information about backups, see Back up the system.