万本电子书0元读

万本电子书0元读

顶部广告

Nagios Core Administration Cookbook - Second Edition电子书

售       价:¥

3人正在读 | 0人评论 9.8

作       者:Tom Ryder

出  版  社:Packt Publishing

出版时间:2016-02-29

字       数:285.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your networkAbout This BookMaster the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contactsFilter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problemsPull Nagios Core's data into a database to write clever custom reports of your own deviseWho This Book Is ForIf you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of *ing would be helpful when we discuss how plugins work.What You Will LearnManage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checksFind, install, and even write your own check pluginsFilter notifications to send them to the right people or programs at the right timeWork around difficult network accessibility issues and delegate checks to other machinesTweak a Nagios Core server to achieve both high performance and redundancy in case of disasterProcess the results of checks performed by other machines to monitor backups and similar processesExtend Nagios Core to allow advanced *ing, reporting, and network visualization behaviorIn DetailNagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users.This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond.The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, *ing hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring world.Style and approachEach chapter contains a set of step-by-step recipes to perform an example of a commonly performed task related to network administration. The book begins by focusing closely on the properties and configuration of Nagios Core itself, and gradually moves on to other pieces of software that can support, manage, and extend the system.
目录展开

Nagios Core Administration Cookbook Second Edition

Table of Contents

Nagios Core Administration Cookbook Second Edition

Credits

About the Author

About the Reviewer

www.PacktPub.com

eBooks, discount offers, and more

Why Subscribe?

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Understanding Hosts, Services, and Contacts

Introduction

Creating a new network host

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new HTTP service

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new e-mail contact

Getting ready

How to do it...

How it works...

There's more...

See also

Verifying configuration

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new hostgroup

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new servicegroup

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new contactgroup

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new time period

Getting ready

How to do it...

How it works...

There's more...

See also

Running a service on all hosts on a group

Getting ready

How to do it...

How it works...

There's more...

See also

2. Working with Commands and Plugins

Introduction

Finding a plugin

Getting ready

How to do it...

How it works...

There's more...

See also

Installing a plugin

Getting ready

How to do it...

How it works...

There's more...

See also

Removing a plugin

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a new command

Getting ready

How to do it...

How it works...

There's more...

See also

Customizing an existing command

Getting ready

How to do it...

How it works...

There's more...

See also

Using an alternative check command for hosts

Getting ready

How to do it...

How it works...

There's more...

See also

Writing a new plugin from scratch

Getting ready

How to do it...

How it works...

There's more...

See also

Implementing threshold checks in a plugin

Getting ready

How to do it...

How it works...

There's more...

See also

Using macros as environment variables in a plugin

Getting ready

How to do it…

How it works...

There's more...

See also

3. Working with Checks and States

Introduction

Specifying how frequently to check a host or service

Getting ready

How to do it...

How it works...

There's more...

See also

Changing thresholds for PING RTT and packet loss

Getting ready

How to do it...

How it works...

There's more...

See also

Changing thresholds for disk usage

Getting ready

How to do it...

How it works...

There's more...

See also

Scheduling downtime for a host or service

Getting ready

How to do it...

How it works...

There's more...

See also

Managing brief outages with flapping

Getting ready

How to do it...

How it works...

There's more...

See also

Adjusting flapping percentage thresholds for a service

Getting ready

How to do it...

How it works...

There's more...

See also

4. Configuring Notifications

Introduction

Configuring notification periods

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring notifications for groups

Getting ready

How to do it...

How it works...

There's more...

See also

Choosing states for notification

Getting ready

How to do it...

How it works...

There's more...

See also

Specifying the number of failed checks before notification

Getting ready

How to do it...

How it works...

There's more...

See also

Automating contact rotation

Getting ready

How to do it...

How it works...

There's more...

See also

Defining an escalation for repeated notifications

Getting ready

How to do it...

How it works...

There's more...

See also

Defining a custom notification method

Getting ready

How to do it...

How it works...

There's more...

See also

Filtering notifications based on a host or service value

Getting ready

How to do it...

How it works...

There's more...

See also

5. Monitoring Methods

Introduction

Monitoring PING for any host

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring SSH for any host

Getting ready

How to do it...

How it works...

There's more...

See also

Checking an alternative SSH port

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring mail services

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring web services

Getting ready

How to do it...

How it works...

There's more...

See also

Checking that a website returns a given string

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring database services

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring the output of an SNMP query

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring a RAID or other hardware device

Getting ready

How to do it...

How it works...

See also

Creating an SNMP OID for monitoring

Getting ready

How to do it...

How it works...

There's more...

See also

6. Enabling Remote Execution

Introduction

Monitoring local services on a remote machine with NRPE

Getting ready

How to do it...

How it works...

There's more...

See also

Setting the listening address for NRPE

Getting ready

How to do it...

How it works...

See also

Setting allowed client hosts for NRPE

Getting ready

How to do it...

How it works...

There's more...

See also

Creating new NRPE command definitions securely

Getting ready

How to do it...

How it works...

There's more...

See also

Giving limited sudo(8) privileges to NRPE

Getting ready

How to do it...

How it works...

There's more...

See also

Using check_by_ssh with key authentication instead of NRPE

Getting ready

How to do it...

How it works...

There's more...

See also

Using check_mk instead of NRPE

Getting ready

How to do it...

How it works...

There's more...

See also

7. Using the Web Interface

Introduction

Using the Tactical Overview

Getting started

How to do it...

How it works...

There's more...

See also

Viewing and interpreting availability reports

Getting started

How to do it...

How it works...

There's more...

See also

Viewing and interpreting trends

Getting started

How to do it...

How it works...

There's more...

See also

Viewing and interpreting notification history

Getting started

How to do it...

How it works...

There's more...

See also

Adding comments on hosts or services in the web interface

Getting started

How to do it...

How it works...

There's more...

See also

Viewing configuration in the web interface

Getting started

How to do it...

How it works...

There's more...

See also

Scheduling checks from the web interface

Getting started

How to do it...

How it works...

There's more

See also

Acknowledging a problem via the web interface

Getting started

How to do it...

How it works...

There's more...

See also

8. Managing Network Layout

Introduction

Creating a network host hierarchy

Getting ready

How to do it…

How it works…

There's more…

See also

Using the network map

Getting ready

How to do it…

How it works…

There's more…

See also

Choosing icons for hosts

Getting ready

How to do it…

How it works…

There's more…

See also

Establishing a host dependency

Getting ready

How to do it…

How it works…

There's more…

See also

Establishing a service dependency

Getting ready

How to do it…

How it works…

There's more…

See also

Monitoring individual nodes in a cluster

Getting ready

How to do it…

How it works…

There's more…

See also

Using the network map as an overlay

Getting ready

How to do it…

How it works…

There's more…

See also

9. Managing Configuration

Introduction

Grouping configuration files in directories

Getting ready

How to do it…

How it works…

There's more…

See also

Keeping a configuration under version control

Getting ready

How to do it…

How it works…

There's more…

See also

Configuring host roles using groups

Getting ready

How to do it…

How it works…

There's more…

See also

Building groups using regular expressions

Getting ready

How to do it…

How it works…

There's more…

See also

Using inheritance to simplify configuration

Getting ready

How to do it…

How it works…

There's more…

See also

Defining macros in a resource file

Getting ready

How to do it…

How it works…

There's more…

See also

Using another object's directives in a host or service check

Getting ready

How to do it…

How it works…

There's more…

See also

Using custom directives

Getting ready

How to do it…

How it works…

There's more…

See also

Dynamically building host definitions

Getting ready

How to do it…

How it works…

There's more…

See also

10. Security and Performance

Introduction

Using authentication for the Nagios Core web interface

Getting ready

How to do it...

How it works...

There's more...

See also

Using authenticated contacts

Getting ready

How to do it...

How it works...

There's more...

See also

Writing debugging information to the Nagios log file

Getting ready

How to do it...

How it works...

There's more...

See also

Monitoring Nagios performance with nagiostats

Getting ready

How to do it...

How it works...

There's more...

See also

Setting up a redundant monitoring host

Getting ready

How to do it...

How it works...

There's more...

See also

11. Automating and Extending Nagios Core

Introduction

Allowing and submitting passive checks

Getting ready

How to do it...

How it works...

There's more...

See also

Submitting passive checks from a remote host with NSCA

Getting ready

How to do it...

How it works...

There's more...

See also

Submitting passive checks in response to SNMP traps

Getting ready

How to do it...

How it works...

There's more...

See also

Setting up an event handler script

Getting ready

How to do it...

How it works...

There's more...

See also

Tracking host and service states with Nagiosgraph

Getting ready

How to do it...

How it works...

There's more...

See also

Reading status in a MySQL database with NDOUtils

Getting ready

How to do it...

How it works...

There's more...

See also

Reading status from a Unix socket with MK Livestatus

Getting ready

How to do it...

How it works...

There's more...

See also

Writing customized Nagios Core reports

Getting ready

How to do it...

How it works...

See also

Getting extra visualizations with NagVis

Getting ready

How to do it...

How it works...

There's more...

See also

Writing custom Nagios Core management scripts

Getting ready

How to do it...

How it works...

There's more...

See also

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部