Linux
- x86_64 (64-bit) only
- systemd required
- RHEL, Ubuntu, Debian, etc.
If your network requires an HTTP proxy for outbound connections, the collector natively supports standard proxy environment variables for all egress traffic.
| Variable | Description | Example |
|---|---|---|
HTTPS_PROXY | Proxy for HTTPS traffic (used for all collector communication) | http://proxy.corp.com:8080 |
HTTP_PROXY | Proxy for plain HTTP traffic | http://proxy.corp.com:8080 |
NO_PROXY | Comma-separated list of hosts to bypass the proxy | localhost,127.0.0.1,.internal.corp |
Authenticated proxies are supported using the format http://user:password@proxy.corp.com:8080.
Add the proxy variables to the collector environment file on the target machine. Each line uses KEY=value format.
HTTPS_PROXY=http://proxy.corp.com:8080 NO_PROXY=localhost,127.0.0.1 /etc/default/licenseware-collectorHTTPS_PROXY=http://proxy.corp.com:8080 NO_PROXY=localhost,127.0.0.1 /usr/local/etc/licenseware-collectorHTTPS_PROXY=http://proxy.corp.com:8080 NO_PROXY=localhost,127.0.0.1 C:\ProgramData\Licenseware\collector.envCorporate proxies that perform TLS inspection inject their own CA certificate into the chain. The collector must be configured to trust these certificates, otherwise all HTTPS connections will fail.
| Option | Description | Example |
|---|---|---|
CA_CERT_PATH | Environment variable pointing to a PEM file with additional CA certificates | /etc/ssl/corp-ca.pem |
--ca-cert | CLI flag (overrides CA_CERT_PATH when set) | --ca-cert /etc/ssl/corp-ca.pem |
Custom certificates are appended to the system certificate pool, not replacing it. All standard system CAs remain trusted.
Add the CA_CERT_PATH variable to the collector environment file, pointing to the PEM file containing your corporate CA certificate(s).
CA_CERT_PATH=/etc/ssl/certs/corp-ca.pem /etc/default/licenseware-collectorCA_CERT_PATH=/usr/local/etc/ssl/corp-ca.pem /usr/local/etc/licenseware-collectorCA_CERT_PATH=C:\ProgramData\Licenseware\corp-ca.pem C:\ProgramData\Licenseware\collector.envAll communication uses HTTPS with Bearer token authentication.
| Method | Endpoint | Purpose | Frequency |
|---|---|---|---|
| POST | /agent/register | Register agent | Once |
| GET | /agent/configs | Fetch configs | Every 30m |
| GET | /agent/catalogs | Get catalogs | Every 30m |
| POST | /agent/ingest | Upload data | Cyclical |
What You Do
What the Collector Does
Comprehensive system, hardware, and software inventory collection
| Data Collected | Linux | Windows | macOS |
|---|---|---|---|
| System Info (hostname, CPU, RAM) | ✓ | ✓ | ✓ |
| Installed Programs | ✓ | ✓ | ✓ |
Software usage patterns and execution history
| Data Collected | Linux | Windows | macOS |
|---|---|---|---|
| Execution History (Prefetch, BAM, Access Times) | ✓ | ✓ | ✓ |
Running processes, services, and active sessions
| Data Collected | Linux | Windows | macOS |
|---|---|---|---|
| Running Processes & Active Users | ✓ | ✓ | ✓ |
/usr/local/bin/licenseware-collector /etc/systemd/system/licenseware-collector.service /etc/default/licenseware-collector C:\ProgramData\Licenseware\LicensewareCollector.exe C:\ProgramData\Licenseware\collector.env /usr/local/bin/licenseware-collector /Library/LaunchDaemons/io.licenseware.collector.plist /etc/licenseware-collector.env Download the collector binary directly for your operating system and architecture.
⚠️ Requires root privileges
export LICENSEWARE_TOKEN="your-token-here" curl -sSL https://licenseware-collector.com/install.sh | sudo bash -s -- -t $LICENSEWARE_TOKEN ⚠️ Requires Administrator privileges
token.txt with your token pasted in the file, then run:$env:LICENSEWARE_TOKEN = Get-Content token.txt -Raw $env:LICENSEWARE_TOKEN = "your-token-here" Invoke-WebRequest -Uri https://cdn.licenseware-collector.com/LicensewareCollector.exe -OutFile LicensewareCollector.exe .\LicensewareCollector.exe sudo licenseware-collector uninstall --force sudo rm /usr/local/bin/licenseware-collector licenseware-collector.exe uninstall --force del "%ProgramData%\Licenseware\LicensewareCollector.exe" licenseware-collector register --token <TOKEN>licenseware-collector statuslicenseware-collector stoplicenseware-collector run-onceThe collector writes all logs to standard error. How you access them depends on the operating system and service manager.
The verbosity is controlled by the LOG_LEVEL environment variable in the collector environment file. The default is error.
| Level | Description |
|---|---|
debug | Most verbose — all messages including internal state |
info | Operational messages (startup, config reload, ingestion cycles) |
warn | Non-critical issues that may need attention |
error | Failures only (default) |
critical | Fatal errors that stop the service |
On systemd-based systems, logs are captured by the journal automatically.
journalctl -u licenseware-collector -f journalctl -u licenseware-collector --since "1 hour ago" The launchd service writes both stdout and stderr to a single log file.
tail -f /var/log/licenseware-collector.log cat /var/log/licenseware-collector.log The Windows service does not write to a file or to Windows Event Log. To check service health, use the status command. For full log output, stop the service and run the collector interactively in an Administrator terminal.
licenseware-collector status licenseware-collector run-once --env-file C:\ProgramData\Licenseware\collector.env