Outils pour utilisateurs

Outils du site


Writing /app/www/public/data/meta/centreon/scripts-linux.meta failed
centreon:scripts-linux

Ceci est une ancienne révision du document !


check_A335_backup

 #!/bin/bash
 ##########################################################################################
 # Ajout de la ligne de commande pour nrpe dans: /etc/nagios/nrpe.d/check_A335_backup.cfg #
 # command[check_A335_backup]=/usr/lib/nagios/plugins/check_A335_backup.sh                #
 ##########################################################################################
 # Deplacement vers le dossier de recherche
 cd /mariadb/backup/log/
 # Recherche du fichier le + récent
 VAR1=$(ls -t | head -n1)
 # Recherche du mot pour OK
 VAR4=$(grep 'completed OK!' $VAR1)
 # Check fichier plus de 1 jour
 if [[ $(find "$VAR1" -mtime +1 -print) ]]; then
 echo "Log du jour absent"
 fi
 #Vérif si retour recherche vide
 if [[ -z  $VAR4  ]]; then
 echo "Backup KO"
 fi
 # Si fichier OK et backup OK alors OK
 if [ -n "$VAR4" ] ; then
 echo "Backup et fichier log OK"
 exit 0
 fi
 # Envois du resultat à Centreon
 while read line; do echo $line; done
 exit 2
 ######################################
 # Rendre le fichier executable       #
 # chmod +x check_A335_backup.sh      #
 # Pensez à redémarre le service      #
 # service nagios-nrpe-server restart #
 ######################################

check_by_ssh_erreurs_badgeuses.sh

 #!/bin/bash
 #set -x
 HOST=$1
 COMMAND=$(ssh -t -i /usr/lib64/nagios/plugins/.ssh/id_rsa_badg opteama@$HOST '{ sleep 10; echo "i tr"; sleep 10; } | axsh | grep "TO SEND"' | cut -c 15-15)
 #echo $COMMAND
 OUT=$?
  if [ $OUT -eq 1 ]
  then
      echo "Timeout"
      echo $COMMAND
      exit 1
  elif [ $OUT -ne 0 ]
  then
      echo "Unknown ERROR"
      echo $COMMAND
      exit 3
  else
  #echo "ERREURS BADGEUSE"
      RESULTAT=`echo $COMMAND`
      #echo $RESULTAT
      if [ -z $RESULTAT ]
      then echo "VALEUR DE SORTIE DE COMMANDE INEXISTANTE"
      exit 3
      fi
      if [ $RESULTAT -ne 0 ]
          then echo "ERREURS BADGEUSE (TO SEND different de zero): KO"
              sleep 60
              RESULTAT=`echo $COMMAND`
      fi
              if [ $RESULTAT -ne 0 ]
              then echo "ERREURS BADGEUSE (TO SEND different de zero): KO"
      exit 2
      fi
      echo "PAS D'ERREURS sur la BADGEUSE : OK"
      exit 0
  fi

Check_Certfif_asa

 #!/bin/bash
 #set -x
 #Adresse IP en parametre
 HOSTNAME=$1
 #nom utilisateur d'un profil de gestion des ASA
 USERNAME=SARANCIDBck01
 #mot de passe du profil de gestion des ASA
 PASSWORD=2k3zX4bV9i4hNaHl
 MONTH=(Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec)
 #date du jour
 NOW=`date +%Y%m%d`
 #variable stockant le niveau d'alerte Centreon ( 0: rien , 1: Warning, 2: Critical)
 sortie=0
 #convertir le mois de l'annee en lettre à chiffre
 #Le parametre à passer doit etre de la forme de la liste MONTH (ex: Jan)
 mois_chiffre() {
      local i=0
      local len=${#MONTH[@]}
      while [ $i -lt $len ];
      do
              if [[ "$1" == "${MONTH[$i]}" ]]
              then
                      let i++
                      echo "$i"
                      break
              fi
              let i++
      done
 }
 #verifie l'etat du status
 #mettre en parametre le status (ex: "Available")
 check_status() {
      stat=`echo $1 | cut -c 1-9`
      if [[ "$stat" != "Available" ]]
      then
              sortie=2
      fi
 }
 #permet de creer et de renvoyer la variable date du certificat
 #mettre les parametres dans l'ordre suivant : year month(lettre) day
 create_cert_date() {
      local mois=$(mois_chiffre $2)
      edate=$(date -d $1-$mois-$3 +"%Y%m%d")
      echo $edate
 }
 #renvoie le delta en jours entre deux dates
 #les parametres doivent etre : date_certif date_du_jour
 compare_date() {
      let DIFF=($(date +%s -d $1) - $(date +%s -d $2))/86400
      echo $DIFF
 }
 #section connexion à l'ASA et suite de commandes pour recuperer les certificats des ASA
 sshpass -p $PASSWORD ssh -q -o StrictHostKeyChecking=no $USERNAME@$HOSTNAME << 'EOF' | tee "/usr/lib64/nagios/plugins/cisco_asa_show_crypto/output$HOSTNAME.txt" &> /dev/null
 enable
 2k3zX4bV9i4hNaHl
 conf t
 pager 0
 end
 show crypto ca certificates
 exit
 EOF
 while read line; do
      #echo $line
      eval ARRAY=(`echo $line`)
      #echo ${ARRAY[0]}
      #Trustpoints
      if [[ ${ARRAY[0]} == "Associated" ]]
      then
              assos=${ARRAY[2]}
              #CRITICAL : date du certificat inferieur a 15 jours
              if [[ "$delta_date" -lt 15 ]]
              then
                      echo "CRITICAL $stat $delta_date $assos"
                      sortie=2
              #WARNING: date du certificat inferieur a 30 jours
              elif [[ "$delta_date" -lt 30 ]]
              then
                      echo "WARNING $stat $delta_date $assos"
                      if [[ "$sortie" -ne 2 ]]
                      then
                              sortie=3
                      fi
              fi
      fi
      #Status
      if [[ ${ARRAY[0]} == "Status:" ]]
      then
              check_status ${ARRAY[1]} $assos
      fi
      #End Date
      if [[ ${ARRAY[0]} == "end" ]]
      then
              end_jour=`echo ${ARRAY[5]} | cut -c 1-2`
              end_mois=`echo ${ARRAY[4]} | cut -c 1-3`
              end_annee=`echo ${ARRAY[6]} | cut -c 1-4`
              end_date=`create_cert_date $end_annee $end_mois $end_jour`
              delta_date=`compare_date $end_date $NOW`
              #echo "Jours restant avant expiration du certificat : $delta_date"
      fi
 done <<< "$(grep -e ^"CA Certificate" -e  ^"Certificate" -e "end   date:" -e "Associated" -e "Status:" 
 /usr/lib64/nagios/plugins/cisco_asa_show_crypto/output$HOSTNAME.txt)"
 rm -f /usr/lib64/nagios/plugins/cisco_asa_show_crypto/output$HOSTNAME.txt
 #Les certificats sont bons ou il n'y en a pas, on renvoie un output pour Centreon
 if [[ $sortie -eq 0 ]]
 then
      echo "Certificat(s) OK"
 fi
 exit $sortie

check_dispo_sla.sh

 #!/bin/bash
 #suppress error outputs
 #try to read vars from file, for windows and tests purpose
 if [ -f ./centreon_conf_local.bash ] ; then
  . ./centreon_conf_local.bash
 fi
 #set default JQ value should be OK on linux if jq is installed
 JQ=${JQ:-"jq"}
 #debug defincition for execution traces
 CENTREON_DEBUG=${CENTREON_DEBUG:-0}
 #regexp used for host
 CENTREON_HOST_REGEXP=${3:-P-A389-CENS}
 CENTREON_HOST_REGEXP=${CENTREON_HOST_REGEXP// /%20}
 #regexp used for service
 CENTREON_SVC_REGEXP=${4:-CANADA}
 CENTREON_SVC_REGEXP=${CENTREON_SVC_REGEXP// /%20}
 #centreon url
 CENTREON_URL="${5:-https://p-a389-vipp-001.mycorp.corp}"
 CENTREON_LOGIN=${1:-userapi_1}
 CENTREON_PASSWORD=${2:-Userapi1}
 #query centreon token
 TOKEN_QUERY_DATA="{\"security\": {\"credentials\": {\"login\": \"$CENTREON_LOGIN\",\"password\": \"$CENTREON_PASSWORD\""
 CENTREON_TOKEN=`curl -s -k -X POST -d "$TOKEN_QUERY_DATA" -H "Content-Type: application/json" -X POST $CENTREON_URL/centreon/api/beta/login |  $JQ -s '. 
 [0].security.token' | tr -d \" | sed -e "s/[\"\r]//g"  `
 #query used to request sstates
 CENTREON_QUERY="\{\"\$and\":\[\{\"service.description\":\{\"\$lk\":\"%$CENTREON_SVC_REGEXP%\"\}\},\{\"host.name\":\ 
 {\"\$lk\":\"%$CENTREON_HOST_REGEXP%\"\\\]\"
 #function to request data, was more complex at the beginning
 centreon_request() {
  # warning at the limit, no High availability with more than 50 instance
  curl -s -k -H "X-AUTH-TOKEN: ${CENTREON_TOKEN}" -H "Content-Type: application/json" -X GET "${CENTREON_URL}/centreon/api/beta/monitoring/services? 
search=$1&limit=50"
 }
 #print values used for execution
 if [ "$CENTREON_DEBUG" == "1" ]; then
  echo JQ: $JQ
  echo centreon_query: $CENTREON_QUERY
  echo centreon_token: $CENTREON_TOKEN
 else
  exec 2>/dev/null
 fi
 #print query
 if [ "$CENTREON_DEBUG" == "1" ]; then
  echo request for $CENTREON_QUERY
 fi
 # request data
 state=`centreon_request ${CENTREON_QUERY}`
 #show status codes
 if [ "$CENTREON_DEBUG" == "1" ]; then
  echo Results
  echo $state | $JQ  -r ".result | .[].status.code "
 fi
 # use a service group for that
 # compute result which is addition of all status code
 # result=`echo $state | $JQ  -r ".result | .[].status.code" | $JQ -s 'add' | tr -d \" | sed -e 's/[\r ]//g'`
 # compute result which is mulitplication of all status code
 values=`echo $state | $JQ  -r ".result | .[].status.code" | tr -d \" | sed -e 's/\r//g' `
 result=1
 for i in $values; do
  # echo "result * i : $r * $i"
  result=$((result*i))
  # echo ">> $r"
 done
 # result=`echo $state | $JQ  -r ".result | .[].status.code" | $JQ -s 'add' | tr -d \" | sed -e 's/[\r ]//g'`
 if [[ "$result" == "" ]] ; then
  AGGREGATION_OUPUT=3
  comment="Unknown: Probe Not runned properly"
 elif [[ $result == 0 ]] ; then
  AGGREGATION_OUPUT=0
  comment="OK: Nominal State"
 else
  AGGREGATION_OUPUT=2
  comment="Critical: Non Nominal State"
 fi
 if [ "$CENTREON_DEBUG" == "1" ]; then
  echo AGGREGATION_OUPUT: $AGGREGATION_OUPUT
 fi
 echo $comment"|"
 centreon_details=`echo $state | $JQ  -cr ".result | map( {host:.host.name, service:.description, status:.status.name,} ) " | sed -e "s/[}],/},\n/g"`
 for detail in "${centreon_details[@]}" ; do
  echo "$detail"
 done
 exit $AGGREGATION_OUPUT
centreon/scripts-linux.1688554157.txt.gz · Dernière modification : 2024/12/27 06:28 (modification externe)