×


Configure outbound checks in Nagios - How to do it ?

Outbound checks are used in federated and distributed monitoring environments, as well as environments where the monitoring server sends passive check results to external applications.

Here at Ibmi Media, as part of our Server Management Services, we regularly help our Customers to perform related Nagios configuration queries.

In this context, we shall look into how to configure outbound checks with Nagios.


How to Configure outbound checks with Nagios ?

1. Outbound Transfer APIs

Basically, there are two different APIs for handling outbound check transfers (passive checks) in Nagios XI:

  • NRDP.
  • Nagios Remote Data Processor.
  • A modern web-based API that operates over port 80 (HTTP) or port 443 (HTTPS).
  • HTTPS enables flexible security and encryption.
  • NSCA.
  • Nagios Service Check Acceptor.
  • Operates over TCP port 5667.
  • Historically used for passive check results.


2. Accessing Transfer Settings

Generally, The outbound check transfer settings page allows to configure both the NSCA and NRDP APIs.


3. Enabling Outbound Transfers

Outbound check transfers are disabled by default.

In order to enable outbound checks using either the NRDP or NSCA APIs, we must first enable outbound transfers.

To do this, check the Enable Outbound Transfers option and click the Update Settings button.

We can optionally prevent some checks from being transferred by using the global data filters option.


4. NRDP Configuration

In order to, enable outbound checks using the NRDP API, we must:

  • Firstly, check the Enable NRDP Output option.
  • Then, specify the IP Address and Authentication Token for the remote host that is accepting check results using NRDP.
  • Finally, the authentication token we specify must be the same authentication token specified on the target host or the check results will be ignored.


We can configure Nagios XI to send passive check results to up to three remote servers using the NRDP API.

Finally, click the Update Settings button to save the NRDP settings.


5. NSCA Configuration

In order to, enable outbound checks using the NSCA API, we must:

  • Firstly, check the Enable NSCA Output option.
  • Then, specify the IP Address, Encryption Method and Password for the remote host that is accepting check results using NSCA.
  • Next, the encryption method and password we specify must match the decryption method and password specified on the target host or the check results will be ignored.


We can configure Nagios XI to send passive check results to up to three remote servers using the NSCA API.

Finally, click the Update Settings button to save the NSCA settings.


6. Firewall Configuration

Usually, modification of firewall settings between the remote data sinks and the Nagios XI server may be required in order to allow outbound check results to be sent from Nagios XI.

The NRDP API works on TCP port 80 using the HTTP protocol or TCP port 443 using the HTTPS protocol.

NSCA uses a custom protocol that runs on TCP port 5667.

At the end, firewalls must be configured to allow inbound and outbound traffic over the ports used by the API(s) we choose to utilize for handling outbound checks.


[Need urgent assistance in fixing CyberPanel errors ? – We're available 24*7. ]


Conclusion

This article covers how to effectively Configure outbound checks with Nagios. Outbound checks are used in federated and distributed monitoring environments, as well as environments where the monitoring server sends passive check results to external applications. 


What is a distributed monitoring in Nagios ?

This is a method of scaling Nagios Xi and Nagios Core to monitor a lot of devices / machines - sometimes across different networks. Large organizations often want distributed monitoring, as do MSPs. Nagios Fusion's central dashboard can be ideal for distributed monitoring solutions. Both Nagios XI and Nagios Core can be configured for distributed monitoring.


What is a server ?

This is a dedicated computer system that generally runs databases, websites, etc. Servers are not used by people on a regular basis (as compared to workstations), but are rather used to run batch jobs, applications, and services.


What is passive check in Nagios ?

This is a check that is performed by an external application, operating system, or device and is submitted to Nagios Core or Nagios XI for processing.

Some monitoring agents - including NSCA, NCPA, and NRDP can be used to send passive checks to Nagios.

An SNMP trap is also considered a passive check.