Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 22 May 2022 20:35:48 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 246914] [NEW PORT] net-mgmt/nrpe4: Nagios Remote Plugin Executor version 4
Message-ID:  <bug-246914-7788-534WDhul1I@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-246914-7788@https.bugs.freebsd.org/bugzilla/>
References:  <bug-246914-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D246914

Fabian Wenk <fabian@wenks.ch> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |fabian@wenks.ch

--- Comment #10 from Fabian Wenk <fabian@wenks.ch> ---
I am monitoring some linux systems which have nrpe 4.0.x and on them the sy=
slog
gets below messages on each check, even if the check itself works fine:
May 22 19:30:18 examplehostname nrpe[27333]: Error: (use_ssl =3D=3D true): =
Request
packet version was invalid!
May 22 19:30:18 examplehostname nrpe[27333]: Could not read request from cl=
ient
62.12.173.3, bailing out...
May 22 19:30:18 examplehostname nrpe[27333]: INFO: SSL Socket Shutdown.

Seems to be related to an issue with still using check_nrpe3 (3.2.1) from t=
he
Nagios server, see https://support.nagios.com/forum/viewtopic.php?t=3D59064

Would be really nice to have nrpe updated to the latest 4.0.3 release. I gu=
ess
renaming the port to net-mgmt/nrpe is probably the best solution, as based =
on
https://github.com/NagiosEnterprises/nrpe/releases it is still the same
project. And based on the note at https://github.com/NagiosEnterprises/nrpe=
 it
is marked as "deprecated" and will only receive security fixes. So no big
changes will happen in the future anyway.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-246914-7788-534WDhul1I>