Search found 38 matches
- Mon Jan 26, 2026 5:48 pm
- Forum: Nagios XI
- Topic: NCPA repeating error in syslog?
- Replies: 8
- Views: 20973
Re: NCPA repeating error in syslog?
I was just curious to see if this was addressed or not. I have not implemented any fix attempts or anything since noticing this issue a few months back and just wanted to ask if this got fixed
- Thu Sep 25, 2025 10:15 am
- Forum: Nagios XI
- Topic: NCPA repeating error in syslog?
- Replies: 8
- Views: 20973
Re: NCPA repeating error in syslog?
You might try doing a search of the internet for the first line. ncpa[4877]: Exception ignored in: <function _after_fork at 0x763105c0d080> I tried that but nothing came up that was of any use There is a discussion about it here https://support.nagios.com/forum/viewtopic.php?t=76492 I wonder why th...
- Tue Sep 23, 2025 3:11 pm
- Forum: Nagios XI
- Topic: NCPA repeating error in syslog?
- Replies: 8
- Views: 20973
NCPA repeating error in syslog?
Hey everyone, I didn't know where else to ask this but I am running the NCPA agent on a Ubuntu Server 24 that is sending syslog data to NagiosXI but I noticed all of this data in my syslog repeating and I have no clue what to make of it. Can anyone tell me what might be the issue? 2025-09-23T20:04:2...
- Fri Sep 12, 2025 3:06 pm
- Forum: Open Source Nagios Projects
- Topic: debian repo.nagios.com signature issue
- Replies: 15
- Views: 129206
Re: debian repo.nagios.com signature issue
That surprisingly worked. I had redid the key previously but apparently something didn't take and doing it again it worked. Appreciate it
- Tue Sep 09, 2025 12:59 pm
- Forum: Open Source Nagios Projects
- Topic: debian repo.nagios.com signature issue
- Replies: 15
- Views: 129206
Re: debian repo.nagios.com signature issue
Is this still an issue that hasnt been resolved as of yet? Last I saw was the June post about it but was curious if I needed to do something or if its still going on

upload pic

upload pic
- Fri Apr 18, 2025 12:30 pm
- Forum: Nagios XI
- Topic: NagiosXI and Tenable - TLS1.0 Question
- Replies: 6
- Views: 7245
Re: NagiosXI and Tenable - TLS1.0 Question
Okay I got it...so my new Tenable scan came back with port 25 (SMTP). Even though I never explicitly installed it or set it up, its a part of the NagiosXI install for Ubuntu. It installs postfix by default. I found it by checking my services service --status-all and I saw postfix was running. I then...
- Fri Apr 18, 2025 11:50 am
- Forum: Nagios XI
- Topic: NagiosXI and Tenable - TLS1.0 Question
- Replies: 6
- Views: 7245
Re: NagiosXI and Tenable - TLS1.0 Question
Sorry for my super late response; other things came up and I had to put this on the back burner. I will give that a try and re-run my Tenable scan and see if that does the trick. I will respond with and update once everything is done
- Wed Apr 02, 2025 10:32 am
- Forum: Nagios XI
- Topic: NagiosXI and Tenable - TLS1.0 Question
- Replies: 6
- Views: 7245
Re: NagiosXI and Tenable - TLS1.0 Question
From everything I have read and found, everything looks fine. Just not sure what exactly I am missing. I have tried probably 50 permutations of the settings in the SSL file with no luck.
- Mon Mar 31, 2025 2:13 pm
- Forum: Nagios XI
- Topic: GUI not writing to config files?
- Replies: 7
- Views: 3341
Re: GUI not writing to config files?
Dave, Yeah its still an issue. I just found it easier to delete the config file and re-create it like its new so everything works and is good but I know thats not feasible in all scenarios. We have the same issue. It shows it updated and everything looks good, even the file has the updated date on i...
- Mon Mar 31, 2025 10:26 am
- Forum: Nagios XI
- Topic: NagiosXI and Tenable - TLS1.0 Question
- Replies: 6
- Views: 7245
Re: NagiosXI and Tenable - TLS1.0 Question
Sure can # Pseudo Random Number Generator (PRNG): # Configure one or more sources to seed the PRNG of the SSL library. # The seed data should be of good random quality. # WARNING! On some platforms /dev/random blocks if not enough entropy # is available. This means you then cannot use the /dev/rando...