How to install Ubiquiti UniFi controller on the cloud

Recently I replaced my wireless router, an Asus RT-AC66U, with an Ubiquiti EdgeRouter X router and Ubiquiti UAP-AC-LR access point. Both of which are a HUGE step up over traditional consumer wireless routers.

The Ubiquiti access points use software called the Ubiquiti UniFi controller to configure and control the access points which can be installed locally or in the cloud – allowing you to manage the access points no matter where they are located.

To automate the install process, I created a simple script to deploy the Ubiquiti UniFi Controller in the cloud on a Ubuntu server, and have also tested the script on three popular VPS providers: Linode, Vultr, and DigitalOcean – all three worked perfectly!

Linode would be my first choice as they offer the best performance and with 1CPU and 2GB RAM you’ll have more than plenty of resources to run Ubiquiti UniFi Controller and manage many sites and access points.

If you have a small deployment, Vultr would easily be my choice with 1CPU and 768MB RAM! All three providers also cost less than AWS and Azure.

For my deployment I went with Linode as I plan on using it to control not only my home access points but to control the access points of customers and family as well.

Lets begin…

Create a cloud server for the UniFi Controller

  1. First step is to create your Linode node and to do so simply select your node size and location and click on “Add this Linode!“.
    Create Linode node
  2. Next click on “Dashboard“.
    Linode node dashboard
  3. We need to deploy an operating system on our new node so click on “Deploy an Image“.
    Deploy image on Linode node.
  4. For image type select “Ubuntu 16.04 LTS” and set your root password then click on “Deploy“.
    Deploy Ubuntu image on node.
  5. Wait until the three Host Job Queues are complete (initial config, disk create, and file system create) and then click on “Boot“.
    Boot Ubuntu node

Your new node is now built and ready to have the Ubiquiti UniFi controller installed onto it.

Install Ubiquiti UniFi Controller on Ubuntu

While the Ubiquiti UniFi controller install process is pretty easy, I’ve tried to make the process even easier by scripting it. It’s now as simple as running one single command.

The script is hosted on GitHub (unifi-autoinstall) and I strongly urge everyone to view the source and inspect it before running it as it’s never good practice to blindly run scripts. So with that lets get started…

  1. SSH into your new Linode node using PuTTy or Terminal and type the following command and press Enter to download the script to your server.
    wget https://raw.githubusercontent.com/miketabor/unifi-autoinstall/master/install.sh

    wget unifi-autoinstall script from GitHub

  2. Next lets view the script to see what it does by typing the following:
    less install.sh

    less install.sh unifi script

  3. You can now view the contents of the UniFi autoinstall script, install.sh. Once you’ve viewed it you can press q to exit and continue on.
    Less output of Unifi install.sh
  4. Now lets actually run the script. Type the following to start the script to auto configure the firewall, Fail2ban and install the Ubiquiti UniFi Controller.
    sudo bash install.sh

    sudo bash install unifi script

  5. When the script finishes, typically less than 1 minute, you’ll see a message letting you know it’s finished and to log into your new UniFi controller by going to: https://<SERVER_IP>:8443
    UniFi-autoinstall install completed.

That’s it! The Ubiquiti UniFi Controller is now ready to for use. Now go ahead and go to https://<SERVER_IP>:8443 and finish the UniFi Controller wizard. Finally, beefore we move on to far I wanted to quickly explain what exactly the script is doing.

  • First it updates all the packages on Ubuntu.
  • Configures UFW to allow only SSH and the needed Ubiquiti UniFi ports (per ubiquiti documentation)
  • Installs latest version 5 UniFi controller and its dependencies.
  • Finally installs Fail2Ban and configures it to protect SSH (default) as well as the UniFi login page!

Now lets discover and register the new access points to the UniFi controller.

How to register access points to UniFi controller in the cloud

The last step is to register the access point(s) with the UniFi Controller on the cloud, in this case Linode.

  1. Open the Ubiquiti Discovery Tool or use the Ubiquiti Chrome extension.
  2. Typically right away the discovery tool will find all the access points on your local network. Next to the one you want to register with the UniFi controller click on “Action“.
    Ubiquiti discovery tool.
  3. In the Actions drop down set to “Set Inform” and change the Inform URL to: https://<UniFi_Server_IP–OR–FQDN>:8080/inform
    Inform UniFi of access point.
  4. Now go to your UniFi Controller and the Ubiquiti access point should be listed and awaiting your action. Click on Adopt.
    Adopt access point on UniFi controller

That’s it! That completes setting up a Ubiquiti UniFi controller in the cloud and registering your access point with the new UniFi controller. The only steps left would be to setup your SSID, policies, additional sites, and so on.

Hope this helps and enjoy!

Lets hear from you

Got an idea how to make this process even better, share your thoughts below in the comments!

Similar Posts

  • How to add Realtek R8168 to ESXi 5.5 Update 2 ISO

    Realtek

    Over the past weekend I was working on a whitebox ESXi host and wanted to upgrade it to ESXi 5.5 Update 2 from an older version of ESXi 5.1 using a realtek R8168 network card. While I could have performed an in place upgrade, such as via command line, a clean install was preferred. However, VMware has removed a number of NIC drivers from ESXi 5.x and trying to install with the base ESXi image would result in a “No Network Adapters” error during install.

    In order to do a clean install you have to re-add the Realtek R8168 NIC drivers back into the ESXi 5.5 image, otherwise a NIC will not be found and thus ESXi will not install. These are the steps to easily re-add the Realtek R8168 drivers into ESXi 5.5 ISO by making a custom ESXi 5.5 image.

    Read More “How to add Realtek R8168 to ESXi 5.5 Update 2 ISO”

  • How to enable SSH auto login on Ubiquiti EdgeRouter X

    edgerouter ssh key auto login

    SSH key authentication not only provides a more convenient way to logging into your EdgeRouter X, but is also more secure because the private key replaces the need of a password and thus is typically more difficult to brute force.

    The below steps will show how to generate a SSH key, add it to the router, and then disable password authentication so that only the key-pair can be used to login.

    Read More “How to enable SSH auto login on Ubiquiti EdgeRouter X”

  • Synology DSM 5.1-5021 update released

    Synology

    Synology released DSM 5.1-5021 update as well as Cloud Station 3.1-3320 today. This update includes all the updates since 5.1-5004 as well as fixes for a number of vulnerabilities in PHP, OpenVPN, and other security improvements. DSM 5.1-5004 also improves Amazon S3 backup stability along with a number of other fixes and improvements.

    Read More “Synology DSM 5.1-5021 update released”

  • Crucial 16GB memory, perfect for Intel NUC

    crucial 16gb 204pin memory

    I’m a huge fan the of Intel NUC‘s for a VMware home lab. In fact I just recently picked up my third Intel NUC to give me more head room for a small VMware Horizon (View) environment at home.

    I typically use G.Skill memory in my NUC’s as I’ve had great luck with the brand in my desktop and laptop for years. However G.Skill has been increasing in price which made me look around for alternatives and came across Crucial DDR3 204-pin memory for less money, but days after I purchased it they too went up in price. However they are now back on sale and cost about $50 less then the G.Skill memory I have been using in my first two NUC’s.

    I’ve been using the Crucial memory now for the last several months without any problems and even though they are rated at a lower voltage I can’t say I really see any difference in power savings or consumption compared to the G.Skill 1.5V. If you’re looking to upgrade now might be a good time to take advantage of the sale price.

  • Install Synology NFS VAAI Plug-in for VMware

    Synology

    In the recent DSM update (5.1), Synology added VMware VAAI support for NFS volumes using two primitives which are Full File Clone and Reserve Space. What do these VAAI primitives offer?

    • Full File Clone enables virtual disks to be cloned by the NAS albeit while the machine is powered off.
    • Reserve Space allows you can create a thick VMDK file. However Reserve Space does not off-load the work to the array. The benefit of thick VMDKs is that many use eager-zero for high I/O performance needs.

    On the Synology side of things you just need to update to DSM 5.1, but in order to take advantage of VAAI you still need to install the VIB plugin on your ESXi 5.5 hosts.

    Read More “Install Synology NFS VAAI Plug-in for VMware”

  • VMware ESXi 5 home lab upgrade

    In the past I’ve been using a single server to run my VMware ESXi home lab. it was slow, old, big and loud. I’ve been meaning to upgrade my home lab for a while and just never got around to it, until now! When looking for new hardware I wanted the servers to be as compact as possible, quiet, and low energy usage as possible while still having some horsepower.

    I debated on going the whitebox solution as I build all my own desktops anyway, I also looked at several other solutions such as the HP ML310e server, Shuttle XH61V barebones machine, but ultimately decided to go with two Intel NUC i5’s.

    Intel NUC i5 and 16GB ram

    Intel NUC i5 DC53427HYE Features:

    • Uses very little energy
    • Completely quiet
    • Supports up to 16GB RAM
    • A dual core CPU that scores nearly 3,600 in PassMark benchmarking
    • Includes vPro which allows me to easily run both NUC’s headless
    • Extremely small, nearly 4 1/2″ inch square footprint

    Read More “VMware ESXi 5 home lab upgrade”

Leave a Reply to Michael Cancel reply

Your email address will not be published. Required fields are marked *

24 Comments

  1. Did you really just suggest I randomly curl straight into bash from a shortened URL?

    I mean, I looked at the script, it was fine. But come on bud. Don’t do that.

    1. bob, I angered the bash gods for sure and have corrected my mistake. Please refresh the page and the CORRECT way of loading this script has been added. :)

      Thanks for the comment!

      -Michael

  2. i followed your guide from “Install Ubiquiti UniFi Controller on Ubuntu” , as i used cloudatcost services and unifi 5.2.9 is running and it sees the UAP when i click adopt it shows adopting for a few minutes then shows disconnected, the UAP is connected to an edgerouter x inside of my ISP router , is there ports i need to open

      1. Yes it’s a edge router behind my ISP router, I got it working, was not issuing the inform command the second time after I was selecting adopt, thanks for your help

  3. Nice, I have been looking for a way to tie fail2ban in with web login. I had to add a few things to make it work for me though. I was getting a couple errors upon restarting Fail2Ban.

    “Failed during configuration: Bad value substitution: section: [ubiquiti] option : action key : port rawval : “, protocol=”%(protocol)s”, chain=”%(chain)s”]”
    So for this, I added ‘port=8443′ in my jail.local file under the Ubiquiti chain.

    After specifying the port and restarting Fail2Ban I was given a warning, “ignoreregex’ not defined in ‘definition'”
    I added ‘ignoreregex=’ to /etc/fail2ban/filter.d/ubiquiti.conf

    All is well now I think. Please let me know if you think I should change the way I set Fail2Ban. Was your instance not throwing any errors?

    1. Frank,

      Thanks for the suggestions. What OS did you install this on? I did not have any errors during my setup nor am I having any issues with Fail2Ban blocking failed attempts.
      -Michael

      1. Michael,

        I installed on Ubuntu 14.04.5 LTS. I had everything already installed except the the ubiquiti F2B chain. So I essentially just used line 42-47 of your script to set that up. I’m horrible with regular expressions. If I would have ever tried to set that up, it probably would have taken me a month to do so. I think your script is the only one out there that adds the ubiquiti chain to F2B. Without that in place somebody could try to brute force, 24 hrs a day, 7 days a week, until cracked. If anybody is reading this and wondering if they might need F2B installed with the ubiquiti chain, don’t wonder too long! I’m very thankful for your post.

        This is what my configuration looks like:

        /etc/fail2ban/jail.local
        [ubiquiti]
        enabled = true
        filter = ubiquiti
        logpath = /usr/lib/unifi/logs/server.log
        maxretry = 3
        bantime = 31557600
        findtime = 900
        port = 8443,8080

        /etc/fail2ban/filter.d/ubiquiti.conf
        [Definition]
        failregex =^.*Failed .* login .* *s*$
        ignoreregex =

      2. @frankabbot:disqus I’m not a security guru but do I do have an interest it in so things like this script above I try to be at least a little security conscious.

        I’m glad the Fail2Ban is working fine for you as well. I’ve had little to no problem with people trying to brute force my UniFi controller but it’s nice knowing there’s an extra layer of protection there. ;)

        -Michael

    1. @Propupul,

      I’ve modified the UFW rule that’s part of the install script above and instead entered the following:

      sudo ufw allow from 1.2.3.4 to any port 22

      Replacing 1.2.3.4 with your IP address. Now the firewall will only allow SSH (port 22) connections from that IP address!

      Hope this helps.

  4. hello, thanks for this script. Just copied the fail2ban part to add to my already running unifi controller. I been waiting for a good minute on ubiquiti to add some kind of 2 factor authentication to unifi . I really wonder how many people use their controller in the cloud with this lack of security login ! The same for the aircontrol server. do you think you could provide me the fail2ban configuration for it ? thanks

  5. thanks for the post.
    question for you. i ran the script but i keep getting this error. what’s the work around here if you encourted it.

    thanks,

    [ubiquiti]
    enabled = true
    filter = ubiquiti
    logpath = /usr/lib/unifi/logs/server.log
    maxretry = 3
    bantime = 3600
    findtime = 900
    port = 8443
    banaction = iptables[name=ubiquiti, port=8443, protocol=tcp]
    Job for fail2ban.service failed because the control process exited with error code. See “systemctl status fail2ban.service” and “journalctl -xe” for details.
    JSVC_EXTRA_OPTS=”$JSVC_EXTRA_OPTS -Xss1280k”

  6. Hi , Thanks for the script , everything works great, but I cant access the unifi web console , It says that the IP refusses the connection.

    I am using LINODE

      1. my issue was same with Jorge :

        [ubiquiti]
        enabled = true
        filter = ubiquiti
        logpath = /usr/lib/unifi/logs/server.log
        maxretry = 3
        bantime = 3600
        findtime = 900
        port = 8443
        banaction = iptables[name=ubiquiti, port=8443, protocol=tcp]

        Job for fail2ban.service failed because the control process exited with error code. See “systemctl status fail2ban.service” and “journalctl -xe” for details.
        JSVC_EXTRA_OPTS=”$JSVC_EXTRA_OPTS -Xss1280k”

  7. Hello,
    Thanks for the procedure. I have the Linode running smoothly on Ubuntu 16.04 LTS, the install script successfully completed displaying “Access controller by going to https://:8443“. However, when I try to connect to “https://XXXX:8443” with both Chrome or Firefox, using my specific Linode IP address, the connection is refused. What happens? Any idea how I can debug this glitch? Thank you for your insights.