The Sensu assets packaged from this repository are built against the Sensu Ruby runtime environment. When using these assets as part of a Sensu Go resource (check, mutator or handler), make sure you include the corresponding Sensu Ruby runtime asset in the list of assets needed by the resource. The current ruby-runtime assets can be found here in the Bonsai Asset Index.
check-alb-target-group-health.rb
check-asg-instances-created.rb
check-asg-instances-inservice.rb
check-autoscaling-cpucredits.rb
check-beanstalk-elb-metric.rb
check-certificate-expiry.rb
check-cloudwatch-alarm
check-cloudwatch-alarm-multi
check-cloudwatch-alarms
check-cloudwatch-composite-metric
check-cloudwatch-metric
check-cloudfront-tag
check-configservice-rules
check-dynamodb-capacity.rb
check-dynamodb-throttle.rb
check-direct-connect-virtual-interfaces.rb
check-ebs-snapshots.rb
check-ebs-burst-limit.rb
check-ec2-cpu_balance.rb
check-ec2-filter.rb
check-ec2-network.rb
check-ecs-service-health.rb
check-efs-metric.rb
check-eip-allocation.rb
check-elasticache-failover.rb
check-elb-certs.rb
check-elb-health-fog.rb
check-elb-health-sdk.rb
check-elb-health.rb
check-elb-instances-inservice.rb
check-elb-latency.rb
check-elb-nodes.rb
check-elb-sum-requests.rb
check-emr-cluster.rb
check-emr-steps.rb
check-eni-status.rb
check-instance-events.rb
check-instance-health.rb
check-kms-key.rb
check-rds-events.rb
check-rds-pending.rb
check-rds.rb
check-redshift-events.rb
check-reserved-instances.rb
check-route53-domain-expiration.rb
check-s3-bucket.rb
check-s3-bucket-visibility.rb
check-s3-object.rb
check-s3-tag.rb
check-ses-limit.rb
check-ses-statistics.rb
check-sns-subscriptions
check-sqs-messages.rb
check-subnet-ip-consumption
check-vpc-nameservers
check-instances-count.rb
check-vpc-vpn.rb
handler-ec2_node.rb
handler-scale-asg-down.rb
handler-scale-asg-up.rb
handler-ses.rb
handler-sns.rb
metrics-asg.rb
metrics-autoscaling-instance-count.rb
metrics-billing.rb
metrics-ec2-count.rb
metrics-ec2-filter.rb
metrics-elasticache.rb
metrics-elb-full.rb
metrics-elb.rb
metrics-emr-steps.rb
metrics-rds.rb
metrics-s3.rb
metrics-ses.rb
metrics-sqs.rb
handler-ses
/etc/sensu/conf.d/handlers/ses.json
:
{
"handlers": {
"ses": {
"type": "pipe",
"command": "handler-ses.rb"
}
}
}
/etc/sensu/conf.d/ses.json
:
{
"ses": {
"mail_from": "sensu@example.com",
"mail_to": "monitor@example.com",
"region": "us-east-1",
"subscriptions": {
"subscription_name": {
"mail_to": "teamemail@example.com"
}
}
}
}
handler-sns
handler-sns
can be used to send alerts to Email, HTTP endpoints, SMS, or any other subscription type supported by SNS.
/etc/sensu/conf.d/handlers/sns.json
:
{
"handlers": {
"sns": {
"type": "pipe",
"command": "handler-sns.rb"
}
}
}
/etc/sensu/conf.d/sns.json
:
{
"sns": {
"topic_arn": "arn:aws:sns:us-east-1:111111111111:topic",
"region": "us-east-1"
}
}
Note: In addition to the standard installation requirements the installation of this gem will require compiling the nokogiri gem. Due to this you'll need certain development packages on your system.
On Ubuntu systems run the following to install build dependencies:
sudo apt-get install build-essential libxml2-dev zlib1g-dev
On CentOS systems, run the following to install build dependencies:
sudo yum groupinstall -y "Development Tools"
sudo yum install -y libxml2-devel zlib-devel
If you'd like to avoid compiling nokogiri and other gems on every system where you need to install this plugin collection, please have a look at the Sensu guide for pre-compiling plugin packages.
AWS credentials are required to execute these checks. Starting with AWS-SDK v2 there are a few methods of passing credentials to the check:
Use a credential file. Place the credentials in ~/.aws/credentials
. On Unix-like systems this is going to be /opt/sensu/.aws/credentials
. Be sure to restrict the file to the sensu
user.
[default]
aws_access_key_id = <access_key>
aws_secret_access_key = <secret_access_key>
Use an EC2 instance profile. If the checks are executing on an EC2 instance you can give the instance an IAM role and authentication will be handled automatically.
See the AWS-SDK docs for more details on credential configuration.
Some of the checks accept credentials with aws_access_key
and aws_secret_access_key
options
however this method is deprecated as it is insecure to pass credentials on the command line. Support
for these options will be removed in future releases.
No matter which authentication method is used you should restrict AWS API access to the minimum required to run the checks. In general this is done by limiting the sensu IAM user/role to the necessary Describe
calls for the services being checked.