Sie haben eine XtremIO Dell EMC Storage und möchten sie gerne überwachen, dann habe ich das richtige dafür. Vor nicht allzu langer Zeit habe ich ein Monitoring Plugin für XtremIO Storages geschrieben. Was kann dieses Plugin:
XTREMIO_CTRL_Status: Damit überwachen sie die Kontroller und sehen den Status der Hardware
XTREMIO_DPG_Status: Damit überwachen sie ihre DPG Gruppen auf dem Storage
XTREMIO_Storage_Efficiency: Dies überprüft und visualisiert die aktuelle “deduplication und compress” Effizienz des XtremIO
XTREMIO_Storage_Space: Dies überprüft ob sie noch genug Storage zur Verfügung haben
Und wie funktioniert es?
Hier XtremIO Monitoring Plugin, können sie das aktuelle Plugin herunterladen und es wird auch in einer nächsten NetEye Version zur Verfügung stehen. Die Überwachung funktioniert über eine REST API welche XtremIO EMC zur Verfügung stellt d.h. wir brauchen einen User und Passwort um auf diese zugreifen zu können. Diesen User können sie über das normale Web-Frontend anlegen und dann in der Überwachung verwenden. Das Archiv beinhaltet das Plugin, ein php File für pnp4nagios und ein service-profile für Monarch (NetEye Monitoring Konfigurations Frontend).
Sollten sie NetEye besitzen ist es einfach das ganze aufzusetzen:
Kopieren des Plugin Files (check_xtremio) in das directory /usr/lib/nagios/plugins des NetEye Servers
Upload und Import des ProfilFiles im Profile Menu von Monarch
Daraufhin stehen folgende Service Checks zur Verfügung:
XTREMIO_Cluster1_Dedup_Ratio: Wie es schon sagt kontrolliert es die Deduplication Ratio der Cluster1 LUN
XTREMIO_CTRL_Status: Status des Controlers
XTREMIO_DPG_Status: Status der Data Protection Group
XTREMIO_Storage_Efficiency: Effizienz der Kompressionsrate und Deduplication der Storage Daten
XTREMIO_Storage_Space: Füllstand des Storage
Hier noch einige Beispiele um das Kommando aufzurufen:
Aufzeichnen und Überwachung eines speziellen Wertes der API:
/usr/lib/nagios/plugins/check_xtremio -H <host> -U <user> -P <passwort> -T command -K types/clusters/1 -f dedup-ratio -t dedup-ratio-text
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix (now Würth IT Italy). Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
Author
Juergen Vigna
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix (now Würth IT Italy). Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More
This document describes the steps required to build, configure, and operate a Podman container based on php:8.2-cli, with the SNMP extension enabled, intended for executing monitoring plugins within a NetEye/Icinga environment. Pulling the base image podman pull docker.io/php:8.2-cli Containerfile for Read More
With the upgrade to NetEye 4.44, we've added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one of the most relevant is the introduction of Elastic Stack 9. This Elasticsearch major release (https://www.elastic.co/guide/en/elastic-stack/9.0/elastic-stack-release-notes.html) includes some new Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More