I have done both.   I use net-snmp's 'extend' for graphing Postfix data.  

FYI - I'm using key based authentication into a non-privileged account to 
execute the script. 

> On Sep 12, 2016, at 8:01 PM, Eric Kuhnke <eric.kuh...@gmail.com> wrote:
> 
> IMHO putting hardcoded credentials into an NMS that allows it to ssh into a 
> bind server is a lot more risky than usign snmpd, snmp "extend" and polling 
> your new custom created OIDs.
> 
> 
>> On Mon, Sep 12, 2016 at 9:24 AM, Josh Baird <joshba...@gmail.com> wrote:
>> Are you talking about something like this?
>> 
>> <image.png>
>> 
>> You need to figure out how to get the data *out* of BIND.  Newer versions 
>> expose a statistics channel via XML that you can use to get data like this.  
>> For the graph above, my NMS (Zenoss 4) SSH's into each DNS server and 
>> executes a little custom script that I wrote which returns Nagios-ish style 
>> data:
>> 
>> OK|success=1022736319 referral=339 nxrrset=93439175 nxdomain=163271953 
>> recursion=373732835 failure=18408551 duplicate=13564673 dropped=0 
>> numzones=143 recursiveclients=2 rtt10=278 rtt10_100=430614909 
>> rtt100_500=52986868 rtt500_800=75607 rtt1600=989
>> 
>> Zenoss then uses this data to produce the graph that I pasted above.
>> 
>>> On Mon, Sep 12, 2016 at 11:43 AM, That One Guy /sarcasm 
>>> <thatoneguyst...@gmail.com> wrote:
>>> Im using DNSTOP to monitor real time activity on these servers I made live 
>>> (interesting to see just how perverse some of our customers are) but is 
>>> there a good tool for monitoring visually statistics, queries, cache, 
>>> errors, etc that doesnt involve building yet another server to monitor 
>>> these?
>>> 
>>> -- 
>>> If you only see yourself as part of the team but you don't see your team as 
>>> part of yourself you have already failed as part of the team.
> 

Reply via email to