nagios分布式配置
圖-nagios
nagios分布式配置具體過程如下:
一、NSCA插件安裝與配置
http://nchc.dl.sourceforge.net/sourceforge/nagios/nsca-2.7.2.tar.gz
編譯安裝nsca:
查看源代碼
打印幫助0./configure && make all
nagios主服務端:
1.拷貝nsca相關文件至nagios目錄
查看源代碼
打印幫助0cp sample-config/nsca.cfg /usr/local/nagios/etc/
1cp src/nsca /usr/local/nagios/bin/
2chown nagios.nagios /usr/local/nagios/etc/nsca.cfg
3chown nagios.nagios /usr/local/nagios/bin/nsca
2.配置nsca.cfg文件中password
查看源代碼
打印幫助0vi /usr/local/nagios/etc/nsca.cfg #去掉password前面的#,設置密碼
1password=xxx
3.開啟nsca程序
查看源代碼
打印幫助0/usr/local/nagios/bin/nsca -c /usr/local/nagios/etc/nsca.cfg
4.開啟防火墻5667端口
查看源代碼
打印幫助0iptables -I RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5667 -j ACCEPT
nagios分布式服務端:
1.拷貝send_nsca相關文件至nagios目錄
查看源代碼
打印幫助0cp sample-config/send_nsca.cfg /usr/local/nagios/etc/
1cp src/send_nsca /usr/local/nagios/bin/
2chown nagios.nagios /usr/local/nagios/etc/send_nsca.cfg
3chown nagios.nagios /usr/local/nagios/bin/send_nsca
2.配置nsca.cfg文件中password
查看源代碼
打印幫助0vi /usr/local/nagios/etc/send_nsca.cfg #去掉password前面的#,配置與主服務端相同的密碼
1password=xxx
#p#
二、Nagios主服務端與分布式服務端配置
nagios主服務端:
1.修改nagios.cfg文件
查看源代碼
打印幫助0vi /usr/local/nagios/etc/nagios.cfg
1#修改以下參數值
2check_external_commands=1
3accept_passive_service_checks=1
4accept_passive_host_checks=1
2.修改服務與主機的監控,以下為配置示例,該示例定義的服務與主機應該與分布式服務端相同
查看源代碼
打印幫助00define host{
01name test
02use generic-host
03address 192.168.0.8 #分布式服務端內監控的主機地址
04check_freshness 1 #開啟強制刷新
05freshness_threshold 480 #主服務端強制刷新的時間,具體含義請參考手冊
06passive_checks_enabled 1 #開啟被動檢測模式
07active_checks_enabled 0 #關閉主服務端對該服務的主動檢測
08
09}
10define service{
11use generic-service #根據實際情況修改
12host_name test
13service_description CPU Load
14check_command check_nrpe!check_load
15
16check_freshness 1 #開啟強制刷新
17freshness_threshold 480 #主服務端強制刷新的時間,具體含義請參考手冊
18passive_checks_enabled 1 #開啟被動檢測模式
19active_checks_enabled 0 #關閉主服務端對該服務的主動檢測
20}
#p#
nagios分布式服務端:
1.修改nagios.cfg文件
查看源代碼
打印幫助0vi /usr/local/nagios/etc/nagios.cfg
1#修改以下參數值
2enable_notifications=0
3obsess_over_services=1
4ocsp_command=submit_service_check_result
5obsess_over_hosts=1
6ochp_command=submit_host_check_result
2.創建submit_service_check_result腳本
查看源代碼
打印幫助00vi /usr/local/nagios/libexec/submit_service_check_result
01#!/bin/sh
02# Arguments:
03# = host_name (Short name of host that the service is
04# associated with)
05# = svc_description (Description of the service)
06# = state_string (A string representing the status of
07# the given service - "OK", "WARNING", "CRITICAL"
08# or "UNKNOWN")
09# = plugin_output (A text string that should be used
10# as the plugin output for the service checks)
11#
12# Convert the state string to the corresponding return code
13return_code=-1
14case "$3" in
15OK)
16return_code=0
17;;
18WARNING)
19return_code=1
20;;
21CRITICAL)
22return_code=2
23;;
24UNKNOWN)
25return_code=-1
26;;
27esac
28# pipe the service check info into the send_nsca program, which
29# in turn transmits the data to the nsca daemon on the central
30# monitoring server
31/usr/bin/printf "%s\t%s\t%s\t%s\n" "$1" "$2" "$return_code" "$4" | /usr/local/nagios/bin/send_nsca -H 1.1.1.1(修改為主服務端的ip) -c /usr/local/nagios/etc/send_nsca.cfg
查看源代碼
打印幫助0chmod +x /usr/local/nagios/libexec/submit_service_check_result
1chown nagios.nagios submit_service_check_result
3.創建submit_host_check_result腳本
查看源代碼
打印幫助00vi /usr/local/nagios/libexec/submit_host_check_result
01#!/bin/sh
02# Arguments:
03# = host_name (Short name of host that the service is
04# associated with)
05# = svc_description (Description of the service)
06# = state_string (A string representing the status of
07# the given service - "OK", "WARNING", "CRITICAL"
08# or "UNKNOWN")
09# = plugin_output (A text string that should be used
10# as the plugin output for the service checks)
11#
12# Convert the state string to the corresponding return code
13return_code=-1
14case "$2" in
15UP)
16return_code=0
17;;
18DOWN)
19return_code=1
20;;
21UNREACHABLE)
22return_code=2
23;;
24esac
25# pipe the service check info into the send_nsca program, which
26# in turn transmits the data to the nsca daemon on the central
27# monitoring server
28/usr/bin/printf "%s\t%s\t%s\n" "$1" "$return_code" "$3" | /usr/local/nagios/bin/send_nsca -H 1.1.1.1(修改為主服務端的ip) -c /usr/local/nagios/etc/send_nsca.cfg
#p#
查看源代碼
打印幫助0chmod +x /usr/local/nagios/libexec/submit_host_check_result
1chown nagios.nagios submit_host_check_result
3.在command.cfg文件中定義submit_service_check_result,submit_host_check_result命令
查看源代碼
打印幫助0vi /usr/local/nagios/etc/objects/command.cfg #加入以下內容
1define command{
2command_name submit_service_check_result
3command_line /usr/local/nagios/libexec/submit_service_check_result $HOSTNAME$ '$SERVICEDESC$' $SERVICESTATE$ '$SERVICEOUTPUT$'
4}
5define command{
6command_name submit_host_check_result
7command_line /usr/local/nagios/libexec/submit_host_check_result $HOSTNAME$ $HOSTSTATE$ '$HOSTOUTPUT$'
8}
4.配置示例
查看源代碼
打印幫助00define host{
01name test
02use generic-host
03address 192.168.0.8 #分布式服務端內監控的主機地址
04}
05define service{
06use generic-service #根據實際情況修改
07host_name test
08service_description CPU Load
09check_command check_nrpe!check_load
10}
BTW:請注意分布式服務端與主服務端定義主機與服務配置的區別,當分布式服務端定義了主機與服務時,同樣需要在主服務端定義一次。以下幾個參數無需在分布式服務端特殊定義。
check_freshness,freshness_threshold,passive_checks_enabled,active_checks_enabled
freshness_threshold 強制刷新時間,主要的作用是當分布式服務端未提交新的數據時,服務端可以強制進行狀態刷新,進行及時的預警。
如何在不安裝分布式nagios的情況下,監控另一防火墻后的內網主機呢?其實方法很多,比如check_ssh,這里共享一個方法,該方法是同事nonamexz想到的。
通過nagios的自定義變量,在nrpe的命令行增加一個端口的參數,自定義端口,通過防火墻進行映射至內網不同的服務器
查看源代碼
打印幫助00define command{
01command_name check_NRPE #定義一個新的命令
02command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -p $_HOSTPORT$ -t 60
03}
04define host{
05name test
06use generic-host
07address 2.2.2.2 #需要監控的服務器的外網地址,比如防火墻地址
08_PORT 5668 #自定義的外網端口,改端口是通過防火墻進行內的需要監控的服務器的nrpe的端口映射
09}
10define service{
11use generic-service
12host_name test
13service_description CPU Load
14check_command check_NRPE!check_load #這里定義的時候,使用自定義的nrpe
通過文章的介紹,我們清楚的知道了nagios分布式配置全過程!
【編輯推薦】