Documentation by YARD 0.9.9
+Documentation by YARD 0.9.16
Alphabetic Index
@@ -173,6 +173,11 @@ +File Listing
-
@@ -281,9 +293,7 @@
diff --git a/CHANGELOG.md b/CHANGELOG.md index 8e4fcb8..5c7dc8e 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -8,1152 +8,1517 @@ Changelog of Git Changelog.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
|Repo Name| version | Build
-Status|
-|---|---|---|---|
-|cd_nagios| 0.0.1.9 | {Build
-Status/]|
|Repo Name| version | Build Status| |—|—|—|—| |cd_nagios|
+1.1.1.3 | |
Installation: -* Nagios Server instance: - * install httpd via cd_apache - * +
Installation: * Nagios Server instance: * install httpd via cd_apache * install Nagios server binaries on Nagios server
Nagios clients:
@@ -147,61 +141,34 @@ install Nagios server binaries on Nagios serverinclude NRPE via cd_nrpe (optional)
Configuration -* configure all aspects of Nagios on server -* manage nagios -service user -* manage directories (filesystem permissions, selinux ) -* -manage cgi.cfg through parameters -* manage nagios.cfg through parameters -* -manage Nagios users through external Puppet rules via define -* manage -Nagios commands through Puppet exports -* manage Nagios template definitions -through external Puppet rules via define -* manage Nagios main contacts +
Configuration * configure all aspects of Nagios on server * manage nagios +service user * manage directories (filesystem permissions, selinux ) * +manage cgi.cfg through parameters * manage nagios.cfg through parameters * +manage Nagios users through external Puppet rules via define * manage +Nagios commands through Puppet exports * manage Nagios template definitions +through external Puppet rules via define * manage Nagios main contacts through Puppet exports. Additional contacts can be created through external -Puppet rules via define, to avoid having to alter the module code. -* manage +Puppet rules via define, to avoid having to alter the module code. * manage Nagios main contactgroups through Puppet exports. Additional contact groups can be created through external Puppet rules via define, to avoid having to -alter the module code. -* manage Nagios main hostgroups through Puppet +alter the module code. * manage Nagios main hostgroups through Puppet exports. Additional host groups can be created through external Puppet -rules via define, to avoid having to alter the module code. -* manage Nagios +rules via define, to avoid having to alter the module code. * manage Nagios main servicegroups through Puppet exports. Additional service groups can be created through external Puppet rules via define, to avoid having to alter -the module code. -* manage Nagios main timeperiods through Puppet exports. +the module code. * manage Nagios main timeperiods through Puppet exports. Additional timeperiods can be created through external Puppet rules via -define, to avoid having to alter the module code. -* configure firewall -(optional) -* configure selinux policies (optional) -* configure forwarding -http to https including accesing the /nagios url directly (optional) -* -manage TLS certificates through certbot (optional)
+define, to avoid having to alter the module code. * configure firewall +(optional) * configure selinux policies (optional) * configure forwarding +http to https including accesing the /nagios url directly (optional) * +manage TLS certificates through certbot (optional) * manage +$user$ arguments in resource file via define
-Service -* manage Nagios service on server
+Service * manage Nagios service on server
-Monitoring -* monitor Nagios host -* monitor Nagios service -* monitor -clients: - * ping - * root partition - * swap usage - * logged-in local users - -* amount of total processes - * amount of zombie processes - * current Load
+Monitoring * monitor Nagios host * monitor Nagios service * monitor +clients: * ping * root partition * swap usage * logged-in local users +* amount of total processes * amount of zombie processes * current Load
All dependencies must be included in the catalogue.
cd_resources +href="https://gitlab.confdroid.com/12WW1160/cd_resources">cd_resources for Yum repos.
cd_apache -for installing httpd
+cd_apache for +installing httpd
cd_firewall or puppetlabs firewall (optional)
cd_selinux for selinux policy adjustments
cd_certbot to auto-manage TLS certificates (optional)
cd_nrpe to +
cd_nrpe to manage NRPE (optional)
cd_stdlib or +
cd_stdlib or puppetlabs stdlib to facilitate concat
cd-concat or +
cd-concat or puppetlabs concat to concatenate configuration files from different sources.
via site.pp or nodes.pp
node 'example.example.net' {
- include cd_puppetdb
+ include cd_nagios
}
-In order to apply parameters through Foreman,
cd_nagios::params must be added to the host or hostgroup
@@ -288,7 +254,7 @@ Nagios server to connect to clients. Defaults to true.
A working instance of PuppetDBconnected to the Puppet master is required for this to work. Installation and configuration of PuppetDB is out of scope for this module, however cd_puppetdb -is available to automate this task for you as well within a few minutes.
+href="https://gitlab.confdroid.com/12WW1160/cd_puppetdb">cd_puppetdb is +available to automate this task for you as well within a few minutes.In order to monitor clients, NAGIOS must be able to connect to them. There -are multiple ways of doing so, the most common ones being NRPE and SSH. -So +are multiple ways of doing so, the most common ones being NRPE and SSH. So far this module works through the usage of NRPE, which by default is enabled. Class cd_nagios::client::nrpe configures nrpe.cfg and opens the required firewall port on clients (optional,default).
@@ -346,12 +311,19 @@ required firewall port on clients (optional,default).Collected resources import ordering problem: The module might try to import +collected facts before nagios is even installed.
+SELINUX modules: it appears that sealerts are different accross systems. it +might be typically easier to work through sealerts manually.
+OS: CentOS 6, 7
+OS: CentOS 7
Puppet 3.x
+Puppet 5.x
ConfDroid as entity is entirely independent from Puppet. We provide custom configuration modules, written for specific purposes and specific -environments. -The modules are tested and supported only as documented, and +environments. The modules are tested and supported only as documented, and require testing in designated environments (i.e. lab or development environments) for parameter tuning etc. before deploying into production environments.
cd_nagios::nagios::resources::resource.pp Module name: cd_nagios Author: +Arne Teuke (arne_teuke@ConfDroid.com)
+ +This file is part of cd_nagios.
+ +cd_nagios is used for providing automatic configuration of Nagios +Copyright (C) 2016 ConfDroid (copyright@ConfDroid.com) This program is +free software: you can redistribute it and/or modify it under the terms of +the GNU General Public License as published by the Free Software +Foundation, either version 3 of the License, or (at your option) any later +version.
+ +This program is distributed in the hope that it will be useful, but +WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY +or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License +for more details.
+ +You should have received a copy of the GNU General Public License along +with this program. If not, see www.gnu.org/licenses/. }
+ +
+ + + +28 +29 +30 +31 +32 +33 +34 +35 +36 +37 +38 +39 +40 +41 +42 +43 +44 +45 +46 +47 +48 +49 +50 +51 +52 +53 +54 +55 +56 +57 +58 +59 +60 +61 +62 +63 +64 +65 +66 +67+ |
+
+ # File 'manifests/nagios/resources/resource.pp', line 28
+
+class cd_nagios::nagios::resources::resource (
+
+) inherits cd_nagios::params {
+
+ if $fqdn == $ng_nagios_server {
+
+ concat { $ng_resource_file:
+ ensure => present,
+ owner => 'root',
+ group => $ng_user,
+ mode => '0640',
+ selrange => s0,
+ selrole => object_r,
+ seltype => nagios_etc_t,
+ seluser => system_u,
+ notify => Service[$ng_service],
+ }
+
+ concat::fragment { 'header':
+ target => $ng_resource_file,
+ content => template($ng_resource_erb),
+ order => '000',
+ }
+
+ # plugins rule
+
+ cd_nagios::nagios::resources::resource_df { 'user_rule_plugins':
+ ng_user_arg_name => 'USER1',
+ ng_user_arg_value => '/usr/lib64/nagios/plugins/',
+ ng_user_arg_comment => 'Sets user1 to be the path to the plugins',
+ }
+
+ # eventhandlers rule
+ cd_nagios::nagios::resources::resource_df { 'user_rule_eventhandlers':
+ ng_user_arg_name => 'USER2',
+ ng_user_arg_value => '/usr/lib64/nagios/plugins/eventhandlers/',
+ ng_user_arg_comment => 'Sets user2 to be the path to the eventhandlers',
+ }
+ }
+}
+ |
+