Client Nrpe does not work correctly:Phenomenon:/usr/local/nagios/libexec/check_nrpe-h 127.0.0.1Check_nrpe:error-could not complete SSL handshake1) Install the dependent packages:Yum Install Openssl-devel-y2) Add the server IP address (192.168.1.100) to the Allowed_hostsVim nrpe.conf +77allowed_hosts=192.168.1.100,127.0.0.13) Restart service after stopping serviceStop service:#pkill NrpeStart the service:#/u
performed by configuring Nagios remote execution Plug-ins• Remote monitoring to support SSH or SSL plus channel mode monitoring• Simple plugin design allows users to easily develop the inspection services they need, supporting many development languages (shell scripts, C + +, Perl, Ruby, Python, PHP, C #, etc.)• Contains a lot of graphical data plugins (Nagiosgraph, Nagiosgrapher, Pnp4nagios, etc.)• Parall
This article consists of Su Yi Lin Feng provide sponsorship, starting in Slime Line the world Once the Nagios installation is complete, we'll configure Nagios now. For Nagios installation, refer to the article "Slime: Learning Nagios (i): Nagios installation". Description: T
account and password you have set before logon.
Note: To ensure the security of nagios, we recommend that you use the strong information digest Authentication Mode (such as MD5) and use the web TSL/SSL secure communication mode, in addition, the access control list is used to set the client address that can access the nagios web interface.
II. Introduction to
viewing the HELP command of NRPE, we know how to run NRPE, as follows:
Nrpe-c NRPE configuration file path running mode
Note: The NRPE command only exists on the monitored host.
NRPE parameters are described as follows:
-N indicates that data is not transmitted using SSL. Data is transmitted using SSL by default.
-I runs NRPE using the super daemon inetd or xinetd. To run NRPE in this way, install
execution plug-in3. Remote monitoring supports SSH or SSL plus channel monitoring the simple plugin design allows users to easily develop their own inspection services, supporting many development languages (shell scripts, C + +, Perl, Ruby, Python, PHP, C # etc.) contains many graphical data plugins (Nagiosgraph, Nagiosgrapher, Pnp4nagios, etc.)4. A parallel service check can define the hierarchy of network hosts, allowing for step-by-step inspectio
Remote Plugin Executor) is an extension of Nagios. It is used on the monitored server to provide some local information about the server to the Nagios monitoring platform. NRPE can be called the Linux client of Nagios.
Because NRPE transmits data on the monitored and monitored hosts through SSL, you must first install
Make all
Make install
Make Install-init
Make Install-commandmode
Make Install-config
Make install-webconf
Cd.. /
2), Installation Nagios-plugins
SCP root@172.26.159.180:/root/xzy/nagios-plugins-1.4.16.tar.gz/usr/local/src/nagios-plugins-1.4.16.tar.gz
Tar zxf nagios-plugins-1.4.16.tar.gz
CD
[[emailprotected]nagios-plugins-2.1.4]# chcon-r-thttpd_sys_content_t/usr/local/nagios/sbin/[[emailprotected] Nagios-plugins-2.1.4]#chcon-r-thttpd_sys_content_t/usr/local/nagiOs/share/ The Nagios plugin on the server side is now installed and you can install the
Cd nagios-plugins-1.4.13
./Configure -- prefix =/usr/local/nagios -- with-nagios-user = nagios -- with-nagios-group = nagios
Make make install
To check whether the installation is successful, follow these steps:
Ls/usr/local/
/sbin # chcon-r-t httpd_sys_content_t/usr/local/Nagios/share (5) view Nagios on the web interface:
Http: // your_nagios_ip/NagiosYou must specify the Web Authentication account and password you have set before logon. Note: To ensure the security of Nagios, we recommend that you use the strong information digest Authentication Mode (such as MD5) and use the Web TS
,command ' check_passwd ' not defineSolution: To/usr/local/nagios/etc/objects/commands.cfg it is OK.3,connction Refurse HostSolution: First cd/usr/local/nagios/libexec under, use./check_nrpe-h 192.168.0.150-c check_ping or./check_nrpe-h 127.0.0.1-c Check_pin GIf you are still prompted Connction Refurse host, next look at Nrpe there is no boot: netstat-lntup |grep Nrpe if no boot execution/usr/local/
1. The platform and the components used,Monitoring server: RHEL4 (192.168.1.211) +nagios-3.2.0+ nagios-plugins-1.4.14+ nrpe-2.12Monitored end RHEL4 (192.168.1.212) + nagios-plugins-1.4.14+ nrpe_2.12Content IntroductionThis document describes Nagios monitoring Linux server, because the monitoring is to rely on plug-ins
Options:Available options
-N = do not use SSLSSL is generally used instead of SSL.
= Name of config file to useSpecifies the path of the nrpe configuration file. The main configuration file of this nrpe is nrpe. cfg.
= One of the following two operating modes:Specify the nrpe running mode. There are two available nrpe running modes:-I = run as a service under inetd or xinetdRun nrpe using the super daemon inetd or xinetd. To run nrpe in this way, ins
trigger detection commands on the Remote host based on the installation method, and return the detection result to the monitoring end. The overhead of its execution is much lower than the SSH-based detection method, and the detection process does not require the system account information on the remote host, and its security is higher than the SSH detection method.
2. how NRPE works
NRPE consists of two parts:
Check_nrpe plug-in: Located on the monitoring host
Nrpe daemon: runs on a remote ho
monitoring and analyzing the results of a specific object, which is output as state information (ok, WARNING, CRITICAL, UNKNOWN ). Nagios, formerly known as Netsaint, was developed and maintained by Ethan Galstad. Nagios is an abbreviated form: "Nagios Ain t gonna insist on sainthood" sainthood translated into saints, while "Agios" is the Greek representation o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.