<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Abayomi Ayoola</title>
    <description>The latest articles on DEV Community by Abayomi Ayoola (@aoayoola).</description>
    <link>https://dev.to/aoayoola</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F92166%2F543afe8e-f030-4fd8-9dd3-c8b68e013341.jpeg</url>
      <title>DEV Community: Abayomi Ayoola</title>
      <link>https://dev.to/aoayoola</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aoayoola"/>
    <language>en</language>
    <item>
      <title>What is Vulnerability Assessment?</title>
      <dc:creator>Abayomi Ayoola</dc:creator>
      <pubDate>Mon, 07 Mar 2022 20:24:07 +0000</pubDate>
      <link>https://dev.to/aoayoola/what-is-vulnerability-assessment-j70</link>
      <guid>https://dev.to/aoayoola/what-is-vulnerability-assessment-j70</guid>
      <description>&lt;p&gt;A vulnerability assessment is a systematic/periodic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.&lt;/p&gt;

&lt;p&gt;It can also be defined as the process defining, identifying, classifying, and prioritizing security weaknesses/vulnerabilities in systems which includes servers, applications and network infrastructures.&lt;/p&gt;

&lt;p&gt;It evaluates the exposure of the system to known vulnerabilities and assigns severity levels to those vulnerabilities and recommends remediation or mitigation if and whenever needed.&lt;/p&gt;

&lt;p&gt;This can be compared to the periodic health check we as individuals carry out to ascertain the state of the various organs and systems within our body. For instance, a cancerous cell detected in its early stage can easily be dealt with compared to when a stage four cancer cell is detected. The whole essence of health checks.&lt;/p&gt;

&lt;p&gt;The main goal of vulnerability assessment is to provide the necessary knowledge, awareness and risk background to an organization to take appropriate actions against threats to its IT enviroment.&lt;/p&gt;

&lt;p&gt;Vulnerability assessments can help detect but not limited to the following types of threats:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Escalation of privileges due to faulty authentication mechanisms.&lt;/li&gt;
&lt;li&gt;SQL injection, XSS and other code injection attacks.&lt;/li&gt;
&lt;li&gt;Insecure defaults – software that ships with insecure 
settings, such as a guessable admin passwords.&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  Types of Vulnerability Assessment
&lt;/h1&gt;

&lt;p&gt;Beyond types, vulnerability tools can be categorized under the same heading.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Host assessment – The assessment of critical servers, routers, endpoints which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.&lt;/li&gt;
&lt;li&gt;Network and wireless assessment – The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.&lt;/li&gt;
&lt;li&gt;Database assessment – The assessment of databases or big data can identify weak points in a database to prevent malicious attacks. We look for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments.&lt;/li&gt;
&lt;li&gt;Application scans – The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis 
of source code.&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  The Vulnerability Assessment Process
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qTJctU-4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4cswqh4wsm8mw48w9epx.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qTJctU-4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4cswqh4wsm8mw48w9epx.jpeg" alt="Vulnerability Assessment Process" width="880" height="586"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The following are the four steps in carrying out vulnerability assessments:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Vulnerability Identification (Testing)
The essence of this step is to make a comprehensive draft of an application’s/environment vulnerabilities/weakness as well as relating vulnerabilities to their threats. Security analysts test the security health of applications, servers or other systems by scanning them with automated tools, or testing and evaluating them manually. Analysts also rely on vulnerability databases, vendor vulnerability announcements, asset management systems and threat intelligence feeds to identify security weaknesses. A vulnerability could be as simple as an unpatched Windows server.&lt;/li&gt;
&lt;li&gt;Vulnerability Analysis
The objective here is to identify the source and root cause of the vulnerabilities identified in step one.
It involves the identification of system components responsible for each vulnerability, and the root cause of the vulnerability. For example, the root cause of a vulnerability could be an old version of an old version of an application running on a server. This provides a clear path for remediation – upgrading the application to a newer version.&lt;/li&gt;
&lt;li&gt;Risk assessment
This step involves the prioritizing of vulnerabilities. It involves security analysts assigning a rank or severity score to each vulnerability, based on such factors as:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;a. Which systems are affected.&lt;br&gt;
 b. What data is at risk.&lt;br&gt;
 c. Which business functions are at risk.&lt;br&gt;
 d. Ease of attack or compromise.&lt;br&gt;
 e. Severity of an attack.&lt;br&gt;
 f. Potential damage as a result of the vulnerability.&lt;/p&gt;

&lt;p&gt;For better understanding, vulnerability found on an organization's web server would definitely have a higher severity score than the one found on an old printer not connected to the organizations network.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Remediation
This is where the closing of security gaps takes place. It’s typically a joint effort by security staff, development and operations teams, who determine the most effective path for remediation or mitigation of each vulnerability.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Specific remediation steps might include:&lt;/p&gt;

&lt;p&gt;a. Introduction of new security procedures, measures or &lt;br&gt;
tools.&lt;br&gt;
 b. The updating of operational or configuration changes.&lt;br&gt;
 c. Development and implementation of a vulnerability patch.&lt;/p&gt;

&lt;p&gt;Vulnerability assessment cannot be a one-off activity. For it to be effective, organizations must operationalize this process and repeat it at regular intervals. It is also critical to foster cooperation between security, operation  and development teams – a process known as DevSecOps.&lt;/p&gt;

&lt;h1&gt;
  
  
  Vulnerability Assessment Vs Penetration Testing
&lt;/h1&gt;

&lt;p&gt;In the world of information security, these two are almost the same as they are meant to mitigate, prevent or reduce risk.&lt;/p&gt;

&lt;p&gt;Unlike penetration testing, vulnerability assessment is passive, non-aggressive scanning as it does not inject malicious software into the network or system or try to bring down a server or application. On the other hand, penetration testing is active and meant to do harm or compromise a system by gaining unathorised access to an internal system. The objective of penetration testing is to test if the organization's security control can be bypassed in order to take security measures before an external party start taking advantage of the loophole.&lt;/p&gt;

&lt;h1&gt;
  
  
  The Vulnerability Assessment Tools
&lt;/h1&gt;

&lt;p&gt;As earlier stated, vulnerability assessment tools can be categorized based on types of vulnerabilities. They are designed to automatically scan for new and existing threats that can target your application or systems. A few of the popular ones are&lt;br&gt;
Nessus&lt;br&gt;
Nmap&lt;br&gt;
InsightVM/Nexpose&lt;br&gt;
OpenVAS&lt;br&gt;
Nikto2&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>vulnerabilityassessment</category>
      <category>vulnerabilityscanning</category>
    </item>
    <item>
      <title>Customizing your macOS Terminal</title>
      <dc:creator>Abayomi Ayoola</dc:creator>
      <pubDate>Mon, 15 Nov 2021 16:59:10 +0000</pubDate>
      <link>https://dev.to/aoayoola/customizing-your-macos-terminal-1d7g</link>
      <guid>https://dev.to/aoayoola/customizing-your-macos-terminal-1d7g</guid>
      <description>&lt;p&gt;As a developer or DevOp, you're likely to spend a lot of time in the Terminal, and you've probably already customized its appearance to suit you, but what about the prompt name?&lt;/p&gt;

&lt;p&gt;The text that appears before the $ sign is the Terminal prompt name. This, by default is set to.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;HOST_NAME:USER_NAME CURRENT_DIRECTORY $&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XfWM0Cmt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ey6yjtp909e911fye4u6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XfWM0Cmt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ey6yjtp909e911fye4u6.png" alt="Example" width="880" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This can take up a lot of valuable real-estate on each line of the Terminal, depending on what you've named your computer. To change the default prompt, you'll need to make a change to your &lt;code&gt;.bash_profile&lt;/code&gt; file.&lt;/p&gt;

&lt;p&gt;Open up a new Terminal window and type the following command to ensure we're in the home directory&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;cd ~/&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Type &lt;code&gt;ls -la&lt;/code&gt; to show the contents of your Home directory and check if a &lt;code&gt;.bash_profile&lt;/code&gt; exists.&lt;/p&gt;

&lt;p&gt;If it does not exists, go ahead and create one with the command&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;touch .bash_profile&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Changing your Terminal prompt
&lt;/h2&gt;

&lt;p&gt;Edit '.bash_profile' with your default or favourite text editor, in my case it's Vim, with the following command&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;vi .bash_profile&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;press &lt;code&gt;i&lt;/code&gt; (insert) and enter the following line &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;export PS1="\u$ "&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;and save by tapping &lt;code&gt;esc&lt;/code&gt; key and type in &lt;code&gt;:wq&lt;/code&gt;,(FYI: this is specific to the Vim editor). The &lt;code&gt;\u&lt;/code&gt; flag sets the prompt to your username (in my case, Abayomi). Remember to keep a space after the &lt;code&gt;$&lt;/code&gt; symbol to make things easier to read in practice.&lt;/p&gt;

&lt;p&gt;Quit Terminal and relaunch to see your new prompt in action.&lt;/p&gt;

&lt;h2&gt;
  
  
  A little extra
&lt;/h2&gt;

&lt;p&gt;A little extra customization, my line looks like the following &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;export PS1="\u ~ &amp;gt;&amp;gt; "&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;and I ended uo with the following prompt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WKhIoq2h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/beywn0ss3ppug3a3e22f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WKhIoq2h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/beywn0ss3ppug3a3e22f.png" alt="Example" width="719" height="476"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  More Options for customising the prompt
&lt;/h2&gt;

&lt;p&gt;The following are a few common flags you can use to customize your Terminal prompt:&lt;/p&gt;

&lt;p&gt;\d – Current date&lt;br&gt;
\t – Current time&lt;br&gt;
\h – Host name&lt;br&gt;
# – Command number&lt;br&gt;
\u – User name&lt;/p&gt;

&lt;h2&gt;
  
  
  Going further
&lt;/h2&gt;

&lt;p&gt;There are several options for customising your Terminal prompt including custom strings, timestamps colours and even emoji &lt;/p&gt;

</description>
      <category>macos</category>
      <category>terminal</category>
      <category>customterminal</category>
    </item>
    <item>
      <title>Building a Linux Monitoring Infrastructure II</title>
      <dc:creator>Abayomi Ayoola</dc:creator>
      <pubDate>Thu, 24 Sep 2020 09:28:04 +0000</pubDate>
      <link>https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-ii-47mm</link>
      <guid>https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-ii-47mm</guid>
      <description>&lt;p&gt;&lt;a href="https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-i-2860"&gt;Continued from Building a Monitoring Infrastructure I&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Install binaries, init script, sample config files and set permissions on the external command directory.&lt;/p&gt;

&lt;p&gt;root@Nagios:~/Downloads/nagios-3.0.5#make install&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5#make install-init&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5#make install-config&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5#make install-commandmode&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Customize Configuration
Edit the /usr/local/nagios/etc/objects/contacts.cfg config file with your favorite editor and change the email address associated with the nagiosadmin contact definition to the address you’d like to use for receiving alerts.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;root@Nagios:~#emacs /usr/local/nagios/etc/objects/contacts.cfg&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;By the way, emacs is like notepad in Windows and there are other ones that you can use instead. It depends on your expertise on using them. Other such applications include vim, nano, joe, pico etc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Configure the Web Interface
Install the Nagios web config file in the Apache conf.d directory.
root@Nagios:~/Downloads/nagios-3.0.5# make install-webconf&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Create a nagiosadmin account for logging into the Nagios web interface.&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5#make htpasswd -c /usr/local/nagios/etc/htpasswd.users nagiosadmin&lt;/p&gt;

&lt;p&gt;Restart Apache to make the new settings take effect.&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5# /etc/init.d/apache2 reload&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compile and Install the Nagios Plugins
Extract the Nagios plugins source code tarball.
root@Nagios:~#cd Downloads
root@Nagios:~#tar xzf nagios-plugins-1.4.11.tar.gz
root@Nagios:~#cd nagios-plugins-1.4.11&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Compile and install the plugins.&lt;br&gt;
root@Nagios:~/Downloads/nagios-plugins-1.4.11#./configure —with-nagios-user=nagios —with-nagios-group=nagios&lt;br&gt;
root@Nagios:~/Downloads/nagios-plugins-1.4.11#make&lt;br&gt;
root@Nagios:~/Downloads/nagios-plugins-1.4.11#make install&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Start Nagios
Configure Nagios to automatically start when the system boots.
root@Nagios:~/Downloads# ln -s /etc/init.d/nagios /etc/rcS.d/S99nagios&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Verify the sample Nagios configuration files.&lt;br&gt;
root@Nagios:~# /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg&lt;/p&gt;

&lt;p&gt;If there are no errors, start Nagios.&lt;br&gt;
root@Nagios:~#/etc/init.d/nagios start&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Login to the Web Interface
You should now be able to access the Nagios web interface at the URL below.
&lt;a href="http://localhost/nagios/"&gt;http://localhost/nagios/&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;NOTIFICATIONS&lt;br&gt;
If you want to receive email notifications for Nagios alerts, you need to install the mailx (Postfix) package.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Any other Mail Transfer Agent (MTA) can be used to send email notifications. Postfix was used here because it’s much more easier to configure for use.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;aayoola@Nagios:~$ sudo apt-get install mailx&lt;/p&gt;

&lt;p&gt;You’ll have to edit the Nagios email notification commands found in /usr/local/nagios/etc/objects/commands.cfg and change any ‘/bin/mail’ references to ‘/usr/bin/mailx’. Once you do that you’ll need to restart Nagios to make the configuration changes live.&lt;/p&gt;

&lt;p&gt;aayoola@Nagios:~$ sudo /etc/init.d/nagios restart&lt;/p&gt;

&lt;p&gt;INSTALL &amp;amp; CONFIGURE POSTFIX&lt;/p&gt;

&lt;p&gt;To install postfix, run the following command:&lt;br&gt;
aayoola@Nagios:~$ sudo apt-get install postfix&lt;/p&gt;

&lt;p&gt;To configure postfix, run the following command:&lt;br&gt;
aayoola@Nagios:~$ sudo dpkg-reconfigure postfix&lt;/p&gt;

&lt;p&gt;The file /etc/postfix/main.cf should look like this&lt;/p&gt;

&lt;p&gt;myhostname = Nagios.Linuxlab.com&lt;br&gt;
alias_maps = hash:/etc/aliases&lt;br&gt;
alias_database = hash:/etc/aliases&lt;br&gt;
myorigin = /etc/mailname&lt;br&gt;
mydestination = Nagios.Linuxlab.com, localhost.Linuxlab.com, localhost&lt;br&gt;
relayhost = miranda.dc.turkuamk.fi&lt;br&gt;
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128&lt;br&gt;
mailbox_size_limit = 0&lt;br&gt;
recipient_delimiter = +&lt;br&gt;
inet_interfaces = all&lt;br&gt;
inet_protocols = ipv4&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;The relay host was what I changed as the host miranda.dc.turkuamk.fi is a relay server within a known network and so you might want to set up one for yourself in order that notification gets into your inbox.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Now the postfix initial configuration is complete. Run the following command to start postfix daemon:&lt;/p&gt;

&lt;p&gt;aayoola@Nagios:~$ sudo /etc/init.d/postfix start&lt;/p&gt;

&lt;p&gt;Object Configuration Overview&lt;br&gt;
Objects are all the elements that are involved in the monitoring and notification logic and can be found in /usr/local/nagios/etc/objects.&lt;/p&gt;

&lt;p&gt;Types of objects include:&lt;br&gt;
Services&lt;br&gt;
Service Groups&lt;br&gt;
Hosts&lt;br&gt;
Host Groups&lt;br&gt;
Contacts&lt;br&gt;
Contact Groups&lt;br&gt;
Commands&lt;br&gt;
Time Periods&lt;br&gt;
Notification Escalations&lt;br&gt;
Notification and Execution Dependencies&lt;/p&gt;

&lt;p&gt;Main Configuration File&lt;br&gt;
At installation a sample main configuration file /usr/local/nagios/etc/nagios.cfg is installed. The main configuration file is usually named nagios.cfg and located in the /usr/local/nagios/etc/ directory.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>monitoringinfrastructure</category>
      <category>nagios</category>
      <category>linuxserver</category>
    </item>
    <item>
      <title>Building a Linux Monitoring Infrastructure I</title>
      <dc:creator>Abayomi Ayoola</dc:creator>
      <pubDate>Wed, 23 Sep 2020 12:40:05 +0000</pubDate>
      <link>https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-i-2860</link>
      <guid>https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-i-2860</guid>
      <description>&lt;p&gt;This post describes the installation and configuration of a systems monitoring infrastructure on Nagios, an open source network monitoring application. This is the first in two series. Enjoy!&lt;/p&gt;

&lt;p&gt;Nagios is an open source infrastructure system and enterprise network monitoring application. It monitors hosts and services, alerting users when things go wrong and again when they get better. It was originally created under the name Netsaint, was written and is currently maintained by Ethan Galstad, along with a group of developers actively maintaining both official and unofficial plugins.&lt;/p&gt;

&lt;p&gt;It was originally designed to run under Linux, but also runs well on other Unix variants and nowadays on Windows Operating Systems. It is a free software licensed under the terms of the GNU General Public License version 2 as published by the Free Software Foundation.&lt;/p&gt;

&lt;p&gt;FUNCTIONS&lt;br&gt;
Some of the functions performed by Nagios include&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Monitoring of network services (SMTP, POP3, HTTP, SSH)
Monitoring of host resources (processesor load, disk usage, system logs) on a majority of Network Operating System, including Microsoft Windows with the NRPE_NT plugins.
Remote monitoring supported through SSH or SSL encrypted tunnels.
Simple plugin design that allows users to easily develop their own service checks depending on needs, by using the tools of choice (Bash, C++, Perl, Ruby, Python, PHP, C#, etc.)
Contact notifications when service or host problems occur and get resolved (via e-mail, pager, SMS, or any user-defined method through plugin system)
Automatic log file rotation
Support for implementing redundant monitoring hosts
Optional web-interface for viewing current network status, notifications, problem history, log files, etc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;INSTALLATION&lt;/p&gt;

&lt;p&gt;This particular deployment was carried out on Ubuntu Server 8.04. By default, Nagios would be installed underneath /usr/local/nagios and would be configured to monitor a few aspects of our local system (CPU load, disk usage, etc.). The Nagios web interface would be accessible at &lt;a href="http://localhost/nagios/"&gt;http://localhost/nagios/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Package Requirements&lt;br&gt;
For the proper functioning of our installation, the following software packages are require:&lt;/p&gt;

&lt;p&gt;Apache 2&lt;br&gt;
GCC compiler and development libraries&lt;br&gt;
GD development libraries&lt;/p&gt;

&lt;p&gt;And in order to install them, just issue the following commands&lt;br&gt;
&lt;code&gt;aayoola@Nagios:~$ sudo apt-get install apache2&lt;/code&gt;&lt;br&gt;
&lt;code&gt;aayoola@Nagios:~$ sudo apt-get install build-essential&lt;/code&gt;&lt;br&gt;
&lt;code&gt;aayoola@Nagios:~$ sudo apt-get install libgd2-xpm-dev&lt;/code&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;For starters, I would like to explain the above. aayoola is the username on the server, which you would have given during or after the OS installation.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Create Account Information&lt;br&gt;
Become the root user.&lt;br&gt;
&lt;code&gt;aayoola@Nagios:~$ sudo -s&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a new nagios user account and give it a password.&lt;br&gt;
&lt;code&gt;root@Nagios:~#/usr/sbin/useradd -m nagios passwd nagios&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;On Ubuntu server edition (6.01 and possible newer versions), you will need to also add a nagios group. You should be able to skip this step on desktop editions of Ubuntu.&lt;br&gt;
root@Nagios:~#/usr/sbin/groupadd nagios&lt;br&gt;
root@Nagios:~#/usr/sbin/usermod -G nagios nagios&lt;/p&gt;

&lt;p&gt;Create a new nagcmd group for allowing external commands to be submitted through the web interface. Add both the nagios user and the apache user to the group.&lt;br&gt;
root@Nagios:~# /usr/sbin/groupadd nagcmd&lt;br&gt;
root@Nagios:~# /usr/sbin/usermod -a -G nagcmd nagios&lt;br&gt;
root@Nagios:~#/usr/sbin/usermod -a -G nagcmd www-data&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Download Nagios and the Plugins
Create a directory for storing the downloads.
root@Nagios:~#mkdir downloads&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Enter the created folder&lt;br&gt;
root@Nagios:~#cd downloads&lt;/p&gt;

&lt;p&gt;Download Nagios as follow&lt;br&gt;
root@Nagios:~/Downloads#wget &lt;a href="http://osdn.dl.sourceforge.net/sourceforge/nagios/nagios-3.0.5.tar.gz"&gt;http://osdn.dl.sourceforge.net/sourceforge/nagios/nagios-3.0.5.tar.gz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;root@Nagios:~/Downloads# wget &lt;a href="http://osdn.dl.sourceforge.net/sourceforge/nagiosplug/nagios-plugins-1.4.11.tar.gz"&gt;http://osdn.dl.sourceforge.net/sourceforge/nagiosplug/nagios-plugins-1.4.11.tar.gz&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Be sure to confirm the links are still valid.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Compile and Install Nagios
Extract the Nagios source code tarball
root@Nagios:~/Downloads# tar xzf nagios-3.0.5.tar.gz cd nagios-3.0.5&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Enter Nagios folder&lt;br&gt;
root@Nagios:~/Downloads# cd nagios-3.0.5&lt;/p&gt;

&lt;p&gt;Run the Nagios configure script, parsing the name of the group you created earlier like this:&lt;br&gt;
root@Nagios:~/Downloads/nagios-3.0.5# ./configure —with-command-group=nagcmd&lt;/p&gt;

&lt;p&gt;Compile the Nagios source code.&lt;/p&gt;

&lt;p&gt;root@Nagios:~/Downloads/nagios-3.0.5# make all&lt;/p&gt;

&lt;p&gt;You can find the second part &lt;a href="https://dev.to/aoayoola/building-a-linux-monitoring-infrastructure-ii-47mm"&gt;here&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>monitoringinfrastructure</category>
      <category>nagios</category>
      <category>linuxserver</category>
    </item>
  </channel>
</rss>
