Nagios Alert Integration with Alert Central

This guide describes how to enter a Nagios system’s information into Alert Central and configure Alert Central to recognize, process, and automatically assign alerts from that Nagios system.

When Alert Central receives an email, it needs to know how to identify the email’s source. When a rule matches the defined email data, Alert Central assigns the rule’s associated source to the email.

Alert Central also uses a series of user-configured rules to summarize the Nagios email and determine its source address and severity level. Alert Central maps the rules you configure in Alert Central to the data in the email. If text in the email matches the text defined in the Alert Central rules, Alert Central knows that any email mapping to those rules comes from the Nagios system. The final step is configuring who Alert Central assigns the Nagios email alert to.

The Nagios email shows what Alert Central can map to and process to integrate a Nagios source.

SCOM alert email Alert Central mapping

In the instructions that follow, we configure Alert Central to assign all alerts that match the newly created rules to the Web Operations group.

To configure Alert Central to recognize, process, and assign Nagios emails:

1. Click Settings in the upper right corner of the page. The Settings link is available on any page of Alert Central.

2. Click Add New Email Alert Source, under the Alert Sources section.

SCOM alert integration step 2

3. Enter the source name.

SCOM alert integration step 3

4. Click Next.

5. Click + Add new matching rule in the Matching Rules pane.

6. Click if the From:, select contains, and enter nagios@winterfire.net in the Configure Rule pane.

SCOM alert integration step 6

Note: Ensure Ignore case and Ignore whitespace (treat multiple spaces as one space) in the Configure Rule pane are selected for all rules.

7. Click Next.

SCOM alert integration step 8

8. Select Body: message and then select Only capture a specific section of that text.

9. Select the exact phrase, enter address:, and select Include the matching text in the value we capture in the Start pane. All these settings tell Alert Central where in the email to start capturing the source’s object information, and which information to capture.

Note: Ensure Ignore case and Ignore whitespace (treat multiple spaces as one space) are selected in the Start pane.

10. Select Stop at the end of the current line in the Stop pane. This setting tells Alert Central where to stop capturing information.

SCOM alert integration step 12

11. Click Next.

12. Select Subject: line. Alert Central can now capture severity-level information from the email’s subject line. Alert Central uses this information to create an alert with that same severity level.

Note: See the SolarWinds Alert Central Administrator Guide for more information on alert severity levels.

13. Select And just use all the text we find there.

SCOM alert integration step 16

14. Click Next.

15. Select assign the alert to Help Desk in the by default field.

SCOM alert integration step 18

16. Click Next.

17. Enter the Nagios email into the Test Email pane and click Test. Alert Central tests the configured settings. Your results look like the following.

SCOM alert integration step 20

Your configuration works! The Route to Groups result shows that the test was unable to match a routing rule. Because you configured all Nagios email alerts to route to the Help Desk group without adding any routing rules, this configuration is correct.

18. Click Done to complete Nagios integration and Alert Central alert source configuration.

Alert Central is now configured to automatically process and assign Nagios email alerts.

  • Alert Central is part of Solarwind's
    policy of giving back to the IT
    comunity that has helped make us
    one of the fastest growing software
    companies in the world.