Files
confdroid_nrpe/doc/file.README.html

352 lines
12 KiB
HTML
Raw Normal View History

2017-07-28 15:36:18 +02:00
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>
File: README
&mdash; Documentation by YARD 0.9.9
</title>
<link rel="stylesheet" href="css/style.css" type="text/css" charset="utf-8" />
<link rel="stylesheet" href="css/common.css" type="text/css" charset="utf-8" />
<script type="text/javascript" charset="utf-8">
pathId = "";
relpath = '';
</script>
<script type="text/javascript" charset="utf-8" src="js/jquery.js"></script>
<script type="text/javascript" charset="utf-8" src="js/app.js"></script>
</head>
<body>
<div class="nav_wrap">
<iframe id="nav" src="file_list.html?1"></iframe>
<div id="resizer"></div>
</div>
<div id="main" tabindex="-1">
<div id="header">
<div id="menu">
<a href="_index.html">Index</a> &raquo;
<span class="title">File: README</span>
</div>
<div id="search">
<a class="full_list_link" id="puppet_class_list_link"
href="puppet_class_list.html">
<svg width="24" height="24">
<rect x="0" y="4" width="24" height="4" rx="1" ry="1"></rect>
<rect x="0" y="12" width="24" height="4" rx="1" ry="1"></rect>
<rect x="0" y="20" width="24" height="4" rx="1" ry="1"></rect>
</svg>
</a>
</div>
<div class="clear"></div>
</div>
<div id="content"><div id='filecontents'>
<p>|Repo Name| version | Build
Status|
|---|---|---|---|
2017-07-30 13:32:22 +02:00
|<code>cd_nrpe</code>| 0.0.0.2 | <a
2017-07-28 15:36:18 +02:00
href="https://jenkins.confdroid.com/buildStatus/icon?job=cd_nrpe">{Build
Status</a>/]|</p>
<h3 id="label-Synopsis">Synopsis</h3>
<p>NRPE allows monitoring tools like NAGIOS or ICINGA to connect to clients
for monitoring purposes.</p>
<p><code>cd_nrpe</code> is a fully parameterized Puppet module to automate
NRPE installation and configuration.</p>
<h3 id="label-WARNING">WARNING</h3>
<p><code>**__!!! Attention: Never use this puppet module on systems which have
been previously configured manually. It is impossible to predict how and
what would have been configured, hence previuos configurations outside the
scope of this module may be overwritten! Automated configurations require a
test environment to verify that the module suits the purpose intended by
the user, as well as tune the parameters, before deploying into live
production!!! __**</code></p>
<h3 id="label-Table+of+Contents">Table of Contents</h3>
<ul><li>
<p><a href="#features">Features</a></p>
</li><li>
<p><a
href="https://gitlab.puppetsoft.com/12WW1160/cd_nrpe/blob/master/REPOSTRUCTURE.md">Repo
Structure</a></p>
</li><li>
<p><a href="#dependencies">Dependencies</a></p>
</li><li>
<p><a href="#deployment">Deployment</a></p>
</li><li>
<p><a href="#native-puppet-deployment">native Puppet deployment</a></p>
</li><li>
<p><a href="#through-foreman">through Foreman</a></p>
</li><li>
<p><a href="#parameters">Parameters</a></p>
</li><li>
2017-07-30 13:32:22 +02:00
<p><a href="#managing-check-commands">Managing Check Commands</a></p>
</li><li>
2017-07-28 15:36:18 +02:00
<p><a href="#selinux">SELINUX</a></p>
</li><li>
<p><a href="#known-problems">Known Problems</a></p>
</li><li>
<p><a href="#support">Support</a></p>
</li><li>
<p><a href="#tests">Tests</a></p>
</li><li>
<p><a
href="https://gitlab.puppetsoft.com/12WW1160/cd_nrpe/blob/master/CHANGELOG.md">Changelog</a></p>
</li><li>
<p><a href="https://confdroid.com/contact/">Contact Us</a></p>
</li><li>
<p><a href="#disclaimer">Disclaimer</a></p>
</li></ul>
<h3 id="label-Features">Features</h3>
<p>INSTALLATION
2017-07-28 17:58:08 +02:00
* install nrpe binaries</p>
2017-07-28 15:36:18 +02:00
<p>CONFIGURATION
2017-07-28 17:58:08 +02:00
* manage NRPE service user properties
* manage directory
2017-07-28 18:54:36 +02:00
structure (file system permissions, selinux context) through parameters
*
manage configuration files through parameters:
* nrpe.conf
* nrpe.cfg
2017-07-30 16:03:58 +02:00
*
manage sudo role for nagios user on NRPE clients
* manage dynamic NRPE
check command definitions
* manage iptables (optional)
* manage selinux
rule exceptions (optional)</p>
2017-07-28 15:36:18 +02:00
2017-07-28 18:54:36 +02:00
<p>SERVICE
* manage NRPE service</p>
2017-07-28 15:36:18 +02:00
<h3 id="label-Repo+Structure">Repo Structure</h3>
<p>Repostructure has moved to REPOSTRUCTURE.md in repo.</p>
<h3 id="label-Dependencies">Dependencies</h3>
<p>All dependencies must be included in the catalogue.</p>
<ul><li>
<p><a
href="https://gitlab.puppetsoft.com/12WW1160/cd_resources">cd_resources</a>
to manage YUM repositories.</p>
2017-07-28 17:58:08 +02:00
</li><li>
2017-07-28 18:54:36 +02:00
<p><a
href="https://gitlab.puppetsoft.com/12WW1160/cd_firewall">cd_firewall</a>
or <a href="https://github.com/puppetlabs/puppetlabs-firewall">puppetlabs
firewall</a> to manage iptables</p>
</li><li>
2017-07-28 17:58:08 +02:00
<p><a href="https://gitlab.puppetsoft.com/12WW1160/cd_stdlib">cd_stdlib</a> or
<a href="https://github.com/puppetlabs/puppetlabs-stdlib">puppetlabs
stdlib</a> to facilitate concat</p>
</li><li>
<p><a href="https://gitlab.puppetsoft.com/12WW1160/cd_stdlib">cd_concat</a> or
<a href="https://github.com/puppetlabs/puppetlabs-concat">puppetlabs
concat</a> for concatenating files</p>
2017-07-28 15:36:18 +02:00
</li></ul>
<h3 id="label-Deployment">Deployment</h3>
2017-07-28 17:58:08 +02:00
<p><code>cd_nrpe</code> does typically not need to be specifically declared.
It will be auto-required by <code>cd_nagios</code> with default settings.
Only if you want to override settings declare it specifically.</p>
2017-07-28 15:36:18 +02:00
<h5 id="label-native+Puppet+deployment">native Puppet deployment</h5>
<p>via site.pp or nodes.pp</p>
<pre class="code ruby"><code class="ruby">node &#39;example.example.net&#39; {
include cd_puppetdb
}</code></pre>
<h4 id="label-through+Foreman%3A">through Foreman:</h4>
<p>In order to apply parameters through Foreman,
<strong>cd_nrpe::params</strong> must be added to the host or hostgroup in
2017-07-28 17:58:08 +02:00
question, unless the defaults are fully acceptable across the estate.</p>
2017-07-28 15:36:18 +02:00
<p>See <a
href="https://confdroid.com/2017/05/deploying-our-puppet-modules/">more
details about class deployment on Confdroid.com</a>.</p>
<h3 id="label-Parameters">Parameters</h3>
<p>The following parameters are editable via params.pp or through ENC
(<strong>recommended</strong>). Values changed will take immediate effect
2017-07-30 13:42:02 +02:00
at next puppet run. Services will be restarted where neccessary. If you
want to override parameters, the <a href="#through-foreman">module must be
specifically declared to hosts when using ENC</a>.</p>
2017-07-28 15:36:18 +02:00
2017-07-30 13:32:22 +02:00
<h3 id="label-Mandatory+Parameters">Mandatory Parameters</h3>
<p>There are currently no mandatory parameters, i.e. the module will function
right out of box as is.</p>
<h3 id="label-Optional+Parameters">Optional Parameters</h3>
<ul><li>
<p><code>$ne_manage_cmds</code> : Whether to manage check command definitions
dynamically through a define, i.e. from other Puppet modules or profiles.
Defaults to <code>true</code>.</p>
</li><li>
<p><code>$ne_incl_fw</code> : Whether to manage relevant firewall rules
through this modules. Defaults to <code>true</code>.</p>
</li><li>
<p><code>$ne_include_selinux</code> : Whether to manage selinux exception
rules. Defaults to <code>true</code>.</p>
2017-07-30 16:03:58 +02:00
</li><li>
<p><code>$ne_enable_ssl</code> : Whether to allow SSL settings. See <a
href="#konwn-problems">known problems</a> for more details.</p>
2017-07-30 18:58:35 +02:00
</li><li>
<p><code>$ne_allow_sudo : Whether to allow the nagios / nrpe user to
use sudo by default. Controls both the
setting</code>command_prefix<code>and application of a sudo rule. Defaults
to</code>false` as it usually is not required for most of the checks.</p>
2017-07-30 13:32:22 +02:00
</li></ul>
<h3 id="label-Managing+Check+Commands">Managing Check Commands</h3>
2017-07-30 13:50:48 +02:00
<p>In order to connect a Nagios monitoring server to clients through NRPE, you
2017-07-30 14:07:49 +02:00
must define commands and the desired argument strings on the clients. The
default NRPE installation comes with a few examples of such commands, which
are also included in this module. However, every environment is very
different in their requirements and Nagios via Puppet is all about the
ability to dynamicically set command arguments based on default variables /
overrides. For that reason no hard-coded commands are included, but instead
all commands are set via argument strings, where possible.</p>
2017-07-30 16:03:58 +02:00
<p>The commands are created within /etc/nrpe.d/command.cfg , every set of
instructions creates a new line.</p>
2017-07-30 14:07:49 +02:00
<p>Defining commands is as simple as
that:
&lt;code&gt;
`cd_nrpe::commands::definitions` {
&#39;check_users&#39;:
`ne_check_cmd` =&gt;
&#39;check_users&#39;,
`ne_cmd_argstring` =&gt; &#39;-w $ARG1$ -c
$ARG2$&#39;,
}
&lt;/code&gt;
It is very recommendable to define such
commands within Puppet modules controlling services, so any node running
the particular service will automatically get the required check commands
2017-07-30 16:03:58 +02:00
defined as well, while nodes not running the service also do not contain
the command check.</p>
2017-07-30 13:50:48 +02:00
2017-07-28 15:36:18 +02:00
<h3 id="label-SELINUX">SELINUX</h3>
<p>All files and directories are configured with correct selinux context. If
selinux is disabled, these contexts are ignored.</p>
<h3 id="label-Known+Problems">Known Problems</h3>
2017-07-30 16:03:58 +02:00
<ul><li>
<p>SSL/TLS support: Version 3 of NRPE supposedly has support for SSL/ TLs.
However, at the time of writing this module, this seems to be buggy, as I
was unable to start the NRPE service as soon as the
<code>ssl_cert_file</code> line was uncommented in teh configuration file,
despite having valid certs in the right position on the node. This happened
when installing manually, not through this Puppet module. For that reason I
included the <code>$ne_enable_ssl</code> boolean parameter, which is set to
<code>false</code> by default, hence disabling SSL/TLS options until this
has been fixed upstream, or a valid workaround has been found. Setting this
option to <code>true</code> will include all SSL / TLS settings.</p>
</li></ul>
2017-07-28 15:36:18 +02:00
2017-07-30 20:06:28 +02:00
<h3 id="label-Troubleshooting">Troubleshooting</h3>
<ul><li>
<p><code>CHECH_NRPE: Unable to read output</code>: Nagios sudo access also
needs Selinux to allow this. Default settings in this module take care for
both through <code>$ne_allow_sudo</code> and
<code>$ne_include_selinux</code>.</p>
</li><li>
<p><code>CHECK_NRPE: Receive header underflow - only 0 bytes received (4
expected): This is down to the new illegal meta characters feature
via</code>nasty_metachars`.</p>
</li></ul>
2017-07-28 15:36:18 +02:00
<h3 id="label-Support">Support</h3>
<ul><li>
<p>OS: CentOS 6, 7</p>
</li><li>
<p>Puppet 3.x</p>
</li></ul>
<h3 id="label-Tests">Tests</h3>
<ul><li>
<p>Puppet Lint</p>
</li><li>
<p>excluded tests:</p>
<ul><li>
<p><code>--no-class_inherits_from_params_class-check</code>:relavant only to
non-supported outdated puppet versions</p>
</li><li>
<p><code>--no-variable_scope-check</code>: not applicable as we are inheriting
parameters from params class. the lint check does not distinguish between
facts and inherited parameters.</p>
</li><li>
<p><code>--no-80chars-check</code>: it is not always possible to stay within
80 characters, although typically only occurring on the parameter vault
<code>params.pp</code>.</p>
</li><li>
<p><code>--no-arrow_alignment-check</code>: this check leads to actually not
having am easily readable arrow alignment, as this checks <code>per
block</code>, not per class.</p>
</li></ul>
</li><li>
<p>Puppet Parser</p>
</li><li>
<p>ERB Template Parser</p>
</li><li>
<p>Test for unwanted UTF8 files in the Puppet code as this causes problems
with PuppetDB (see tests/UTF_Files)</p>
<h3 id="label-Contact+Us">Contact Us</h3>
<p><a href="https://confdroid.com/contact/">contact Us</a></p>
</li></ul>
<h3 id="label-Disclaimer">Disclaimer</h3>
<p>ConfDroid as entity is entirely independent from Puppet. We provide custom
configuration modules, written for specific purposes and specific
environments.
The modules are tested and supported only as documented, and
require testing in designated environments (i.e. lab or development
environments) for parameter tuning etc. before deploying into production
environments.</p>
</div></div>
<div id="footer">
2017-07-30 20:06:28 +02:00
Generated on Sun Jul 30 20:06:24 2017 by
2017-07-28 15:36:18 +02:00
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>
</div>
</body>
</html>