On 16 January 2014, Nagios Enterprises redirected the nagios-plugins.org domain to a web server controlled by Nagios Enterprises without explicitly notifying the Nagios Plugins community team the consequences of their actions.[11][12] Nagios Enterprises replaced the nagios-plugins team with a group of new, different members.[13] The community team members who were replaced continued their work under the name Monitoring Plugins along with a new website with the new domain of monitoring-plugins.org.[14]
Hundreds of community-developed addons provide additional GUIs and reporting, monitoring, and notification functionalities for Nagios. Visit the Nagios Exchange website at exchange.nagios.org to see some really cool things you can use to trick out your Nagios installation.
The config file contains the Nagios configuration options. Consult the nagios documentation for available settings and allowed options. Configuration entries of which multiple entries are allowed, need to be specified as an Array.
node['nagios']['server']['install_yum-epel'] - whether to install the EPEL repo or not (only applies to RHEL platform family). The default value is true. Set this to false if you do not wish to install the EPEL RPM; in this scenario you will need to make the relevant packages available via another method e.g. local repo, or install from source.
node['nagios']['http_port'] - port that the Apache/Nginx virtual site should listen on, determined whether ssl is enabled (443 if so, otherwise 80). Note: You will also need to configure the listening port for either NGINX or Apache within those cookbooks.
node['nagios']['default_user_name'] - Specify a defaut guest user to allow page access without authentication. --Only-- use this if nagios is running behind a secure webserver and users have been authenticated in some manner. You'll likely want to change node['nagios']['server_auth_require'] to all granted. Defaults to nil.
node['nagios']['templates'] - These set directives in the default host template. Unless explicitly overridden, they will be inherited by the host definitions for each discovered node and nagios_unmanagedhosts data bag. For more information about these directives, see the Nagios documentation for host definitions.
You can define pagerduty contacts and keys by creating nagios_pagerduty data bags that contain the contact and the relevant key. Setting admin_contactgroup to "true" will add this pagerduty contact to the admin contact group created by this cookbook.
With NRPE commands created using the LWRP you will need to define Nagios services to use those commands. These services are defined using the nagios_services data bag and applied to roles and/or environments. See --Services--
[COOK-3774]Services can be limited to run on nagios servers in specific chef environments by adding a new "activate_check_in_environment" key to the services data bag. See the Services section of the readme for an example.
The main incompatibility and breaking change is that the default services that are monitored by Nagios is reduced to only the "check-nagios" service. This means that existing installations will need to start converting checks over to the new data bag entries.
6. Skip this step if you are using a Debian-based distribution. If you are using a RHEL-based distribution, you will need to edit the Nagios Core config to load the PagerDuty config. To do this, open /etc/nagios/nagios.cfg and add this line to the file:
14. Skip this step if you are using a RHEL-based distribution. If you are using a Debian-based distribution, you will need to make sure Nagios Core has external commands enabled. In /etc/nagios3/nagios.cfg, check that variable check_external_commands equals 1 and that the variable command_check_interval is set to a reasonable value for your environment. The command_check_interval variable determines how often Nagios Core checks for external commands to run.
Add a unique ID to the plugin configuration. If no ID is specified, Logstash will generate one.It is strongly recommended to set this ID in your configuration. This is particularly usefulwhen you have two or more plugins of the same type. For example, if you have 2 nagios outputs.Adding a named ID in this case will help in monitoring Logstash when using the monitoring APIs.
You should now be able to see the host and service checks in the Nagios CGI files. To access them, point a browser to You will then be prompted for the nagiosadmin username and password.
The Core Configuration Manager in Nagios XI allows an authenticated user with privilege to manage host escalations to perform arbitrary database queries through the `/nagiosxi/includes/components/ccm/index.php` endpoint.
If you're running in an offline environment you have two choices for how to install Nagios XI. You can either clone the nagios and nagiosxi-deps repositories provided for CentOS and RHEL or download the offline tarball.
Once everything has compiled, use the make install, make install-commandmode, and make install-config targets to install the compiled binaries and sample configuration into our PROTO area using the DESTDIR command-line substitution, as shown in Listing 2. In order for this to be successfully completed, we need to first create the nagios user and nagios group. Use the useradd(1M) and groupadd(1M) commands to quickly do this, as shown in Listing 2.
Once everything has compiled, use the gmake install, gmake install-commandmode, and gmake install-config targets to install the compiled binaries and sample configuration into our PROTO area using the DESTDIR command-line substitution, as shown in Listing 5. In order for this to be successfully completed, we need to first create the nagios user and nagios group. Use the useradd(1M) and groupadd(1M) commands to quickly do this, as shown in Listing 5.
Let's quickly go through the parts of this initial manifest shown in Listing 6. The set action represents a way to set package attributes such as the package version, a summary, and a description. We set the package FMRI (Fault Management Resource Indicator) to nag...@4.0.2,5.11-0, which indicates we're using Nagios 4.0.2 on Oracle Solaris 11 (5.11). Variants are a feature of the Image Packaging System that allows us to package support for multiple architectures in a single package (for example, have a single package for both SPARC and x86). We set variant.arch to a variable that we will substitute in later.
The next step will be to look in our PROTO directory and generate a list of files and directories that we wish to include in our package. Fortunately we can automate much of this task with the pkgsend(1) generate command. We will pipe the output through the pkgfmt(1) command to make the output nicer, and then put it into the nagios.p5m.gen file, as shown in Listing 7:
The nagios user, which Nagios is executing under, needs read-write access to the file we are creating by using the touch(1) command in Listing 7. We will set the file ownership and permissions in the manifest.
In Listing 7, we see a few new actions: file and dir. These specify the package contents, plus their user and group ownership and permissions. We need to modify the user and group permissions of /usr/local/nagios/var, /usr/local/nagios/var/rw, and /usr/local/var/spool/checkresults to use the nagios user and group. To do this, edit nagios.p5m.gen and make the following changes to the five lines highlighted in bold:
If we were planning on installing Nagios into /usr/bin, good packaging practices for Oracle Solaris 11 encourage that we go through this list and check which directories are being installed by Nagios and which are already provided as part of a default system installation. That list of directories could be dynamically removed from our package manifest, which is known as a transform. In our case, we are planning to install files into /usr, which is already provided by the system. So we need to remove it from our manifest. We can do this by adding the following line to our nagios.mog file to drop this dir action:
Now that we have both nagios.mog and nagios.p5m.gen, let's merge them together to form nagios.p5m.mog using the pkgmogrify(1) command. We'll also substitute our architecture type in the $(ARCH) variable, as shown in Listing 9:
At this point, we need to create a nagios user and group as part of the package installation. The Image Packaging System has two such actions for performing that task. Here are the two lines that you need to add to nagios.p5m.dep.res:
Copy this script in a directory on the nagios server (forexample /etc/nagios3) and copy in the same directory the file'itopsoaptypes.inc.php' taken from the directory 'webservices' ofyour iTop instance.
The nagios monitoring is accomplished by bridge plugin which is included with the SolarWinds Snap Agent by default. Follow the directions below to enable it for an agent instance.The bridge plugin utilize Telegraf Exec plugin.
Make a copy of the Nagios example task file /opt/SolarWinds/Snap/etc/tasks-autoload.d/task-bridge-nagios_exec.yaml.example, renaming it to /opt/SolarWinds/Snap/etc/tasks-autoload.d/task-bridge-nagios_exec.yaml:
dd2b598166