Skip to content

Linux Agent Installation

This guide covers installing the SlimRMM agent on Linux systems.

Supported Distributions

  • Debian 11, 12
  • Ubuntu 20.04, 22.04, 24.04
  • RHEL 8, 9
  • CentOS Stream 8, 9
  • Fedora 38+
  • Arch Linux
  • Alpine Linux

Prerequisites

  • Root or sudo access
  • Network access to SlimRMM server (HTTPS/443)
  • systemd (most modern distributions)

Quick Installation

bash
# Download agent
curl -L -o slimrmm-agent https://your-server.com/api/v1/download/agent/linux-amd64

# Make executable
chmod +x slimrmm-agent

# Install with auto-approval
sudo ./slimrmm-agent --install \
  --server https://your-server.com \
  --token YOUR_ENROLLMENT_TOKEN

Manual Approval

bash
# Install without token
sudo ./slimrmm-agent --install \
  --server https://your-server.com

# Agent will be in PENDING state
# Approve in dashboard: Admin → Pending Agents

Architecture-Specific Downloads

ArchitectureDownload Path
x64 (amd64)/api/v1/download/agent/linux-amd64
ARM64/api/v1/download/agent/linux-arm64
bash
# For ARM64 (Raspberry Pi, AWS Graviton, etc.)
curl -L -o slimrmm-agent https://your-server.com/api/v1/download/agent/linux-arm64

Package Manager Installation

Debian/Ubuntu (.deb)

bash
# Download package
curl -L -o slimrmm-agent.deb https://your-server.com/api/v1/download/agent/linux-amd64.deb

# Install
sudo dpkg -i slimrmm-agent.deb

# Configure
sudo slimrmm-agent --configure \
  --server https://your-server.com \
  --token YOUR_ENROLLMENT_TOKEN

# Start service
sudo systemctl enable --now slimrmm-agent

RHEL/CentOS (.rpm)

bash
# Download package
curl -L -o slimrmm-agent.rpm https://your-server.com/api/v1/download/agent/linux-amd64.rpm

# Install
sudo rpm -i slimrmm-agent.rpm

# Configure
sudo slimrmm-agent --configure \
  --server https://your-server.com \
  --token YOUR_ENROLLMENT_TOKEN

# Start service
sudo systemctl enable --now slimrmm-agent

Service Management

systemd Commands

bash
# Check status
sudo systemctl status slimrmm-agent

# Start/Stop/Restart
sudo systemctl start slimrmm-agent
sudo systemctl stop slimrmm-agent
sudo systemctl restart slimrmm-agent

# Enable at boot
sudo systemctl enable slimrmm-agent

# View logs
sudo journalctl -u slimrmm-agent -f

# View last 100 lines
sudo journalctl -u slimrmm-agent -n 100

Service File Location

/etc/systemd/system/slimrmm-agent.service

ini
[Unit]
Description=SlimRMM Agent
After=network.target

[Service]
Type=simple
ExecStart=/usr/local/bin/slimrmm-agent
Restart=always
RestartSec=10
User=root

[Install]
WantedBy=multi-user.target

Configuration

Configuration File

Location: /var/lib/slimrmm/.slimrmm_config.json

json
{
  "server": "https://your-server.com",
  "uuid": "550e8400-e29b-41d4-a716-446655440000",
  "mtls_enabled": true,
  "log_level": "info"
}

Certificate Storage

mTLS certificates are stored in:

  • /var/lib/slimrmm/cert.pem
  • /var/lib/slimrmm/key.pem

Firewall Configuration

UFW (Ubuntu)

bash
# Allow outbound HTTPS
sudo ufw allow out 443/tcp

firewalld (RHEL/CentOS)

bash
# Outbound is typically allowed by default
sudo firewall-cmd --permanent --add-service=https
sudo firewall-cmd --reload

Proxy Configuration

If agents are behind a proxy:

bash
# Set proxy before installation
export HTTPS_PROXY=http://proxy.example.com:8080

# Install agent
sudo -E ./slimrmm-agent --install ...

Proxy Limitations

The proxy must support WebSocket connections and should not terminate TLS (use pass-through mode).

Uninstallation

bash
# Stop service
sudo systemctl stop slimrmm-agent
sudo systemctl disable slimrmm-agent

# Remove files
sudo rm /usr/local/bin/slimrmm-agent
sudo rm /etc/systemd/system/slimrmm-agent.service
sudo rm -rf /var/lib/slimrmm

# Reload systemd
sudo systemctl daemon-reload

Troubleshooting

Agent Won't Start

bash
# Check logs
sudo journalctl -u slimrmm-agent -n 50

# Verify configuration
cat /var/lib/slimrmm/.slimrmm_config.json

# Test connectivity
curl -I https://your-server.com/health

Connection Refused

bash
# Check firewall
sudo ufw status
sudo firewall-cmd --list-all

# Test port
nc -zv your-server.com 443

Certificate Errors

bash
# Check certificate validity
openssl x509 -in /var/lib/slimrmm/cert.pem -noout -dates

# Verify CA
openssl verify -CAfile /var/lib/slimrmm/ca.pem /var/lib/slimrmm/cert.pem

Debug Mode

bash
# Run in foreground with debug
sudo slimrmm-agent --debug

Released under the MIT License.