Icinga2 | add Fritzbox 7490 (FRITZ!OS: 06.84)
the Steps i went...
| 0 on the Fritzbox | Heimnetz -> Netzwerk, switch to the tab Netzwerkeinstellungen. |
Zugriff für Anwendungen zulassen | and reboot the Fritbox |
| 0 on the Fritzbox | add a new Fritzbox user | System -> Fritz!Box-Benutzer | Name Password No email needed FRITZ!Box Einstellungen_ Sprachnachrichten Smart Home |
| 0 Icinga | path of the plugins | Icinga2 | Plugins | define path | - |
| 2 | Need curl and bc | # apt install -y curl # apt install -y bc |
|
| go to the path where 3part Plugins are | # cd /usr/lib/nagios/pluginsCustom | ||
| download the Plugin | # git clone https://github.com/mcktr/check_tr64_fritz check_tr64_fritz | ||
| chmod -R +x check_tr64_fritz | |||
| # cd check_tr64_fritz | |||
| check the open port | # ./getSecurityPort 10.147.42.1 Your Fritz!Box Security Port (for TR-064 over SSL) is: 49443 |
||
| # icinga2 daemon -C | |||
|
# vi /etc/icinga2/conf.d/check_tlsr64_fritz/check_tlsr64_fritz-status.conf cp to copy |
object CheckCommand "check_tr64_fritz-status" { command = [ PluginCustomDir + "/check_tr64_fritz/check_tr64_fritz" ] arguments = { "-h" = "$fritz_host$" "-p" = "$fritz_port$" "-u" = "$fritz_username$" "-P" = "$fritz_password$" "-f" = "$fritz_function$" "-w" = "$fritz_warning$" "-c" = "$fritz_critical$" } vars.fritz_host = "$address$" vars.fritz_port = "49443" vars.fritz_username = "dslf-config" vars.fritz_password ="password" vars.fritz_function = "status" } |
||
| # vi /etc/icinga2/zones.d/master/router.conf |
1 object Host "router.domain" { 2 check_command = "hostalive" //check is executed on the master 3 display_name = "Fritzbox 7490" 4 address = "10.147.42.1" 5 6 vars.client_endpoint = name //follows the convention that host name == endpoint name 7 } 8 9 object Service "check_tr64_fritz" { 10 host_name = "router.domain" // check_interval = 15 11 check_command = "check_tr64_fritz-status" 12 } 13 |
||
| # icinga2 daemon -C | |||
| # systemctl restart icinga2 | |||
| Information: | // check_interval = 15 if you remove // then the check will be all 15 seconds, think about if it makes sense (default is 5 Minutes) in my case for the downstreamrate upstreamrate it did make sense |
||
| ERROR on GUI |
Plugin Outputexecvpe(/usr/lib/nagios/pluginsCustom/check_tr64_fritz) failed: Permission denied |
Quellen/Source:
- (2016) Fritz!Box 7490 check | nagios
- (2018) mcktr - Github | check_tr64_fritz
-
-
-
-
-
-
-
-
- Anker 575 USB-C Docking Station (13-in-1), 85W für Laptops
- Perfect Server Hardware for Virtualization | Proxmox | pve-05
- Pioneer Blu-Ray/BD/DVD/CD Reader/writer USB 3.0 BDR-XD07TB | WORKS OK with Debian 11
- NOT WORKING WITH DEBIAN 11 | Dockingstation | IcyBox 14-in-1 USB Type-C | IB-DK2262AC
- How to remove systemd services
- Laptop | Lenovo | Thinkpad E15 Gen3 AMD
- Laptop | Lenovo | LENOVO-IDEA IdeaPad 3 15IGL05 Notebook (15.6 ", 128 GB SSD, Business Black)
- D. Klimo | Kent monoblocks
- TTN Mapper
- LILYGO TTGO T-Beam V1.1 ESP32 LoRa 868Mhz GPS 18650 Board
- LILYGO® TTGO T-Beam 868MHz -> The Things Network (TTN/TTS) -> Karte | Infos und Video bei Alex (www.aeq-web.com)
- Kabelfarben 3.3V, 5V, 12V, 230V | Durchmesser
- 01 Digi-Bee Stand01 Wetter
- Solar Panel | 6V 3W Solar Panel JY D145x145
- TTGO LoRa32 V2.1_1.6 version 433/868/915Mhz ESP32 LoRa OLED 0.96 Inch SD Card Bluetooth WIFI wireless Module ESP-32 SMA
- -pve-04 | Disk SSD and HDD
- DISK SSD | 1 TB | Samsung SSD 870 EVO 1TB - 1TB
- NanoVNA V2
- CubeSat | antennas |
- KoZo_GS3_433MHz
- tinyGS - shortcut what it means
- TinyGS Telegram community | published Links
- Wolfgang W. Osterhage (Springer Verlag Sachbuch 2021): Die Geschichte der Raumfahrt | (gefundene Fehler)
- ucs Univention some commands
- SMA-Stecker / SMA-Buchse
Microsoft hält eine Lücke in der LNK-Anzeige für nicht behebenswert. Sie wurde inzwischen gegen europäische Diplomaten missbraucht.
Nicht jeder Schaden, der durch digitale Täuschung entsteht, ist laut Landgericht Bielefeld direkt durch eine Hausratversicherung mit Internetschutz abgedeckt.
Angreifer können IBM Tivoli Monitoring und Nagios XI attackieren und Dateien manipulieren oder sogar Schadcode ausführen. Sicherheitsupdates sind verfügbar.
Angreifer missbauchen Schwachstellen in VMware und XWiki, warnt die IT-Sicherheitsbehörde CISA. Updates stopfen die Lücken.

