1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Creating a Custom Nagios Plugin

Published by Mike Solinap
on April 13, 2012

Nagios is an invaluable tool to help monitor a customer’s infrastructure.  Last year, I explained how easy it was to be able to integrate Network Appliance health checks.  In fact, Nagios provides a plethora of out of the box plugins.  Additional plugins are available via the Nagios Exchange site.  The most common applications and protocols can be monitored without any additional software or custom coding.  However, Nagios is just as easily extensible for any checks that you’d like to perform that aren’t readily available.

As part of SPK’s network management service, we find that all customers have very specific environments.  Not only is it common to find custom applications, but customers may also require a varying level of visibility into those apps.  For instance, the out of the box check_http script not only can verify connectivity to a web server, but it also can verify a specific string that should be returned.  But what we if we want dive much deeper?  Can we tell if the application throws any critical back-end errors during the login attempt?  What if logins never fail, but performance slowly degrades?  How can we be alerted to such situations?

These situations call for functionality beyond what the out-of-the box plugins can provide.  Writing a custom plugin might sound like a daunting task, but if you follow my simple guidelines and troubleshooting steps, you’ll be off and running in no time.  Read further on how you can create your own custom Nagios plugins.

Have a special situation that requires monitoring?  Let me know how I can help you integrate a Nagios monitoring solution.

Mike Solinap
Sr. Systems Integrator
SPK & Associates

Latest White Papers

Atlassian Cloud: Understanding Zero Trust Security

Atlassian Cloud: Understanding Zero Trust Security

Where To Start & Why It Matters What is the Atlassian Cloud Zero Trust Security model? Well, for decades, enterprise security controls were built to protect a large, single perimeter around a corporation. Often described as castle-and-moat security, This approach...

Related Resources

CloudBees SDA:  Software Delivery Without Silos

CloudBees SDA:  Software Delivery Without Silos

Tired of missing deadlines, and only measuring performance of departments, but not of your entire software delivery organization? This blog will show you how CloudBees Software Delivery Automation (CloudBees SDA) can break down silos, drive DevOps mentality and...

Migrate Jira and Confluence To The Cloud

Migrate Jira and Confluence To The Cloud

Many businesses want to migrate Jira to the Cloud. In this case study we explore the common migration challenges. You'll also discover how SPK helped a leading national consumer financing company overcome their own migration experience.  The Migrate Jira To Cloud...