NRPE 4.0.3 and the NSClient - CHECK_NRPE: Invalid packet ver
Posted: Thu Oct 29, 2020 10:59 am
We are planning to upgrade from Nagios XI version 5-6-14 to 5.7.4
We use the NSClient version 0.4.4.23 to monitor our Windows Servers checked from Nagios XI using check_nrpe.
The default check_nrpe command is – “check_nrpe –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$”
Nagios XI version 5.7.4 has upgraded NRPE from version 3 to version 4.
I have tested the upgrade in a DEV environment and the NSClient service check output are now returning
OK - CHECK_NRPE: Invalid packet version received from server
Previous to the upgrade check_nrpe v3.2.1.
The output was
I (0.4.4.23 ……) seem to be doing fine
After the upgrade check_nrpe v4.0.3
The output is now
CHECK_NRPE: Invalid packet version received from server
I (0.4.4.23 ……) seem to be doing fine
I have seen the other support links
https://support.nagios.com/forum/viewto ... 16&t=60277
https://support.nagios.com/forum/viewto ... 16&t=60069
Where it is suggested to modify the check_nrpe command to include the -2 argument – which forces check_nrpe to use version 2 packet type.
My questions are as follows:
1. Will the -2 switch mean that we are now using NRPE version 2 packets and if so are we not open to vulnerabilities that NRPE version 3 and 4 resolved?
2. Do you know if or when the NSClient will be compatible with NRPE 4 packet types?
3. My understanding is that we will need two check_nrpe commands:
A new command with the -2 argument for the windows servers using NSClient but for Linux servers using NRPE version 3.2.1 we will need a command without the -2
Linux check_nrpe –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$
Windows check_nrpe_v2 –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$ –2
4. Our Linux servers use NRPE version 3.2.1 – will they also have issue with NRPE version 4.
Or will they need a customised command with the -3 argument to enforce only version 3 packets, until we can upgrade the nrpe to version 4.
5. If I run the check_nrpe command in Core Configuration Manager using the Run Check command – if the nsclient command has arguments in $ARG2$ it always returns the following error:
Failed to validate filter see log for details
Even though it works in the GUI and the service check output is OK.
Check command - check_nrpe -H 192.168.1.11 -t 30 -c $ARG1$ $ARG2$
$ARG1$ = check_cpu
$ARG2$ = -a "warning=load>=95%" "critical=load>=98%" "time=1m" "time=5m" "time=15m" "filter=core = 'total'" "top-syntax=%(status): %(list)" "detail-syntax=%(time) load %(load)%"
If the command has no arguments in in $ARG2$ it runs correctly from Core Configuration Manager using the Run Check command
Note: this command runs correctly in Nagios XI version 5.6.14
We use the NSClient version 0.4.4.23 to monitor our Windows Servers checked from Nagios XI using check_nrpe.
The default check_nrpe command is – “check_nrpe –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$”
Nagios XI version 5.7.4 has upgraded NRPE from version 3 to version 4.
I have tested the upgrade in a DEV environment and the NSClient service check output are now returning
OK - CHECK_NRPE: Invalid packet version received from server
Previous to the upgrade check_nrpe v3.2.1.
The output was
I (0.4.4.23 ……) seem to be doing fine
After the upgrade check_nrpe v4.0.3
The output is now
CHECK_NRPE: Invalid packet version received from server
I (0.4.4.23 ……) seem to be doing fine
I have seen the other support links
https://support.nagios.com/forum/viewto ... 16&t=60277
https://support.nagios.com/forum/viewto ... 16&t=60069
Where it is suggested to modify the check_nrpe command to include the -2 argument – which forces check_nrpe to use version 2 packet type.
My questions are as follows:
1. Will the -2 switch mean that we are now using NRPE version 2 packets and if so are we not open to vulnerabilities that NRPE version 3 and 4 resolved?
2. Do you know if or when the NSClient will be compatible with NRPE 4 packet types?
3. My understanding is that we will need two check_nrpe commands:
A new command with the -2 argument for the windows servers using NSClient but for Linux servers using NRPE version 3.2.1 we will need a command without the -2
Linux check_nrpe –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$
Windows check_nrpe_v2 –H $HOSTADDRESS$ -t 30 –c $ARG1$ $ARG2$ –2
4. Our Linux servers use NRPE version 3.2.1 – will they also have issue with NRPE version 4.
Or will they need a customised command with the -3 argument to enforce only version 3 packets, until we can upgrade the nrpe to version 4.
5. If I run the check_nrpe command in Core Configuration Manager using the Run Check command – if the nsclient command has arguments in $ARG2$ it always returns the following error:
Failed to validate filter see log for details
Even though it works in the GUI and the service check output is OK.
Check command - check_nrpe -H 192.168.1.11 -t 30 -c $ARG1$ $ARG2$
$ARG1$ = check_cpu
$ARG2$ = -a "warning=load>=95%" "critical=load>=98%" "time=1m" "time=5m" "time=15m" "filter=core = 'total'" "top-syntax=%(status): %(list)" "detail-syntax=%(time) load %(load)%"
If the command has no arguments in in $ARG2$ it runs correctly from Core Configuration Manager using the Run Check command
Note: this command runs correctly in Nagios XI version 5.6.14