Solved

Using Nagios to monitor Cisco MDS 9509 switch?

Posted on 2010-09-14
1
1,782 Views
Last Modified: 2012-05-10
Has anyone set up Nagios to monitor a Cisco MDS 9509 SAN switch?

Any tips/recomendations?

TIA
0
Comment
Question by:someITGuy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
RobArdill earned 500 total points
ID: 33678841
You'll need to use SNMP.

I haven't specifically used Nagios with this SAN Switch, but a good starting point is to look at the SNMP MIB files for the switch to see what stats/counters are supported. The MIBs define what counters are available. Nagios comes with it's own set of SNMP tools, but there also a few good windows based ones that you can use to browse the switch with the MIBs. http://www.wtcs.org/snmp4tpc/getif.htm. Also my favourite STG http://www.wtcs.org/informant/stg.htm which is good for verifying the counters work as expected.

Cisco MIB can be found here
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

The ones that I can see that are relevant to your switch.
CISCO-SVC-INTERFACE-MIB
CISCO-FICON-MIB
CISCO-FCSP-MIB
CISCO-FEATURE_CONTROL-MIB
CISCO-IVR-MIB
CISCO-FDMI-MIB
CISCO-SECURE_SHELL-MIB
CISCO-FC-ROUTE-MIB

Also rather than reiterate the finer points of inserting custom Cisco  counters into Nagios, here a link with some good detail. It's for Ethernet Switches, but the same principles apply to all cisco products with SNMP support.

http://blog.barfoo.org/2009/02/13/nagios-integrating-cisco-switches/


Best of luck. Rob
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question