溫馨提示×

您好,登錄后才能下訂單哦!

密碼登錄×
登錄注冊(cè)×
其他方式登錄
點(diǎn)擊 登錄注冊(cè) 即表示同意《億速云用戶(hù)服務(wù)條款》

Nagios-NRPE Documentation(譯文)

發(fā)布時(shí)間:2020-07-08 20:59:02 來(lái)源:網(wǎng)絡(luò) 閱讀:368 作者:年年歳歲 欄目:移動(dòng)開(kāi)發(fā)

 

1. INTRODUCTION(介紹)

 

a) Purpose(目的)

 

The NRPE addon(插件) is designed to allow you to execute(履行,執(zhí)行) Nagios plugins on remote Linux/Unix machines.

(NRPE插件設(shè)計(jì)的目的是允許你來(lái)運(yùn)行存在于遠(yuǎn)程linux/Unix主機(jī)上的Nagios plugins)

The main reason for doing this is to allow Nagios to monitor "local" resources (like CPU load, memory usage, etc.) on remote machines.

(最主要的原因是為了允許Nagios去監(jiān)控遠(yuǎn)程主機(jī)的“本地”資源(像CPU負(fù)載,內(nèi)存使用情況,等等))

 Since(由于)these public resources are not usually exposed to external machines, an agent like NRPE must be installed on the remote Linux/Unix machines.

(由于這些公共的資源不是經(jīng)常地被顯露在外部的機(jī)器上,因此像NRPE這樣一個(gè)代理必須安裝在遠(yuǎn)程的linux/Unix機(jī)器上)

 

Note(提示): It is possible to execute(執(zhí)行) Nagios plugins on remote Linux/Unix machines through SSH.  通過(guò)SSH來(lái)執(zhí)行遠(yuǎn)程主機(jī)的Nagios plugins是可能的

There is a check_by_ssh plugin that allows you to do this. 

有一個(gè)叫做“check_by_ssh”的插件會(huì)幫助你來(lái)實(shí)現(xiàn)。

Using SSH is more secure than the NRPE addon, but it also imposes a larger (CPU) overhead on both the monitoring and remote machines. (使用SSH比NRPE插件更安全,但是它也同時(shí)會(huì)把更大的開(kāi)支強(qiáng)加于監(jiān)控端和遠(yuǎn)程主機(jī).) This can become an issue when you start monitoring hundreds or thousands of machines. (當(dāng)你開(kāi)始監(jiān)控成百上千臺(tái)主機(jī)時(shí),這將會(huì)是一個(gè)重大的問(wèn)題) Many Nagios admins(administrators縮寫(xiě)) opt for using the NRPE addon because of the lower load it imposes.(許多Nagios管理員選擇使用NRPE插件就是因?yàn)樗募佑谥鳈C(jī)的負(fù)擔(dān)低的優(yōu)點(diǎn))

 

b) Design Overview(設(shè)計(jì)概官)

 Nagios-NRPE Documentation(譯文)

 

The NRPE addon consists of two pieces:

        (NRPE插件包括兩個(gè)部分:)

 

  • The check_nrpe plugin, which resides on the local monitoring machine

    (check_nrpe這個(gè)插件,存在于本地監(jiān)控主機(jī))

  • The NRPE daemon, which runs on the remote Linux/Unix machine

    (NRPE守護(hù)進(jìn)程,運(yùn)行在遠(yuǎn)程linux/Unix主機(jī)上)

 

When Nagios needs to monitor a resource of service from a remote Linux/Unix machine:

        (當(dāng)Nagios需要監(jiān)控遠(yuǎn)程主機(jī)的一個(gè)服務(wù)的資源時(shí):)

  • Nagios will execute the check_nrpe plugin and tell it what service needs to be checked

    (Nagios將利用check_nrpe插件執(zhí)行相應(yīng)的命令)

  • The check_nrpe plugin contacts the NRPE daemon on the remote host over an (optionally) SSL-protected connection

    (check_nrpe通過(guò)被保護(hù)的ssl連接遠(yuǎn)程主機(jī)的NRPE守護(hù)進(jìn)程)

  • The NRPE daemon runs the appropriate Nagios plugin to check the service or resource

    (NRPE進(jìn)程運(yùn)行適當(dāng)?shù)腘agios插件去檢測(cè)服務(wù)和資源)

  • The results from the service check are passed from the NRPE daemon back to the check_nrpe plugin, which then returns the check results to the Nagios process.

               (將檢測(cè)的結(jié)果從NRPE進(jìn)程交給check_nrpe插件,插件將收到的檢測(cè)結(jié)果返回給Nagios進(jìn)程)

 

Note: The NRPE daemon requires that Nagios plugins be installed on the remote Linux/Unix host.  Without these, the daemon wouldn't be able to monitor anything.

 

提示:NRPE進(jìn)程需要在Nagios plugins這個(gè)插件庫(kù)被安裝在遠(yuǎn)程主機(jī)上。如果沒(méi)有這些的話,這個(gè)守護(hù)進(jìn)程將無(wú)法監(jiān)控到任何東西

 

2. EXAMPLE USES

 

        a) Direct Checks(直接檢查)

 

The most straight forward use of the NRPE addon is to monitor "local" or "private" resources on a remote Linux/Unix Machine.

NRPE插件最直截了當(dāng)?shù)氖褂梅椒ㄊ潜O(jiān)控一臺(tái)遠(yuǎn)程linux/Unix主機(jī)的“本地”和“私有”資源

 

This includes things like CPU load, memory usage, swap usage, current users, disk usage, process states, etc.

 這些資源包括像CPU負(fù)載,內(nèi)存、swap使用情況,當(dāng)前的用戶(hù)數(shù)量,磁盤(pán)使用狀況和進(jìn)程狀態(tài),等等

Nagios-NRPE Documentation(譯文)

 

        b) Indirect Checks(間接檢查)

 

You can also use the NRPE addon to indirectly check "public" services and resources of remote servers that might not be reachable directly from the monitoring host.

(你也可以使用NRPE插件來(lái)間接檢測(cè)遠(yuǎn)程服務(wù)器的公共服務(wù)和資源,而這些資源監(jiān)控主機(jī)可能無(wú)法直接可以獲取) 

For instance, if the remote host that the NRPE daemon and plugins are installed on can talk to the a remote web server (but the monitoring host cannot), you can configure the NRPE daemon to allow you to monitor the remote web server indirectly. 

(例如,如果一臺(tái)已經(jīng)安裝過(guò)NRPE進(jìn)程和plugins的遠(yuǎn)程主機(jī)可以和另一臺(tái)遠(yuǎn)程web服務(wù)器進(jìn)行通信,而主控端卻不能,你可以通過(guò)配置NCRE進(jìn)程來(lái)實(shí)現(xiàn)間接監(jiān)控遠(yuǎn)程web服務(wù)器的目的)

The NRPE daemon is essentially acting as proxy in this case.

(此刻,NCRE進(jìn)程本質(zhì)上在這里是正在扮演一個(gè)代理的角色)

 

Nagios-NRPE Documentation(譯文)

 

===================================================

致:

        學(xué)習(xí)監(jiān)控的同時(shí),發(fā)現(xiàn)關(guān)于Nagios的幫助文檔寫(xiě)的太好了,于是就忍不住想要嘗試翻譯一下,這只是NRPE參考文檔的關(guān)于該技術(shù)的簡(jiǎn)要介紹,后續(xù)的安裝和使用方法都還沒(méi)有,如果有時(shí)間,會(huì)盡自己所能的翻譯一下。

向AI問(wèn)一下細(xì)節(jié)

免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點(diǎn)不代表本網(wǎng)站立場(chǎng),如果涉及侵權(quán)請(qǐng)聯(lián)系站長(zhǎng)郵箱:is@yisu.com進(jìn)行舉報(bào),并提供相關(guān)證據(jù),一經(jīng)查實(shí),將立刻刪除涉嫌侵權(quán)內(nèi)容。

AI