Page 1 of 3

Define check_proc in nsc.ini

Posted: Fri Jun 22, 2012 12:12 pm
by samton99
Hello,

Well after trying the check_nt!PROCSTATE , I get a critical warning that it is not running but I know it is. I tried several different servers and different process's, still no go. I know the servicestate works fine. So I was recommended to go with NRPE. So now that I have everything installed and working, I am now trying to monitor the process's.

What I have done is from the nagios command line i typed the following
/usr/local/nagios/libexec/check_nrpe -H 192.168.1.7 -c check_proc

I get the following message

UNKNOWN: No handler for that command

So I then went on the windows server and looked at the nsc.ini file

here it is
[modules]
NRPEListener.dll
NSClientListener.dll
NSCAAgent.dll
CheckWMI.dll
FileLogger.dll
CheckSystem.dll
CheckDisk.dll
CheckEventLog.dll
CheckHelpers.dll
;# NSCLIENT++ MODULES
;# A list with DLLs to load at startup.
; You will need to enable some of these for NSClient++ to work.
; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
; * *
; * N O T I C E ! ! ! - Y O U H A V E T O E D I T T H I S *
; * *
; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
;FileLogger.dll
CheckSystem.dll
CheckDisk.dll
NSClientListener.dll
NRPEListener.dll
;SysTray.dll
CheckEventLog.dll
CheckHelpers.dll
CheckWMI.dll
;
; Script to check external scripts and/or internal aliases.
CheckExternalScripts.dll
;
; NSCA Agent if you enable this NSClient++ will talk to NSCA hosts repeatedly (so dont enable unless you want to use NSCA)
;NSCAAgent.dll
;
; LUA script module used to write your own "check deamon".
;LUAScript.dll
;
; RemoteConfiguration IS AN EXTREM EARLY IDEA SO DONT USE FOR PRODUCTION ENVIROMNEMTS!
;RemoteConfiguration.dll
; Check other hosts through NRPE extreme beta and probably a bit dangerous! :)
;NRPEClient.dll
; Extreamly early beta of a task-schedule checker
;CheckTaskSched.dll



[Settings]
;# OBFUSCATED PASSWORD
; This is the same as the password option but here you can store the password in an obfuscated manner.
; *NOTICE* obfuscation is *NOT* the same as encryption, someone with access to this file can still figure out the
; password. Its just a bit harder to do it at first glance.
;obfuscated_password=Jw0KAUUdXlAAUwASDAAB
;
;# PASSWORD
; This is the password (-s) that is required to access NSClient remotely. If you leave this blank everyone will be able to access the daemon remotly.
;password=secret-password
;
;# ALLOWED HOST ADDRESSES
; This is a comma-delimited list of IP address of hosts that are allowed to talk to the all daemons.
; If leave this blank anyone can access the deamon remotly (NSClient still requires a valid password).
; The syntax is host or ip/mask so 192.168.0.0/24 will allow anyone on that subnet access
;allowed_hosts=127.0.0.1/32
;
;# USE THIS FILE
; Use the INI file as opposed to the registry if this is 0 and the use_reg in the registry is set to 1
; the registry will be used instead.
use_file=1
allowed_hosts=192.168.1.30
;
; # USE SHARED MEMORY CHANNELS
; This is the "new" way for using the system tray based on an IPC framework on top shared memmory channels and events.
; It is brand new and (probably has bugs) so dont enable this unless for testing!
; If set to 1 shared channels will be created and system tray icons created and such and such...
;shared_session=0


[log]
;# LOG DEBUG
; Set to 1 if you want debug message printed in the log file (debug messages are always printed to stdout when run with -test)
;debug=1
;
;# LOG FILE
; The file to print log statements to
;file=nsclient.log
;
;# LOG DATE MASK
; The format to for the date/time part of the log entry written to file.
;date_mask=%Y-%m-%d %H:%M:%S
;
;# LOG ROOT FOLDER
; The root folder to use for logging.
; exe = the folder where the executable is located
; local-app-data = local application data (probably a better choice then the old default)
;root_folder=exe


[NSClient]
;# ALLOWED HOST ADDRESSES
; This is a comma-delimited list of IP address of hosts that are allowed to talk to NSClient deamon.
; If you leave this blank the global version will be used instead.
;allowed_hosts=
;
;# NSCLIENT PORT NUMBER
; This is the port the NSClientListener.dll will listen to.
;port=12489
;
;# BIND TO ADDRESS
; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
; Leaving this blank will bind to all avalible IP adresses.
;bind_to_address=
;
;# SOCKET TIMEOUT
; Timeout when reading packets on incoming sockets. If the data has not arrived withint this time we will bail out.
;socket_timeout=30

[NRPE]
;# NRPE PORT NUMBER
; This is the port the NRPEListener.dll will listen to.
port=5666
;
;# COMMAND TIMEOUT
; This specifies the maximum number of seconds that the NRPE daemon will allow plug-ins to finish executing before killing them off.
;command_timeout=60
;
;# COMMAND ARGUMENT PROCESSING
; This option determines whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.
allow_arguments=1
;
;# COMMAND ALLOW NASTY META CHARS
; This option determines whether or not the NRPE daemon will allow clients to specify nasty (as in |`&><'"\[]{}) characters in arguments.
;allow_nasty_meta_chars=0
;
;# USE SSL SOCKET
; This option controls if SSL should be used on the socket.
use_ssl=1
;
;# BIND TO ADDRESS
; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
; Leaving this blank will bind to all avalible IP adresses.
; bind_to_address=
;
;# ALLOWED HOST ADDRESSES
; This is a comma-delimited list of IP address of hosts that are allowed to talk to NRPE deamon.
; If you leave this blank the global version will be used instead.
;allowed_hosts=
;
;# SCRIPT DIRECTORY
; All files in this directory will become check commands.
; *WARNING* This is undoubtedly dangerous so use with care!
;script_dir=scripts\
;
;# SOCKET TIMEOUT
; Timeout when reading packets on incoming sockets. If the data has not arrived withint this time we will bail out.
;socket_timeout=30

[Check System]
;# CPU BUFFER SIZE
; Can be anything ranging from 1s (for 1 second) to 10w for 10 weeks. Notice that a larger buffer will waste memory
; so don't use a larger buffer then you need (ie. the longest check you do +1).
;CPUBufferSize=1h
;
;# CHECK RESOLUTION
; The resolution to check values (currently only CPU).
; The value is entered in 1/10:th of a second and the default is 10 (which means ones every second)
;CheckResolution=10
;
;# CHECK ALL SERVICES
; Configure how to check services when a CheckAll is performed.
; ...=started means services in that class *has* to be running.
; ...=stopped means services in that class has to be stopped.
; ...=ignored means services in this class will be ignored.
;check_all_services[SERVICE_BOOT_START]=ignored
;check_all_services[SERVICE_SYSTEM_START]=ignored
;check_all_services[SERVICE_AUTO_START]=started
;check_all_services[SERVICE_DEMAND_START]=ignored
;check_all_services[SERVICE_DISABLED]=stopped

[External Script]
;# COMMAND TIMEOUT
; This specifies the maximum number of seconds that the NRPE daemon will allow plug-ins to finish executing before killing them off.
;command_timeout=60
;
;# COMMAND ARGUMENT PROCESSING
; This option determines whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.
;allow_arguments=0
;
;# COMMAND ALLOW NASTY META CHARS
; This option determines whether or not the NRPE daemon will allow clients to specify nasty (as in |`&><'"\[]{}) characters in arguments.
;allow_nasty_meta_chars=0
;
;# SCRIPT DIRECTORY
; All files in this directory will become check commands.
; *WARNING* This is undoubtedly dangerous so use with care!
;script_dir=c:\my\script\dir

[Script Wrappings]
vbs=cscript.exe //T:30 //NoLogo scripts\lib\wrapper.vbs %SCRIPT% %ARGS%
ps1=cmd /c echo scripts\%SCRIPT% %ARGS%; exit($lastexitcode) | powershell.exe -command -
bat=scripts\%SCRIPT% %ARGS%

[External Scripts]
;check_es_long=scripts\long.bat
;check_es_ok=scripts\ok.bat
;check_es_nok=scripts\nok.bat
;check_vbs_sample=cscript.exe //T:30 //NoLogo scripts\check_vb.vbs
;check_powershell_warn=cmd /c echo scripts\powershell.ps1 | powershell.exe -command -

[External Alias]
alias_cpu=checkCPU warn=80 crit=90 time=5m time=1m time=30s
alias_cpu_ex=checkCPU warn=$ARG1$ crit=$ARG2$ time=5m time=1m time=30s
alias_disk=CheckDriveSize MinWarn=10% MinCrit=5% CheckAll FilterType=FIXED
alias_service=checkServiceState CheckAll
alias_process=checkProcState $ARG1$=started
alias_mem=checkMem MaxWarn=80% MaxCrit=90% ShowAll type=physical
alias_up=checkUpTime MinWarn=1d MinWarn=1h
alias_file_age=checkFile2 filter=out "file=$ARG1$" filter-written=>1d MaxWarn=1 MaxCrit=1 "syntax=%filename% %write%"
alias_file_size=checkFile2 filter=out "file=$ARG1$" filter-size=>$ARG2$ MaxWarn=1 MaxCrit=1 "syntax=%filename% %size%"
alias_file_size_in_dir=checkFile2 filter=out pattern=*.txt "file=$ARG1$" filter-size=>$ARG2$ MaxWarn=1 MaxCrit=1 "syntax=%filename% %size%"
alias_event_log_old=CheckEventLog file=application file=system filter=new filter=out MaxWarn=1 MaxCrit=1 filter-generated=>2d filter-severity==success filter-severity==informational truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)"
alias_event_log_new=CheckEventLog file=application file=system MaxWarn=1 MaxCrit=1 "filter=generated gt -2d AND severity NOT IN ('success', 'informational')" truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)"
alias_event_log=alias_event_log_new

check_ok=CheckOK Everything is fine!

[Wrapped Scripts]
;check_test_vbs=check_test.vbs /arg1:1 /arg2:1 /variable:1
;check_test_ps1=check_test.ps1 arg1 arg2
;check_test_bat=check_test.bat arg1 arg2
;check_battery=check_battery.vbs
;check_printer=check_printer.vbs


; [includes]
;# The order when used is "reversed" thus the last included file will be "first"
;# Included files can include other files (be carefull only do basic recursive checking)
;
; myotherfile.ini
; real.ini


[NSCA Agent]
;# CHECK INTERVALL (in seconds)
; How often we should run the checks and submit the results.
;interval=5
;
;# ENCRYPTION METHOD
; This option determines the method by which the send_nsca client will encrypt the packets it sends
; to the nsca daemon. The encryption method you choose will be a balance between security and
; performance, as strong encryption methods consume more processor resources.
; You should evaluate your security needs when choosing an encryption method.
;
; Note: The encryption method you specify here must match the decryption method the nsca daemon uses
; (as specified in the nsca.cfg file)!!
; Values:
; 0 = None (Do NOT use this option)
; 1 = Simple XOR (No security, just obfuscation, but very fast)
; 2 = DES
; 3 = 3DES (Triple DES)
; 4 = CAST-128
; 6 = xTEA
; 8 = BLOWFISH
; 9 = TWOFISH
; 11 = RC2
; 14 = RIJNDAEL-128 (AES)
; 20 = SERPENT
;encryption_method=14
;
;# ENCRYPTION PASSWORD
; This is the password/passphrase that should be used to encrypt the sent packets.
;password=
;
;# BIND TO ADDRESS
; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
; Leaving this blank will bind to "one" local interface.
; -- not supported as of now --
;bind_to_address=
;
;# LOCAL HOST NAME
; The name of this host (if empty "computername" will be used.
;hostname=
;
;# NAGIOS SERVER ADDRESS
; The address to the nagios server to submit results to.
;nsca_host=192.168.0.1
;
;# NAGIOS SERVER PORT
; The port to the nagios server to submit results to.
;nsca_port=5667
;

;# CHECK COMMAND LIST
; The checks to run everytime we submit results back to nagios
; Any command(alias/key) starting with a host_ is sent as HOST_COMMAND others are sent as SERVICE_COMMANDS
; where the alias/key is used as service name.
;
[NSCA Commands]
;my_cpu_check=checkCPU warn=80 crit=90 time=20m time=10s time=4
;my_mem_check=checkMem MaxWarn=80% MaxCrit=90% ShowAll type=page
;my_svc_check=checkServiceState CheckAll exclude=wampmysqld exclude=MpfService
;host_check=check_ok

;# REMOTE NRPE PROXY COMMANDS
; A list of commands that check other hosts.
; Used by the NRPECLient module
[NRPE Handlers]
check_load=inject checkCPU warn=70 crit=90 time=15s time=1m time=30m
check_disc=inject checkDriveSize MinWarn=15% MinCrit=5% FilterType=FIXED CheckAll
check_uptime=inject checkUpTime MaxWarn=1d ShowAll
check_mem=inject checkMem MaxWarn=75% MaxCrit=90% ShowAll type=physical
check_swap=inject checkMem MaxWarn=50% MaxCrit=75% ShowAll type=virtual
check_services=inject checkServiceState CheckAll ShowFail exclude=SysmonLog
check_other=-H 192.168.0.1 -p 5666 -c remote_command -a arguments

;# LUA SCRIPT SECTION
; A list of all Lua scripts to load.
;[LUA Scripts]
;scripts\test.lua


There is o entry under NRPE HANDLERS for check_proc, what would i need to put in there I am not exactly sure?

Thanks in advance

Re: Define check_proc in nsc.ini

Posted: Fri Jun 22, 2012 4:32 pm
by lmiltchev
Just curious, what is the output of the following command?

Code: Select all

/usr/local/nagios/libexec/check_nt -H <IP> -s <password> -v PROCSTATE -p 12489 -l Explorer.exe,Firefox.exe -d SHOWALL

Re: Define check_proc in nsc.ini

Posted: Wed Jun 27, 2012 8:54 am
by samton99
What I did is install firefox on the server, just to test this

I ran this command

/usr/local/nagios/libexec/check_nt -H 192.168.1.7 -v PROCSTATE -p 12489 -l Explorer.exe,Firefox.exe -d SHOWALL

The result is

Explorer.exe: not running - firefox.exe: Running

It does work and get information but not for explorer.exe

Re: Define check_proc in nsc.ini

Posted: Wed Jun 27, 2012 4:12 pm
by lmiltchev
This is really strange. Open a DOS command prompt on this windows server, run the following command and show us the output:

Code: Select all

tasklist | find "explorer.exe"
What is the version of NSClient++ that you are using?
(You can view the version number under "Programs" in the "Control panel".)

What is the plugin version?

Code: Select all

/usr/local/nagios/libexec/check_nt -V

Re: Define check_proc in nsc.ini

Posted: Wed Jun 27, 2012 4:17 pm
by samton99
Here is the output for tasklist

explorer.exe 2528 RDP-Tcp#0 2 49,004 K

PLugin version on the windows server is
0.3.8.76

Plugin version on the nagios server
check_nt v1.4.15 (nagios-plugins 1.4.15)

Re: Define check_proc in nsc.ini

Posted: Thu Jun 28, 2012 10:16 am
by yancy
samton99,

Everything in your .ini looks fine.

Can you give this a test:

Code: Select all

cd "c:\program files\NSClient++"
nsclient++.exe /stop
nsclient++.exe /test
once the service has started, try injecting the command directly:

Code: Select all

alias_process explorer.exe
and see if there are any clues.

Re: Define check_proc in nsc.ini

Posted: Thu Jun 28, 2012 10:30 am
by samton99
Here is the result

l NSClient++.cpp(462) Enter command to inject or exit to terminate...
alias_process explorer.exe
d NSClient++.cpp(1144) Injecting: alias_process: explorer.exe
d NSClient++.cpp(1144) Injecting: checkProcState: explorer.exe=started
d \CheckSystem.cpp(808) PROC>>> enumerate_processes
d \CheckSystem.cpp(808) PROC>>> enable_token_privilege
d \CheckSystem.cpp(811) PROC<<<enable_token_privilege
d \CheckSystem.cpp(808) PROC>>> FEnumProcesses
d \CheckSystem.cpp(811) PROC<<<FEnumProcesses
d \CheckSystem.cpp(805) PROC::: Failed to open process: 4:
d \CheckSystem.cpp(808) PROC>>> find_crashed_pids
d \CheckSystem.cpp(811) PROC<<<find_crashed_pids
d \CheckSystem.cpp(811) PROC<<<enumerate_processes
d NSClient++.cpp(1180) Injected Result: CRITICAL 'CRITICAL: explorer.exe: stoppe
d (critical)'
d NSClient++.cpp(1181) Injected Performance Result: ''explorer.exe'=0;0;0'
d NSClient++.cpp(1180) Injected Result: CRITICAL 'CRITICAL: explorer.exe: stoppe
d (critical)'
d NSClient++.cpp(1181) Injected Performance Result: ''explorer.exe'=0;0;0'
CRITICAL:CRITICAL: explorer.exe: stopped (critical)|'explorer.exe'=0;0;0

Re: Define check_proc in nsc.ini

Posted: Thu Jun 28, 2012 11:04 am
by yancy
give this a try:

Code: Select all

 nsclinet++.exe /test 

Code: Select all

 CheckProcState explorer.exe 

Re: Define check_proc in nsc.ini

Posted: Thu Jun 28, 2012 12:05 pm
by samton99
here it is

l NSClient++.cpp(462) Enter command to inject or exit to terminate...
CheckProcState explorer.exe
d NSClient++.cpp(1144) Injecting: CheckProcState: explorer.exe
d \CheckSystem.cpp(808) PROC>>> enumerate_processes
d \CheckSystem.cpp(808) PROC>>> enable_token_privilege
d \CheckSystem.cpp(811) PROC<<<enable_token_privilege
d \CheckSystem.cpp(808) PROC>>> FEnumProcesses
d \CheckSystem.cpp(811) PROC<<<FEnumProcesses
d \CheckSystem.cpp(805) PROC::: Failed to open process: 4:
d \CheckSystem.cpp(808) PROC>>> find_crashed_pids
d \CheckSystem.cpp(811) PROC<<<find_crashed_pids
d \CheckSystem.cpp(811) PROC<<<enumerate_processes
d NSClient++.cpp(1180) Injected Result: CRITICAL 'CRITICAL: explorer.exe: stoppe
d (critical)'
d NSClient++.cpp(1181) Injected Performance Result: ''explorer.exe'=0;0;0'
CRITICAL:CRITICAL: explorer.exe: stopped (critical)|'explorer.exe'=0;0;0

Re: Define check_proc in nsc.ini

Posted: Thu Jun 28, 2012 12:31 pm
by yancy
samton99,

I'm a bit at a loss on this one. It seems to be a bug in the NSClinet++ implementation.

as a work around, you could download:
https://www.itefix.no/i2/check_winprocess

try:
.\check_winprocess.exe --filter "imagename eq explorer.exe"

and use it as a external script with NSClient.