Using XMPP for System Monitoring and Administration
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Naemonbox Manual Documentation Release 0.0.7
NaemonBox Manual Documentation Release 0.0.7 NaemonBox Team September 16, 2016 Contents 1 Introduction 3 1.1 Target audience..............................................3 1.2 Prerequisite................................................3 2 About Naemonbox 5 2.1 Project..................................................5 2.2 Features..................................................6 3 Installation Guide 7 3.1 System requirements...........................................7 3.2 Recommended system requirements...................................7 3.3 Client Operating Systems........................................7 3.4 Openvz VPS installation.........................................8 3.5 GNU/Linux Debian 7 (or later) Installation...............................8 3.6 Installing Naemonbox..........................................8 4 Getting Started 9 4.1 Step one.................................................9 4.2 Step two................................................. 10 4.3 Step three................................................. 10 4.4 Step four................................................. 10 5 Configuring Naemon 11 5.1 Introduction............................................... 11 5.2 Actions.................................................. 11 5.3 Hosts Definition............................................. 12 5.4 Services.................................................. 13 5.5 Commands................................................ 14 5.6 Time periods............................................... 15 5.7 Contacts................................................ -
Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA
heck What the #%!@ is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1 Agenda • Intro to Monitoring • Internet protocols 101 • • Nagios SMTP • IMAP • Install/Config • HTTP • Usage • Custom plugins • Packet sniffing for dummies • Intro to Troubleshooting • Tools • telnet, openssl • grep, sed • ps, lsof, netstat 2 MONITORING 3 Automated Monitoring Workflow 4 Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5 Monitoring Packages: Commercial • Nagios XI • Groundwork • PRTG network monitor • CopperEgg • WhatsUp Gold • PRTG network monitor • op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6 Why Automatic Service Monitoring? • Spot small problems before they become big ones • Learn about outages before your users do • Checklist when restoring from a power outage • Gives you better problem reports than users • Problems you might never spot otherwise • Failed HDDs in RAIDs • Full /var partitions • Logs not rotating • System temperature rising 7 Why Automatic Service Monitoring? • Capacity planning • Performance data can generate graphs of utilization • RAM, Disk, etc. • Availability reports - CAUTION • Easy to generate -- even easier to generate wrong • Make sure your configurations actually catch problems • Will also include problems with Nagios itself :( • If you’re going to quote your availability numbers (SLAs, etc.) make sure you understand what you’re actually monitoring. -
Pynag Documentation Release 0.9.0
pynag Documentation Release 0.9.0 Pall Sigurdsson and Tomas Edwardsson July 23, 2014 Contents 1 Introduction 3 1.1 About pynag...............................................3 2 The pynag module 5 2.1 pynag Package.............................................5 2.2 Subpackages...............................................5 3 The pynag command line 85 3.1 NAME.................................................. 85 Python Module Index 89 i ii pynag Documentation, Release 0.9.0 Release 0.9.0 Date July 23, 2014 This document is under a Creative Commons Attribution - Non-Commercial - Share Alike 2.5 license. Contents 1 pynag Documentation, Release 0.9.0 2 Contents CHAPTER 1 Introduction 1.1 About pynag Pynag is a all around python interface to Nagios and bretheren (Icinga, Naemon and Shinken) as well as providing a command line interface to them for managing them. 3 pynag Documentation, Release 0.9.0 4 Chapter 1. Introduction CHAPTER 2 The pynag module 2.1 pynag Package 2.2 Subpackages 2.2.1 Control Package Control Package The Control module includes classes to control the Nagios service and the Command submodule wraps Nagios com- mands. class pynag.Control.daemon(nagios_bin=’/usr/bin/nagios’, nagios_cfg=’/etc/nagios/nagios.cfg’, na- gios_init=None, sudo=True, shell=None, service_name=’nagios’, na- gios_config=None) Bases: object Control the nagios daemon through python >>> from pynag.Control import daemon >>> >>> d= daemon() >>> d.restart() SYSTEMD = 3 SYSV_INIT_SCRIPT = 1 SYSV_INIT_SERVICE = 2 reload() Reloads Nagios. Returns Return code of the reload command ran by pynag.Utils.runCommand() Return type int restart() Restarts Nagios via it’s init script. Returns Return code of the restart command ran by pynag.Utils.runCommand() Return type int 5 pynag Documentation, Release 0.9.0 running() Checks if the daemon is running Returns Whether or not the daemon is running Return type bool start() Start the Nagios service. -
Supervision Utilisation De Check-MK
Supervision Utilisation de Check-MK Réseau Min2Rien Journée Thématique « retour d’expériences » - 13/02/2014 NICOLAS JAMIN – Administrateur Système – DSI de l’Académie de LILLE Supervision: Utilisation de Check-MK Plan . Présentation . Fonctionnement / Configuration . Création de scripts (Présentation et exemple) . Utilisation / Capture d’écran . Livestatus / Multisite Nicolas JAMIN – DSI de l’Académie de LILLE 14/02/2014 2 Supervision: Utilisation de Check-MK Presentation . Check-MK : add-on de supervision écrit en python . Nagios utilise des plugins de type actif 1 plugin = 1 service Exécution côté Nagios • Exemple: check_disk = test de l’espace disque . Check-MK utilise des plugins de type passif 1 plugin ~ 30 tests de base Exécution côté Client • Exemple: check_mk = check_disk + check_mem + check_ps + … . Forte baisse du taux d’utilisation des CPUs sur Nagios grâce à Check-MK . Remplace les plugins de type NRPE, NSCLIENT ++ Nicolas JAMIN – DSI de l’Académie de LILLE 14/02/2014 3 Supervision: Utilisation de Check-MK Fonctionnement Nicolas JAMIN – DSI de l’Académie de LILLE 14/02/2014 4 Supervision: Utilisation de Check-MK Configuration (sur le serveur NAGIOS) . Fichier main.mk Contient la configuration générale (seuil d’alerte, exclusions des services …) • Inventory_df_exclude_mountpoints = [‘/dev’,’/mnt/vzsnap0’] • Filesystem_default_level[‘levels’] = (90.0, 95.0) . Fichier tcp_hosts.mk Contient les hosts et hostgroups des serveurs auxquels ils appartiennent. • template124.expr.in.ac-lille.fr|linux|apt|openvz|ubuntu12 . Fichier hostgroups.mk Contient la définition des hostgroups. • (‘Serveurs Ubuntu 12.04’, [ ‘ubuntu12’ ], ALL_HOSTS), Nicolas JAMIN – DSI de l’Académie de LILLE 14/02/2014 5 Supervision: Utilisation de Check-MK Configuration (sur le serveur NAGIOS) . Plus aucune configuration côté Nagios Core • /etc/nagios/host.cfg, /etc/nagios/hostgroup.cfg … . -
Peter Helin, ABB Crane Systems Stefan Löfgren, Mälardalen
Fredrik Linder [email protected] Thesis for the Degree of Bachelor of Science in Engineering - Computer Network Engineering 15.0 hp IDT (academy for Innovation, Design and Technology) Mälardalen University Västerås, Sweden 2015-11-15 Supervisors: Peter Helin, ABB crane systems Stefan Löfgren, Mälardalen University Examinator: Mats Björkman, Mälardalen University | Network monitoring of automated harbor terminals | | Linder | ABSTRACT Nowadays, more information and services are migrated into computers using a network as the carrier for data communication. One example of this is the migration from PROFIBUS to PROFINET. The big problem is that there are no network monitoring solution implemented, despite the significance of the network. The drawback of not having a network monitor solution are many. This includes areas within security, availability, control and troubleshooting. The goal is to find a solution to this problem with providing a complete network monitor solution in ABB’s existing environment. The work was divided in four different parts, research, design, implementation and verification. Information from the World Wide Web (WWW) pointed towards that CentOS (operating system) together with OMD (network monitor software) would be the best choice for this task. The design phase described how all devices should be able to communicate with each other. The implementation part mostly were configuration of devices, such as servers, monitor software, switches and security. The configuration were made by using the built in user interface in each device. The verification part proved that all functions worked as expected, such as security and notifications. Rest of the verification could be seen in the web interface. The result is a complete solution demonstrated in ABB crane system’s lab, which includes a complete set of network devices that exist on sites all around the world. -
Ausreißer Check Mk
05/2014 Check_mk als Nagios-Alternative Titelthema Ausreißer Check_mk 34 Check_mk hat zurzeit Rückenwind: Es gilt nicht mehr als schnödes Nagios-Plugin und seine Oberfläche Multi- site lässt die Konkurrenz alt aussehen. Doch wird Check_mk diesem Ruf in der Praxis gerecht? Holger Gantikow www.linux-magazin.de wachen will und wie er alle Ergebnisse in einem Rutsch zurück. dies möglichst optimal Das erfordert nur eine einzige Verbin- mittels Hostgruppen und dung (Abbildung 1, rechts). Templates abbildet, da- Auch Nagios wertet anders aus: Mit dem mit seine Konfiguration Nagios Remote Plugin Executor (NRPE) wartbar bleibt. Zugleich stupst es in der Regel ein Plugin auf dem wächst aber die Last auf Host an, das etwa die RAM-Auslastung dem Nagios-Server mit je- misst. Das Plugin erhält einige Schwel- der Erweiterung: Je mehr lenwerte und liefert einen Status zurück Dienste und Hosts dieser (»OK«, »Warning«, »Critical«). überwacht, desto mehr Check_mk bewertet die Ergebnisse hin- wird die Serverhardware gegen erst auf dem Server. Dies hat den zum Engpass. Die Anzahl positiven Nebeneffekt, dass die Agents der „aktiven Checks“ pro auf den zu überwachenden Hosts keine Prüfintervall bestimmt, weitere Konfiguration benötigen. Der wie leistungsfähig der Check_mk-Server filtert die von den Server sein muss (Abbil- Agenten gelieferten Daten mit Hilfe der © Ljupco Smokovski, 123RF Smokovski, © Ljupco dung 1, links). Konfigurationsparameter und Schwellen- werte, die der Admin festgelegt hat, und Wer den Zustand von mehr als einer Check_mk am Start schickt die Ergebnisse an Nagios weiter. Handvoll Systeme im Blick behalten möchte, muss auf handgestrickte Shell- Speziell gegen diese beiden Probleme, Testlauf skripte oder gelegentliche Kontrollen gegen die komplexe Konfiguration und verzichten und braucht ein vollwertiges die hohe Serverlast, möchte Check_mk Ob Check_mk hält, was es verspricht, Monitoring. -
Market Impact Report Juniper Networks’ Appformix: Intent-Driven Cloud-Scale Infrastructure
Market Impact Report Juniper Networks’ AppFormix: Intent-Driven Cloud-Scale Infrastructure EXECUTIVE SUMMARY Today, we live in a cloud-centric world with cloud-native applications and services reaching hundreds of millions of users globally via massive data centers located KEY FEATURES around the world. Until recently, the cloud has been the domain of a relatively • Autonomous, intent-driven small number of web-scale giants, cloud computing platforms, cloud-native infrastructure operation for businesses and global software companies. However, enterprises are now workload and resource migrating IT applications to hybrid clouds and network service providers are optimization reducing costs and increasing service agility by deploying cloud-scale platforms to • Smart agents streamline support Network Functions Virtualization (NFV). infrastructure monitoring by applying machine learning to Cloud-scale infrastructure presents significant operational challenges that arise metrics local to each node because of the massive scale, software-driven complexity and highly dynamic nature of applications deployed in run-time environments supported by the • Analytics modules monitor Docker, Kubernetes and Openstack frameworks, in which workloads and SLAs and correlate anomalies and events across the entire resources fluctuate constantly. infrastructure Traditional monitoring solutions rooted in legacy infrastructure are not well • Policy-driven controller suited to the real-time, full stack monitoring requirements of today’s cloud-scale assures pre-defined -
Supervision De Matériel Informatique Avec Shinken Epreuve E6
2017-2018 Supervision de matériel informatique avec Shinken Epreuve E6 Raphaël Andrieu ARCONIC Table des matières Shinken .................................................................................................................................................... 1 Prérequis ................................................................................................................................................. 1 Installation de Shinken ............................................................................................................................ 1 Supervision .............................................................................................................................................. 4 Installation de Nagios .......................................................................................................................... 4 Supervision d’un serveur Debian ........................................................................................................ 4 Ajout d’hôte ..................................................................................................................................... 5 Ajout du groupe de Serveur Linux ................................................................................................... 6 Ajout des services ............................................................................................................................ 6 Supervision d’un serveur Windows .................................................................................................... -
Design of a Self-Healing Federated Event Processing Management System at the Edge
Design of a self-healing federated event processing management system at the edge Modelling and Orchestrating heterogeneous Executive summary Resources and Polymorphic applications for The constant upsurge of the connected devices and services along Holistic Execution and adaptation of Models with the ample numbers of heterogeneous data streams and their relay In the Cloud among different processing and persistence architectures, has augmented the demand for adequate and cost-efficient infrastructures H2020-ICT-2018-2020 to host them. This need is covered by Cloud computing as a paradigm Leadership in Enabling and Industrial that offers on-demand resources and enables its users to seamlessly Technologies: Information and adapt applications to the current demand. More recently, this has been Communication Technologies extended to using multiclouds as a means to vest on the true power of resources or services provided independently to the cloud service Grant Agreement Number vendor. Of course, this has further increased the complexity but also 871643 the importance of monitoring and analysis software solutions. The gravity of efficient monitoring of multicloud applications is Duration highlighted by the fact that it serves as a knowledge-base for deriving 1 January 2020 – corrective actions like scaling. 31 December 2022 In this deliverable, we first report on the analysis of the most prominent open-source tools used for monitoring and we describe a www.morphemic.cloud time-series based approach for persisting such data to be used in the future for forecasting purposes. Secondly, we introduce the design of Deliverable reference a configurable near real-time federated monitoring mechanism called D2.1 EMS. -
Examensarbete Nätverksövervakning
Examensarbete Nätverksövervakning En jämförelse av Sensu och op5 Monitor Författare: Kristoffer NILSSON & Ashour SHAMOUN Handledare: Marcus WILHELMSSON Examinator: Jacob LINDEHOFF Termin: VT2014 Ämne: Datavetenskap Nivå: G1E Kurskod: 1DV41E Sammanfattning Rapporten beskriver arbetet och resultaten av en jämförelse mellan Sensu och op5 Monitor, vilka är verktyg som används för att övervaka enheter i nätverk, så kallade network monitoring systems. Arbetet har utförts för att utbudet av nätverksövervak- ningsverktyg ständigt växer och det ansågs värdefullt att jämföra en ny aktör med ett äldre verktyg som är byggd på ett annat tankesätt. Det som ansågs intressant att testa var hur dessa verktyg hanterade de rapporter som skapades och samlades in, om det slutgiltiga resultatet från detta skulle skilja sig åt eller inte. För att testa detta sattes en virtuell testmiljö upp, där Sensu och op5 Monitor rullade parallellt med varandra och övervakade samma system och använde sig utav samma plugin för övervakningen. Experimenten utfördes på två stycken tjänster, BIND9 samt Apache2, i och med att de två pluginen som användes var uppbyggda på olika sätt konstruerades även olika experiment. Under dessa experiment samlades information in om hur de två över- vakningsverktygen hanterade de rapporter de fick in, vilket sedan sammanställdes och analyserades. Slutsatsen av det hela var att Sensu och op5 Monitor hanterar sina insamlade rapporter på ett likvärdigt sätt, de rapporterade resultaten blev i samtliga fall detsamma, således fungerade de två övervakningsverktygen på ett jämgott vis. Nyckelord: Sensu, op5 monitor, Nagios, nätverksövervakning, nms Abstract The report describes the work and results of a comparison between Sensu and op5 Monitor, which are both tools used to monitor devices in a network, more commonly known as network monitoring systems. -
Forcepoint Appliances Command Line Interface (CLI) Guide
Forcepoint Appliances Command Line Interface (CLI) Guide V Series, X Series, & Virtual Appliances v8.4.x ©2018, Forcepoint All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2018 Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine- readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Contents Topic 1 Forcepoint Appliances Command Line Interface . .1 Conventions . .1 Logon and authentication . .2 CLI modes and account privileges . .2 Basic account management . .3 Command syntax. .9 Help for CLI commands . .9 System configuration . .10 Time and date . .11 Host name and description . .14 User certificates. .15 Filestore definition and file save commands. .16 Appliance interface configuration. .18 Appliance vswitch configuration . .29 Content Gateway Decryption Port Mirroring (DPM) . .29 Static routes. .31 Appliance status . .35 SNMP monitoring (polling) . .35 SNMP traps and queries . .38 Module-specific commands . -
SISR5 Supervision Des Réseaux Mise En Place D'un Outil De Supervision – Deuxième Partie
FAMEL Yoan 02/12/2015 PAYET Yoann BTS SIO – SISR SISR5 Supervision des réseaux Mise en place d'un outil de supervision – Deuxième partie Table des matières Introduction..........................................................................................................................................2 Infrastructure réseau.............................................................................................................................3 Supervision de serveurs sous Windows................................................................................................4 Mise en place de contrôles (sondes) de supervision d'un serveur sous Windows..........................4 Configuration de Shinken.............................................................................................................10 Supervision de matériels.....................................................................................................................15 Supervision d'une imprimante réseau...........................................................................................15 Supervision d'un routeur...............................................................................................................16 Supervision d'un commutateur.....................................................................................................20 Utilisation d'indications métrologiques graphiques............................................................................24 Notifications des alertes.....................................................................................................................34