Displaying 20 results from an estimated 69 matches for "5666".
Did you mean:
0666
2015 May 03
4
can't disable tcp6 on centos 7
>
> It's listening on both IPv6 and IPv4. Specifically, why is that a problem?
The central problem seems to be that the monitoring host can't hit nrpe on
port 5666 UDP.
[root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
puppet.mydomain.com
CHECK_NRPE: Socket timeout after 10 seconds.
It is listening on the puppet host on port 5666
[root at puppet:~] #lsof -i :5666
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
xinetd 2915 root 5u I...
2015 May 03
2
can't disable tcp6 on centos 7
>
> is it working on localhost or not???!!! it could be selinux problem also,
> if context is not correct.
It's working on localhost:
[root at puppet:~] #telnet localhost 5666
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
I notice if I stop the firewall on the puppet host (for no more than 2
seconds) and hit NRPE from the monitoring host it works:
[root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
puppet.mydomain.com
NRPE v2.1...
2015 May 03
0
can't disable tcp6 on centos 7
...correct.
--
Eero
2015-05-04 1:55 GMT+03:00 Tim Dunphy <bluethundr at gmail.com>:
> >
> > It's listening on both IPv6 and IPv4. Specifically, why is that a
> problem?
>
>
> The central problem seems to be that the monitoring host can't hit nrpe on
> port 5666 UDP.
>
> [root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
> puppet.mydomain.com
> CHECK_NRPE: Socket timeout after 10 seconds.
>
> It is listening on the puppet host on port 5666
>
> [root at puppet:~] #lsof -i :5666
> COMMAND PID USER FD TYPE DEVICE SIZ...
2015 May 03
3
can't disable tcp6 on centos 7
...restarted xinetd for good measure:
[root at puppet:~] #systemctl restart xinetd
[root at puppet:~] #
Because I'm trying to hit nrpe on this host.
Yet, xinetd/nrpe still seems to be listeing on TCP v6!!
[root at puppet:~] #netstat -tulpn | grep -i listen | grep xinetd
tcp6 0 0 :::5666 :::* LISTEN
2915/xinetd
This is a CentOS 7.1 box:
[root at puppet:~] #cat /etc/redhat-release
CentOS Linux release 7.1.1503 (Core)
What am I doing wrong? I need to be able to disable tcpv6 completely!
Thanks
Tim
--
GPG me!!
gpg --keyserver pool.sks-k...
2015 May 01
5
Could not complete SSL handshake to Amazon EC2 host
...unning under xinetd on the host I'm
trying to monitor.
And running the nrpe checl locally:
[root at ops:~] #/usr/local/nagios/libexec/check_nrpe -H localhost
NRPE v2.15
[root at ops:~] #grep only_from /etc/xinetd.d/nrpe
only_from = 127.0.0.1 216.120.248.126
And I do have port 5666 open on the security group for this host.
And I made sure the local firewall was stopped, because I am blocking ports
with the security groups instead.
[root at ops:~] #service iptables status
Firewall is stopped.
It's only when checking from the monitoring host that nrpe fails:
[root at mo...
2015 May 01
8
Could not complete SSL handshake to Amazon EC2 host
...or a host in the Amazon EC2 cloud.
Yet when I try to check NRPE from the monitoring host I am getting an SSL
handshake error:
[root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H ops.jokefire.com
CHECK_NRPE: Error - Could not complete SSL handshake.
And if I telnet into the host on port 5666 to see if the FW port is open,
the connection closes right away:
[root at monitor1:~] #telnet ops.somewhere.com 5666
Trying 54.225.218.125...
Connected to ops.somewhere.com.
Escape character is '^]'.
Connection closed by foreign host.
You can see there it connects, but then it closes imme...
2015 May 01
2
Could not complete SSL handshake to Amazon EC2 host
...r/local/nagios/libexec/check_nrpe -H localhost
> > > > NRPE v2.15
> > > >
> > > > [root at ops:~] #grep only_from /etc/xinetd.d/nrpe
> > > > only_from = 127.0.0.1 216.120.248.126
> > > >
> > > > And I do have port 5666 open on the security group for this host.
> > > >
> > > > And I made sure the local firewall was stopped, because I am blocking
> > > ports
> > > > with the security groups instead.
> > > >
> > > > [root at ops:~] #service iptable...
2015 May 01
2
Could not complete SSL handshake to Amazon EC2 host
...without the -n flag:
>
> [root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
> ops.jokefire.com
> *CHECK_NRPE: Error - Could not complete SSL handshake.*
>
> Running nmap from the monitor host I can see that the nrpe port is open:
>
> [root at monitor1:~] #nmap -p 5666 ops.jokefire.com
>
> Starting Nmap 6.40 ( http://nmap.org ) at 2015-05-01 12:38 EDT
> Nmap scan report for ops.jokefire.com (54.225.218.125)
> Host is up (0.011s latency).
> rDNS record for 54.225.218.125: ec2-54-225-218-125.compute-1.amazonaws.com
> PORT STATE SERVICE
> *5...
2015 May 03
2
can't disable tcp6 on centos 7
...t under xinetd as usual way is to run it as nrped daemon.
test against with check_nrpe, not using telnet.
--
Eero
2015-05-04 2:27 GMT+03:00 Stephen Harris <lists at spuddy.org>:
> On Sun, May 03, 2015 at 07:23:19PM -0400, Tim Dunphy wrote:
> > [root at puppet:~] #telnet localhost 5666
>
> This is using TCP
>
> > [root at monitor1:~] #nmap -p 5666 puppet.mydomain.com
> ...
> > 5666/tcp filtered nrpe
>
> This is using TCP
>
> > Back on the puppet host I verify that the port is open for UDP:
>
> So why are you opening a UDP port?
>
&g...
2015 May 01
2
Could not complete SSL handshake to Amazon EC2 host
...nrpe checl locally:
> >
> > [root at ops:~] #/usr/local/nagios/libexec/check_nrpe -H localhost
> > NRPE v2.15
> >
> > [root at ops:~] #grep only_from /etc/xinetd.d/nrpe
> > only_from = 127.0.0.1 216.120.248.126
> >
> > And I do have port 5666 open on the security group for this host.
> >
> > And I made sure the local firewall was stopped, because I am blocking
> ports
> > with the security groups instead.
> >
> > [root at ops:~] #service iptables status
> > Firewall is stopped.
> >
> >...
2015 May 01
0
Could not complete SSL handshake to Amazon EC2 host
...on.*
And still getting the SSL error without the -n flag:
[root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H ops.jokefire.com
*CHECK_NRPE: Error - Could not complete SSL handshake.*
Running nmap from the monitor host I can see that the nrpe port is open:
[root at monitor1:~] #nmap -p 5666 ops.jokefire.com
Starting Nmap 6.40 ( http://nmap.org ) at 2015-05-01 12:38 EDT
Nmap scan report for ops.jokefire.com (54.225.218.125)
Host is up (0.011s latency).
rDNS record for 54.225.218.125: ec2-54-225-218-125.compute-1.amazonaws.com
PORT STATE SERVICE
*5666/tcp open nrpe*
Nmap done: 1...
2015 May 01
0
Could not complete SSL handshake to Amazon EC2 host
...to monitor.
>
> And running the nrpe checl locally:
>
> [root at ops:~] #/usr/local/nagios/libexec/check_nrpe -H localhost
> NRPE v2.15
>
> [root at ops:~] #grep only_from /etc/xinetd.d/nrpe
> only_from = 127.0.0.1 216.120.248.126
>
> And I do have port 5666 open on the security group for this host.
>
> And I made sure the local firewall was stopped, because I am blocking ports
> with the security groups instead.
>
> [root at ops:~] #service iptables status
> Firewall is stopped.
>
> It's only when checking from the monitori...
2015 May 01
0
Could not complete SSL handshake to Amazon EC2 host
...t; Yet when I try to check NRPE from the monitoring host I am getting an SSL
> handshake error:
>
> [root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
> ops.jokefire.com
> CHECK_NRPE: Error - Could not complete SSL handshake.
>
> And if I telnet into the host on port 5666 to see if the FW port is open,
> the connection closes right away:
>
> [root at monitor1:~] #telnet ops.somewhere.com 5666
> Trying 54.225.218.125...
> Connected to ops.somewhere.com.
> Escape character is '^]'.
> Connection closed by foreign host.
>
> You can see...
2015 May 01
0
Could not complete SSL handshake to Amazon EC2 host
...; [root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
> > ops.jokefire.com
> > *CHECK_NRPE: Error - Could not complete SSL handshake.*
> >
> > Running nmap from the monitor host I can see that the nrpe port is open:
> >
> > [root at monitor1:~] #nmap -p 5666 ops.jokefire.com
> >
> > Starting Nmap 6.40 ( http://nmap.org ) at 2015-05-01 12:38 EDT
> > Nmap scan report for ops.jokefire.com (54.225.218.125)
> > Host is up (0.011s latency).
> > rDNS record for 54.225.218.125:
> ec2-54-225-218-125.compute-1.amazonaws.com
>...
2006 Nov 01
4
splitting very long character string
...array of about 60k numbers. The help on strsplit says to use perl=TRUE to get better formance, but still it takes several minutes to split this string.
The massive string is the return value of a call to xmlElementsByTagName from the XML library and looks like this:
...
12345
564376
5674
6356656
5666
...
I've to read about a hundred of these files and was wondering whether there's a more efficient way to turn this string into an array of numerics. Any ideas?
thanks a lot for your help
and kind regards,
Arne
[[alternative HTML version deleted]]
2015 May 01
0
Could not complete SSL handshake to Amazon EC2 host
...> > [root at ops:~] #/usr/local/nagios/libexec/check_nrpe -H localhost
> > > NRPE v2.15
> > >
> > > [root at ops:~] #grep only_from /etc/xinetd.d/nrpe
> > > only_from = 127.0.0.1 216.120.248.126
> > >
> > > And I do have port 5666 open on the security group for this host.
> > >
> > > And I made sure the local firewall was stopped, because I am blocking
> > ports
> > > with the security groups instead.
> > >
> > > [root at ops:~] #service iptables status
> > > Firewa...
2009 Jun 04
3
WWDC Puppeteer lunch
...on the 8th after we verify the set up.
I might even get there a little earlier and put down "reserved" tags.
---
Thank you,
Allan Marcus
Solutions Architect
Central Software and Development Team (CSD)
Departmental Computing Services Division (DCS)
Los Alamos National Laboratory
505-667-5666
allan@lanl.gov
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com
To unsubscribe from this group, send email to puppet-...
2015 May 04
0
can't disable tcp6 on centos 7
...~] #find / -name "check_nrpe"
[root at monitor1:~] #
So I'm more comfortable with a source install.
test against with check_nrpe, not using telnet.
>
I actually solved the problem by adding the port to tcp instead of udp on
the puppet host:
firewall-cmd --permanent --add-port=5666/tcp
Then from the monitoring host:
[root at monitor1:~] #/usr/local/nagios/libexec/check_nrpe -H
puppet.mydomain.com
NRPE v2.15
So it's all good at this point. I'm not sure why the instructions I
followed said to open up the port under UDP.. Had I just done what I did I
would have saved...
2014 Mar 17
2
Samba 4.1.6 + RPC Problem + DNS + RSAT
...ISTEN 26519/named-sdb
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 26519/named-sdb
tcp 0 0 0.0.0.0:88 0.0.0.0:* LISTEN 27695/samba
tcp 0 0 127.0.0.1:953 0.0.0.0:* LISTEN 26519/named-sdb
tcp 0 0 0.0.0.0:636 0.0.0.0:* LISTEN 27693/samba
tcp 0 0 0.0.0.0:1024 0.0.0.0:* LISTEN 27689/samba
tcp 0 0 0.0.0.0:5666 0.0.0.0:* LISTEN 880/nrpe
tcp 0 0 0.0.0.0:3268 0.0.0.0:* LISTEN 27693/samba
tcp 0 0 0.0.0.0:3269 0.0.0.0:* LISTEN 27693/samba
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 27693/samba
tcp 0 0 0.0.0.0:135 0.0.0.0:* LISTEN 27689/samba
tcp 0 0 ::1:53 :::* LISTEN 26519/named-sdb
tcp 0 0 ::1:953 :::* LISTE...
2017 Jan 30
1
Help with iptables && tinc
...0 0 ACCEPT tcp -- lo * 0.0.0.0/0
> 0.0.0.0/0 tcp dpt:3306
> 0 0 ACCEPT udp -- lo * 0.0.0.0/0
> 0.0.0.0/0 udp dpt:3306
> 0 0 NRPE tcp -- * * 0.0.0.0/0
> 0.0.0.0/0 tcp dpt:5666
> 0 0 ACCEPT icmp -- * * x.x.x.x 0.0.0.0/0
> icmptype 8
> 0 0 ACCEPT icmp -- * * 127.0.0.1
> 0.0.0.0/0 icmptype 8
> 0 0 ACCEPT icmp -- * * 10.0.3.0/24
> 0.0.0.0/0...