newvs1.nagios.com and Nagios XI
newvs1.nagios.com and Nagios XI
Is there a way to disable Nagios XI from trying to communicate w/ newvs1.nagios.com?
-Doron
-Doron
Re: newvs1.nagios.com and Nagios XI
If you disabled the regular system update checks from the admin menu that should prevent the outbound requests.
Re: newvs1.nagios.com and Nagios XI
We disabled this option, though our FW team is still seeing requests to newvs1.nagios.com on port 80, once a minute.
Any additional suggestions?
Thanks,
Doron
Any additional suggestions?
Thanks,
Doron
Re: newvs1.nagios.com and Nagios XI
Since it's non-secure HTTP, why not sniff the traffic and see what it is?
Andrew J. - Do you even grok?
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: newvs1.nagios.com and Nagios XI
Do you know what URL it is trying to pull?
Another thing I can think of is that if any users have the default homepage set it will try to pull the feeds from our server. This can be modified globally in Admin-> Manage Components-> Home Page Modification
Another thing I can think of is that if any users have the default homepage set it will try to pull the feeds from our server. This can be modified globally in Admin-> Manage Components-> Home Page Modification
Re: newvs1.nagios.com and Nagios XI
We are not allowed by our corporation to run a packet sniffer.
We changed the user default page, though the firewall team is still seeing Nagios trying to connect to that server every minute 24/7. With that in mind it has to be some automated process as we don't have that many people logging into Nagios. Any other suggestions?
-Doron
We changed the user default page, though the firewall team is still seeing Nagios trying to connect to that server every minute 24/7. With that in mind it has to be some automated process as we don't have that many people logging into Nagios. Any other suggestions?
-Doron
-
slansing
- Posts: 7698
- Joined: Mon Apr 23, 2012 4:28 pm
- Location: Travelling through time and space...
Re: newvs1.nagios.com and Nagios XI
Without knowing where the data start and endpoints are it is very difficult to search things like this out, is it possible for you to use one of your backup XI servers, un-mount it from the network, and then run a sniffer on it? Or, have the firewall team take a look at the other server and see if there is a difference? Then that could help narrow down the possibilities. It almost certainly has to be some sort of live, RSS like feed sent from us to the server.
Re: newvs1.nagios.com and Nagios XI
Code: Select all
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 018: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 080: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 035: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 088: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 043: #011Msg: Apr 30 09:24:01 usa7061lv981 CROND[4556]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/cleaner.php > /usr/local/nagiosxi/var/cleaner.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 019: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 074: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 031: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 077: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 044: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 027: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 087: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 052: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 012: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 062: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 021: #011Msg: Apr 30 09:22:01 usa7061lv981 rootsh[06a0e]: tmproot: 003: #011Msg: Apr 30 09:21:01 usa7061lv981 CROND[2531]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/eventman.php > /usr/local/nagiosxi/var/eventman.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 020: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 075: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 021: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 080: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 047: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 030: #011Msg: Apr 30 09:23:01 usa7061lv981 CROND[3905]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/sysstat.php > /usr/local/nagiosxi/var/sysstat.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 021: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 076: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 022: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 081: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 048: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 031: #011Msg: Apr 30 09:23:01 usa7061lv981 CROND[3906]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/reportengine.php > /usr/local/nagiosxi/var/reportengine.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 022: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 077: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 032: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 078: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 045: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 028: #011Msg: Apr 30 09:23:01 usa7061lv981 CROND[3903]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/eventman.php > /usr/local/nagiosxi/var/eventman.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 016: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 078: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 033: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 086: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 053: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 036: #011Msg: Apr 30 09:24:01 usa7061lv981 CROND[4546]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/sysstat.php > /usr/local/nagiosxi/var/sysstat.log 2>&1)
Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 017: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 079: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 034: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 087: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 054: #011Msg: Apr 30 09:24:02 usa7061lv981 rootsh[06a0e]: tmproot: 037: #011Msg: Apr 30 09:24:01 usa7061lv981 CROND[4547]: (nagios) CMD (/usr/bin/php -q /usr/local/nagiosxi/cron/nom.php > /usr/local/nagiosxi/var/nom.log 2>&1)
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: newvs1.nagios.com and Nagios XI
I don't see anything in here that is calling out to api.nagios.com
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: newvs1.nagios.com and Nagios XI
Doron,
Can you go to Admin -> License Information
Copy the key in "Your License Key:" section and PM it to me.
Also, can you run the following as root
Thanks
Can you go to Admin -> License Information
Copy the key in "Your License Key:" section and PM it to me.
Also, can you run the following as root
Code: Select all
echo "select * from xi_options where name='auto_update_check';"|psql nagiosxi nagiosxi
Last edited by scottwilkerson on Tue Apr 30, 2013 12:36 pm, edited 2 times in total.
Reason: added psql auto_update_check
Reason: added psql auto_update_check