diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 01:20:09 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 01:20:09 +0000 |
commit | 018433a6da60c6395baaaa0833d5c50ac6645552 (patch) | |
tree | 2012deeff2f98b267c0c10425c1d4a054190b73f /contrib | |
parent | Initial commit. (diff) | |
download | nagios-nrpe-upstream.tar.xz nagios-nrpe-upstream.zip |
Adding upstream version 3.2.1.upstream/3.2.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'contrib')
-rw-r--r-- | contrib/README.nrpe_check_control | 64 | ||||
-rw-r--r-- | contrib/nrpe_check_control.c | 121 |
2 files changed, 185 insertions, 0 deletions
diff --git a/contrib/README.nrpe_check_control b/contrib/README.nrpe_check_control new file mode 100644 index 0000000..781b961 --- /dev/null +++ b/contrib/README.nrpe_check_control @@ -0,0 +1,64 @@ +NOTES: +------ + +The service definition below assumes you have a command called "check_tcp" already setup +in your config files. + +The command definition below assumes that the $USER1$ macro is used to define the location +of your Nagios plugins (i.e. "/usr/local/nagios/libexec") and that the nrpe_check_control +service is located in that directory. + + + +SAMPLE CONFIG FILE SNIPPETS: +---------------------------- + +define service { + host_name <host name goes here> + description NRPE + ... + event_handler nrpe_check_control + check_command check_tcp!-p 5666 + } + +define command { + command_name nrpe_check_control + command_line $USER1$/nrpe_check_control $SERVICESTATE$ $SERVICESTATETYPE$ $SERVICEATTEMPT$ "$HOSTNAME$" + } + + + + +ORIGINAL EMAIL SNIPPET: +----------------------- + +Date sent: Fri, 30 Mar 2001 18:51:48 -0500 +From: adam.bowen@<> +Subject: Event Handler +To: [nagios@nagios.org] + +I am attaching the source code for an event handler I wrote to +control checks using nrpe. I add the following check to all remote hosts +using nrpe: + +<see example above> + +I added this line to the commands.cfg file: + +<see example above> + +When the NRPE service check listed above has 3 failed connection +attempts, it will run the nrpe_check_control which will search the +services file for all services for $HOSTNAME$ that use the check_nrpe. + +It will then request that all these services be disabled. When the +NRPE check returns to the OK state, it will request that all services +using check_nrpe be re-enabled. This will prevent unnecessary e-mail +when there is a problem with the NRPE daemon. This does require +that external commands be enabled. + +(See attached file: nrpe_check_control.c) + +I thought some other [Nagios] users might find this useful. + +Adam G. Bowen diff --git a/contrib/nrpe_check_control.c b/contrib/nrpe_check_control.c new file mode 100644 index 0000000..04fa9e0 --- /dev/null +++ b/contrib/nrpe_check_control.c @@ -0,0 +1,121 @@ +#include <stdio.h> +#include <string.h> +#include <time.h> + +#define MAX_CHARS 1024 +#define SERVICE_COUNT 12 + +#define COMMAND_FILE "/usr/local/nagios/var/rw/nagios.cmd" +#define SERVICES_FILE "/usr/local/nagios/etc/services.cfg" + +int main(int argc, char *argv[]) +{ + char check_name[MAX_CHARS]; + char ent_type[MAX_CHARS]; + char input_buffer[MAX_CHARS]; + char host_name[MAX_CHARS]; + char service_name[MAX_CHARS]; + char state[MAX_CHARS]; + char state_type[MAX_CHARS]; + char temp_input[MAX_CHARS]; + char temp_string[MAX_CHARS]; + char test_host[MAX_CHARS]; + + char *temp_var; + + FILE *command_fp; + FILE *services_fp; + + int attempt; + int i; + + time_t current_time; + + strcpy(state,argv[1]); + strcpy(state_type,argv[2]); + attempt=atoi(argv[3]); + strcpy(host_name,argv[4]); + + if(strcmp(state,"OK") == 0) + { + services_fp=fopen(SERVICES_FILE,"r"); + command_fp=fopen(COMMAND_FILE,"a"); + while((fgets(input_buffer,MAX_CHARS-1,services_fp)) != NULL) + { + if(input_buffer[0]=='#' || input_buffer[0]=='\x0' || input_buffer[0]=='\n' || input_buffer[0]=='\r') + { + continue; + } + else + { + strcpy(temp_input,input_buffer); + strcpy(temp_string,strtok(temp_input,"=")); + strcpy(ent_type,strtok(temp_string,"[")); + if(strcmp(ent_type,"service") == 0) + { + strcpy(test_host,strtok(NULL,"]")); + if(strcmp(test_host,host_name) == 0) + { + temp_var=strtok(input_buffer,"="); + strcpy(service_name,strtok(NULL,";")); + for(i=1;i<=SERVICE_COUNT;i++) + { + temp_var=strtok(NULL,";"); + } + strcpy(check_name,strtok(temp_var,"!")); + if(strcmp(check_name,"check_nrpe") == 0) + { + time(¤t_time); + fprintf(command_fp,"[%lu] ENABLE_SVC_CHECK;%s;%s\n",current_time,host_name,service_name); + } + } + } + } + } + fclose(command_fp); + fclose(services_fp); + } + else if(strcmp(state,"CRITICAL") == 0) + { + if(attempt == 3) + { + services_fp=fopen(SERVICES_FILE,"r"); + command_fp=fopen(COMMAND_FILE,"a"); + while((fgets(input_buffer,MAX_CHARS-1,services_fp)) != NULL) + { + if(input_buffer[0]=='#' || input_buffer[0]=='\x0' || input_buffer[0]=='\n' || input_buffer[0]=='\r') + { + continue; + } + else + { + strcpy(temp_input,input_buffer); + strcpy(temp_string,strtok(temp_input,"=")); + strcpy(ent_type,strtok(temp_string,"[")); + if(strcmp(ent_type,"service") == 0) + { + strcpy(test_host,strtok(NULL,"]")); + if(strcmp(test_host,host_name) == 0) + { + temp_var=strtok(input_buffer,"="); + strcpy(service_name,strtok(NULL,";")); + for(i=1;i<=SERVICE_COUNT;i++) + { + temp_var=strtok(NULL,";"); + } + strcpy(check_name,strtok(temp_var,"!")); + if(strcmp(check_name,"check_nrpe") == 0) + { + time(¤t_time); + fprintf(command_fp,"[%lu] DISABLE_SVC_CHECK;%s;%s\n",current_time,host_name,service_name); + } + } + } + } + } + fclose(command_fp); + fclose(services_fp); + } + } + return 0; +} |