Nagios Core administration cookbook [electronic resource] : develop an integrated monitoring solution for virtually any kind of network / Tom Ryder.
- 1st edition
- Birmingham : Packt Pub., 2013.
- Community experience distilled
1 online resource (366 p.)
- Computer networks -- Management.
- Electronic books.
- System Details:
- text file
- This book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command
Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groups
Specifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitor
Chapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface
Viewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groups
Building groups using regular expressions
- Includes index.
|Location||Notes||Your Loan Policy|
|Description||Status||Barcode||Your Loan Policy|