Wondering how to Configure outbound checks with Nagios? We can help you.
As part of our Server Management Services, we assist our customers with several configuration queries.
Today, let us see how our Support Techs configure outbound checks with Nagios.
Configure outbound checks with Nagios
Today, let us see how to configure outbound checks in Nagios XI.
Outbound Transfer APIs
Basically, there are two different APIs for handling outbound check transfers (passive checks) in Nagios XI:
- NRDP
- Nagios Remote Data Processor
- A modern web-based API that operates over port 80 (HTTP) or port 443 (HTTPS)
- HTTPS enables flexible security and encryption
- NSCA
- Nagios Service Check Acceptor
- Operates over TCP port 5667
- Historically used for passive check results
Accessing Transfer Settings
Generally, The outbound check transfer settings page allows to configure both the NSCA and NRDP APIs.
Enabling Outbound Transfers
Outbound check transfers are disabled by default.
In order to enable outbound checks using either the NRDP or NSCA APIs, we must first enable outbound transfers.
To do this, check the Enable Outbound Transfers option and click the Update Settings button.
We can optionally prevent some checks from being transferred by using the global data filters option.
NRDP Configuration
In order to, enable outbound checks using the NRDP API, we must:
- Firstly, check the Enable NRDP Output option
- Then, specify the IP Address and Authentication Token for the remote host that is accepting check results using NRDP
- Finally, the authentication token we specify must be the same authentication token specified on the target host or the check results will be ignored.
We can configure Nagios XI to send passive check results to up to three remote servers using the NRDP API.
Finally, click the Update Settings button to save the NRDP settings.
NSCA Configuration
In order to, enable outbound checks using the NSCA API, we must:
- Firstly, check the Enable NSCA Output option
- Then, specify the IP Address, Encryption Method and Password for the remote host that is accepting check results using NSCA
- Next, the encryption method and password we specify must match the decryption method and password specified on the target host or the check results will be ignored.
We can configure Nagios XI to send passive check results to up to three remote servers using the NSCA API.
Finally, click the Update Settings button to save the NSCA settings.
Firewall Configuration
Usually, modification of firewall settings between the remote data sinks and the Nagios XI server may be required in order to allow outbound check results to be sent from Nagios XI.
The NRDP API works on TCP port 80 using the HTTP protocol or TCP port 443 using the HTTPS protocol.
NSCA uses a custom protocol that runs on TCP port 5667.
At the end, firewalls must be configured to allow inbound and outbound traffic over the ports used by the API(s) we choose to utilize for handling outbound checks.
[Need any further assistance to fix CyberPanel errors? – We’re available 24*7]
Conclusion
In short, we can easily Configure outbound checks with Nagios. Today we saw how our Support Engineers perform this task.
0 Comments