Cargando…

Nagios Core administration cookbook : over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your network /

Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your networkAbout This Book Master the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contacts Filter and improve the notifications that Nagios Core s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ryder, Tom (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Edición:Second edition.
Colección:Quick answers to common problems.
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts on a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command
  • Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Implementing threshold checks in a plugin; Using macros as environment variables in a plugin; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction
  • Configuring notification periodsConfiguring notifications for groups; Choosing states for notification; Specifying the number of failed checks before notification; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Filtering notifications based on a host or service value; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string
  • Monitoring database servicesMonitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID for monitoring; Chapter 6: Enabling Remote Execution; Introduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo(8) privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Using check_mk instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview
  • Viewing and interpreting availability reportsViewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface; Viewing configuration in the web interface; Scheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay