Icinga2 | add Fritzbox 7490 (FRITZ!OS: 06.84)
the Steps i went...
| 0 on the Fritzbox | Heimnetz -> Netzwerk, switch to the tab Netzwerkeinstellungen. |
Zugriff für Anwendungen zulassen | and reboot the Fritbox |
| 0 on the Fritzbox | add a new Fritzbox user | System -> Fritz!Box-Benutzer | Name Password No email needed FRITZ!Box Einstellungen_ Sprachnachrichten Smart Home |
| 0 Icinga | path of the plugins | Icinga2 | Plugins | define path | - |
| 2 | Need curl and bc | # apt install -y curl # apt install -y bc |
|
| go to the path where 3part Plugins are | # cd /usr/lib/nagios/pluginsCustom | ||
| download the Plugin | # git clone https://github.com/mcktr/check_tr64_fritz check_tr64_fritz | ||
| chmod -R +x check_tr64_fritz | |||
| # cd check_tr64_fritz | |||
| check the open port | # ./getSecurityPort 10.147.42.1 Your Fritz!Box Security Port (for TR-064 over SSL) is: 49443 |
||
| # icinga2 daemon -C | |||
|
# vi /etc/icinga2/conf.d/check_tlsr64_fritz/check_tlsr64_fritz-status.conf cp to copy |
object CheckCommand "check_tr64_fritz-status" { command = [ PluginCustomDir + "/check_tr64_fritz/check_tr64_fritz" ] arguments = { "-h" = "$fritz_host$" "-p" = "$fritz_port$" "-u" = "$fritz_username$" "-P" = "$fritz_password$" "-f" = "$fritz_function$" "-w" = "$fritz_warning$" "-c" = "$fritz_critical$" } vars.fritz_host = "$address$" vars.fritz_port = "49443" vars.fritz_username = "dslf-config" vars.fritz_password ="password" vars.fritz_function = "status" } |
||
| # vi /etc/icinga2/zones.d/master/router.conf |
1 object Host "router.domain" { 2 check_command = "hostalive" //check is executed on the master 3 display_name = "Fritzbox 7490" 4 address = "10.147.42.1" 5 6 vars.client_endpoint = name //follows the convention that host name == endpoint name 7 } 8 9 object Service "check_tr64_fritz" { 10 host_name = "router.domain" // check_interval = 15 11 check_command = "check_tr64_fritz-status" 12 } 13 |
||
| # icinga2 daemon -C | |||
| # systemctl restart icinga2 | |||
| Information: | // check_interval = 15 if you remove // then the check will be all 15 seconds, think about if it makes sense (default is 5 Minutes) in my case for the downstreamrate upstreamrate it did make sense |
||
| ERROR on GUI |
Plugin Outputexecvpe(/usr/lib/nagios/pluginsCustom/check_tr64_fritz) failed: Permission denied |
Quellen/Source:
- (2016) Fritz!Box 7490 check | nagios
- (2018) mcktr - Github | check_tr64_fritz
-
-
-
-
-
-
-
-
- Anker 575 USB-C Docking Station (13-in-1), 85W für Laptops
- Perfect Server Hardware for Virtualization | Proxmox | pve-05
- Pioneer Blu-Ray/BD/DVD/CD Reader/writer USB 3.0 BDR-XD07TB | WORKS OK with Debian 11
- NOT WORKING WITH DEBIAN 11 | Dockingstation | IcyBox 14-in-1 USB Type-C | IB-DK2262AC
- How to remove systemd services
- Laptop | Lenovo | Thinkpad E15 Gen3 AMD
- Laptop | Lenovo | LENOVO-IDEA IdeaPad 3 15IGL05 Notebook (15.6 ", 128 GB SSD, Business Black)
- D. Klimo | Kent monoblocks
- TTN Mapper
- LILYGO TTGO T-Beam V1.1 ESP32 LoRa 868Mhz GPS 18650 Board
- LILYGO® TTGO T-Beam 868MHz -> The Things Network (TTN/TTS) -> Karte | Infos und Video bei Alex (www.aeq-web.com)
- Kabelfarben 3.3V, 5V, 12V, 230V | Durchmesser
- 01 Digi-Bee Stand01 Wetter
- Solar Panel | 6V 3W Solar Panel JY D145x145
- TTGO LoRa32 V2.1_1.6 version 433/868/915Mhz ESP32 LoRa OLED 0.96 Inch SD Card Bluetooth WIFI wireless Module ESP-32 SMA
- -pve-04 | Disk SSD and HDD
- DISK SSD | 1 TB | Samsung SSD 870 EVO 1TB - 1TB
- NanoVNA V2
- CubeSat | antennas |
- KoZo_GS3_433MHz
- tinyGS - shortcut what it means
- TinyGS Telegram community | published Links
- Wolfgang W. Osterhage (Springer Verlag Sachbuch 2021): Die Geschichte der Raumfahrt | (gefundene Fehler)
- ucs Univention some commands
- SMA-Stecker / SMA-Buchse
In MyAsus klafft eine als hochriskant eingestufte Sicherheitslücke, die das Ausweiten der Rechte erlaubt. EIn Update steht bereit.
Jeder der über dreißig Millionen Kunden erhält 50.000 Won, etwa 30 Euro. Verbraucherschützer warnen: Coupang kaufe sich so von weiteren Ansprüchen frei.
Ein wichtiges Sicherheitsupdate schließt mehrere Schwachstellen in Veeam Back & Replication. Bislang sind keine Attacken bekannt.

