Heads up! This is part one of a multi-part series on setting up a complete, free and open source monitoring and management solution for your business.

Intro

A quick google search will show you that there’s thousands of network monitoring solutions out there—from completely custom monitoring based on Nagios, to the beautiful Graphana dashboards, to the goliath of monitoring solutions, Solarwinds, and all of it’s associated bills. I’ve spent time in shops that had PRTG free as their only monitoring, and I’ve spend time at businesses that licensed (and implemented!) the full suite of Solarwinds products.

When my current employer assigned me the task of “find everything we have and monitor it”, I put together a wishlist of all the things I wanted in a monitoring product if I had access to a team of devs and a small loan of a million dollars:

  • Monitoring. We needed a ton of alerting points, like storage and CPU utilization
  • Support all OS’s. Linux, Windows, network gear like Cisco IOS/Fortinet/Juniper/Dell etc, even printers
    • This meant SNMP was the only realistic option
  • Alerting via email
    • as a bonus, alerting in any other way as well (text, chat notification, Telegram, etc)
  • Service checks - not just that it’s running, but that it’s operating properly
  • Network configuration backups
    • Stored in GIT if possible
  • Centralized logging (+ Alerting)
  • Event correlation?
  • Auto-remediation?
  • Everything else in Stretch’s Hierarchy of Network Needs?

To some with larger budgets, this is all a given, but to those without such fortune it seems an insurmountable task after you get the first gut-punch of vendor licensing costs after a demo. So, having run a few pieces of the kit I’m going to be diving into here in a homelab before and knowing what features I needed and how reliable they needed to be, I set out to implement a full solution for a business that had nothing.

As a high level, I’ll be going through the installation and configuration of the following packages as we go on:

  • LibreNMS - for Monitoring, dynamic Alerting, and centrally managing the rest of our software pieces below
  • Nagios Service Checks - for monitoring services, seamlessly integrated into LibreNMS
  • Gitlab - for centralized, change-tracking backups of device configuration files and any code you happen to run
  • Oxidized - automatic configuration backups and revisioning, exporting to your Gitlab instance above
    • If you use centralized auth (RADIUS), you can even see who made which changes when using this, which is awesome for change management
  • Graylog for centralized logging, alerting on those logs, and threat intelligence once we have it ingesting network traffic
    • I’ll also talk a bit here about event correlation as I go along, this is a WIP right now, but a bunch of what makes a SIEM useful can be implemented here without having the full stack SIEM to babysit all day.
  • Ansible - Once all of this is set up, you need to be able to deploy it consistently and correctly, so using Ansible to push to Windows, Linux and network devices. All, of course, backed up and managed by your git repo in Gitlab
  • Finally, auto-remediation will be orchestrated by all of these pieces working together.

At the end of this, you will be able to react proactively instead of reactively to issues in your environment, have a better high-level and detailed view of what’s actually happening in your network, and a scalable, widely-supported git-based solution for your device configurations, change management and automation systems. I’ll try to cover all of the details that normally get skipped, like how to actually format your Oxidized configs and what Group Policies are needed for WinRM connectivity in Windows domains.

Something to keep in mind: there are a lot of possibilities with the software we’re going to set up. I’m going to add features that I think are needed, and skip those that aren’t. You may come back later on and add other pieces I skipped for the sake of brevity, but this guide is meant to get you up and running.

Now, we’re ready to proceed on to Part 2: Installing LibreNMS and tweaking it to work in your environment.