Session log: GuruRMM installer fixes, agent deploy, feature roadmap

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
2026-04-02 19:09:19 -07:00
parent 7485d8b230
commit 3f53e167ab
2 changed files with 115 additions and 4 deletions

View File

@@ -14,7 +14,12 @@ Tracked list of desired features, improvements, and changes. Used to evaluate wh
| D2 | Dark theme with branded sidebar | High | Done | JetBrains Mono + Plus Jakarta Sans, GURURMM MISSION CONTROL branding |
| D3 | Command cancel/delete/clear history | Medium | Done | Cancel pending/running, delete any, bulk clear finished |
| D4 | Global search across all agent details | High | Open | Search by hostname, MAC, IP, OS, version -- any agent field. Dashboard main page. |
| D5 | | | | |
| D5 | Clickable metric cards on agent detail -> drill-down views | High | Open | CPU card -> process list sorted by CPU%. Memory card -> process list sorted by RAM. Disk card -> drive/folder usage breakdown. Sortable tables. |
| D6 | Real-time terminal (PS/cmd) via WebSocket tunnel | High | Open | Interactive shell session relayed through server. Separate from check-in process. Spawns on demand, full bidirectional I/O. |
| D7 | Remote file system browser | High | Open | Browse, upload, download, rename, delete files on agent. Tree view + detail pane. Via real-time tunnel. |
| D8 | Remote registry editor (Windows) | Medium | Open | Browse/edit/create/delete registry keys and values. Tree view like regedit. Via real-time tunnel. |
| D9 | Remote services manager | High | Open | List all services with status. Start/stop/restart/disable/enable/edit startup type. Sortable, searchable. Via real-time tunnel. |
| D10 | | | | |
## Agent / Installer
@@ -23,8 +28,10 @@ Tracked list of desired features, improvements, and changes. Used to evaluate wh
| A1 | Site-code-based installers (no API keys) | High | Done | /install/:site_code/* endpoints, binary with embedded config |
| A2 | Public shareable install links per client | High | Done | Landing page at /install/:site_code with OS detection |
| A3 | Capture full OS detail (distro/version) | High | Open | Linux agents just report "linux" -- should capture distro name and version (e.g., Ubuntu 22.04, Debian 12). Agent-side change to collect, server-side to store/display. |
| A4 | | | | |
| A4 | | | | |
| A4 | Reliable CPU/GPU temperature collection | High | Open | Not working on any machine currently. Windows: WMI/OpenHardwareMonitor/LibreHardwareMonitor. Linux: lm-sensors/sysfs thermal zones. Need fallback chain. |
| A5 | Process list collection (CPU%, RAM, disk I/O) | High | Open | Needed for D5 drill-downs. Agent collects top processes, sends on demand or as part of extended state. |
| A6 | Disk usage detail (per-drive, large folders) | Medium | Open | Needed for D5 disk drill-down. Per-partition usage + optional large folder scan. |
| A7 | | | | |
## Server / API
@@ -34,7 +41,10 @@ Tracked list of desired features, improvements, and changes. Used to evaluate wh
| S2 | Stackable/inheritable policy system | High | Open | Policies at Company > Site > Machine levels. Lower level overrides higher. Merge behavior for non-conflicting settings. |
| S3 | Dynamic groups based on agent attributes | High | Open | Rule-based groups (e.g., RAM <= 8GB, OS = Windows 10, disk > 90%). Policies can target dynamic groups. |
| S4 | Policy actions: custom script execution | High | Open | Policies can trigger scripts (PowerShell/bash) on matching agents. Scheduled or on-demand. |
| S5 | | | | |
| S5 | Customizable alerting system | High | Open | User-defined alert rules: offline detection, disk space thresholds, SMART errors, RAID degradation, bad sectors, CPU/RAM sustained high, temp thresholds. Configurable severity, notification channels, escalation. |
| S6 | Alert notification channels | Medium | Open | Email, webhook, Slack/Teams integration, push notifications. Per-alert-rule routing. |
| S7 | Real-time tunnel mechanism (separate from check-in) | High | Open | On-demand WebSocket tunnel between tech's browser and agent for interactive tools. Multiplexed channels for terminal, file browser, registry, services. Low latency, not tied to metrics interval. |
| S8 | | | | |
## Infrastructure / Operations

View File

@@ -0,0 +1,101 @@
# GuruRMM Session Log - 2026-04-02
## Session Summary
Continued GuruRMM development. Fixed installer issues, built feature roadmap, and tested agent deployment on local machine (DESKTOP-0O8A1RL).
### Accomplishments
1. **Fixed Windows installer self-copy failure** - Agent binary was downloaded directly to Program Files, then `install` tried to copy the running exe onto itself. Fixed by downloading to `%TEMP%` first.
2. **Fixed install script service start timing** - Service wasn't ready immediately after install. Added 3-retry loop with `Start-Service` SCM API instead of shelling out.
3. **Fixed agent `status` config path** - `status` command looked for `agent.toml` in CWD instead of `C:\ProgramData\GuruRMM`. Added fallback to CONFIG_DIR.
4. **Tested real agent deployment** - Successfully installed agent on DESKTOP-0O8A1RL via `irm` one-liner. Agent connected to server, shows online in dashboard under "Mike's Car" site (GREEN-OCEAN-5222).
5. **Created feature roadmap** - `projects/msp-tools/guru-rmm/ROADMAP.md` with comprehensive feature tracking for evaluating current codebase vs rewrite.
### Git Commits (gururmm repo)
| Commit | Description |
|--------|-------------|
| a89d2dd | fix: Download agent to temp before install to avoid self-copy failure |
| 32147a6 | fix: Install script start retry loop + status config path fallback |
### Credentials (unchanged from previous session)
- **GuruRMM Server SSH:** guru@172.16.3.30 (vault: `infrastructure/gururmm-server.sops.yaml`)
- **GuruRMM Dashboard:** admin@azcomputerguru.com / GuruRMM2025
- **GuruRMM DB:** PostgreSQL 172.16.3.30:5432, db `gururmm`, user `gururmm`
- **NPM:** mike@azcomputerguru.com / r3tr0gradE99\! (172.16.3.20:7818)
- **Cloudflare API Token:** U1UTbBOWA4a69eWEBiqIbYh0etCGzrpTU4XaKp7w
### Infrastructure
- **DESKTOP-0O8A1RL** now has GuruRMM agent installed and running
- Service: GuruRMMAgent (auto-start, LocalSystem)
- Config: C:\ProgramData\GuruRMM\agent.toml
- Binary: C:\Program Files\GuruRMM\gururmm-agent.exe
- Site: Mike's Car (GREEN-OCEAN-5222)
- Reports as: windows 11 (26200), online
### Agents in System (5 total)
| Hostname | OS | Status | Site |
|----------|-----|--------|------|
| AD2 | windows 10 (14393) | online | AZ Computer Guru - Main Office |
| gururmm | linux 22.04 | online | AZ Computer Guru - Main Office |
| DESKTOP-0O8A1RL | windows 11 (26200) | online | Mike's Car |
| SL-SERVER | linux unknown | online | Scileppi Law Firm - Main Office |
| SL-SERVER | linux unknown | offline | Scileppi Law Firm - Main Office |
### Sites (5 total now)
| Client | Site | Code |
|--------|------|------|
| AZ Computer Guru | Main Office | SWIFT-CLOUD-6910 |
| Glaztech Industries | SLC - Salt Lake City | DARK-GROVE-7839 |
| Scileppi Law Firm | Main Office | WEST-MEADOW-9025 |
| Valley Wide Plastering | Main Office | INNER-TIGER-8330 |
| Mike's Car (new) | ? | GREEN-OCEAN-5222 |
### Feature Roadmap Summary
Full roadmap at `projects/msp-tools/guru-rmm/ROADMAP.md`. Key items added:
**Dashboard/UI:**
- D4: Global search across all agent details
- D5: Clickable metric cards -> drill-down views (process list, disk usage)
- D6: Real-time terminal (PS/cmd) via WebSocket tunnel
- D7: Remote file system browser
- D8: Remote registry editor (Windows)
- D9: Remote services manager
**Agent:**
- A3: Full OS detail (distro/version) for Linux
- A4: CPU/GPU temperature collection (not working on any machine)
- A5: Process list collection
- A6: Disk usage detail
**Server:**
- S2: Stackable/inheritable policy system (Company > Site > Machine)
- S3: Dynamic groups based on agent attributes (e.g., RAM <= 8GB)
- S4: Policy actions with custom script execution
- S5: Customizable alerting system (offline, disk, SMART, RAID, thresholds)
- S6: Alert notification channels (email, webhook, Slack/Teams)
- S7: Real-time tunnel mechanism for interactive tools
### Pending / Next Steps
1. **Build planning session** - User wants to evaluate whether current codebase supports the roadmap or needs a rewrite
2. **Agent data collection expansion** - SMART data, RAID status, process lists, disk detail, temps
3. **Real-time tunnel architecture** - Separate from check-in WebSocket, multiplexed channels
4. **Policy system design** - Inheritance model, dynamic groups, script execution
5. **More roadmap items** - User indicated "a TON more things" to add
### Session ID
```
41cb8b1a-6546-48f6-a37e-5223e9f2bbae
```