Guten Tag,
habe auf dem neu aufgesetzten Testsystem Nagios mit Standardeinstellungen laufen und es wird der Service “UNIVENTION_JOINSTATUS” bemängelt:
Current Status:
CRITICAL
Status Information: CHECK_NRPE: Socket timeout after 10 seconds.
Performance Data:
Current Attempt: 1/1
State Type: HARD
Last Check Type: ACTIVE
Last Check Time: 2010-09-16 09:33:35
Status Data Age: 0d 0h 58m 6s
Next Scheduled Active Check: 2010-09-16 10:40:22
Latency: 0.239 seconds
Check Duration: 10.189 seconds
Last State Change: 2010-09-15 14:47:44
Current State Duration: 0d 19h 43m 57s
Last Service Notification: 2010-09-16 06:57:24
Current Notification Number: 2
Is This Service Flapping? N/A
Percent State Change: N/A
In Scheduled Downtime?
NO
Last Update: 2010-09-16 10:31:29
Active Checks:
ENABLED
Passive Checks:
ENABLED
Obsessing:
ENABLED
Notifications:
ENABLED
Event Handler:
ENABLED
Flap Detection:
ENABLED
Habe im Forum schon einiges dazu gelesen, werde jedoch daraus nicht schlau:
root@wwwsg02v:~# /usr/lib/nagios/plugins/check_univention_joinstatus_suidwrapper
OK: system joined successfully
Auch das univention-run-join-scripts zeigt an, das alles ok ist.
Logfile:
root@wwwsg02v:~# tail -f /var/log/nagios2/nagios.log
[1284625389] Caught SIGTERM, shutting down...
[1284625389] Successfully shutdown... (PID=14401)
[1284625394] Nagios 2.6 starting... (PID=22071)
[1284625394] LOG VERSION: 2.0
[1284625394] Warning: Service 'UNIVENTION_JOINSTATUS' on host 'wwwsg02v.www.surfclub.lan' has a notification interval less than its check interval! Notifications are only re-sent after checks are made, so the effective notification interval will be that of the check interval.
[1284625394] Finished daemonizing... (New PID=22072)
Warum wird da nrpe benötigt? Läuft doch alles auch einem Server.
NRPE klappt je nach Aufruf:
root@wwwsg02v:~# /usr/lib/nagios/plugins/check_nrpe -H localhost
CHECK_NRPE: Error - Could not complete SSL handshake.
root@wwwsg02v:~# /usr/lib/nagios/plugins/check_nrpe -H wwwsg02v
NRPE v2.12
Hier noch Systeminfos:
root@wwwsg02v:/# ucr search ^version
version/patchlevel: 0
Patchlevel of the UCS version
version/releasename: golden beech
Codename for UCS releases
version/security-patchlevel: 0
Security patchlevel of the UCS version
version/version: 2.4
Major version of UCS
Grüße aus Stuttgart,
Ralf Moll