Hello,
I am monitoring a Proxmox node (and soon many more) with CheckMK. The problem is that Proxmox is creating and deleting new Interfaces on a regular basis and that this is a) creating regular troubleshooting email where there is no trouble and b) this is clogging my Dashboard making me oversee important warning. I have tried to get rid of the emails with the following rules in my general email notification rule, but this does not work.
Match folder nodes: (Proxmox)
Exclude service Interfaces [0-99]
I also would like to deactive the display of interface problems for the nodes. So far I have no Idea how to do this. Can someone point me in the direction of the appropriate documentation?
first make sure, that you have good interface names instead of just Interface 1,2,3…
see: Monitoring your network: Four rules to rule them all
This article is written for Checkmk 1.6, but easy to transfer. The 2.0 article will be published soon.
After setting these rules and rediscover you will have interfaces like:
These are the “real” interfaces, that belong to the proxmox host. While these other interfaces belong to the VMs and containers:
(Btw: The number in the interface name is the VMID of your VM/Container.)
As these interfaces will be transferred from e.g. PVE node1 to node2 in case that you migrate a VM within the PVE cluster from node1 to node2, those interfaces would go UNKNOWN on node1 and would be then found on node2. As we don’t want that to happen, we need to create a cluster:
Create a cluster host in Checkmk and add your nodes that are part of your Proxmox cluster and set the host to “no ip” (in PVE there is no single cluster IP):
This rule is applied to the nodes (not the cluster host!).
In this example I used a regexp to match all nodes like pve-muc-001, pve-muc-002, etc.
And use the VM interfaces in the services fields. It’s also a regexp (a prefix match), e.g. Interface tap would match tap106i0.
Doing so attaches those VM/Container interfaces to the Cluster which looks like that:
Here you can see in the status details, that these services are coming from two different hosts/nodes of the cluster.
For very volatile VMs, e.g. test hosts that are coming and going and don’t need to be monitored we do the following:
Create the hosts in PVE with a custom VMID outside of your normal range, e.g. use the range 600-699.
Those VMs will have interfaces like “Interface tap666i0”
Use this in a “disables services” rule to exclude services matching Interface fw6\d\d and Interface tap6\d\d
This topic was automatically closed 365 days after the last reply. New replies are no longer allowed. Contact an admin if you think this should be re-opened.