The attached patch adds a "port" config variable to the SSH probe.
This allows probing hosts which run SSH on a non-standard port.
(although it is not documented, ssh-keyscan(1) understands -p <port>)
DES
--
Dag-Erling Smørgrav
Senior Software Developer
Linpro AS - www.linpro.no
--- /usr/share/perl5/smokeping/Smokeping/probes/SSH.pm.orig 2007-04-26
08:01:04.000000000 +0000
+++ /usr/share/perl5/smokeping/Smokeping/probes/SSH.pm 2007-04-26
08:11:46.000000000 +0000
@@ -82,7 +82,7 @@
my $host = $target->{addr};
- my $query = "$self->{properties}{binary} -t $target->{vars}->{keytype}
$host";
+ my $query = "$self->{properties}{binary} -t $target->{vars}->{keytype} -p
$target->{vars}->{port} $host";
my @times;
# get the user and system times before and after the test
@@ -134,6 +134,12 @@
_example => 'dsa',
_default => 'rsa',
},
+ port => {
+ _doc => "Port number, used in ssh-keyscan -p <port>",
+ _re => "\\d+",
+ _example => '22',
+ _default => '22',
+ },
})
}
1;
_______________________________________________
smokeping-users mailing list
[email protected]
https://lists.oetiker.ch/cgi-bin/listinfo/smokeping-users