swift 08/07/30 18:28:15 Modified: nagios-guide.xml Log: small updates
Revision Changes Path 1.6 xml/htdocs/doc/en/nagios-guide.xml file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/nagios-guide.xml?rev=1.6&view=markup plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/nagios-guide.xml?rev=1.6&content-type=text/plain diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/nagios-guide.xml?r1=1.5&r2=1.6 Index: nagios-guide.xml =================================================================== RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/nagios-guide.xml,v retrieving revision 1.5 retrieving revision 1.6 diff -u -r1.5 -r1.6 --- nagios-guide.xml 9 Jul 2008 16:54:13 -0000 1.5 +++ nagios-guide.xml 30 Jul 2008 18:28:15 -0000 1.6 @@ -1,5 +1,5 @@ <?xml version="1.0" encoding="UTF-8"?> -<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/nagios-guide.xml,v 1.5 2008/07/09 16:54:13 swift Exp $ --> +<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/nagios-guide.xml,v 1.6 2008/07/30 18:28:15 swift Exp $ --> <!DOCTYPE guide SYSTEM "/dtd/guide.dtd"> <guide disclaimer="draft"> @@ -224,22 +224,25 @@ <body> <p> -There are two methods available to monitor remote hosts. +There are various methods available to monitor remote hosts. </p> <ol> <li> - Use the <path>check_ssh</path> command to log on remotely to the system and - execute the check you want to perform on that system - </li> - <li> Use the <e>NRPE</e> daemon on the remote host and have Nagios communicate to this daemon using the <path>check_nrpe</path> plugin </li> + <li> + Use a password-less SSH connection to execute the command remotely + </li> + <li> + Trap SNMP events and create Nagios alerts from it + </li> </ol> <p> -We first focus on using the NRPE method as it is the most popular one. +We focus on using the NRPE method as it is the most popular one and leave the +other methods as an interesting excercise. </p> </body> @@ -378,39 +381,76 @@ </body> </section> -</chapter> -<chapter> -<title>Adding Gentoo Support</title> <section> -<title>System Security Checks</title> +<title>Using Passwordless SSH Connection</title> <body> <p> -TODO integrate glsa-check plugin, cf. wschlich stuff? +Just as we did by creating the <c>check_nrpe</c> command, we can create a +command that executes a command remotely through a passwordless SSH connection. +We leave this up as an interesting exercise to the reader. </p> +<p> +A few pointers and tips: +</p> + +<ul> + <li> + Make sure the passwordless SSH connection is set up for a dedicated user + (definitely not root) - most checks you want to execute do not need root + privileges anyway + </li> + <li> + Creating a passwordless SSH key can be accomplished with <c>ssh-keygen</c>, + you install a key on the destination system by adding the public key to the + <path>.ssh/authorized_keys</path> file + </li> +</ul> + </body> </section> </chapter> <chapter> <title>More Resources</title> <section> -<title>Nagios Resources</title> +<title>Adding Gentoo Checks</title> <body> <p> -TODO check plugins (nagiosexchange.org) +It is quite easy to extend Nagios to include Gentoo-specific checks, such as +security checks (GLSAs). Gentoo developer Wolfram Schlich has a +<c>check_glsa.sh</c> script <uri +link="http://dev.gentoo.org/~wschlich/misc/nagios/nagios-plugins-extra/nagios-plugins-extra-4/plugins/">available</uri> +amongst others. </p> -<p> -TODO additional nagios packages -</p> +</body> +</section> +<section> +<title>Nagios Resources</title> +<body> + +<ul> + <li> + <uri>http://www.nagios.org</uri>, the official Nagios website + </li> + <li> + <uri>http://www.nagiosexchange.org</uri>, where you can find Nagios plugins + and addons + </li> + <li> + <uri>http://www.nagiosforge.org</uri>, where developers host Nagios addon + projects + </li> + <li> + <uri>http://www.nagioswiki.org</uri>, for more information and tutorials on + Nagios + </li> +</ul> </body> </section> </chapter> -<!-- TODO additional chapter "Extending the Nagios Installation", - dixit dertobi123 ---> </guide>
