[SOLVED] Website monitoring using network service - Part 2

Started by Guillaume, May 05, 2015, 08:46:50 PM

Previous topic - Next topic

Guillaume

Hello again netxms community!

After my first problem, I thought that I had fixed everything and that I was able to monitor network services.

I was wrong.

My previously working services are now showing with a value of "4" in the last value panel and a nice red "x" is showing next to the services name... Needless to say, I am able to access the web page and get the needed information from the monitoring server:
prompt$ curl -Is http://host.com/testDB.php | head  -n 1
HTTP/1.1 200 OK



The only difference between the state of my setup now versus what it was at the time of my first topic is the software version change. I am now using the M4 version of netxms.

Here is the relevant part of the nxagentd.log file, where we can see that a connection is made between localhost and the agent. Then the log shows the proper shared secret and the proper request to send:
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Session with 192.168.108.22 closed
[05-May-2015 13:35:26.207] [DEBUG] Incoming connection from 192.168.108.22
[05-May-2015 13:35:26.207] [DEBUG] Connection from 192.168.108.22 accepted
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Message dump:
  ** 00B60020000000100000000000000000
  ** code=0x00B6 (CMD_GET_NXCP_CAPS) flags=0x0020 id=0 size=16 numFields=0

[05-May-2015 13:35:26.207] [DEBUG] [session:1] Received control message CMD_GET_NXCP_CAPS
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Sending message CMD_NXCP_CAPS (size 16)
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Message dump:
  ** 00400000000000400000000100000002
  ** 00000010030000010000001101000000
  ** 000000180053005E0064006700370044
  ** 00430073006F004C0069004500000000
  ** code=0x0040 (CMD_AUTHENTICATE) flags=0x0000 id=1 size=64 numFields=2
  ** [    16] INT16    1
  ** [    17] STRING   "secret^secret"

[05-May-2015 13:35:26.207] [DEBUG] [session:1] Received message CMD_AUTHENTICATE
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Sending message CMD_REQUEST_COMPLETED (size 32)
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Message dump:
  ** 01340000000000180000000200000001
  ** 0000009703010001
  ** code=0x0134 (CMD_ENABLE_IPV6) flags=0x0000 id=2 size=24 numFields=1
  ** [   151] INT16    1

[05-May-2015 13:35:26.207] [DEBUG] [session:1] Received message CMD_ENABLE_IPV6
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Sending message CMD_REQUEST_COMPLETED (size 32)
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Message dump:
  ** 00730000000000D80000000300000006
  ** 00000008060000000000000000000000
  ** 00000000000000000020000000000000
  ** 00000082030000050000008403000050
  ** 00000083030000060000008501000000
  ** 000000400069006E007400720061006E
  ** 00650074002E007300610076006F0075
  ** 00720061002E0063006F006D003A002F
  ** 007400650073007400440042002E0070
  ** 00680070000000000000008601000000
  ** 0000002E005E0048005400540050002F
  ** 0031005C002E005B00300031005D0020
  ** 003200300030002E002A004F004B002E
  ** 002A000000000000
  ** code=0x0073 (CMD_CHECK_NETWORK_SERVICE) flags=0x0000 id=3 size=216 numFields=6
  ** [     8] INETADDR 0.0.0.0
  ** [   130] INT16    5
  ** [   132] INT16    80
  ** [   131] INT16    6
  ** [   133] STRING   "host.com:/testDB.php"
  ** [   134] STRING   "^HTTP/1\.[01] 200.*OK.*"

[05-May-2015 13:35:26.207] [DEBUG] [session:1] Received message CMD_CHECK_NETWORK_SERVICE
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Sending message CMD_REQUEST_COMPLETED (size 64)
[05-May-2015 13:35:26.207] [DEBUG] [session:1] Session with 192.168.108.22 closed


Is there anything that I could check/provide to get the monitoring of web services up and running once and for all?

Thanks for any input!

**I have replaced the real secret and hostname of the target web service for confidentiality reasons

Victor Kirhenshtein

Hi,

there is another reports of portcheck subagent being broken in 2.0-M4. We will check it soon.

Best regards,
Victor

Guillaume

Ok!

Thanks a bunch for your efforts on this awesome product!