Monitor Different Systems with Zenoss
This is the third part and continuation of the ‘Network Monitoring Software Comparison’ series. Here is the link to the first part and here is the second one. Let’s check out what Zenoss is about. From their wiki page, we see the following:
What is Zenoss?
Zenoss Core is award-winning Open Source IT monitoring software that offers visibility over the entire IT stack, from network devices to applications. Features include automatic discovery, inventory via CMDB, availability monitoring, easy-to-read performance graphs, sophisticated alerting, an easy-to-use web portal, and much, much more. It is Free Software, released under the GNU General Public License version 2. Zenoss has a very active community.
Now to start the install. Reading over the Zenoss Install Guide, I saw that there is section on how to compile the software from source. This sparked an interest to install the software on my FreeBSD system.
1. Setup a MySQL Database for the Zenoss Install
I decided to setup Zenoss on my FreeBSD machine, since my Ubuntu box was already running the other monitoring applications and I knew that the source for Zenoss was available. Zenoss uses MySQL for it’s database, I actually had a MySQL instance running on the Ubuntu machine, hence I decided to allow remote access for root to MySQL. I would rarely do this, but since this was a test setup, I decided to just go all out :)Before any changes, I was able to login as root locally:
kerch:~>mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 115
Server version: 5.5.29-0ubuntu0.12.10.1 (Ubuntu)
Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
mysql>
But trying to connect to the IP would fail like so:
kerch:~$ mysql -h 192.168.1.100 -u root -p
Enter password:
ERROR 2003 (HY000): Can't connect to MySQL server on '192.168.1.100' (111)
So let’s login to the MySQL server and check out the current settings:
mysql> use mysql;
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A
Database changed
mysql> select host,user from user;
+-----------+------------------+
| host | user |
+-----------+------------------+
| 127.0.0.1 | root |
| ::1 | root |
| localhost | debian-sys-maint |
| localhost | root |
| localhost | wordpress |
+-----------+------------------+
5 rows in set (0.02 sec)
I don’t use IPv6, so let’s replace that entry with “%” (allowing any host to connect):
mysql> update user set host='%' where user='root' and host='::1';
Query OK, 1 row affected (0.05 sec)
Rows matched: 1 Changed: 1 Warnings: 0
Flush the privileges to apply the settings:
mysql> flush privileges;
Query OK, 0 rows affected (0.04 sec)
By default the MySQL install binds the server to the localhost interface for security reasons. To allow remote connections we need to bind the instance to a non-local IP. This is done by editing the /etc/mysql/my.cnf file and changing this line:
bind-address = 127.0.0.1
to this:
bind-address = 192.168.1.100
To apply the above changes, restart the mysql service:
kerch:~>sudo service mysql restart
mysql stop/waiting
mysql start/running, process 371
Then I was able to login to the MySQL server by connecting to the IP:
kerch:~>mysql -h 192.168.1.100 -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 116
Server version: 5.5.29-0ubuntu0.12.10.1 (Ubuntu)
Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
mysql>
Lastly I had to open up port 3306 on the firewall as well. This is done by editing /etc/iptables/rule.v4 and adding the following line:
-A INPUT -s 192.168.1.0/24 -p tcp -m state --state NEW -m tcp --dport 3306 --tcp-flags FIN,SYN,RST,ACK SYN -j ACCEPT
To apply the changes to the filewall, just restart the iptables service:
kerch:~>sudo service iptables-persistent restart
* Loading iptables rules...
* IPv4...
* IPv6... [ OK ]
I was even able to connect from another machine:
moxz:~>mysql -h 192.168.1.100 -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 117
Server version: 5.5.29-0ubuntu0.12.10.1 (Ubuntu)
Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
mysql>
There are better ways to go about this. Like to create a dedicated user for the Zenoss setup. But since this was a test setup, this was okay for me. Now on the FreeBSD machine, let’s install Zenoss.
2. Install Zenoss on FreeBSD
freebsd:~>cd /usr/ports/net-mgmt/zenoss
freebsd:/usr/ports/net-mgmt/zenoss>sudo make install clean
After the install is done, let’s enable the service by editing the /etc/rc.conf file and adding the following:
zenoss_enable="YES"
Now let’s initialize the Zenoss service:
freebsd:~>sudo service zenoss init
MySQL server hostname [localhost]: 192.168.1.100
MySQL server root username [root]:
MySQL server root password []:
MySQL event database name [events]:
MySQL username for Zenoss events database [zenoss]:
MySQL password for zenoss [zenoss]:
MySQL server port [3306]:
+-------------------------+
| VERSION() |
+-------------------------+
| 5.5.29-0ubuntu0.12.10.1 |
+-------------------------+
Wrote file /usr/local/zenoss/etc/zeo.conf
Wrote file /usr/local/zenoss/bin/zeoctl
Changed mode for /usr/local/zenoss/bin/zeoctl to 755
Wrote file /usr/local/zenoss/bin/runzeo
Changed mode for /usr/local/zenoss/bin/runzeo to 755
Starting Zope Object Database .
daemon process started, pid=24007
Loading initial Zenoss objects into the Zeo database (this can take a few minutes)
ZentinelPortal loaded at zport
Starting Zope Server .
daemon process started, pid=24771
=========================================================
zensocket must be setuid. As root, execute the following:
chown root:zenoss /usr/local/zenoss/bin/zensocket
chmod 04750 /usr/local/zenoss/bin/zensocket
=========================================================
Successfully installed Zenoss
Then following the instructions and setting the suid bit properly:
freebsd:~>sudo chown root:zenoss /usr/local/zenoss/bin/zensocket
freebsd:~>sudo chmod 04750 /usr/local/zenoss/bin/zensocket
Lastly, let’s start all the necessary services:
freebsd:~>sudo service zenoss start
Daemon: zeoctl daemon process already running; pid=24007
Daemon: zopectl daemon process already running; pid=24771
Daemon: zenhub starting...
Daemon: zenjobs starting...
Daemon: zenping starting...
Daemon: zensyslog starting...
Daemon: zenstatus starting...
Daemon: zenactions starting...
Daemon: zentrap starting...
Daemon: zenmodeler starting...
Daemon: zenperfsnmp starting...
Daemon: zencommand starting...
Daemon: zenprocess starting...
Daemon: zenwin starting...
Daemon: zeneventlog starting...
Then confirming they are all running:
freebsd:~>sudo service zenoss status
Daemon: zeoctl program running; pid=24007
Daemon: zopectl program running; pid=24771
Daemon: zenhub program running; pid=25147
Daemon: zenjobs program running; pid=25172
Daemon: zenping program running; pid=25245
Daemon: zensyslog not running
Daemon: zenstatus program running; pid=25302
Daemon: zenactions program running; pid=25397
Daemon: zentrap program running; pid=25513
Daemon: zenmodeler program running; pid=25489
Daemon: zenperfsnmp program running; pid=25525
Daemon: zencommand program running; pid=25549
Daemon: zenprocess program running; pid=25573
Daemon: zenwin program running; pid=25604
Daemon: zeneventlog program running; pid=25633
One service (zensyslog) didn’t start, but that is okay. Checking out the active connections for Zenoss, there were a lot:
freebsd:~>sudo sockstat -4 | grep zenoss
zenoss python2.6 25633 6 tcp4 127.0.0.1:18493 127.0.0.1:8789
zenoss python2.6 25604 6 tcp4 127.0.0.1:32636 127.0.0.1:8789
zenoss python2.6 25573 4 tcp4 127.0.0.1:47321 127.0.0.1:8789
zenoss python2.6 25549 6 tcp4 127.0.0.1:17865 127.0.0.1:8789
zenoss python2.6 25525 6 tcp4 127.0.0.1:37259 127.0.0.1:8789
zenoss python2.6 25513 4 udp4 *:162 *:*
zenoss python2.6 25513 6 udp4 *:162 *:*
zenoss python2.6 25513 9 tcp4 127.0.0.1:29149 127.0.0.1:8789
zenoss python2.6 25489 6 tcp4 127.0.0.1:25461 127.0.0.1:8789
zenoss python2.6 25397 8 tcp4 127.0.0.1:41130 127.0.0.1:8100
zenoss python2.6 25397 18 tcp4 192.168.1.101:35744 192.168.1.100:3306
zenoss python2.6 25302 6 tcp4 127.0.0.1:48225 127.0.0.1:8789
zenoss python2.6 25245 8 tcp4 127.0.0.1:40793 127.0.0.1:8789
zenoss python2.6 25172 8 tcp4 127.0.0.1:37563 127.0.0.1:8100
zenoss python2.6 25172 18 tcp4 192.168.1.101:32699 192.168.1.100:3306
zenoss python2.6 25147 6 tcp4 127.0.0.1:56578 127.0.0.1:8100
zenoss python2.6 25147 15 tcp4 *:8789 *:*
zenoss python2.6 25147 19 tcp4 *:8081 *:*
zenoss python2.6 25147 20 tcp4 192.168.1.101:52771 192.168.1.100:3306
zenoss python2.6 25147 21 tcp4 127.0.0.1:8789 127.0.0.1:40793
zenoss python2.6 25147 22 tcp4 127.0.0.1:8789 127.0.0.1:48225
zenoss python2.6 25147 23 tcp4 127.0.0.1:8789 127.0.0.1:25461
zenoss python2.6 25147 24 tcp4 127.0.0.1:8789 127.0.0.1:29149
zenoss python2.6 25147 25 tcp4 127.0.0.1:8789 127.0.0.1:37259
zenoss python2.6 25147 26 tcp4 127.0.0.1:8789 127.0.0.1:17865
zenoss python2.6 25147 27 tcp4 127.0.0.1:8789 127.0.0.1:47321
zenoss python2.6 25147 28 tcp4 127.0.0.1:8789 127.0.0.1:32636
zenoss python2.6 25147 29 tcp4 127.0.0.1:8789 127.0.0.1:18493
zenoss python2.6 24771 3 tcp4 *:8080 *:*
zenoss python2.6 24771 12 tcp4 127.0.0.1:35025 127.0.0.1:8100
zenoss python2.6 24007 7 tcp4 127.0.0.1:8100 *:*
zenoss python2.6 24007 8 tcp4 127.0.0.1:8100 127.0.0.1:35025
zenoss python2.6 24007 9 tcp4 127.0.0.1:8100 127.0.0.1:56578
zenoss python2.6 24007 16 tcp4 127.0.0.1:8100 127.0.0.1:37563
zenoss python2.6 24007 17 tcp4 127.0.0.1:8100 127.0.0.1:41130
Most are for local communication. Visiting 127.0.0.1:8080 showed the following page:
I then setup the users and passwords:
And then I skipped adding devices and went to the dashboard:
Looking over the Administration Guide, I saw this:
Servers are organized by operating system. If the system discovers Windows devices, for example, you might choose to relocate them to /Server/Windows. Similarly, you might choose to classify discovered Linux devices in /Server/Linux (if you want to monitor and model using SNMP), or /Server/SSH/Linux (if you want to monitor and model using SSH)
So you can monitor your machine with SNMP or SSH. There are actually other ways, like APIs. From the wiki:
Before we can monitor a device in Zenoss, we need to ensure that is is properly set up to be monitored. Zenoss does not use agents, but it needs to query the device using some protocol. The “classical” way to monitor devices with Zenoss is to use the Simple Network Management Protocol, also known as SNMP. SSH is also supported for Linux systems, and WMI is supported for Microsoft Windows-based systems.
We also support various APIs, such as the Amazon EC2 and CloudStack API, for monitoring cloud services.
I decided to use SNMP for the FreeBSD and Fedora Machines, and SSH for the Ubuntu machine.
Now let’s start monitoring our nodes.
3. Monitor our Ubuntu Machine with Zenoss via SSH
To get any useful information from SSH it’s recommended to install the LinuxMonitor ZenPack, more information is seen in Zenoss_Core_Extended_Monitoring. Here is a description of ZenPacks from that guide:
13.1. About ZenPacks
ZenPacks extend and modify the system to add new functionality. This can be as simple as adding new device classes or monitoring templates, or as complex as extending the data model and providing new collection daemons.
You can use ZenPacks to add:
- Monitoring template
- Data sources
- Graphs
- Event classes
- Event and user commands
- Reports
- Model extensions
- Product definitions
I uploaded the ZenPack file to the Products directory of the Zenoss install:
freebsd:~>sudo cp ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg.zip ~zenoss/Products/.
freebsd:~>sudo chown zenoss:zenoss ~zenoss/Products/ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg
and then I switched to the zenoss user and installed the ZenPack:
freebsd:~>sudo su - zenoss
$ zenpack --install Products/ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg
2013-02-22 21:19:33,994 INFO zen.ZPLoader: Loading /usr/local/zenoss/ZenPacks/ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg/ZenPacks/zenoss/LinuxMonitor/objects/objects.xml
2013-02-22 21:19:37,280 INFO zen.AddToPack: End loading objects
2013-02-22 21:19:37,280 INFO zen.AddToPack: Processing links
2013-02-22 21:19:38,630 INFO zen.AddToPack: Loaded 65 objects into the ZODB database
2013-02-22 21:19:38,636 INFO zen.HookReportLoader: loading reports from:/usr/local/zenoss/ZenPacks/ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg/ZenPacks/zenoss/LinuxMonitor/reports
You could do the same thing from the web page. Basically from the Dashboard go to “Advanced” -> “ZenPacks” -> “Gear” -> “Install ZenPack”, here is how it looks like:
After the ZenPack is installed, we need to restart zenoss. Here is how that looks:
freebsd:~>sudo service zenoss restart
Password:
Daemon: zeneventlog stopping...
Daemon: zenwin stopping...
Daemon: zenprocess stopping...
Daemon: zencommand stopping...
Daemon: zenperfsnmp stopping...
Daemon: zenmodeler stopping...
Daemon: zentrap stopping...
Daemon: zenactions stopping...
Daemon: zenstatus stopping...
Daemon: zensyslog stopping...
already stopped
Daemon: zenping stopping...
Daemon: zenjobs stopping...
Daemon: zenhub stopping...
Daemon: zopectl . . . . . . . . . . .
daemon process stopped
Daemon: zeoctl .
daemon process stopped
Daemon: zeoctl .
daemon process started, pid=30272
Daemon: zopectl .
daemon process started, pid=30276
Daemon: zenhub starting...
Daemon: zenjobs is already running
Daemon: zenping starting...
Daemon: zensyslog starting...
Daemon: zenstatus starting...
Daemon: zenactions is already running
Daemon: zentrap starting...
Daemon: zenmodeler starting...
Daemon: zenperfsnmp starting...
Daemon: zencommand starting...
Daemon: zenprocess starting...
Daemon: zenwin starting...
Daemon: zeneventlog starting.
You can confirm if the ZenPack is installed by switching back to the zenoss user and running the following:
freebsd:~>sudo su - zenoss
$ zenpack --list
ZenPacks.zenoss.LinuxMonitor (/usr/local/zenoss/ZenPacks/ZenPacks.zenoss.LinuxMonitor-1.1.5-py2.6.egg)
Then go back to ‘Infrastructure’ Tab and expand the Hierarchy on the Left Panel to “Device Classes” -> “Server” -> “SSH” -> “Linux”. At this point you will see the following:
Now click on the “Add Device” button, and select “Add a Single Device”:
Then fill out all the fields, here is how mine looked like:
After a little bit, you will see the device under the Infrastructure Tab:
Now we need to add the SSH Login Credentials. Click on the newly added device and you will see this screen:
Next let’s confirm that the device will collect Linux information. Click on “Modeler Plugins” and you should see the following:
Notice the “Linux” Commands. Now select “Configuration Properties” and you will see this:
In this screen edit the zCommandPassword (SSH Password) and zCommandUsername (SSH User) properties accordingly. After you are done, click “Save” at the bottom of the screen. Now let’s “model” the device; at the bottom left corner click on the “Gear” Icon and select “Model Device”:
Now you should see all the plugins getting executed:
Notice the “Using SSH Collection method” line (this is expected since we are using SSH). Now if you go back to the ‘Infrastructure’ tab and click on the device, under the device details you should see a new section called “Components”. Selecting one of the components will show more information about the device:
You can also go to “Graphs” and see CPU, Memory, and Load graphs:
After everything have been configured, you should be able to see the device on the ‘Infrastructure’ tab without any issues:
Now let’s move to our FreeBSD machine.
4. Monitor FreeBSD with Zenoss via SNMP
Install instructions are found in this Zenoss community page. First let’s install the desired snmpd server:
freebsd:~>cd /usr/ports/net-mgmt/bsnmp-ucd
freebsd:/usr/ports/net-mgmt/bsnmp-ucd>sudo make install clean
freebsd:~>cd /usr/ports/net-mgmt/bsnmptools
freebsd:/usr/ports/net-mgmt/bsnmptools>sudo make install clean
Then edit the /etc/snmpd.conf file and add/modify the following lines:
read := "public"
begemotSnmpdCommunityString.0.1 = $(read)
begemotSnmpdPortStatus.192.168.1.101.161 = 1
begemotSnmpdModulePath."mibII" = "/usr/lib/snmp_mibII.so"
begemotSnmpdModulePath."ucd" = "/usr/local/lib/snmp_ucd.so"
Then let’s enable the service, edit the /etc/rc.conf file an add the following:
bsnmpd_enable="YES"
Then let’s start up the bsmpd service:
freebsd:~>sudo service bsnmpd start
Starting bsnmpd.
freebsd:~>sudo service bsnmpd status
bsnmpd is running as pid 77265.
Then doing a quick test:
freebsd:~>bsnmpwalk -v 2c -s public@192.168.1.101 system
sysDescr.0 = freebsd.dnsd.me 2224368676 FreeBSD 9.1-RELEASE
sysObjectId.0 = begemotSnmpdAgentFreeBSD
sysUpTime.0 = 21234
sysContact.0 = sysmeister@example.com
sysName.0 = freebsd.dnsd.me
sysLocation.0 = Room 200
sysServices.0 = 76
sysORLastChange.0 = 8
sysORID[1] = begemotSnmpdTransUdp
sysORID[2] = begemotSnmpdTransLsock
sysORID[3] = snmpMIB
sysORID[4] = begemotSnmpd
sysORID[5] = ifMIB
sysORID[6] = ipMIB
sysORID[7] = tcpMIB
sysORID[8] = udpMIB
sysORID[9] = ipForward
sysORID[10] = 1.3.6.1.4.1.2021
sysORDescr[1] = udp transport mapping
sysORDescr[2] = lsock transport mapping
sysORDescr[3] = The MIB module for SNMPv2 entities.
sysORDescr[4] = The MIB module for the Begemot SNMPd.
sysORDescr[5] = The MIB module to describe generic objects for network interface sub-layers.
sysORDescr[6] = The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.
sysORDescr[7] = The MIB module for managing TCP implementations.
sysORDescr[8] = The MIB module for managing UDP implementations.
sysORDescr[9] = The MIB module for the display of CIDR multipath IP Routes.
sysORDescr[10] = The MIB module for UCD-SNMP-MIB.
sysORUpTime[1] = 0
sysORUpTime[2] = 0
sysORUpTime[3] = 8
sysORUpTime[4] = 8
sysORUpTime[5] = 8
sysORUpTime[6] = 8
sysORUpTime[7] = 8
sysORUpTime[8] = 8
sysORUpTime[9] = 8
sysORUpTime[10] = 8
freebsd:~>
Then going to the Zenoss dashboard and then going to the “Infrastructure” Tab, we can expand the left pane and go to “Device Classes” -> “Server” -> “Remote”. Lastly we can click on “Add Device” -> “Add Single Device”, and fill out all the options like so:
After the device is added, we can see new components from the host:
Not as many as for Linux Host but still enough. Now let’s monitor the Fedora Machine.
5. Monitor the Fedora Machine with Zenoss via SNMP
For regular Linux machines we can just use the net-snmp package, so let’s go ahead and install that:
moxz:~>sudo yum install net-snmp
...
...
Installed:
net-snmp.i686 1:5.7.2-5.fc18
Dependency Installed:
net-snmp-agent-libs.i686 1:5.7.2-5.fc18
Complete!
Then let’s set configure the service by editing the /etc/snmp/snmpd.conf file and adding/modifying the following lines (Most of these instructions are described in this Zenoss community page):
view systemview included .1
rocommunity public
Here is how the whole file looked like:
moxz:~>grep -v -E '^#|^$' /etc/snmp/snmpd.conf
com2sec notConfigUser default public
group notConfigGroup v1 notConfigUser
group notConfigGroup v2c notConfigUser
view systemview included .1
access notConfigGroup "" any noauth exact systemview none none
syslocation Unknown (edit /etc/snmp/snmpd.conf)
syscontact Root <root @localhost> (configure /etc/snmp/snmp.local.conf)
dontLogTCPWrappersConnects yes
rocommunity public
Now let’s enable the snmpd service:
moxz:~>sudo systemctl enable snmpd
ln -s '/usr/lib/systemd/system/snmpd.service' '/etc/systemd/system/multi-user.target.wants/snmpd.service'
Then let’ start it:
moxz:~>sudo systemctl start snmpd
Lastly let’s make sure it started fine:
moxz:~>sudo systemctl status snmpd
snmpd.service - Simple Network Management Protocol (SNMP) Daemon.
Loaded: loaded (/usr/lib/systemd/system/snmpd.service; enabled)
Active: active (running) since Sat 2013-02-23 17:24:15 PST; 4s ago
Main PID: 20879 (snmpd)
CGroup: name=systemd:/system/snmpd.service
└─20879 /usr/sbin/snmpd -LS0-6d -f
The only thing left to do is open up the firewall for UDP port 161. Edit the /etc/sysconfig/iptables file and add the following line to it:
-A INPUT -m state --state NEW -m udp -p udp -s 192.168.1.0/24 --dport 161 -j ACCEPT
Then restart iptables to apply the changes:
moxz:~>sudo systemctl restart iptables
Now let’s do an snmpwalk from our Zenoss server:
freebsd:~>snmpwalk -v 2c -c public 192.168.1.102 system
SNMPv2-MIB::sysDescr.0 = STRING: Linux moxz.dnsd.me 3.7.8-202.fc18.i686 #1 SMP Fri Feb 15 17:57:07 UTC 2013 i686
SNMPv2-MIB::sysObjectID.0 = OID: NET-SNMP-MIB::netSnmpAgentOIDs.10
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (46827) 0:07:48.27
SNMPv2-MIB::sysContact.0 = STRING: Root </root><root @localhost> (configure /etc/snmp/snmp.local.conf)
SNMPv2-MIB::sysName.0 = STRING: moxz.dnsd.me
SNMPv2-MIB::sysLocation.0 = STRING: Unknown (edit /etc/snmp/snmpd.conf)
SNMPv2-MIB::sysORLastChange.0 = Timeticks: (8) 0:00:00.08
SNMPv2-MIB::sysORID.1 = OID: SNMP-MPD-MIB::snmpMPDCompliance
SNMPv2-MIB::sysORID.2 = OID: SNMP-USER-BASED-SM-MIB::usmMIBCompliance
SNMPv2-MIB::sysORID.3 = OID: SNMP-FRAMEWORK-MIB::snmpFrameworkMIBCompliance
SNMPv2-MIB::sysORID.4 = OID: SNMPv2-MIB::snmpMIB
SNMPv2-MIB::sysORID.5 = OID: TCP-MIB::tcpMIB
SNMPv2-MIB::sysORID.6 = OID: IP-MIB::ip
SNMPv2-MIB::sysORID.7 = OID: UDP-MIB::udpMIB
SNMPv2-MIB::sysORID.8 = OID: SNMP-VIEW-BASED-ACM-MIB::vacmBasicGroup
SNMPv2-MIB::sysORID.9 = OID: SNMP-NOTIFICATION-MIB::snmpNotifyFullCompliance
SNMPv2-MIB::sysORID.10 = OID: NOTIFICATION-LOG-MIB::notificationLogMIB
SNMPv2-MIB::sysORDescr.1 = STRING: The MIB for Message Processing and Dispatching.
SNMPv2-MIB::sysORDescr.2 = STRING: The management information definitions for the SNMP User-based Security Model.
SNMPv2-MIB::sysORDescr.3 = STRING: The SNMP Management Architecture MIB.
SNMPv2-MIB::sysORDescr.4 = STRING: The MIB module for SNMPv2 entities
SNMPv2-MIB::sysORDescr.5 = STRING: The MIB module for managing TCP implementations
SNMPv2-MIB::sysORDescr.6 = STRING: The MIB module for managing IP and ICMP implementations
SNMPv2-MIB::sysORDescr.7 = STRING: The MIB module for managing UDP implementations
SNMPv2-MIB::sysORDescr.8 = STRING: View-based Access Control Model for SNMP.
SNMPv2-MIB::sysORDescr.9 = STRING: The MIB modules for managing SNMP Notification, plus filtering.
SNMPv2-MIB::sysORDescr.10 = STRING: The MIB module for logging SNMP Notifications.
SNMPv2-MIB::sysORUpTime.1 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.2 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.3 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.4 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.5 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.6 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.7 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.8 = Timeticks: (7) 0:00:00.07
SNMPv2-MIB::sysORUpTime.9 = Timeticks: (8) 0:00:00.08
SNMPv2-MIB::sysORUpTime.10 = Timeticks: (8) 0:00:00.08
Now let’s go back to the Zenoss Dashboard and go to the Infrastructure tab, then expand “Device Classes” -> “Server” -> “Linux”. Lastly click on “Add Device” -> “Add a Single Device” and fill out the information. Here is how mine looked like:
After the device was added and ‘modeled’, I saw similar information under the components section as I did for the other machines:
Now let’s monitor our RAID on the FreebSD Machine.
6. Add a Raid Check in Zenoss for the FreeBSD machine.
Instructions on how to run commands and gather information from the output are in the Admin Guide (in the Chapter Entitled “Monitoring Using ZenCommand”). I knew that Zenoss could use Nagios plugins, so I found two scripts online: one written in Python and the other in Perl. I downloaded the Perl script, made some changes to it (path changes and such), copied it to the Zenoss install, and ran a test:
freebsd:~>sudo cp check_aacraid.pl /usr/local/zenoss/libexec/check_aacraid
freebsd:~>sudo su - zenoss
$libexec/check_aacraid
controller status seems fine
$ echo $?
0
No errors were reported and the correct status was returned. I didn’t have a battery in the controller, so initially I removed that check but as a test re-enabling the check and re-running the command I would get this:
$ libexec/check_aacraid
battery status of controller 1 not optimal!
$ echo $?
1
We can see that the status is now 1 (Warning), which is expected. So the script was working just fine. Now we need to create a local template for our device and add a new “Data Source” to the template. If we just add the Data Source to the original template, it would impact any Machine that is part of that template. So go to the “Infrastructure” tab and select our FreeBSD machine. We will see this:
Then from the bottom left corner, select “Add Local Template”:
Then name the Template as you desire, here is how mine looked like:
Then you will see this:
Notice you new Template under the “Monitoring Templates” Section. Now click on the ‘+’ button and name your command, here is how mine looked like:
Once added, select the “Data Source” and click on the Gear -> “View and Edit Detail”:
then fill out all the fields like so:
and “Save” the config. Go back to the Zenoss server and as the zenoss user run the following:
zencommand run -d 192.168.1.101 -v10
There is a going to be a bunch of output, but here are the important snippets:
2013-02-24 15:50:15,451 DEBUG zen.SshClient: 192.168.1.101 SshClient has 1 commands to assign to channels (max = 10, current = 0)
2013-02-24 15:50:15,452 DEBUG zen.SshClient: 192.168.1.101 channel 0 SshConnection added command /usr/local/zenoss/libexec/check_aacraid
2013-02-24 15:50:15,453 DEBUG zen.SshClient: 192.168.1.101 channel 1 Opening command channel for /usr/local/zenoss/libexec/check_aacraid
...
...
2013-02-24 15:50:47,237 DEBUG zen.SshClient: 192.168.1.101 channel 1 CommandChannel exit code for /usr/local/zenoss/libexec/check_aacrai
d is 0: Success
2013-02-24 15:50:47,238 DEBUG zen.SshClient: 192.168.1.101 channel 0 SshConnection closing
2013-02-24 15:50:47,238 DEBUG zen.SshClient: 192.168.1.101 channel 1 CommandChannel closing command channel for command /usr/local/zenoss/libexec/check_aacraid with data: 'controller status seems fine'
2013-02-24 15:50:47,239 DEBUG zen.zencommand: Process check_aacraid stopped (0), 33.26 seconds elapsed
2013-02-24 15:50:47,239 DEBUG zen.zencommand: Queueing event {'manager': 'freebsd.dnsd.me', 'eventKey': 'Raid_Check', 'device': '192.168.1.101', 'eventClass': '/Cmd/Fail', 'summary': 'Cmd: /usr/local/zenoss/libexec/check_aacraid - Code: 0 - Msg: Success', 'component': 'Raid_Status', 'monitor': 'localhost', 'agent': 'zencommand', 'severity': 0}
Looks like it went through just fine (the appropriate return status is seen). I then modified the script to output how many disks are in the raid. Here is how the output of the command looks like after the change:
$ libexec/check_aacraid
controller status seems fine|disks=2
After make that addition, here is how output from the above zencommand looked like:
2013-02-24 18:40:57,103 DEBUG zen.zencommand: Queueing event {'manager': 'freebsd.dnsd.me', 'eventKey': 'Raid_Check', 'device': '192.168.1.101', 'eventClass': '/Status', 'summary': 'Cmd: /usr/local/zenoss/libexec/check_aacraid - Code: 0 - Msg: Success', 'component': 'Raid
_Status', 'monitor': 'localhost', 'agent': 'zencommand', 'severity': 0}
2013-02-24 18:40:57,103 DEBUG zen.zencommand: Total of 1 queued events
2013-02-24 18:40:57,104 DEBUG zen.zencommand: The result of "/usr/local/zenoss/libexec/check_aacraid" was "'controller status seems fine|disks=2'"
2013-02-24 18:40:57,108 DEBUG zen.zencommand: Storing disks = 2.0 into Devices/192.168.1.101/Raid_Check_disks
2013-02-24 18:40:57,108 DEBUG zen.RRDUtil: /usr/local/zenoss/perf/Devices/192.168.1.101/Raid_Check_disks.rrd: 2.0
2013-02-24 18:40:57,109 DEBUG zen.zencommand: RRD save result: 2.0
Now we can plot how many disks are online (we can see from the above output that a new RRD file has been generated), just like before. To plot it we first need to add a “Data Point” to our “Data Source”. This is done by going to the “Data Source” view and clicking on the our “Data Source” (Raid_Check in our case) and then selecting “Add Data Point”:
Then just call it “disks”.
Then under the “Graph Definitions”, do the same thing and create a graph called “disks”:
Now click on the “Data Point” called “disks” and then click on “Add Data Point to Graph” like so:
Then select the graph “disks” from the drop down menu and click add:
Lastly go the “Graphs” view and scroll down to the bottom and you will see a couple of plot points of our new graph:
As a test, I made the script return a bad value and I saw the following in my “Infrastructure” view:
Clicking on the warning showed me this:
We can even see the message that was returned from the script.
7. Zenoss Vs. Collectd and Munin
Pros
-
There is a command line tool to check status of the Zenoss system, it’s called zendmd. More information can be seen in the ZenDMD Tips. Here is a quick example:
$ zendmd Welcome to the Zenoss dmd command shell! 'dmd' is bound to the DataRoot. 'zhelp()' to get a list of commands. Use TAB-TAB to see a list of zendmd related commands. Tab completion also works for objects -- hit tab after an object name and '.' (eg dmd. + tab-key). >>> d=find ('Ubuntu') >>> for i in d.os.interfaces(): ... for a in i.ipaddresses(): ... print a.name(), a.getIpAddress() ... eth0 192.168.1.100/24
- The Web Interface is rich and easy to use
- Creating Custom Graphs is a breeze
- Has the capability of using Nagios Plugins
- ‘Agentless’ monitoring of Nodes, mostly uses SSH and SNMP
- Does it all: monitor, graph, notify, and much more
- Doesn’t depend on Apache, uses a Zope Instance for it’s web management portal
Cons
-
It’s a beast, the install comes with so many daemons installed
freebsd:~>ps auxw | grep zenoss | grep -v grep | wc -l 17
- Installs it’s own components, it even installs it’s own Python version
- Requires an External Database (MySQL)
- Doesn’t provide as much monitoring for FreeBSD nodes as for the Linux nodes
Other than being resource intensive, I actually liked the software. I also ran into other sites that mentioned Zabbix as being a good alternative and not as resource intensive:
So I will extend this series to one more post :)