The remote server's nrpe is compiled with SSL enabled. We've tried the service check using check_nrpe using the "-n" parameter and without it.
The Nagios host check_nrpe is 2.15
Code: Select all
[nagios@nagioshost libexec]$ ./check_nrpe --help
NRPE Plugin for Nagios
Copyright (c) 1999-2008 Ethan Galstad (nagios@nagios.org)
Version: 2.15
Last Modified: 09-06-2013
License: GPL v2 with exemptions (-l for more info)
SSL/TLS Available: Anonymous DH Mode, OpenSSL 0.9.6 or higher required
//snip
~~~~~~~~~~~~~~~~~~~~
[nagios@nagioshost ~]$ /usr/local/nagios/libexec/check_nrpe -H remote ip -t 30 -c check_disk -a '-w 90 -c 95 -p /'
CHECK_NRPE: Error - Could not complete SSL handshake.
Code: Select all
[nagios@nagioshost ~]$ /usr/local/nagios/libexec/check_nrpe -H remote ip -t 30 -c check_disk -a -n '-w 90 -c 95 -p /'
NRPE Plugin for Nagios
Copyright (c) 1999-2008 Ethan Galstad (nagios@nagios.org)
Version: 2.15
Last Modified: 09-06-2013
License: GPL v2 with exemptions (-l for more info)
SSL/TLS Available: Anonymous DH Mode, OpenSSL 0.9.6 or higher required
//snip
~~~~~~~~~~~~
Code: Select all
$ cat /etc/redhat-release
Red Hat Enterprise Linux Server release 7.6 (Maipo)
$ nrpe --version
NRPE - Nagios Remote Plugin Executor
Version: 3.2.1
NRPE - Nagios Remote Plugin Executor
Version: 3.2.1
Copyright (c) 2009-2017 Nagios Enterprises
1999-2008 Ethan Galstad (nagios@nagios.org)
Last Modified: 2017-09-01
License: GPL v2 with exemptions (-l for more info)
SSL/TLS Available, OpenSSL 0.9.6 or higher required
[nagios@host ~]
$ openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017
[nagios@host ~]