<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Ubuntu 22 &#8211; Nagios Library</title>
	<atom:link href="https://library.nagios.com/tag/ubuntu-22/feed/" rel="self" type="application/rss+xml" />
	<link>https://library.nagios.com</link>
	<description>Complete Nagios monitoring resources and documentation</description>
	<lastBuildDate>Thu, 02 Apr 2026 21:50:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://library.nagios.com/wp-content/uploads/2024/11/Nagios-Blue-N.svg</url>
	<title>Ubuntu 22 &#8211; Nagios Library</title>
	<link>https://library.nagios.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Set Up Ubuntu 22 for Nagios Log Server</title>
		<link>https://library.nagios.com/training/ubuntu-22-log-server/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:47:42 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Ubuntu 22]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=44283</guid>

					<description><![CDATA[Setting up Ubuntu 22 for log monitoring with Nagios Log Server (LS) is an important step in maintaining system health and security. Nagios Log Server offers a powerful, centralized solution for capturing and analyzing logs from multiple sources. This article outlines the necessary steps to prepare your Ubuntu 22 system and configure Nagios LS for [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Setting up Ubuntu 22 for log monitoring with Nagios Log Server (LS) is an important step in maintaining system health and security. Nagios Log Server offers a powerful, centralized solution for capturing and analyzing logs from multiple sources. This article outlines the necessary steps to prepare your Ubuntu 22 system and configure Nagios LS for effective log monitoring and storage. By the end, you’ll have a fully operational log monitoring setup.</p>



<h2 class="wp-block-heading">Prerequisites </h2>



<p>The only prerequisite for setting up is installing the <code>curl</code> command. <code>curl</code> is a versatile tool used in Linux systems to transfer data from or to a server, supporting a variety of protocols such as HTTP, HTTPS, FTP, and more. It’s commonly used to download files, make API requests, or test network connections. To install curl we will need <code>sudo </code>or root permissions and use the command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)"><span role="button" tabindex="0" data-code="sudo apt install curl" style="color:#D4D4D4;display:none" aria-label="Copy" class="code-block-pro-copy-button"><svg xmlns="http://www.w3.org/2000/svg" style="width:24px;height:24px" fill="none" viewBox="0 0 24 24" stroke="currentColor" stroke-width="2"><path class="with-check" stroke-linecap="round" stroke-linejoin="round" d="M4.5 12.75l6 6 9-13.5"></path><path class="without-check" stroke-linecap="round" stroke-linejoin="round" d="M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6"></path></svg></span><pre class="shiki dark-plus" style="background-color: #1E1E1E" tabindex="0"><code><span class="line"><span style="color: #D4D4D4">sudo apt install curl</span></span></code></pre></div>



<p>As long as you get some form of output you now have curl installed.</p>



<h2 class="wp-block-heading">Step 1: Run Commands Listed in Log Server</h2>



<p>The exact commands we need to use in our instance of Ubuntu 22 are listed inside of Nagios LS, so we will be going there and looking at the commands needed. To do this we will want to add a log source, specifically a Linux source. We will want to click the circled area in the image below and select to add a Linux source.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png"><img fetchpriority="high" decoding="async" width="719" height="113" src="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png" alt="add log source screenshot 720" class="wp-image-48092" title="How to Set Up Ubuntu 22 for Nagios Log Server 1" srcset="https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720.png 719w, https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720-300x47.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/add_log_source_screenshot_720-360x57.png 360w" sizes="(max-width: 719px) 100vw, 719px" /></a><figcaption>How to Set Up Ubuntu 22 for Nagios Log Server 4</figcaption></figure>



<p>Now there are instructions here, we will be going over them as well as their intended output. The first command is:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)"><span role="button" tabindex="0" data-code="curl -sS -O http://<Nagios LS IP address&gt;/nagioslogserver/scripts/setup-linux.sh" style="color:#D4D4D4;display:none" aria-label="Copy" class="code-block-pro-copy-button"><svg xmlns="http://www.w3.org/2000/svg" style="width:24px;height:24px" fill="none" viewBox="0 0 24 24" stroke="currentColor" stroke-width="2"><path class="with-check" stroke-linecap="round" stroke-linejoin="round" d="M4.5 12.75l6 6 9-13.5"></path><path class="without-check" stroke-linecap="round" stroke-linejoin="round" d="M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6"></path></svg></span><pre class="shiki dark-plus" style="background-color: #1E1E1E" tabindex="0"><code><span class="line"><span style="color: #D4D4D4">curl -sS -O http://&lt;Nagios LS IP address&gt;/nagioslogserver/scripts/setup-linux.sh</span></span></code></pre></div>



<p>This command downloads the <code>setup-linux.sh</code> script from the Nagios Log Server URL and ensures it retains its original filename. Since the <code>-sS</code> flags suppress normal output, you won’t see anything unless there’s an error. If the download completes without issues, you can proceed to the next step by running the script with the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)"><span role="button" tabindex="0" data-code="sudo bash setup-linux.sh -s <Nagios LS IP Address&gt; -p 5544" style="color:#D4D4D4;display:none" aria-label="Copy" class="code-block-pro-copy-button"><svg xmlns="http://www.w3.org/2000/svg" style="width:24px;height:24px" fill="none" viewBox="0 0 24 24" stroke="currentColor" stroke-width="2"><path class="with-check" stroke-linecap="round" stroke-linejoin="round" d="M4.5 12.75l6 6 9-13.5"></path><path class="without-check" stroke-linecap="round" stroke-linejoin="round" d="M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6"></path></svg></span><pre class="shiki dark-plus" style="background-color: #1E1E1E" tabindex="0"><code><span class="line"><span style="color: #D4D4D4">sudo bash setup-linux.sh -s &lt;Nagios LS IP Address&gt; -p 5544</span></span></code></pre></div>



<p>This should give us the following output: </p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606.png"><img decoding="async" width="933" height="178" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606.png" alt="setup-linux.sh Output" class="wp-image-48139" title="How to Set Up Ubuntu 22 for Nagios Log Server 2" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606.png 933w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606-300x57.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606-768x147.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154606-360x69.png 360w" sizes="(max-width: 933px) 100vw, 933px" /></a><figcaption class="wp-element-caption">setup-linux.sh Output</figcaption></figure>



<p>With this it is all set up and should be sending Logs to Nagios Log Server.</p>



<h2 class="wp-block-heading">Step 2: Verify Logs</h2>



<p>Next, we need to verify that the Log Server is successfully receiving logs, and this step is straightforward. All you need to do is enter the IP address of your Ubuntu 22 host where it prompts you to &#8216;Verify Incoming Logs.&#8217; This will confirm that the logs from your host are being properly sent to and received by the Log Server, ensuring everything is functioning as expected.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647.png"><img decoding="async" width="929" height="159" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647.png" alt="Log Server Verification" class="wp-image-48155" title="How to Set Up Ubuntu 22 for Nagios Log Server 3" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647.png 929w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647-300x51.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647-768x131.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-18-154647-360x62.png 360w" sizes="(max-width: 929px) 100vw, 929px" /></a><figcaption class="wp-element-caption">Log Server Verification</figcaption></figure>



<p>As you can see, the message confirms that logs are being received from our new host. This means that all the setup steps have been completed successfully, and Nagios Log Server is now properly receiving logs from the newly added host.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>By following these steps, you’ve successfully set up Nagios Log Server on your Ubuntu 22 system, allowing you to capture and analyze logs efficiently. The process of configuring your server, running the necessary commands, and verifying log reception ensures that Nagios LS is fully operational, giving you the tools to monitor and manage your system’s health and security.</p>



<p>Now that your log monitoring is set up, you may want to explore additional monitoring methods for a more comprehensive approach. For system performance and resource monitoring, consider setting up <strong><a href="https://library.nagios.com/training/ubuntu-22-install-ncpa/" target="_blank" data-type="link" data-id="https://library.nagios.com/training/ubuntu-22-install-ncpa/" rel="noreferrer noopener">NCPA on Ubuntu 22</a></strong>, a flexible agent that integrates seamlessly with Nagios XI. Alternatively, you can also use <strong><a href="https://library.nagios.com/training/how-to-monitor-ubuntu-22-using-snmp/" target="_blank" data-type="link" data-id="https://library.nagios.com/training/how-to-monitor-ubuntu-22-using-snmp/" rel="noreferrer noopener">SNMP on Ubuntu 22</a></strong> for monitoring with Nagios XI.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Monitor Ubuntu 22 using SNMP</title>
		<link>https://library.nagios.com/training/how-to-monitor-ubuntu-22-using-snmp/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Wed, 12 Feb 2025 16:17:24 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Operating System Monitoring]]></category>
		<category><![CDATA[SNMP]]></category>
		<category><![CDATA[Ubuntu 22]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=43967</guid>

					<description><![CDATA[Simple Network Management Protocol (SNMP) is a widely used protocol designed to manage and monitor network devices such as routers, switches, servers, and printers. It allows administrators to gather information on network performance, troubleshoot issues, and configure devices remotely. By setting up SNMP on Ubuntu 22, you can enable comprehensive monitoring through Nagios XI, making [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Simple Network Management Protocol (SNMP) is a widely used protocol designed to manage and monitor network devices such as routers, switches, servers, and printers. It allows administrators to gather information on network performance, troubleshoot issues, and configure devices remotely. By setting up SNMP on Ubuntu 22, you can enable comprehensive monitoring through Nagios XI, making it easier to track system health and performance.</p>



<h2 class="wp-block-heading">Prerequisites</h2>



<ul class="wp-block-list">
<li>A working instance of Nagios XI</li>



<li>A internet connection</li>
</ul>



<h2 class="wp-block-heading">Step 1: Install SNMP Daemon onto Ubuntu 22</h2>



<p>To start, we need to install the SNMP Daemon (<code>snmpd</code>) on Ubuntu. The SNMP Daemon is responsible for allowing SNMP-enabled tools, like Nagios XI, to collect and manage data from the system. First, update your package lists with the following command:</p>



<pre class="wp-block-code has-adbac-7-color has-text-color has-875-rem-font-size"><code>sudo apt update</code></pre>



<p>This command updates the local package database to ensure we have the latest information about available software packages. After the update is complete, install <code>snmpd</code> by running the following command:</p>



<pre class="wp-block-code"><code>sudo apt install snmpd</code></pre>



<p>For testing purposes, we’ll also install the <code>snmp</code> package. This is primarily needed for running the <code>snmpwalk</code> command, which helps us verify the configuration locally. To install it, enter the following command:</p>



<pre class="wp-block-code"><code>sudo apt install snmp</code></pre>



<h2 class="wp-block-heading">Step 2: Configure SNMP</h2>



<p>Now that it is installed, we need to configure it, as it is currently not configured, we will not be able to pull any information from the device. We need to edit the <code>snmp.conf</code> file, to do this use the command:</p>



<pre class="wp-block-code has-adbac-7-color has-text-color has-875-rem-font-size"><code>sudo nano /etc/snmp/snmpd.conf</code></pre>



<p>We are looking for a few sections in this, first thing we want to do is find the <code>agentadress </code>section. </p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-110421.png"><img loading="lazy" decoding="async" width="331" height="23" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-110421.png" alt="agentaddress line" class="wp-image-45679" title="How to Monitor Ubuntu 22 using SNMP 5" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-110421.png 331w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-110421-300x21.png 300w" sizes="(max-width: 331px) 100vw, 331px" /></a><figcaption class="wp-element-caption">agentaddress in snmpd.conf</figcaption></figure>



<p>You can change this to match the IP address of your instance of Nagios XI for greater security, but if you use what&#8217;s listed above, it will work, it will allow the wizard we are using to recognize and access it through SNMP. Now we do want <code>snmpwalk</code> to access this, we need to change the view section now.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153611.png"><img loading="lazy" decoding="async" width="392" height="125" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153611.png" alt="Screenshot 2025 02 11 153611" class="wp-image-45730" title="How to Monitor Ubuntu 22 using SNMP 6" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153611.png 392w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153611-300x96.png 300w" sizes="(max-width: 392px) 100vw, 392px" /></a><figcaption class="wp-element-caption">views in snmpd.conf</figcaption></figure>



<p>These SNMP view definitions specify which parts of the MIB tree are accessible to users. The first line grants access to standard system-related information (under <code>.1.3.6.1.2.1</code>), while the second allows access to enterprise-specific objects (under <code>.1.3.6.1.4.1</code>), thereby controlling the visibility of SNMP data for monitoring and management purposes. Next, the <code>rocommunity</code> line defines the read-only community string for SNMP access, which acts as a password for SNMP clients to retrieve data from the SNMP daemon. In this example, we will be using the default community string &#8220;public&#8221; for simplicity, though for enhanced security, it’s recommended to replace it with a more secure word or phrase of your choice.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-145547.png"><img loading="lazy" decoding="async" width="667" height="111" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-145547.png" alt="rocommunity string in snmpd.conf" class="wp-image-45705" title="How to Monitor Ubuntu 22 using SNMP 7" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-145547.png 667w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-145547-300x50.png 300w" sizes="(max-width: 667px) 100vw, 667px" /></a><figcaption class="wp-element-caption">rocommunity in snmpd.conf</figcaption></figure>



<h2 class="wp-block-heading">Step 3: Restart the Service</h2>



<p>The next step is to restart the SNMP service so that the changes take effect. To do this, simply run the following command:</p>



<pre class="wp-block-code"><code>sudo service snmpd restart</code></pre>



<p>This will restart the SNMP service, and you shouldn’t receive any output if everything is configured correctly. If you do get output, it likely indicates an error in the <code>snmpd.conf</code> file—most often a typo in one of the lines. Please review the file and check for any mistakes. Once that’s sorted, we’ll want to verify that our configurations are working. To do this, we can use the <code>snmpwalk</code> command locally. Alternatively, if you have access to the Nagios XI Linux host, you can perform the test from there as well. The command to use is:</p>



<pre class="wp-block-code"><code>snmpwalk -v 2c -c &lt;rocommunity&gt; localhost/&lt;ip address&gt;</code></pre>



<p>You should receive a very long output, whether you&#8217;re testing locally or through the Nagios XI Linux host. If this happens, it confirms that SNMP is set up correctly. It’s even better if you&#8217;re able to get it working through the Nagios XI Linux host, as this will verify that the system is correctly receiving and processing SNMP data for monitoring.</p>



<h2 class="wp-block-heading">Step 4: Set Up on Nagios XI</h2>



<p>With everything set up, we can now configure monitoring through Nagios XI using the Linux SNMP Wizard. You’ll need to enter the IP address of your Ubuntu device along with the <code>rocommunity</code> string. The SNMP daemon supports multiple versions of SNMP, so the default settings for both the SNMP version and port should work perfectly.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-151739.png"><img loading="lazy" decoding="async" width="854" height="623" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-151739.png" alt="Screenshot 2025 02 11 151739" class="wp-image-45724" title="How to Monitor Ubuntu 22 using SNMP 8" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-151739.png 854w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-151739-300x219.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-151739-768x560.png 768w" sizes="(max-width: 854px) 100vw, 854px" /></a><figcaption class="wp-element-caption">Linux SNMP Wizard First Step</figcaption></figure>



<p>After configuring the settings, you can choose the hostname and select any services you want to monitor through SNMP. Once these steps are completed, your host will be set up for monitoring. By clicking on the hostname, you&#8217;ll see that it is being actively monitored and collecting data for the selected services.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531.png"><img loading="lazy" decoding="async" width="1024" height="474" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531-1024x474.png" alt="Screenshot 2025 02 11 111531" class="wp-image-45725" title="How to Monitor Ubuntu 22 using SNMP 9" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531-1024x474.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531-300x139.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531-768x356.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-111531.png 1391w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Host Status for SNMP Host </figcaption></figure>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207.png"><img loading="lazy" decoding="async" width="1024" height="338" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207-1024x338.png" alt="Screenshot 2025 02 11 153207" class="wp-image-45728" title="How to Monitor Ubuntu 22 using SNMP 10" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207-1024x338.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207-300x99.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207-768x254.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-11-153207.png 1332w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Services of new Host</figcaption></figure>



<h2 class="wp-block-heading">Conclusion</h2>



<p>With these steps, we’ve successfully set up Ubuntu 22 to be monitored using SNMP with Nagios XI. If you encounter any issues, please refer to the <a href="https://support.nagios.com/forum/" target="_blank" rel="noopener">Nagios Support Forum</a> for assistance. Alternatively, if you prefer to monitor using the Nagios Cross-Platform Agent, you can find more information <a href="https://library.nagios.com/training/ubuntu-22-install-ncpa/" target="_blank" rel="noreferrer noopener">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Monitor an Ubuntu 22 Device with NCPA</title>
		<link>https://library.nagios.com/training/ubuntu-22-install-ncpa/</link>
		
		<dc:creator><![CDATA[Louie Mattia]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 17:53:16 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[NCPA]]></category>
		<category><![CDATA[Operating System Monitoring]]></category>
		<category><![CDATA[Ubuntu 22]]></category>
		<guid isPermaLink="false">https://library.nagios.com/?p=43433</guid>

					<description><![CDATA[This guide will show you two methods to install the Nagios Cross-Platform Agent (NCPA) on your Ubuntu 22 system. It&#8217;s essential to have root privileges to execute the necessary commands, so I recommend using sudo -i to switch to the root user before proceeding. Step 1 Method 1: Installing via the Repository (Recommended) The preferred [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>This guide will show you two methods to install the Nagios Cross-Platform Agent (NCPA) on your Ubuntu 22 system. It&#8217;s essential to have root privileges to execute the necessary commands, so I recommend using <code>sudo -i</code> to switch to the root user before proceeding.</p>



<h2 class="wp-block-heading">Step 1 Method 1: Installing via the Repository (Recommended)</h2>



<p>The preferred method for installing NCPA is through the repository. This approach involves a series of simple steps that can all be executed from the command line.</p>



<p><strong>Add the Nagios repository to your sources list:</strong> To do this, execute the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="echo &quot;deb https://repo.nagios.com/deb/$(lsb_release -cs) /&quot; &gt; /etc/apt/sources.list.d/nagios.list" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">echo &quot;deb https://repo.nagios.com/deb/$(lsb_release -cs) /&quot; &gt; /etc/apt/sources.list.d/nagios.list</span></span></code></pre></div>



<p>This command will add the repository to your system, ensuring you have access to the NCPA package.</p>



<p><strong>Add the GPG key for the repository:</strong> The GPG key is required to verify the integrity of the packages you&#8217;ll download. You might encounter a warning saying that the command used is deprecated, but don&#8217;t worry—it will still function correctly. To add the GPG key, use:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="wget -qO - https://repo.nagios.com/GPG-KEY-NAGIOS-V3 | apt-key add -" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">wget -qO - https://repo.nagios.com/GPG-KEY-NAGIOS-V3 | apt-key add -</span></span></code></pre></div>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-092953.png"><img loading="lazy" decoding="async" width="1024" height="103" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-092953.png" alt="Adding the GPG key" class="wp-image-43938" title="How to Monitor an Ubuntu 22 Device with NCPA 11" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-092953.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-092953-300x30.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-092953-768x77.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Adding GPG key</figcaption></figure>



<p>If successful, you should see the message <code>OK</code>, confirming the key was added correctly.</p>



<p><strong>Update your package list:</strong> Now that the repository and key are set up, update your package lists:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="apt-get update" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">apt-get update</span></span></code></pre></div>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442.png"><img loading="lazy" decoding="async" width="1024" height="143" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442-1024x143.png" alt="Screenshot 2025 01 21 094442" class="wp-image-43939" title="How to Monitor an Ubuntu 22 Device with NCPA 12" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442-1024x143.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442-300x42.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442-768x108.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-094442.png 1535w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Update output</figcaption></figure>



<p><strong>Install the NCPA package:</strong> With the update complete, you can now install NCPA using the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="apt-get install ncpa" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">apt-get install ncpa</span></span></code></pre></div>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-100524.png"><img loading="lazy" decoding="async" width="670" height="365" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-100524.png" alt="Screenshot 2025 01 21 100524" class="wp-image-43940" title="How to Monitor an Ubuntu 22 Device with NCPA 13" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-100524.png 670w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-100524-300x163.png 300w" sizes="(max-width: 670px) 100vw, 670px" /></a><figcaption class="wp-element-caption">NCPA install output</figcaption></figure>



<h2 class="wp-block-heading">Step 1 Method 2: Downloading the Package</h2>



<p>If for some reason the repository method doesn’t work, you can manually download and install the NCPA package. Follow these steps:</p>



<p><strong>Download the latest NCPA package:</strong> Start by downloading the NCPA .deb package with the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="wget https://assets.nagios.com/downloads/ncpa3/ncpa-latest-1.amd64.deb" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">wget https://assets.nagios.com/downloads/ncpa3/ncpa-latest-1.amd64.deb</span></span></code></pre></div>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018.png"><img loading="lazy" decoding="async" width="1024" height="104" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018-1024x104.png" alt="Screenshot 2025 02 03 153018" class="wp-image-43799" title="How to Monitor an Ubuntu 22 Device with NCPA 14" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018-1024x104.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018-300x30.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018-768x78.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018-1536x156.png 1536w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153018.png 1806w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Package download output</figcaption></figure>



<p><strong>Install the downloaded package:</strong> After the package is downloaded, install it using:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo dpkg -i ncpa-latest-1.amd64.deb" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo dpkg -i ncpa-latest-1.amd64.deb</span></span></code></pre></div>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153042.png"><img loading="lazy" decoding="async" width="738" height="109" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153042.png" alt="Screenshot 2025 02 03 153042" class="wp-image-43798" title="How to Monitor an Ubuntu 22 Device with NCPA 15" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153042.png 738w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-03-153042-300x44.png 300w" sizes="(max-width: 738px) 100vw, 738px" /></a><figcaption class="wp-element-caption">Installing package</figcaption></figure>



<p>As long as you get the above out put or something similar, you have successfully installed NCPA.</p>



<h2 class="wp-block-heading">Step 2: Configure NCPA</h2>



<p>After installing NCPA, the agent will work out of the box, but it&#8217;s highly recommended to configure the API token for added security. Without this step, the default token will be used, which might not be ideal for your environment. Enter the following into your command line:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo nano /usr/local/ncpa/etc/ncpa.cfg" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo nano /usr/local/ncpa/etc/ncpa.cfg</span></span></code></pre></div>



<p>In the configuration file, look for the line that reads: <em>community_string = mytoken</em>.</p>



<figure class="wp-block-image size-full"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-104040.png"><img loading="lazy" decoding="async" width="902" height="129" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-104040.png" alt="Screenshot 2025 01 21 104040" class="wp-image-43800" title="How to Monitor an Ubuntu 22 Device with NCPA 16" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-104040.png 902w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-104040-300x43.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-01-21-104040-768x110.png 768w" sizes="(max-width: 902px) 100vw, 902px" /></a><figcaption class="wp-element-caption">Community String</figcaption></figure>



<p>Replace <code>mytoken</code> with a secure token of your choice. After updating the token, press <code>CTRL + X</code>, then press <code>Y</code> to confirm the changes, and hit <code>Enter</code> to save the file. We want to use the token we made so there is one final step, which is to restart our NCPA. At the moment its API token that will be accepted is still the default token. We want it to use the newly created one. To do this we enter the following command:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="systemctl restart ncpa" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">systemctl restart ncpa</span></span></code></pre></div>



<p>This will restart the service, and NCPA will now use the newly configured token.</p>



<h2 class="wp-block-heading">Step 3: Configuring Firewall</h2>



<p>If you&#8217;re running a firewall on your system, you&#8217;ll need to allow traffic on port 5693, which is used by NCPA. For Ubuntu systems with UFW (Uncomplicated Firewall) enabled, follow these steps to configure the firewall and allow NCPA traffic:</p>



<p><strong>Create the directory for UFW application profiles:</strong> First, create the necessary directory where UFW can store application profiles:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo mkdir -p /etc/ufw/applications.d" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo mkdir -p /etc/ufw/applications.d</span></span></code></pre></div>



<p><strong>Create a custom application profile for NCPA:</strong> Next, set up a custom profile for NCPA by running the following commands:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo sh -c &quot;echo '[NCPA]' &gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'title=Nagios Cross Platform Agent' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'description=Nagios Monitoring Agent' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;
sudo sh -c &quot;echo 'ports=5693/tcp' &gt;&gt; /etc/ufw/applications.d/ncpa&quot;" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;[NCPA]&#039; &gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;title=Nagios Cross Platform Agent&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;description=Nagios Monitoring Agent&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span>
<span class="line"><span style="color: #adbac7">sudo sh -c &quot;echo &#039;ports=5693/tcp&#039; &gt;&gt; /etc/ufw/applications.d/ncpa&quot;</span></span></code></pre></div>



<p><strong>Allow NCPA traffic through the firewall:</strong> Once the profile is set up, allow NCPA through the firewall with:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo ufw allow NCPA" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo ufw allow NCPA</span></span></code></pre></div>



<p><strong>Reload the firewall to apply the changes:</strong> Finally, reload UFW to apply the changes:</p>



<div class="wp-block-kevinbatdorf-code-block-pro" data-code-block-pro-font-family="Code-Pro-Geist-Mono" style="font-size:.875rem;font-family:Code-Pro-Geist-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.5rem;--cbp-tab-width:2"><span role="button" data-code="sudo ufw reload" style="color:#adbac7" aria-label="Copy" class="code-block-pro-copy-button"></span><pre class="shiki github-dark-dimmed" style="background-color: #22272e"><code><span class="line"><span style="color: #adbac7">sudo ufw reload</span></span></code></pre></div>



<h2 class="wp-block-heading">Step 4(Optional): Confirm NCPA installation</h2>



<p>This step is straightforward. Simply open a web browser and navigate to <code>https://&lt;host-ip-address&gt;:5693</code>.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958.png"><img loading="lazy" decoding="async" width="1024" height="235" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1024x235.png" alt="Screenshot 2025 02 05 101958" class="wp-image-43946" title="How to Monitor an Ubuntu 22 Device with NCPA 17" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1024x235.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-300x69.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-768x176.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958-1536x353.png 1536w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-101958.png 1894w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">NCPA GUI</figcaption></figure>



<p>This will bring you to the login page, where you can enter your token. The purpose of this step is to verify that the NCPA is up and running, that it is reading the token correctly, and that remote access is functional.</p>



<h2 class="wp-block-heading">Step 5: Configuring on Nagios XI</h2>



<p>The final step involves configuring Nagios XI. To do this, navigate to the <em>Configuration Wizards</em> section in Nagios and select the <em>NCPA Wizard</em>.</p>



<ol class="wp-block-list">
<li>Navigate to the <em>Configuration Wizards</em> section in Nagios XI and select the <em>NCPA Wizard</em>.</li>



<li>Enter the necessary information, including the IP address, the token, and the system type (Ubuntu in this case).</li>



<li>During the setup, you will be prompted to choose a name for your host and select the services you want to monitor with NCPA.</li>
</ol>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046.png"><img loading="lazy" decoding="async" width="1024" height="594" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046-1024x594.png" alt="Screenshot 2025 02 05 103046" class="wp-image-43944" title="How to Monitor an Ubuntu 22 Device with NCPA 18" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046-1024x594.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046-300x174.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046-768x446.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-103046.png 1242w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">NCPA wizard filled</figcaption></figure>



<p>Once the setup is complete, the new host will appear in your monitoring dashboard. You can navigate to the <em>Host Status</em> section to confirm that it is being monitored properly.</p>



<figure class="wp-block-image size-large"><a href="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533.png"><img loading="lazy" decoding="async" width="1024" height="551" src="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533-1024x551.png" alt="Screenshot 2025 02 05 104533" class="wp-image-43945" title="How to Monitor an Ubuntu 22 Device with NCPA 19" srcset="https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533-1024x551.png 1024w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533-300x161.png 300w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533-768x413.png 768w, https://library.nagios.com/wp-content/uploads/2025/02/Screenshot-2025-02-05-104533.png 1171w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Host being monitored</figcaption></figure>



<h2 class="wp-block-heading">Conclusion</h2>



<p>By following this guide, you have successfully installed and configured the Nagios Cross-Platform Agent (NCPA) on Ubuntu 22. You are now able to monitor the system using Nagios XI. If any issues are encountered, we recommend using the <a href="https://support.nagios.com/forum/" data-type="link" data-id="https://support.nagios.com/forum/" target="_blank" rel="noopener">Nagios Support Forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
