Skip to main content

Amazon EC2

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment.

Pack assets

Templates

The Monitoring Connector Amazon EC2 brings 3 host templates:

  • Cloud-Aws-Ec2-Asg-custom
  • Cloud-Aws-Ec2-Instance-custom
  • Cloud-Aws-Ec2-Spot-Fleet-Request-custom

The connector brings the following service templates (sorted by the host template they are attached to):

Service AliasService TemplateService Description
Ec2-Cpu-CreditCloud-Aws-Ec2-Cpu-Credit-Api-customCheck CPU credits usage
Ec2-Cpu-UsageCloud-Aws-Ec2-Cpu-Usage-Api-customCheck CPU usage
Ec2-NetworkCloud-Aws-Ec2-Network-Api-customCheck network usage
Ec2-StatusCloud-Aws-Ec2-Status-Api-customCheck internal checks status

The services listed above are created automatically when the Cloud-Aws-Ec2-Asg-custom host template is used.

Discovery rules

Host discovery

Rule nameDescription
Amazon AWS EC2Discover Amazon AWS EC2 instances
Amazon AWS ASGDiscover Amazon AWS Auto Scaling Groups

More information about discovering hosts automatically is available on the dedicated page.

Collected metrics & status

Here is the list of services for this connector, detailing all metrics linked to each service.

Metric nameUnit
ec2.spot.instances.active.countcount
ec2.spot.instances.healthy.countcount
ec2.spot.instances.unhealthy.countcount

Prerequisites

AWS Configuration

Configure a service account (access/secret key combo) for which the following privileges have to be granted:

AWS PrivilegeDescription
ec2:DescribeInstancesDisplay EC2 instances & ASG details
ec2:DescribeSpotFleetRequestsDisplay EC2 Spot Fleet Requests details
cloudwatch:getMetricStatisticsGet metrics from the AWS/EC2 namespace on Cloudwatch

Plugin dependencies

To interact with the Amazon APIs, you can use either use the awscli binary provided by Amazon or paws, a Perl AWS SDK (recommended). You must install it on every poller expected to monitor AWS resources.

For now, it is not possible to use paws if you are using a proxy to reach the AWS Cloudwatch APIs.

yum install perl-Paws

Installing the monitoring connector

Pack

  1. If the platform uses an online license, you can skip the package installation instruction below as it is not required to have the connector displayed within the Configuration > Monitoring Connector Manager menu. If the platform uses an offline license, install the package on the central server with the command corresponding to the operating system's package manager:
dnf install centreon-pack-cloud-aws-ec2
  1. Whatever the license type (online or offline), install the Amazon EC2 connector through the Configuration > Monitoring Connector Manager menu.

Plugin

Since Centreon 22.04, you can benefit from the 'Automatic plugin installation' feature. When this feature is enabled, you can skip the installation part below.

You still have to manually install the plugin on the poller(s) when:

  • Automatic plugin installation is turned off
  • You want to run a discovery job from a poller that doesn't monitor any resource of this kind yet

More information in the Installing the plugin section.

Use the commands below according to your operating system's package manager:

dnf install centreon-plugin-Cloud-Aws-Ec2-Api

Using the monitoring connector

Using a host template provided by the connector

  1. Log into Centreon and add a new host through Configuration > Hosts.
  2. Fill the Name, Alias & IP Address/DNS fields according to your ressource settings.
  3. Apply the Cloud-Aws-Ec2-Asg-custom template to the host. A list of macros appears. Macros allow you to define how the connector will connect to the resource, and to customize the connector's behavior.
  4. Fill in the macros you want. Some macros are mandatory, in particular the macro for defining the custom mode, i.e. the connection method to the resource.
MacroDescriptionDefault valueMandatory
AWSACCESSKEYSet AWS access key
AWSASSUMEROLESet arn of the role to be assumed
AWSCUSTOMMODEWhen a plugin offers several ways (CLI, library, etc.) to get information the desired one must be defined with this optionawscli
AWSINSTANCENAMESet the instance name (Required) (can be defined multipletimes)X
AWSINSTANCETYPESet the instance type (Required) (Can be: 'asg', 'instance')asgX
AWSREGIONSet the region name (Required)X
AWSSECRETKEYSet AWS secret key
PROXYURLProxy URL if any
EXTRAOPTIONSAny extra option you may want to add to every command (E.g. a --verbose flag). All options are listed here
  1. Deploy the configuration. The host appears in the list of hosts, and on the Resources Status page. The command that is sent by the connector is displayed in the details panel of the host: it shows the values of the macros.

Using a service template provided by the connector

  1. If you have used a host template and checked Create Services linked to the Template too, the services linked to the template have been created automatically, using the corresponding service templates. Otherwise, create manually the services you want and apply a service template to them.
  2. Fill in the macros you want (e.g. to change the thresholds for the alerts). Some macros are mandatory (see the table below).
MacroDescriptionDefault valueMandatory
WARNINGACTIVEWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
CRITICALACTIVEWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
WARNINGHEALTHYWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
CRITICALHEALTHYWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
WARNINGUNHEALTHYWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
CRITICALUNHEALTHYWarning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'
EXTRAOPTIONSAny extra option you may want to add to the command (E.g. a --verbose flag). All options are listed here
  1. Deploy the configuration. The service appears in the list of services, and on page Resources Status. The command that is sent by the connector is displayed in the details panel of the service: it shows the values of the macros.

How to check in the CLI that the configuration is OK and what are the main options for?

Once the plugin is installed, log into your Centreon poller's CLI using the centreon-engine user account (su - centreon-engine). Test that the connector is able to monitor an AWS Instance using a command like this one (replace the sample values by yours):

/usr/lib/centreon/plugins/centreon_aws_ec2_api.pl \
--plugin=cloud::aws::ec2::plugin \
--mode=network \
--custommode='awscli' \
--aws-secret-key='' \
--aws-access-key='' \
--aws-role-arn='' \
--region='' \
--type='asg' \
--name='' \
--proxyurl='' \
--filter-metric='' \
--statistic='average' \
--timeframe='600' \
--period='60' \
--warning-network-in='' \
--critical-network-in='' \
--warning-network-out='' \
--critical-network-out='' \
--warning-network-packets-in='' \
--critical-network-packets-in='' \
--warning-network-packets-out='' \
--critical-network-packets-out='' \
--per-sec \
--verbose

The expected command output is shown below:

OK: Network In: 6 B Network Out: 85 B Network Packets In: 88 packets Network Packets Out: 68 packets | 'ec2.network.in.bytes'=6B;;;;'ec2.network.out.bytes'=85B;;;;'ec2.network.packets.in.count'=88packets;;;;'ec2.network.packets.out.count'=68packets;;;;

Troubleshooting

Please find the troubleshooting documentation for Centreon Plugins typical issues.

Available modes

In most cases, a mode corresponds to a service template. The mode appears in the execution command for the connector. In the Centreon interface, you don't need to specify a mode explicitly: its use is implied when you apply a service template. However, you will need to specify the correct mode for the template if you want to test the execution command for the connector in your terminal.

All available modes can be displayed by adding the --list-mode parameter to the command:

/usr/lib/centreon/plugins/centreon_aws_ec2_api.pl \
--plugin=cloud::aws::ec2::plugin \
--list-mode

The plugin brings the following modes:

ModeLinked service template
asg-status [code]Cloud-Aws-Ec2-Asg-Status-Global-Api-custom
cpu [code]Cloud-Aws-Ec2-Cpu-Credit-Api-custom
Cloud-Aws-Ec2-Cpu-Usage-Api-custom
discovery [code]Used for host discovery
discovery-fleet-requests [code]Not used in this Monitoring Connector
diskio [code]Cloud-Aws-Ec2-Diskio-Api-custom
instances-status [code]Cloud-Aws-Ec2-Instances-Status-Global-Api-custom
instances-types [code]Cloud-Aws-Ec2-Instances-Types-Global-Api-custom
list-asg [code]Not used in this Monitoring Connector
list-instances [code]Not used in this Monitoring Connector
list-spot-fleet-requests [code]Not used in this Monitoring Connector
network [code]Cloud-Aws-Ec2-Network-Api-custom
spot-active-instances [code]Cloud-Aws-Ec2-Spot-Instances-custom
status [code]Cloud-Aws-Ec2-Status-Api-custom

Available custom modes

This connector offers several ways to connect to the resource (CLI, library, etc.), called custom modes. All available custom modes can be displayed by adding the --list-custommode parameter to the command:

/usr/lib/centreon/plugins/centreon_aws_ec2_api.pl \
--plugin=cloud::aws::ec2::plugin \
--list-custommode

The plugin brings the following custom modes:

  • awscli
  • paws

Available options

Generic options

All generic options are listed here:

OptionDescription
--modeDefine the mode in which you want the plugin to be executed (see--list-mode).
--dyn-modeSpecify a mode with the module's path (advanced).
--list-modeList all available modes.
--mode-versionCheck minimal version of mode. If not, unknown error.
--versionReturn the version of the plugin.
--custommodeWhen a plugin offers several ways (CLI, library, etc.) to get information the desired one must be defined with this option.
--list-custommodeList all available custom modes.
--multipleMultiple custom mode objects. This may be required by some specific modes (advanced).
--pass-managerDefine the password manager you want to use. Supported managers are: environment, file, keepass, hashicorpvault and teampass.
--verboseDisplay extended status information (long output).
--debugDisplay debug messages.
--filter-perfdataFilter perfdata that match the regexp. Eg: adding --filter-perfdata='avg' will remove all metrics that do not contain 'avg' from performance data.
--filter-perfdata-advFilter perfdata based on a "if" condition using the following variables: label, value, unit, warning, critical, min, max. Variables must be written either %{variable} or %(variable). Eg: adding --filter-perfdata-adv='not (%(value) == 0 and %(max) eq "")' will remove all metrics whose value equals 0 and that don't have a maximum value.
--explode-perfdata-maxCreate a new metric for each metric that comes with a maximum limit. The new metric will be named identically with a '_max' suffix). Eg: it will split 'used_prct'=26.93%;0:80;0:90;0;100 into 'used_prct'=26.93%;0:80;0:90;0;100 'used_prct_max'=100%;;;;
--change-perfdata --extend-perfdataChange or extend perfdata. Syntax: --extend-perfdata=searchlabel,newlabel,target[,[newuom],[min],[m ax]] Common examples: Convert storage free perfdata into used: --change-perfdata=free,used,invert() Convert storage free perfdata into used: --change-perfdata=used,free,invert() Scale traffic values automatically: --change-perfdata=traffic,,scale(auto) Scale traffic values in Mbps: --change-perfdata=traffic_in,,scale(Mbps),mbps Change traffic values in percent: --change-perfdata=traffic_in,,percent()
--extend-perfdata-groupAdd new aggregated metrics (min, max, average or sum) for groups of metrics defined by a regex match on the metrics' names. Syntax: --extend-perfdata-group=regex,namesofnewmetrics,calculation[,[ne wuom],[min],[max]] regex: regular expression namesofnewmetrics: how the new metrics' names are composed (can use $1, $2... for groups defined by () in regex). calculation: how the values of the new metrics should be calculated newuom (optional): unit of measure for the new metrics min (optional): lowest value the metrics can reach max (optional): highest value the metrics can reach Common examples: Sum wrong packets from all interfaces (with interface need --units-errors=absolute): --extend-perfdata-group=',packets_wrong,sum(packets_(discard |error)_(in|out))' Sum traffic by interface: --extend-perfdata-group='traffic_in_(.*),traffic_$1,sum(traf fic_(in|out)_$1)'
--change-short-output --change-long-outputModify the short/long output that is returned by the plugin. Syntax: --change-short-output=pattern~replacement~modifier Most commonly used modifiers are i (case insensitive) and g (replace all occurrences). Eg: adding --change-short-output='OK~Up~gi' will replace all occurrences of 'OK', 'ok', 'Ok' or 'oK' with 'Up'
--change-exitReplace an exit code with one of your choice. Eg: adding --change-exit=unknown=critical will result in a CRITICAL state instead of an UNKNOWN state.
--range-perfdataRewrite the ranges displayed in the perfdata. Accepted values: 0: nothing is changed. 1: if the lower value of the range is equal to 0, it is removed. 2: remove the thresholds from the perfdata.
--filter-uomMask the units when they don't match the given regular expression.
--opt-exitReplace the exit code in case of an execution error (i.e. wrong option provided, SSH connection refused, timeout, etc). Default: unknown.
--output-ignore-perfdataRemove all the metrics from the service. The service will still have a status and an output.
--output-ignore-labelRemove the status label ("OK:", "WARNING:", "UNKNOWN:", CRITICAL:") from the beginning of the output. Eg: 'OK: Ram Total:...' will become 'Ram Total:...'
--output-xmlReturn the output in XML format (to send to an XML API).
--output-jsonReturn the output in JSON format (to send to a JSON API).
--output-openmetricsReturn the output in OpenMetrics format (to send to a tool expecting this format).
--output-fileWrite output in file (can be combined with json, xml and openmetrics options). E.g.: --output-file=/tmp/output.txt will write the output in /tmp/output.txt.
--disco-formatApplies only to modes beginning with 'list-'. Returns the list of available macros to configure a service discovery rule (formatted in XML).
--disco-showApplies only to modes beginning with 'list-'. Returns the list of discovered objects (formatted in XML) for service discovery.
--float-precisionDefine the float precision for thresholds (default: 8).
--source-encodingDefine the character encoding of the response sent by the monitored resource Default: 'UTF-8'.

Custom modes options

All custom modes specific options are listed here:

OptionDescription
--aws-secret-keySet AWS secret key.
--aws-access-keySet AWS access key.
--aws-session-tokenSet AWS session token.
--aws-role-arnSet arn of the role to be assumed.
--aws-profileSet AWS profile.
--endpoint-urlOverride AWS service endpoint URL if necessary.
--regionSet the region name (Required).
--periodSet period in seconds.
--timeframeSet timeframe in seconds.
--statisticSet cloudwatch statistics (Can be: 'minimum', 'maximum', 'average', 'sum').
--zeroedSet metrics value to 0 if none. Useful when CloudWatch does not return value when not defined.
--timeoutSet timeout in seconds (Default: 50).
--sudoUse 'sudo' to execute the command.
--commandCommand to get information (Default: 'aws'). Can be changed if you have output in a file.
--command-pathCommand path (Default: none).
--command-optionsCommand options (Default: none). Only use for testing purpose, when you want to set ALL parameters of a command by yourself.
--proxyurlProxy URL if any
--skip-ssl-checkAvoid certificate issuer verification. Useful when AWS resources are hosted by a third-party. Note that it strips all stderr from the command result. Will be enhanced someday. Debug will only display CLI instead of evreything.

Modes options

All available options for each service template are listed below:

OptionDescription
--warning- --critical-Warning and Critical thresholds. You can use 'active', 'healthy', 'unhealthy'

All available options for a given mode can be displayed by adding the --help parameter to the command:

/usr/lib/centreon/plugins/centreon_aws_ec2_api.pl \
--plugin=cloud::aws::ec2::plugin \
--mode=network \
--custommode='paws' \
--help