SlideShare a Scribd company logo
monitoringProtocols
NSClient Workshop: 04 Protocols
Active 
Passive 
Realtime 
Future 
Everyx minute 
Everyx minute 
Onlyon errors 
Onlyon errors 
For eachservice 
For mostservices 
Onlyon errors 
Onlyon errors 
Verychatty 
Verychatty 
Lesschatty 
Not chatty 
NRPE 
NRPE (ish) 
NSCA 
NSCA 
check_nt(ish) 
NRDP 
REST 
REST 
REST 
REST 
NSCP 
NSCP 
NSCP 
NSCP
NSClient Workshop: 04 Protocols
NRPE 
Server 
Core 
Check 
System 
Check 
EventLog 
Check 
ExternalScripts 
check_foo.bat 
QUERY 
NRPE 
(1024) 
QUERY 
Port: 5666 
allowedhosts 
arguments 
arguments
insecure=true
NSClient Workshop: 04 Protocols
ConfiguringNRPE
3:1 UsingNRPE
You know this one by now… 
Enable NRPE 
Run check_memoryvia NRPE
Enable NRPE 
Run check_memoryvia NRPE 
nscphelp 
nscpnrpehelp 
# Dontforgetto (re)start NSClient++
Enable NRPE 
Run check_memoryvia NRPE 
nscphelp 
nscpnrpehelp 
# Dontforgetto (re)start NSClient++ 
nscpnrpe--help 
nscpnrpeinstall --help
Enable NRPE 
Run check_memoryvia NRPE 
nscpnrpeinstall --insecure true 
--allowed-hosts 127.0.0.1 --arguments safe 
check_nrpe--insecure--host 127.0.0.1 
--command check_memory
NSClient Workshop: 04 Protocols
Scheduler 
Core 
Check 
System 
Check 
EventLog 
Check 
ExternalScripts 
check_foo.bat 
NSCA 
(512) 
QUERY 
Target: nsca 
address 
port 
password 
encryption 
commands 
interval 
Etc… 
NSCAClient 
Notification
NSClient Workshop: 04 Protocols
UsingNSCA
3:2 EnableNSCA
Setup a check_cpucheck every 5 seconds. 
Send the result via NSCA to localhost:5667 
No encryption, password=test
Setup a check_cpucheck every 5 seconds. 
Send the result via NSCA to localhost:5667 
No encryption, password=test 
Enable, Schedulerand NSCAClient 
Firstadda schedule 
Thenconfiguredefault target
Setup a check_cpucheck every 5 seconds. 
Send the result via NSCA to localhost:5667 
No encryption, password=test 
Enable, Schedulerand NSCAClient 
Firstadda schedule 
/settings/scheduler/schedules 
Thenconfiguredefault target 
/settings/NSCA/client/targets/default
Setup a check_cpucheck every 5 seconds. 
Send the result via NSCA to localhost:5667 
No encryption, password=test 
nscptest --settings nsca_server.ini 
nscptest --settings nsca_client.ini
NSClient Workshop: 04 Protocols
WEB 
Server 
Core 
Check 
System 
Check 
EventLog 
Check 
ExternalScripts 
check_foo.bat 
QUERY 
HTTP 
QUERY 
Port: 8443, 8080allowedhosts 
arguments
curl--insecure --header "password: PASSWORD“ https://localhost:8443/query/QUERY?ARGScurl--insecure --header "password: PASSWORD“ https://localhost:8443/query/check_cpu?show-all
UsingREST
3:3 UseREST
Curl can be found under: C:nsclienttools 
Base URL is: https://localhost:8443/query/QUERY?ARGS 
Check check_memoryvia REST 
Whatsthe differenceifyouaddshow-all?
Check check_memoryvia REST 
Whatsthe differenceifyouaddshow-all? 
Curl can be found under: C:nsclienttools 
Base URL is: https://localhost:8443/query/QUERY?ARGS 
Enable web server and set the password (see previous lab) 
Then use curl
Check check_memoryvia REST 
Whatsthe differenceifyouaddshow-all? 
Curl can be found under: C:nsclienttools 
Base URL is: https://localhost:8443/query/QUERY?ARGS 
Enable web server and set the password (see previous lab) 
Then use curl 
Don’t forget: --insecure, --header "password: PASSWORD“
Check check_memoryvia REST 
Whatsthe differenceifyouaddshow-all? 
Curl can be found under: C:nsclienttools 
Base URL is: https://localhost:8443/query/QUERY?ARGScurl --insecure --header "password: PASSWORD“ https://localhost:8443/query/check_memory?show-all
NSClient Workshop: 04 Protocols

More Related Content

What's hot (20)

PDF
Безопасность интернет-приложений осень 2013 лекция 7
Technopark
 
PDF
YASPS OPENNING
Jeen Lee
 
ODT
Squid file
Nalin Peiris
 
PDF
Monitoring Containers with Weave Scope
Weaveworks
 
PDF
How To Check IE Enhanced Security Is Enabled Windows PowerShell
VCP Muthukrishna
 
PPTX
How to build a container monitoring solution - David Gildeh, CEO and Co-Found...
Outlyer
 
PDF
A little systemtap
yang bingwu
 
PDF
Salt stack
Jose Galarza
 
PDF
NSClient++ Workshop: 01 Introduction
Michael Medin
 
PPTX
Laravel Day / Deploy
Simone Gentili
 
PDF
How To Install and Configure SNMP on RHEL 7 or CentOS 7
VCP Muthukrishna
 
PDF
How To Disable IE Enhanced Security Windows PowerShell
VCP Muthukrishna
 
PDF
How To Protect SSH Access with Fail2Ban on RHEL 7
VCP Muthukrishna
 
PDF
T.Pollak y C.Yaconi - Prey
StarTech Conference
 
PDF
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
South Tyrol Free Software Conference
 
PDF
StatsCraft 2015: Monitoring using riemann - Moshe Zada
StatsCraft
 
PPTX
uWSGI - Swiss army knife for your Python web apps
Tomislav Raseta
 
PDF
Engineering Challenges Doing Intrusion Detection in the Cloud
randomuserid
 
PDF
Monit - NHRuby May 2009
bturnbull
 
Безопасность интернет-приложений осень 2013 лекция 7
Technopark
 
YASPS OPENNING
Jeen Lee
 
Squid file
Nalin Peiris
 
Monitoring Containers with Weave Scope
Weaveworks
 
How To Check IE Enhanced Security Is Enabled Windows PowerShell
VCP Muthukrishna
 
How to build a container monitoring solution - David Gildeh, CEO and Co-Found...
Outlyer
 
A little systemtap
yang bingwu
 
Salt stack
Jose Galarza
 
NSClient++ Workshop: 01 Introduction
Michael Medin
 
Laravel Day / Deploy
Simone Gentili
 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
VCP Muthukrishna
 
How To Disable IE Enhanced Security Windows PowerShell
VCP Muthukrishna
 
How To Protect SSH Access with Fail2Ban on RHEL 7
VCP Muthukrishna
 
T.Pollak y C.Yaconi - Prey
StarTech Conference
 
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
South Tyrol Free Software Conference
 
StatsCraft 2015: Monitoring using riemann - Moshe Zada
StatsCraft
 
uWSGI - Swiss army knife for your Python web apps
Tomislav Raseta
 
Engineering Challenges Doing Intrusion Detection in the Cloud
randomuserid
 
Monit - NHRuby May 2009
bturnbull
 

Similar to NSClient Workshop: 04 Protocols (20)

PDF
OSMC 2012 | Distributed Monitoring mit NSClient++ by Michael Medin
NETWAYS
 
PDF
OSMC 2009 | Windows monitoring - Going where no man has gone before... by Mic...
NETWAYS
 
PDF
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios
 
PDF
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
Editor IJCTER
 
PPTX
CCL-Final Presentation
Jeremy Dixon
 
PDF
OSMC 2011 | Distributed monitoring using NSClient++ by Michael Medin
NETWAYS
 
PDF
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
Yossi Sassi
 
PDF
Bloombase StoreSafe Compatibility Matrix
Bloombase
 
ODP
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios
 
DOCX
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docx
SHIVA101531
 
PDF
Stu t17 a
SelectedPresentations
 
PPTX
Remote Access Security
syrinxtech
 
PDF
DNSSEC signing Tutorial
Men and Mice
 
PDF
Mens jan piet_dnssec-in-practice
kuchinskaya
 
PPTX
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 
PDF
OSMC 2023 | Replacing NSClient++ for Windows Monitoring by Sven Nielein
NETWAYS
 
PDF
SNClient+ - General purpose monitoring agent
Sven Nierlein
 
PDF
Practice and challenges from building IaaS
Shawn Zhu
 
PDF
An Open Source Network Infrastructure (Is OS Software Suitable for SMEs?)
jackweirdy
 
PDF
What's New in Kubernetes 1.18 Webinar Slides
Mirantis
 
OSMC 2012 | Distributed Monitoring mit NSClient++ by Michael Medin
NETWAYS
 
OSMC 2009 | Windows monitoring - Going where no man has gone before... by Mic...
NETWAYS
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
Editor IJCTER
 
CCL-Final Presentation
Jeremy Dixon
 
OSMC 2011 | Distributed monitoring using NSClient++ by Michael Medin
NETWAYS
 
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
Yossi Sassi
 
Bloombase StoreSafe Compatibility Matrix
Bloombase
 
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios
 
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docx
SHIVA101531
 
Remote Access Security
syrinxtech
 
DNSSEC signing Tutorial
Men and Mice
 
Mens jan piet_dnssec-in-practice
kuchinskaya
 
Hunting for APT in network logs workshop presentation
OlehLevytskyi1
 
OSMC 2023 | Replacing NSClient++ for Windows Monitoring by Sven Nielein
NETWAYS
 
SNClient+ - General purpose monitoring agent
Sven Nierlein
 
Practice and challenges from building IaaS
Shawn Zhu
 
An Open Source Network Infrastructure (Is OS Software Suitable for SMEs?)
jackweirdy
 
What's New in Kubernetes 1.18 Webinar Slides
Mirantis
 
Ad

More from Michael Medin (20)

PDF
IcingaCamp Berlin 2018 NSClient++ and friends
Michael Medin
 
PDF
Extending NSClient++ with rest and python
Michael Medin
 
PDF
The technology of tomorrows integration plattform
Michael Medin
 
PDF
Integration Plattform of Tomorrow
Michael Medin
 
PDF
Automated monitoring with NSClient++ and Icinga
Michael Medin
 
PDF
Ns client++ icinga camp
Michael Medin
 
PDF
Continuous delivery from the trenches Redhat Forum Edition
Michael Medin
 
PDF
Continuous delivery @CD Summit Stockholm
Michael Medin
 
PDF
Continuous Delivery at Oracle Database Insights
Michael Medin
 
PDF
Continuous delivery from the trenches
Michael Medin
 
PDF
NSClient++....or not
Michael Medin
 
PDF
Continuous Delivery in the Enterprise
Michael Medin
 
PDF
NSClient++ whats new for 0.3.9 users
Michael Medin
 
PDF
Oracle SOA Suite 12c 1z0-434 Day 1/3
Michael Medin
 
PDF
Integration in the Cloud
Michael Medin
 
PDF
The Road to Oracle SOA Suite 12c
Michael Medin
 
PDF
Enabling Mobility through Continuous Delivery
Michael Medin
 
PDF
NSClient++ Workshop: 06 Scripting
Michael Medin
 
PDF
NSClient++ Workshop: 05 Monitoring
Michael Medin
 
PDF
NSClient++ Workshop: 03 Installation
Michael Medin
 
IcingaCamp Berlin 2018 NSClient++ and friends
Michael Medin
 
Extending NSClient++ with rest and python
Michael Medin
 
The technology of tomorrows integration plattform
Michael Medin
 
Integration Plattform of Tomorrow
Michael Medin
 
Automated monitoring with NSClient++ and Icinga
Michael Medin
 
Ns client++ icinga camp
Michael Medin
 
Continuous delivery from the trenches Redhat Forum Edition
Michael Medin
 
Continuous delivery @CD Summit Stockholm
Michael Medin
 
Continuous Delivery at Oracle Database Insights
Michael Medin
 
Continuous delivery from the trenches
Michael Medin
 
NSClient++....or not
Michael Medin
 
Continuous Delivery in the Enterprise
Michael Medin
 
NSClient++ whats new for 0.3.9 users
Michael Medin
 
Oracle SOA Suite 12c 1z0-434 Day 1/3
Michael Medin
 
Integration in the Cloud
Michael Medin
 
The Road to Oracle SOA Suite 12c
Michael Medin
 
Enabling Mobility through Continuous Delivery
Michael Medin
 
NSClient++ Workshop: 06 Scripting
Michael Medin
 
NSClient++ Workshop: 05 Monitoring
Michael Medin
 
NSClient++ Workshop: 03 Installation
Michael Medin
 
Ad

NSClient Workshop: 04 Protocols

  • 3. Active Passive Realtime Future Everyx minute Everyx minute Onlyon errors Onlyon errors For eachservice For mostservices Onlyon errors Onlyon errors Verychatty Verychatty Lesschatty Not chatty NRPE NRPE (ish) NSCA NSCA check_nt(ish) NRDP REST REST REST REST NSCP NSCP NSCP NSCP
  • 5. NRPE Server Core Check System Check EventLog Check ExternalScripts check_foo.bat QUERY NRPE (1024) QUERY Port: 5666 allowedhosts arguments arguments
  • 10. You know this one by now… Enable NRPE Run check_memoryvia NRPE
  • 11. Enable NRPE Run check_memoryvia NRPE nscphelp nscpnrpehelp # Dontforgetto (re)start NSClient++
  • 12. Enable NRPE Run check_memoryvia NRPE nscphelp nscpnrpehelp # Dontforgetto (re)start NSClient++ nscpnrpe--help nscpnrpeinstall --help
  • 13. Enable NRPE Run check_memoryvia NRPE nscpnrpeinstall --insecure true --allowed-hosts 127.0.0.1 --arguments safe check_nrpe--insecure--host 127.0.0.1 --command check_memory
  • 15. Scheduler Core Check System Check EventLog Check ExternalScripts check_foo.bat NSCA (512) QUERY Target: nsca address port password encryption commands interval Etc… NSCAClient Notification
  • 19. Setup a check_cpucheck every 5 seconds. Send the result via NSCA to localhost:5667 No encryption, password=test
  • 20. Setup a check_cpucheck every 5 seconds. Send the result via NSCA to localhost:5667 No encryption, password=test Enable, Schedulerand NSCAClient Firstadda schedule Thenconfiguredefault target
  • 21. Setup a check_cpucheck every 5 seconds. Send the result via NSCA to localhost:5667 No encryption, password=test Enable, Schedulerand NSCAClient Firstadda schedule /settings/scheduler/schedules Thenconfiguredefault target /settings/NSCA/client/targets/default
  • 22. Setup a check_cpucheck every 5 seconds. Send the result via NSCA to localhost:5667 No encryption, password=test nscptest --settings nsca_server.ini nscptest --settings nsca_client.ini
  • 24. WEB Server Core Check System Check EventLog Check ExternalScripts check_foo.bat QUERY HTTP QUERY Port: 8443, 8080allowedhosts arguments
  • 25. curl--insecure --header "password: PASSWORD“ https://localhost:8443/query/QUERY?ARGScurl--insecure --header "password: PASSWORD“ https://localhost:8443/query/check_cpu?show-all
  • 28. Curl can be found under: C:nsclienttools Base URL is: https://localhost:8443/query/QUERY?ARGS Check check_memoryvia REST Whatsthe differenceifyouaddshow-all?
  • 29. Check check_memoryvia REST Whatsthe differenceifyouaddshow-all? Curl can be found under: C:nsclienttools Base URL is: https://localhost:8443/query/QUERY?ARGS Enable web server and set the password (see previous lab) Then use curl
  • 30. Check check_memoryvia REST Whatsthe differenceifyouaddshow-all? Curl can be found under: C:nsclienttools Base URL is: https://localhost:8443/query/QUERY?ARGS Enable web server and set the password (see previous lab) Then use curl Don’t forget: --insecure, --header "password: PASSWORD“
  • 31. Check check_memoryvia REST Whatsthe differenceifyouaddshow-all? Curl can be found under: C:nsclienttools Base URL is: https://localhost:8443/query/QUERY?ARGScurl --insecure --header "password: PASSWORD“ https://localhost:8443/query/check_memory?show-all