I am trying to find info on monitoring our new 5220 Palo Alto Firewalls. I have looked and downloaded one .pl and i have it uploaded to the nagios server, but from there I am not sure what to do. I am not a strong Linux person nor have I setup a new .PL in 5-6 years.
Thank you for any help.
Monitoring Palo Alto 5220 appliance
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: Monitoring Palo Alto 5220 appliance
Here are some basic steps for walking through adding and setting up new plugins
https://assets.nagios.com/downloads/nag ... ios-XI.pdf
The basics to be sure is to test the plugin from the command line to make sure it is giving correct output before going any further to configure the command.
https://assets.nagios.com/downloads/nag ... ios-XI.pdf
The basics to be sure is to test the plugin from the command line to make sure it is giving correct output before going any further to configure the command.
Re: Monitoring Palo Alto 5220 appliance
Is a .pl a perl script? Can you provide the name or a link to it?
https://assets.nagios.com/downloads/nag ... ios-XI.pdf covers how to import and configure a new plugin in XI.
Luckily not a lot of Linux know how is needed beyond navigating to the directory it is stored in:
cd /usr/local/nagios/libexec
and running the plugin to verify the syntax and that it works. Usually running one of these:
./plugin_name
./plugin_name --help
will give you more info on exactly how to run the plugin.
https://assets.nagios.com/downloads/nag ... ios-XI.pdf covers how to import and configure a new plugin in XI.
Luckily not a lot of Linux know how is needed beyond navigating to the directory it is stored in:
cd /usr/local/nagios/libexec
and running the plugin to verify the syntax and that it works. Usually running one of these:
./plugin_name
./plugin_name --help
will give you more info on exactly how to run the plugin.
As of May 25th, 2018, all communications with Nagios Enterprises and its employees are covered under our new Privacy Policy.