Nms 5th Unit
Nms 5th Unit
Zabix lab
Zabbix is an open-source monitoring software tool for diverse IT components, including
networks, servers, virtual machines, and cloud services. Zabbix provides monitoring for
metrics such as network utilization, CPU load, and disk space consumption.
3. Follow the instructions in the How to connect window to get your unique
integration URL and review next steps.
bash
docker run --name zabbix-appliance -t \
-p 10051:10051 \
-p 80:80 \
-d zabbix/zabbix-appliance:latest
bash
docker exec -it zabbix-appliance bash
bash
grep AlertScriptsPath /etc/zabbix/zabbix_server.conf
Note: The script must be executable by the user running the
zabbix_server binary (usually “zabbix”) on the Zabbix server. For
example, chmod +x grafana_oncall.sh
bash
ls -lh /usr/lib/zabbix/alertscripts/grafana_oncall.sh
-rw-r--r-- 1 root root 1.5K Jun 6 07:52
/usr/lib/zabbix/alertscripts/grafana_oncall.sh
o Type: script
o Script parameters:
{ALERT.SENDTO}
{ALERT.SUBJECT}
{ALERT.MESSAGE}
To send alerts to Grafana OnCall, the {ALERT.SEND_TO} value must be set in the user
media configuration.
1. In the web UI, navigate to Administration > Users and open the user
properties form.
2. In the Media tab, click Add and copy the link from Grafana OnCall in the Send
to field.
3. Click Test in the last column to send a test alert to Grafana OnCall.
4. Specify Send to OnCall using the unique integration URL from the above step in
the testing window that opens.
Create a test message with a body and optional subject and click Test.
grafana_oncall.sh script
bash
#!/bin/bash
# This is the modification of original ericos's shell script.
payload='{
"title": "'${subject}'",
"state": "'${state}'",
"message": "'${message}'"
}'
# Alert group identifier from the subject of action. Grouping will not work
without ONCALL_GROUP in the action subject
regex='ONCALL_GROUP: ([a-zA-Z0-9_\"]*)'
if [[ "$subject" =~ $regex ]]; then
alert_uid=${BASH_REMATCH[1]}
payload='{
"alert_uid": "'${alert_uid}'",
"title": "'${subject}'",
"state": "'${state}'",
"message": "'${message}'"
}'
fi
Originally released in 1999 as NetSaint, Nagios was developed by Ethan Galstad and
subsequently refined by numerous contributors as an open source project. Nagios
Enterprises, a company based around the Nagios Core technology, offers multiple
products, such as Nagios XI, Log Server, Network Analyzer and Fusion.
Based on the parameters and thresholds defined, Nagios can send out alerts if critical
levels are reached. These notifications can be sent through email and text messages.
An authorization system enables administrators to restrict access.
Nagios runs both agent-based and agentless configurations. Independent agents are
installed on any hardware or software system to collect data that is then reported back
to the management server. Agentless monitoring uses existing protocols to emulate an
agent. Both approaches can monitor file system use, OS metrics, service and process
states. Examples of Nagios agents include Nagios Remote Data Processor (NRDP),
Nagios Cross Platform Agent and NSClient++.
Nagios plugins
Nagios can also run remote scripts and plugins using the Nagios Remote Plugin
Executor (NRPE) agent. NRPE enables remote monitoring of system metrics such as
system load, memory and disk use. It consists of the check_nrpe plugin, which is
stored on the local monitoring machine, and NRDP, which runs on the remote
machine. Nagios uses a plugin to consolidate data from the NRPE agent before it goes
to the management server for processing. NRPE can also communicate with Windows
agents to monitor Windows machines.
Nagios supports plugins that are stand-alone add-ons and extensions so users can
define targets and which target parameters to monitor. Nagios plugins process
command-line arguments and communicate commands with Nagios Core.
There are around 50 plugins developed and maintained by Nagios, while there are
over 3,000 from the community. These plugins are categorized into lists including
hardware, software, cloud, OSes, security, log files and network connections. As an
example, when used in conjunction with environmental-sensing systems, a Nagios
plugin can share data on environmental variables, such as temperature, humidity or
barometric pressure.
Nagios tools
Nagios has proven popular among small and large businesses, as well as internet
service providers, educational institutions, government agencies, healthcare
institutions, manufacturing companies and financial institutions.
Users can choose among free and paid options, depending on the needed services and
support.
Nagios Core
The service that was originally known as Nagios is now referred to as Nagios Core.
Core is freely available as an open source monitoring software for IT systems,
networks and infrastructure. Core contains a wide array of infrastructure monitoring
through allowing plugins to extend its monitoring capabilities. It is the base for paid
Nagios monitoring systems.
Nagios Core has an optional web interface, which displays network status,
notifications and log files. Core can notify its user when there are server or host
issues. Additionally, Core can monitor network services such as SMTP, HTTP
and Ping.
Nagios XI
Nagios Network Analyzer tracks network traffic and bandwidth use. Network
Analyzer can resolve network outages, abnormalities and security threats. Features
include automated security alerts, customizable application monitoring, integration
with Nagios IX and a bandwidth use calculator.
Nagios Fusion is an aggregation service for Nagios Core and Nagios XI servers that
shows multiple systems in one view. Fusion condenses network management by
centralizing features and data from Nagios XI and Core in one location, creating a
granular view of a network infrastructure. With Fusion, administrators can specify
which XI and Core servers are displayed and manage which users are allowed to view
those servers. Additionally, Fusion users can log into any managed server and
use cached or live data to configure charts and other graphics to appear on
dashboards.
Nagios competitors
Nagios competitors include Zenoss, Zabbix, Microsoft System Center Operations
Manager (SCOM) and SolarWinds, among other open source and commercial
monitoring tools.
Zenoss
Zabbix is an open source monitoring tool for Linux, Unix and Windows OSes that
relies on agents to collect monitoring data. It can also use common protocols for
agentless operation. The technology monitors physical and cloud assets, VMs,
services and applications. Zabbix is evolving for cloud deployment, as well as on
premises.
Microsoft SCOM
Microsoft SCOM enables users to configure, manage and monitor devices and
applications via the same console. SCOM tracks server hardware, system services,
OSes, hypervisors and applications. SCOM, like Nagios, relies on agents or agentless-
based monitoring for its data collection, and supports plugins.
SolarWinds
SolarWinds' Server & Application Monitor software works with applications, servers
and databases. Server & Application Monitor includes performance monitoring,
server management, alerts and reporting through agentless monitoring. Server &
Application Monitor also supports other SolarWinds products.
If you’ve worked with Amazon Web Services (AWS) or Microsoft Azure, you’ll
feel quite at home with GCP, which shares much of the same concepts and
capabilities.
However, there are a few key differences between each provider that you should
be aware of if migrating or mobilizing workloads between them.
VPCs
Projects
Networks
Regions
Zones
Subnets
Switching
Routing
Firewalls
Essentially, we’ll be going over this diagram:
Google’s Global Cloud Network
Needless to say, Google is global, meaning as a customer of GCP you can be
global too. As of this writing, GCP has 11 regions, 33 zones and over 100 points
of presence throughout the globe.
Americas:
Region: us-central1
Zone: us-central1-a
Zone: us-central1-b
Zone: us-central1-c
Zone: us-central1-f
Region: us-west1
Zone: us-west1-a
Zone: us-west1-b
Zone: us-west1-c
Region: us-east4
Zone: us-east4-a
Zone: us-east4-b
Zone: us-east4-c
Region: us-east1
Zone: us-east1-b
Zone: us-east1-c
Zone: us-east1-d
This diagram shows the (current) regions and zones in GCP:
While some of the core resources in GCP are global, others may be restricted by
region or zone. Regional resources can be used anywhere within the same
region, while zonal resources can be used anywhere within the same zone.
Some examples of this are:
Global Resources:
Images
Snapshots
VPC Network
Firewalls
Routes
Regional Resources:
Instances (VMs)
Persistent Disks
For example, I can attach a disk from one instance to another within the same
zone, but I cannot do this across zones. However, since images and snapshots
are Global Resources, I can use these across zones in the same region.
“A Virtual Private Cloud (VPC) is a global private isolated virtual network partition
that provides managed networking functionality for your Google Cloud Platform
(GCP) resources.”
You can think of a VPC as a virtual version of your traditional physical network.
VPCs are global, spanning all regions. The instances within the VPC have
internal IP addresses and can communicate privately with each other across the
globe. This logical representation of your network infrastructure abstracts much
of the complexities of dealing with on-premises architectures.
In this diagram, you can see the default VPC network spanning multiple regions
and zones, and subnets within various parts of the network servicing VMs. All of
these subnets can natively route to each other, and as long as the firewalls
permit it, VMs can reach one another within this VPC.
GCP Projects
Before going further, I just want to briefly mention projects within GCP. Before
you can do anything, you must create a project. A project is really an
organizational construct used for billing and permissions. Some organizations
use projects for various apps or various environments like Prod/Test/Dev; some
use it for departments like Finance/HR/Marketing etc.; some use it to provide
billing to customers based on their usage within a cloud-hosted environment. The
important part to understand is that it’s simply a way to organize resources from
a billing and permissions perspective, and each project has its own VPC
network(s) isolated from other projects in GCP.
Each network has its own subnets, routes, firewall, internal DNS, and more
beyond the basics listed here.
GCP Project
VPC Network
Subnets
Routes
Firewall
Internal DNS
Screenshot from GCP console showing default network and a default subnet in
each region:
Note in the screenshot that the VPC network called default is global, while each
of the subnets within it is regional. When you create an instance you’ll place it in
a subnet. Instances in this subnet can be in any zone within the region it’s
assigned to. Even though subnets are regional, instances can communicate with
other instances in the same VPC network using their private IP addresses. Of
course, you can isolate these subnets within the network if you wish using
firewall policies.
If you want complete isolation between various applications, customers, etc., you
could create multiple networks.
You can have up to five networks per project, including the default network.
Multiple networks within a single project can provide multi-tenancy, IP overlap, or
isolation within the project itself. Just another option instead of having multiple
projects.
IP Addresses
Each VM instance in GCP will have an internal IP address and typically an
external IP address. The internal IP address is used to communicate between
instances in the same VPC network, while the external IP address is used to
communicate with instances in other networks or the Internet. These IP
addresses are ephemeral by default but can be statically assigned.
Internal IPs are allocated to instances from the subnet’s IP range via DHCP. This
means the IPs are ephemeral and will be released if the instance is deleted.
External IPs are also assigned via DHCP from some Google-provided pool.
These IPs are mapped to the internal IPs of the VM instances for you. You can
reserve static IP addresses if needed.
Routes
GCP is a global software-defined network with layers of controllers and
impressive routing capabilities that have been mostly abstracted for the end-user.
All networks have routes in order to communicate with each other. The default
network has a default route to the internet and individual routes to each subnet.
Here’s a screenshot from the console:
The picture below from Google documentation helps visualize the concept of
these route tables. Even though there are no “routers” in the software-defined
network, you can still think of each VM instance as connected to some core
router, with all traffic passing through it based on the perspective of each node’s
individual route table.
Routing decisions apply to traffic egressing a VM. The most specific route in the
table will match. Traffic must match a route and firewall rule in order for it to pass.
You can add custom static routes or setup BGP for dynamic routing between
clouds or on-premises environments.
Firewalls
Each VPC network has its own distributed firewall, which allows or denies traffic
into and out of the network, and between VM instances. The firewall has an
explicit-deny policy, meaning that any traffic that needs to be permitted must
have a rule created. You cannot create “deny” rules, only “allow” rules.
If you have a concept in your mind that all this traffic is flowing through some
single firewall chokepoint device somewhere, you’re mistaken. GCP is a full
SDN, with firewall policies applied at the instance-level, no matter where it
resides. These checks are performed immediately without having to funnel traffic
through dedicated security appliances.
Firewall rules can match IP addresses or ranges, but can also match tags. Tags
are user-defined strings that help organize firewall policies for standards-based
policy approach. For example, you could have a tag called web-server, and have
a firewall policy that says any VM with the tag web-server should have ports
HTTP, HTTPS, and SSH opened.
Firewall rules are at the network resource level and are not shared between
projects are other networks.
DNS Resolution
Another great thing about GCP is the way it handles DNS. When a VM instance
is created, DNS entries are automatically created resolving to a formatted
hostname.
FQDN = <pre>[hostname].c.[project-id].internal</pre>
porcupine.c.tree.internal
Network Billing
I won’t go into too much detail here, but the gist is GCP bills clients for egress
traffic only. Egress traffic is considered as traffic to the Internet, or from one
region to another (in the same network), or between zones within a region.
You are not billed for ingress traffic. Ingress traffic includes VM-to-VM traffic in a
single zone (same region, network), and traffic to most GCP services.
VPC networks only support IPv4 unicast traffic (No IPv6, or broadcast/multicast)
Maximum of 7000 VM instances per VPC network