Hi friends, Also, I've been doing some tests with the user "nagios" but I obteined the same result.
In this case, I tried in the context of the user "Nagios" but it works through the terminal: *nagios@nagioserver:~$ /usr/lib/nagios/plugins/check_by_ssh -l nagios -H 172.16.31.2 -C "/usr/lib/nagios/plugins/check_Xencpu" -i /var/lib/nagios/.ssh/id_rsa* *“OK:CPU%= 10”* If I set up my definition of the command: *#Check Hypervisor* * define service{* * use generic-service* * host_name ORLANDO* * service_description Hypervisor CPU* * check_command check_by_ssh_xentop!nagios!172.16.31.2!/usr/lib/nagios/plugins/check_Xencpu!/var/lib/nagios/.ssh/id_rsa! * * }* But, the result is not correct: [image: Imágenes integradas 1] Regards! Eduardo ** ** > > Hi list,**** > > ** ** > > I have some issues with the plugin "check_by_ssh". In particular, there is > one error:**** > > ** ** > > When I run a shell script located in another server, from the Nagios > server using the check_by_ssh plugin, I don't have any errors and I can see > the result of the script, like this:**** > > ** ** > > *root@nagioserver# <root@TSM-SRV-V-114>** /usr/lib/nagios/plugins/check_by_ssh > -l root -H "ipxenserver" -C /usr/lib/nagios/plugins/check_Xencpu > “OK:CPU%= 3”***** > > ** ** > > But, by any strange reason, when I configure the check for Nagios presents > the results in its interface, I have the error:**** > > [image: Imágenes integradas 1]**** > > ** ** > > I have made the ssh authorization keys in both servers (Nagios and Xen), I > configured the users, permissions,etc. And I can't to do this work it.**** > > ** ** > > Could someone help me solve this problem????**** > > ** ** > > ** ** > > This is a part of my definition files:**** > > *#XENServer* > > *define command {* > > * command_name check_by_ssh_xentop* > > * command_line /usr/lib/nagios/plugins/check_by_ssh -l > '$ARG1$' -H '$HOSTADDRESS$' -C '$ARG2$' -i '$ARG3$'* > > * }* > > *#Hypervisor check***** > > * define service{***** > > * use generic-service***** > > * host_name ORLANDO ***** > > * service_description Hypervisor CPU***** > > * check_command > check_by_ssh_xentop!root!ipxenserver!/usr/lib/nagios/plugins/check_Xencpu.sh!/root/.ssh/id_rsa! > ***** > > * }***** > > ** ** > > ** ** > > ** ** > > ** ** > > Regards!**** > > ** ** > > ** ** > > -- **** > > *IC.** Eduardo Montes de Oca Sánchez > *Skype: edrendar > Gmail: edren...@gmail.com > MSN: ed_montesde...@hotmail.com > Movil: 5523419886**** > > https://linuxcounter.net/cert/549074.png**** > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Nagios-users mailing list > Nagios-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/nagios-users > ::: Please include Nagios version, plugin version (-v) and OS when > reporting any issue. > ::: Messages without supporting info will risk being sent to /dev/null > -- *IC.** Eduardo Montes de Oca Sánchez *Skype: edrendar Gmail: edren...@gmail.com MSN: ed_montesde...@hotmail.com Movil: 5523419886 https://linuxcounter.net/cert/549074.png
<<image.png>>
------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________ Nagios-users mailing list Nagios-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nagios-users ::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. ::: Messages without supporting info will risk being sent to /dev/null