Nagios监控Linux系统
一、Nagios监控主机配置1、安装nrpe服务解压缩# tar -zxvf nrpe-2.14.tar.gz# cd nrpe-2.14编译[#./configureroot@nagios nrpe-2.14]# make all# make install-plugin只运行这一步就行了,因为只需要check_nrpe插件 2、编辑commands.cfg文件定义nrpe对的使用# vim /usr/local/nagios/etc/objects/commands.cfg在最后面增加如下内容:213 # 'check_nrpe ' command definition214 define command{215 command_name check_nrpe216 command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$217 }
:wq说明:
command_name check_nrpe定义命令名称为check_nrpe,在services.cfg中要使用这个名称.
command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$这是定义实际运行的插件程序.这个命令行的书写要完全按照check_nrpe这个命令的用法.不知道用法的就用check_nrpe –h查看
-c后面带的$ARG1$参数是传给nrpe daemon执行的检测命令,之前说过了它必须是nrpe.cfg中所定义的那5条命令中的其中一条.在services.cfg中使用check_nrpe的时候要用!带上这个参数 3、配置监控对象(工作站及其服务等)# vim /usr/local/nagios/etc/nagios.cfg在cfg_file=/usr/local/nagios/etc/objects/localhost.cfg下添加:cfg_file=/usr/local/nagios/etc/objects/linux.cfg:wq 4、新建linux.cfg设置要监控的内容# vim /usr/local/nagios/etc/object/linux.cfgdefine host{ use linux-server host_name web alias web address 10.10.10.253 }
define service{ use generic-service host_name web service_description check-swap check_command check_nrpe!check_swap }
define service{ use generic-service host_name web service_description check-load check_command check_nrpe!check_load }
define service{ use generic-service host_name web service_description check-disk check_command check_nrpe!check_had1 }
define service{ use generic-service host_name web service_description check-users check_command check_nrpe!check_users }
define service{ use generic-service host_name web service_description otal_procs check_command check_nrpe!check_total_procs }
//对以上的linux.cfg文件编辑如果有错,将会导致nagios无法启动; 验证Nagios 配置文件# /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg 5、重启#service nagios restart#service httpd restart 6、测试无法访问,检查一下IPtables是否关闭。# service iptables status添加nrpe 5666端口:# vim /etc/sysconfig/iptables-A INPUT -m state --state NEW -m tcp -p tcp --dport 5666 -j ACCEPT# service iptables restart 测试一下监控机使用check_nrpe与被监控机运行的nrpedaemon之间的通信.# /usr/local/nagios/libexec/check_nrpe -H 10.10.10.253 //被监控制端IP地址NRPE v2.14 二、Linux被监控主机配置1、增加用户# useradd nagios# passwd nagios 2、安装nagios插件解压缩# tar -zxvf nagios-plugins-1.4.16.tar.gz# cd nagios-plugins-1.4.16编译安装# ./configure --with-nagios-user=nagios --with-nagios-group=nagios# make;make install 这一步完成后会在/usr/local/nagios/下生成两个目录libexec和share# ls /usr/local/nagios/includelibexecshare 改变目录权限使nagios用户能够访问# chown -R nagios.nagios /usr/local/nagios# chown -R nagios.nagios /usr/local/nagios/libexec 3、安装nrpe服务解压缩# tar -zxvf nrpe-2.14.tar.gz# cd nrpe-2.14编译#./configure输出如下*** Configuration summary for nrpe 2.8.1 05-10-2007 ***: General Options: ------------------------- NRPE port: 5666 NRPE user: nagios NRPE group: nagios Nagios user:nagios Nagios group: nagiosReview the options above for accuracy.If they look okay,type 'make all' to compile the NRPE daemon and client.
可以看到NRPE的端口是5666,下一步是make all# make all输出如下*** Compile finished ***If the NRPE daemon and client compiled without any errors, youcan continue with the installation or upgrade process.Read the PDF documentation (NRPE.pdf) for information on the nextsteps you should take to complete the installation or upgrade.
接下来安装NPRE插件,daemon和示例配置文件 安装check_nrpe这个插件# make install-plugin之前说过监控机需要安装check_nrpe这个插件,被监控机并不需要,我们在这里安装它是为了测试的目的安装deamon# make install-daemon安装配置文件# make install-daemon-config 现在再查看nagios目录就会发现有5个目录# ls /usr/local/nagios/binetcincludelibexecshare按照安装文档的说明,是将NRPE deamon作为xinetd下的一个服务运行的.在这样的情况下xinetd就必须要先安装好,不过一般系统已经默认装了 4、安装xinetd脚本# make install-xinetd输出如下/usr/bin/install -c -m 644 sample-config/nrpe.xinetd /etc/xinetd.d/nrpe
可以看到创建了这个文件/etc/xinetd.d/nrpe编辑这个脚本# vim /etc/xinetd.d/nrpe# default: on# description: NRPE (Nagios Remote Plugin Executor)service nrpe{ flags = REUSE socket_type = stream port = 5666 wait = no user = nagios group = nagios server = /usr/local/nagios/bin/nrpe server_args = -c /usr/local/nagios/etc/nrpe.cfg --inetd log_on_failure+= USERID disable = no only_from = 127.0.0.1 //在后面增加监控主机的地址10.10.10.254,以空格间隔}改后 only_from = 127.0.0.1,10.10.10.254
配置nrpe信息# vim /usr/local/nagios/etc/nrpe.cfg 81 allowed_hosts=127.0.0.1,10.10.10.254 //允许10.10.10.254服务器端对其监控 5、启动NRPE# /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d//检测nrep配置文件的正确性#netstat -an | grep 5666 //是否监听5666用于nrpe通信的端口 6、测试无法访问,检查一下IPtables是否关闭。# service iptables status添加nrpe 5666端口:# vim /etc/sysconfig/iptables-A INPUT -m state --state NEW -m tcp -p tcp --dport 5666 -j ACCEPT# service iptables restart 7、在服务端监控端执行检测工作站nrpe信息# /usr/local/nagios/libexec/check_nrpe -H 10.10.10.253NRPE v2.14 8、查看nrpe进程# ps -elf |grep nrpe#ps -elf |grep nrpe5 S nagios1480 1 0 800 - 9708 poll_s Mar14 ? 00:00:00 /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d0 S root 1611 1437080 0 - 25809 pipe_w 00:40 pts/0 00:00:00 grep nrpe 9、登录到WEB界面输入用户名密码:nagiosadmin123456http://localhost/nagiosServicesnrpe 提示Connection refused by host在centos6.3 x64上安装nagios的nrpe服务,当nrpe顺利安装完成之后,执行/usr/local/nagios/libexec/check_nrpe -H localhost,提示Connection refused by host解决方法:启动NRPE# /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d然后执行,netstat -an | grep 5666显示:tcp 0 0 127.0.0.1:5666 0.0.0.0:* LISTEN则启动成功。然后再执行:/usr/local/nagios/libexec/check_nrpe -H localhost返回:NRPE v2.14
我不在江湖,但江湖中有我的传说。 锻炼肌肉,防止挨揍! 男人偷腥时的智商仅次于爱因斯坦! 避孕的效果:不成功,便成“人”。 有竞争才有进步嘛 不要在一棵树上吊死,在附近几棵树上多试试死几次~
页:
[1]