Re: NRPE on Solaris9
Posted: Fri May 01, 2015 2:26 pm
Please PM me your acl.c file.
Edit: Received file, placed in shared support directory.
Edit: Received file, placed in shared support directory.
Support for Nagios products and services
https://support.nagios.com/forum/
Code: Select all
cd /tmp
wget http://assets.nagios.com/downloads/nagiosxi/agents/solaris-nrpe-agent.tar.gz
tar xzf solaris-nrpe-agent.tar.gz
cd solaris-nrpe-agent
./fullinstallCode: Select all
bash-2.05# uname -a
SunOS unknown 5.9 Generic_118559-11 i86pc i386 i86pc
bash-2.05# ./nrpe
NRPE - Nagios Remote Plugin Executor
Copyright (c) 1999-2007 Ethan Galstad ([email protected])
Version: 2.10
Last Modified: 10-19-2007
License: GPL v2 with exemptions (-l for more info)
SSL/TLS Available: Anonymous DH Mode, OpenSSL 0.9.6 or higher required
***************************************************************
** POSSIBLE SECURITY RISK - COMMAND ARGUMENTS ARE SUPPORTED! **
** Read the NRPE SECURITY file for more information **
***************************************************************
***************************************************************
** POSSIBLE SECURITY RISK - TCP WRAPPERS ARE NOT AVAILABLE! **
** Read the NRPE SECURITY file for more information **
***************************************************************
Usage: nrpe [-n] -c <config_file> <mode>
Options:
-n = Do not use SSL
<config_file> = Name of config file to use
<mode> = One of the following two operating modes:
-i = Run as a service under inetd or xinetd
-d = Run as a standalone daemon
Notes:
This program is designed to process requests from the check_nrpe
plugin on the host(s) running Nagios. It can run as a service
under inetd or xinetd (read the docs for info on this), or as a
standalone daemon. Once a request is received from an authorized
host, NRPE will execute the command/plugin (as defined in the
config file) and return the plugin output and return code to the
check_nrpe plugin.Code: Select all
SunOS <hostname> 5.9 Generic_112233-11 sun4u sparc SUNW,UltraSPARC-IIi-cEngineCode: Select all
nrpe 5666/tcp #NRPECode: Select all
root 23787 19129 0 00:48:26 pts/2 0:00 grep -i inet
root 23593 1 0 00:39:27 ? 0:00 /usr/sbin/inetd -s
Code: Select all
*.nrpe *.* 0 0 49152 0 LISTEN
Code: Select all
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
inetd 23593 root 68u IPv4 0x37ed007b528 0t0 TCP *:nrpe (LISTEN)
Code: Select all
PKGINST: RHATossl
NAME: openssl 0.9.7a
DESC: The OpenSSL toolkit.
PKGINST: RHATpossl
NAME: pyOpenSSL 0.6
DESC: Python wrapper module around the OpenSSL library
PKGINST: SMCossl
NAME: openssl
VENDOR: The OpenSSL Group
Code: Select all
log_facility=daemon
pid_file=/var/run/nrpe.pid
server_port=5666
nrpe_user=nagios
nrpe_group=nagios
allowed_hosts=127.0.0.1,<ip.of.my.nagios.xi.machine>
dont_blame_nrpe=1
debug=0
command_timeout=60
connection_timeout=300
include=/etc/nagios/nrpe/common.cfg
Code: Select all
# default: on
# description: NRPE
service nrpe
{
flags = REUSE
socket_type = stream
wait = no
user = nagios
server = /usr/local/nagios/bin/nrpe
server_args = -c /usr/local/nagios/etc/nrpe.cfg --inetd
log_on_failure += USERID
disable = no
only_from = 127.0.0.1 <ip.of.my.nagios.xi.machine>
}
Code: Select all
CHECK_NRPE: Error - Could not complete SSL handshake.Code: Select all
CHECK_NRPE: Response packet had invalid CRC32.Code: Select all
CHECK_NRPE: Error - Could not complete SSL handshake.Code: Select all
CHECK_NRPE: Response packet had invalid CRC32.Code: Select all
server_args = -c /usr/local/nagios/etc/nrpe.cfg --inetd
Code: Select all
server_args = -c /etc/nagios/nrpe.cfg --inetdCode: Select all
/etc/init.d/inetsvc stop
/etc/init.d/inetsvc start