一、Nagios监控主机配置
1、安装nrpe服务 解压缩 [iyunv@nagios ~]# tar -zxvf nrpe-2.14.tar.gz [iyunv@nagios ~]# cd nrpe-2.14 编译 [[iyunv@nagios nrpe-2.14]#./configure root@nagios nrpe-2.14]# make all [iyunv@nagios nrpe-2.14]# make install-plugin 只运行这一步就行了,因为只需要check_nrpe插件 2、编辑commands.cfg文件定义nrpe对的使用 [iyunv@nagios ~]# vim /usr/local/nagios/etc/objects/commands.cfg 在最后面增加如下内容: 213 # 'check_nrpe ' command definition 214 define command{ 215 command_name check_nrpe 216 command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$ 217 }
:wq 说明: command_name check_nrpe 定义命令名称为check_nrpe,在services.cfg中要使用这个名称. | command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$ 这是定义实际运行的插件程序.这个命令行的书写要完全按照check_nrpe这个命令的用法.不知道用法的就用check_nrpe –h查看 |
-c后面带的$ARG1$参数是传给nrpe daemon执行的检测命令,之前说过了它必须是nrpe.cfg中所定义的那5条命令中的其中一条.在services.cfg中使用check_nrpe的时候要用!带上这个参数 3、配置监控对象(工作站及其服务等) [iyunv@nagios ~]# vim /usr/local/nagios/etc/nagios.cfg 在cfg_file=/usr/local/nagios/etc/objects/localhost.cfg下添加: cfg_file=/usr/local/nagios/etc/objects/linux.cfg :wq 4、新建linux.cfg设置要监控的内容 [iyunv@nagios ~]# vim /usr/local/nagios/etc/object/linux.cfg define host{ use linux-server host_name web alias web address 10.10.10.253 }
define service{ use generic-service host_name web service_description check-swap check_command check_nrpe!check_swap }
define service{ use generic-service host_name web service_description check-load check_command check_nrpe!check_load }
define service{ use generic-service host_name web service_description check-disk check_command check_nrpe!check_had1 }
define service{ use generic-service host_name web service_description check-users check_command check_nrpe!check_users }
define service{ use generic-service host_name web service_description otal_procs check_command check_nrpe!check_total_procs }
//对以上的linux.cfg文件编辑如果有错,将会导致nagios无法启动; 验证Nagios 配置文件 [iyunv@nagios ~]# /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg 5、重启 [iyunv@nagios ~]#service nagios restart [iyunv@nagios ~]#service httpd restart 6、测试无法访问,检查一下IPtables是否关闭。 [iyunv@nagios ~]# service iptables status 添加nrpe 5666端口: [iyunv@nagios ~]# vim /etc/sysconfig/iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport 5666 -j ACCEPT [iyunv@nagios ~]# service iptables restart 测试一下监控机使用check_nrpe与被监控机运行的nrpedaemon之间的通信. [iyunv@nagios ~]# /usr/local/nagios/libexec/check_nrpe -H 10.10.10.253 //被监控制端IP地址 NRPE v2.14 二、Linux被监控主机配置 1、增加用户 [iyunv@web ~]# useradd nagios [iyunv@web ~]# passwd nagios 2、安装nagios插件 解压缩 [iyunv@web ~]# tar -zxvf nagios-plugins-1.4.16.tar.gz [iyunv@web ~]# cd nagios-plugins-1.4.16 编译安装 [iyunv@web nagios-plugins-1.4.16]# ./configure --with-nagios-user=nagios --with-nagios-group=nagios [iyunv@web nagios-plugins-1.4.16]# make;make install 这一步完成后会在/usr/local/nagios/下生成两个目录libexec和share [iyunv@web ~]# ls /usr/local/nagios/ include libexec share 改变目录权限使nagios用户能够访问 [iyunv@web ~]# chown -R nagios.nagios /usr/local/nagios [iyunv@web ~]# chown -R nagios.nagios /usr/local/nagios/libexec 3、安装nrpe服务 解压缩 [iyunv@web ~]# tar -zxvf nrpe-2.14.tar.gz [iyunv@web ~]# cd nrpe-2.14 编译 [iyunv@web nrpe-2.14]#./configure 输出如下 *** Configuration summary for nrpe 2.8.1 05-10-2007 ***: General Options: ------------------------- NRPE port: 5666 NRPE user: nagios NRPE group: nagios Nagios user: nagios Nagios group: nagios Review the options above for accuracy. If they look okay, type 'make all' to compile the NRPE daemon and client.
可以看到NRPE的端口是5666,下一步是make all [iyunv@web nrpe-2.14]# make all 输出如下 *** Compile finished *** If the NRPE daemon and client compiled without any errors, you can continue with the installation or upgrade process. Read the PDF documentation (NRPE.pdf) for information on the next steps you should take to complete the installation or upgrade.
接下来安装NPRE插件,daemon和示例配置文件 安装check_nrpe这个插件 [iyunv@web nrpe-2.14]# make install-plugin 之前说过监控机需要安装check_nrpe这个插件,被监控机并不需要,我们在这里安装它是为了测试的目的 安装deamon [iyunv@web nrpe-2.14]# make install-daemon 安装配置文件 [iyunv@web nrpe-2.14]# make install-daemon-config 现在再查看nagios目录就会发现有5个目录 [iyunv@web nrpe-2.14]# ls /usr/local/nagios/ bin etc include libexec share 按照安装文档的说明,是将NRPE deamon作为xinetd下的一个服务运行的.在这样的情况下xinetd就必须要先安装好,不过一般系统已经默认装了 4、安装xinetd脚本 [iyunv@web nrpe-2.14]# make install-xinetd 输出如下 /usr/bin/install -c -m 644 sample-config/nrpe.xinetd /etc/xinetd.d/nrpe
可以看到创建了这个文件/etc/xinetd.d/nrpe 编辑这个脚本 [iyunv@web ~]# vim /etc/xinetd.d/nrpe # default: on # description: NRPE (Nagios Remote Plugin Executor) service nrpe { flags = REUSE socket_type = stream port = 5666 wait = no user = nagios group = nagios server = /usr/local/nagios/bin/nrpe server_args = -c /usr/local/nagios/etc/nrpe.cfg --inetd log_on_failure += USERID disable = no only_from = 127.0.0.1 //在后面增加监控主机的地址10.10.10.254,以空格间隔 } 改后 only_from = 127.0.0.1,10.10.10.254
配置nrpe信息 [iyunv@web ~]# vim /usr/local/nagios/etc/nrpe.cfg 81 allowed_hosts=127.0.0.1,10.10.10.254 //允许10.10.10.254服务器端对其监控 5、启动NRPE [iyunv@web ~]# /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d //检测nrep配置文件的正确性 #netstat -an | grep 5666 //是否监听5666用于nrpe通信的端口 6、测试无法访问,检查一下IPtables是否关闭。 [iyunv@web ~]# service iptables status 添加nrpe 5666端口: [iyunv@web ~]# vim /etc/sysconfig/iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport 5666 -j ACCEPT [iyunv@web ~]# service iptables restart 7、在服务端监控端执行检测工作站nrpe信息 [iyunv@nagios ~]# /usr/local/nagios/libexec/check_nrpe -H 10.10.10.253 NRPE v2.14 8、查看nrpe进程 [iyunv@localhost ~]# ps -elf |grep nrpe [iyunv@web ~]# ps -elf |grep nrpe 5 S nagios 1480 1 0 80 0 - 9708 poll_s Mar14 ? 00:00:00 /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d 0 S root 1611 1437 0 80 0 - 25809 pipe_w 00:40 pts/0 00:00:00 grep nrpe 9、登录到WEB界面 输入用户名密码:nagiosadmin 123456 http://localhost/nagios Services
nrpe 提示Connection refused by host 在centos6.3 x64上安装nagios的nrpe服务,当nrpe顺利安装完成之后,执行/usr/local/nagios/libexec/check_nrpe -H localhost,提示Connection refused by host 解决方法: 启动NRPE [iyunv@web ~]# /usr/local/nagios/bin/nrpe -c /usr/local/nagios/etc/nrpe.cfg -d 然后执行,netstat -an | grep 5666 显示:tcp 0 0 127.0.0.1:5666 0.0.0.0:* LISTEN 则启动成功。 然后再执行:/usr/local/nagios/libexec/check_nrpe -H localhost 返回:NRPE v2.14
|