Do you use an external hard drive, USB Flash drive or other removable media for your personal or company backups? Let’s encrypt it! Continue reading
I’m so not a gamer, but over the weekend I got the fun chance to record an episode of The Pixel Shadow with me as host. Continue reading
One of the worst things that can happen to your NEMS deployment is having your SD card fail. So keeping a current backup of your NEMS configuration is a smart idea.
Your NEMS Migrator snapshots are always accessible at http://NEMSIP/backup/ and will automatically generate and send a backup.nems file, which contains all the NEMS configuration settings, logs, data, etc. to allow an easy recovery by restoring to a new NEMS deployment.
Knowing this, it’s easy to add a NEMS backup to your daily backup script.
From your Linux server (where your backups run), simply add this to your backup task:
wget -O "/backup/backup.nems" http://NEMSIP/backup/ --user=YOURUSER --password=YOURPASSWORD
… where /backup/backup.nems is where you want it to output the download, NEMSIP is the actual internal IP address of your NEMS server and YOURUSER and YOURPASSWORD are those you set during nems-init. From there, I recommend you have your backup script run an rdiff-backup of your /backup folder (in this example) to allow for versioning.
Please Note: As of NEMS 1.2 NSClient++ is optional for monitoring of Windows computers (thanks to the addition of WMIC). If you’d like to use it, please follow the directions below.
- Grab the latest Windows client at https://www.nsclient.org/download/
- Install the client with the following settings:
- Select to install the “Generic mode” NSClient++.
- Choose “Complete installation” and if asked, choose to save config to ini file.
- Under “Allowed Hosts” it should read 127.0.0.1,NEMSIP (where NEMSIP is the IP address of your NEMS server)
- Clear the Password field for ease of deployment. NEMS sample scripts are setup to use NRPE without a password because I’m making the assumption that this is being deployed in a trusted LAN. If you do not blank the password here, you will have to edit all the scripts before NEMS will be able to communicate with this computer.
- Enable all modules and change the NRPE mode to Legacy. NEMS uses Nagios 3.5.1 at present, and I suppose that’s technically “Legacy”. 🙂
- Screen should look a little something like this:
- Add your Windows host to NEMS. If you are using NEMS 1.1+ you can use the template “ourwinserver” in nconf. Just change the hostname and the IP address.
Please note: If you have a software firewall running on your Windows machine, setup an exception for your NEMS server IP to gain access through ports 5666 and 12489.
Thanks for being an early-adopter! Whether you’re coming from NEMS 1.0 or its predecessor, nagiospi, I want to make it as easy as possible for you to get the latest and greatest, without having to reconfigure everything. It’s been exciting to see the NEMS project really catching on, and I endeavor to make it the best it can be. Your suggestions along the way have helped me focus on some great features for as NEMS continues to evolve.
NEMS 1.1+ has a nifty backup and export tool called NEMS Migrator. While it comes pre-packaged in 1.1+, I designed it specifically to run on legacy builds as well (NEMS 1.0 or nagiospi), giving you the opportunity to export your old configuration, deploy the latest version of NEMS, and then restore the configuration to NEMS. Easy peasy!
Here’s what you need to do:
Note: These instructions are for NEMS 1.0 or nagiospi only. Do not do this on NEMS 1.1+ as the tool is already built-in.
- SSH into your NEMS/nagiospi server.
- Become root: sudo su
- Update repository data. Type: apt-get update
- Install Git. Type: apt-get install git
- Install NEMS-Migrator in /tmp. Type:
cd /tmp && git clone https://github.com/Cat5TV/nems-migrator
- Create the backup config on your NEMS/nagiospi system. Type:
- If on NEMS 1.0: cd /tmp/nems-migrator && ./backup.sh
- If on nagiospi: cd /tmp/nems-migrator && ./nagiospi2nems.sh
- Download the backup to your computer by opening it in your web browser. In your favorite web browser, simply add /backup/ to the end of your NEMS/nagiospi server address. Eg., http://10.0.0.5/backup/
- Now that you have your backup.nems file, follow the instructions here to restore your configuration to a new version of NEMS.
The NEMS Migrator tool allows you to export/backup your NEMS configuration (backup.nems) as well as import a previous backup (through the Restore option).
The NEMS Migrator’s backup and restore options are great for keeping a safe backup without having to shutdown your NEMS server. Just download the file once in a while, or back it up automatically with your daily backup script.
NEMS Migrator is also helpful when upgrading from previous versions of NEMS, saving you having to reconfigure your NEMS deployment just to get the latest features.
I am a firm believer in redundancy, and protecting your data. What I’d like you to do is, export your migration file, then install NEMS on a new MicroSD card. Then boot from that and restore your NEMS Migrator backup. Once you’ve confirmed everything worked well, you can deprecate the old one safely. However, if something went wrong, you can contact me to fix it for you, and continue running from the old SD card in the interim.
How to Restore a NEMS Migrator Backup
Requires NEMS 1.2+
- Place your backup.nems file on a USB flash drive. You can access this directly from your web browser at http://NEMSIP/backup/ where NEMSIP is the IP address of the NEMS server you wish to backup.
- Deploy the version of NEMS you wish to restore the backup to. Please heed my Important Note above.
- Boot the new NEMS deployment and mount the USB flash drive.
- Determine the location of backup.nems in relationship to your mountpoint. For example, if you mounted the USB flash drive on /mnt/flash you may determine the location to be /mnt/flash/backup.nems
- Armed with that information, run the following command (use the full path to your backup.nems file):
1sudo nems-restore /mnt/flash/backup.nems
- Follow the prompts on screen to restore your configuration to the new NEMS deployment. If it fails for any reason, you can safely shut down and replace the SD card with your original deployment.
If you have any problems (or praise) please comment below.
The Nagios Remote Plugin Executor (NRPE) allows your Nagios Enterprise Monitoring Server to communicate with the Linux machines on your server to determine things like free disk space, CPU load, and detect possible issues that a simple ping can’t determine.
There are countless instructions online to download tar.gz files and install manually, or use a PPA to install via apt-get, but you’ll be surprised to note the needed packages are in fact already in your Debian (and by proxy, Ubuntu) repositories.
To install the needed NRPE client on Debian / Ubuntu / other Debian-based Linux operating systems:
apt-get install nagios-nrpe-server nagios-plugins
Don’t forget that you need to be root (Debian) or use sudo (Ubuntu).
Next, we just have to tell NRPE that it’s allowed to communicate with our Nagios server. On the client system, open the file /etc/nagios/nrpe.cfg
Find the line that reads: allowed_hosts=127.0.0.1
Now there are a few ways we can allow our server. First (and most obvious) is to add its IP address like this:
Where 192.168.0.5 is our Nagios/NEMS server.
Alternatively we can tell NRPE that it’s allowed to communicate with any local system:
Now, save the file and restart NRPE as follows:
service nagios-nrpe-server restart
And there we have it! Your Nagios/NEMS server should now be able to see your Linux machine.
Looking for a lightweight, affordable, easy-to-deploy enterprise monitoring server? Check out Nagios Enterprise Monitoring Server for Raspberry Pi 3!
For the past 9 years, all Category5 TV Network programming has been licensed under Creative Commons Attribution 2.5 Canada.
In an effort to ensure both our own protection from the commercial reuse of our freely available content as well as to protect our viewers from companies adding protection such as DRM to our content, we are now moving all Category5 TV Network programming, retroactively, to the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0).
Effective immediately under our new license, any commercial reuse of our material (eg., broadcasting on a commercial television channel, using our videos to generate revenue online, etc) must be approved in writing by myself.
Category5 TV remains entirely free for its viewers, no matter where they live in this big ol’ world of ours.
Enjoy the shows!
Here is the completed script I wrote on Episode 461. Make sure you check out the full episode for details on how to make this work for you.
/sbin/lvcreate -L10G -s -n lvm_snapshot /dev/ubuntu-mate-vg/root
/bin/mount /dev/ubuntu-mate-vg/lvm_snapshot /mnt/snapshot
/usr/bin/rdiff-backup -v5 --print-statistics \
--exclude /mnt/backup/ \
--include /mnt/snapshot/home/ \
--include /mnt/snapshot/etc/fstab \
--include /mnt/snapshot/var/log/ \
--exclude '**' \
/sbin/lvremove -f /dev/ubuntu-mate-vg/lvm_snapshot
And of course, here is the episode: