LEADER 05086nam 2200661 a 450 001 9910822626303321 005 20200520144314.0 010 $a1-84951-557-3 010 $a1-299-19853-8 035 $a(CKB)2550000001006074 035 $a(EBL)1119764 035 $a(OCoLC)829461606 035 $a(SSID)ssj0000908015 035 $a(PQKBManifestationID)12447070 035 $a(PQKBTitleCode)TC0000908015 035 $a(PQKBWorkID)10897731 035 $a(PQKB)10146419 035 $a(Au-PeEL)EBL1119764 035 $a(CaPaEBR)ebr10654558 035 $a(CaONFJC)MIL451103 035 $a(PPN)228018692 035 $a(OCoLC)842846811 035 $a(OCoLC)ocn842846811 035 $a(FR-PaCSA)88850547 035 $a(CaSebORM)9781849515566 035 $a(MiAaPQ)EBC1119764 035 $a(EXLCZ)992550000001006074 100 $a20130222d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNagios Core administration cookbook $edevelop an integrated monitoring solution for virtually any kind of network /$fTom Ryder 205 $a1st edition 210 $aBirmingham $cPackt Pub.$d2013 215 $a1 online resource (366 p.) 225 0$aCommunity experience distilled 300 $aIncludes index. 311 $a1-84951-556-5 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command 327 $aCustomizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groups 327 $aSpecifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitor 327 $aChapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface 327 $aViewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groups 327 $aBuilding groups using regular expressions 330 $aThis book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core. 606 $aComputer networks$xManagement 615 0$aComputer networks$xManagement. 676 $a005.4476 700 $aRyder$b Tom$01593434 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910822626303321 996 $aNagios Core administration cookbook$93913560 997 $aUNINA