zabbix自定义监控
文章目录
自定义监控进程
配置监控脚本
[root@jiang etc]# mkdir /scripts
[root@jiang etc]# cd /scripts/
[root@jiang scripts]# vim check_proces.sh
#!/bin/bash
count=$(ps -ef|grep -Ev "grep|$0" | grep $1 | wc -l)
if [ $count -eq 0 ];then
echo '1'
else
echo '0'
fi
[root@jiang scripts]# chmod +x check_proces.sh
[root@jiang scripts]# ./check_httpd.sh
0
[root@jiang scripts]# ss -antl
State Recv-Q Send-Q Local Address:Port Peer Address:PortProcess
LISTEN 0 128 0.0.0.0:22 0.0.0.0:*
LISTEN 0 128 0.0.0.0:10050 0.0.0.0:*
LISTEN 0 128 *:80 *:*
LISTEN 0 128 [::]:22 [::]:*
[root@jiang scripts]# ./check_proces.sh zabbix
0
[root@jiang ~]# cd /usr/local/etc/
[root@jiang etc]# ls
zabbix_agentd.conf zabbix_agentd.conf.d
[root@jiang etc]# vim zabbix_agentd.conf
UnsafeUserParameters=1
UserParameter=check_proces[*],/bin/bash /scripts/check_proces.sh $1
[root@jiang etc]# pkill zabbix
[root@jiang etc]# zabbix_agentd
[root@jiang etc]# ss -antl
State Recv-Q Send-Q Local Address:Port Peer Address:PortProcess
LISTEN 0 128 0.0.0.0:22 0.0.0.0:*
LISTEN 0 128 0.0.0.0:10050 0.0.0.0:*
LISTEN 0 128 *:80 *:*
LISTEN 0 128 [::]:22 [::]:*
//到服务端检测
[root@zabbix ~]# zabbix_get -s 192.168.205.147 -k check_proces[httpd]
0
[root@zabbix ~]# zabbix_get -s 192.168.205.147 -k check_proces[mysql]
1
添加监控项
查看监控的数据
添加触发器
手动关闭httpd服务,触发报警
//关闭httpd
[root@jiang ~]# systemctl stop httpd
查看邮件
自定义监控日志
[root@jiang pyscripts-master]# ls
'#U5b9a#U65f6#U53d1#U5fae#U4fe1#U7fa4#U6d88#U606f.zip'
README.md
dmp4.py
log.py
mail_send.py
[root@jiang pyscripts-master]# mv log.py /scripts/
[root@jiang pyscripts-master]# cd /scripts/
[root@jiang scripts]# ls
check_httpd.sh check_proces.sh log.py
[root@jiang scripts]# ll
total 8
-rw-r--r--. 1 root root 0 Sep 6 18:49 check_httpd.sh
-rwxr-xr-x. 1 root root 119 Sep 6 18:54 check_proces.sh
-rw-r--r--. 1 root root 1854 Mar 22 2020 log.py
[root@jiang scripts]# chmod +x log.py
[root@jiang scripts]# ll
total 8
-rw-r--r--. 1 root root 0 Sep 6 18:49 check_httpd.sh
-rwxr-xr-x. 1 root root 119 Sep 6 18:54 check_proces.sh
-rwxr-xr-x. 1 root root 1854 Mar 22 2020 log.py
//添加权限
[root@jiang ~]# cd /var/log/httpd/
[root@jiang httpd]# ls
access_log error_log
[root@jiang httpd]# chmod 755 /var/log/
[root@jiang httpd]# chmod 755 /var/log/httpd/
[root@jiang httpd]# ll /var/log/httpd/
total 8
-rw-r--r--. 1 root root 0 Sep 6 17:49 access_log
-rw-r--r--. 1 root root 4604 Sep 6 21:05 error_log
[root@jiang scripts]# dnf -y install python36
[root@jiang scripts]# ./log.py /var/log/httpd/error_log
0
[root@jiang scripts]# ls /tmp/
logseek
systemd-private-6498ef2fc1ba48998e8e292ee1106ba8-httpd.service-qKpubI
vmware-root_869-3988752892
zabbix_agentd.log
zabbix_agentd.pid
zhang
[root@jiang scripts]# cat /tmp/logseek
4604[root@jiang scripts]#
//编写脚本
[root@jiang scripts]# cd /usr/local/etc/
[root@jiang etc]# ls
zabbix_agentd.conf zabbix_agentd.conf.d
[root@jiang etc]# vim zabbix_agentd.conf
UserParameter=check_logs[*],/scripts/log.py $1 $2 $3
//重启
[root@jiang etc]# pkill zabbix_agentd
[root@jiang etc]# zabbix_agentd
//去服务端检测key是否可用
[root@zabbix ~]# zabbix_get -s 192.168.205.147 -k check_logs[/var/log/httpd/error_log]
0
添加监控项
添加触发器
手动添加错误日志,触发报警
[root@jiang httpd]# echo 'Error' >> error_log