Integration of Centreon Plugins into NetEye Extension Packs
With the end of 2021 we’ve release the first version of the NetEye Extension Packs project that helps customers and consultants on their monitoring implementations and more (see Introducing NetEye Extension Packs | www.neteye-blog.com for details).
Now our focus is to extend the ouf of box infrastructure coverage of our monitoring plugins.
With this target in mind we looked at the open source project of our friends from Centreon. They built an exiting open source project to manage Nagios compliant monitoring plugins (see GitHub – centreon/centreon-plugins).
Cool, so how we can integrate and contribute in a smart way the Centreon open source monitoring plugins?
We analyzed a sample of plugins and we found some common items.
Basic Command Templates
Many plugins on Centreon use the same arguments on command calling. So why not define a common template? We can use the concept of Command Templates implemented on Icinga Director which helps define a common set of parameters across many similar command definitions.
We created three main families of Plugins based on the technology used on monitoring checks:
nx-c-centreon-plugins-snmp for monitoring based on SNMP protocol using arguments like community, and for the new SNMPv3 authentication phrase/protocol
nx-c-centreon-plugins-restapi for monitoring based on RestAPI methods, using the latest applications and Cloud monitoring
nx-c-centreon-plugins-ssh for monitoring based on the Secure SHell (SSH) protocol, useful for agentless monitoring and blackbox appliances
Each template can be used by multiple plugins without rewriting all common arguments, but just adding any special arguments for that one specific check.
Common Datafields
We noticed that other “general” fields are used on more or less all plugins, so we decided to add a common datafield to Icinga Director.
These fields are:
Hostname the target host to which the execution command will be sent, this usually corresponds to the host.address variable on NetEye
Mode this is the common field list of modes available for specific plugins – we created a drop-down list from which the user can choose the mode (ex. cpu-load)
Component strictly related to mode, this represents the component that you want to check with a specific mode (ex. battery, PSU, drive)
Warning/Critical a warning or critical threshold for the execution of check – sometimes this field is follow by a word (like usage or health) to set multiple thresholds.
Statefile Directory a directory on some filesystem that will be used for one or more checks to store statefiles. We decided to use /neteye/shared/icinga2/data/lib/centreon-plugins. This directory should have icinga user access, and thus it’s created automatically during NEP installation.
Final considerations
So we’re releasing a new pack named NEP Centreon Plugins Base that allows for an easy way to integrate into NetEye all monitoring plugins provided by the Centreon Community.
In this way we can also reduce the possibility of typos as well as the effort when starting from scratch whenever you want like to integrate a new Centron Plugin.
The current available integrations on NetEye 4.24 are:
Do you need a plugin that’s not already nep-implemented? Check if it’s available in the Centreon Plugin Packs Catalog and contact us through our official ways sales, consultants, support team. We are quite happy collect your feedbacks and prioritize our work based on that.
These Solutions are Engineered by Humans
Did you find this article interesting? Does it match your skill set? Our customers often present us with problems that need customized solutions. In fact, we’re currently hiring for roles just like this and others here at Würth Phoenix.
I’ve always been fascinated by the IT world, especially by the security environment and its architectures.
The common thread in my working experience is the creation of helpful open-source solutions to easily manage the huge amount of security information.
In the past years, my work was especially focused on Cyber Kill Chain, parsing and ELK Stack but in order to start from the beginning...
In 2010 I left my birthplace, the lovely Veneto, looking for a new ´cyber´ adventure in Milan. After graduating in Computer Systems and Networks Security, I worked for 6 years as a Cyber Security Consultant.
During the first 5 years, I explored the deep and manifold world of cybersecurity, becoming passionate about open source solutions. After that, I decided to challenge myself joining a Start-up company focusing on SOC services (I’m a proud member of the Blue Team!).
In Wuerth Phoenix, I would like to personalize the NetEye System for each one of our costumers, in order to develop the perfect product for their needs, by combining all my past experiences and skills.
Author
Enrico Alberti
I’ve always been fascinated by the IT world, especially by the security environment and its architectures.
The common thread in my working experience is the creation of helpful open-source solutions to easily manage the huge amount of security information.
In the past years, my work was especially focused on Cyber Kill Chain, parsing and ELK Stack but in order to start from the beginning...
In 2010 I left my birthplace, the lovely Veneto, looking for a new ´cyber´ adventure in Milan. After graduating in Computer Systems and Networks Security, I worked for 6 years as a Cyber Security Consultant.
During the first 5 years, I explored the deep and manifold world of cybersecurity, becoming passionate about open source solutions. After that, I decided to challenge myself joining a Start-up company focusing on SOC services (I’m a proud member of the Blue Team!).
In Wuerth Phoenix, I would like to personalize the NetEye System for each one of our costumers, in order to develop the perfect product for their needs, by combining all my past experiences and skills.
Hello everyone! As you may remember, a topic I like to discuss a lot on this blog is the Proof of Concept (POC) about how we could enhance search within our online NetEye User Guide. Well, we're happy to share Read More
In the ever-evolving landscape of IT monitoring and management, the ability to efficiently handle multi-dimensional namespaces is crucial. Within NetEye, Log-SIEM (Elastic), provides a comprehensive solution for managing the single namespace dimension with the namespace of a data_stream. This blog Read More
Hey everyone! We played around a bit last time with our radar data to build a model that we could train outside Elasticsearch, loading it through Eland and then applying it using an ingest pipeline. But since our data is Read More
Right now, at Würth Phoenix, we are investing in automating most of our operations using Ansible. You're probably already familiar with what Ansible does, but to summarize, Ansible is an open-source, command-line IT automation application written in Python. I've talked Read More
OpenShift already has a built-in monitoring suite with Prometheus, Grafana, and Alertmanager. This is all well and good, but what if organizations want to monitor their entire infrastructure, integrating all monitoring results under one umbrella? In this case, it's necessary Read More