First, open Juniper SNMP configuration
The code is as follows |
Copy Code |
#设备标识信息和联系信息 Set SNMP location 361way_office Set SNMP Contact "admin@361way.com" #配置snmp及允许连接的客户端IP Set SNMP Community public authorization read-only Set SNMP Community public clients 192.168.1.0/24
|
To detect the normal availability of data through Snmpwalk after configuration is complete
The code is as follows |
Copy Code |
[Root@localhost ~]# snmpwalk-v 2c-c public 192.168.1.1 |more snmpv2-mib::sysdescr.0 = String:juniper Networks, Inc. srx650 internet router, kernel Junos 11.4r9.4 #0:2013-08-22 06:58 : UTC Builder@singlath:/volume/build/junos/11.4/release/11.4r9.4/obj-octeon/bsd/kernels/jsrxnle/kernel Build Date:2 013-08-22 07:12:02 UTC Copyright (c) 1996-2 snmpv2-mib::sysobjectid.0 = oid:snmpv2-smi::enterprises.2636.1.1.1.2.40 Disman-event-mib::sysuptimeinstance = timeticks: (11036284) 1 day, 6:39:22.84 snmpv2-mib::syscontact.0 = string:admin@361way.com snmpv2-mib::sysname.0 = STRING: snmpv2-mib::syslocation.0 = String:361way_office snmpv2-mib::sysservices.0 = Integer:4 if-mib::ifnumber.0 = integer:36 if-mib::ifindex.3 = Integer:3 if-mib::ifindex.4 = Integer:4 if-mib::ifindex.6 = Integer:6 if-mib::ifindex.7 = Integer:7 if-mib::ifindex.8 = Integer:8 .................................... Omitted |
From the above can be seen, the normal access to data, proof Juniper SNMP configuration is normal.
Ii. CHECK_MK Wato Configure SNMP monitoring
The configuration steps are: Wato configuration-----> hosts-------> New hosts, then fill in the relevant parameters according to the following interface, pay attention to the proxy monitoring part of the use of SNMP, or it will be wrong, because the program will default press Check_mk_ Agent to find out if Port 6556 is open, and then get the data.
When you're done, save & go to services can see all of the service items that are automatically detected, and here are 17 items, and some of the services are screenshots as follows:
Finally, the results of the Pnp4nagios with the following:
Iii. Check_traffic.sh and GRE tunnel
Because the company is using a GRE tunnel, it is also expected to display the traffic usage of the GRE tunnel on the monitoring system. Here we use the Stone check_traffic.sh plug-in, www.111cn.net the plugin's Project home page is: https://github.com/cloved/check_traffic, Because there was a special article about the plug-in log article ———— Nagios SNMP traffic monitoring check_traffic.sh, so this is not done in detail, only listed configuration can be.
The code is as follows |
Copy Code |
Define Service{ Use Generic-service,srv-pnp HOST_NAME Juniper-fireware Service_description GRE Check_command check_traffic!514!200,100!300,200!192.168.1.2 Notifications_enabled 1 Normal_check_interval 5 Retry_interval 1 }
|
The above is based on a test configuration made on Nrpe. Here also do the next Pnp4nagios show, here's the map template I use is not stone on the GitHub, because it is drawn with two lines, personal feeling too ugly, here I still use the template in my previous article, the effect of the following figure: