New NRPE error - error receiving data from daemon

This support forum board is for support questions relating to Nagios XI, our flagship commercial network monitoring solution.
psyllex
Posts: 129
Joined: Thu Dec 20, 2012 2:18 pm

New NRPE error - error receiving data from daemon

Post by psyllex »

I seemed to have fixed the whole SSL handshake problem by turning off SSL in the monitoring wizard.

Now I'm getting the error CHECK_NRPE: Error receiving data from daemon. I've checked /etc/services I've allowed nrpe in on port 5666. I've checked the nrpe.cfg on the Nagios server within /usr/local/nagios/etc/ and everything looks good there. I will say there are NO nrpe.cfg files on my remote Linux/Ubuntu hosts. I've looked in /usr/local usr/lib and couldn't find one. I used the Ubuntu Server agent, that is in the documentation to install the daemon. It runs well when I use the

Code: Select all

ps aux | grep nrpe command.  
I just don't know what I'm doing wrong here. I essentially got this far using Nagios Core and switched over to Nagios XI to avoid all this. Your help is appreciated. d
slansing
Posts: 7698
Joined: Mon Apr 23, 2012 4:28 pm
Location: Travelling through time and space...

Re: New NRPE error - error receiving data from daemon

Post by slansing »

Can you post the contents of your nrpe.cfg file which is located on your Nagios XI server? And you should have one on the Ubuntu server, we just ran through the guide here and had no issues. You should have the nrpe.cfg file on the Ubuntu system at this location:

Code: Select all

/etc/nagios/nrpe.cfg
Could you post the contents of this as well? Can you also post the command you are trying to send to the Ubuntu server from the Nagios server? We really need to see how you are defining this if you did enter the correct IP during the agent installation you should have no issues.
psyllex
Posts: 129
Joined: Thu Dec 20, 2012 2:18 pm

Re: New NRPE error - error receiving data from daemon

Post by psyllex »

Nagios XI nrpe.cfg:

Code: Select all

#############################################################################
# Sample NRPE Config File 
# Written by: Ethan Galstad ([email protected])
# 
# Last Modified: 11-23-2007
#
# NOTES:
# This is a sample configuration file for the NRPE daemon.  It needs to be
# located on the remote host that is running the NRPE daemon, not the host
# from which the check_nrpe client is being executed.
#############################################################################


# LOG FACILITY
# The syslog facility that should be used for logging purposes.

log_facility=daemon



# PID FILE
# The name of the file in which the NRPE daemon should write it's process ID
# number.  The file is only written if the NRPE daemon is started by the root
# user and is running in standalone mode.

pid_file=/var/run/nrpe.pid



# PORT NUMBER
# Port number we should wait for connections on.
# NOTE: This must be a non-priviledged port (i.e. > 1024).
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

server_port=5666



# SERVER ADDRESS
# Address that nrpe should bind to in case there are more than one interface
# and you do not want nrpe to bind on all interfaces.
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

#server_address=127.0.0.1



# NRPE USER
# This determines the effective user that the NRPE daemon should run as.  
# You can either supply a username or a UID.
# 
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_user=nagios



# NRPE GROUP
# This determines the effective group that the NRPE daemon should run as.  
# You can either supply a group name or a GID.
# 
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_group=nagios



# ALLOWED HOST ADDRESSES
# This is an optional comma-delimited list of IP address or hostnames 
# that are allowed to talk to the NRPE daemon.
#
# Note: The daemon only does rudimentary checking of the client's IP
# address.  I would highly recommend adding entries in your /etc/hosts.allow
# file to allow only the specified host to connect to the port
# you are running this daemon on.
#
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

allowed_hosts=127.0.0.1
 


# COMMAND ARGUMENT PROCESSING
# This option determines whether or not the NRPE daemon will allow clients
# to specify arguments to commands that are executed.  This option only works
# if the daemon was configured with the --enable-command-args configure script
# option.  
#
# *** ENABLING THIS OPTION IS A SECURITY RISK! *** 
# Read the SECURITY file for information on some of the security implications
# of enabling this variable.
#
# Values: 0=do not allow arguments, 1=allow command arguments

dont_blame_nrpe=0



# COMMAND PREFIX
# This option allows you to prefix all commands with a user-defined string.
# A space is automatically added between the specified prefix string and the
# command line from the command definition.
#
# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***
# Usage scenario: 
# Execute restricted commmands using sudo.  For this to work, you need to add
# the nagios user to your /etc/sudoers.  An example entry for alllowing 
# execution of the plugins from might be:
#
# nagios          ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/
#
# This lets the nagios user run all commands in that directory (and only them)
# without asking for a password.  If you do this, make sure you don't give
# random users write access to that directory or its contents!

# command_prefix=/usr/bin/sudo 



# DEBUGGING OPTION
# This option determines whether or not debugging messages are logged to the
# syslog facility.
# Values: 0=debugging off, 1=debugging on

debug=0



# COMMAND TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# allow plugins to finish executing before killing them off.

command_timeout=60



# CONNECTION TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# wait for a connection to be established before exiting. This is sometimes
# seen where a network problem stops the SSL being established even though
# all network sessions are connected. This causes the nrpe daemons to
# accumulate, eating system resources. Do not set this too low.

connection_timeout=300



# WEEK RANDOM SEED OPTION
# This directive allows you to use SSL even if your system does not have
# a /dev/random or /dev/urandom (on purpose or because the necessary patches
# were not applied). The random number generator will be seeded from a file
# which is either a file pointed to by the environment valiable $RANDFILE
# or $HOME/.rnd. If neither exists, the pseudo random number generator will
# be initialized and a warning will be issued.
# Values: 0=only seed from /dev/[u]random, 1=also seed from weak randomness

#allow_weak_random_seed=1



# INCLUDE CONFIG FILE
# This directive allows you to include definitions from an external config file.

#include=<somefile.cfg>



# INCLUDE CONFIG DIRECTORY
# This directive allows you to include definitions from config files (with a
# .cfg extension) in one or more directories (with recursion).

#include_dir=<somedirectory>
#include_dir=<someotherdirectory>



# COMMAND DEFINITIONS
# Command definitions that this daemon will run.  Definitions
# are in the following format:
#
# command[<command_name>]=<command_line>
#
# When the daemon receives a request to return the results of <command_name>
# it will execute the command specified by the <command_line> argument.
#
# Unlike Nagios, the command line cannot contain macros - it must be
# typed exactly as it should be executed.
#
# Note: Any plugins that are used in the command lines must reside
# on the machine that this daemon is running on!  The examples below
# assume that you have plugins installed in a /usr/local/nagios/libexec
# directory.  Also note that you will have to modify the definitions below
# to match the argument format the plugins expect.  Remember, these are
# examples only!


# The following examples use hardcoded command arguments...

command[check_users]=/usr/local/nagios/libexec/check_users -w 5 -c 10
command[check_load]=/usr/local/nagios/libexec/check_load -w 15,10,5 -c 30,25,20
command[check_hda1]=/usr/local/nagios/libexec/check_disk -w 20% -c 10% -p /dev/hda1
command[check_zombie_procs]=/usr/local/nagios/libexec/check_procs -w 5 -c 10 -s Z
command[check_total_procs]=/usr/local/nagios/libexec/check_procs -w 150 -c 200 


# The following examples allow user-supplied arguments and can
# only be used if the NRPE daemon was compiled with support for 
# command arguments *AND* the dont_blame_nrpe directive in this
# config file is set to '1'.  This poses a potential security risk, so
# make sure you read the SECURITY file before doing this.

#command[check_users]=/usr/local/nagios/libexec/check_users -w $ARG1$ -c $ARG2$
#command[check_load]=/usr/local/nagios/libexec/check_load -w $ARG1$ -c $ARG2$
#command[check_disk]=/usr/local/nagios/libexec/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$
#command[check_procs]=/usr/local/nagios/libexec/check_procs -w $ARG1$ -c $ARG2$ -s $ARG3$
Ubuntu machine nrpe.cfg

Code: Select all

#############################################################################
# Sample NRPE Config File 
# Written by: Ethan Galstad ([email protected])
# 
# Last Modified: 11-23-2007
#
# NOTES:
# This is a sample configuration file for the NRPE daemon.  It needs to be
# located on the remote host that is running the NRPE daemon, not the host
# from which the check_nrpe client is being executed.
#############################################################################


# LOG FACILITY
# The syslog facility that should be used for logging purposes.

log_facility=daemon



# PID FILE
# The name of the file in which the NRPE daemon should write it's process ID
# number.  The file is only written if the NRPE daemon is started by the root
# user and is running in standalone mode.

pid_file=/var/run/nagios/nrpe.pid



# PORT NUMBER
# Port number we should wait for connections on.
# NOTE: This must be a non-priviledged port (i.e. > 1024).
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

server_port=5666



# SERVER ADDRESS
# Address that nrpe should bind to in case there are more than one interface
# and you do not want nrpe to bind on all interfaces.
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

#server_address=127.0.0.1



# NRPE USER
# This determines the effective user that the NRPE daemon should run as.  
# You can either supply a username or a UID.
# 
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_user=nagios



# NRPE GROUP
# This determines the effective group that the NRPE daemon should run as.  
# You can either supply a group name or a GID.
# 
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

nrpe_group=nagios



# ALLOWED HOST ADDRESSES
# This is an optional comma-delimited list of IP address or hostnames 
# that are allowed to talk to the NRPE daemon.
#
# Note: The daemon only does rudimentary checking of the client's IP
# address.  I would highly recommend adding entries in your /etc/hosts.allow
# file to allow only the specified host to connect to the port
# you are running this daemon on.
#
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

allowed_hosts=127.0.0.1
 


# COMMAND ARGUMENT PROCESSING
# This option determines whether or not the NRPE daemon will allow clients
# to specify arguments to commands that are executed.  This option only works
# if the daemon was configured with the --enable-command-args configure script
# option.  
#
# *** ENABLING THIS OPTION IS A SECURITY RISK! *** 
# Read the SECURITY file for information on some of the security implications
# of enabling this variable.
#
# Values: 0=do not allow arguments, 1=allow command arguments

dont_blame_nrpe=0



# COMMAND PREFIX
# This option allows you to prefix all commands with a user-defined string.
# A space is automatically added between the specified prefix string and the
# command line from the command definition.
#
# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***
# Usage scenario: 
# Execute restricted commmands using sudo.  For this to work, you need to add
# the nagios user to your /etc/sudoers.  An example entry for alllowing 
# execution of the plugins from might be:
#
# nagios          ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/
#
# This lets the nagios user run all commands in that directory (and only them)
# without asking for a password.  If you do this, make sure you don't give
# random users write access to that directory or its contents!

# command_prefix=/usr/bin/sudo 



# DEBUGGING OPTION
# This option determines whether or not debugging messages are logged to the
# syslog facility.
# Values: 0=debugging off, 1=debugging on

debug=0



# COMMAND TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# allow plugins to finish executing before killing them off.

command_timeout=60



# CONNECTION TIMEOUT
# This specifies the maximum number of seconds that the NRPE daemon will
# wait for a connection to be established before exiting. This is sometimes
# seen where a network problem stops the SSL being established even though
# all network sessions are connected. This causes the nrpe daemons to
# accumulate, eating system resources. Do not set this too low.

connection_timeout=300



# WEEK RANDOM SEED OPTION
# This directive allows you to use SSL even if your system does not have
# a /dev/random or /dev/urandom (on purpose or because the necessary patches
# were not applied). The random number generator will be seeded from a file
# which is either a file pointed to by the environment valiable $RANDFILE
# or $HOME/.rnd. If neither exists, the pseudo random number generator will
# be initialized and a warning will be issued.
# Values: 0=only seed from /dev/[u]random, 1=also seed from weak randomness

#allow_weak_random_seed=1



# INCLUDE CONFIG FILE
# This directive allows you to include definitions from an external config file.

#include=<somefile.cfg>



# INCLUDE CONFIG DIRECTORY
# This directive allows you to include definitions from config files (with a
# .cfg extension) in one or more directories (with recursion).

#include_dir=<somedirectory>
#include_dir=<someotherdirectory>



# COMMAND DEFINITIONS
# Command definitions that this daemon will run.  Definitions
# are in the following format:
#
# command[<command_name>]=<command_line>
#
# When the daemon receives a request to return the results of <command_name>
# it will execute the command specified by the <command_line> argument.
#
# Unlike Nagios, the command line cannot contain macros - it must be
# typed exactly as it should be executed.
#
# Note: Any plugins that are used in the command lines must reside
# on the machine that this daemon is running on!  The examples below
# assume that you have plugins installed in a /usr/local/nagios/libexec
# directory.  Also note that you will have to modify the definitions below
# to match the argument format the plugins expect.  Remember, these are
# examples only!


# The following examples use hardcoded command arguments...

command[check_users]=/usr/lib/nagios/plugins/check_users -w 5 -c 10
command[check_load]=/usr/lib/nagios/plugins/check_load -w 15,10,5 -c 30,25,20
command[check_hda1]=/usr/lib/nagios/plugins/check_disk -w 20% -c 10% -p /dev/hda1
command[check_zombie_procs]=/usr/lib/nagios/plugins/check_procs -w 5 -c 10 -s Z
command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 150 -c 200 


# The following examples allow user-supplied arguments and can
# only be used if the NRPE daemon was compiled with support for 
# command arguments *AND* the dont_blame_nrpe directive in this
# config file is set to '1'.  This poses a potential security risk, so
# make sure you read the SECURITY file before doing this.

#command[check_users]=/usr/lib/nagios/plugins/check_users -w $ARG1$ -c $ARG2$
#command[check_load]=/usr/lib/nagios/plugins/check_load -w $ARG1$ -c $ARG2$
#command[check_disk]=/usr/lib/nagios/plugins/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$
#command[check_procs]=/usr/lib/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -s $ARG3$

#
# local configuration:
#	if you'd prefer, you can instead place directives here
include=/etc/nagios/nrpe_local.cfg

# 
# you can place your config snipplets into nrpe.d/
# only snipplets ending in .cfg will get included
include_dir=/etc/nagios/nrpe.d
I noticed as I was copying these over that I didn't have my Ubuntu machine on the allowed list so I added that ip address. I also switched "don't blame nrpe" to 1 from 0. I'm not sure why this wasn't configured but right before I left for home last night the mysql db crashed and I lost all data. So I'm essentially starting over with Nagios XI at this point. So I would like to make sure I do it correctly. Thanks for all the help.
User avatar
lmiltchev
Bugs find me
Posts: 13589
Joined: Mon May 23, 2011 12:15 pm

Re: New NRPE error - error receiving data from daemon

Post by lmiltchev »

Actually, what you need to do is add your Nagios XI server's IP in the nrpe.cfg on the Ubuntu machine:

Code: Select all

allowed_hosts=127.0.0.1,x.x.x.x
where you substitute "x.x.x.x" with your nagios server IP address.

Make sure you have this line (in the same file):

Code: Select all

dont_blame_nrpe=1
Restart nrpe on the Ubuntu machine:

Code: Select all

sudo /etc/init.d/nagios-nrpe-server restart
Try running the following command from the terminal on your nagios server:

Code: Select all

/usr/local/nagios/libexec/check_nrpe -H <client_IP>
You should see:

Code: Select all

NRPE v2.12
Be sure to check out our Knowledgebase for helpful articles and solutions!
psyllex
Posts: 129
Joined: Thu Dec 20, 2012 2:18 pm

Re: New NRPE error - error receiving data from daemon

Post by psyllex »

I did as you suggested. It gives the proper output of "NRPE v2.12" but it was doing that before as well. The Nagios XI server can see the two remote servers. It pings them just fine...for some reason the commands are not running through correctly. And I do have the Ubuntu agent running on both remote servers. I'm going to re-check if both remote servers have 'check_nrpe' within libexec.
slansing
Posts: 7698
Joined: Mon Apr 23, 2012 4:28 pm
Location: Travelling through time and space...

Re: New NRPE error - error receiving data from daemon

Post by slansing »

Can you also post the command you are trying to send to the Ubuntu server from the Nagios server? We really need to see how you are defining this if you did enter the correct IP during the agent installation you should have no issues.
Please post this, thanks!
psyllex
Posts: 129
Joined: Thu Dec 20, 2012 2:18 pm

Re: New NRPE error - error receiving data from daemon

Post by psyllex »

slansing wrote:
Can you also post the command you are trying to send to the Ubuntu server from the Nagios server? We really need to see how you are defining this if you did enter the correct IP during the agent installation you should have no issues.
Please post this, thanks!
What specific command? I just set up the monitoring with the wizard. all the commands should be in the nrpe.cfg Or just the default commands from the commands.cfg file. I didn't add any extra commands just the one's that the wizard has as defaults.
abrist
Red Shirt
Posts: 8334
Joined: Thu Nov 15, 2012 1:20 pm

Re: New NRPE error - error receiving data from daemon

Post by abrist »

If you go to the CCM in XI, click on the "services" link in the left hand pane and then click on the service check in question. On this "Service Management" screen under the "Common settings" tab, you will see some settings, we want to know:

1. Check command
2. Command view
3. Arguments
Former Nagios employee
"It is turtles. All. The. Way. Down. . . .and maybe an elephant or two."
VI VI VI - The editor of the Beast!
Come to the Dark Side.
psyllex
Posts: 129
Joined: Thu Dec 20, 2012 2:18 pm

Re: New NRPE error - error receiving data from daemon

Post by psyllex »

abrist wrote:If you go to the CCM in XI, click on the "services" link in the left hand pane and then click on the service check in question. On this "Service Management" screen under the "Common settings" tab, you will see some settings, we want to know:

1. Check command
2. Command view
3. Arguments
Alright...well the service check in question is 'all of them' except check_ping that works.
The service command is check_nrpe
The command view is $USER1$/check_nrpe -H $HOSTADDRESS$ -t 30 -c$ARG1$
$ARG2$
$ARG1$check_disk
$ARG2$-a'-w 20% -c 10$ -p /' -n

When I use that "TEST COMMAND" I get the same thing 'Error receiving data from daemon'.
Do you want all of the commands? This might take me a bit as I have to type them all out.
abrist
Red Shirt
Posts: 8334
Joined: Thu Nov 15, 2012 1:20 pm

Re: New NRPE error - error receiving data from daemon

Post by abrist »

There are some typos in your setup that I assume were just not transcribed correctly, but we will run through them just in case (ignore if your actually match):
The command view should be:

Code: Select all

$USER1$/check_nrpe -H $HOSTADDRESS$ -t 30 -c $ARG1$ $ARG2$


You receive this error because nrpe cannot decipher how the arguments are being passed to it.

There seems to be some inconsistencies with the way you use arguments. You can either:
1. Define the entirety of the command and argument in the nrpe.cfg file. For example, for the nrpe command:

Code: Select all

command[check_disk]=/usr/lib/nagios/plugins/check_disk -w 20% -c 10% -p /
You would the setup the check in XI as:

Code: Select all

$ARG1$ check_disk
2. Define the command with arguments for each separate command argument. In this example, you nrpe.cfg command would be:

Code: Select all

command[check_disk]=/usr/lib/nagios/plugins/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$ 
You would the setup the check in XI as:

Code: Select all

$ARG1$ check_disk
$ARG2$ 20%
$ARG3$ 10%
$ARG4$ /
3. Finally, which I would label as the "most optimal" method, is to let XI pass the entirety of the arguments to nrpe, so your nrpe.cfg command would look like:

Code: Select all

command[check_disk]=/usr/lib/nagios/plugins/check_disk $ARG1$ 

Code: Select all

$ARG1$ check_disk
$ARG2$ -a '-w 20% -c 10% -p /'
Any of these three ways will work, but you need to choose a method for your argument usage and make sure that it is consistent.
Former Nagios employee
"It is turtles. All. The. Way. Down. . . .and maybe an elephant or two."
VI VI VI - The editor of the Beast!
Come to the Dark Side.
Locked