SlideShare a Scribd company logo
Cisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1
Nagios overview and
application on TSTV-YES
Yating Yang
May 31, 2013
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Background
• Nagios Overview
• Nagios feature
• Nagios Installation
• Nagios Basic configuration
• How Checks Work
• Nagios application on TSTV-YES testing
• Reference
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Uses CGIs written in C for faster response and
scalability.
Background
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Nagios is a powerful monitoring system that enables organizations
to identify and resolve IT infrastructure problems before they affect
critical business processes. With Nagios you can:
• Monitor your entire IT infrastructure
• Spot problems before they occur
• Know immediately when problems arise
• Share availability data with stakeholders
• Detect security breaches
• Plan and budget for IT upgrades
• Reduce downtime and business losses
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
 Verification of availability is delegated to plugins:
The product's architecture is simple enough that writing new plugins is
fairly easy in the language of your choice.
There are many, many plugins available.
 Has intelligent checking capabilities. Attempts to distribute the
server load of running Nagios (for larger sites) and the load placed
on devices being checked.
 Configuration is done in simple, plain text files, but that can contain
much detail and are based on templates.
 Nagios reads it's configuration from an entire directory. You decide
how to define individual files.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
 Utilizes topology to determine dependencies.
Nagios differentiates between what is down vs. what is not available.
This way it avoids running unnecessary checks.
 Nagios allows you to define how you send notifications based on
combinations of:
Contacts and lists of contacts
Devices and groups of devices
Services and groups of services
Defined hours by persons or groups.
The state of a service.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Installation reference wiki:
http://zed.cisco.com/confluence/display/SPVTG/Videoscape+EPIC+Installation+and+Co
nfiguration
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
• Define how you are going to test a service.
define command{
command_name check_nrpe
command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$
}
define command {
command_name check_cpu_perf
command_line $USER1$/check_cpu_perf.sh -t 30 -a $ARG1$ $ARG2$
}
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
define host{
name generic-host
notifications_enabled 1
event_handler_enabled 1
flap_detection_enabled 1
process_perf_data 1
retain_status_information 1
retain_nonstatus_information 1
check_command check-host-alive
max_check_attempts 5
notification_interval 60
notification_period 24x7
notification_options d,r
contact_groups nobody
register 0
}
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
define host{
use tstv-linux-server ;
host_name tb6-cms1.vsr.com
alias tb6-cms1.vsr.com
address 100.6.3.11
parents N5K-LS-1
}
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
define service{
name generic-service
active_checks_enabled 1
passive_checks_enabled 1
parallelize_check 1
obsess_over_service 1
check_freshness 0
notifications_enabled 1
event_handler_enabled 1
flap_detection_enabled 1
process_perf_data 1
retain_status_information 1
retain_nonstatus_information 1
is_volatile 0
check_period 24x7
max_check_attempts 5
normal_check_interval 5
retry_check_interval 1
notification_interval 60
notification_period 24x7
notification_options c,r
register 0
}
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
define service{
use tstv-service
hostgroup_name tstv-vms-servers
service_description CPU Usage
check_command check_nrpe!check_cpu_perf
}
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
 Nodes can have parents.
 For example, the parent of a PC connected to a
switch would be the switch.
 This allows us to specify the network dependencies
that exist between machines, switches, routers, etc.
 This avoids having Nagios send alarms when a
parent does not respond.
 A node can have multiple parents.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
 A node/host/device consists of one or more service
checks (PING, HTTP, MYSQL, SSH, etc)
 Periodically Nagios checks each service for each node
and determines if state has changed. State changes are:
CRITICAL
WARNING
UNKNOWN
 For each state change you can assign:
Notification options (as mentioned before)
Event handlers
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• In this manner it can take some time before a host change's its state
to “down” as Nagios first does a service check and then a node
check.
• By default Nagios does a node check 3 times before it will change the
nodes state to down.
• You can, of course, change all this.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
• NRPE (Nagios Remote Plugin Executor)
• NSCA (Nagios Service Check Acceptor)
• These solutions may be best if you are able to compile and install
software on the other machine. But in our solution, CDS-IS, VOS,
Appsuite are customized linux OS and have limitation to install above
plugin. Need to develop plugin to access these subsystem.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• Nagios web site
http://www.nagios.org/
Nagios plugins site
http://sourceforge.net/projects/nagiosplug/
• A Debian tutorial on Nagios
http://www.debianhelp.co.uk/nagios.htm
• Commercial Nagios support
http://www.nagios.com/
• Nagios在线帮助中文版
http://nagios-cn.sourceforge.net/nagios-cn/index.html

More Related Content

What's hot

Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
Mike Villiger
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
VMware Tanzu
 
Understanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NATUnderstanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NAT
Cisco Russia
 
The TLS Upgrade
The TLS UpgradeThe TLS Upgrade
The TLS Upgrade
AppViewX
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
Dhruv Sharma
 
How to configure cisco asa virtual firewall
How to configure cisco asa virtual firewallHow to configure cisco asa virtual firewall
How to configure cisco asa virtual firewall
IT Tech
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
mohannadalhanahnah
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Cuc pcd tac_toi
Cuc pcd tac_toiCuc pcd tac_toi
Cuc pcd tac_toi
Michael Ganschuk
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
Irsandi Hasan
 
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
Solomon Abavire Kobina,
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
TechWell
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
Felipe Lamus
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
Anwesh Dixit
 
Hacking liferay
Hacking liferayHacking liferay
Hacking liferay
Armel Nene
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
ali raza
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
ali raza
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context Training
Tariq Bader
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption
ProtectWise
 

What's hot (20)

Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
Understanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NATUnderstanding and Troubleshooting ASA NAT
Understanding and Troubleshooting ASA NAT
 
The TLS Upgrade
The TLS UpgradeThe TLS Upgrade
The TLS Upgrade
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
How to configure cisco asa virtual firewall
How to configure cisco asa virtual firewallHow to configure cisco asa virtual firewall
How to configure cisco asa virtual firewall
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
 
Cuc pcd tac_toi
Cuc pcd tac_toiCuc pcd tac_toi
Cuc pcd tac_toi
 
CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9CCNA Discovery 4 - Chapter 9
CCNA Discovery 4 - Chapter 9
 
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Hacking liferay
Hacking liferayHacking liferay
Hacking liferay
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context Training
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption
 

Viewers also liked

Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Nagios
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
Hitesh Bhatia
 
Nagios Conference 2012 - Mike Weber - NRPE
Nagios Conference 2012 - Mike Weber - NRPENagios Conference 2012 - Mike Weber - NRPE
Nagios Conference 2012 - Mike Weber - NRPE
Nagios
 
Nagios World Conference 2015 - Scott Wilkerson Opening
Nagios World Conference 2015 - Scott Wilkerson OpeningNagios World Conference 2015 - Scott Wilkerson Opening
Nagios World Conference 2015 - Scott Wilkerson Opening
Nagios
 
Nagios nrpe
Nagios nrpeNagios nrpe
Nagios nrpe
sharad chhetri
 
Nagios monitoring - tech talk
Nagios monitoring  - tech talkNagios monitoring  - tech talk
Nagios monitoring - tech talk
Renan Berto
 
Nagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
Nagios Conference 2013 - Luis Contreras - Nagios in Wind TelcomNagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
Nagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
Nagios
 
Pfe master fst_final_decembre2015
Pfe master fst_final_decembre2015Pfe master fst_final_decembre2015
Pfe master fst_final_decembre2015
Ghali Rahma
 

Viewers also liked (8)

Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
Nagios Conference 2014 - Anna-Sofia Lejman - The Experience of Inheriting a N...
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
 
Nagios Conference 2012 - Mike Weber - NRPE
Nagios Conference 2012 - Mike Weber - NRPENagios Conference 2012 - Mike Weber - NRPE
Nagios Conference 2012 - Mike Weber - NRPE
 
Nagios World Conference 2015 - Scott Wilkerson Opening
Nagios World Conference 2015 - Scott Wilkerson OpeningNagios World Conference 2015 - Scott Wilkerson Opening
Nagios World Conference 2015 - Scott Wilkerson Opening
 
Nagios nrpe
Nagios nrpeNagios nrpe
Nagios nrpe
 
Nagios monitoring - tech talk
Nagios monitoring  - tech talkNagios monitoring  - tech talk
Nagios monitoring - tech talk
 
Nagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
Nagios Conference 2013 - Luis Contreras - Nagios in Wind TelcomNagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
Nagios Conference 2013 - Luis Contreras - Nagios in Wind Telcom
 
Pfe master fst_final_decembre2015
Pfe master fst_final_decembre2015Pfe master fst_final_decembre2015
Pfe master fst_final_decembre2015
 

Similar to Nagios-yating

Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Cisco Russia
 
Enterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentEnterprise Node - Securing Your Environment
Enterprise Node - Securing Your Environment
Kurtis Kemple
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Canada
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOps
Cisco DevNet
 
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PROIDEA
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
wosborne03
 
CHAI by Wanclouds for OpenStack Operations
CHAI by Wanclouds for OpenStack OperationsCHAI by Wanclouds for OpenStack Operations
CHAI by Wanclouds for OpenStack Operations
Zayad Bin Tariq Malik
 
5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
openstackindia
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Cisco Russia
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
Cisco Canada
 
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Yathiraj Udupi, Ph.D.
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Canada
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
Gaurav "GP" Pal
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
VMware Tanzu
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
WilliamsTaylor65
 
OpenStack with OpenDaylight
OpenStack with OpenDaylightOpenStack with OpenDaylight
OpenStack with OpenDaylight
Vikram G Hosakote
 
Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013
Puppet
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
 

Similar to Nagios-yating (20)

Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
 
Enterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentEnterprise Node - Securing Your Environment
Enterprise Node - Securing Your Environment
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOps
 
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
CHAI by Wanclouds for OpenStack Operations
CHAI by Wanclouds for OpenStack OperationsCHAI by Wanclouds for OpenStack Operations
CHAI by Wanclouds for OpenStack Operations
 
5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
 
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
Cloud = Application Enablement and Innovation ≠ IaaS (Cloud Foundry Summit 2014)
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
OpenStack with OpenDaylight
OpenStack with OpenDaylightOpenStack with OpenDaylight
OpenStack with OpenDaylight
 
Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 

Nagios-yating

  • 1. Cisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1 Nagios overview and application on TSTV-YES Yating Yang May 31, 2013
  • 2. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 • Background • Nagios Overview • Nagios feature • Nagios Installation • Nagios Basic configuration • How Checks Work • Nagios application on TSTV-YES testing • Reference
  • 3. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Uses CGIs written in C for faster response and scalability. Background
  • 4. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 • Nagios is a powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes. With Nagios you can: • Monitor your entire IT infrastructure • Spot problems before they occur • Know immediately when problems arise • Share availability data with stakeholders • Detect security breaches • Plan and budget for IT upgrades • Reduce downtime and business losses
  • 5. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5  Verification of availability is delegated to plugins: The product's architecture is simple enough that writing new plugins is fairly easy in the language of your choice. There are many, many plugins available.  Has intelligent checking capabilities. Attempts to distribute the server load of running Nagios (for larger sites) and the load placed on devices being checked.  Configuration is done in simple, plain text files, but that can contain much detail and are based on templates.  Nagios reads it's configuration from an entire directory. You decide how to define individual files.
  • 6. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6  Utilizes topology to determine dependencies. Nagios differentiates between what is down vs. what is not available. This way it avoids running unnecessary checks.  Nagios allows you to define how you send notifications based on combinations of: Contacts and lists of contacts Devices and groups of devices Services and groups of services Defined hours by persons or groups. The state of a service.
  • 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Installation reference wiki: http://zed.cisco.com/confluence/display/SPVTG/Videoscape+EPIC+Installation+and+Co nfiguration
  • 8. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 • Define how you are going to test a service. define command{ command_name check_nrpe command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -c $ARG1$ } define command { command_name check_cpu_perf command_line $USER1$/check_cpu_perf.sh -t 30 -a $ARG1$ $ARG2$ }
  • 10. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 define host{ name generic-host notifications_enabled 1 event_handler_enabled 1 flap_detection_enabled 1 process_perf_data 1 retain_status_information 1 retain_nonstatus_information 1 check_command check-host-alive max_check_attempts 5 notification_interval 60 notification_period 24x7 notification_options d,r contact_groups nobody register 0 }
  • 11. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 define host{ use tstv-linux-server ; host_name tb6-cms1.vsr.com alias tb6-cms1.vsr.com address 100.6.3.11 parents N5K-LS-1 }
  • 12. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 define service{ name generic-service active_checks_enabled 1 passive_checks_enabled 1 parallelize_check 1 obsess_over_service 1 check_freshness 0 notifications_enabled 1 event_handler_enabled 1 flap_detection_enabled 1 process_perf_data 1 retain_status_information 1 retain_nonstatus_information 1 is_volatile 0 check_period 24x7 max_check_attempts 5 normal_check_interval 5 retry_check_interval 1 notification_interval 60 notification_period 24x7 notification_options c,r register 0 }
  • 13. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 define service{ use tstv-service hostgroup_name tstv-vms-servers service_description CPU Usage check_command check_nrpe!check_cpu_perf }
  • 14. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14  Nodes can have parents.  For example, the parent of a PC connected to a switch would be the switch.  This allows us to specify the network dependencies that exist between machines, switches, routers, etc.  This avoids having Nagios send alarms when a parent does not respond.  A node can have multiple parents.
  • 15. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15  A node/host/device consists of one or more service checks (PING, HTTP, MYSQL, SSH, etc)  Periodically Nagios checks each service for each node and determines if state has changed. State changes are: CRITICAL WARNING UNKNOWN  For each state change you can assign: Notification options (as mentioned before) Event handlers
  • 16. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 • In this manner it can take some time before a host change's its state to “down” as Nagios first does a service check and then a node check. • By default Nagios does a node check 3 times before it will change the nodes state to down. • You can, of course, change all this.
  • 17. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 • NRPE (Nagios Remote Plugin Executor) • NSCA (Nagios Service Check Acceptor) • These solutions may be best if you are able to compile and install software on the other machine. But in our solution, CDS-IS, VOS, Appsuite are customized linux OS and have limitation to install above plugin. Need to develop plugin to access these subsystem.
  • 18. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 • Nagios web site http://www.nagios.org/ Nagios plugins site http://sourceforge.net/projects/nagiosplug/ • A Debian tutorial on Nagios http://www.debianhelp.co.uk/nagios.htm • Commercial Nagios support http://www.nagios.com/ • Nagios在线帮助中文版 http://nagios-cn.sourceforge.net/nagios-cn/index.html

Editor's Notes

  1. CGI 就是HTML表单与服务端脚本之间的接口 CGI脚本简单地讲是个运行在Web服务器上的程序, 有浏览器的输入触发. 这个脚本通常象服务器和系统中其他程序如数据库的桥梁。
  2. First launched in 1999, Nagios has grown to include thousands of projects developed by the worldwide Nagios community. Nagios is officially sponsored by Nagios Enterprises, which supports the community in a number of different ways through sales of its commercial products and services. Nagios monitors your entire IT infrastructure to ensure systems, applications, services, and business processes are functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing them to begin remediation processes before outages affect business processes, end-users, or customers. With Nagios you'll never be left having to explain why an unseen infrastructure outage hurt your organization's bottom line.
  3. Introduction Nagios supports optional detection of hosts and services that are "flapping". Flapping occurs when a service or host changes state too frequently, resulting in a storm of problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set too low), troublesome services, or real network problems. How Flap Detection Works Before I get into this, let me say that flapping detection has been a little difficult to implement. How exactly does one determine what "too frequently" means in regards to state changes for a particular host or service? When I first started thinking about implementing flap detection I tried to find some information on how flapping could/should be detected. I couldn't find any information about what others were using (where they using any?), so I decided to settle with what seemed to me to be a reasonable solution...
  4. check_by_ssh plugin: execute checks via SSH. If you are able to access the remote machine via SSH and the ability to set an SSH public key, then the check_by_ssh plugin is perhaps your best bet. tps column indicates the number of transfers per second