Forge Home


manage nrpe service and service checks

Pete Brown



9,484 latest version

2.6 quality score

Version information

  • 1.1.3 (latest)
  • 1.1.2
  • 1.1.1
  • 1.1.0
  • 1.0.3
  • 1.0.2
  • 1.0.0
released Feb 5th 2014

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this declaration to your Puppetfile:

mod 'rendhalver-nrpe', '1.1.3'
Learn more about managing modules with a Puppetfile

Add this module to a Bolt project:

bolt module add rendhalver-nrpe
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install rendhalver-nrpe --version 1.1.3

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.



rendhalver/nrpe — version 1.1.3 Feb 5th 2014


####Table of Contents

  1. New stuff and bug fixes
  2. Overview - What is the nrpe module?
  3. Module Description - What does the module do?
  4. Setup - The basics of getting started with nrpe
  5. Usage - The parameters available for configuration
  6. Implementation - An under-the-hood peek at what the module is doing
  7. Limitations - OS compatibility, etc.
  8. Development - Guide for contributing to the module
  9. Release Notes - Notes on the most recent updates to the module

New stuff and bug fixes

I recently started a consulting company called Abstract IT Pty Ltd. I have transfered ownership of all my puppet modules to a new organisation on Puppet Forge called abstractit. I am making one final release of my modules under rendhalver and abstractit to give you a chance to switch over to the new organisation. I have also added a licence. All my modules will be licenced under Apache v2.


Puppet module for managing nrpe and service checks.

Module Description

Manages nrpe and the extra service for nrpe. It also uses my sudo module to setup sudo rules for the commands that need it.


what nrpe affects:

  • the nrpe sericve
  • installs standard nagios plugin packages
  • /etc/nagios/nrpe.cfg
  • /etc/nrpe.d/ and services in that directory

Beginning with nrpe

This will manage a basic setup for nrpe.

include nrpe

If you are using abstractit-monitoring include this class as well.

include nrpe::monitoring

Defaults for vars to set if you need them. These are class params so use hiera or and ENC to set them up easily.

$nrpe::params::user = 'nrpe'
# user nrpe runs as
$nrpe::params::group = 'nrpe'
# group nrpe will run as
# comma separated list of ip addresses that can talk to this nrpe server
$nrpe::params::command_timeout = 180
# timeout for nrpe checks
$nrpe::params:: firewall = false
# whether to use puppetlabs/firewall to setup the iptables rule


nrpe::plugin { "blah":
  ensure => present, 
  plugin => 'main', 
  check_command => '',
  command_args => '',
  sudo => false,


This type manages plugins for nrpe. The name/title of the plugin is the name of the check for check_nrpe

Parameters within nrpe::plugin


Whether the plugin should exist or not (present is the default)


where to find the plugin. main is the standard nagios plugin directory anything else will use the location defined in the variable nrpe::params::nagios_extra_plugins which defaults to nrpe::params::nagios_plugins


the command to run (args for the command go in command_args) This is so I can setup sudo rules for the commands that need it


Arguments for the command.


Whether to run the command as root with sudo


Uses files based on templates to manage the nrpe commands


There may be some. Don't hesitate to let me know if you find any.


All development, testing and releasing is done by me at this stage. If you wish to join in let me know.

Release Notes


Final release for rendhalver-nrpe. First release as abstractit-nrpe. Removed dependency on abstractit-monitoring to avoid cyclic dependencies


fixing packages for Fedora 19


fixing class chaining


Updated to use sudo module for managing sudo rules


switched back to old way of doing class chaining


switching to puppetlabs/firewall new class chaining scheme added monitoring for nrpe using my monitoring module adding fixes to service plays nice on Fedora using systemd


Initial release