Hi list, I have some issues with the plugin "check_by_ssh". In particular, there is one error:
When I run a shell script located in another server, from the Nagios server
using the check_by_ssh plugin, I don't have any errors and I can see the
result of the script, like this:
*root@nagioserver# <root@TSM-SRV-V-114#> /usr/lib/nagios/plugins/check_by_ssh
-l root -H "ipxenserver" -C /usr/lib/nagios/plugins/check_Xencpu
“OK:CPU%= 3”*
*
*
But, by any strange reason, when I configure the check for Nagios presents
the results in its interface, I have the error:
[image: Imágenes integradas 1]
I have made the ssh authorization keys in both servers (Nagios and Xen), I
configured the users, permissions,etc. And I can't to do this work it.
Could someone help me solve this problem????
This is a part of my definition files:
*
#XENServer
*
*
define command {
command_name check_by_ssh_xentop
command_line /usr/lib/nagios/plugins/check_by_ssh -l
'$ARG1$' -H '$HOSTADDRESS$' -C '$ARG2$' -i '$ARG3$'
}
*
*#Hypervisor check*
* define service{*
* use generic-service*
* host_name ORLANDO *
* service_description Hypervisor CPU*
* check_command
check_by_ssh_xentop!root!ipxenserver!/usr/lib/nagios/plugins/check_Xencpu.sh!/root/.ssh/id_rsa!
*
* }*
Regards!
--
*IC.** Eduardo Montes de Oca Sánchez
*Skype: edrendar
Gmail: [email protected]
MSN: [email protected]
Movil: 5523419886
https://linuxcounter.net/cert/549074.png
<<image.png>>
------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________ Nagios-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/nagios-users ::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. ::: Messages without supporting info will risk being sent to /dev/null
