Solved

Asterick 13 software install

Posted on 2015-01-28
13
323 Views
Last Modified: 2015-02-05
I am installing Asterick 13 on Red Hat Enterprise Linux 2.6.32-431.23.3 on a CLOSED network.
So far I have unzipped and tarred the software. I run ./configure and generates the error below.
What causes this?
 [root@server ~]# cd /usr/local/src
[root@server src]# tar -zxvf asterisk-13-current.tar.gz

[root@server src]# cd /usr/local/src/ asterisk-13.1.0
[root@server asterisk-11.X.Y]# ./configure
Configure error: *** uuid support not found (this typically means the uuid development package is missing)
0
Comment
Question by:gumball60
  • 7
  • 6
13 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 40576123
Chuck the speling...

Add epel repository and install asterisk...
0
 

Author Comment

by:gumball60
ID: 40577095
I ran contrib/scripts/install-prereq install
(These packages below where unavailable)  I have a host that is NOT connected to the internet,
I have another/separate  system that connects to the internet......WHERE can I download these files?
Spansp-devel
Freetds-devel
Iksemel-devel
Libsqlite3x-devel
Portaudio-devel
Libresample-devel
Gmime22-devel
Jack-audio-connection-kit-devel
Jansson-devel
Libsrtp-devel
Pjproject-devel
0
 
LVL 61

Expert Comment

by:gheist
ID: 40577301
Configure EPEL repository and install asterisk without turning your machine in a build barn.
0
 

Author Comment

by:gumball60
ID: 40578256
Got Asterisk installed... I have two text files for Asterisk. Now trying to find where to placethe sip.conf and entension.conf files.
How/where do configure Asterisk with pre-set configuration files (Sip.con and entension.conf)
0
 
LVL 61

Expert Comment

by:gheist
ID: 40578365
Most likely in /etc/asterisk...
man whatever.conf
should more or less describe the file and format.
0
 

Author Comment

by:gumball60
ID: 40578762
one last question....When I run /etc/init.d/asterisk status ....I receive this  error....Asterisk dead but subsys locked
I have /etc/init.d/asterisk stop and started with no success.
I have google this and have found no solution,,,any ideas?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 61

Expert Comment

by:gheist
ID: 40578766
it should tell something in /var/log/asterisk*
0
 

Author Comment

by:gumball60
ID: 40580134
nothing obvious in the /var/log/messages on asterisk server.
 It is giving me this error  /etc/init.d/asterisk status ......Asterisk dead but subsys locked

anything in particular that I should look for,  there are indications of failure or trouble in the logs?
0
 
LVL 61

Expert Comment

by:gheist
ID: 40580325
remove /var/lock/subsys/asterisk
then try again
0
 

Author Comment

by:gumball60
ID: 40581791
I will try this on Monday.....Has anyone resolved successfully "Asterisk dead but subsys locked"?  

I have seen a lot internet communications about this system failure, but no one mentioned that they succeeded. I have unsuccessfully tried many of those attempts...just curious.
0
 
LVL 61

Accepted Solution

by:
gheist earned 500 total points
ID: 40582157
Yes, delete subsystem lock and start it...
0
 

Author Comment

by:gumball60
ID: 40591750
It worked!
0
 
LVL 61

Expert Comment

by:gheist
ID: 40592645
Learn to use init.d scripts and service. "kill" leaves them out of sync.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now