PyXymon
SaltStack Code Snippets
A set of code snippets that can be used to build SaltStack execution modules.
A Salt execution module is a Python or Cython module placed in a directory called _modules/
at the root of the Salt fileserver, usually /srv/salt
. Some Python sample scripts make use of SaltStack as a backend are also available for example.
StackStack Code Snippets in short
Project name: saltstack-code-snippets
Tags: Utilities/Automation
License: Apache-2.0
Operating System: Linux
Implementation: Python
Development: GitHub (shortlog)
Documentation: GitHub README
Nagios Plugins for Linux
A suite of Nagios plugins for monitoring Linux servers and appliances.
Nagios is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. Nagios, originally created under the name NetSaint, was written and is currently maintained by Ethan Galstad along with a group of developers who are actively maintaining both the official and unofficial plugins.
The Nagios Plugins for Linux are intended to be run by NRPE, the Nagios Remote Plugin Executor, that “allows you to remotely execute Nagios plugins on other Linux/Unix machines. This allows you to monitor remote machine metrics (disk usage, CPU load, etc.).”
The Nagios Plugin for Linux in short
Project name: nagios-plugins-linux
Tags: Utilities/Monitoring
License: GPL v3+
Operating System: Linux
Implementation: C (C99)
Last stable version: version 21 — source
Development: GitHub (shortlog)
Documentation: GitHub README and Wiki
Nagios Exchange Page: Nagios Plugins Linux
Available plugins:
check_clock
check_cpu
check_cpufreq
check_cswch
check_fc
check_ifmountfs
check_intr
check_iowait
check_load
check_memory
check_multipath
check_nbprocs
check_network
check_paging
check_readonlyfs
check_swap
check_tcpcount
check_temperature
check_uptime
check_users
PyOOCS – Out of Complance Scanner
A customizable and modular security scanner for Linux.
Project name: pyoocs
Tags: Utilities/Security
License: GPL v3+
Operating System: Linux
Implementation:
– Scan Engine: Python 2.4+, Python 3
– Front-end: HTML5, Javascript, bootstrap, AngularJS
– Back-end: Node.js, Express, MongoDB 3.2
Last stable version: none yet
Development: GitHub (shortlog)
Documentation: GitHub README
This project is at an early stage of development and only a few modules are currently available:
- environment: checks the root environment
- filesystem: checks for mandatory filesystems and mount options and for system files permissions
- kernel: check the kernel runtime configuration
- packages: make some checks on installed packages and rpm database
- services: check whether a list of services are running or not
- sudo: checks for root rights given to users and security issues
The checks are configurable via a JSON file. You can found an example here.
In particular three different output formats are supported:
- console: print the output to the console:
"oocs-output" : "console",
- json: print the output to the console, but in json format:
"oocs-output" : "json",
- html: run an http server for displaying the result of the scan:
"oocs-output" : "html", "oocs-html-opts" : { "baseUrl" : "http://localhost:8000/" "publicDir" : "/srv/www-oocs/html/server/public" }
Screenshots of the Web interface (login)
Screenshots of the Web interface (scan view)
Screenshots of the Web interface (scan-detail view)
The html mode is intended for debug and testing only.
Use the script oocs-htmlviewer.py
instead, or the Angular viewer coupled with a Node.js and MongoDB backend.