Error in AWS EC2 Uubuntu Monitoring

This support forum board is for support questions relating to Nagios XI, our flagship commercial network monitoring solution.
scottwilkerson
DevOps Engineer
Posts: 19396
Joined: Tue Nov 15, 2011 3:11 pm
Location: Nagios Enterprises
Contact:

Re: Error in AWS EC2 Uubuntu Monitoring

Post by scottwilkerson »

ivp2015 wrote:Hi Team,

I have done changes to

root@ip-172-31-28-18:~# cat /etc/xinetd.d/nrpe
# default: on
# description: NRPE (Nagios Remote Plugin Executor)
service nrpe
{
flags = REUSE
socket_type = stream
port = 5666
wait = no
user = nagios
group = nagios
server = /usr/local/nagios/bin/nrpe
server_args = -c /usr/local/nagios/etc/nrpe.cfg --inetd
log_on_failure += USERID
disable = no
only_from = 127.0.0.1 115.114.12.4 182.74.168.35
}

and its still not working
I'm a little confused, the image above looks like it is located at 54.76.125.226, but the cat of your NRPE config looks like it is on a different server

Code: Select all

root@ip-172-31-28-18
You are making the changes on the REMOTE server correct (54.76.125.226) and port 5666 is open in the EC2 security group for that server?
Former Nagios employee
Creator:
Human Design Website
Get Your Human Design Chart
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

Hi,

This server are setup on AWS and server local address is 172.31.28.18 and Public NAT IP is - 54.76.125.226 those IP's are NAT with each other without any restriction,

Thanks
User avatar
lmiltchev
Bugs find me
Posts: 13589
Joined: Mon May 23, 2011 12:15 pm

Re: Error in AWS EC2 Uubuntu Monitoring

Post by lmiltchev »

Can you double check if port 5666 is indeed open? It seems to me that it is closed...
# nmap 54.76.125.226 -p 5666

Starting Nmap 6.47 ( http://nmap.org ) at 2017-03-29 16:09 CDT
Nmap scan report for ec2-54-76-125-226.eu-west-1.compute.amazonaws.com (54.76.125.226)
Host is up (0.0010s latency).
PORT STATE SERVICE
5666/tcp filtered nrpe

Nmap done: 1 IP address (1 host up) scanned in 0.28 seconds
Be sure to check out our Knowledgebase for helpful articles and solutions!
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

[root@ivpnagiosprod varen]# nmap 54.76.125.226 -p 5666

Starting Nmap 5.51 ( http://nmap.org ) at 2017-03-30 15:54 IST
Nmap scan report for ec2-54-76-125-226.eu-west-1.compute.amazonaws.com (54.76.125.226)
Host is up (0.16s latency).
PORT STATE SERVICE
5666/tcp open nrpe

Nmap done: 1 IP address (1 host up) scanned in 7.46 seconds
[root@ivpnagiosprod varen]#
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

Port 5666 are open but only from our environment,

Thanks
User avatar
mcapra
Posts: 3739
Joined: Thu May 05, 2016 3:54 pm

Re: Error in AWS EC2 Uubuntu Monitoring

Post by mcapra »

Lets step back a bit. Can you share the outputs of these commands executed from the CLI of your Nagios XI machine:

Code: Select all

/usr/local/nagios/libexec/check_nrpe -H 54.76.125.226
/usr/local/nagios/libexec/check_nrpe -H 54.76.125.226 -c check_disk -a '-w 70% -c 80% -p /
Can you also share the contents of the following file from the remote Ubuntu machine:

Code: Select all

/usr/local/nagios/etc/nrpe.cfg
Former Nagios employee
https://www.mcapra.com/
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

1) /usr/local/nagios/libexec/check_nrpe -H 54.76.125.226

OUTPUT

[root@ivpnagiosprod varen]# /usr/local/nagios/libexec/check_nrpe -H 54.76.125.226
NRPE v2.15


2) /usr/local/nagios/libexec/check_nrpe -H 54.76.125.226 -c check_disk -a '-w 70% -c 80% -p /

OUTPUT

[root@ivpnagiosprod varen]# /usr/local/nagios/libexec/check_nrpe -H 54.76.125.226 -c check_disk -a '-w 70% -c 80% -p /
>
>
not responding

From Client Machine

1) /usr/local/nagios/etc/nrpe.cfg

OUTPUT

root@ip-172-31-28-18:~# /usr/local/nagios/etc/nrpe.cfg
bash: /usr/local/nagios/etc/nrpe.cfg: Permission denied
root@ip-172-31-28-18:~#
User avatar
cdienger
Support Tech
Posts: 5045
Joined: Tue Feb 07, 2017 11:26 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by cdienger »

Greetings,

/usr/local/nagios/libexec/check_nrpe -H 54.76.125.226 -c check_disk -a '-w 70% -c 80% -p / ----- missing a ' at the end. Should be:

/usr/local/nagios/libexec/check_nrpe -H 54.76.125.226 -c check_disk -a '-w 70% -c 80% -p /'

/usr/local/nagios/etc/nrpe.cfg --- you can use a program like winscp to copy the file from the nagios server or use cat /usr/local/nagios/etc/nrpe.cfg to output the contents and copy/paste them.
As of May 25th, 2018, all communications with Nagios Enterprises and its employees are covered under our new Privacy Policy.
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

Hi,

It mean we need to replace nrpe.cfg file in AWS ubuntu machine and copy from Nagios server, and after done this can we need to execute any chmod command in client ubuntu machine or not,

and in the /usr/local/nagios/etc/nrpe.cfg
allowed_hosts=127.0.0.1 115.114.12.4 182.74.168.35
or
allowed_hosts=127.0.0.1, 115.114.12.4, 182.74.168.35

which one is fine?

Thanks
ivp2015
Posts: 142
Joined: Fri Feb 20, 2015 12:32 am

Re: Error in AWS EC2 Uubuntu Monitoring

Post by ivp2015 »

last time i have sent wrong info please find bellow the nrpe.cfg config from AWS client ubuntu machine

root@ip-172-31-28-18:~# cat /usr/local/nagios/etc/nrpe.cfg
#############################################################################
# Sample NRPE Config File
# Written by: Ethan Galstad ([email protected])
#
# Last Modified: 11-23-2007
#
# NOTES:
# This is a sample configuration file for the NRPE daemon. It needs to be
# located on the remote host that is running the NRPE daemon, not the host
# from which the check_nrpe client is being executed.
#############################################################################


# LOG FACILITY
# The syslog facility that should be used for logging purposes.

log_facility=daemon



# PID FILE
# The name of the file in which the NRPE daemon should write it's process ID
# number. The file is only written if the NRPE daemon is started by the root
# user and is running in standalone mode.

pid_file=/var/run/nrpe.pid



# PORT NUMBER
# Port number we should wait for connections on.
# NOTE: This must be a non-priviledged port (i.e. > 1024).
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

server_port=5666



# SERVER ADDRESS
# Address that nrpe should bind to in case there are more than one interface
# and you do not want nrpe to bind on all interfaces.
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

#server_address=127.0.0.1



# NRPE USER
# This determines the effective user that the NRPE daemon should run as.
# You can either supply a username or a UID.
#
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_user=nagios



# NRPE GROUP
# This determines the effective group that the NRPE daemon should run as.
# You can either supply a group name or a GID.
#
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_group=nagios



# ALLOWED HOST ADDRESSES
# This is an optional comma-delimited list of IP address or hostnames
# that are allowed to talk to the NRPE daemon.
#
# Note: The daemon only does rudimentary checking of the client's IP
# address. I would highly recommend adding entries in your /etc/hosts.allow
# file to allow only the specified host to connect to the port
# you are running this daemon on.
#
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

allowed_hosts=127.0.0.1,115.114.12.4,182.74.168.35


# COMMAND ARGUMENT PROCESSING
# This option determines whether or not the NRPE daemon will allow clients
# to specify arguments to commands that are executed. This option only works
# if the daemon was configured with the --enable-command-args configure script
# option.
#
# *** ENABLING THIS OPTION IS A SECURITY RISK! ***
# Read the SECURITY file for information on some of the security implications
# of enabling this variable.
#
# Values: 0=do not allow arguments, 1=allow command arguments

dont_blame_nrpe=1



# COMMAND PREFIX
# This option allows you to prefix all commands with a user-defined string.
# A space is automatically added between the specified prefix string and the
# command line from the command definition.
#
# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***
# Usage scenario:
# Execute restricted commmands using sudo. For this to work, you need to add
# the nagios user to your /etc/sudoers. An example entry for alllowing
# execution of the plugins from might be:
#
# nagios ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/
#
# This lets the nagios user run all commands in that directory (and only them)
# without asking for a password. If you do this, make sure you don't give
# random users write access to that directory or its contents!

# command_prefix=/usr/bin/sudo



# DEBUGGING OPTION
# This option determines whether or not debugging messages are logged to the
# syslog facility.
# Values: 0=debugging off, 1=debugging on

debug=0



# COMMAND TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# allow plugins to finish executing before killing them off.

command_timeout=60



# CONNECTION TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# wait for a connection to be established before exiting. This is sometimes
# seen where a network problem stops the SSL being established even though
# all network sessions are connected. This causes the nrpe daemons to
# accumulate, eating system resources. Do not set this too low.

connection_timeout=300



# WEEK RANDOM SEED OPTION
# This directive allows you to use SSL even if your system does not have
# a /dev/random or /dev/urandom (on purpose or because the necessary patches
# were not applied). The random number generator will be seeded from a file
# which is either a file pointed to by the environment valiable $RANDFILE
# or $HOME/.rnd. If neither exists, the pseudo random number generator will
# be initialized and a warning will be issued.
# Values: 0=only seed from /dev/random, 1=also seed from weak randomness

#allow_weak_random_seed=1



# INCLUDE CONFIG FILE
# This directive allows you to include definitions from an external config file.

#include=<somefile.cfg>



# INCLUDE CONFIG DIRECTORY
# This directive allows you to include definitions from config files (with a
# .cfg extension) in one or more directories (with recursion).

#include_dir=<somedirectory>
include_dir=/usr/local/nagios/etc/nrpe



# COMMAND DEFINITIONS
# Command definitions that this daemon will run. Definitions
# are in the following format:
#
# command[<command_name>]=<command_line>
#
# When the daemon receives a request to return the results of <command_name>
# it will execute the command specified by the <command_line> argument.
#
# Unlike Nagios, the command line cannot contain macros - it must be
# typed exactly as it should be executed.
#
# Note: Any plugins that are used in the command lines must reside
# on the machine that this daemon is running on! The examples below
# assume that you have plugins installed in a /usr/local/nagios/libexec
# directory. Also note that you will have to modify the definitions below
# to match the argument format the plugins expect. Remember, these are
# examples only!


# The following examples use hardcoded command arguments...

#command[check_users]=/usr/local/nagios/libexec/check_users -w 5 -c 10
#command[check_load]=/usr/local/nagios/libexec/check_load -w 15,10,5 -c 30,25,20
#command[check_hda1]=/usr/local/nagios/libexec/check_disk -w 20% -c 10% -p /dev/hda1
#command[check_zombie_procs]=/usr/local/nagios/libexec/check_procs -w 5 -c 10 -s Z
#command[check_total_procs]=/usr/local/nagios/libexec/check_procs -w 150 -c 200


# The following examples allow user-supplied arguments and can
# only be used if the NRPE daemon was compiled with support for
# command arguments *AND* the dont_blame_nrpe directive in this
# config file is set to '1'. This poses a potential security risk, so
# make sure you read the SECURITY file before doing this.

#command[check_users]=/usr/local/nagios/libexec/check_users -w $ARG1$ -c $ARG2$
#command[check_load]=/usr/local/nagios/libexec/check_load -w $ARG1$ -c $ARG2$
#command[check_disk]=/usr/local/nagios/libexec/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$
#command[check_procs]=/usr/local/nagios/libexec/check_procs -w $ARG1$ -c $ARG2$ -s $ARG3$
Locked