Nagios Core administration cookbook [electronic resource] : develop an integrated monitoring solution for virtually any kind of network / Tom Ryder.

Ryder, Tom.
1st edition
Birmingham : Packt Pub., 2013.
Community experience distilled
1 online resource (366 p.)
Computer networks -- Management.
Electronic books.
System Details:
text file
This book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.
Cover; Copyright; Credits; About the Author; About the Reviewers;; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command
Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groups
Specifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitor
Chapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface
Viewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groups
Building groups using regular expressions
Includes index.
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy