Bobcares

wesupport

CLIENT AREACall Us 1-800-383-5193
Bobcares

wesupport

Call Us 1-800-383-5193
Bobcares

wesupport

Call Us 1-800-383-5193

Need help?

Our experts have had an average response time of 11.7 minutes in August 2021 to fix urgent issues.

We will keep your servers stable, secure, and fast at all times for one fixed price.

Install Nagios NCPA on Linux and Windows

by | May 13, 2021

Wondering how to install Nagios NCPA on Linux and Windows? We will help you.

At Bobcares, as part of our Server Management Services, we assist our customers with several Nagios queries.

Today, let us see how our Support Techs install Nagios.

Install Nagios NCPA on Linux and Windows

In this article, let us see how to install the Nagios Cross Platform Agent (NCPA) on Windows and Linux.

Overview of NCPA Installation

Firstly, we will install NCPA using the ready built packages for the following platforms:

• Windows
◦ EXE Package
• Linux
◦ RHEL/CentOS/Oracle Linux
▪ Nagios Repository
▪ RPM Package
◦ Ubuntu / Debian
▪ DEB Package

We can also install NCPA from source.

Active vs Passive

NCPA can be used for both Active and Passive monitoring:

• Active: Nagios is responsible for performing the check on a schedule.
• Passive: NCPA is responsible for submitting check results in Nagios.

The NCPA installer may prompt for settings for active and passive. Active is the most common method used. If we are not using passive monitoring, then we do not need to configure those settings.

 

Downloading NCPA Packages

Please visit the downloads page given below to obtain the relevant download package for our operating system (OS):

https://www.nagios.org/ncpa/#downloads

If we are installing NCPA on Linux, then we do not need to download it right now.

 

Installing NCPA On Windows

The following instructions are for the graphical install of NCPA.

  • Firstly, navigate to the location that the installer package was downloaded to and double-click the installer, this will bring up the Welcome screen.
  • Then, click Next to continue.
  • Then, the license agreement will be shown.
  • Next, click I Agree.
  • Next, the configuration screen for Passive checks will be shown.
  • The only setting that is required here is a Token. This is what Nagios server will use to authenticate with NCPA.
  • Then, the Bind IP of 0.0.0.0 means that NCPA will listen on all IPv4 addresses on the Windows machine. The default port of 5693 is used.
  • Finally, click Next to proceed.The configuration screen for Passive checks will be shown.

 

We will need to check the Send passive checks over NRDP box to enable passive checks.

We will also need to provide the following NRDP settings:

  • URL: This is the URL on Nagios Host that accepts passive check results to be submitted.
  • NRDP Token: This is the token we will be using when passing NCPA passive checks to Nagios for NRDP to accept the check. This is separate from the token that was provided for active checks.
  • The URL and NRDP token in Nagios XI are configured via Admin > Check Transfers > Inbound Transfers.
  • Hostname: The hostname that the passive checks belong to on the Nagios server.
  • Then, click Next to proceed.
  • Continuing with Passive checks, we will be presented with the default passive service checks that will be executed and send to Nagios server.
  • Again, click Next to proceed.
  • Click the Install button to install NCPA.
  • Wait while NCPA is installed and configured.
  • Click Finish once NCPA has been installed.

 

Installing NCPA On Windows – Silent

The installer also supports a silent install, which allows system administrators to easily manage their network workstations without disrupting the workflow of the office.

The following arguments are currently supported.

/S: This is how we tell the installer we are performing a silent install.
/D: The directory to install NCPA to. This is optional, must be the last argument,
cannot contain quotes and must be an absolute path.
/TOKEN: The token that will be used to access the agent’s API and web interface.
/IP: The IP address to bind to. The default is 0.0.0.0 which binds to all IPv4
addresses. Use :: for binding to IPv6 addresses.
/PORT: The port to bind to. The default is 5693.
/NRDPURL: This is the URL on Nagios Host that accepts passive check results to be
submitted.
/NRDPTOKEN: This is the token we will be using when passing NCPA passive checks to Nagios for NRDP to accept the check. This is separate from the token that was provided for active checks.
/NRDPHOSTNAME: The hostname that the passive checks belong to on the Nagios server.

Using the previous graphic install of NCPA as an example, here is how to install NCPA silently using those settings:

ncpa-2.1.6.exe /S /TOKEN=’Str0ngT0k3n’ /NRDPURL=’http://10.25.5.12/nrdp/’
/NRDPTOKEN=’NRDP_T0k3n’ /NRDPHOSTNAME=’S1601′

 

Installing NCPA On Linux

There are several methods for installing NCPA on Linux depending on OS distribution. We will need to establish a terminal session as a root user to complete these steps.

Using Nagios Repository

The Nagios Repository can be used to install NCPA on RHEL/CentOS/Oracle Linux.

  • Firstly, install the repository depending on the version of Linux.
6.x
rpm -Uvh http://repo.nagios.com/nagios/6/nagios-repo-6-4.el6.noarch.rpm

7.x
rpm -Uvh http://repo.nagios.com/nagios/7/nagios-repo-7-4.el7.noarch.rpm

8.x
rpm -Uvh http://repo.nagios.com/nagios/8/nagios-repo-8-1.el8.noarch.rpm
  • Once the repository has been installed, we will need to execute the following command to install NCPA:
# yum install ncpa -y

 

Using RPM Package

An RPM package can be used to install NCPA on RHEL/CentOS/Oracle Linux. The step below depends on the version and architecture of Linux we are running.

RHEL/CentOS/Oracle Linux 6.x i386
rpm -Uvh https://assets.nagios.com/downloads/ncpa/ncpa-latest.el6.i386.rpm

RHEL/CentOS/Oracle Linux 6.x x86_64
rpm -Uvh https://assets.nagios.com/downloads/ncpa/ncpa-latest.el6.x86_64.rpm

RHEL/CentOS/Oracle Linux 7.x
rpm -Uvh https://assets.nagios.com/downloads/ncpa/ncpa-latest.el7.x86_64.rpm

RHEL/CentOS/Oracle Linux 8.x
rpm -Uvh https://assets.nagios.com/downloads/ncpa/ncpa-latest.el8.x86_64.rpm

Using DEB Package

An DEB package can be used to install NCPA on Ubuntu/Debian. The steps below depends on the version and architecture of Linux we are running.

Debian 8.x i386
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.i386.deb
dpkg -i ./ncpa-latest.i386.deb

Debian 8.x amd64
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.amd64.deb
dpkg -i ./ncpa-latest.amd64.deb

Debian 9.x i386
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.d9.i386.deb
dpkg -i ./ncpa-latest.d9.i386.deb

Debian 9.x amd64
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.d9.amd64.deb
dpkg -i ./ncpa-latest.d9.amd64.deb

Debian 10.x amd64
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.d10.amd64.deb
dpkg -i ./ncpa-latest.d10.amd64.deb

Ubuntu i386
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.i386.deb
sudo dpkg -i ./ncpa-latest.i386.deb

Ubuntu amd64
wget https://assets.nagios.com/downloads/ncpa/ncpa-latest.amd64.deb
sudo dpkg -i ./ncpa-latest.amd64.deb

 

Configuring NCPA

Linux installations do not provide configuration options as part of the installer.

However, the configuration file in Windows is the same, hence the information here is also valid for Windows.

Here we can configure NCPA for Active checks.

The NCPA configuration file is located here:

/usr/local/ncpa/etc/ncpa.cfg

  • Firstly, open the file in any text editor.
  • Then, find the following line:
community_string = mytoken
  • Change it to our required token, for example:
community_string = Str0ngT0k3n
  • When we have finished, save the changes and close the file.
  • We will now need to restart the ncpa_listener service for these changes to take effect.
  • Then, restart Service

The command required for this will differ depending on OS and version.

RHEL/CentOS/Oracle Linux 6.x
# service ncpa_listener restart

RHEL/CentOS/Oracle Linux 7.x+
# systemctl restart ncpa_listener.service

Ubuntu 12.x/13.x/14.x
$ sudo service ncpa_listener restart

Ubuntu 15.x+
$ sudo systemctl restart ncpa_listener.service

Debian 7.x
# service ncpa_listener restart

Debian 8.x +
# systemctl restart ncpa_listener.service

 

Configure Firewall – Windows

A firewall rule needs to be created on our Windows machine to allow incoming traffic to NCPA on TCP Port 5693.

  • To change the firewall settings, select Start and type firewall in the search dialog box and open Windows Firewall with Advanced Security.
  • Server 2012/2016 this is located at Server Manager > Tools > Windows Firewall with Advanced Security.
  • In the left hand pane, click Inbound Rules.
  • In the right hand pane, click New Rule.
  • Select Port.
  • Click Next.
  • Select TCP.
  • Select Specified local ports and type 5693 in the field.
  • Click Next.
  • Then, select Allow the connection.
  • Click Next.
  • Then, make any changes to where the rule should apply and click Next.
  • Then, give the rule a Name.
  • Finally, click Finish to create the rule.

 

Configure Firewall – Linux

A firewall rule needs to be created on our Linux machine to allow incoming traffic to NCPA on TCP Port 5693.

The command required for this will differ depending on OS and version.

RHEL/CentOS/ Oracle Linux 5.x/6.x
# iptables -I INPUT -p tcp –destination-port 5693 -j ACCEPT
# service iptables save
# ip6tables -I INPUT -p tcp –destination-port 5693 -j ACCEPT
# service ip6tables save

RHEL/CentOS/ Oracle Linux 7.x+
# firewall-cmd –zone=public –add-port=5693/tcp
# firewall-cmd –zone=public –add-port=5693/tcp –permanent

 

Ubuntu

$ sudo mkdir -p /etc/ufw/applications.d
$ sudo sh -c “echo ‘[NCPA]’ > /etc/ufw/applications.d/ncpa”
$ sudo sh -c “echo ‘title=Nagios Cross Platorm Agent’ >> /etc/ufw/applications.d/ncpa”
$ sudo sh -c “echo ‘description=Nagios Monitoring Agent’ >> /etc/ufw/applications.d/ncpa”
$ sudo sh -c “echo ‘ports=5693/tcp’ >> /etc/ufw/applications.d/ncpa”
$ sudo ufw allow NCPA
$ sudo ufw reload

Debian

# iptables -I INPUT -p tcp –destination-port 5693 -j ACCEPT
# apt-get install -y iptables-persistent
Answer yes to saving existing rules

 

Test NCPA

To ensure that the installation is successful and NCPA is now listening, try accessing the web interface of the agent. In order to do this, we will need to know:

• The IP Address of the machine we installed NCPA on
• The token/community_string we configured NCPA to use

Open a web browser and connect to the NCPA web interface using the following URL:

https://<NCPA IP Address>:5693/

We will be presented with a security message. This is completely OK and expected. NCPA is using self signed certificates as it allows the communication to be encrypted. Our web browser is warning because it does not know about the certificate.

We will need to click Advanced and then Add Exception or Proceed to xxx to allow us to use the NCPA page.

We will then be shown the NCPA login page.

Type the token in the field and then click the Log In button.

Once we log in, we will be placed on the Dashboard page with a summary of the NCPA version and machine it is running on.

NCPA is now ready to be monitored by Nagios.

 

Configuring Nagios

Now that NCPA is installed on the remote machine, we can monitor the machine using the NCPA monitoring wizard in Nagios XI.

The NCPA agent has built-in documentation in web interface, this is located on the Help tab. This gives the options to view or change configuration settings remotely as well as access additional info on NCPA.

 

Need any further assistance set up WMI monitoring with Nagios? – We’re available 24*7

Conclusion

In short, NCPA simplifies monitoring configurations and maintenance by allowing Nagios to monitor servers using the same agent regardless of platform. Today, we saw how out Support Techs Install Nagios NCPA on Linux and Windows.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

SEE SERVER ADMIN PLANS

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Categories

Tags