Integration of Centreon Plugins into NetEye Extension Packs
With the end of 2021 we’ve release the first version of the NetEye Extension Packs project that helps customers and consultants on their monitoring implementations and more (see Introducing NetEye Extension Packs | www.neteye-blog.com for details).
Now our focus is to extend the ouf of box infrastructure coverage of our monitoring plugins.
With this target in mind we looked at the open source project of our friends from Centreon. They built an exiting open source project to manage Nagios compliant monitoring plugins (see GitHub – centreon/centreon-plugins).
Cool, so how we can integrate and contribute in a smart way the Centreon open source monitoring plugins?
We analyzed a sample of plugins and we found some common items.
Basic Command Templates
Many plugins on Centreon use the same arguments on command calling. So why not define a common template? We can use the concept of Command Templates implemented on Icinga Director which helps define a common set of parameters across many similar command definitions.
We created three main families of Plugins based on the technology used on monitoring checks:
nx-c-centreon-plugins-snmp for monitoring based on SNMP protocol using arguments like community, and for the new SNMPv3 authentication phrase/protocol
nx-c-centreon-plugins-restapi for monitoring based on RestAPI methods, using the latest applications and Cloud monitoring
nx-c-centreon-plugins-ssh for monitoring based on the Secure SHell (SSH) protocol, useful for agentless monitoring and blackbox appliances
Each template can be used by multiple plugins without rewriting all common arguments, but just adding any special arguments for that one specific check.
Common Datafields
We noticed that other “general” fields are used on more or less all plugins, so we decided to add a common datafield to Icinga Director.
These fields are:
Hostname the target host to which the execution command will be sent, this usually corresponds to the host.address variable on NetEye
Mode this is the common field list of modes available for specific plugins – we created a drop-down list from which the user can choose the mode (ex. cpu-load)
Component strictly related to mode, this represents the component that you want to check with a specific mode (ex. battery, PSU, drive)
Warning/Critical a warning or critical threshold for the execution of check – sometimes this field is follow by a word (like usage or health) to set multiple thresholds.
Statefile Directory a directory on some filesystem that will be used for one or more checks to store statefiles. We decided to use /neteye/shared/icinga2/data/lib/centreon-plugins. This directory should have icinga user access, and thus it’s created automatically during NEP installation.
Final considerations
So we’re releasing a new pack named NEP Centreon Plugins Base that allows for an easy way to integrate into NetEye all monitoring plugins provided by the Centreon Community.
In this way we can also reduce the possibility of typos as well as the effort when starting from scratch whenever you want like to integrate a new Centron Plugin.
The current available integrations on NetEye 4.24 are:
Do you need a plugin that’s not already nep-implemented? Check if it’s available in the Centreon Plugin Packs Catalog and contact us through our official ways sales, consultants, support team. We are quite happy collect your feedbacks and prioritize our work based on that.
These Solutions are Engineered by Humans
Did you find this article interesting? Does it match your skill set? Our customers often present us with problems that need customized solutions. In fact, we’re currently hiring for roles just like this and others here at Würth Phoenix.
I’ve always been fascinated by the IT world, especially by the security environment and its architectures.
The common thread in my working experience is the creation of helpful open-source solutions to easily manage the huge amount of security information.
In the past years, my work was especially focused on Cyber Kill Chain, parsing and ELK Stack but in order to start from the beginning...
In 2010 I left my birthplace, the lovely Veneto, looking for a new ´cyber´ adventure in Milan. After graduating in Computer Systems and Networks Security, I worked for 6 years as a Cyber Security Consultant.
During the first 5 years, I explored the deep and manifold world of cybersecurity, becoming passionate about open source solutions. After that, I decided to challenge myself joining a Start-up company focusing on SOC services (I’m a proud member of the Blue Team!).
In Wuerth Phoenix, I would like to personalize the NetEye System for each one of our costumers, in order to develop the perfect product for their needs, by combining all my past experiences and skills.
Author
Enrico Alberti
I’ve always been fascinated by the IT world, especially by the security environment and its architectures.
The common thread in my working experience is the creation of helpful open-source solutions to easily manage the huge amount of security information.
In the past years, my work was especially focused on Cyber Kill Chain, parsing and ELK Stack but in order to start from the beginning...
In 2010 I left my birthplace, the lovely Veneto, looking for a new ´cyber´ adventure in Milan. After graduating in Computer Systems and Networks Security, I worked for 6 years as a Cyber Security Consultant.
During the first 5 years, I explored the deep and manifold world of cybersecurity, becoming passionate about open source solutions. After that, I decided to challenge myself joining a Start-up company focusing on SOC services (I’m a proud member of the Blue Team!).
In Wuerth Phoenix, I would like to personalize the NetEye System for each one of our costumers, in order to develop the perfect product for their needs, by combining all my past experiences and skills.
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More
Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive Read More
Note: This description of a security analyst's daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Read More
Scenario NetEye 4 provides a graphical engine to represent time series monitoring data stored in an Influx database: the Grafana engine accessible through the ITOA menu on the left hand side. Grafana is very powerful: it consists of a dashboard Read More