To make Nagios CORE security compliant with a SHA2/SHA256 cert, follow these steps using Openssl and you will be ready in no time with a PCI compliant cert. This is a standard requirement nowadays in any PCI compliant environment. This is implemented with Apache backend. Run the below command to generate .crt and .key files.
This script is to monitor a failure when Nagios daemons fails to start or sometimes Nagios stops sending alerts. When you check the logs at “
/usr/local/nagios/var/log/nagios.log” you might come across messages like
"Caught SIGSEGV, shutting down". These messages need to be monitored and then fixed so that Nagios works in a proper fashion. This would be monitored via Cronjob on the host as Nagios itself won’t be able to detect the failure.
Its possible to upgrade Nagios CORE to the latest version by just following these simple steps. This article covers upgrade, backup and restore in case of a failure.The Latest Version of Nagios CORE is 4.2.4 as of January,2017 for which you can download the Source files from Nagios Website. The process would involve stopping of Nagios and Apache service, compiling Nagios from source and then restart both the services. You need to be admin/Root user to implement the upgrade.
Its possible to enable SSL over http for Nagiso Core (Red Hat/CentOS). The Nagios WEB UI can be made secure by enabling https instead of plain http in Nagios. After you are done installing Nagios Core in Linux, you need to enable OpenSSL in Apache. First we need to install mod_ssl and openssl and then edit nagios.conf in Apache.