光之使者 发表于 2024-6-9 15:41:58

Nagios的安装和使用

*实验* *nagios安装和使用*

Nagios 是一个监督体系运行状态和网络信息的监督体系。Nagios 能监督所指定的本地或远程主机以及服务,同时提供异常关照功能等.
Nagios 可运行在 Linux/Unix 平台之上,同时提供一个可选的基于浏览器的 WEB 界面以方便体系管理职员查看网络状态,各种体系题目,以及日志等等。
一、实验内容
1.ubuntu16.04体系nagios的安装和使用
二**、**实验步骤
1.预备
安装相干安装包:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps2.jpg&pos_id=img-bzlUtRQS-1717860505303
\2. 下载源码并解压:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps3.jpg&pos_id=img-2VEUBrwD-1717860505305
\3. 编译源码
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps4.jpg&pos_id=img-h5Da7YIC-1717860505305
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps5.jpg&pos_id=img-n3Lcp9Cu-1717860505306
\4. 创建用户和组,而且将www数据用户也添加到nagios 组中
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps6.jpg&pos_id=img-1YQwH9nT-1717860505307
5 安装二级制文件,CGIs,和HTML文件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps7.jpg&pos_id=img-0T1Wjv6K-1717860505307
6 安装服务或守护历程,并设置开机自启
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps8.jpg&pos_id=img-8MhLdKNm-1717860505307
7 安装和设置外部下令文件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps9.jpg&pos_id=img-McMl4DOc-1717860505308
8 安装SAMPLE设置文件,这个设置文件中有启动nagios必要的请求。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps10.jpg&pos_id=img-TddMw6Hu-1717860505308
9 安装apache web server 设置文件和apache设置。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps11.jpg&pos_id=img-D2JWYwF3-1717860505309
10 关闭防火墙或者打开80端口
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps12.jpg&pos_id=img-r4fEAPZ1-1717860505309
11 创建一个Apache用户账户以便登录nagios,以下下令创建一个名为nagiosadmin的用户账户,并提示输入用户账户密码;
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps13.jpg&pos_id=img-VP05Gegl-1717860505309
假如必要再次添加用户,必要把下令行中的-c去掉,否则将替换掉已经存在的nagiosadmin用户。
12 重启apache web 服务
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps14.jpg&pos_id=img-kJJVBht9-1717860505310
13启动nagios服务/守护历程
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps15.jpg&pos_id=img-sVV5Tfu5-1717860505310
14 测试
输入Ip地址192.168.1.102/nagios访问,输入创建的用户名和密码进行登录:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps16.jpg&pos_id=img-d2eHd5IO-1717860505311
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps17.jpg&pos_id=img-vzFpiyDE-1717860505312
15 安装nagios插件
nagios必要插件才可以进行操作
先决条件
确保以下安装包都安装了
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps18.jpg&pos_id=img-109CBD1f-1717860505312
下载源码:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps19.jpg&pos_id=img-yr3dYJPu-1717860505313
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps20.jpg&pos_id=img-1Y64YbOC-1717860505313
编译和安装
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps21.jpg&pos_id=img-InGZpBjY-1717860505314
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps22.jpg&pos_id=img-VyqbzZPt-1717860505314
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps23.jpg&pos_id=img-nSpdAO9I-1717860505315
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps24.jpg&pos_id=img-Flk8DCcA-1717860505316
16 测试插件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps25.jpg&pos_id=img-YKNdDGz8-1717860505317
17 nagios设置文件的修改
监控本机
查看文件:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps26.jpg&pos_id=img-qJLcFXnx-1717860505317
这个设置文件中指定了本地机器的检查设置文件localhost.cfg,这个文件是体系默认存在的。定义了要检测的属性。
浏览器访问可以查看到主机的属性:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps27.jpg&pos_id=img-pYQiGxOJ-1717860505318
检测Linux机器:
创建一个hosts.cfg文件定义要管理的linux机器,创建一个service.cfg定义要检测的服务。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps28.jpg&pos_id=img-fMcQRxVf-1717860505319
还必要将这些文件定义加进入到/usr/local/nagios/etc/nagios.cfg
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps29.jpg&pos_id=img-q8TBI8uI-1717860505319
Hosts.cfg文件定义了一个主机和主机组:检测的是192.168.1.114主机
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps30.jpg&pos_id=img-GfIBe8Fw-1717860505320
Services.cfg引用的local-service的服务作为本身的服务,这个服务的下令是检查主机是否存货,check-host-alive,这个下令在commands.cfg文件中被定义。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps31.jpg&pos_id=img-2b5un1p2-1717860505320
Local-service在这个文件中被定义:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps32.jpg&pos_id=img-pGKQTsvB-1717860505321
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps33.jpg&pos_id=img-lHr6rZje-1717860505321
重新启动服务可以在浏览器看到:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps34.jpg&pos_id=img-J9jUWuBu-1717860505322
机器启动成功。
上面已经对远程Linux 主机是否存活做了监控,而判断远程机器是否存活,我们可以使用ping 工具对其监测。另有一些远程主机服务,比方ftp、ssh、http,都是对外开放的服务,即使不用Nagios,我们也可以试的出来,任意找一台机器看能不能访问这些服务就行了。但是对于像磁盘容量,cpu负载如许的“本地信息”,Nagios只能监测本身地点的主机,而对其他的机器则显得有点无能为力。毕竟没得到被控主机的得当权限是不可能得到这些信息的。为了办理这个题目,nagios有如许一个附加组件–“NRPE”,用它就可以完成对Linux 范例主机"本地信息”的监控。
nrpe工作原理:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps35.jpg&pos_id=img-N9HShnM3-1717860505322
nrpe总共由两部分构成:
\1. Check_nrpe插件,位于监控主机上
\2. NRPE daemon,运行在远程Linux主机上(被监控主机)
当Nagios必要监控某个远程Linux主机的服务或者资源时:
\1. Nagios会运行check_nrpe这个插件,告诉它要检查什么;
\2. Check_nrpe插件会毗连到远程的NRPE daemon,所用的方式是SSL’
\3. NRPE daemon会运行相应的Nagios插件来实行检查;
\4. NRPE daemon将检查的结果返回给check_nrpe插件,插件将其递交给nagios做处理。
NRPE daemon必要Nagios插件安装在远程的Linux主机上。
在被监控机上:
创建一个用户:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps36.jpg&pos_id=img-FKq06pVE-1717860505323
安装插件:
先决条件,确保安装包已经安装
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps37.jpg&pos_id=img-owI3xpUI-1717860505323
解压插件压缩包:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps38.jpg&pos_id=img-TrfAi4Tn-1717860505323
安装:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps39.jpg&pos_id=img-ZjGeSsTK-1717860505324
查看可以发现多克两个文件夹,修改文件权限:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps40.jpg&pos_id=img-TwJn3nOX-1717860505324
安装NRPE
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps41.jpg&pos_id=img-C7LTJl1Z-1717860505325
解压:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps42.jpg&pos_id=img-z5gFOFXA-1717860505325
设置:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps43.jpg&pos_id=img-xhfem8RH-1717860505325
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps44.jpg&pos_id=img-eVDxiYtz-1717860505326
安装NRPE插件,daemon和示例设置文件
\1. 安装check_nrpe插件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps45.jpg&pos_id=img-6b25sCsr-1717860505326
\2. 安装daemon
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps46.jpg&pos_id=img-aP9ypDFf-1717860505339
安装设置文件:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps47.jpg&pos_id=img-rNJrKw85-1717860505339
安装启动文件:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps48.jpg&pos_id=img-89y7jfC0-1717860505339
修改设置文件:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps49.jpg&pos_id=img-torVqREb-1717860505340
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps50.jpg&pos_id=img-dOivp086-1717860505340
启动服务:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps51.jpg&pos_id=img-4PYrze6j-1717860505340
测试:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps52.jpg&pos_id=img-MoXFSfV9-1717860505341
安装成功。
查看检测文件:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps53.jpg&pos_id=img-gIVuVGpn-1717860505341红色部分是下令名,也就是check_nrpe 的-c 参数可以接的内容,等号 “=” 背面是实际实行的插件步伐(这与commands.cfg 中定义下令的情势非常相似,只不外是写在了一行)。也就是说check_users 就是等号背面/usr/local/nagios/libexec/check_users -w 5 -c 10 的简称。
我们可以很容易知道上面这5行定义的下令分别是检测登岸用户数,cpu负载,sda1的容量,僵尸历程,总历程数。各条下令具体的寄义见插件用法(实行“插件步伐名 –h”)。
由于-c 背面只能接nrpe.cfg 中定义的下令,也就是说现在我们只能用上面定义的这五条下令。我们可以在本机实验一下。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps54.jpg&pos_id=img-FQqpkgXb-1717860505342
在监控主机上:
安装check_nrpe插件;
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps55.jpg&pos_id=img-bQRE7lcw-1717860505342
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps56.jpg&pos_id=img-Fia45Xw4-1717860505342
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps57.jpg&pos_id=img-feBMffdp-1717860505343
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps58.jpg&pos_id=img-D7uBXimP-1717860505343
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps59.jpg&pos_id=img-K8aZyv8h-1717860505344
测试:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps60.jpg&pos_id=img-piF0DpwM-1717860505344
在commands.cfg中增长对check_nrpe的定义:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps61.jpg&pos_id=img-n5q3icvx-1717860505345
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps62.jpg&pos_id=img-fH7nGekC-1717860505345
-c 背面带的                                 A                         R                         G                         1                              ARG1                  ARG1 参数是传给nrpe daemon 实行的检测下令,之前说过了它必须是nrpe.cfg 中所定义的那5条下令中的此中一条。在services.cfg 中使用check_nrpe 的时间要用 “!” 带上这个参数。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps63.jpg&pos_id=img-nAoFCTm2-1717860505346
可以自定义下令:
比方监控swap分区
在被监控端:编辑文件/usr/local/nagios/etc/nrpe.cfg
添加:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps64.jpg&pos_id=img-nE7mWDKE-1717860505346
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps65.jpg&pos_id=img-5wnOYoWT-1717860505347
这个下令的意思是假如空闲空间小于20%则为警告状态 -> warning;假如小于10%则为严峻状态 -> critical。
重启服务。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps66.jpg&pos_id=img-UnZ7K7vh-1717860505348
在监控端:
在/usr/local/nagios/etc/objects/services.cfg添加:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps67.jpg&pos_id=img-dHUA2Eqy-1717860505348
重启nagios服务
重新访问192.168.1.102/nagios,可以看到如下图:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps68.jpg&pos_id=img-grnbA1oG-1717860505349
监控windows机器
查看windows机器的IP地址
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps69.jpg&pos_id=img-GvqnKMLD-1717860505349
修改设置,将IP地址修改为Windows机器的地址
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps70.jpg&pos_id=img-HJFTLXyT-1717860505349
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps71.jpg&pos_id=img-VmZJsr9a-1717860505350
修改nagios.cfg文件,将文件引用的注释去除,使设置生效
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps72.jpg&pos_id=img-Gq0QxmWE-1717860505350
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps73.jpg&pos_id=img-47pXzL2h-1717860505351
利用nsclient++监控远程windows上的本地消息
在nagios的libexec下有check_nt这个插件,它就是用来检查windows机器的服务的。同时必要在windows搭配软件nsclient++.
Nsclient++的原理如下图:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps74.jpg&pos_id=img-of777W7f-1717860505351
可以看到NSClient与nrpe最大的区别就是:
1.被监控机上安装有nrpe,而且另有插件,最终的监控是由这些插件来进行的。当监控主机将监控请求发给nrpe后,nrpe调用插件来完成监控。
2.NSClient++则不同,被监控机上只安装NSClient,没有任何的插件。当监控主机将监控请求发给NSClient++后,NSClient直接完成监控,全部的监控是由NSClient完成的。
这也说明了NSClient++的一个很大的题目:不灵活、没有可扩展性。它只能完本钱身本身包含的监控操作,不能由一些插件来扩展。
windows安装nsclient++
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps75.jpg&pos_id=img-VOKXu53w-1717860505352
安装完成;
修改设置文件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps76.jpg&pos_id=img-w9uqm539-1717860505352
先修改文件的权限
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps77.jpg&pos_id=img-SpGHVtFn-1717860505352
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps78.jpg&pos_id=img-JeOM30h3-1717860505353
将这些权限才可以修改设置文件。
修改文件
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps79.jpg&pos_id=img-4UgevbgC-1717860505353
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps80.jpg&pos_id=img-8OoImVGd-1717860505354
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps81.jpg&pos_id=img-HxJpJT2K-1717860505354
查看服务:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps82.jpg&pos_id=img-7fi5mDA3-1717860505355
查看端口:可以看到12489端口打开。
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps83.jpg&pos_id=img-XJTJKtsq-1717860505355
在监控端:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps84.jpg&pos_id=img-apwYLSo8-1717860505355
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps85.jpg&pos_id=img-RO00Fk6a-1717860505356
测试:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps86.jpg&pos_id=img-GZxWTfJU-1717860505357
监控器查看:
https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=file%3A%2F%2F%2FC%3A%5CUsers%5CADMINI~1%5CAppData%5CLocal%5CTemp%5Cksohtml24460%5Cwps87.jpg&pos_id=img-reCvoKn1-1717860505357
可以看到所检测的计算的一些情况
存中…(img-HxJpJT2K-1717860505354)]
查看服务:
[外链图片转存中…(img-7fi5mDA3-1717860505355)]
查看端口:可以看到12489端口打开。
[外链图片转存中…(img-XJTJKtsq-1717860505355)]
在监控端:
[外链图片转存中…(img-apwYLSo8-1717860505355)]
[外链图片转存中…(img-RO00Fk6a-1717860505356)]
测试:
[外链图片转存中…(img-GZxWTfJU-1717860505357)]
监控器查看:
[外链图片转存中…(img-reCvoKn1-1717860505357)]
可以看到所检测的计算的一些情况

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
页: [1]
查看完整版本: Nagios的安装和使用