Hi Support,
Installed on Centos 7.7.1908 x64
Bit of background that has lead up to this, we initially migrated the host from one VMware cluster to another so upgraded Nagios XI on the old host to version 5.6.7 and took a backup via the UI, installed Nagios XI manually to the latest version and restored the backup. Things were looking good, but the checks on the VMware guests were going from OK to timing out giving the service checks timing out after 60s error, going back and forth through all the services.
So we decided to delete all the services and host to start over but going through the wizard, in the Guest Selection tab we are presented with,
Error
It appears there are no guests for this VMware host. The error message is below. This may be because the SDK is not installed, your credentials are wrong, or the host is not a VMware server.
*******************************************************************
Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client
is deprecated! Please set SSL_verify_mode to SSL_VERIFY_PEER
possibly with SSL_ca_file|SSL_ca_path for verification.
If you really don't want to verify the certificate and keep the
connection open to Man-In-The-Middle attacks please set
SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application.
*******************************************************************
at /usr/lib64/perl5/LWP/Protocol/http.pm line 31.
If we run the plugin manually via cli, this allows us to query the guests.
We've tried reinstalling the VMware perl 6.5 SDK along with the prereqs but this hasn't made a difference.
Regards,
Long
Issue monitoring VMware guests
Re: Issue monitoring VMware guests
When you run the plugin manually, are you doing su - nagios ? The - is important as it completely changes the environment to be the nagios user's environment.If we run the plugin manually via cli, this allows us to query the guests.
As of May 25th, 2018, all communications with Nagios Enterprises and its employees are covered under our new Privacy Policy.
Be sure to check out our Knowledgebase for helpful articles and solutions!
Be sure to check out our Knowledgebase for helpful articles and solutions!
Re: Issue monitoring VMware guests
Sorry, my mistake, via cli we are getting this, both under root and as nagios
/usr/bin/perl: symbol lookup error: /usr/lib64/perl5/auto/HTML/Parser/Parser.so: undefined symbol: Perl_Istack_sp_ptr
It worked if we Run Check Command under the Service Management tab before we deleted the services and host.
Regards,
Long
/usr/bin/perl: symbol lookup error: /usr/lib64/perl5/auto/HTML/Parser/Parser.so: undefined symbol: Perl_Istack_sp_ptr
It worked if we Run Check Command under the Service Management tab before we deleted the services and host.
Regards,
Long
Re: Issue monitoring VMware guests
Try reinstalling DBI via cpan to see if this is going to fix your issue.
Code: Select all
cpan -i DBIBe sure to check out our Knowledgebase for helpful articles and solutions!
Re: Issue monitoring VMware guests
Unfortunately no change after reinstalling DBI.
Regards,
Long
Regards,
Long
Re: Issue monitoring VMware guests
You can try one more thing - add this line on the top of your plugin (below the comments):
This helped some users, that were having the same/similar issues - see here:
https://support.nagios.com/forum/viewto ... 8&start=10
If this doesn't work for you either, most probably we will need to do a remote. Please open a new support ticket via our support center here:
https://support.nagios.com/tickets/
Code: Select all
require IO::Socket::SSL; IO::Socket::SSL -> import(); IO::Socket::SSL::set_ctx_defaults( SSL_verify_mode => 0 );https://support.nagios.com/forum/viewto ... 8&start=10
If this doesn't work for you either, most probably we will need to do a remote. Please open a new support ticket via our support center here:
https://support.nagios.com/tickets/
Be sure to check out our Knowledgebase for helpful articles and solutions!
Re: Issue monitoring VMware guests
Locking thread, ticket received, we will continue support through the ticket.
Thank you!
Thank you!