Multigraph munin plugin to monitor Ubiquiti AirOS F (airFiber) devices various parameters.
It can gather information from AirFibers through Telnet, SSH with password authenttication, or SSH with public key authenttication (not requiring password).
Multigraph munin plugin to monitor Ubiquiti AirOS devices various parameters.
v0.9 - added SSH support and saved some memory, thanks to NVX@UbiquitiNetworksCommunity
This plugin collects most statistics from NSD name servers. It
should be called nsd_by_type, nsd_by_rcode or nsd_hits to monitor
queries received by type, replies sent by rcode or the base query
volume, respectively. The plugin is friendly to the name server
and only sends one signal per run (even if three links exist).
v0.7 - added critical thresholds to some graphs, and some descriptions below some of them
v0.6 - added wlan errors by type graph - useful to detect interferences on the same frequency; added CPU usage graph
v0.5 - added ping graph - ping times from the AirOS device to a configured address; other fixes
v0.4 - corrected memory size unit calculation and display, fixed query bug, fancier graphs for memory and link speed
v0.3 - added undefined values handling in case of connection timeout, corrected linefeed character handling
v0.2 - combined all the separate pugins into one multigraph plugin, a couple of charts separated
v0.1 - initial version, separate plugin for each graph, packaged 11 different plugins
Previously the script would try to divide by 0 for calculating rates
on the first run, and crash before getting to store() to write initial
values thus never initing itself. This fixes that, and makes it a
little easier to debug in case of future crashes (no need for 'eval'
wrapper).
psad is a cyber defense tool that monitors for incoming port scans
and can optionally blacklist/block attackers.
Both these options can be charted with this plugin.
- Port scans detected (per hour)
- Attackers blocked (per hour)
You can now choose to use the snmp counters or if your host does
not support it (in some containers for example), you can set rules
in your firewall and count based on that.