Configuring Nagios

Configuring Nagios

[Ref: OpenBSD 5.0, Nagios 3.3.1, Nagios Core 3.x Manuals]

Table of Contents

There are two parts to configuring Nagios:

Web Interface

The Nagios Graphical User Interface(GUI) is through a web system, and we’ll discuss configuring that using OpenBSD’s default Apache Web Server. Dependencies of the GUI include PHP and are normally installed together with the ports binary package.

If you have problems with the GUI, you may need to review the installation of the dependencies and whether there are configuration requirements that you not completed.

The files for the nagios web interface are installed in /var/www/nagios and /var/www/cgi-bin/nagios. To configure Apache to access the user-interface, we modify Apache’s configuration such as the following:

New File: /var/www/conf/modules.sample/nagios.conf

Alias /nagios/ "/var/www/nagios/"

<Directory "/var/www/nagios">
	SetEnv TZ "Pacific/Tongatapu"
	Options Indexes MultiViews
	Order allow,deny
	Allow from all

	AuthName "Nagios Access"
	AllowOverride None
	AuthType Basic
	AuthUserFile /var/www/etc/nagios/web.password.file
	Require valid-user	
</Directory>

ScriptAlias /cgi-bin/nagios "/var/www/cgi-bin/nagios"

<Directory "/var/www/cgi-bin/nagios">
	SSLRequireSSL
	Options ExecCGI
	Order allow,deny
	Allow from all
	
	AuthName "Nagios Access"
	AllowOverride None
	AuthType Basic
	AuthUserFile /var/www/etc/nagios/web.password.file
	Require valid-user
</Directory>
ln -s /var/www/conf/modules.sample/nagios.conf /var/www/conf/modules/nagios.conf

Because the GUI will expose some critical infrastructure, we’ll partially secure the system by locking it down to approved machines in the above Allow from 127.0.0.1. Add your IP-Address here so you can look at the GUI.

After making the above changes and restarting Apache, you should be able to view the base page (although no host status update/information will be functional yet.)

Securing Transport

To add more paranoia to securing our GUI Web interface, we’ll enable SSL for our nagios pages. Reviewing the OpenBSD/Apache configuration we find the ‘default’ file names for SSL Certificates.

# grep ^SSLCertificate /var/www/conf/httpd.conf
SSLCertificateFile    /etc/ssl/server.crt
SSLCertificateKeyFile /etc/ssl/private/server.key

Use OpenSSL to generate keys.

# /usr/sbin/openssl req -new -x509 -newkey rsa:4096 -days 3650 \
       -keyout /etc/ssl/private/server.key.protected \
	   -out /etc/ssl/server.crt
Generating a 4096 bit RSA private key
...  ++
writing new private key to '/etc/ssl/private/server.key.protected'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:

In OpenBSD, the above generates a private key that is pass phrase protected. To generate a key without the pass phrase, we run the below command.

# /usr/sbin/openssl rsa -in /etc/ssl/private/server.key.protected -out /etc/ssl/private/server.key
Enter pass phrase for /etc/ssl/private/server.key.protected:
writing RSA key

We can now use httpd_flags="-DSSL" in /etc/rc.conf.local to configure the startup for our website.

Re/Start Apache using -DSSL (e.g. httpd -DSSL), for example:

# apachectl stop
# httpd -DSSL

Our Nagios GUI is now available at https://nagios-host/nagios/, tightening up security access to the site.

Unfortunately, when you go there now you will again not be given access to data at the site, and you will get pages with:

	It appears as though you do not have permission to view information of ...

Web Interface User

[Ref: CGI Configuration File Options]

We want to configure at least one web user account to access the full features of the Graphical User Interface, from there you can decide on less featured web-accounts.

  • Specify the nagios web user account, access privileges
  • Create the web user account

The configuration file is specified in the nagios web file config.inc.php

grep cgi_config_file /var/www/nagios/config.inc.php
$cfg['cgi_config_file']='/etc/nagios/cgi.cfg'; // location of the CGI config file

The above reference is in the chrooted environment (because that’s the package we’ve installed, and the chroot base is /var/www

File: /var/www/etc/nagios/cgi.cfg

use_authentication=1
authorized_for_system_information=nagiosadmin, samt
authorized_for_configuration_information=nagiosadmin, samt
authorized_for_system_commands=nagiosadmin, samt
authorized_for_all_services=nagiosadmin, samt
authorized_for_all_hosts=nagiosadmin, samt
authorized_for_all_service_commands=nagiosadmin, samt
authorized_for_all_host_commands=nagiosadmin, samt

The above lists some of the access control directives where the default install posits a user-account nagiosadmin. cgi.cfg has descriptive comments to clarify the purpose of the above directives.

We need to specify a username/password that apache can authenticate (use_authentication=1) and pass to nagios.

htpasswd -c /var/www/etc/nagios/web.password.file samt
New password:
Re-type new password:
Adding password for user samt

We use “-c” at the first run to create the file, but then afterwards no longer need it (i.e. for any further users.)

Please read the cgi.cfg comments for descriptions of the access controls and specify your users.

Configuration

[Using Nagios to Monitor Networks]

After the basics for managing your Nagios configuration, we’ll set up two basic items, largely so we can see whether our installation is working. The more complicated nature of your network is left as your exercise.

Contact Details

We create contact details in Nagios, as separate from the GUI User Interface, to specify details of whom and how to contact people when Nagios detects various events relating to the Systems (hosts, and or services) we are monitoring.

A basic config is as below

File: /var/www/etc/nagios/objects/contacts.cfg

define contact{
    contact_name                    samt
	use                             generic-contact
    alias                           Samiuela Taufa
    email                           samt@example.com
    pager                           <my-mobile-number>
    }

define contact{
    contact_name                    fred
	use                             generic-contact
    alias                           Free Dom
    email                           fred@example.com
    pager                           <fred-mobile-number>
    }

generic-contact is a contact template (with register set to 0) defined in templates.cfg and gives us a “defined” set of contact settings, which we use as the foundation of all settings for our contact, and then refine with our above specific settings.

Now, unless you really are paranoid and are doing this install because you’re the only System Administrator in your shop, then you most likely have your “ownership” of servers separated between different admins (contacts).

Because ownership of systems is generally divided into groups, we now use a contactgroup that we can assign to events.

File: /var/www/etc/nagios/objects/contacts.cfg

define contactgroup{
    contactgroup_name   edge_admins
    alias               Edge System Administrators
    members             samt
}

define contactgroup{
    contactgroup_name   win_admins
    alias               Windows Administrators
    members             fred
}

Update nagios.cfg

Ensure that our configuration updates are going to be loaded by nagios during startup.

File: /var/www/etc/nagios/nagios.cfg

cfg_file=objects/contacts.cfg

Hosts to Monitor

We want to configure at least one host, so that we can see something useful in our Graphical User Interface

Path: /var/www/etc/nagios/objects

To simplify things, from our perspective, we’re going to start from scratch with very basic host suport. To define a host to monitor, we need four different configuration settings

  • Host Definitions
  • Host Groups

We’ll use an existing template for now, and from there define two hosts to check, an OpenBSD box and a Windows box.

Host Definitions

File: /var/www/etc/nagios/objects/hosts.cfg

define host{
    use                     openbsd-server
    host_name               firewall
    alias                   Gateway Router
    address                 192.168.0.1
	contact_groups          edge_admins
    }

openbsd-server template (a host object with register set to 0) is defined in templates.cfg and gives us a “packaged” set of host configuration settings, which we use as the foundation of all settings for our host, and then refine with our above host specific configuration.

We’ve modified the contact_groups to be those we specified in our contactgroup above, edge_admins.

Define our Windows Host to Monitor

File: /var/www/etc/nagios/objects/hosts.cfg

define host{
    use                     windows-server
    host_name               dc
    alias                   Active Directory Domain Controller
    address                 192.168.0.10
	contact_groups          win_admins
    }

The windows-server template (a host object with register set to 0) is defined in templates.cfg and gives us a “packaged” set of host configuration settings, which we use as the foundation for our host, and then refine above.

Update nagios.cfg

File: /var/www/etc/nagios/nagios.cfg

Ensure Nagios will read our above edited configuration files by verifying they are specified in nagios.cfg

cfg_file=objects/hosts.cfg

Use the Syntax Check for a preliminary review if we’ve entered our changes correctly. Restart Nagios to have changes take effect.

Services to Monitor

[Ref: Service Definition]

After the above host definitions, we now specify the events to monitor. The simplest thing to check is host availability through ping.

File: /var/www/etc/nagios/objects/services.cfg

define service {
	use						ping-service
	service_description		PING
	hostname				firewall, dc
	check_command			check_ping!500.0,40%!1000.0,70%
	first_notification_delay 1
	notification_interval	 720 		; minutes
	}

The above service launches the command object (specified by check_command). This command object is defined in commands.cfg as in the below.

File: /var/www/etc/nagios/objects/commands.cfg

define command {
	command_name	check_ping
	command_line	$USER1$/check_ping -H $HOSTADDRESS$ -w $ARG1$ -c $ARG2$ -p 5
	}

$USER1$ ? is defined by the installation, whereas $HOSTADDRESS$ and $ARG1$, $ARG2$ is determined at runtime.

grep "^\$USER" /var/www/etc/nagios/*
/var/www/etc/nagios/resource.cfg:$USER1$=/usr/local/libexec/nagios

Our PING service uses check_ping!500.0,40%!1000.0,70% so we can use the specifications in commands.cfg, and hosts.cfg to verify that the process will work:

  • $USER1$ is /usr/local/libexec/nagios,
  • $HOSTADDRESS$ is our host object address such as firewall:192.168.0.1; dc:192.168.0.10
  • Arguments are by “!” command!$ARG1$!$ARG2$

check_ping!500.0,40%!1000.0,70% translates to the check_command

$USER1$/check_ping -H $HOSTADDRESS$ -w $ARG1$ -c $ARG2$ -p 5

which becomes:

/usr/local/libexec/nagios/check_ping -H $HOSTADDRESS$ -w 500.0,40% -c 1000.0,70% -p 5

becomes

/usr/local/libexec/nagios/check_ping -H 192.168.0.1  -w 500.0,40% -c 1000.0,70% -p 5
/usr/local/libexec/nagios/check_ping -H 192.168.0.10 -w 500.0,40% -c 1000.0,70% -p 5

Executed from the command-line, a success will show results such as the below:

PING OK - Packet loss = 0%, RTA = 0.20 ms|rta=0.205000ms;500.000000;1000.000000;0.000000 pl=0%;47;70;0

For more information on the format and execution of check_ping, launch the command at the command-line (likewise with other tools in the $USER1$ directory)

Update nagios.cfg

File: /var/www/etc/nagios/nagios.cfg

Ensure Nagios will read our above edited configuration files by verifying they are specified in nagios.cfg

cfg_file=objects/services.cfg

Use the Syntax Check for a preliminary review if we’ve entered our changes correctly. Restart Nagios to have changes take effect.

Groups

Use groups to help organise, simplifies reviewing large volumes of data, and the configuration files themselves. We’re defining here ’edge-devices’ and ‘account-admin’ which are just categories for the servers to be listed within the group.

Service/Host Groups also have their own Categories on the web interface, so if you judiciously categorise your configuration, then you can visually drill through your hosts/services.

File: /var/www/etc/nagios/objects/hostgroups.cfg

define hostgroup{
    hostgroup_name  edge-devices
    alias           Edge Devices
    contact_groups  edge_admins
	members			firewall
    }

define hostgroup{
    hostgroup_name  windows-admin
    alias           Account Admin Servers
    contact_groups  win_admins
	members			dc
    }

File: /var/www/etc/nagios/objects/servicegroups.cfg

define servicegroup {
		servicegroup_name					edge-servicegroup
		alias								EDGE-Services
	}

Update nagios.cfg

File: /var/www/etc/nagios/nagios.cfg

Ensure Nagios will read our above edited configuration files by verifying they are specified in nagios.cfg

cfg_file=objects/hostgroups.cfg
cfg_file=objects/servicegroups.cfg

Update Host/Service Definitions

Now that we have Groups we can allocate hosts/services to, we can specify either at the group definition, or host definition whichever makes more sense for you:

Where we have host definition, you can add a hostgroups XXXX and where you we have service definitions, we can add a servicegroups YYYY where

  • XXXX is the hostgroup with hostgroup_name XXXX.
  • YYYY is the servicgroup with servicegroup_name YYYY.

Use the Syntax Check for a preliminary review if we’ve entered our changes correctly. Restart Nagios to have changes take effect.