summaryrefslogtreecommitdiffstats
path: root/contrib
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 11:05:42 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 11:05:42 +0000
commit305857535615c13098272b678a72000b021a7fc3 (patch)
tree588d04c9a14561b6bc6d3e5ef09d413692a36771 /contrib
parentInitial commit. (diff)
downloadnagios-nrpe-305857535615c13098272b678a72000b021a7fc3.tar.xz
nagios-nrpe-305857535615c13098272b678a72000b021a7fc3.zip
Adding upstream version 4.0.3.upstream/4.0.3upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--contrib/README.nrpe_check_control64
-rw-r--r--contrib/nrpe_check_control.c121
2 files changed, 185 insertions, 0 deletions
diff --git a/contrib/README.nrpe_check_control b/contrib/README.nrpe_check_control
new file mode 100644
index 0000000..781b961
--- /dev/null
+++ b/contrib/README.nrpe_check_control
@@ -0,0 +1,64 @@
+NOTES:
+------
+
+The service definition below assumes you have a command called "check_tcp" already setup
+in your config files.
+
+The command definition below assumes that the $USER1$ macro is used to define the location
+of your Nagios plugins (i.e. "/usr/local/nagios/libexec") and that the nrpe_check_control
+service is located in that directory.
+
+
+
+SAMPLE CONFIG FILE SNIPPETS:
+----------------------------
+
+define service {
+ host_name <host name goes here>
+ description NRPE
+ ...
+ event_handler nrpe_check_control
+ check_command check_tcp!-p 5666
+ }
+
+define command {
+ command_name nrpe_check_control
+ command_line $USER1$/nrpe_check_control $SERVICESTATE$ $SERVICESTATETYPE$ $SERVICEATTEMPT$ "$HOSTNAME$"
+ }
+
+
+
+
+ORIGINAL EMAIL SNIPPET:
+-----------------------
+
+Date sent: Fri, 30 Mar 2001 18:51:48 -0500
+From: adam.bowen@<>
+Subject: Event Handler
+To: [nagios@nagios.org]
+
+I am attaching the source code for an event handler I wrote to
+control checks using nrpe. I add the following check to all remote hosts
+using nrpe:
+
+<see example above>
+
+I added this line to the commands.cfg file:
+
+<see example above>
+
+When the NRPE service check listed above has 3 failed connection
+attempts, it will run the nrpe_check_control which will search the
+services file for all services for $HOSTNAME$ that use the check_nrpe.
+
+It will then request that all these services be disabled. When the
+NRPE check returns to the OK state, it will request that all services
+using check_nrpe be re-enabled. This will prevent unnecessary e-mail
+when there is a problem with the NRPE daemon. This does require
+that external commands be enabled.
+
+(See attached file: nrpe_check_control.c)
+
+I thought some other [Nagios] users might find this useful.
+
+Adam G. Bowen
diff --git a/contrib/nrpe_check_control.c b/contrib/nrpe_check_control.c
new file mode 100644
index 0000000..04fa9e0
--- /dev/null
+++ b/contrib/nrpe_check_control.c
@@ -0,0 +1,121 @@
+#include <stdio.h>
+#include <string.h>
+#include <time.h>
+
+#define MAX_CHARS 1024
+#define SERVICE_COUNT 12
+
+#define COMMAND_FILE "/usr/local/nagios/var/rw/nagios.cmd"
+#define SERVICES_FILE "/usr/local/nagios/etc/services.cfg"
+
+int main(int argc, char *argv[])
+{
+ char check_name[MAX_CHARS];
+ char ent_type[MAX_CHARS];
+ char input_buffer[MAX_CHARS];
+ char host_name[MAX_CHARS];
+ char service_name[MAX_CHARS];
+ char state[MAX_CHARS];
+ char state_type[MAX_CHARS];
+ char temp_input[MAX_CHARS];
+ char temp_string[MAX_CHARS];
+ char test_host[MAX_CHARS];
+
+ char *temp_var;
+
+ FILE *command_fp;
+ FILE *services_fp;
+
+ int attempt;
+ int i;
+
+ time_t current_time;
+
+ strcpy(state,argv[1]);
+ strcpy(state_type,argv[2]);
+ attempt=atoi(argv[3]);
+ strcpy(host_name,argv[4]);
+
+ if(strcmp(state,"OK") == 0)
+ {
+ services_fp=fopen(SERVICES_FILE,"r");
+ command_fp=fopen(COMMAND_FILE,"a");
+ while((fgets(input_buffer,MAX_CHARS-1,services_fp)) != NULL)
+ {
+ if(input_buffer[0]=='#' || input_buffer[0]=='\x0' || input_buffer[0]=='\n' || input_buffer[0]=='\r')
+ {
+ continue;
+ }
+ else
+ {
+ strcpy(temp_input,input_buffer);
+ strcpy(temp_string,strtok(temp_input,"="));
+ strcpy(ent_type,strtok(temp_string,"["));
+ if(strcmp(ent_type,"service") == 0)
+ {
+ strcpy(test_host,strtok(NULL,"]"));
+ if(strcmp(test_host,host_name) == 0)
+ {
+ temp_var=strtok(input_buffer,"=");
+ strcpy(service_name,strtok(NULL,";"));
+ for(i=1;i<=SERVICE_COUNT;i++)
+ {
+ temp_var=strtok(NULL,";");
+ }
+ strcpy(check_name,strtok(temp_var,"!"));
+ if(strcmp(check_name,"check_nrpe") == 0)
+ {
+ time(&current_time);
+ fprintf(command_fp,"[%lu] ENABLE_SVC_CHECK;%s;%s\n",current_time,host_name,service_name);
+ }
+ }
+ }
+ }
+ }
+ fclose(command_fp);
+ fclose(services_fp);
+ }
+ else if(strcmp(state,"CRITICAL") == 0)
+ {
+ if(attempt == 3)
+ {
+ services_fp=fopen(SERVICES_FILE,"r");
+ command_fp=fopen(COMMAND_FILE,"a");
+ while((fgets(input_buffer,MAX_CHARS-1,services_fp)) != NULL)
+ {
+ if(input_buffer[0]=='#' || input_buffer[0]=='\x0' || input_buffer[0]=='\n' || input_buffer[0]=='\r')
+ {
+ continue;
+ }
+ else
+ {
+ strcpy(temp_input,input_buffer);
+ strcpy(temp_string,strtok(temp_input,"="));
+ strcpy(ent_type,strtok(temp_string,"["));
+ if(strcmp(ent_type,"service") == 0)
+ {
+ strcpy(test_host,strtok(NULL,"]"));
+ if(strcmp(test_host,host_name) == 0)
+ {
+ temp_var=strtok(input_buffer,"=");
+ strcpy(service_name,strtok(NULL,";"));
+ for(i=1;i<=SERVICE_COUNT;i++)
+ {
+ temp_var=strtok(NULL,";");
+ }
+ strcpy(check_name,strtok(temp_var,"!"));
+ if(strcmp(check_name,"check_nrpe") == 0)
+ {
+ time(&current_time);
+ fprintf(command_fp,"[%lu] DISABLE_SVC_CHECK;%s;%s\n",current_time,host_name,service_name);
+ }
+ }
+ }
+ }
+ }
+ fclose(command_fp);
+ fclose(services_fp);
+ }
+ }
+ return 0;
+}