S.I.G.M.A. Network s.r.l. | Via Vinicio Cortese 147/F 00128 Roma | P.IVA/C.F. IT05255401001
Registro Imprese Roma – R.E.A. RM-870189 | Capitale sociale i.v. €10.200,00
Copyright © S.I.G.M.A. Netrwork srl
Cookie | Durata | Descrizione |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Installation of NRPE agent on CentOS/RHEL 6 and 7
Installation of NRPE agent on CentOS/RHEL 6 and 7
This article intends to give the reader a brief introduction on how to install and configure the EPEL upstream version of the NRPE agent on CentOS/RHEL 6 and 7.
Historically, op5 has compiled and packaged the NRPE agent for a large number of Linux distributions, but as per Q2 2014 we stopped doing this since it required a lot of maintenance and time. More information on this decision can be found here: https://www.op5.com/blog/blogs/op5-developers-blog/deprecation-notices-q2-2014/
Note that this article is intended for CentOS/RHEL 6 and 7 client hosts, and that these steps never should be performed on a Monitor server.
Step-by-step guide
1. Add the EPEL repository
CentOS 6 and CentOS 7:
RHEL 6:
RHEL 7:
2. Install NRPE and the plugins that is required to add the services via the function “Add UNIX client services” when adding a new host in the configuration UI in op5 Monitor
3. Configure the agent to utilize the plugins using commands supported by op5 Monitor host scan.
Create a new file called /etc/nrpe.d/op5_commands.cfg containing the following information:
#
# op5-nrpe command configuration file
#
# COMMAND DEFINITIONS
# Syntax:
# command[<command_name>]=<command_line>
#
command[users]=/usr/lib64/nagios/plugins/check_users -w 5 -c 10
command[load]=/usr/lib64/nagios/plugins/check_load -w 15,10,5 -c 30,25,20
command[check_load]=/usr/lib64/nagios/plugins/check_load -w 15,10,5 -c 30,25,20
command[swap]=/usr/lib64/nagios/plugins/check_swap -w 20% -c 10%
command[root_disk]=/usr/lib64/nagios/plugins/check_disk -w 20% -c 10% -p / -m
command[usr_disk]=/usr/lib64/nagios/plugins/check_disk -w 20% -c 10% -p /usr -m
command[var_disk]=/usr/lib64/nagios/plugins/check_disk -w 20% -c 10% -p /var -m
command[zombie_procs]=/usr/lib64/nagios/plugins/check_procs -w 5 -c 10 -s Z
command[total_procs]=/usr/lib64/nagios/plugins/check_procs -w 190 -c 200
command[proc_named]=/usr/lib64/nagios/plugins/check_procs -w 1: -c 1:2 -C named
command[proc_crond]=/usr/lib64/nagios/plugins/check_procs -w 1: -c 1:5 -C crond
command[proc_syslogd]=/usr/lib64/nagios/plugins/check_procs -w 1: -c 1:2 -C syslog-ng
command[proc_rsyslogd]=/usr/lib64/nagios/plugins/check_procs -w 1: -c 1:2 -C rsyslogd
These paths to the plugins should match the paths to the installed plugins in step # 2.
4. Now edit /etc/nagios/nrpe.cfg and add your Monitor server(s) address(es) to the allowed_hosts parameter as a comma-separated list, example:
5. Restart the nrpe agent on the host, and make sure that nrpe is started at boot:
CentOS/RHEL 6:
chkconfig nrpe on
CentOS/RHEL 7:
systemctl enable nrpe
Now you can add the services via the function “Add UNIX client services” when adding a host in op5 Monitor.
If the host is behind a firewall, or you have enabled firewall software on the host, you need to open for incoming traffic on TCP port 5666.
Linux server monitoring with SNMPv3
An alternative path as we recommend today is to use the SNMP (v3) protocol to monitor Linux hosts for added security. You can find how to setup that here: Monitoring Linux/Unix servers via SNMP
Articoli Recenti
Categorie
Recent Posts
Ciao mondo!
20 Settembre 2022Improving Your Technology
13 Novembre 2019Apply These 5 Secret Techniques
13 Novembre 2019Calendar