1. INTRODUCTION(介紹)
a) Purpose(目的)
The NRPE addon(插件) is designed to allow you to execute(履行,執行) Nagios plugins on remote Linux/Unix machines.
(NRPE插件設計的目的是允許你來運行存在于遠程linux/Unix主機上的Nagios plugins)
The main reason for doing this is to allow Nagios to monitor "local" resources (like CPU load, memory usage, etc.) on remote machines.
(最主要的原因是為了允許Nagios去監控遠程主機的“本地”資源(像CPU負載,內存使用情況,等等))
Since(由于)these public resources are not usually exposed to external machines, an agent like NRPE must be installed on the remote Linux/Unix machines.
(由于這些公共的資源不是經常地被顯露在外部的機器上,因此像NRPE這樣一個代理必須安裝在遠程的linux/Unix機器上)
Note(提示): It is possible to execute(執行) Nagios plugins on remote Linux/Unix machines through SSH. 通過SSH來執行遠程主機的Nagios plugins是可能的
There is a check_by_ssh plugin that allows you to do this.
有一個叫做“check_by_ssh”的插件會幫助你來實現。
Using SSH is more secure than the NRPE addon, but it also imposes a larger (CPU) overhead on both the monitoring and remote machines. (使用SSH比NRPE插件更安全,但是它也同時會把更大的開支強加于監控端和遠程主機.) This can become an issue when you start monitoring hundreds or thousands of machines. (當你開始監控成百上千臺主機時,這將會是一個重大的問題) Many Nagios admins(administrators縮寫) opt for using the NRPE addon because of the lower load it imposes.(許多Nagios管理員選擇使用NRPE插件就是因為它的加于主機的負擔低的優點)
b) Design Overview(設計概官)
The NRPE addon consists of two pieces:
(NRPE插件包括兩個部分:)
The check_nrpe plugin, which resides on the local monitoring machine
(check_nrpe這個插件,存在于本地監控主機)
The NRPE daemon, which runs on the remote Linux/Unix machine
(NRPE守護進程,運行在遠程linux/Unix主機上)
When Nagios needs to monitor a resource of service from a remote Linux/Unix machine:
(當Nagios需要監控遠程主機的一個服務的資源時:)
Nagios will execute the check_nrpe plugin and tell it what service needs to be checked
(Nagios將利用check_nrpe插件執行相應的命令)
The check_nrpe plugin contacts the NRPE daemon on the remote host over an (optionally) SSL-protected connection
(check_nrpe通過被保護的ssl連接遠程主機的NRPE守護進程)
The NRPE daemon runs the appropriate Nagios plugin to check the service or resource
(NRPE進程運行適當的Nagios插件去檢測服務和資源)
The results from the service check are passed from the NRPE daemon back to the check_nrpe plugin, which then returns the check results to the Nagios process.
(將檢測的結果從NRPE進程交給check_nrpe插件,插件將收到的檢測結果返回給Nagios進程)
Note: The NRPE daemon requires that Nagios plugins be installed on the remote Linux/Unix host. Without these, the daemon wouldn't be able to monitor anything.
提示:NRPE進程需要在Nagios plugins這個插件庫被安裝在遠程主機上。如果沒有這些的話,這個守護進程將無法監控到任何東西
2. EXAMPLE USES
a) Direct Checks(直接檢查)
The most straight forward use of the NRPE addon is to monitor "local" or "private" resources on a remote Linux/Unix Machine.
NRPE插件最直截了當的使用方法是監控一臺遠程linux/Unix主機的“本地”和“私有”資源
This includes things like CPU load, memory usage, swap usage, current users, disk usage, process states, etc.
這些資源包括像CPU負載,內存、swap使用情況,當前的用戶數量,磁盤使用狀況和進程狀態,等等
b) Indirect Checks(間接檢查)
You can also use the NRPE addon to indirectly check "public" services and resources of remote servers that might not be reachable directly from the monitoring host.
(你也可以使用NRPE插件來間接檢測遠程服務器的公共服務和資源,而這些資源監控主機可能無法直接可以獲?。?nbsp;
For instance, if the remote host that the NRPE daemon and plugins are installed on can talk to the a remote web server (but the monitoring host cannot), you can configure the NRPE daemon to allow you to monitor the remote web server indirectly.
(例如,如果一臺已經安裝過NRPE進程和plugins的遠程主機可以和另一臺遠程web服務器進行通信,而主控端卻不能,你可以通過配置NCRE進程來實現間接監控遠程web服務器的目的)
The NRPE daemon is essentially acting as proxy in this case.
(此刻,NCRE進程本質上在這里是正在扮演一個代理的角色)
===================================================
致:
學習監控的同時,發現關于Nagios的幫助文檔寫的太好了,于是就忍不住想要嘗試翻譯一下,這只是NRPE參考文檔的關于該技術的簡要介紹,后續的安裝和使用方法都還沒有,如果有時間,會盡自己所能的翻譯一下。
免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:is@yisu.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。