mirror of
https://github.com/opinkerfi/nagios-plugins.git
synced 2026-02-13 02:20:57 +01:00
Compare commits
12 Commits
nagios-okp
...
1.0.0-1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
3501677f20 | ||
|
|
6726f614ad | ||
|
|
ee5adc2363 | ||
|
|
7dc3b57582 | ||
|
|
688e8b8412 | ||
|
|
1ccc433779 | ||
|
|
ee05a4f24a | ||
|
|
871c8348fa | ||
|
|
944d47e18e | ||
|
|
40ba14c4cb | ||
|
|
f986b73474 | ||
|
|
c8e7fbbff8 |
@@ -324,7 +324,7 @@ if($opt_f) {
|
||||
if(defined($alldisks{$f})) {
|
||||
$checkdisks{$f}=$alldisks{$f};
|
||||
}
|
||||
} elsif ($f =~ /([\/\w\d]+)\:(\w+)\:(\w+)/) {
|
||||
} elsif ($f =~ /^(.+?)\:(\w+)\:(\w+)/) {
|
||||
if(defined($alldisks{$1})) {
|
||||
$checkdisks{$1}=$alldisks{$1};
|
||||
updateRates($1,$2,$3,$checkdisks{$1}->{somme});
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
Summary: A Nagios plugin to check disks via NRPE
|
||||
Name: nagios-okplugin-check_disks
|
||||
Version: 1.0.6
|
||||
Version: 1.0.7
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Group: Applications/System
|
||||
@@ -40,6 +40,10 @@ rm -rf %{buildroot}
|
||||
%{_libdir}/nagios/plugins/check_disks.pl
|
||||
|
||||
%changelog
|
||||
* Wed Oct 29 2014 Tomas Edwardsson <tommi@tommi.org> 1.0.7-1
|
||||
- Fix invalid regex if mountpoint has . in path (tommi@tommi.org)
|
||||
- Regex filtering broke disk checks (tommi@tommi.org)
|
||||
|
||||
* Tue Mar 25 2014 Tomas Edwardsson <tommi@tommi.org> 1.0.6-1
|
||||
- Bumped version
|
||||
|
||||
|
||||
23
check_firewall_active/check_firewall_active.sh
Executable file
23
check_firewall_active/check_firewall_active.sh
Executable file
@@ -0,0 +1,23 @@
|
||||
#!/bin/bash
|
||||
|
||||
EXIT_OK=0
|
||||
EXIT_WARN=1
|
||||
EXIT_CRIT=2
|
||||
|
||||
PATH=/sbin:/usr/sbin:$PATH
|
||||
|
||||
if [ "$(id -u)" != "0" ]; then
|
||||
echo "This script must be run as root" 1>&2
|
||||
exit $EXIT_CRIT
|
||||
fi
|
||||
|
||||
blocks=$(iptables -L -v -n | egrep 'REJECT|DROP' | wc -l)
|
||||
|
||||
if [ $blocks -eq 0 ]; then
|
||||
echo "CRITICAL: No firewall detected"
|
||||
exit $EXIT_CRIT
|
||||
fi
|
||||
|
||||
echo "OK: Firewall is active"
|
||||
exit $EXIT_OK
|
||||
|
||||
@@ -0,0 +1,50 @@
|
||||
%define debug_package %{nil}
|
||||
|
||||
Summary: A Nagios plugin to check if iptables are actually enforcing rules
|
||||
Name: nagios-okplugin-check_firewall_active
|
||||
Version: 1.0.0
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Group: Applications/System
|
||||
URL: https://github.com/opinkerfi/nagios-plugins/issues
|
||||
Source0: http://opensource.ok.is/trac/browser/nagios-plugins/check_firewall_active/releases/nagios-okplugin-check_firewall_active-%{version}.tar.gz
|
||||
Requires: nagios-nrpe
|
||||
Requires: iptables
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||
Packager: Richard Allen <ra@ok.is>
|
||||
|
||||
|
||||
|
||||
%description
|
||||
A Nagios plugin to check if iptables are actually enforcing rules
|
||||
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
#perl -pi -e "s|/usr/lib64|%{_libdir}|g" nrpe.d/check_firewall_active.cfg
|
||||
|
||||
%build
|
||||
|
||||
|
||||
%install
|
||||
rm -rf %{buildroot}
|
||||
install -D -p -m 0755 check_firewall_active.sh %{buildroot}%{_libdir}/nagios/plugins/check_firewall_active.sh
|
||||
install -D -p -m 0755 nrpe.d/check_firewall_active.cfg %{buildroot}/etc/nrpe.d/check_firewall_active.cfg
|
||||
install -D -p -m 0644 sudoers.d/check_firewall_active %{buildroot}/etc/sudoers.d/check_firewall_active
|
||||
|
||||
%clean
|
||||
rm -rf %{buildroot}
|
||||
|
||||
%files
|
||||
%defattr(-,root,root,-)
|
||||
#%doc README LICENSE
|
||||
%{_libdir}/nagios/plugins/*
|
||||
/etc/nrpe.d/check_firewall_active.cfg
|
||||
/etc/sudoers.d/check_firewall_active
|
||||
|
||||
%post
|
||||
restorecon -v %{_libdir}/nagios/plugins/check_firewall_active.sh /etc/nrpe.d/check_firewall_active.cfg /etc/sudoers.d/check_firewall_active
|
||||
|
||||
%changelog
|
||||
* Thu Dec 20 2016 Richard Allen <ra@ok.is> 0.1-1
|
||||
- Initial packaging
|
||||
3
check_firewall_active/nrpe.d/check_firewall_active.cfg
Normal file
3
check_firewall_active/nrpe.d/check_firewall_active.cfg
Normal file
@@ -0,0 +1,3 @@
|
||||
|
||||
|
||||
command[check_firewall_active]=sudo /usr/lib64/nagios/plugins/check_firewall_active.sh
|
||||
2
check_firewall_active/sudoers.d/check_firewall_active
Normal file
2
check_firewall_active/sudoers.d/check_firewall_active
Normal file
@@ -0,0 +1,2 @@
|
||||
Defaults:nrpe !requiretty
|
||||
nrpe ALL = (root) NOPASSWD: /usr/lib64/nagios/plugins/check_firewall_active.sh
|
||||
@@ -274,6 +274,9 @@ def check_logicaldisks():
|
||||
ld_status = check(i, 'Status')
|
||||
status = max(status, ld_status)
|
||||
|
||||
if i.get('Status') == 'Failed':
|
||||
status = max(status, critical)
|
||||
|
||||
mount_point = i['Mount Points']
|
||||
add_long("- %s (%s) = %s" % (i['name'], mount_point, state[ld_status]))
|
||||
add_summary(". ")
|
||||
|
||||
@@ -81,7 +81,7 @@ check_raid()
|
||||
{
|
||||
raid_ok=`cat $TEMPFILE |grep -i ok|wc -l`
|
||||
raid_warning=`cat $TEMPFILE|grep -i -E 'rebuild|predictive' |wc -l`
|
||||
raid_critical_1=`cat $TEMPFILE|grep -i 'failed|recovery' | wc -l`
|
||||
raid_critical_1=`cat $TEMPFILE|grep -i -E 'failed|recovery' | wc -l`
|
||||
|
||||
err_check=`expr $raid_ok + $raid_warning + $raid_critical_1 `
|
||||
|
||||
@@ -133,7 +133,7 @@ case "$1" in
|
||||
exit 0
|
||||
;;
|
||||
--all)
|
||||
controllers=`sudo -u root hpacucli controller all show | sed 's/.*Slot \([0-9]*\).*/\1/'`
|
||||
controllers=`sudo -u root $HPACUCLI controller all show | sed 's/.*Slot \([0-9]*\).*/\1/'`
|
||||
for i in $controllers ; do sudo -u root $HPACUCLI controller slot=$i pd all show status;done > $TEMPFILE
|
||||
check_raid
|
||||
;;
|
||||
|
||||
@@ -46,10 +46,13 @@ except Exception, e:
|
||||
# Loop through replication agreements
|
||||
for rhost in replication:
|
||||
plugin.add_summary("Replica %s Status: %s" % (rhost[1]['nsDS5ReplicaHost'][0], rhost[1]['nsds5replicaLastUpdateStatus'][0]))
|
||||
if rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] != "0 ":
|
||||
plugin.status(critical)
|
||||
else:
|
||||
if rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] == "0 ":
|
||||
plugin.status(ok)
|
||||
elif rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] == "1 ":
|
||||
# Busy Replica is not an error, its "unknown" (but its "ok" for now)
|
||||
plugin.status(ok)
|
||||
else:
|
||||
plugin.status(critical)
|
||||
|
||||
if not len(replication):
|
||||
plugin.add_summary("Warning: No replicas found")
|
||||
|
||||
@@ -74,17 +74,17 @@ OUTPUT=`$CHECK_COMMAND`
|
||||
RESULT=$?
|
||||
|
||||
if [ $RESULT -gt 0 ]; then
|
||||
echo "Error - Could not run command $CHECK_COMMAND"
|
||||
echo "Error was: $OUTPUT"
|
||||
echo "UNKNOWN - Could not run command $CHECK_COMMAND"
|
||||
echo "Error was: $OUTPUT"
|
||||
exit 3
|
||||
fi
|
||||
|
||||
# Parse the output from the command
|
||||
if [ "$OUTPUT" == "$STATUS" ]; then
|
||||
echo "ok, selinux status is $OUTPUT"
|
||||
echo "OK - SELinux status is $OUTPUT"
|
||||
exit 0
|
||||
else
|
||||
echo "warning, selinux status is $OUTPUT (supposed to be $STATUS)"
|
||||
echo "WARNING - SELinux status is $OUTPUT (supposed to be $STATUS)"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
|
||||
@@ -1 +1 @@
|
||||
1.0.6-1 check_disks.pl/
|
||||
1.0.7-1 check_disks.pl/
|
||||
|
||||
Reference in New Issue
Block a user