NSCA Communication issues.
Posted: Thu Oct 31, 2013 10:43 am
I have a configuration for sending passive check results from a solaris box to centos based nagios xi system.
I followed all the docs I could get on hand to make it work. Interesting part is that send_nsca from solaris thinks that it has sent a datapacket successfully.
But I do not see anything on the Nagios XI server saying it received it.
This works fine when I send from local machine.
here are the example
/opt/csw/nagios/bin/send_nsca 10.2.2.100 -d , -c /etc/opt/csw/nagios/send_nsca.cfg < test2
1 data packet(s) sent to host successfully.
here are the configs
nsca.cfg
password set
encryption_method=2
xinetd.d/nsca
# description: NSCA (Nagios Service Check Acceptor)
service nsca
{
flags = REUSE
socket_type = stream
wait = no
user = nagios
group = nagios
server = /usr/local/nagios/bin/nsca
server_args = -c /usr/local/nagios/etc/nsca.cfg --inetd
log_on_failure += USERID
disable = no
only_from = 10.1.30.130
here are the iptable info
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:nsca
ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:nrpe
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destinat
I followed all the docs I could get on hand to make it work. Interesting part is that send_nsca from solaris thinks that it has sent a datapacket successfully.
But I do not see anything on the Nagios XI server saying it received it.
This works fine when I send from local machine.
here are the example
/opt/csw/nagios/bin/send_nsca 10.2.2.100 -d , -c /etc/opt/csw/nagios/send_nsca.cfg < test2
1 data packet(s) sent to host successfully.
here are the configs
nsca.cfg
password set
encryption_method=2
xinetd.d/nsca
# description: NSCA (Nagios Service Check Acceptor)
service nsca
{
flags = REUSE
socket_type = stream
wait = no
user = nagios
group = nagios
server = /usr/local/nagios/bin/nsca
server_args = -c /usr/local/nagios/etc/nsca.cfg --inetd
log_on_failure += USERID
disable = no
only_from = 10.1.30.130
here are the iptable info
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:nsca
ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:nrpe
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destinat