I tried today again, trying to figure the nrpe ... went all ok during installation, however i made all necessary steps but still getting time out socket ... thanks in advance
Oct 03 20:09:23 xxxxxxxxxx systemd[1]: Started Nagios Remote Program Executor.
Oct 03 20:09:23 xxxxxxx nrpe[24047]: Starting up daemon
Oct 03 20:09:23 xxxxxxx nrpe[24047]: Server listening on 0.0.0.0 port 5666.
Oct 03 20:09:23 xxxxxxx nrpe[24047]: Server listening on :: port 5666.
Oct 03 20:09:23 xxxxx nrpe[24047]: Listening for connections on port 5666
Oct 03 20:09:23 xxxxxxxxxx nrpe[24047]: Allowing connections from: 127.0.0.1, 10.xxxxx
Good catch on the port being filtered. It definitely should not be filtered. That means there is something between Nagios and the NRPE agent. Are the Nagios server and the server running NRPE on the same subnet? Are there any network security appliances that may be interfering with communication?
As of May 25th, 2018, all communications with Nagios Enterprises and its employees are covered under our new Privacy Policy.
Be sure to check out our Knowledgebase for helpful articles and solutions!
Starting Nmap 6.40 ( http://nmap.org ) at 2019-10-06 20:12 EEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000014s latency).
Other addresses for localhost (not scanned): 127.0.0.1 127.0.0.1
Not shown: 994 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
111/tcp open rpcbind
631/tcp open ipp
5666/tcp open nrpe
# The following examples use hardcoded command arguments...
# This is by far the most secure method of using NRPE
command[check_users]=/usr/lib64/nagios/plugins/check_users -w 5 -c 10
command[check_load]=/usr/lib64/nagios/plugins/check_load -r -w .15,.10,.05 -c .30,.25,.20
command[check_hda1]=/usr/lib64/nagios/plugins/check_disk -w 20% -c 10% -p /dev/hda1
command[check_zombie_procs]=/usr/lib64/nagios/plugins/check_procs -w 5 -c 10 -s Z
command[check_total_procs]=/usr/lib64/nagios/plugins/check_procs -w 150 -c 200
# The following examples allow user-supplied arguments and can
# only be used if the NRPE daemon was compiled with support for
# command arguments *AND* the dont_blame_nrpe directive in this
# config file is set to '1'. This poses a potential security risk, so
# make sure you read the SECURITY file before doing this.
### MISC SYSTEM METRICS ###
#command[check_users]=/usr/lib64/nagios/plugins/check_users $ARG1$
#command[check_load]=/usr/lib64/nagios/plugins/check_load $ARG1$
#command[check_disk]=/usr/lib64/nagios/plugins/check_disk $ARG1$
#command[check_swap]=/usr/lib64/nagios/plugins/check_swap $ARG1$
#command[check_cpu_stats]=/usr/lib64/nagios/plugins/check_cpu_stats.sh $ARG1$
#command[check_mem]=/usr/lib64/nagios/plugins/custom_check_mem -n $ARG1$
### GENERIC SERVICES ###
#command[check_init_service]=sudo /usr/lib64/nagios/plugins/check_init_service $ARG1$
#command[check_services]=/usr/lib64/nagios/plugins/check_services -p $ARG1$
### SYSTEM UPDATES ###
#command[check_yum]=/usr/lib64/nagios/plugins/check_yum
#command[check_apt]=/usr/lib64/nagios/plugins/check_apt
### PROCESSES ###
#command[check_all_procs]=/usr/lib64/nagios/plugins/custom_check_procs
#command[check_procs]=/usr/lib64/nagios/plugins/check_procs $ARG1$
### OPEN FILES ###