Search Exchange
Search All Sites
Nagios Live Webinars
Let our experts show you how Nagios can help your organization.Login
Directory Tree
check_team
2019-09-17
- Nagios 4.x
BSD
7178
File | Description |
---|---|
check_team | The check implemented in bash |
check_team.cfg | NRPE configuration file |
10_nrpe | The sudo configuration file |
Meet The New Nagios Core Services Platform
Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.
Monitoring Made Magically Better
- Nagios Core on Overdrive
- Powerful Monitoring Dashboards
- Time-Saving Configuration Wizards
- Open Source Powered Monitoring On Steroids
- And So Much More!
Tested on RHEL7 with selinux enforced and nrpe_user=nrpe.
Note that the check runs as root via sudo, so take care of the file permissions.
File ownership/permissions are documented in the files themselves.
When selinux is enabled the seboolean nagios_run_sudo should be on.
From RHEL7.6 on you may need to add entry "+:nrpe:LOCAL" in /etc/security/access.conf to prevent errors like : pam_access(sudo:account): access denied for user `nrpe' from `'
example run with 2 team-slaves and no errors:
call:
check_nrpe -H targethost -c check_team
result:
OK - Links up : 2
and exitcode 0
Note that the check runs as root via sudo, so take care of the file permissions.
File ownership/permissions are documented in the files themselves.
When selinux is enabled the seboolean nagios_run_sudo should be on.
From RHEL7.6 on you may need to add entry "+:nrpe:LOCAL" in /etc/security/access.conf to prevent errors like : pam_access(sudo:account): access denied for user `nrpe' from `'
example run with 2 team-slaves and no errors:
call:
check_nrpe -H targethost -c check_team
result:
OK - Links up : 2
and exitcode 0
Reviews (0)
Be the first to review this listing!