I wanted to inquire about behavior I am seeing with check_icmp plugin version 2.4.5. This week a hypervisor admin reached out telling me he is receiving alerts when his hosts are up. I caught one of the hosts that nagios was seeing as 'down' and grabbed a verbose response of the check_icmp output.
The command is:
Code: Select all
./check_icmp -H $HOSTADDRESS -w 3000,80% -c 5000,100% -vIn the verbose output, I see a message that I can't find much info on via the web:
Code: Select all
address_family: 2 (IPv4 = 2; IPv6 = 10)
ttl set to 64
Setting alarm timeout to 10 seconds
packets: 5, targets: 1
target_interval: 0.000, pkt_interval 80.000
crit.rta: 5000.000
max_completion_time: 30400.000
max_completion_time: 30400000 timeout: 10
Timout must be at least 31
crit = {5000000, 100%}, warn = {3000000, 80%}
pkt_interval: 80000 target_interval: 0 retry_interval: 0
icmp_pkt_size: 76 timeout: 10
time_passed: 401402 final_wait: 29998598 max_completion_time: 30400000
Waiting for 29998598 micro-seconds (29998.598 msecs)
handle_random_icmp(0x7ffcd9036310, 0x7ffcd9036210)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
Packet is no response to a packet we sent
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)
handle_random_icmp(0x7ffd518a7040, 0x7ffd518a6f40)