{"id":10960,"date":"2021-11-18T23:03:43","date_gmt":"2021-11-18T20:03:43","guid":{"rendered":"https:\/\/kifarunix.com\/?p=10960"},"modified":"2024-03-18T08:07:28","modified_gmt":"2024-03-18T05:07:28","slug":"install-nagios-nrpe-agents-on-debian-11-debian-10","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-nagios-nrpe-agents-on-debian-11-debian-10\/","title":{"rendered":"Install Nagios NRPE Agents on Debian 11\/Debian 10"},"content":{"rendered":"\n<p>This guide describes how to easily install Nagios NRPE agents on Debian 11\/Debian 10. If you want to monitor your Debian hosts using Nagios server, then you need to have the <a href=\"https:\/\/github.com\/NagiosEnterprises\/nrpe\" target=\"_blank\" rel=\"noreferrer noopener\">NRPE<\/a> agents installed on these hosts. Nagios Remote Plugin Executor (NRPE) allows you to remotely execute Nagios plugins on other Linux\/Unix machines to query machine metrics such as disk usage, CPU load, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Add Hosts to Nagios Server for Monitoring<\/h3>\n\n\n\n<p>Before you can now start to monitor hosts using Nagios server, you need to add them hosts to Nagios Server.<\/p>\n\n\n\n<p>Follow the guide below to add hosts to Nagios server for monitoring.<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/add-hosts-to-nagios-server-for-monitoring\/\" target=\"_blank\" rel=\"noreferrer noopener\">Add Hosts to Nagios Server For Monitoring<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Installing Nagios NRPE Agents on Debian<\/h2>\n\n\n\n<p>Nagios NRPE agents:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#default-apt-repo\">can be installed from the  default repos directly using the package manager<\/a><\/li>\n\n\n\n<li><a href=\"#build-from-source\">can be build from the source<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"epel-repos\">Install Nagios NRPE Agent From Default Debian Repos<\/h3>\n\n\n\n<p>NRPE agents are available on the default Debian repositories.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">On Debian 11;<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>apt-cache policy nagios-nrpe-server<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\nnagios-nrpe-server:\n  Installed: (none)\n  Candidate: 4.0.3-1\n  Version table:\n     4.0.3-1 500\n        500 http:\/\/deb.debian.org\/debian bullseye\/main amd64 Packages\n<\/code><\/pre>\n\n\n\n<p>NRPE 4.0.3, which is the current <a href=\"https:\/\/github.com\/NagiosEnterprises\/nrpe\/releases\" target=\"_blank\" rel=\"noreferrer noopener\">stable latest release<\/a> as of this writing is available for installation.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install nagios-nrpe-server<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">On Debian 10<\/h4>\n\n\n\n<p>On Debian 10, the default repos do not have the latest version of NRPE.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt-cache policy nagios-nrpe-server<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\nnagios-nrpe-server:\n  Installed: (none)\n  Candidate: 3.2.1-2\n  Version table:\n     3.2.1-2 500\n        500 http:\/\/deb.debian.org\/debian buster\/main amd64 Packages\n<\/code><\/pre>\n\n\n\n<p>To ensure you install the latest version of Debian 10, you can install Backport repos;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo 'deb http:\/\/deb.debian.org\/debian buster-backports main' &gt; \/etc\/apt\/sources.list.d\/backports.list<\/code><\/pre>\n\n\n\n<p>Then run command below installs NRPE agent on Debian 10.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt update<\/code><\/pre>\n\n\n\n<p>Note that Backports repos are disabled by default and hence, you need to explicitly specify that you want to install from Backports.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install -t buster-backports nagios-nrpe-server<\/code><\/pre>\n\n\n\n<p>Confirm installed version once the installation completes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nrpe -V<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>NRPE - Nagios Remote Plugin Executor\nVersion: 4.0.3<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Running NRPE on Debian 11\/Debian 10<\/h4>\n\n\n\n<p>Run the commands below to start and enable nrpe to run on system boot.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl enable --now nagios-nrpe-server<\/code><\/pre>\n\n\n\n<p>To check the status of NRPE agent;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl status nagios-nrpe-server<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\u25cf nagios-nrpe-server.service - Nagios Remote Plugin Executor\n     Loaded: loaded (\/lib\/systemd\/system\/nagios-nrpe-server.service; enabled; vendor preset: enabled)\n     Active: active (running) since Thu 2021-11-18 13:48:57 EAT; 9min ago\n       Docs: http:\/\/www.nagios.org\/documentation\n   Main PID: 775 (nrpe)\n      Tasks: 1 (limit: 4678)\n     Memory: 1012.0K\n        CPU: 7ms\n     CGroup: \/system.slice\/nagios-nrpe-server.service\n             \u2514\u2500775 \/usr\/sbin\/nrpe -c \/etc\/nagios\/nrpe.cfg -f\n\nNov 18 13:48:57 debian11 systemd[1]: Started Nagios Remote Plugin Executor.\nNov 18 13:48:57 debian11 nrpe[775]: Starting up daemon\nNov 18 13:48:57 debian11 nrpe[775]: Server listening on 0.0.0.0 port 5666.\nNov 18 13:48:57 debian11 nrpe[775]: Server listening on :: port 5666.\nNov 18 13:48:57 debian11 nrpe[775]: Listening for connections on port 5666\nNov 18 13:48:57 debian11 nrpe[775]: Allowing connections from: 127.0.0.1,::1\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Open NRPE Port on Firewall<\/h4>\n\n\n\n<p>NRPE uses port TCP 5666 by default. If firewall is running, open this port to allow external checks from Nagios Monitoring server.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ufw allow from &lt;NAGIOS_IP&gt; to any port 5666 proto tcp comment \"Allow Connection from Nagios Server for Metrics check\"<\/code><\/pre>\n\n\n\n<p>If you are using your IP tables;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install iptables-persistent -y\niptables -I INPUT -p tcp -s &lt;NAGIOS_IP&gt; --dport 5666 -j ACCEPT\niptables-save &gt; \/etc\/iptables\/rules.v4<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"build-from-source\">Install Nagios NRPE Agent from Source Code<\/h3>\n\n\n\n<p>You can as well build Nagios NRPE agent from the source code.<\/p>\n\n\n\n<p>To install Nagios NRPE from source code:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install Required  Build Packages<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>apt update<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install -y autoconf automake gcc libc6 libmcrypt-dev make libssl-dev wget<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Download NRPE Source Archive<\/h4>\n\n\n\n<p>Next, download the current release version of NRPE source code from the <a href=\"https:\/\/github.com\/NagiosEnterprises\/nrpe\/releases\" target=\"_blank\" rel=\"noreferrer noopener\">releases <\/a>page.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wget https:\/\/github.com\/NagiosEnterprises\/nrpe\/releases\/download\/nrpe-4.0.3\/nrpe-4.0.3.tar.gz<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Install Nagios NRPE Agent from Source Code<\/h4>\n\n\n\n<p>Extract the source archive<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>tar xzf nrpe-4.0.3.tar.gz<\/code><\/pre>\n\n\n\n<p>Compile the agent;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd nrpe-4.0.3\/<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>.\/configure --enable-command-args<\/code><\/pre>\n\n\n\n<p>Sample summary;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>...\n*** Configuration summary for nrpe 4.0.3 2020-04-28 ***:\n\n General Options:\n -------------------------\n NRPE port:    5666\n NRPE user:    nagios\n NRPE group:   nagios\n Nagios user:  nagios\n Nagios group: nagios\n\n\nReview the options above for accuracy.  If they look okay,\ntype 'make all' to compile the NRPE daemon and client\nor type 'make' to get a list of make options.\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>make all<\/code><\/pre>\n\n\n\n<p>Create NRPE nagios user and group;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>make install-groups-users<\/code><\/pre>\n\n\n\n<p>Install NRPE binary files;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>make install<\/code><\/pre>\n\n\n\n<p>Install NRPE configuration files;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>make install-config<\/code><\/pre>\n\n\n\n<p>The configs are placed under <code>\/usr\/local\/nagios\/etc<\/code> directory as <code>nrpe.cfg<\/code>.<\/p>\n\n\n\n<p>Update services file to define NRPE service and respective port on which it listens on;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo \"nrpe\t\t5666\/tcp\t\t\t# Nagios NRPE\" &gt;&gt; \/etc\/services<\/code><\/pre>\n\n\n\n<p>Install NRPE service;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>make install-init<\/code><\/pre>\n\n\n\n<p>This creates a systemd unit file, <code><strong>\/lib\/systemd\/system\/nrpe.service<\/strong><\/code>.<\/p>\n\n\n\n<p>Hence you can start and enable NRPE to run on boot;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl enable --now nrpe<\/code><\/pre>\n\n\n\n<p>You can then enable the service to be accessible on firewall as shown above.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install Nagios Plugins From Source<\/h4>\n\n\n\n<p>Download plugins from <a href=\"https:\/\/www.nagios.org\/downloads\/nagios-plugins\/\" target=\"_blank\" rel=\"noopener\">downloads page<\/a>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wget https:\/\/nagios-plugins.org\/download\/nagios-plugins-2.3.3.tar.gz<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>tar xzf nagios-plugins-2.3.3.tar.gz<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>cd nagios-plugins-2.3.3\n.\/configure\nmake\nmake install<\/code><\/pre>\n\n\n\n<p>The plugins are installed under <code>\/usr\/local\/nagios\/libexec\/<\/code> directory.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Configure NRPE Agent<\/h3>\n\n\n\n<p>When installed from the APT repos, the default Nagios NRPE configuration is&nbsp;<code><strong>\/etc\/nagios\/nrpe.cfg<\/strong><\/code>.<\/p>\n\n\n\n<p>When installed from the source, the default configuration file is <code>\/usr\/local\/nagios\/etc\/nrpe.cfg<\/code>.<\/p>\n\n\n\n<p>The configuration files are well commented. This is how the config looks like with no comments;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>grep -vE \"^.*#|^$\" \/usr\/local\/nagios\/etc\/nrpe.cfg<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>log_facility=daemon\ndebug=0\npid_file=\/usr\/local\/nagios\/var\/nrpe.pid\nserver_port=5666\nnrpe_user=nagios\nnrpe_group=nagios\nallowed_hosts=127.0.0.1,::1\ndont_blame_nrpe=0\nallow_bash_command_substitution=0\ncommand_timeout=60\nconnection_timeout=300\ndisable_syslog=0\ncommand[check_users]=\/usr\/local\/nagios\/libexec\/check_users -w 5 -c 10\ncommand[check_load]=\/usr\/local\/nagios\/libexec\/check_load -r -w .15,.10,.05 -c .30,.25,.20\ncommand[check_hda1]=\/usr\/local\/nagios\/libexec\/check_disk -w 20% -c 10% -p \/dev\/hda1\ncommand[check_zombie_procs]=\/usr\/local\/nagios\/libexec\/check_procs -w 5 -c 10 -s Z\ncommand[check_total_procs]=\/usr\/local\/nagios\/libexec\/check_procs -w 150 -c 200\n<\/code><\/pre>\n\n\n\n<p>In most cases, the configs above would suffice to monitor the host agent metrics.<\/p>\n\n\n\n<p>However, there are a few parameters that you might want to update:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>allowed_hosts=127.0.0.1,::1<\/code><\/pre>\n\n\n\n<p>Update this parameter to include the IP address of the monitoring server. For example, in my setup, the IP address of the Nagios server is 192.168.58.22. Hence, this parameter is updated such that it looks like;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>allowed_hosts=127.0.0.1,192.168.58.22<\/code><\/pre>\n\n\n\n<p>The others include the commands to check various metrics. Below are my updated commands based on host agent.<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>command[check_users]=\/usr\/local\/nagios\/libexec\/check_users -w 5 -c 10\ncommand[check_load]=\/usr\/local\/nagios\/libexec\/check_load -r -w 15,10,5 -c 30,25,20\ncommand[check_disk]=\/usr\/local\/nagios\/libexec\/check_disk -w 20% -c 10% -p \/dev\/sda1\ncommand[check_zombie_procs]=\/usr\/local\/nagios\/libexec\/check_procs -w 5 -c 10 -s Z\ncommand[check_total_procs]=\/usr\/local\/nagios\/libexec\/check_procs -w 150 -c 200\n<\/code><\/pre>\n\n\n\n<p>The NRPE installed from the APT, the plugins path is set to <code>\/usr\/lib\/nagios\/plugins\/<\/code>. The commands above would look like;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>command[check_users]=\/usr\/lib\/nagios\/plugins\/check_users -w 5 -c 10\ncommand[check_load]=\/usr\/lib\/nagios\/plugins\/check_load -r -w 15,10,5 -c 30,25,20\ncommand[check_disk]=\/usr\/lib\/nagios\/plugins\/check_disk -w 20% -c 10% -p \/dev\/sda1\ncommand[check_zombie_procs]=\/usr\/lib\/nagios\/plugins\/check_procs -w 5 -c 10 -s Z\ncommand[check_total_procs]=\/usr\/lib\/nagios\/plugins\/check_procs -w 150 -c 200\n<\/code><\/pre>\n\n\n\n<p>In general, this is how my configuration is like;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>log_facility=daemon\ndebug=0\npid_file=\/run\/nagios\/nrpe.pid\nserver_port=5666\nnrpe_user=nagios\nnrpe_group=nagios\nallowed_hosts=127.0.0.1,::1\ndont_blame_nrpe=0\nallow_bash_command_substitution=0\ncommand_timeout=60\nconnection_timeout=300\ndisable_syslog=0\ncommand[check_users]=\/usr\/lib\/nagios\/plugins\/check_users -w 5 -c 10\ncommand[check_load]=\/usr\/lib\/nagios\/plugins\/check_load -r -w 15,10,5 -c 30,25,20\ncommand[check_disk]=\/usr\/lib\/nagios\/plugins\/check_disk -w 20% -c 10% -p \/dev\/sda1\ncommand[check_zombie_procs]=\/usr\/lib\/nagios\/plugins\/check_procs -w 5 -c 10 -s Z\ncommand[check_total_procs]=\/usr\/lib\/nagios\/plugins\/check_procs -w 150 -c 200\ninclude=\/etc\/nagios\/nrpe_local.cfg\ninclude_dir=\/etc\/nagios\/nrpe.d\/\n<\/code><\/pre>\n\n\n\n<p>Restart NRPE when done configuring it;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl restart nagios-nrpe-server.service<\/code><\/pre>\n\n\n\n<p>If installed from the source, then use <code>nrpe.service<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl restart nrpe.service<\/code><\/pre>\n\n\n\n<p>Check to see if port 5666\/tcp is listening;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ss -altnp | grep 5666<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>LISTEN    0         5                  0.0.0.0:5666             0.0.0.0:*        users:((\"nrpe\",pid=10345,fd=4))                                                \nLISTEN    0         5                     &#91;::]:5666                &#91;::]:*        users:((\"nrpe\",pid=10345,fd=5))<\/code><\/pre>\n\n\n\n<p>If you already added hosts to Nagios and defined the services, then such is the example of how they should look on Nagios dashboard.<\/p>\n\n\n\n<p>Hosts;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1914\" height=\"501\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-hosts.png\" alt=\"\" class=\"wp-image-10978\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-hosts.png?v=1637265481 1914w, https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-hosts-768x201.png?v=1637265481 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-hosts-1536x402.png?v=1637265481 1536w\" sizes=\"(max-width: 1914px) 100vw, 1914px\" \/><\/figure>\n\n\n\n<p>Services;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1914\" height=\"708\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-services.png\" alt=\"\" class=\"wp-image-10979\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-services.png?v=1637265525 1914w, https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-services-768x284.png?v=1637265525 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2021\/11\/current-status-nagios-services-1536x568.png?v=1637265525 1536w\" sizes=\"(max-width: 1914px) 100vw, 1914px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Further Reading<\/h3>\n\n\n\n<p><a href=\"https:\/\/assets.nagios.com\/downloads\/nagioscore\/docs\/nagioscore\/4\/en\/toc.html\" target=\"_blank\" rel=\"noreferrer noopener\">Nagios Core Documentation<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other Tutorials<\/h3>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-nagios-nrpe-agent-on-rocky-linux-8\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install Nagios NRPE Agent on Rocky Linux 8<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/how-to-install-nagios-plugins-and-nrpe-agents-on-centos-7-rhel-7-fedora-29\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Install Nagios Plugins and NRPE agents on CentOS 7\/RHEL 7\/Fedora 29<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guide describes how to easily install Nagios NRPE agents on Debian 11\/Debian 10. If you want to monitor your Debian hosts using Nagios server,<\/p>\n","protected":false},"author":3,"featured_media":9295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[72,121,73],"tags":[997,3958,4284,4281,4282,4283,4285,147,4286],"class_list":["post-10960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monitoring","category-howtos","category-nagios","tag-debian-10","tag-debian-11","tag-debian-11-nrpe","tag-install-nagios-nrpe-agents-on-debian-11-debian-10","tag-install-nrpe-agent-on-debian","tag-nagios-nrpe-install","tag-nagios-plugins-install","tag-nrpe","tag-nrpe-nagios-plugins","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/10960"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=10960"}],"version-history":[{"count":9,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/10960\/revisions"}],"predecessor-version":[{"id":21607,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/10960\/revisions\/21607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/9295"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=10960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=10960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=10960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}