O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Nagios 3 Enterprise Network Monitoring

Book Description

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.
  • Complete Case Study Demonstrates how to Deploy Nagios Globally in an Enterprise Network
  • Monitor Third Party Hardware Devices with Nagios

Table of Contents

  1. Cover Image
  2. Table of Contents
  3. Title
  4. Copyright
  5. Authors
  6. Foreword
  7. Introduction
    1. A Brief History of Nagios
  8. Chapter 1. Nagios 3
    1. What’s New in Nagios 3?
    2. Backing up Your Nagios 2 Files
    3. Migrating from Nagios 2 to 3
  9. Chapter 2. Designing Configurations for Large Organizations
    1. Introduction
    2. Fault Management Configuration Best Practices
    3. Planning Your Configuration
    4. Nagios Configuration Object Relationship Diagrams
    5. Notification Rules and Output Formats
    6. On-Call Schedules
    7. Dependencies and Escalations
    8. Maximizing Templates
  10. Chapter 3. Scaling Nagios
    1. Scaling the GUI
    2. Limiting the View to Read-Only
    3. Multiple GUI Users (Users/Groups)
    4. Clustering
    5. Failover or Redundancy
    6. The Future
    7. CGI Front End
  11. Chapter 4. Plug-ins, Plug-ins, and More Plug-ins
    1. Introduction
    2. Plug-in Guidelines and Best Practices
    3. Software Services and Network Protocols
    4. Servers
    5. HTTP Scraping Plug-ins
    6. Testing Telnet-like Interfaces (Telnet or SSH)
    7. Monitoring LDAP
    8. Monitoring Databases
    9. Specialized Hardware
    10. Anti-Virus Devices
    11. Environmental Probes
    12. Summary
  12. Chapter 5. Add-ons and Enhancements
    1. Introduction
    2. Checking Private Services when SNMP Is Not Allowed
    3. Visualization
    4. PNP—PNP Not PerfParse
    5. Cacinda
    6. NLG—Nagios Looking Glass
    7. SNMP Trap Handling
    8. SNMPTT
    9. NagTrap
    10. Text-to-Speech for Nagios Alerts
    11. Summary
  13. Chapter 6. Enterprise Integration
    1. Introduction
    2. Nagios as a Monitor of Monitors
    3. LDAP Authentication
    4. Integration with Splunk
    5. Integrating with Third-Party Trend and Analysis Tools
    6. Multiple Administrators/ Configuration Writers
    7. Integration with Puppet
    8. Integration with Trouble Ticketing Systems
    9. Nagios in the NOC
    10. Summary
  14. Chapter 7. Intrusion Detection and Security Analysis
    1. Know Your Network
    2. Watching for Session Hijacking Attacks
    3. Nagios and Compliance
    4. Securing Nagios
    5. Summary
  15. Chapter 8. Case Study
    1. Case Study Overview
    2. ACME Enterprises Network: What’s under the Hood?
    3. ACME Enterprises Management and Staff: Who’s Running the Show?
    4. ACME Enterprises and Nagios: Rubber Meets the Road!
    5. Nagios Pre-Deployment Activities: What Are We Monitoring?
    6. Nagios Deployment Activities: Can You See Me?
    7. Enterprise and Remote Site Monitoring
    8. eHealth
    9. Host and Service Escalations, and Notifications
    10. Nagios Configuration Strategies
    11. Developer, Corporate, and IT Support Network Monitoring
    12. Select Advice for Integrating Nagios as the Enterprise Network Monitoring Solution
    13. Nagios Integration and Deployment
  16. Index