Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
A plugin written in C# that tries to mimick the check_http plugin that is called via NRPE on a host in an MS NLB Cluster.
Current Version
Last Release Date
June 15, 2009
Owner
Nagios Exchange
check_http_nrpe.exe
Designed to circumvent the MS NLB. The plugin is called via nrpe and will execute on the host in the nlb cluster. Designed to check a vip on the actual host it is executed from, rather then thru the nlb, so you know which server the alert came from.
COMMAND DEFINITION:
define command{
command_name check_http_nrpe command_line /usr/lib/nagios/plugins/check_nrpe -H $HOSTADDRESS$ -p 5666 -t 30 -c check_http_nrpe -a $ARG1$ $ARG2$ $ARG3$ }
SERVICE DEFINITION: check_command check_http_nrpe!www.yourwebsite.com!index.html!0 or check_command check_http_nrpe!www.yourwebsite.com!/subfolder/index.html!0 or check_command check_http_nrpe!www.yourwebsite.com!redirect.html!1
NRPE CONFIGURATION: commandcheck_http_nrpe=C:Progra~1nrpe_ntpluginscheck_http_nrpe.exe $ARG1$ $ARG2$ $ARG3$
Please let me know how it goes.
Thanks for the plugin. have a quick question on usage. How do I use it for HTTPS and a different port than 80? Thanks Ashish
This is a nice tool if you need only the "200 OK HTTP/1.0" displayed as the output.. I Was trying to get the remaining output from my custom php file with no success.. Maybe in the next version, we might see the php/jsp/serlet/etc output displayed as well :)
You must be logged in to submit a review.
To:
From:
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!