Skip to main content

Installing Zurmo on Ubuntu Sever 14.10

Introduction

Zurmo is an Open Source Customer Relationship Management (CRM) application that is mobile, social, and gamified. It can be used to:
  • Create and Track Project progress
  • Create Customer Accounts
  • Tasks - Associate Tasks to Accounts and/or Projects
  • Customize fields of Tasks, Accounts etc.
  • Generate Reports etc.


Objective

The final objective is to install Zurmo 2.8.5 on Ubuntu Server 14.10


Assumptions

  • Fresh Install of Ubuntu Server 14.10
  • SSH enabled (sudo apt-get install ssh-server)
  • User has sudo or root privileges


Step 1: Install the Apache Webserver

sudo apt-get install apache2 -y


Step 2: Install MySQL Server

sudo apt-get install mysql-server -y


Step 3: Install PHP5

sudo apt-get install php5 -y
sudo apt-get install php5-mysql -y
sudo apt-get install php5-memcache -y
sudo apt-get install php5-curl -y
sudo apt-get install php-apc -y
sudo apt-get install php-soap -y
sudo apt-get install php5-imap -y
sudo apt-get install memcached -y
sudo apt-get install php5-gd -y
sudo apt-get install php-pear -y
sudo apt-get install php5-mcrypt phpmyadmin -y
sudo apt-get install php-net-imap -y
sudo apt-get install php-net-ldap -y


Step 4: Install aenmod

sudo a2enmod deflate


Step 5: Edit php.ini

sudo vim /etc/php5/apache2/php.ini

Edit the following in /etc/php5/apache2/php.ini

max_execution_time = 300
memory_limit = 256M
post_max_size = 20M
upload_max_filesize = 20M
date.timezone = America/Los_Angeles


Step 6: Create Symlinks, enable modules and restart Apache

sudo ln -s /etc/php5/conf.d/mcrypt.ini /etc/php5/mods-available
sudo ln -s /etc/php5/conf.d/imap.ini /etc/php5/mods-available
sudo php5enmod mcrypt
sudo php5enmod imap
sudo service apache2 restart


Step 7: Download and Install Zurmo v2.8.5

cd /var/www/html
sudo wget http://dev2.zurmo.com/downloads/zurmo-stable-2.5.8.6b325d100aff.tar.gz
sudo tar -xvzf zurmo-stable-2.5.8.6b325d100aff.tar.gz
cd /var/www/html
sudo chown root:root -R zurmo
sudo chmod 777 -R zurmo


Step 8: Configure Zurmo

Navigate to the your browser and point it to the following URL:
http://Ubuntu-Server-IP/zurmo
Replace Ubuntu-Server-IP with your own IP address.

Click on "Click to Start"


Click on "Continue"


Configure the database and hit "Install"

  • Set the "Database Admin Username" - In our case it is root
  • Set the "Database Admin Password" - Type in the password that was configured during MySQL Installation
  • Set the "Database Name" to zurmo
  • Set the "Database Username" to zurmo
  • Set the "Database Password" to anything you wish
  • Set the "Super User Password" to anything you wish


Step 9: Login using the superuser credentials


The superuser username is: super
The superuser password is: configured during installation


Comments

Post a Comment

Popular posts from this blog

Run your Meteor App on a Production Ubuntu 16.04 Server with Nginx

Introduction Meteor enables developers to create apps and quickly test them on a development webserver. Once you have created your app the big question is how to run it on a production server. In this tutorial we will demostrate how to run your Meteor app on Ubuntu 16.04 using Nginx Credits and Acknowledgements This entire post is based off this Digital Ocean article. The article was modified for issues we encountered and adapted for Ubuntu 16.04. The entire credit goes to Daniel Speichert Objective In this tutorial we will: Install and Configure Nginx with HTTPS enabled Install MongoDB Install NodeJS Bundle your Meteor App Create a startup script to automatically start your app on reboot Assumptions We assumue the following: You already have a fresh install of Ubuntu 16.04 Server SSH enabled on your fresh install You have root privelages on your server You have a different server where you can insall meteor and budle your app...

Authenticating Traefik Apps with Authentik

 Introduction In our previous post , we secured the Homer app with trusted Let's Encrypt certificates using Traefik as a reverse proxy. But what if only authorized users should access Homer? In this blog, we'll address this by adding multi-factor authentication to Homer using Authentik as an Identity Provider (IdP). Objective The core objectives of this tutorial are to: Set Up Secure Access with Authentik:  Install Authentik using Docker Compose and create your first user to manage access control. Secure Homer with Authentik:  Configure Authentik to act as a gatekeeper, ensuring only authorized users can access your Homer application. Simplify Logins with Traefik:  Integrate Traefik with Authentik to enable Single Sign-On (SSO) for a seamless login experience across your applications. Connect Homer to Authentik:  Configure Homer to leverage Authentik's authentication system for secure logins. Topology For the topology details please see the previous post ....

Traefik Install and configuration - Part 1

Introduction In this tutorial we are going to install and configure Traefik Proxy . As quoted on their website "Traefik is a leading modern reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components and configures itself automatically and dynamically." All our applications will be front-ended by traefik. Objective The core objective for this tutorial is to: Configure an A record in our DNS server (pfsesne firewall) to point to our traefik proxy Configure and install Traefik in docker Configure and install two http based applications ( homer and heimdall ) in docker that will be accessed via traefik Topology The above image represents our topology. Our pfsense firewall is connected directly to the Internet and is NAT'ing all traffic from the internal network to the outside world. We have a single LAN segment (192.168.11.0/24) defined on pfsense and we have the following two PC's connected d...