<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Debian 10 &#8211; Nagios Library</title>
	<atom:link href="https://library.nagios.com/tag/debian-10/feed/" rel="self" type="application/rss+xml" />
	<link>https://library.nagios.com</link>
	<description>Complete Nagios monitoring resources and documentation</description>
	<lastBuildDate>Thu, 26 Mar 2026 19:58:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://library.nagios.com/wp-content/uploads/2024/11/Nagios-Blue-N.svg</url>
	<title>Debian 10 &#8211; Nagios Library</title>
	<link>https://library.nagios.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Set Up Debian for Nagios Log Server</title>
		<link>https://library.nagios.com/training/set-up-debian-10-log-server/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:47:19 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Debian 10]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=48175</guid>

					<description><![CDATA[Setting up Debian 10 for log monitoring with Nagios Log Server (LS) is an important step in maintaining system health and security. Nagios Log Server offers a powerful, centralized solution for capturing and analyzing logs from multiple sources. This article outlines the necessary steps to prepare your Debian 10 system and configure Nagios LS for [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Setting up Debian 10 for log monitoring with Nagios Log Server (LS) is an important step in maintaining system health and security. Nagios Log Server offers a powerful, centralized solution for capturing and analyzing logs from multiple sources. This article outlines the necessary steps to prepare your Debian 10 system and configure Nagios LS for effective log monitoring and storage. By the end, you’ll have a fully operational log monitoring setup.</p>



<h2 class="wp-block-heading">Prerequisites </h2>



<p>The only prerequisite for setting up is installing the <code>curl</code> command. <code>curl</code> is a versatile tool used in Linux systems to transfer data from or to a server, supporting a variety of protocols such as HTTP, HTTPS, FTP, and more. It’s commonly used to download files, make API requests, or test network connections. To install curl we will need <code>sudo </code>or root permissions and use the command:</p>



<pre class="wp-block-code"><code>sudo apt install curl</code></pre>



<p>As long as you get some form of output you now have curl installed.</p>



<h2 class="wp-block-heading">Step 1: Run Commands listed in Log Server</h2>



<p>The exact commands we need to use in our instance of Debian 10 are listed inside of Nagios LS, so we will be going there and looking at the commands needed. To do this we will want to add a log source, specifically a Linux source. We will want to click the circled area in the image below and select to add a Linux source.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png"><img fetchpriority="high" decoding="async" width="719" height="113" src="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png" alt="add log source screenshot 720" class="wp-image-48092" title="How to Set Up Debian for Nagios Log Server 1" srcset="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png 719w, https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720-300x47.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720-360x57.png 360w" sizes="(max-width: 719px) 100vw, 719px" /></a><figcaption>How to Set Up Debian for Nagios Log Server 4</figcaption></figure>



<p>Now there are instructions here, we will be going over them as well as their intended output. The first command is:</p>



<pre class="wp-block-code"><code>curl -sS -O http://&lt;Nagios LS IP address&gt;/nagioslogserver/scripts/setup-linux.sh</code></pre>



<p>This command downloads the <code>setup-linux.sh</code> script from the Nagios Log Server URL and ensures it retains its original filename. Since the <code>-sS</code> flags suppress normal output, you won’t see anything unless there’s an error. If the download completes without issues, you can proceed to the next step by running the script with the following command:</p>



<pre class="wp-block-code"><code>sudo bash setup-linux.sh -s &lt;Nagios LS IP Address&gt; -p 5544</code></pre>



<p>This should give us the following output: </p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809.png"><img decoding="async" width="788" height="175" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809.png" alt="Screenshot 2025 02 18 144809" class="wp-image-48179" title="How to Set Up Debian for Nagios Log Server 2" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809.png 788w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809-300x67.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809-768x171.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-144809-360x80.png 360w" sizes="(max-width: 788px) 100vw, 788px" /></a><figcaption class="wp-element-caption">setup-linux.sh Output</figcaption></figure>



<p>With this it is all set up and should be sending Logs to Nagios Log Server.</p>



<h2 class="wp-block-heading">Step 2: Verify Logs</h2>



<p>Next, we need to verify that the Log Server is successfully receiving logs, and this step is straightforward. All you need to do is enter the IP address of your Debian 10 host where it prompts you to &#8216;Verify Incoming Logs.&#8217; This will confirm that the logs from your host are being properly sent to and received by the Log Server, ensuring everything is functioning as expected.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016.png"><img decoding="async" width="913" height="166" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016.png" alt="Screenshot 2025 02 18 145016" class="wp-image-48178" title="How to Set Up Debian for Nagios Log Server 3" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016.png 913w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016-300x55.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016-768x140.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-145016-360x65.png 360w" sizes="(max-width: 913px) 100vw, 913px" /></a><figcaption class="wp-element-caption">Log Server Verification</figcaption></figure>



<p>As you can see, the message confirms that logs are being received from our new host. This means that all the setup steps have been completed successfully, and Nagios Log Server is now properly receiving logs from the newly added host.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>By following these steps, you’ve successfully set up Nagios Log Server on your Debian 10 system, allowing you to capture and analyze logs efficiently. The process of configuring your server, running the necessary commands, and verifying log reception ensures that Nagios LS is fully operational, giving you the tools to monitor and manage your system’s health and security.</p>



<p>Now that your log monitoring is set up, you may want to explore additional monitoring methods for a more comprehensive approach. For system performance and resource monitoring, consider setting up <strong><a href="https://library.nagios.com/training/how-to-monitor-an-debian-device-with-ncpa/" target="_blank" data-type="link" data-id="https://library.nagios.com/training/ubuntu-22-install-ncpa/" rel="noreferrer noopener">NCPA on Debian 10</a></strong>, a flexible agent that integrates seamlessly with Nagios XI. Alternatively, you can also use <strong><a href="https://library.nagios.com/training/debian-10-snmp/" target="_blank" data-type="link" data-id="https://library.nagios.com/training/how-to-monitor-ubuntu-22-using-snmp/" rel="noreferrer noopener">SNMP on Debian 10</a></strong> for monitoring with Nagios XI.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Monitor a Debian Device with NCPA</title>
		<link>https://library.nagios.com/training/how-to-monitor-an-debian-device-with-ncpa/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Fri, 14 Feb 2025 21:51:05 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Debian 10]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[NCPA]]></category>
		<category><![CDATA[Operating System Monitoring]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=46846</guid>

					<description><![CDATA[This guide will show you two methods to install the Nagios Cross-Platform Agent (NCPA) on your Debian 10 system. It&#8217;s essential to have root privileges to execute the necessary commands, so I recommend using sudo -i to switch to the root user before proceeding. Method 1, Step 1: Installing via the Repository (Recommended) The preferred [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>This guide will show you two methods to install the Nagios Cross-Platform Agent (NCPA) on your Debian 10 system. It&#8217;s essential to have root privileges to execute the necessary commands, so I recommend using <code>sudo -i</code> to switch to the root user before proceeding.</p>



<h2 class="wp-block-heading">Method 1, Step 1: Installing via the Repository (Recommended)</h2>



<p>The preferred method for installing NCPA is through the repository. This approach involves a series of simple steps that can all be executed from the command line.</p>



<p></p>



<p><strong>Add the Nagios repository to your sources list:</strong> To do this, execute the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="echo &quot;deb https://repo.nagios.com/deb/$(lsb_release -cs) /&quot; &gt; /etc/apt/sources.list.d/nagios.list" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">echo &quot;deb https://repo.nagios.com/deb/$(lsb_release -cs) /&quot; &gt; /etc/apt/sources.list.d/nagios.list</span></span></code></pre></div>



<p>This command will add the repository to your system, ensuring you have access to the NCPA package.</p>



<p><strong>Add the GPG key for the repository:</strong> The GPG key is required to verify the integrity of the packages you&#8217;ll download. You might encounter a warning saying that the command used is deprecated, but don&#8217;t worry—it will still function correctly. To add the GPG key, use:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="wget -qO - https://repo.nagios.com/GPG-KEY-NAGIOS-V3 | apt-key add -" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">wget -qO - https://repo.nagios.com/GPG-KEY-NAGIOS-V3 | apt-key add -</span></span></code></pre></div>



<p>If successful, you should see the message <code>OK</code>, confirming the key was added correctly.</p>



<p><strong>Update your package list:</strong> Now that the repository and key are set up, update your package lists:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="apt-get update" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">apt-get update</span></span></code></pre></div>



<p><strong>Install the NCPA package:</strong> With the update complete, you can now install NCPA using the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="apt-get install ncpa" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">apt-get install ncpa</span></span></code></pre></div>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142214.png"><img loading="lazy" decoding="async" width="661" height="337" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142214.png" alt="Screenshot 2025 02 14 142214" class="wp-image-46862" title="How to Monitor a Debian Device with NCPA 5" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142214.png 661w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142214-300x153.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142214-360x184.png 360w" sizes="(max-width: 661px) 100vw, 661px" /></a><figcaption class="wp-element-caption">Output of install NCPA</figcaption></figure>



<h2 class="wp-block-heading">Step 2: Configure NCPA</h2>



<p>After installing NCPA, the agent will work out of the box, but it&#8217;s highly recommended to configure the API token for added security. Without this step, the default token will be used, which might not be ideal for your environment. Enter the following into your command line:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo nano /usr/local/ncpa/etc/ncpa.cfg" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo nano /usr/local/ncpa/etc/ncpa.cfg</span></span></code></pre></div>



<p>In the configuration file, look for the line that reads: <em>community_string = mytoken</em>.</p>



<figure class="wp-block-image size-full is-resized"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448.png"><img loading="lazy" decoding="async" width="780" height="131" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448.png" alt="Screenshot 2025 02 14 142448" class="wp-image-46864" style="width:800px;height:auto" title="How to Monitor a Debian Device with NCPA 6" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448.png 780w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448-300x50.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448-768x129.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-142448-360x60.png 360w" sizes="(max-width: 780px) 100vw, 780px" /></a><figcaption class="wp-element-caption">Community String in ncpa.cfg</figcaption></figure>



<p>Replace <code>mytoken</code> with a secure token of your choice. After updating the token, press <code>CTRL + X</code>, then press <code>Y</code> to confirm the changes, and hit <code>Enter</code> to save the file. We want to use the token we made so there is one final step, which is to restart our NCPA. At the moment its API token that will be accepted is still the default token. We want it to use the newly created one. To do this we enter the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="systemctl restart ncpa" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">systemctl restart ncpa</span></span></code></pre></div>



<p>This will restart the service, and NCPA will now use the newly configured token.</p>



<h2 class="wp-block-heading">Step 3: Configuring Firewall</h2>



<p>If you&#8217;re running a firewall on your system, you&#8217;ll need to allow traffic on port 5693, which is used by NCPA. For Ubuntu systems with UFW (Uncomplicated Firewall) enabled, follow these steps to configure the firewall and allow NCPA traffic:</p>



<p><strong>Create the directory for UFW application profiles:</strong> First, create the necessary directory where UFW can store application profiles:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo mkdir -p /etc/ufw/applications.d" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo mkdir -p /etc/ufw/applications.d</span></span></code></pre></div>



<p><strong>Create a custom application profile for NCPA:</strong> Next, set up a custom profile for NCPA by running the following commands:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo sh -c &quot;echo '[NCPA]' &gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'title=Nagios Cross Platform Agent' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'description=Nagios Monitoring Agent' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'ports=5693/tcp' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;[NCPA]&#039; &gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;title=Nagios Cross Platform Agent&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;description=Nagios Monitoring Agent&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;ports=5693/tcp&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span></code></pre></div>



<p><strong>Allow NCPA traffic through the firewall:</strong> Once the profile is set up, allow NCPA through the firewall with:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo ufw allow NCPA" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo ufw allow NCPA</span></span></code></pre></div>



<p><strong>Reload the firewall to apply the changes:</strong> Finally, reload UFW to apply the changes:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo ufw reload" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo ufw reload</span></span></code></pre></div>



<h2 class="wp-block-heading">Step 4 (Optional): Confirm NCPA installation</h2>



<p>This step is straightforward. Simply open a web browser and navigate to <code>https://&lt;host-ip-address&gt;:5693</code>.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958.png"><img loading="lazy" decoding="async" width="1024" height="235" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1024x235.png" alt="Screenshot 2025 02 05 101958" class="wp-image-43946" title="How to Monitor a Debian Device with NCPA 7" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1024x235.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-300x69.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-768x176.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1536x353.png 1536w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958.png 1894w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">NCPA GUI</figcaption></figure>



<p>This will bring you to the login page, where you can enter your token. The purpose of this step is to verify that the NCPA is up and running, that it is reading the token correctly, and that remote access is functional.</p>



<h2 class="wp-block-heading">Step 5: Configuring on Nagios XI</h2>



<p>The final step involves configuring Nagios XI. To do this, navigate to the <em>Configuration Wizards</em> section in Nagios and select the <em>NCPA Wizard</em>.</p>



<ol class="wp-block-list">
<li>Navigate to the <em>Configuration Wizards</em> section in Nagios XI and select the <em>NCPA Wizard</em>.</li>



<li>Enter the necessary information, including the IP address, the token, and the system type (Ubuntu in this case).</li>



<li>During the setup, you will be prompted to choose a name for your host and select the services you want to monitor with NCPA.</li>
</ol>



<p>Once the setup is complete, the new host will appear in your monitoring dashboard. You can navigate to the <em>Host Status</em> section to confirm that it is being monitored properly.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707.png"><img loading="lazy" decoding="async" width="1024" height="482" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707-1024x482.png" alt="Screenshot 2025 02 14 153707" class="wp-image-46892" title="How to Monitor a Debian Device with NCPA 8" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707-1024x482.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707-300x141.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707-768x361.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707-360x169.png 360w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-14-153707.png 1403w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">New Host Status</figcaption></figure>



<h2 class="wp-block-heading">Conclusion</h2>



<p>By following this guide, you have successfully installed and configured the Nagios Cross-Platform Agent (NCPA) on Debian 10. You are now able to monitor the system using Nagios XI. If any issues are encountered, we recommend using the <a href="https://support.nagios.com/forum/" data-type="link" data-id="https://support.nagios.com/forum/" target="_blank" rel="noopener">Nagios Support Forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Monitoring Debian 10 with SNMP</title>
		<link>https://library.nagios.com/training/debian-10-snmp/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Fri, 14 Feb 2025 18:51:02 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Debian 10]]></category>
		<category><![CDATA[SNMP]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=46544</guid>

					<description><![CDATA[The Simple Network Management Protocol (SNMP) is widely used for monitoring network devices and servers. It is possible to integrate SNMP monitoring onto your Debian 10 operating system. This guide will walk through the process of installing, configuring, and setting it up on Nagios XI. Prerequisites Step 1: Install SNMP and SNMPD Most Debian systems [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>The Simple Network Management Protocol (SNMP) is widely used for monitoring network devices and servers. It is possible to integrate SNMP monitoring onto your Debian 10 operating system. This guide will walk through the process of installing, configuring, and setting it up on Nagios XI.</p>



<h2 class="wp-block-heading">Prerequisites</h2>



<ul class="wp-block-list">
<li>A working instance of Nagios XI</li>



<li>A internet connection</li>
</ul>



<h2 class="wp-block-heading">Step 1: Install SNMP and SNMPD</h2>



<p>Most Debian systems don&#8217;t come with any of the SNMP tools installed by default, so we will start by installing the necessary tools. We will be starting by updating our package lists using the following command:</p>



<pre class="wp-block-code has-d-4-d-4-d-4-color has-text-color has-875-rem-font-size"><code>sudo apt update</code></pre>



<p>Now we will want to install the SNMP Daemon (<code>snmpd</code>). This is the set of tools responsible for allowing SNMP enabled tools to grab data from the system. We will also be installing <code>snmp </code>for various command line tools, mainly <code>snmpwalk </code>for testing purposes. We will install this by using the command:</p>



<pre class="wp-block-code"><code>sudo apt install snmpd snmp</code></pre>



<h2 class="wp-block-heading">Step 2: Configure SNMP</h2>



<p>Currently the only SNMP requests that the host will respond to will come from the local host. While this is can be useful for testing configuration, we want this to be accessible to Nagios XI. To do this we need to edit <code>snmpd.conf</code>, we will do this with the command:</p>



<pre class="wp-block-code"><code>sudo nano /etc/snmp/snmpd.conf</code></pre>



<p>We are looking for a few sections in this file, first is the <code>agentAddress</code>. The file comes with a commented-out section that allows any IP address to be used, its also possible to change it to the IP address of your Nagios XI instance, however both will work for our purposes. The below image shows it after the change.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140951.png"><img loading="lazy" decoding="async" width="611" height="166" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140951.png" alt="snmp agentAddress" class="wp-image-46765" title="Monitoring Debian 10 with SNMP 9" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140951.png 611w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140951-300x82.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140951-360x98.png 360w" sizes="(max-width: 611px) 100vw, 611px" /></a><figcaption class="wp-element-caption">agentAddress in snmpd.conf</figcaption></figure>



<p>This makes the system accessible through SNMP, but we can get no information as it is, now we need to edit the views. </p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140928.png"><img loading="lazy" decoding="async" width="396" height="63" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140928.png" alt="snmp views" class="wp-image-46766" title="Monitoring Debian 10 with SNMP 10" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140928.png 396w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140928-300x48.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-140928-360x57.png 360w" sizes="(max-width: 396px) 100vw, 396px" /></a><figcaption class="wp-element-caption">system views in snmpd.conf</figcaption></figure>



<p>These SNMP view definitions specify which parts of the MIB tree are accessible to users. The first line grants access to standard system-related information (under&nbsp;<code>.1.3.6.1.2.1</code>), while the second allows access to enterprise-specific objects (under&nbsp;<code>.1.3.6.1.4.1</code>), thereby controlling the visibility of SNMP data for monitoring and management purposes. Now we have one last thing to configure is the <code>rocommunity</code> line. This will act as a password for SNMP clients to retrieve data. We will be using the default string &#8216;public&#8217; for simplicity, but we recommend choosing a more secure word of your choice. </p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141420-1.png"><img loading="lazy" decoding="async" width="427" height="117" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141420-1.png" alt="snmp rocommunity " class="wp-image-46768" title="Monitoring Debian 10 with SNMP 11" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141420-1.png 427w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141420-1-300x82.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141420-1-360x99.png 360w" sizes="(max-width: 427px) 100vw, 427px" /></a><figcaption class="wp-element-caption">rocommunity in snmpd.conf</figcaption></figure>



<h2 class="wp-block-heading">Step 3: Restart the Service</h2>



<p>The next step is to restart the SNMP service so that the changes take effect. To do this, simply run the following command:</p>



<pre class="wp-block-code"><code>sudo service snmpd restart</code></pre>



<p>This will restart the SNMP service, and you shouldn’t receive any output if everything is configured correctly. If you do get output, it likely indicates an error in the&nbsp;<code>snmpd.conf</code>&nbsp;file—most often a typo in one of the lines. Please review the file and check for any mistakes. Once that’s sorted, we’ll want to verify that our configurations are working. To do this, we can use the&nbsp;<code>snmpwalk</code>&nbsp;command locally. Alternatively, if you have access to the Nagios XI Linux host, you can perform the test from there as well. The command to use is:</p>



<pre class="wp-block-code"><code>snmpwalk -v 2c -c &lt;rocommunity&gt; localhost/&lt;ip address&gt;</code></pre>



<p>You should receive a very long output, whether you’re testing locally or through the Nagios XI Linux host. If this happens, it confirms that SNMP is set up correctly. It’s even better if you’re able to get it working through the Nagios XI Linux host, as this will verify that the system is correctly receiving and processing SNMP data for monitoring.</p>



<h2 class="wp-block-heading">Step 4: Set up on Nagios XI</h2>



<p>With everything set up, we can now configure monitoring through Nagios XI using the Linux SNMP Wizard. You’ll need to enter the IP address of your Ubuntu device along with the&nbsp;<code>rocommunity</code>&nbsp;string. The SNMP daemon supports multiple versions of SNMP, so the default settings for both the SNMP version and port should work perfectly.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809.png"><img loading="lazy" decoding="async" width="1024" height="563" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809-1024x563.png" alt="Screenshot 2025 02 13 141809" class="wp-image-46771" title="Monitoring Debian 10 with SNMP 12" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809-1024x563.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809-300x165.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809-768x422.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809-360x198.png 360w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-141809.png 1231w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Linux SNMP Wizard</figcaption></figure>



<p>After configuring the settings, you can choose the hostname and select any services you want to monitor through SNMP. Once these steps are completed, your host will be set up for monitoring. By clicking on the hostname, you’ll see that it is being actively monitored and collecting data for the selected services.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048.png"><img loading="lazy" decoding="async" width="1024" height="494" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048-1024x494.png" alt="Screenshot 2025 02 13 142048" class="wp-image-46773" title="Monitoring Debian 10 with SNMP 13" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048-1024x494.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048-300x145.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048-768x371.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048-360x174.png 360w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142048.png 1311w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Host Status for SNMP Host</figcaption></figure>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040.png"><img loading="lazy" decoding="async" width="1024" height="404" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040-1024x404.png" alt="Screenshot 2025 02 13 142040" class="wp-image-46772" title="Monitoring Debian 10 with SNMP 14" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040-1024x404.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040-300x118.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040-768x303.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040-360x142.png 360w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-13-142040.png 1370w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Services of new Host</figcaption></figure>



<h2 class="wp-block-heading">Conclusion </h2>



<p>With these steps, we’ve successfully set up Debian 10 to be monitored using SNMP with Nagios XI. If you encounter any issues, please refer to the&nbsp;<a href="https://support.nagios.com/forum/" target="_blank" rel="noreferrer noopener">Nagios Support Forum</a>&nbsp;for assistance.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
