Revision 2 posted to Systems Management - Wiki by DELL-Anupam Aloke on 10/21/2016 11:11:34 AM
Step 1: Install Nagios-Core on Ubuntu 16.04.01 LTS (Xenial Xerus)
- Install the following pre-requisites and all of their associated dependencies. You can ignore this step these are already installed on your Ubuntu management node:
# Install apache2 and all of its associated dependencies anupam@ubuntu:~$ sudo apt-get install apache2 apache2-bin apache2-data apache2-utils libapr1 libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap liblua5.1-0 # Install PHP anupam@ubuntu:~$ sudo apt-get install php-common php7.0 php7.0-cli php7.0-common php7.0-fpm php7.0-json php7.0-opcache php7.0-readline # Install apache2 mod-php module anupam@ubuntu:~$ sudo apt-get install libapache2-mod-php7.0 # CGI module is installed as during apache2 installation but disabled by default; Enable it anupam@ubuntu:~$ sudo a2enmod cgi # Install libgd-dev and all of its associated dependencies anupam@ubuntu:~$ sudo apt-get install libgd-dev libexpat1-dev libfontconfig1-dev libfreetype6-dev libice-dev libjbig-dev libjpeg-dev libjpeg-turbo8-dev libjpeg8-dev liblzma-dev libpng12-dev libpthread-stubs0-dev libsm-dev libtiff5-dev libtiffxx5 libvpx-dev libx11-dev libx11-doc libxau-dev libxcb1-dev libxdmcp-dev libxpm-dev libxt-dev x11proto-core-dev x11proto-input-dev x11proto-kb-dev xorg-sgml-doctools xtrans-dev zlib1g-dev |
# Install apache2 and all of its associated dependencies
anupam@ubuntu:~$ sudo apt-get install apache2 apache2-bin apache2-data apache2-utils libapr1 libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap liblua5.1-0
# Install PHP
anupam@ubuntu:~$ sudo apt-get install php-common php7.0 php7.0-cli php7.0-common php7.0-fpm php7.0-json php7.0-opcache php7.0-readline
# Install apache2 mod-php module
anupam@ubuntu:~$ sudo apt-get install libapache2-mod-php7.0
# CGI module is installed as during apache2 installation but disabled by default; Enable it
anupam@ubuntu:~$ sudo a2enmod cgi
# Install libgd-dev and all of its associated dependencies
anupam@ubuntu:~$ sudo apt-get install libgd-dev libexpat1-dev libfontconfig1-dev libfreetype6-dev libice-dev libjbig-dev libjpeg-dev libjpeg-turbo8-dev libjpeg8-dev liblzma-dev libpng12-dev libpthread-stubs0-dev libsm-dev libtiff5-dev libtiffxx5 libvpx-dev libx11-dev libx11-doc libxau-dev libxcb1-dev libxdmcp-dev libxpm-dev libxt-dev x11proto-core-dev x11proto-input-dev x11proto-kb-dev xorg-sgml-doctools xtrans-dev zlib1g-dev
- Create nagios user and nagcmd group:
anupam@ubuntu:~$ sudo useradd nagios
anupam@ubuntu:~$ sudo groupadd nagcmd
anupam@ubuntu:~$ sudo usermod -a -G nagcmd nagios
- Download the latest release of Nagios (version 4.2.1 at the time of writing this article) from www.nagios.com :
anupam@ubuntu:/tmp$ wget https://assets.nagios.com/downloads/nagioscore/releases/nagios-4.2.1.tar.gz
- Extract the package and navigate to the /tmp/nagios-4.2.1 directory:
anupam@ubuntu:/tmp$ tar –zxvf nagios-4.2.1.tar.gz
anupam@ubuntu:/tmp$ cd nagios-4.2.1
anupam@ubuntu:/tmp/nagios-4.2.1$
- Compile and install Nagios:
# Run the Nagios configure script, passing the name of the group you created earlier
anupam@ubuntu:/tmp/nagios-4.2.1$ ./configure --with-command-group=nagcmd
# Compile the Nagios source code
anupam@ubuntu:/tmp/nagios-4.2.1$ make all
# Install the compiled files, CGI and HTML files in /usr/local/nagios
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo make install
# Install the init file in the /etc/init.d
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo make install-init
# Install and configure permissions on the directory for holding the external command file
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo make install-commandmode
# Install sample config files in /usr/local/nagios/etc
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo make install-config
- Next step for us would be to install the Nagios web configuration files. However, on Ubuntu 16.04.01, apache2 configuration files are installed in /etc/apache2. As a result, when you try to install the Nagios web configuration files using “sudo make install-webconf”, it will fail because it is unable to find /etc/httpd directory. So, in order to fix it, we will have to copy the sample httpd.conf configuration file manually in /etc/apache2/conf-available and then enable it.
# Install nagios web configuration files
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo make install-webconf
/usr/bin/install -c -m 644 sample-config/httpd.conf /etc/httpd/conf.d/nagios.conf
/usr/bin/install: cannot create regular file '/etc/httpd/conf.d/nagios.conf': No such file or directory
Makefile:296: recipe for target 'install-webconf' failed
make: *** [install-webconf] Error 1
# Let’s copy the sample httpd.conf to the apache2 configuration files directory
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo cp sample-config/httpd.conf /etc/apache2/conf-available/nagios.conf
# Enable the nagios’ apache2 configuration file
anupam@ubuntu:/tmp/nagios-4.2.1$ cd /etc/apache2/conf-available
anupam@ubuntu:/etc/apache2/conf-available$ sudo chmod 644 nagios.conf
anupam@ubuntu:/etc/apache2/conf-available$ sudo a2enconf nagios
anupam@ubuntu:/etc/apache2/conf-available$ cd ../conf-enabled
anupam@ubuntu:/etc/apache2/conf-enabled$ ls –l nagios.conf
lrwxrwxrwx 1 root root 29 Oct 7 08:22 nagios.conf -> ../conf-available/nagios.conf
- Copy the Event handler directory and change its ownership:
anupam@ubuntu:/etc/apache2/conf-available$ cd /tmp/nagios-4.2.1
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo cp –rvf contrib/eventhandlers/ /usr/local/nagios/libexec/
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo chown -R nagios:nagcmd /usr/local/nagios/libexec/eventhandlers
- Create nagiosadmin user and generate password of nagiosadmin using htpasswd command. Please make sure that you keep this password safe and remember it as we will use nagiosadmin user to login to the nagios web console.
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo htpasswd -c /usr/local/nagios/etc/htpasswd.users nagiosadmin
- Enable the nagios service and add it to start at the next boot. Also restart the apache2 service to reflect the configuration changes done earlier.
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo systemctl restart apache2.service
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo systemctl enable nagios
anupam@ubuntu:/tmp/nagios-4.2.1$ sudo systemctl start nagios.service
- Check the service status to make sure that they are up and running:
anupam@ubuntu:/tmp/nagios-4.2.1$ systemctl status apache2
anupam@ubuntu:/tmp/nagios-4.2.1$ systemctl status nagios
- You can access the Nagios web interface by opening your browser and then pointing to the URL http://localhost/nagios. It will prompt you to enter the username and password that we had created earlier.
In the above screenshot, you are seeing errors because we have not installed the nagios plugins and so the check scripts are not present yet.
Step 2: Install the Nagios Plugins Package on Ubuntu 16.04.01
The official Nagios plugins package contains over 50 plugins that provide basic monitoring for hosts, devices, services, protocols and applications.
- Download the official nagios-plugins package from nagios-plugins.org and extract it:
anupam@ubuntu:/tmp$ wget https://nagios-plugins.org/download/nagios-plugins-2.1.2.tar.gz
anupam@ubuntu:/tmp$ tar -zxvf nagios-plugins-2.1.2.tar.gz
anupam@ubuntu:/tmp$ cd nagios-plugins-2.1.2/
- Before you start compiling and installing the nagios-plugins, you need to know that some of these nagios-plugins require additional pre-requisites installed on your system before they can be used. Plugins that are dependent on pre-requisites that are missing are usually not compiled. For more details about the pre-requisites required for each plugin in the nagios-plugins package, please read the /tmp/nagios-plugins-2.1.2/REQUIREMENTS file.
Here we are going to install the following pre-requisites:
- SNMP tools and utilities
- SNMP Agent
- Perl Net::SNMP module
- MySQL Client development libraries
- OpenSSL development libraries
# Install SNMP Tools and Utilities
anupam@ubuntu:/tmp$ sudo apt-get install snmp libsnmp-perl
# Install Perl Net::SNMP module
anupam@ubuntu:/tmp$ sudo apt-get install libnet-snmp-perl
# Install SNMP Daemon
anupam@ubuntu:/tmp$ sudo apt-get install snmpd libperl-dev
# Install MySQL client development libraries
anupam@ubuntu:/tmp/nagios-plugins-2.1.2$ sudo apt-get install libmysqlclient-dev libmysqlclient20 mysql-common
# Install OpenSSL development libraries
anupam@ubuntu:/tmp/nagios-plugins-2.1.2$ sudo apt-get install libssl-dev libssl-doc
- Compile and install the nagios-plugins package:
anupam@ubuntu:/tmp/nagios-plugins-2.1.2$ ./configure --with-nagios-user=nagios --with-nagios-group=nagcmd
anupam@ubuntu:/tmp/nagios-plugins-2.1.2$ make
anupam@ubuntu:/tmp/nagios-plugins-2.1.2$ sudo make install
- After installing the nagios-plugins package, you can see in the Nagios web interface that the errors that were present earlier because of unavailability of check scripts have gone away:
Step 3: Install Pre-Requisites for Dell OpenManage Plug-In for Nagios-Core
Prior to installing Dell OpenManage Plug-in for Nagios-Core and Nagios XI on a management node, there are certain prerequisites or dependencies that must be installed on the management node. However, we have already installed most of the prerequisites in previous steps. Following is the list of pre-requisites and their criticality (mandatory or optional) for Dell OM Plug-In:
- Perl Net-IP Module [mandatory]: It should already be installed on your management node as part of Ubuntu 16.04.01 LTS
- Perl Net-SNMP Module [mandatory]: We already installed it as a pre-requisite for nagios-plugin package installation in above steps
- Perl Socket6 Module [optional]: It should already be installed on our management node as part of Ubuntu 16.04.01 LTS
- Perl bindings for Open-WSMAN (WS-Management) [mandatory]
- Perl SNMPTT (SNMP Trap Translator) Module [optional]
- Dell RACADM (Remote Access Controller Admin) [optional]
Installing Perl Bindings for OpenWSMAN
On Ubuntu 16.04.01 LTS, Perl bindings for OpenWSMAN are not available as a .deb package from official and OpenSUSE repositories. So, we will install Perl bindings by compiling Openwsman from source and then installing it. Please note that the below steps will install openwsman server, client and all bindings except Ruby on your management node.
- Before you build and install Openwsman from source, following prerequisites must be installed on your management node (please ignore the following steps if they are already installed):
# Install autoconf (Automatic configure script builder) and associated dependencies
[anupam@ubuntu]:~$ sudo apt-get install autoconf automake autotools-dev libsigsegv2 m4
# Install Cmake and associated dependencies
[anupam@ubuntu]:~$ sudo apt-get install cmake cmake-data libjsoncpp1
# Install Default JDK and associated dependencies
[anupam@ubuntu]:~$ sudo apt-get install ca-certificates-java default-jdk default-jdk-headless default-jre default-jre-headless fonts-dejavu-extra java-common libbonobo2-0 libbonobo2-common libgif7 libgnome-2-0 libgnome2-common libgnomevfs2-0 libgnomevfs2-common liborbit-2-0 openjdk-8-jdk openjdk-8-jdk-headless openjdk-8-jre openjdk-8-jre-headless
# Install PAM (pluggable authentication module) development module
[anupam@ubuntu]:~$ sudo apt-get install libpam0g-dev
# Install Curl OpenSSL Development Libraries
[anupam@ubuntu]:~$ sudo apt-get install libcurl4-openssl-dev
# Install development files for the GNOME XML Libraries
[anupam@ubuntu]:~$ sudo apt-get install icu-devtools libicu-dev libxml2-dev
# Install SWIG (Simplified Wrapper & Interface Generator) for wrapping C/C++ functions for use with a script generator
[anupam@ubuntu]:~$ sudo apt-get install swig3.0
# Install sblim-sfcc (Small Footprint CIM Client) libraries
[anupam@ubuntu]:~$ sudo apt-get install libcimcclient0 libcimcclient0-dev
# Install python development libraries
[anupam@ubuntu]:~$ sudo apt-get install libpython-dev
- Download the latest committed release openwsman-2.6.3.tar.gz source tar ball from the github url and extract it:
[anupam@ubuntu]:~$ cd /tmp
[anupam@ubuntu]:/tmp$ wget https://github.com/Openwsman/openwsman/archive/v2.6.3.tar.gz -O /tmp/openwsman-2.6.3.tar.gz
[anupam@ubuntu]:/tmp$ tar –zxvf openwsman-2.6.3.tar.gz
- Let’s disable the Ruby bindings so that you don’t run into Ruby installations errors. In order to do so, please navigate to openwsman-2.6.3 directory and edit the top-level CMakeLists.txt file and set the BUILD_RUBY option to NO.
[anupam@ubuntu]:/tmp$ cd openwsman-2.6.3
[anupam@ubuntu]:/tmp/openwsman-2.6.3$ perl –p –i –e "s/(\\$\{CURL_LIBRARIES\})/\1 ssl crypto/g" src/lib/CMakeLists.txt
[anupam@ubuntu]:/tmp/openwsman-2.6.3$ vi CMakeLists.txt
Find and edit the BUILD_RUBY target option to NO:
OPTION( BUILD_RUBY “Build Ruby Bindings” YES)
To
OPTION( BUILD_RUBY “Build Ruby Bindings” NO)
- Run the following commands to build and install openwsman and its associated perl bindings:
[anupam@ubuntu]:/tmp/openwsman-2.6.3$ mkdir build && cd build
[anupam@ubuntu]:/tmp/openwsman-2.6.3/build$ cmake .. -DLIB=/lib/x86_64-linux-gnu -DCMAKE_LIBRARY_ARCHITECTURE=x86_64-linux-gnu -DCMAKE_INSTALL_PREFIX=/usr -DCMAKE_VERBOSE_MAKEFILE=TRUE
[anupam@ubuntu]:/tmp/openwsman-2.6.3/build$ make
[anupam@ubuntu]:/tmp/openwsman-2.6.3/build$ sudo make install
[anupam@ubuntu]:/tmp/openwsman-2.6.3/build$ openwsmand --version
openwsman 2.6
Installing and Configure SNMPTT (SNMP Trap Translator)
On Ubuntu 16.04.01 LTS, SNMPTT package can be installed from the Ubuntu universe repository. We need to install snmptrapd to receive and log the SNMP trap messages before we install snmptt.
- Install snmptrapd from the universe repository:
[anupam@ubuntu]:~$ sudo apt-get install snmptrapd
- Install snmptt and associated dependencies from the Ubuntu universe repository:
[anupam@ubuntu]:~$ sudo apt-get install snmptt libconfig-inifiles-perl
- Edit the /etc/snmp/snmptt.ini file to configure snmptt to run as a daemon rather than in standalone mode. Let us also enable the DNS resolution and enhanced logging options.
[anupam@ubuntu]:~$ sudo vi /etc/snmp/snmptt.ini
# snmptt.ini
[General]
dns_enable = 1
net_snmp_perl_enable = 1
translate_log_trap_oid = 1
[Logging]
stdout_enable = 1
log_enable = 1
log_file = /var/log/snmptt/snmptt.log
log_system_enable = 1
log_system_file = /var/log/snmptt/snmpttsystem.log
unknown_trap_log_enable = 1
unknown_trap_log_file = /var/log/snmptt/snmpttunknown.log
[Debugging]
DEBUGGING = 1
DEBUGGING_FILE = /var/log/snmptt.debug
DEBUGGING_FILE_HANDLER = /var/log/snmptt/snmptthandler.debug
- Save the file and restart the snmptt service:
[anupam@ubuntu]:~$ sudo systemctl restart snmptt.service
[anupam@ubuntu]:~$ systemctl status snmptt.service
● snmptt.service - LSB: SNMP Trap Translator
Loaded: loaded (/etc/init.d/snmptt; bad; vendor preset: enabled)
Active: active (running) since Fri 2016-10-14 04:41:57 PDT; 11s ago
Docs: man:systemd-sysv-generator(8)
Process: 26472 ExecStop=/etc/init.d/snmptt stop (code=exited, status=0/SUCCESS
Process: 26483 ExecStart=/etc/init.d/snmptt start (code=exited, status=0/SUCCE
CGroup: /system.slice/snmptt.service
├─26494 /usr/bin/perl /usr/sbin/snmptt --daemon
└─26495 /usr/bin/perl /usr/sbin/snmptt --daemon
Oct 14 04:41:56 ubuntu systemd[1]: Starting LSB: SNMP Trap Translator...
Oct 14 04:41:56 ubuntu snmptt[26483]: Redundant argument in sprintf at /usr/lib/x86_64-linux-gnu/perl/5.22/Sys/Syslog.pm line 423.
Oct 14 04:41:56 ubuntu snmptt-sys[26492]: SNMPTT v1.4 started
Oct 14 04:41:57 ubuntu snmptt[26483]: Redundant argument in sprintf at /usr/lib/x86_64-linux-gnu/perl/5.22/Sys/Syslog.pm line 423.
Oct 14 04:41:57 ubuntu snmptt-sys[26492]: Loading /etc/snmp/snmptt.conf
Oct 14 04:41:57 ubuntu snmptt[26483]: Redundant argument in sprintf at /usr/lib/x86_64-linux-gnu/perl/5.22/Sys/Syslog.pm line 423.
Oct 14 04:41:57 ubuntu snmptt-sys[26492]: Finished loading 64 lines from /etc/snmp/snmptt.conf
Oct 14 04:41:57 ubuntu snmptt[26483]: PID file: /var/run/snmptt.pid
Oct 14 04:41:57 ubuntu snmptt-sys[26495]: Changing to UID: snmptt (122)
Oct 14 04:41:57 ubuntu systemd[1]: Started LSB: SNMP Trap Translator.
Install Perl Socket6 Module
- On Ubuntu 16.04.01 LTS, libsocket6-perl package is installed by default. If it is not installed on the management node, then you can install it from the main repository:
[anupam@ubuntu]:~$ sudo apt-get install libsocket6-perl
Install Dell RACADM (Remote Access Controller Admin)
RACADM is an optional prerequisite for the OpenManage plug-in and is required for monitoring component attribute information of Dell Chassis (M1000e, VRTX, FX2/FX2s) such as fan speed (RPM), amperage (A), voltage (V), power of PSUs and health of I/O modules. RACADM is packaged as part of the OpenManage Server Administrator (OMSA) package and can be installed from the Dell Linux repository.
NOTE: At the time of writing this manual, we only have the OpenManage packages available for Ubuntu 14.04 LTS (Trusty Tahr) release.
Please follow the below steps to install RACADM on your management node running Nagios:
- Create the file '/etc/apt/sources.list.d/linux.dell.com.sources.list'.
[anupam@ubuntu]:~$ sudo touch /etc/apt/sources.list.d/linux.dell.com.sources.list
[anupam@ubuntu]:~$ sudo echo 'deb http://linux.dell.com/repo/community/ubuntu trusty openmanage' | sudo tee -a /etc/apt/sources.list.d/linux.dell.com.sources.list
- If you would like to restrict your system to a specific OpenManage release, such as the 8.3 release, you can specify it like this:
[anupam@ubuntu]:~$ sudo echo 'deb http://linux.dell.com/repo/community/ubuntu trusty openmanage/830' | sudo tee -a /etc/apt/sources.list.d/linux.dell.com.sources.list
- To verify OMSA packages, add the repository key to apt.
[anupam@ubuntu]:~$ sudo gpg --keyserver pool.sks-keyservers.net --recv-key 1285491434D8786F
[anupam@ubuntu]:~$ gpg -a --export 1285491434D8786F | sudo apt-key add -
- If you are behind a firewall that only allows outbound traffic over port 80, you may need to use this instead. In the first line below, you possibly need to add "--keyserver-options http-proxy=http://<user>:<password>@<proxy>:<port>".
[anupam@ubuntu]:~$ sudo gpg --keyserver hkp://pool.sks-keyservers.net:80 --recv-key 1285491434D8786F
[anupam@ubuntu]:~$ gpg -a --export 1285491434D8786F | sudo apt-key add -
- Make apt aware of the new software repository by issuing the following command:
[anupam@ubuntu]:~$ sudo apt-get update
- Install the following packages to get RACADM installed:
[anupam@ubuntu]:$ sudo apt-get install argtable2 libopenipmi0 libsmbios2v5 openipmi python-libsmbios smbios-utils srvadmin-deng srvadmin-hapi srvadmin-idracadm7 srvadmin-idracadm8 srvadmin-omilcore
Step 4: Install Dell OpenManage Plug-In for Nagios-Core
- Download the latest Dell OpenManage Plug-in Version 2.0 for Nagios Core installer from the Dell support website at support.dell.com or from Nagios exchange at exchange.nagios.org .The installer is packaged as a .tar.gz file named “Dell_OpenManage_Plugin_Nagios_Core_41Y2V_RHEL6_2.0_A00.tar.gz”.
- Navigate to the location where you have downloaded the tar.gz file and run the following command to extract its contents:
[anupam@ubuntu]:/tmp$ tar -zxvf Dell_OpenManage_Plugin_v2.0_Nagios_Core_A00.tar.gz
- Verify that the following folder and files are extracted:
[anupam@ubuntu]:/tmp$ ls -lrt
total 936
drwxr-xr-x 8 anupam anupam 4096 Oct 14 2015 Dell_OpenManage_Plugin
-rw-r--r-- 1 anupam anupam 62759 Oct 14 2015 license_en.txt
-rw-r--r-- 1 anupam anupam 12849 Oct 14 2015 Dell_OM_Plugin_2_0_For_NagiosCore_ReadMe.txt
-rw-r--r-- 1 anupam anupam 234152 Oct 14 2015 Dell_OM_Plugin_2_0_For_NagiosCore_IG.pdf
- Navigate to the Dell_OpenManage_Plugin/Install folder, and then run the install.sh script with the root privileges to install the Dell OM Plug-In:
[anupam@ubuntu]:/tmp/Dell_OpenManage_Plugin/Install$ sudo bash install.sh
Dell OpenManage Plug-in v2.0 for Nagios Core requires Nagios Core v3.5.0 or later.
Press 'Y' to continue if Nagios Core version is 3.5.0 or later.
Press any other key to exit installation (default: 'Y'):
Provide the installed location of Nagios Core (Press ENTER to continue with the default location: '/usr/local/nagios'):
Using the default Nagios Core installed location: /usr/local/nagios
Nagios Core installed location verified: /usr/local/nagios
Checking prerequisites...
Perl Module Net-IP is installed.
Perl Module Net-SNMP is installed.
Perl Module OpenWSMAN is installed.
Perl Module Socket6 is installed.
SNMPTT is installed.
RACADM is not installed or not resolvable. Few chassis specific attributes will not be available.
Press 'Y' to continue.
Press any other key to exit installation (default: 'Y'):
JAVA is installed.
Read the Dell End User License Agreement (EULA) license file (license_en.txt) packaged with this product before proceeding with the installation.
Press 'Y' to accept the license.
Press any other key to exit installation (default: 'Y'):
Installing "dell" Plug-in specific folders and files...
Enabling HTML tags...
The attribute "escape_html_tags" in file "cgi.cfg" is set to 1. Set it to 0 for better readability in Nagios Core console (recommended).
Press 'Y' if you would like to set it to '0' (default: 'N'): Y
Updating nagios.cfg...
The following entry is added for configuring Dell OpenManage Plug-in config directory:
--------------------------------------------------
cfg_dir=/usr/local/nagios/dell/config
--------------------------------------------------
Provide the file path where snmptt.ini is installed (Press ENTER to continue with the default file path: '/etc/snmp/snmptt.ini'):
Provided file path /etc/snmp/snmptt.ini is valid.
Updating snmptt.ini...
The following entry is added for supporting Dell device traps:
---------------------------------------------------------------------
/usr/local/nagios/dell/config/templates/Dell_Agent_free_Server_Traps.conf
/usr/local/nagios/dell/config/templates/Dell_Chassis_Traps.conf
/usr/local/nagios/dell/config/templates/Dell_Compellent_Traps.conf
/usr/local/nagios/dell/config/templates/Dell_EqualLogic_Traps.conf
/usr/local/nagios/dell/config/templates/Dell_PowerVaultMD_Traps.conf
---------------------------------------------------------------------
Provide the file path where JAVA is installed (Press ENTER to continue with the default file path: '/usr/bin/java'):
Provided file path /usr/bin/java is valid.
Updating dellconfig.cfg...
SUCCESS: Dell OpenManage Plug-in version 2.0 is installed successfully.
For the Dell OpenManage Plug-in changes to take effect, verify the Nagios and SNMPTT configuration entries as per product guidelines and then restart the Nagios and SNMPTT services.
- To verify that the Nagios Core configuration entry is valid, run the following command:
[anupam@ubuntu]:~/tmp/Dell_OpenManage_Plugin/Install$ sudo /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg
Nagios Core 4.2.1
Copyright (c) 2009-present Nagios Core Development Team and Community Contributors
Copyright (c) 1999-2009 Ethan Galstad
Last Modified: 09-06-2016
License: GPL
Website: https://www.nagios.org
Reading configuration data...
Read main config file okay...
Warning: failure_prediction_enabled is obsoleted and no longer has any effect in service type objects (config file '/usr/local/nagios/dell/config/templates/dell_templates.cfg', starting at line 88)
Read object config files okay...
Running pre-flight check on configuration data...
Checking objects...
Checked 8 services.
Checked 1 hosts.
Checked 4 host groups.
Checked 0 service groups.
Checked 2 contacts.
Checked 2 contact groups.
Checked 34 commands.
Checked 7 time periods.
Checked 0 host escalations.
Checked 0 service escalations.
Checking for circular paths...
Checked 1 hosts
Checked 0 service dependencies
Checked 0 host dependencies
Checked 7 timeperiods
Checking global event handlers...
Checking obsessive compulsive processor commands...
Checking misc settings...
Total Warnings: 0
Total Errors: 0
Things look okay - No serious problems were detected during the pre-flight check
- Restart the Nagios Core services:
[anupam@ubuntu]:~$ sudo systemctl restart nagios.service
- If you have installed SNMPTT, then restart the SNMPTT services:
[anupam@ubuntu]:~$ sudo systemctl restart snmptt.service
- Now, let’s try to discover a Dell iDRAC using the /usr/local/nagios/dell/scripts/dell_device_discovery.pl script to make sure that everything is working as expected.
NOTE: The default permissions on the /usr/local/nagios/dell directory and file structure is 750, so that means that either you need to run the Dell OM perl scripts as nagios user or you can use sudo.
anupam@ubuntu:~$ sudo /usr/local/nagios/dell/scripts/dell_device_discovery.pl -H 100.100.240.173 -P 2 -f
[sudo] password for anupam:
Starting Dell device discovery...
The following services are configured for the Dell device(s) to be discovered, as applicable.
Dell Chassis Information
Dell Chassis Overall Health Status
Dell Chassis Traps
Dell Server Information
Dell Server Overall Health Status
Dell Server Traps
Dell Storage Compellent Controller Information
Dell Storage Compellent Controller Overall Health Status
Dell Storage Compellent Controller Traps
Dell Storage Compellent Information
Dell Storage Compellent Management Traps
Dell Storage Compellent Overall Health Status
Dell Storage EqualLogic Group Information
Dell Storage EqualLogic Member Information
Dell Storage EqualLogic Member Overall Health Status
Dell Storage EqualLogic Member Traps
Dell Storage PowerVault MD Information
Dell Storage PowerVault MD Overall Health Status
Dell Storage PowerVault MD Traps
Press Y and then press Enter to continue.
Press any other key and then press Enter or press Enter to exit.
Y
Dell device discovery is in progress...
Total number of Dell device(s) attempted :1
Total number of Dell device(s) unreachable :0
Total number of Dell device(s) with error response :0
Total number of Dell device(s) with no response :0
Total number of Dell device(s) already discovered :1
Total number of Dell Agent-free Server(s) discovered :1
Total number of Dell Chassis discovered :0
Total number of Dell Storage Arrays discovered :0
Total number of Dell device(s) discovered successfully :1
Dell device discovery completed.
Please verify the Nagios configuration and restart the Nagios service.
- Restart the nagios core service:
anupam@ubuntu:~$ sudo systemctl restart nagios.service
- You can now login to the Nagios web interface and verify that the Dell iDRAC host has been discovered and the services for this host have been configured and scheduled for monitoring: