I install nsclient agent into some of windows 2003 and windows 2008 server and use the same nsclient.ini file. All are running functionally with real time passive system event log except one windows 2008 server. The install nsclient agent success without any error. When I get the system alert, it is unable to send NSCA to nagios server.
I run nsclient in debug mode (nscp test) and below is the debug log file for refer.
D eventlog Reading eventlog messages...
D eventlog Processing: 000000000226B650
E nsca Failed to read data: End of file
D:\source\nscp\include\socket/client.hpp:148
D nsca Retrying attempt 0 of 3
E nsca Failed to read data: End of file
D:\source\nscp\include\socket/client.hpp:148
D nsca Retrying attempt 1 of 3
E nsca Failed to read data: End of file
D:\source\nscp\include\socket/client.hpp:148
D nsca Retrying attempt 2 of 3
E nsca Failed to read data: End of file
D:\source\nscp\include\socket/client.hpp:148
D nsca Retrying failed
I have already comment only_from in nsca and restart xinetd. Other windows2003/2008 can send passive system log nagios with same nsclient.ini file.
Just this windows 2008 hit this problem.
I find the error by google, but I am no right to read below link. Actually, We have subscription for Nagios XI interprise. How Can I access the customer support forum?
1. delete all service for SDSNAP02 in CCM
2. delete host in CCM
3. create host and service in CCM
4. in client side generate error messages
5. error services can see in "Unconfigured Objects"
6. match "unconfigurd objects" to host SDSNAP02
7. generate error message for testing
8. Find nagios logged below messages in /var/log/messages
Jun 11 12:36:14 ngonap01 xinetd[3862]: FAIL: nsca per_source_limit from=::ffff:172.31.8.166
Jun 11 12:36:14 ngonap01 xinetd[3862]: FAIL: nsca per_source_limit from=::ffff:172.31.8.166
Jun 11 12:36:14 ngonap01 xinetd[3862]: FAIL: nsca per_source_limit from=::ffff:172.31.8.166
I guess some mistake we should fix in nagios server.
You do not have the required permissions to view the files attached to this post.