recommit for updates in build 26

This commit is contained in:
2018-12-07 18:17:58 +01:00
parent 8d701f049c
commit fb74d57410
43 changed files with 1534 additions and 2286 deletions

View File

@@ -6,7 +6,7 @@
<title>
File: README
&mdash; Documentation by YARD 0.9.12
&mdash; Documentation by YARD 0.9.16
</title>
@@ -58,12 +58,9 @@
</div>
<div id="content"><div id='filecontents'>
<p>|Repo Name| version | Build
Status|
|---|---|---|---|
|<code>cd_nagios</code>| 1.0.0.0 | <a
href="https://pipelines.confdroid.com/buildStatus/icon?job=cd_nagios">{Build
Status</a>/]|</p>
<p>|Repo Name| version | Build Status| |—|—|—|—| |<code>cd_nagios</code>|
1.1.1.3 | <a href="https://pipelines.confdroid.com/job/cd_nagios/"><img
src="https://pipelines.confdroid.com/buildStatus/icon?job=cd_nagios"></a>|</p>
<h3 id="label-Synopsis">Synopsis</h3>
@@ -86,58 +83,55 @@ production!!! __**</code></p>
<h3 id="label-Table+of+Contents">Table of Contents</h3>
<ul><li>
<p><a href="#features">Features</a></p>
<p><a href="#label-Features">Features</a></p>
</li><li>
<p><a
href="https://gitlab.confdroid.com/12WW1160/cd_nagios/blob/master/REPOSTRUCTURE.md">Repo
Structure</a></p>
</li><li>
<p><a href="#dependencies">Dependencies</a></p>
<p><a href="#label-Dependencies">Dependencies</a></p>
</li><li>
<p><a href="#deployment">Deployment</a></p>
<p><a href="#label-Deployment">Deployment</a></p>
</li><li>
<p><a href="#native-puppet-deployment">native Puppet deployment</a></p>
<p><a href="#label-Native+puppet+deployment">native Puppet deployment</a></p>
</li><li>
<p><a href="#through-foreman">through Foreman</a></p>
<p><a href="#label-Through+foreman">through Foreman</a></p>
</li><li>
<p><a href="#parameters">Parameters</a></p>
<p><a href="#label-Parameters">Parameters</a></p>
</li><li>
<p><a href="#mandatory-parameters">Mandatory Parameters</a></p>
<p><a href="#label-Mandatory+parameters">Mandatory Parameters</a></p>
</li><li>
<p><a href="#optional-parameters">Optional Parameters</a></p>
<p><a href="#label-Optional+parameters">Optional Parameters</a></p>
</li><li>
<p><a href="#puppetdb">PuppetDB</a></p>
<p><a href="#label-Puppetdb">PuppetDB</a></p>
</li><li>
<p><a href="#selinux">SELINUX</a></p>
<p><a href="#label-Selinux">SELINUX</a></p>
</li><li>
<p><a href="#certbot">Certbot</a></p>
<p><a href="#label-Certbot">Certbot</a></p>
</li><li>
<p><a href="#httpd-vhost-files">Httpd vHost Files</a></p>
<p><a href="#label-Httpd+vhost+files">Httpd vHost Files</a></p>
</li><li>
<p><a href="#client-connections">Client Connections</a></p>
<p><a href="#label-Client+connections">Client Connections</a></p>
</li><li>
<p><a href="#manage-additional-resources">Manage additional resources</a></p>
<p><a href="#label-Manage+additional+resources">Manage additional resources</a></p>
</li><li>
<p><a href="#known-problems">Known Problems</a></p>
<p><a href="#label-Known+problems">Known Problems</a></p>
</li><li>
<p><a href="#support">Support</a></p>
<p><a href="#label-Support">Support</a></p>
</li><li>
<p><a href="#tests">Tests</a></p>
<p><a href="#label-Tests">Tests</a></p>
</li><li>
<p><a
href="https://gitlab.confdroid.com/12WW1160/cd_nagios/blob/master/CHANGELOG.md">Changelog</a></p>
</li><li>
<p><a href="https://confdroid.com/contact/">Contact Us</a></p>
</li><li>
<p><a href="#disclaimer">Disclaimer</a></p>
<p><a href="#label-Disclaimer">Disclaimer</a></p>
</li></ul>
<h3 id="label-Features">Features</h3>
<p>Installation:
* Nagios Server instance:
* install httpd via cd_apache
*
<p>Installation: * Nagios Server instance: * install httpd via cd_apache *
install Nagios server binaries on Nagios server</p>
<ul><li>
<p>Nagios clients:</p>
@@ -147,63 +141,34 @@ install Nagios server binaries on Nagios server</p>
<p>include NRPE via <code>cd_nrpe</code> (optional)</p>
</li></ul>
<p>Configuration
* configure all aspects of Nagios on server
* manage nagios
service user
* manage directories (filesystem permissions, selinux )
*
manage cgi.cfg through parameters
* manage nagios.cfg through parameters
*
manage Nagios users through external Puppet rules via define
* manage
Nagios commands through Puppet exports
* manage Nagios template definitions
through external Puppet rules via define
* manage Nagios main contacts
<p>Configuration * configure all aspects of Nagios on server * manage nagios
service user * manage directories (filesystem permissions, selinux ) *
manage cgi.cfg through parameters * manage nagios.cfg through parameters *
manage Nagios users through external Puppet rules via define * manage
Nagios commands through Puppet exports * manage Nagios template definitions
through external Puppet rules via define * manage Nagios main contacts
through Puppet exports. Additional contacts can be created through external
Puppet rules via define, to avoid having to alter the module code.
* manage
Puppet rules via define, to avoid having to alter the module code. * manage
Nagios main contactgroups through Puppet exports. Additional contact groups
can be created through external Puppet rules via define, to avoid having to
alter the module code.
* manage Nagios main hostgroups through Puppet
alter the module code. * manage Nagios main hostgroups through Puppet
exports. Additional host groups can be created through external Puppet
rules via define, to avoid having to alter the module code.
* manage Nagios
rules via define, to avoid having to alter the module code. * manage Nagios
main servicegroups through Puppet exports. Additional service groups can be
created through external Puppet rules via define, to avoid having to alter
the module code.
* manage Nagios main timeperiods through Puppet exports.
the module code. * manage Nagios main timeperiods through Puppet exports.
Additional timeperiods can be created through external Puppet rules via
define, to avoid having to alter the module code.
* configure firewall
(optional)
* configure selinux policies (optional)
* configure forwarding
http to https including accesing the /nagios url directly (optional)
*
manage TLS certificates through certbot (optional)
* manage
define, to avoid having to alter the module code. * configure firewall
(optional) * configure selinux policies (optional) * configure forwarding
http to https including accesing the /nagios url directly (optional) *
manage TLS certificates through certbot (optional) * manage
<code>$user$</code> arguments in resource file via define</p>
<p>Service
* manage Nagios service on server</p>
<p>Service * manage Nagios service on server</p>
<p>Monitoring
* monitor Nagios host
* monitor Nagios service
* monitor
clients:
* ping
* root partition
* swap usage
* logged-in local users
* amount of total processes
* amount of zombie processes
* current Load</p>
<p>Monitoring * monitor Nagios host * monitor Nagios service * monitor
clients: * ping * root partition * swap usage * logged-in local users
* amount of total processes * amount of zombie processes * current Load</p>
<h3 id="label-Repo+Structure">Repo Structure</h3>
@@ -252,7 +217,7 @@ concat</a> to concatenate configuration files from different sources.</p>
include cd_nagios
}</code></pre>
<h4 id="label-through+Foreman%3A">through Foreman:</h4>
<h4 id="label-through+Foreman-3A">through Foreman:</h4>
<p>In order to apply parameters through Foreman,
<strong>cd_nagios::params</strong> must be added to the host or hostgroup
@@ -338,8 +303,7 @@ directly, hence the module creates a vhost for the ssl host.</p>
<h3 id="label-Client+Connections">Client Connections</h3>
<p>In order to monitor clients, NAGIOS must be able to connect to them. There
are multiple ways of doing so, the most common ones being NRPE and SSH.
So
are multiple ways of doing so, the most common ones being NRPE and SSH. So
far this module works through the usage of NRPE, which by default is
enabled. Class cd_nagios::client::nrpe configures nrpe.cfg and opens the
required firewall port on clients (optional,default).</p>
@@ -357,9 +321,9 @@ might be typically easier to work through sealerts manually.</p>
<h3 id="label-Support">Support</h3>
<ul><li>
<p>OS: CentOS 6, 7</p>
<p>OS: CentOS 7</p>
</li><li>
<p>Puppet 3.x</p>
<p>Puppet 5.x</p>
</li></ul>
<h3 id="label-Tests">Tests</h3>
@@ -404,8 +368,7 @@ with PuppetDB (see tests/UTF_Files)</p>
<p>ConfDroid as entity is entirely independent from Puppet. We provide custom
configuration modules, written for specific purposes and specific
environments.
The modules are tested and supported only as documented, and
environments. The modules are tested and supported only as documented, and
require testing in designated environments (i.e. lab or development
environments) for parameter tuning etc. before deploying into production
environments.</p>