mirror of
https://github.com/opinkerfi/nagios-plugins.git
synced 2026-02-13 02:20:57 +01:00
Compare commits
30 Commits
nagios-okp
...
travis_ci_
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6c344fe7e8 | ||
|
|
090c4ed475 | ||
|
|
3733ab15ed | ||
|
|
a50eb30511 | ||
|
|
662532ff1f | ||
|
|
ef4b65a81b | ||
|
|
484e5c3c71 | ||
|
|
d661046464 | ||
|
|
2a2c3f7dff | ||
|
|
802a8a138e | ||
|
|
365576221a | ||
|
|
51c659990b | ||
|
|
343c42339f | ||
|
|
8f89f773e3 | ||
|
|
24518a74e7 | ||
|
|
cdc1daad6d | ||
|
|
c40bee725a | ||
|
|
892f9c267e | ||
|
|
3501677f20 | ||
|
|
6726f614ad | ||
|
|
ee5adc2363 | ||
|
|
7dc3b57582 | ||
|
|
688e8b8412 | ||
|
|
1ccc433779 | ||
|
|
ee05a4f24a | ||
|
|
871c8348fa | ||
|
|
944d47e18e | ||
|
|
40ba14c4cb | ||
|
|
f986b73474 | ||
|
|
c8e7fbbff8 |
47
.travis.yml
Normal file
47
.travis.yml
Normal file
@@ -0,0 +1,47 @@
|
||||
#sudo: required
|
||||
#env:
|
||||
# matrix:
|
||||
# - OS_TYPE=centos OS_VERSION=6
|
||||
# - OS_TYPE=centos OS_VERSION=7
|
||||
#
|
||||
#services:
|
||||
# - docker
|
||||
#
|
||||
#before_install:
|
||||
# - sudo apt-get update
|
||||
# - echo 'DOCKER_OPTS="-H tcp://127.0.0.1:2375 -H unix:///var/run/docker.sock -s devicemapper"' | sudo tee /etc/default/docker > /dev/null
|
||||
# - sudo service docker restart
|
||||
# - sleep 5
|
||||
# - sudo docker pull centos:centos${OS_VERSION}
|
||||
#
|
||||
#
|
||||
#script:
|
||||
# # Run tests in Container
|
||||
# - tests/setup_tests.sh ${OS_VERSION}
|
||||
#
|
||||
sudo: required
|
||||
language: python
|
||||
|
||||
env:
|
||||
global:
|
||||
- DOCKER_IMAGE=alectolytic/rpmbuilder
|
||||
- COPR_REPOSITORY=opinkerfi/nagios-plugins
|
||||
- OS_ARCH=x86_64
|
||||
matrix:
|
||||
# - OS_TYPE=fedora OS_DIST=fedora OS_VERSION=24
|
||||
- OS_TYPE=centos OS_DIST=epel OS_VERSION=7
|
||||
|
||||
services:
|
||||
- docker
|
||||
|
||||
install: true
|
||||
|
||||
script:
|
||||
- docker run -v ${PWD}/check_firewall_active:/sources -v ${PWD}:/output:Z -e "SRPM_ONLY=1" ${DOCKER_IMAGE}:${OS_TYPE}-${OS_VERSION}
|
||||
# - docker run -v ${PWD}/check_firewall_active:/sources:ro -v ${PWD}:/output:rw -v ${PWD}/workspace:/workspace:rw -v ${PWD}/rpmbuild:/rpmbuild:rw -e "SRPM_ONLY=1" ${DOCKER_IMAGE}:${OS_TYPE}-${OS_VERSION}
|
||||
|
||||
after_success:
|
||||
- pip install copr-cli simplejson
|
||||
- openssl aes-256-cbc -K $encrypted_f965aefb5778_key -iv $encrypted_f965aefb5778_iv -in .copr.enc -out .copr -d
|
||||
- if [ ! -z "${TRAVIS_TAG}" ]; then copr-cli --config .copr build -r ${OS_DIST}-${OS_VERSION}-${OS_ARCH} ${COPR_REPOSITORY} *.src.rpm; fi
|
||||
|
||||
@@ -324,7 +324,7 @@ if($opt_f) {
|
||||
if(defined($alldisks{$f})) {
|
||||
$checkdisks{$f}=$alldisks{$f};
|
||||
}
|
||||
} elsif ($f =~ /([\/\w\d]+)\:(\w+)\:(\w+)/) {
|
||||
} elsif ($f =~ /^(.+?)\:(\w+)\:(\w+)/) {
|
||||
if(defined($alldisks{$1})) {
|
||||
$checkdisks{$1}=$alldisks{$1};
|
||||
updateRates($1,$2,$3,$checkdisks{$1}->{somme});
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
Summary: A Nagios plugin to check disks via NRPE
|
||||
Name: nagios-okplugin-check_disks
|
||||
Version: 1.0.6
|
||||
Version: 1.0.7
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Group: Applications/System
|
||||
@@ -40,6 +40,10 @@ rm -rf %{buildroot}
|
||||
%{_libdir}/nagios/plugins/check_disks.pl
|
||||
|
||||
%changelog
|
||||
* Wed Oct 29 2014 Tomas Edwardsson <tommi@tommi.org> 1.0.7-1
|
||||
- Fix invalid regex if mountpoint has . in path (tommi@tommi.org)
|
||||
- Regex filtering broke disk checks (tommi@tommi.org)
|
||||
|
||||
* Tue Mar 25 2014 Tomas Edwardsson <tommi@tommi.org> 1.0.6-1
|
||||
- Bumped version
|
||||
|
||||
|
||||
23
check_firewall_active/check_firewall_active.sh
Executable file
23
check_firewall_active/check_firewall_active.sh
Executable file
@@ -0,0 +1,23 @@
|
||||
#!/bin/bash
|
||||
|
||||
EXIT_OK=0
|
||||
EXIT_WARN=1
|
||||
EXIT_CRIT=2
|
||||
|
||||
PATH=/sbin:/usr/sbin:$PATH
|
||||
|
||||
if [ "$(id -u)" != "0" ]; then
|
||||
echo "This script must be run as root" 1>&2
|
||||
exit $EXIT_CRIT
|
||||
fi
|
||||
|
||||
blocks=$(iptables -L -v -n | egrep 'REJECT|DROP' | wc -l)
|
||||
|
||||
if [ $blocks -eq 0 ]; then
|
||||
echo "CRITICAL: No firewall detected"
|
||||
exit $EXIT_CRIT
|
||||
fi
|
||||
|
||||
echo "OK: Firewall is active"
|
||||
exit $EXIT_OK
|
||||
|
||||
@@ -0,0 +1,52 @@
|
||||
%define debug_package %{nil}
|
||||
|
||||
Summary: A Nagios plugin to check if iptables are actually enforcing rules
|
||||
Name: nagios-okplugin-check_firewall_active
|
||||
Version: 1.0.2
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Group: Applications/System
|
||||
URL: https://github.com/opinkerfi/nagios-plugins/issues
|
||||
Source0: http://opensource.ok.is/trac/browser/nagios-plugins/check_firewall_active/releases/nagios-okplugin-check_firewall_active-%{version}.tar.gz
|
||||
Requires: nagios-nrpe
|
||||
Requires: iptables
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||
Packager: Richard Allen <ra@ok.is>
|
||||
|
||||
|
||||
|
||||
%description
|
||||
A Nagios plugin to check if iptables are actually enforcing rules
|
||||
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
#perl -pi -e "s|/usr/lib64|%{_libdir}|g" nrpe.d/check_firewall_active.cfg
|
||||
|
||||
%build
|
||||
|
||||
|
||||
%install
|
||||
rm -rf %{buildroot}
|
||||
install -D -p -m 0755 check_firewall_active.sh %{buildroot}%{_libdir}/nagios/plugins/check_firewall_active.sh
|
||||
install -D -p -m 0755 nrpe.d/check_firewall_active.cfg %{buildroot}/etc/nrpe.d/check_firewall_active.cfg
|
||||
install -D -p -m 0644 sudoers.d/check_firewall_active %{buildroot}/etc/sudoers.d/check_firewall_active
|
||||
|
||||
%clean
|
||||
rm -rf %{buildroot}
|
||||
|
||||
%files
|
||||
%defattr(-,root,root,-)
|
||||
#%doc README LICENSE
|
||||
%{_libdir}/nagios/plugins/*
|
||||
/etc/nrpe.d/check_firewall_active.cfg
|
||||
/etc/sudoers.d/check_firewall_active
|
||||
|
||||
%post
|
||||
restorecon -v %{_libdir}/nagios/plugins/check_firewall_active.sh /etc/nrpe.d/check_firewall_active.cfg /etc/sudoers.d/check_firewall_active
|
||||
|
||||
%changelog
|
||||
* Thu Dec 21 2016 Gardar Thorsteinsson <gardart@gmail.com> 1.0.1-1
|
||||
* Thu Dec 21 2016 Gardar Thorsteinsson <gardart@gmail.com> 1.0.0-3
|
||||
* Thu Dec 20 2016 Richard Allen <ra@ok.is> 0.1-1
|
||||
- Initial packaging
|
||||
3
check_firewall_active/nrpe.d/check_firewall_active.cfg
Normal file
3
check_firewall_active/nrpe.d/check_firewall_active.cfg
Normal file
@@ -0,0 +1,3 @@
|
||||
|
||||
|
||||
command[check_firewall_active]=sudo /usr/lib64/nagios/plugins/check_firewall_active.sh
|
||||
2
check_firewall_active/sudoers.d/check_firewall_active
Normal file
2
check_firewall_active/sudoers.d/check_firewall_active
Normal file
@@ -0,0 +1,2 @@
|
||||
Defaults:nrpe !requiretty
|
||||
nrpe ALL = (root) NOPASSWD: /usr/lib64/nagios/plugins/check_firewall_active.sh
|
||||
@@ -274,6 +274,9 @@ def check_logicaldisks():
|
||||
ld_status = check(i, 'Status')
|
||||
status = max(status, ld_status)
|
||||
|
||||
if i.get('Status') == 'Failed':
|
||||
status = max(status, critical)
|
||||
|
||||
mount_point = i['Mount Points']
|
||||
add_long("- %s (%s) = %s" % (i['name'], mount_point, state[ld_status]))
|
||||
add_summary(". ")
|
||||
|
||||
@@ -81,7 +81,7 @@ check_raid()
|
||||
{
|
||||
raid_ok=`cat $TEMPFILE |grep -i ok|wc -l`
|
||||
raid_warning=`cat $TEMPFILE|grep -i -E 'rebuild|predictive' |wc -l`
|
||||
raid_critical_1=`cat $TEMPFILE|grep -i 'failed|recovery' | wc -l`
|
||||
raid_critical_1=`cat $TEMPFILE|grep -i -E 'failed|recovery' | wc -l`
|
||||
|
||||
err_check=`expr $raid_ok + $raid_warning + $raid_critical_1 `
|
||||
|
||||
@@ -133,7 +133,7 @@ case "$1" in
|
||||
exit 0
|
||||
;;
|
||||
--all)
|
||||
controllers=`sudo -u root hpacucli controller all show | sed 's/.*Slot \([0-9]*\).*/\1/'`
|
||||
controllers=`sudo -u root $HPACUCLI controller all show | sed 's/.*Slot \([0-9]*\).*/\1/'`
|
||||
for i in $controllers ; do sudo -u root $HPACUCLI controller slot=$i pd all show status;done > $TEMPFILE
|
||||
check_raid
|
||||
;;
|
||||
|
||||
@@ -46,10 +46,13 @@ except Exception, e:
|
||||
# Loop through replication agreements
|
||||
for rhost in replication:
|
||||
plugin.add_summary("Replica %s Status: %s" % (rhost[1]['nsDS5ReplicaHost'][0], rhost[1]['nsds5replicaLastUpdateStatus'][0]))
|
||||
if rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] != "0 ":
|
||||
plugin.status(critical)
|
||||
else:
|
||||
if rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] == "0 ":
|
||||
plugin.status(ok)
|
||||
elif rhost[1]['nsds5replicaLastUpdateStatus'][0][:2] == "1 ":
|
||||
# Busy Replica is not an error, its "unknown" (but its "ok" for now)
|
||||
plugin.status(ok)
|
||||
else:
|
||||
plugin.status(critical)
|
||||
|
||||
if not len(replication):
|
||||
plugin.add_summary("Warning: No replicas found")
|
||||
|
||||
@@ -48,9 +48,9 @@ print_help() {
|
||||
|
||||
echo "Add this to your sudoers file by running visudo to add access:"
|
||||
if [ -r /proc/modules ]; then
|
||||
echo "Cmnd_Alias MULTIPATH=$MULTIPATH -l"
|
||||
echo "Cmnd_Alias MULTIPATH=$MULTIPATH -ll"
|
||||
else
|
||||
echo "Cmnd_Alias MULTIPATH=$MULTIPATH -l, $SUDO"
|
||||
echo "Cmnd_Alias MULTIPATH=$MULTIPATH -ll, $SUDO"
|
||||
fi
|
||||
echo "nagios ALL= NOPASSWD: MULTIPATH"
|
||||
echo "The user nagios may very well be nobody or someone else depending on your configuration"
|
||||
@@ -98,7 +98,7 @@ if [ $(id -un) != "root" ]; then
|
||||
fi
|
||||
fi
|
||||
|
||||
OUTPUT=$($MULTIPATH -l 2>/dev/null)
|
||||
OUTPUT=$($MULTIPATH -ll 2>/dev/null)
|
||||
if [ $? != 0 ]; then
|
||||
# Failed. grab more info why
|
||||
if [ $(id -un) != "root" ] && [ `$SUDO -l | grep -c multipath` -eq 0 ]; then
|
||||
@@ -112,7 +112,7 @@ if [ $? != 0 ]; then
|
||||
exit $STATE_UNKNOWN
|
||||
fi
|
||||
|
||||
echo "MULTIPATH: $(MULTIPATH -l 2>&1)"
|
||||
echo "MULTIPATH: $($MULTIPATH -ll 2>&1)"
|
||||
exit $STATE_UNKNOWN
|
||||
fi
|
||||
|
||||
@@ -137,6 +137,7 @@ if [ "$NUMPATHS" ]; then
|
||||
/^ \\/ {targets++; next} # count targets (lenny)
|
||||
/[0-9]+:[0-9]+:[0-9]+:[0-9]+/ {
|
||||
if (/active undef running/) { targets++ } # count targets (squeeze)
|
||||
if (/active ready running/) { targets++ } # count targets (RHEL6)
|
||||
next
|
||||
}
|
||||
{
|
||||
|
||||
@@ -74,17 +74,17 @@ OUTPUT=`$CHECK_COMMAND`
|
||||
RESULT=$?
|
||||
|
||||
if [ $RESULT -gt 0 ]; then
|
||||
echo "Error - Could not run command $CHECK_COMMAND"
|
||||
echo "Error was: $OUTPUT"
|
||||
echo "UNKNOWN - Could not run command $CHECK_COMMAND"
|
||||
echo "Error was: $OUTPUT"
|
||||
exit 3
|
||||
fi
|
||||
|
||||
# Parse the output from the command
|
||||
if [ "$OUTPUT" == "$STATUS" ]; then
|
||||
echo "ok, selinux status is $OUTPUT"
|
||||
echo "OK - SELinux status is $OUTPUT"
|
||||
exit 0
|
||||
else
|
||||
echo "warning, selinux status is $OUTPUT (supposed to be $STATUS)"
|
||||
echo "WARNING - SELinux status is $OUTPUT (supposed to be $STATUS)"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
|
||||
0
output/.gitkeep
Normal file
0
output/.gitkeep
Normal file
@@ -1 +1 @@
|
||||
1.0.6-1 check_disks.pl/
|
||||
1.0.7-1 check_disks.pl/
|
||||
|
||||
0
rpmbuild/.gitkeep
Normal file
0
rpmbuild/.gitkeep
Normal file
24
tests/setup_tests.sh
Executable file
24
tests/setup_tests.sh
Executable file
@@ -0,0 +1,24 @@
|
||||
#!/bin/sh -xe
|
||||
|
||||
# This script starts docker and systemd (if el7)
|
||||
|
||||
# Version of CentOS/RHEL
|
||||
el_version=$1
|
||||
|
||||
# Run tests in Container
|
||||
if [ "$el_version" = "6" ]; then
|
||||
|
||||
sudo docker run --rm=true -v `pwd`:/nagios-plugins:rw centos:centos${OS_VERSION} /bin/bash -c "bash -xe /nagios-plugins/tests/test_inside_docker.sh ${OS_VERSION}"
|
||||
|
||||
elif [ "$el_version" = "7" ]; then
|
||||
|
||||
docker run --privileged -d -ti -e "container=docker" -v /sys/fs/cgroup:/sys/fs/cgroup -v `pwd`:/nagios-plugins:rw centos:centos${OS_VERSION} /usr/sbin/init
|
||||
DOCKER_CONTAINER_ID=$(docker ps | grep centos | awk '{print $1}')
|
||||
docker logs $DOCKER_CONTAINER_ID
|
||||
docker exec -ti $DOCKER_CONTAINER_ID /bin/bash -xec "bash -xe /nagios-plugins/tests/test_inside_docker.sh ${OS_VERSION};
|
||||
echo -ne \"------\nEND NAGIOS-PLUGINS TESTS\n\";"
|
||||
docker ps -a
|
||||
docker stop $DOCKER_CONTAINER_ID
|
||||
docker rm -v $DOCKER_CONTAINER_ID
|
||||
|
||||
fi
|
||||
2
tests/test_inside_docker.sh
Executable file
2
tests/test_inside_docker.sh
Executable file
@@ -0,0 +1,2 @@
|
||||
echo "Keyrsla fyrir CentOS $1"
|
||||
ls -l /
|
||||
0
workspace/.gitkeep
Normal file
0
workspace/.gitkeep
Normal file
Reference in New Issue
Block a user