Build precise queries to find exactly what you need
Press ESC to close
Join our next live webinar: “Advanced Nagios Monitoring Techniques” – Register Now
Your review has been submitted and is pending approval.
LINUX ONLY – Check for OOM-Killer (out of memory killer) Activity
Current Version
2.0
Last Release Date
2010-09-07
Owner
John Chivian
Compatible With
check_oomkiller client plugin
check_oomkiller suid wrapper
The LINUX OS will assassinate "big memory" processes during extreme memory shortages as a self defense. This plugin checks for such activity and returns a critical status if any has occurred since the previous check. This plugin was written on and for RHEL4 using Nagios and NRPE and may need to be tweaked for other distro's. IMPORTANT - This check requires read only access to the system messages file /var/log/messages which is not by default available to unprivileged accounts. For this reason it is either necessary to make /var/log/messages readable to the nagios user account (DON'T DO THIS), or it is necessary to write a small compiled wrapper program around the script and install the wrapper as a root owned SUID executable (DO THIS!) Installation Instructions 1) Put the PERL script and C program in the nagios/libexec directory on the client system that will be checked. 2) Edit the C program if needed changing the REAL_PATH definition for your environment. 3) Compile the C program and install it as an SUID application. (chmod 4555 and chown root) 4) Use the following plugin definition on the client system in the nrpe.cfg configuration file. As with the C program edit the path if needed for your environment.
command[check_oomkiller]=/usr/local/nagios/libexec/check_oomkiller
define service{ use generic-service host_name possible-oom-killer-victim service_description OOM Killer check_command check_nrpe60!check_oomkiller max_check_attempts 1 }
define command{ command_name check_nrpe60 command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -t 60 -c $ARG1$ }
I've got the compiled C wrapper working on the command line as ./check_oomkiller, but when attempting to run with NRPE as ./check_nrpe -H 127.0.0.1 -c check_oomkiller I continue to get NRPE: Unable to read output. Using NRPE 3.0.1. I have also update my nrpe.cfg file with the matching command and restarted nrpe.
You must be logged in to submit a review.
To:
From: