@ksafa, I would highly recommend uninstalling the VMWare SDK 6.7 and installing SDK 6.5 instead. We had quite a few compatibility issues with the latest SDK.
Run the vmware-uninstall-vSphere-CLI.pl script to uninstall the SDK 6.7. On my server its located in:
Seems to have made some improvement since at least I get check results now but i get the following error repeated several times before the output. This is only when i run as nagios user from command line, if i run as root i do not receive this message.
$ /usr/local/nagios/libexec/check_esx3.pl -f /usr/local/nagiosxi/etc/components/vmware/ESX1_auth.txt -H ESX1 -l MEM
*******************************************************************
Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client
is deprecated! Please set SSL_verify_mode to SSL_VERIFY_PEER
possibly with SSL_ca_file|SSL_ca_path for verification.
If you really don't want to verify the certificate and keep the
connection open to Man-In-The-Middle attacks please set
SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application.
*******************************************************************
at /usr/lib64/perl5/LWP/Protocol/http.pm line 31.
*******************************************************************
Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client
is deprecated! Please set SSL_verify_mode to SSL_VERIFY_PEER
possibly with SSL_ca_file|SSL_ca_path for verification.
If you really don't want to verify the certificate and keep the
connection open to Man-In-The-Middle attacks please set
SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application.
*******************************************************************
at /usr/lib64/perl5/LWP/Protocol/http.pm line 31.
*******************************************************************
Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client
is deprecated! Please set SSL_verify_mode to SSL_VERIFY_PEER
possibly with SSL_ca_file|SSL_ca_path for verification.
If you really don't want to verify the certificate and keep the
connection open to Man-In-The-Middle attacks please set
SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application.
*******************************************************************
at /usr/lib64/perl5/LWP/Protocol/http.pm line 31.
CHECK_ESX3.PL OK - mem usage=941375.27 MB (44.89%), overhead=0.00 MB, swapped=0.00 MB, memctl=0.00 MB | mem_usagemb=941375.27MB;; mem_usage=44.89%;; mem_overhead=0.00MB;; mem_swap=0.00MB;; mem_memctl=0.00MB;;