677 lines
18 KiB
Puppet
677 lines
18 KiB
Puppet
# Common nagios variables.
|
|
#
|
|
class nagios::common {
|
|
|
|
case $::operatingsystem {
|
|
"centos","redhat","fedora": {
|
|
$etcdir = "/etc/nagios"
|
|
$confdir = "${etcdir}/conf.d"
|
|
$private = "${etcdir}/private.d"
|
|
$htpasswd = "${etcdir}/passwd"
|
|
$package = "nagios"
|
|
$service = "nagios"
|
|
$scriptalias = "/nagios/cgi-bin/"
|
|
$libdir = $::architecture ? {
|
|
"x86_64" => "/usr/lib64/nagios/plugins",
|
|
default => "/usr/lib/nagios/plugins",
|
|
}
|
|
$cgibin = $::architecture ? {
|
|
"x86_64" => "/usr/lib64/nagios/cgi-bin",
|
|
default => "/usr/lib/nagios/cgi-bin",
|
|
}
|
|
$htdocs = "/usr/share/nagios/html"
|
|
}
|
|
"ubuntu","debian": {
|
|
$etcdir = "/etc/nagios3"
|
|
$confdir = "${etcdir}/conf.d"
|
|
$private = "${etcdir}/private.d"
|
|
$htpasswd = "${etcdir}/htpasswd.users"
|
|
$package = "nagios3"
|
|
$service = "nagios3"
|
|
$scriptalias = "/cgi-bin/nagios3/"
|
|
$libdir = "/usr/lib/nagios/plugins"
|
|
$cgibin = "/usr/lib/cgi-bin/nagios3"
|
|
$htdocs = "/usr/share/nagios3/htdocs"
|
|
}
|
|
default: {
|
|
fail("Nagios not supported on ${::operatingsystem}")
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Install Nagios server.
|
|
#
|
|
class nagios::server::manual inherits nagios::common {
|
|
|
|
package { "nagios":
|
|
name => $package,
|
|
ensure => installed,
|
|
}
|
|
|
|
case $::operatingsystem {
|
|
"centos","redhat","fedora": {
|
|
package { [ "nagios-plugins-all",
|
|
"nagios-plugins-nrpe", ]:
|
|
ensure => installed,
|
|
}
|
|
}
|
|
"ubuntu","debian": {
|
|
package { [ "nagios-plugins",
|
|
"nagios-nrpe-plugin", ]:
|
|
ensure => installed,
|
|
}
|
|
file { "/usr/share/nagios3/htdocs/stylesheets":
|
|
ensure => link,
|
|
target => "/etc/nagios3/stylesheets",
|
|
}
|
|
}
|
|
}
|
|
|
|
service { "nagios":
|
|
name => $service,
|
|
ensure => running,
|
|
enable => true,
|
|
}
|
|
|
|
apache::configfile { "nagios.conf":
|
|
content => template("nagios/nagios-httpd.conf.erb"),
|
|
}
|
|
|
|
file { [ "${htdocs}/.htaccess", "${cgibin}/.htaccess" ]:
|
|
ensure => present,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
source => [ "puppet:///files/nagios/htaccess",
|
|
"puppet:///modules/nagios/htaccess.${::osfamily}", ],
|
|
require => Package["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/nagios.cfg":
|
|
name => "${etcdir}/nagios.cfg",
|
|
ensure => present,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
source => "puppet:///modules/nagios/nagios.cfg.${::osfamily}",
|
|
require => Package["nagios"],
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/cgi.cfg":
|
|
name => "${etcdir}/cgi.cfg",
|
|
ensure => present,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
content => template("nagios/cgi.cfg.erb"),
|
|
require => Package["nagios"],
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/commands.cfg":
|
|
name => "${etcdir}/commands.cfg",
|
|
ensure => present,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
source => "puppet:///modules/nagios/commands.cfg",
|
|
require => Package["nagios"],
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/passwd":
|
|
name => $htpasswd,
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => $apache::sslserver::group,
|
|
require => Package["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/conf.d":
|
|
name => $confdir,
|
|
ensure => directory,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
purge => true,
|
|
force => true,
|
|
recurse => true,
|
|
source => "puppet:///modules/custom/empty",
|
|
require => Package["nagios"],
|
|
}
|
|
|
|
file { "/etc/nagios/private.d":
|
|
name => $private,
|
|
ensure => directory,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
purge => true,
|
|
force => true,
|
|
recurse => true,
|
|
source => "puppet:///modules/custom/empty",
|
|
require => Package["nagios"],
|
|
}
|
|
|
|
file { "${confdir}/contactgroup_all.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Contactgroup["all"],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_contactgroup { "all":
|
|
target => "${confdir}/contactgroup_all.cfg",
|
|
members => "*",
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "${confdir}/hostgroup_all.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Hostgroup["all"],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_hostgroup { "all":
|
|
target => "${confdir}/hostgroup_all.cfg",
|
|
members => "*",
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "${confdir}/host_default.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Host["default"],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_host { "default":
|
|
target => "${confdir}/host_default.cfg",
|
|
register => "0",
|
|
notifications_enabled => "1",
|
|
event_handler_enabled => "1",
|
|
flap_detection_enabled => "1",
|
|
failure_prediction_enabled => "1",
|
|
process_perf_data => "1",
|
|
retain_status_information => "1",
|
|
retain_nonstatus_information => "1",
|
|
check_command => "check-host-alive",
|
|
max_check_attempts => "5",
|
|
notification_interval => "0",
|
|
notification_period => "24x7",
|
|
notification_options => "d,u,r",
|
|
contact_groups => "all",
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "${confdir}/service_default.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Service["default"],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_service { "default":
|
|
target => "${confdir}/service_default.cfg",
|
|
register => "0",
|
|
active_checks_enabled => "1",
|
|
passive_checks_enabled => "1",
|
|
parallelize_check => "1",
|
|
obsess_over_service => "1",
|
|
check_freshness => "0",
|
|
notifications_enabled => "1",
|
|
event_handler_enabled => "1",
|
|
flap_detection_enabled => "1",
|
|
failure_prediction_enabled => "1",
|
|
process_perf_data => "1",
|
|
retain_status_information => "1",
|
|
retain_nonstatus_information => "1",
|
|
notification_interval => "0",
|
|
is_volatile => "0",
|
|
check_period => "24x7",
|
|
normal_check_interval => "5",
|
|
retry_check_interval => "1",
|
|
max_check_attempts => "2",
|
|
notification_period => "24x7",
|
|
notification_options => "w,u,c,r",
|
|
contact_groups => "all",
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
file { "${confdir}/timeperiod_24x7.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Timeperiod["24x7"],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_timeperiod { "24x7":
|
|
target => "${confdir}/timeperiod_24x7.cfg",
|
|
alias => "24x7",
|
|
monday => "00:00-24:00",
|
|
tuesday => "00:00-24:00",
|
|
wednesday => "00:00-24:00",
|
|
thursday => "00:00-24:00",
|
|
friday => "00:00-24:00",
|
|
saturday => "00:00-24:00",
|
|
sunday => "00:00-24:00",
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Install Nagios server and collect node configurations.
|
|
#
|
|
class nagios::server inherits nagios::server::manual {
|
|
|
|
Nagios::Host <<||>> {
|
|
confdir => $confdir,
|
|
notify => Service["nagios"],
|
|
}
|
|
Nagios::Service <<||>> {
|
|
confdir => $confdir,
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Define nagios email contact.
|
|
#
|
|
# === Parameters
|
|
#
|
|
# $name:
|
|
# Email address.
|
|
#
|
|
define nagios::contact::email($confdir=$nagios::common::confdir) {
|
|
|
|
file { "${confdir}/contact_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Contact[$name],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_contact { $name:
|
|
target => "${confdir}/contact_${name}.cfg",
|
|
host_notification_commands => "notify-host-by-email",
|
|
host_notification_options => "d,r",
|
|
host_notification_period => "24x7",
|
|
service_notification_commands => "notify-service-by-email",
|
|
service_notification_options => "w,u,c,r",
|
|
service_notification_period => "24x7",
|
|
email => $name,
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Define nagios prowl contact.
|
|
#
|
|
# === Parameters
|
|
#
|
|
# $name:
|
|
# Prowl API key.
|
|
#
|
|
define nagios::contact::prowl($confdir=$nagios::common::confdir) {
|
|
|
|
file { "${confdir}/contact_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Contact[$name],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_contact { $name:
|
|
target => "${confdir}/contact_${name}.cfg",
|
|
host_notification_commands => "notify-host-by-prowl",
|
|
host_notification_options => "d,r",
|
|
host_notification_period => "24x7",
|
|
service_notification_commands => "notify-service-by-prowl",
|
|
service_notification_options => "w,u,c,r",
|
|
service_notification_period => "24x7",
|
|
address1 => $name,
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Define nagios target host.
|
|
#
|
|
# === Parameters
|
|
#
|
|
# $name:
|
|
# Hostname of target.
|
|
# $osname:
|
|
# Operating system name for hostextinfo.
|
|
# $osicon:
|
|
# Operating system icon name for hostextinfo.
|
|
#
|
|
define nagios::host($confdir, $osname="NONE", $osicon="NONE") {
|
|
|
|
file { "${confdir}/host_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Host[$name],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_host { $name:
|
|
ensure => present,
|
|
use => "default",
|
|
target => "${confdir}/host_${name}.cfg"
|
|
}
|
|
|
|
if $osicon != "NONE" {
|
|
case $::operatingsystem {
|
|
"debian","ubuntu": {
|
|
$iconpath = "base/"
|
|
}
|
|
default: {
|
|
$iconpath = ""
|
|
}
|
|
}
|
|
file { "${confdir}/hostextinfo_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Hostextinfo[$name],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_hostextinfo { $name:
|
|
ensure => present,
|
|
icon_image_alt => $osname,
|
|
icon_image => "${iconpath}${osicon}.png",
|
|
statusmap_image => "${iconpath}${osicon}.gd2",
|
|
target => "${confdir}/hostextinfo_${name}.cfg"
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Define nagios target service.
|
|
#
|
|
# === Parameters
|
|
#
|
|
# $host:
|
|
# Target hostname.
|
|
# $command:
|
|
# Check command.
|
|
# $description:
|
|
# Service description.
|
|
#
|
|
define nagios::service($confdir, $host, $command, $description) {
|
|
|
|
file { "${confdir}/service_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
before => Nagios_Service[$name],
|
|
require => File["/etc/nagios/conf.d"],
|
|
}
|
|
nagios_service { $name:
|
|
host_name => $host,
|
|
check_command => $command,
|
|
service_description => $description,
|
|
use => "default",
|
|
target => "${confdir}/service_${name}.cfg"
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure nagios target.
|
|
#
|
|
class nagios::target {
|
|
|
|
@@nagios::host { $fqdn:
|
|
osname => $::operatingsystem,
|
|
osicon => $::osfamily ? {
|
|
"" => "NONE",
|
|
default => inline_template("<%= osfamily.downcase %>")
|
|
},
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure nagios nrpe target.
|
|
#
|
|
class nagios::target::nrpe {
|
|
|
|
if !$nagios_allow {
|
|
$nagios_allow = "127.0.0.1"
|
|
}
|
|
|
|
include nagios::common
|
|
include nagios::target
|
|
|
|
case $operatingsystem {
|
|
"centos","redhat","fedora": {
|
|
$service = "nrpe"
|
|
$nrpedir = "/etc/nrpe.d"
|
|
package { [ "nrpe",
|
|
"nagios-plugins-disk",
|
|
"nagios-plugins-load",
|
|
"nagios-plugins-procs",
|
|
"nagios-plugins-users", ]:
|
|
ensure => installed,
|
|
before => [ File["/etc/nrpe.d"],
|
|
Augeas["nrpe-allow"],
|
|
Service["nrpe"], ],
|
|
}
|
|
}
|
|
"ubuntu","debian": {
|
|
$service = "nagios-nrpe-server"
|
|
$nrpedir = "/etc/nagios/nrpe.d"
|
|
package { [ "nagios-nrpe-server",
|
|
"nagios-plugins-basic", ]:
|
|
ensure => installed,
|
|
before => [ File["/etc/nrpe.d"],
|
|
Augeas["nrpe-allow"],
|
|
Service["nrpe"], ],
|
|
}
|
|
}
|
|
}
|
|
|
|
file { "/etc/nrpe.d":
|
|
ensure => directory,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
purge => true,
|
|
force => true,
|
|
recurse => true,
|
|
source => "puppet:///modules/custom/empty",
|
|
}
|
|
|
|
service { "nrpe":
|
|
name => $service,
|
|
ensure => running,
|
|
enable => true,
|
|
}
|
|
|
|
augeas { "nrpe-allow":
|
|
context => "/files/etc/nagios/nrpe.cfg",
|
|
changes => "set allowed_hosts '${nagios_allow}'",
|
|
notify => Service["nrpe"],
|
|
}
|
|
|
|
file { "${nrpedir}/check_disk.cfg":
|
|
ensure => present,
|
|
mode => "0644",
|
|
owner => "root",
|
|
group => "root",
|
|
content => "command[check_disk] = ${nagios::common::libdir}/check_disk -c 10% -w 20% -p /\n",
|
|
require => File["/etc/nrpe.d"],
|
|
notify => Service["nrpe"],
|
|
}
|
|
@@nagios::service { "${fqdn}_disk":
|
|
host => $fqdn,
|
|
command => "check_nrpe!check_disk",
|
|
description => "Disk",
|
|
}
|
|
|
|
@@nagios::service { "${fqdn}_load":
|
|
host => $fqdn,
|
|
command => "check_nrpe!check_load",
|
|
description => "Load",
|
|
}
|
|
|
|
@@nagios::service { "${fqdn}_users":
|
|
host => $fqdn,
|
|
command => "check_nrpe!check_users",
|
|
description => "Users",
|
|
}
|
|
|
|
@@nagios::service { "${fqdn}_procs":
|
|
host => $fqdn,
|
|
command => "check_nrpe!check_total_procs",
|
|
description => "Processes",
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure ssh service target.
|
|
#
|
|
class nagios::target::ssh {
|
|
|
|
include nagios::target
|
|
|
|
@@nagios::service { "${fqdn}_ssh":
|
|
host => $fqdn,
|
|
command => "check_ssh",
|
|
description => "SSH",
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure http service target.
|
|
#
|
|
class nagios::target::http {
|
|
|
|
include nagios::target
|
|
|
|
@@nagios::service { "${fqdn}_http":
|
|
host => $fqdn,
|
|
command => "check_http",
|
|
description => "HTTP",
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure https service target.
|
|
#
|
|
class nagios::target::https {
|
|
|
|
include nagios::target
|
|
|
|
@@nagios::service { "${fqdn}_https":
|
|
host => $fqdn,
|
|
command => "check_http!--ssl",
|
|
description => "HTTPS",
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Configure smtp service target.
|
|
#
|
|
class nagios::target::smtp {
|
|
|
|
include nagios::target
|
|
|
|
@@nagios::service { "${fqdn}_smtp":
|
|
host => $fqdn,
|
|
command => "check_smtp",
|
|
description => "SMTP",
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Install check_esxi_hardware.py plugin.
|
|
#
|
|
class nagios::plugin::esxi {
|
|
|
|
package { "pywbem":
|
|
ensure => installed,
|
|
name => $::operatingsystem ? {
|
|
"debian" => "python-pywbem",
|
|
"ubuntu" => "python-pywbem",
|
|
default => "pywbem",
|
|
},
|
|
}
|
|
|
|
file { "${nagios::common::libdir}/check_esxi_hardware.py":
|
|
ensure => present,
|
|
mode => "0755",
|
|
owner => "root",
|
|
group => "root",
|
|
source => "puppet:///files/nagios/check_esxi_hardware.py",
|
|
require => Package["nagios"],
|
|
}
|
|
|
|
}
|
|
|
|
|
|
# Define ESXi target host.
|
|
#
|
|
# === Parameters
|
|
#
|
|
# $name:
|
|
# Target hostname.
|
|
# $user:
|
|
# ESXi host username.
|
|
# $pass:
|
|
# ESXi host password.
|
|
# $vendor:
|
|
# ESXi host vendor. Defaults to "auto".
|
|
#
|
|
define nagios::host::esxi($user, $pass, $vendor="auto") {
|
|
|
|
file { "${nagios::common::private}/esxi_${name}.cfg":
|
|
ensure => present,
|
|
mode => "0640",
|
|
owner => "root",
|
|
group => "nagios",
|
|
content => "${user} ${pass}\n",
|
|
require => File["/etc/nagios/private.d"],
|
|
}
|
|
|
|
nagios::host { $name:
|
|
confdir => $nagios::common::confdir,
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
nagios::service { "${name}_esxi":
|
|
host => $name,
|
|
command => "check_esxi_hardware!${nagios::common::private}/esxi_${name}.cfg!${vendor}",
|
|
description => "ESXi",
|
|
confdir => $nagios::common::confdir,
|
|
notify => Service["nagios"],
|
|
}
|
|
|
|
}
|