
5 Website Development Tips To Boost Your Business Growth Exponentially
Client NRPE Install
- Download nrpe and nagios-plugin.
Tarball names will vary depending on the release number of the packages - wget http://assets.nagios.com/downloads/nagiosplugins/nagios-plugins-1.5.tar.gz
- wget http://softlayer-dal.dl.sourceforge.net/project/nagios/nrpe-2.x/nrpe-2.15/nrpe-2.15.tar.gz
- tar -xf nrpe-2.15.tar.gz
- tar -xf nagios-plugins-1.5.tar.gz
Nagios Plugin Installation
- cd nagios-plugins-1.5
- ./configure
- make
- make install
- chown nagios.nagios /usr/local/nagios
- chown -R nagios.nagios /usr/local/nagios/libexec
NRPE Installation
- cd ..
- cd nrpe-2.15
- ./configure
- make all
- make install-plugin
- make install-daemon
- make install-daemon-config
- make install-xinetd
- edit /etc/xinetd.d/nrpe
add the name of the Nagios server to the line
only_from = 127.0.0.1 - edit /etc/services
add the line
nrpe 5666/tcp - Restart xinetd daemon with
service xinetd restart
Test NRPE
- Test nrpe with
netstat -at | grep nrpe - Edit TCP wrappers
vi /etc/hosts.allow
Add the line
nrpe: 17.0.0.1 server.name.domain.edu
where server.name.domain.edu is your Nagios server DNS name
Test New client
- /usr/local/nagios/libexec/check_nrpe -H localhost
If you get back the NRPE version number, you are done on the client
Setup IPTABLES
- iptables -I RH-Firewall-1-INPUT -p tcp -m tcp –dport 5666 -j ACCEPT
lets all packets with a destination of port 5666 past the firewall
Published on: Mar 03, 2021
Categories: Web Development
No Comments yet! Be the first one to write.