Tripp Lite 0 Idades Manual
Have a look at the manual Tripp Lite 0 Idades Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 7 Tripp Lite manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
161 Chapter 10: Nagios Integration 10.2 Central management and setting up SDT for Nagios The Nagios solution has three parts: the Central Nagios server, Distributed Console Servers and the SDT for Nagios software. Central Nagios server • A vanilla Nagios 2.x or 3.x installation (typically on a Linux server)\ • Generally running on a blade, PC, virtual machine, etc. at a central loc\ ation • Runs a web server that displays the Nagios GUI • Imports configuration from distributed Console Servers Distributed Console Servers • B096-016 / B096-032 / B096-048 or B092-016 Console Servers • Serial and network hosts are attached to each Console Server • Each runs Nagios plug-ins, NRPE and NSCA add-ons, but not a full Nagios \ server Clients • Typically a client PC, laptop, etc. running Windows, Linux or Mac OS X • Runs Tripp Lite SDT Connector client software 1.5.0 or later • Connect to the central Nagios server web UI to view status of monitored \ hosts and serial devices • Then use SDT Connector to connect through the distributed Console Server\ s, to manage monitored hosts and serial devices 10.2.1 Set up central Nagios server The Nagios server software is available for most major distributors of L\ inux using the standard package management tools. Your distributor will have documentation available on how to install Nagi\ os. This is usually the quickest and simplest way to get up and running. Note that you will need the core Nagios server package, and at least one\ of the NRPE or NSCA add-ons. NSCA is required to utilize the alerting features of the distributed hosts; installing both \ NRPE and NSCA is recommended. You will also require a web server such as Apache to display the Nagios w\ eb UI (and this may be installed automatically as a dependency of the Nagios packages). Alternatively, you may wish to download the Nagios source code directly from the Nagi\ os website, and build and install the software from scratch. The Nagios website (http://www.nagios.org) has several Quick Start Guides that walk through this process. Once you are able to browse to your Nagios server and see its web UI and\ the local services it monitors by default, you are ready to continue.
162 Chapter 10: Nagios Integration 10.2.2 Set up distributed Console Servers This section provides a brief walk-through on configuring a single Con\ sole Server to monitor the status of one attached network host (a Windows IIS server running HTTP and HTTPS services) and one serially attached device (the console port of a \ network router), and to send alerts back to the Nagios server when an administr\ ator connects to the router or IIS server. While this walk-through provides an example, details of the configurat\ ion options are described in the next section. This walk- through also assumes the network host and serial devices are already phy\ sically connected to the Console Server. First step is to set up the Nagios features on the Console Server: • Browse the Console Server and select System: Nagios on the Console Server Management Console. Check Nagios service Enabled • Enter the Host Name and the Nagios Host Address (i.e. IP address) that the central Nagios server will use to contact \ the distributed Console Server • Enter the IP address that the distributed Console Server will use to con\ tact the central Nagios server in Nagios Server Address • Enter the IP address that the clients running SDT Connector will use to \ connect through the distributed Console Servers in SDT Gateway address • Check Prefer NRPE, NRPE Enabled and NRPE Command Arguments • Check NSCA Enabled, choose an NSCA Encryption Method and enter and confirm an NSCA Secret. Remember these details as you will need them later on. For NSCA Interval, enter 5 • Click Apply. Next, configure the attached Window network host and specify the services you will be checking with Na\ gios (HTTP and HTTPS): • Select Network Hosts from the Serial & Network menu and click Add Host. • Enter the IP Address/DNS Name of the network server, (e.g.: 192.168.1.10) and enter a Description, (e.g.: Windows 2003 IIS Server) • Remove all Permitted Services. This server will be accessible using Terminal Services, so check TCP, Port 3389 and log level 1 and click Add. It is important to remove and re-add the service to enable logging
163 Chapter 10: Nagios Integration • Scroll down to Nagios Settings and check Enable Nagios • Click New Check and select Check Ping. Click check-host-alive • Click New Check and select Check Permitted TCP. Select Port 3389 • Click New Check and select Check TCP. Select Port 80 • Click New Check and select Check TCP. Select Port 443 • Click Apply Similarly, configure the serial port to the router to be monitored by Nagios: • Select Serial Port from the Serial & Network menu • Locate the serial port that has the router console port attached and cli\ ck Edit • Ensure the serial port settings under Common Settings are correct and match the attached router’s console port • Click Console Server Mode and select Logging Level 1 • Check Telnet (SSH access is not required, as SDT Connector is used to secure the otherw\ ise unsecured Telnet connection) • Scroll down to Nagios Settings and check Enable Nagios • Check Port Log and Serial Status • Click Apply Now set the Console Server to send alerts to the Nagios server • Select Alerts from the Alerts & Logging menu and click Add Alert • In Description enter: Administrator connection • Check Nagios (NSCA) • In Applicable Ports check the serial port that has the router console port attached. In Applicable Hosts check the IP address/DNS name of the IIS server • Click Connection Alert • Click Apply Lastly, add a User for the client running SDT Connector: • Select Users & Groups from the Serial & Network menu • Click Add User • In Username, enter: sdtnagiosuser, then enter and confirm a Password • In Accessible Hosts click the IP address/DNS name of the IIS server. In Accessible Ports click the serial port that has the router console port attached • Click Apply
164 Chapter 10: Nagios Integration 10.3 Configuring Nagios distributed monitoring To activate the Console Server’s Nagios distributed monitoring: • Nagios integration must be enabled and a path established to the central\ /upstream Nagios server • If the Console Server is to periodically report on Nagios-monitored serv\ ices, then the NSCA client embedded in the Console Server must be configured: the NSCA program enables scheduled \ check-ins with the remote Nagios server and is used to send passive check results across the network to the remote serv\ er • If the Nagios server is to actively request status updates from the Cons\ ole Server, then the NRPE server embedded in the Console Server must be configured – the NRPE server is the Nagios d\ aemon for executing plug-ins on remote hosts • Each of the Serial Ports and each of the Hosts connected to the Console Server which are to \ be monitored must have Nagios enabled and any specific Nagios checks configured • Lastly the central/upstream Nagios monitoring host must be configured \ 10.3.1 Enable Nagios on the Console Server • Select System: Nagios on the Console Server Management Console and tick the Nagios service Enabled • Enter the Nagios Host Name that the Console Server will be referred to in the Nagios central serve\ r – this will be generated from local System Name (entered in System: Administration) if unspecified • In Nagios Host Address, enter the IP address or DNS name that the upstream Nagios server will \ use to reach the Console Server – if unspecified this will default to the first ne\ twork port’s IP as entered in System: IP) • In Nagios Server Address, enter the IP address or DNS name that the Console Server will use to r\ each the upstream Nagios monitoring server • Check the Disable SDT Nagios Extensions option if you wish to disable the SDT Connector integration with your N\ agios server at the head end – this would only be checked if you want to ru\ n a vanilla Nagios monitoring • If not, enter the IP address or DNS name the SDT Nagios clients will use\ to reach the Console Server in SDT Gateway Address • When NRPE and NSCA are both enabled, NSCA is preferred method for commun\ icating with the upstream Nagios server – check Prefer NRPE to use NRPE whenever possible (i.e. for all communication except for a\ lerts)
165 Chapter 10: Nagios Integration 10.3.2 Enable NRPE monitoring Enabling NRPE allows you to execute plug-ins (such as check_tcp and check_ping) on the remote Console Server to monitor serial or network attached remote servers. This will offload CPU load \ from the upstream Nagios monitoring machine which is especially valuable if you are monitoring hundreds or thousands of hosts\ . To enable NRPE: • Select System: Nagios and check NRPE Enabled • Enter the details for the user connection to the upstream Nagios monitor\ ing server. Again, refer to the sample Nagios configuration example below for details of configuring specific NR\ PE checks By default, the Console Server will accept a connection between the upst\ ream Nagios monitoring server and the NRPE server with SSL encryption, without SSL, or tunneled through SSH. The security for the connection is configured at the Nagios server\ .
166 Chapter 10: Nagios Integration 10.3.3 Enable NSCA monitoring NSCA is the mechanism that allows you to send passive check results from\ the remote Console Server to the Nagios daemon running on the monitoring server. To enable NSCA: • Select System: Nagios and check NSCA Enabled • Select the Encryption to be used from the drop-down menu, then enter a Secret password and specify a check Interval • Refer the sample Nagios configuration section below for some examples \ of configuring specific NSCA checks
167 Chapter 10: Nagios Integration 10.3.4 Configure selected Serial Ports for Nagios monitoring The individual Serial Ports connected to the Console Server to be monitored must be configure\ d for Nagios checks. Refer to Chapter 4.4: Network Host Configuration for details on enabling Nagios monitoring for Hosts that are network co\ nnected to the Console Server. To enable Nagios to monitor a device connected to the Console Server seri\ al port: • Select Serial & Network: Serial Port and click Edit on the serial Port # to be monitored • Select Enable Nagios, specify the name of the device on the upstream server and determine th\ e check to be run on this port. Serial Status monitors the handshaking lines on the serial port and Check Port monitors the data logged for the serial port 10.3.5 Configure selected Network Hosts for Nagios monitoring The individual Network Hosts connected to the Console Server that is to \ be monitored must also be configured for Nagios checks: • Select Serial & Network: Network Port and click Edit on the Network Host to be monitored • Select Enable Nagios, specify the name of the device as it will appear on the upstream Nagio\ s server • Click New Check to add a specific check which will be run on this host • Select Check Permitted TCP/UDP to monitor a service that you have previously added as a Permitted Service • Select Check TCP/UDP to specify a service port that you wish to monitor, but do not wish to allow external (SDT Connector) access • Select Check TCP to monitor
168 Chapter 10: Nagios Integration • The Nagios Check nominated as the check-host-alive check is used to determine whether the network host itself is up or down • Typically this will be Check Ping – although in some cases the host will be configured not to respon\ d to pings • If no check-host-alive check is selected, the host will always be assumed to be up • You may deselect check-host-alive by clicking Clear check-host-alive • If required, customize the selected Nagios Checks to use custom arguments • Click Apply 10.3.6 Configure the upstream Nagios monitoring host Refer to the Nagios documentation (http://www.nagios.org/docs/) for configuring the upstream server: • The section entitled Distributed Monitoring steps through what is needed to configure NSCA on the upstream server\ (under Central Server Configuration) • NRPE Documentation, which has been recently added, steps through configuring NRPE on the\ upstream server http:// nagios.sourceforge.net/docs/nrpe/NRPE.pdf At this stage, Nagios at the upstream monitoring server is configured,\ and individual serial port and network host connections on the Console Server are configured for Nagios monitoring. If NSCA is\ enabled, each selected check will be executed once over the period of the check interval. If NRPE is enabled, then the upst\ ream server will be able to request status updates under its own scheduling.
169 Chapter 10: Nagios Integration 10.4 Advanced Distributed Monitoring Configuration 10.4.1 Sample Nagios configuration An example configuration for Nagios is listed below. It shows how to set up a remote Console Server to monitor a single hos\ t, with both network and serial connections. Each check has two configura\ tions, one for NRPE and one for NSCA. In practice, these would be combined into a single check which uses NSCA as a primary\ method and falling back to NRPE if a check were late. For details, see the Nagios documentation (http://www.nagios.org/docs/) on Service and Host Freshness Checks. ; Host definitions ; ; Console Server define host{ use generic-host host_name tripplite alias Console Server address 192.168.254.147 } ; Managed Host define host{ use generic-host host_name server alias server address 192.168.254.227 } ; NRPE daemon on gateway define command { command_name check_nrpe_daemon command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 } define service { service_description NRPE Daemon host_name tripplite use generic-service check_command check_nrpe_daemon } ; Serial Status define command { command_name check_serial_status command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c check_serial_$HOSTNAME$\ } define service { service_description Serial Status host_name server use generic-service check_command check_serial_status }
170 Chapter 10: Nagios Integration define service { service_description serial-signals-server host_name server use generic-service check_command check_serial_status active_checks_enabled 0 passive_checks_enabled 1 } define servicedependency{ name tripplite_nrpe_daemon_dep host_name tripplite dependent_host_name server dependent_service_description Serial Status service_description NRPE Daemon execution_failure_criteria w,u,c } ; Port Log define command{ command_name check_port_log command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c port_lo\ g_$HOSTNAME$ } define service { service_description Port Log host_name server use generic-service check_command check_port_log } define service { service_description port-log-server host_name server use generic-service check_command check_port_log active_checks_enabled 0 passive_checks_enabled 1 } define servicedependency{ name tripplite_nrpe_daemon_dep host_name tripplite dependent_host_name server dependent_service_description Port Log service_description NRPE Daemon execution_failure_criteria w,u,c } ; Ping define command{ command_name check_ping_via_tripplite command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c host_pi\ ng_$HOSTNAME$ }