Michael,

I first enabled under asterisk manager.conf the following context:

[someuser]
secret = somepassword
deny = 0.0.0.0/0.0.0.0
permit = XX.XX.XX.XX
read = all
write = all

Than I download it the check_asterisk_ami plugin from:
http://exchange.nagios.org/directory/Plugins/Telephony/Asterisk/check_asterisk_ami/details

Installed it in my plugins folder and than I defined my commands as so in
commands.cfg

# 'check_asterisk_ami_sip' command definition
define command{
        command_name    check_asterisk_ami_sip
        command_line    $USER1$/check_asterisk_ami -H $HOSTADDRESS$ -u
$USER3$ -p $USER4$ -q $USER5$ -w 5 -c 6
        }


# 'check_asterisk_ami_iax' command definition
define command{
        command_name    check_asterisk_ami_iax
        command_line    $USER1$/check_asterisk_ami -H $HOSTADDRESS$ -u
$USER3$ -p $USER4$ -q $USER6$ -w 2 -c 3
        }



# 'check_asterisk_ami_calls' command definition
define command{
        command_name    check_asterisk_ami_calls
        command_line    $USER1$/check_asterisk_ami -H $HOSTADDRESS$ -u
$USER3$ -p $USER4$ -q $USER7$
        }

I set my user macros under resources.cfg

$USER3$=someuser
$USER4$=somepassword
$USER5$=sippeers
$USER6$=iaxpeers
$USER7$=calls

Than yous define your object:

# Define a host for the local machine

define host{
        use                     linux-server            ; Name of host
template to use
                                                        ; This host
definition will inherit all variables that are defined
                                                        ; in (or inherited
by) the linux-server host template definition.
        host_name               pbx
        alias                   Asterisk PBX
        address                 XX.XX.XX.XX
        icon_image              ip-pbx.gif
        icon_image_alt          Asterisk PBX
        vrml_image              ip-pbx.gif
        statusmap_image         ip-pbx.gd2
        }


###############################################################################
###############################################################################
#
# SERVICE DEFINITIONS
#
###############################################################################
###############################################################################

define service{
        use                             generic-service         ; Name of
service template to use
        host_name                       pbx
        service_description             PING
        check_command                   check_ping!100.0,20%!500.0,60%
        }



define service{
        use                             generic-service         ; Name of
service template to use
        host_name                       pbx
        service_description             Check Asterisk SIP Peers
        check_command                   check_asterisk_ami_sip
        }


define service{
        use                             generic-service         ; Name of
service template to use
        host_name                       pbx
        service_description             Check Asterisk AIX2 Peers
        check_command                   check_asterisk_ami_iax
        }


define service{
        use                             generic-service
        host_name                       pbx
        service_description             Check Asterisk Open Calls
        check_command                   check_asterisk_ami_calls
        }

Good Luck



On Sat, Sep 24, 2011 at 4:18 AM, Michael Keuter <li...@mksolutions.info>wrote:

> >For those interested I got nagios working with a plugin called
> >check_asterisk_ami.
> >It works very well and it can monitor your peers and channels plus more.
>
> Yes, I find that interesting.
> How did you get to manage that? I tried to poke around with Munin in the
> past.
>
> Michael
>
> http://www.mksolutions.info
>
>
> ------------------------------------------------------------------------------
> All of the data generated in your IT infrastructure is seriously valuable.
> Why? It contains a definitive record of application performance, security
> threats, fraudulent activity, and more. Splunk takes this data and makes
> sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-d2dcopy2
> _______________________________________________
> Astlinux-users mailing list
> Astlinux-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>
> Donations to support AstLinux are graciously accepted via PayPal to
> pay...@krisk.org.
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to