Агент под OpenWrt работает или нет?

Started by wizarom, December 06, 2018, 04:44:14 AM

Previous topic - Next topic

wizarom

Добрый день!
По порядку:
агент собран для openwrt 18
процессор Qualcomm Atheros QCA9533
опрос состояния выглядит так

[06.12.2018 08:43:24] **** Poll request sent to server ****
[06.12.2018 08:43:24] Poll request accepted
[06.12.2018 08:43:24] Starting status poll for node mamont-gate
[06.12.2018 08:43:24] Checking NetXMS agent connectivity
[06.12.2018 08:43:24]    Starting status poll on interface unknown
[06.12.2018 08:43:24]       Current interface status is NORMAL
[06.12.2018 08:43:24]       Retrieving interface status from NetXMS agent
[06.12.2018 08:43:24]       Unable to retrieve interface status from NetXMS agent
[06.12.2018 08:43:24]       Starting ICMP ping
[06.12.2018 08:43:24]       Interface is NORMAL for 1 poll (1 poll required for status change)
[06.12.2018 08:43:24]       Interface status after poll is NORMAL
[06.12.2018 08:43:24]    Finished status poll on interface unknown
[06.12.2018 08:43:24] Node is connected
[06.12.2018 08:43:30] Finished status poll for node mamont-gate
[06.12.2018 08:43:30] Node status after poll is NORMAL
[06.12.2018 08:43:30] **** Poll completed successfully ****


запуск агента с дебагом показывает в момент опроса так

root@mam-gate:~# /usr/bin/nxagentd -D 9 -c /etc/nxagent.conf
Error reading additional configuration files from "/etc/nxagentd.conf.d"
2018.12.06 09:37:16.473 *D* Log rotation policy set to 2 (size=16777216, count=4)
2018.12.06 09:37:16.475 *I* Core agent version reboot-8507-ga0d5acfbe2
2018.12.06 09:37:16.476 *I* Additional configs was loaded from /etc/nxagentd.conf.d
2018.12.06 09:37:16.477 *I* Debug level set to 9
2018.12.06 09:37:16.489 *I* Data directory: /var/lib/netxms
2018.12.06 09:37:16.490 *I* File store: /tmp
2018.12.06 09:37:16.492 *D* Effective user ID 0
2018.12.06 09:37:16.493 *D* Effective group ID 0
2018.12.06 09:37:16.495 *D* Configuration policy directory: /var/lib/netxms/config_ap/
2018.12.06 09:37:16.496 *D* Log parser policy directory: /var/lib/netxms/logparser_ap/
2018.12.06 09:37:16.497 *D* Certificate directory: /var/lib/netxms/certificates/
2018.12.06 09:37:16.498 *D* Subagent API initialized
2018.12.06 09:37:16.503 *D* Validating ciphers
2018.12.06 09:37:16.504 *D*    AES-256 enabled
2018.12.06 09:37:16.505 *D*    Blowfish-256 enabled
2018.12.06 09:37:16.506 *D*    IDEA disabled (config)
2018.12.06 09:37:16.509 *D*    3DES enabled
2018.12.06 09:37:16.510 *D*    AES-128 enabled
2018.12.06 09:37:16.522 *D*    Blowfish-128 enabled
2018.12.06 09:37:16.524 *D* Crypto library initialized
2018.12.06 09:37:16.542 *D*
2018.12.06 09:37:16.543 *I* DB Library: Database driver "sqlite.ddr" loaded and initialized successfully
2018.12.06 09:37:16.544 *D* [db.conn            ] DBConnect: server=(null) db=/var/lib/netxms/nxagentd.db login=(null) schema=(null)
2018.12.06 09:37:16.548 *D* [db.conn            ] New DB connection opened: handle=0x77c775e0
2018.12.06 09:37:16.555 *D* [db.query           ] Successful sync query: "SELECT value FROM metadata WHERE attribute='SchemaVersion'" [1 ms]
2018.12.06 09:37:16.565 *D* [db.query           ] DB Library: long running query threshold set to 250
2018.12.06 09:37:16.589 *D* [db.query           ] Successful sync query: "VACUUM" [0 ms]
2018.12.06 09:37:16.591 *D* Local database opened successfully
2018.12.06 09:37:16.597 *D* [db.query           ] Successful sync query: "SELECT value FROM metadata WHERE attribute='AgentId'" [5 ms]
2018.12.06 09:37:16.598 *I* Agent ID is 81a5c36f-7ea0-4bab-adfd-3b0165b4b916
2018.12.06 09:37:16.603 *I* Local host name is "mam-gate.urezerv.local"
2018.12.06 09:37:16.605 *I* Using system name "mam-gate"
2018.12.06 09:37:16.607 *D* Thread pool COMM initialized (min=1, max=32)
2018.12.06 09:37:16.609 *D* Maximum number of sessions set to 32
2018.12.06 09:37:16.612 *E* Error loading subagent module "": Error loading shared library /usr/lib/netxms/: Is a directory
2018.12.06 09:37:17.615 *D* External parameters providers poller thread will not start
2018.12.06 09:37:17.617 *D* [db.query           ] Successful sync query: "SELECT server_id,dci_id,type,origin,name,polling_interval,last_poll,snmp_port,snmp_target_guid,snmp_raw_type FROM dc_config" [1 ms]
2018.12.06 09:37:17.618 *D* [db.query           ] Successful sync query: "SELECT guid,server_id,ip_address,snmp_version,port,auth_type,enc_type,auth_name,auth_pass,enc_pass FROM dc_snmp_targets" [1 ms]
2018.12.06 09:37:17.619 *D* [db.query           ] Successful sync query: "SELECT server_id,count(*) FROM dc_queue GROUP BY server_id" [0 ms]
2018.12.06 09:37:17.631 *D* Data collection scheduler thread started
2018.12.06 09:37:17.633 *D* Thread pool DATACOLL initialized (min=1, max=64)
2018.12.06 09:37:17.635 *D* Data sender thread started
2018.12.06 09:37:17.637 *D* Trap sender thread started
2018.12.06 09:37:17.639 *D* Database writer thread started
2018.12.06 09:37:17.640 *D* Data reconciliation thread started (block size 1024, timeout 15000 ms)
2018.12.06 09:37:17.643 *D* Session agent connector disabled
2018.12.06 09:37:17.646 *D* NamedPipeListener(nxagentd.push): waiting for connection
2018.12.06 09:37:17.648 *D* Trying to bind on 0.0.0.0:4700
2018.12.06 09:37:17.649 *D* Trying to bind on [::]:4700
2018.12.06 09:37:17.652 *I* Listening on socket 0.0.0.0:4700
2018.12.06 09:37:17.654 *I* Listening on socket [::]:4700
2018.12.06 09:37:17.655 *D* [tunnel             ] No tunnels configured, tunnel manager will not start
2018.12.06 09:37:18.647 *D* [db.query           ] {0x7547f0} Successful prepare: "SELECT value FROM registry WHERE attribute=?" [0 ms]
2018.12.06 09:37:18.648 *D* [db.query           ] {0x7547f0} bind at pos 1: "upgrade.file"
2018.12.06 09:37:18.649 *D* [db.query           ] Successful prepared sync query: "SELECT value FROM registry WHERE attribute=?" [1 ms]
2018.12.06 09:37:18.650 *D* [db.query           ] Successful sync query: "SELECT guid,type FROM agent_policy" [1 ms]
2018.12.06 09:37:18.650 *I* NetXMS Agent started
Agent running. Press Ctrl+C to shutdown.
2018.12.06 09:37:21.874 *D* Incoming connection from 10.10.1.13
2018.12.06 09:37:21.874 *D* Connection from 10.10.1.13 accepted
2018.12.06 09:37:21.875 *D* Session registered for 10.10.1.13
2018.12.06 09:37:21.878 *D* [CS-0(1)] Message dump:
  ** 000000: 00B60020000000100000000000000000 ... ............
  ** code=0x00B6 (CMD_GET_NXCP_CAPS) flags=0x0020 id=0 size=16 numFields=0

2018.12.06 09:37:21.879 *D* [CS-0(1)] Received control message CMD_GET_NXCP_CAPS
2018.12.06 09:37:21.881 *D* [CS-0(1)] Sending message CMD_NXCP_CAPS (ID 0; size 16; uncompressed)
2018.12.06 09:37:21.882 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 00B70020000000100000000004000000 ... ............
  ** code=0x00B7 (CMD_NXCP_CAPS) flags=0x0020 id=0 size=16 numFields=67108864
  ** message format error (pos > size - 8)

2018.12.06 09:37:21.967 *D* [CS-0(1)] Message dump:
  ** 000000: 00820000000001400000000100000002 .......@........
  ** 000010: 0000007A000000000000001B00000000 ...z............
  ** 000020: 0000009A040000000000010E3082010A ............0...
  ** 000030: 0282010100EAEC746F6FC60612E968FD .......too....h.
  ** 000040: CBDFD0DD3796EB1C06DC905DBEC462AD ....7......]..b.
  ** 000050: A848BE27049A5B72A0F5D3C6A4649674 .H.'..[r.....d.t
  ** 000060: 2DA388ACF92146579F4EA0718B4083C9 -....!FW.N.q.@..
  ** 000070: D5F7FA9A05B2C7E74EC3B142593BF3C6 ........N..BY;..
  ** 000080: 2EEF22AFD130A81382636FF5C03EF7FF .."..0...co..>..
  ** 000090: C4CCC046E56ECDD3889E548E6DF49253 ...F.n....T.m..S
  ** 0000A0: 2E5977C966C8E5599B117EB1EEB809D6 .Yw.f..Y..~.....
  ** 0000B0: EA0BE2C3C53BA7DC6583BDA1F5111D09 .....;..e.......
  ** 0000C0: 0F56163BD979ABA4893DBE649EA90F7D .V.;.y...=.d...}
  ** 0000D0: 4FECFE4E0E4C7EC64DB840AA0DAAC5CD O..N.L~.M.@.....
  ** 0000E0: 470C7DAC623814F1B1D38F696F85BC29 G.}.b8.....io..)
  ** 0000F0: F6326C93FB405E4369E6C271B7C2A6A0 .2l..@^Ci..q....
  ** 000100: 2726107D64465ABC7223C2687B986D12 '&.}dFZ.r#.h{.m.
  ** 000110: 53086CA7D89F4FD5D31436C594305E74 S.l...O...6..0^t
  ** 000120: 2DDCB2398FE6F12395FFD45F3005AB95 -..9...#..._0...
  ** 000130: 14B9E8AC7B0203010001000000000000 ....{...........
  ** code=0x0082 (CMD_REQUEST_SESSION_KEY) flags=0x0000 id=1 size=320 numFields=2
  ** 000010: [   122] INT32    27
  ** 000020: [   154] BINARY   len=270

2018.12.06 09:37:21.968 *D* [CS-0(1)] Received message CMD_REQUEST_SESSION_KEY (1)
2018.12.06 09:37:21.977 *D* [CS-0(1)] Sending message CMD_SESSION_KEY (ID 1; size 600; uncompressed)
2018.12.06 09:37:21.982 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 00840004000002580000000100000006 .......X........
  ** 000010: 0000001C000000000000000000000000 ................
  ** 000020: 0000009B0400000000000100C78D01CD ................
  ** 000030: 9B1013A52095D1F6BE335D1BED3A7FC4 .... ....3]..:..
  ** 000040: D0CD7D379E287F431C7063635C0D616F ..}7.(.C.pcc\.ao
  ** 000050: 7F8499D186C57477D7326F793F8D2D19 ......tw.2oy?.-.
  ** 000060: F3A2D8F470755D7E37F3D3C3E42215A5 ....pu]~7...."..
  ** 000070: 03235445BE17779F7A1E608044E8EB87 .#TE..w.z.`.D...
  ** 000080: 9BC60A6CE2FF426B7E41E91C5F8AC59B ...l..Bk~A.._...
  ** 000090: CBE4FB7B5D92AF6749C3EBCC5CBC6963 ...{]..gI...\.ic
  ** 0000A0: 3D1EF3B065F8E6BF7844D59C6EE175DD =...e...xD..n.u.
  ** 0000B0: A20C9BDCA43752EEF7D3B565CA0EE684 .....7R....e....
  ** 0000C0: EDF28CD3A13D2FB1D9402B169C1BC98B .....=/..@+.....
  ** 0000D0: 8DCE85B6F8F705B883581605FB5A2944 .........X...Z)D
  ** 0000E0: 103E303DB818CB30F9551942800F0202 .>0=...0.U.B....
  ** 0000F0: BFC38AABC3C4D27CBD9365DEC990AC1B .......|..e.....
  ** 000100: 396E52CBC4AD9C3EC106CAE3ABFDA864 9nR....>.......d
  ** 000110: ECB7F3DC206D6EDC42E4A71BD106A218 .... mn.B.......
  ** 000120: 23BED72FB25C02E221E3B1B800000000 #../.\..!.......
  ** 000130: 0000009D030000200000009E04000000 ....... ........
  ** 000140: 000001003409E18993C3E151900E3A88 ....4......Q..:.
  ** 000150: 3295ADBFE5D94A84F9DC0B3951277DAA 2.....J....9Q'}.
  ** 000160: 489A408E25FD51B9CAF88A5C43F2CA0C H.@.%.Q....\C...
  ** 000170: E3AC5EA00D89CCB3BA3652748D7B8FB1 ..^......6Rt.{..
  ** 000180: 31D3BF3DF9980764BD1B8603D9E0A958 1..=...d.......X
  ** 000190: 87FCC1EABB1D66D0662D1A195B48AB61 ......f.f-..[H.a
  ** 0001A0: 002AD4E754D3B088AC921660B1C276CB .*..T......`..v.
  ** 0001B0: D5AB2C2F8C55C7ED0DB5B8B16D0E2994 ..,/.U......m.).
  ** 0001C0: 405820F1B9AAD03A81A90CC5AA901884 @X ....:........
  ** 0001D0: 1895A0B5B7411C45594875E70DB9FC57 .....A.EYHu....W
  ** 0001E0: 594C6C67BD6020ED8444A7EA3160FD15 YLlg.` ..D..1`..
  ** 0001F0: 18CD01A9198866D534FFEF18FFA552FC ......f.4.....R.
  ** 000200: AC4168FC3CAE3691E9222DF4E3853C88 .Ah.<.6.."-...<.
  ** 000210: AB2833E83CFBE7F143627DAFB1F1D132 .(3.<...Cb}....2
  ** 000220: 442346F0C84E5048E1C57254C25C6E92 D#F..NPH..rT.\n.
  ** 000230: 2825925492B2B59091D072B5F7BDF7EA (%.T......r.....
  ** 000240: 7E2DC3B500000000000000EE03000010 ~-..............
  ** 000250: 0000009C03000000 ........
  ** code=0x0084 (CMD_SESSION_KEY) flags=0x0004 id=1 size=600 numFields=6
  ** 000010: [    28] INT32    0
  ** 000020: [   155] BINARY   len=256
  ** 000130: [   157] INT16    32
  ** 000138: [   158] BINARY   len=256
  ** 000248: [   238] INT16    16
  ** 000250: [   156] INT16    0

2018.12.06 09:37:22.002 *D* [CS-0(1)] Message dump:
  ** 000000: 01340000000000300000000200000004 .4.....0........
  ** 000010: 00000097030100010000021703010001 ................
  ** 000020: 00000218030100010000023A03010001 ...........:....
  ** code=0x0134 (CMD_SET_SERVER_CAPABILITIES) flags=0x0000 id=2 size=48 numFields=4
  ** 000010: [   151] INT16    1
  ** 000018: [   535] INT16    1
  ** 000020: [   536] INT16    1
  ** 000028: [   570] INT16    1

2018.12.06 09:37:22.003 *D* [CS-0(1)] Received message CMD_SET_SERVER_CAPABILITIES (2)
2018.12.06 09:37:22.004 *D* [CS-0(1)] Server capabilities: IPv6: yes; bulk reconciliation: yes; compression: yes
2018.12.06 09:37:22.004 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 2; size 32; uncompressed)
2018.12.06 09:37:22.005 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000200000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=2 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.011 *D* [CS-0(1)] Message dump:
  ** 000000: 01380000000000200000000300000001 .8..... ........
  ** 000010: 0000008E020000002D5D7BB3BD43E32F ........-]{..C./
  ** code=0x0138 (CMD_SET_SERVER_ID) flags=0x0000 id=3 size=32 numFields=1
  ** 000010: [   142] INT64    3268904916445553455

2018.12.06 09:37:22.011 *D* [CS-0(1)] Received message CMD_SET_SERVER_ID (3)
2018.12.06 09:37:22.012 *D* [CS-0(1)] Server ID set to 2D5D7BB3BD43E32F
2018.12.06 09:37:22.013 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 3; size 32; uncompressed)
2018.12.06 09:37:22.014 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000300000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=3 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.019 *D* [CS-0(1)] Message dump:
  ** 000000: 01380000000000200000000400000001 .8..... ........
  ** 000010: 0000008E020000002D5D7BB3BD43E32F ........-]{..C./
  ** code=0x0138 (CMD_SET_SERVER_ID) flags=0x0000 id=4 size=32 numFields=1
  ** 000010: [   142] INT64    3268904916445553455

2018.12.06 09:37:22.019 *D* [CS-0(1)] Received message CMD_SET_SERVER_ID (4)
2018.12.06 09:37:22.020 *D* [CS-0(1)] Server ID set to 2D5D7BB3BD43E32F
2018.12.06 09:37:22.021 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 4; size 32; uncompressed)
2018.12.06 09:37:22.022 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000400000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=4 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.034 *D* [CS-0(1)] Message dump:
  ** 000000: 01370000000000300000000600000002 .7.....0........
  ** 000010: 00000169000000000000000000000000 ...i............
  ** 000020: 000000B3000000000000000000000000 ................
  ** code=0x0137 (CMD_DATA_COLLECTION_CONFIG) flags=0x0000 id=6 size=48 numFields=2
  ** 000010: [   361] INT32    0
  ** 000020: [   179] INT32    0

2018.12.06 09:37:22.035 *D* [CS-0(1)] Received message CMD_DATA_COLLECTION_CONFIG (6)
2018.12.06 09:37:22.037 *D* 0 SNMP targets received from server 2D5D7BB3BD43E32F
2018.12.06 09:37:22.037 *D* 0 data collection elements received from server 2D5D7BB3BD43E32F
2018.12.06 09:37:22.038 *D* Data collection for server 2D5D7BB3BD43E32F reconfigured
2018.12.06 09:37:22.038 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 6; size 32; uncompressed)
2018.12.06 09:37:22.039 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000600000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=6 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.043 *D* [CS-0(1)] Message dump:
  ** 000000: 00BA0000000000100000000700000000 ................
  ** code=0x00BA (CMD_ENABLE_AGENT_TRAPS) flags=0x0000 id=7 size=16 numFields=0

2018.12.06 09:37:22.044 *D* [CS-0(1)] Received message CMD_ENABLE_AGENT_TRAPS (7)
2018.12.06 09:37:22.046 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 7; size 32; uncompressed)
2018.12.06 09:37:22.048 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000700000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=7 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.054 *D* [CS-0(1)] Message dump:
  ** 000000: 00030000000000100000000800000000 ................
  ** code=0x0003 (CMD_KEEPALIVE) flags=0x0000 id=8 size=16 numFields=0

2018.12.06 09:37:22.054 *D* [CS-0(1)] Received message CMD_KEEPALIVE (8)
2018.12.06 09:37:22.055 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 8; size 32; uncompressed)
2018.12.06 09:37:22.057 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000800000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=8 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.063 *D* [CS-0(1)] Message dump:
  ** 000000: 00410000000000580000000900000001 .A.....X........
  ** 000010: 000000550100000000000038004E0065 ...U.......8.N.e
  ** 000020: 0074002E0049006E0074006500720066 .t...I.n.t.e.r.f
  ** 000030: 006100630065002E00410064006D0069 .a.c.e...A.d.m.i
  ** 000040: 006E0053007400610074007500730028 .n.S.t.a.t.u.s.(
  ** 000050: 0031002900000000 .1.)....
  ** code=0x0041 (CMD_GET_PARAMETER) flags=0x0000 id=9 size=88 numFields=1
  ** 000010: [    85] STRING   "Net.Interface.AdminStatus(1)"

2018.12.06 09:37:22.063 *D* [CS-0(1)] Received message CMD_GET_PARAMETER (9)
2018.12.06 09:37:22.064 *D* [CS-0(1)] Requesting parameter "Net.Interface.AdminStatus(1)"
2018.12.06 09:37:22.066 *D* [CS-0(1)] GetParameterValue(): result is 404 (UNKNOWN_PARAMETER)
2018.12.06 09:37:22.069 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 9; size 32; uncompressed)
2018.12.06 09:37:22.070 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000900000001 ....... ........
  ** 000010: 0000001C000000000000019400000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=9 size=32 numFields=1
  ** 000010: [    28] INT32    404

2018.12.06 09:37:22.087 *D* [CS-0(1)] Message dump:
  ** 000000: 00030000000000100000000A00000000 ................
  ** code=0x0003 (CMD_KEEPALIVE) flags=0x0000 id=10 size=16 numFields=0

2018.12.06 09:37:22.087 *D* [CS-0(1)] Received message CMD_KEEPALIVE (10)
2018.12.06 09:37:22.088 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 10; size 32; uncompressed)
2018.12.06 09:37:22.089 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000A00000001 ....... ........
  ** 000010: 0000001C000000000000000000000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=10 size=32 numFields=1
  ** 000010: [    28] INT32    0

2018.12.06 09:37:22.095 *D* [CS-0(1)] Message dump:
  ** 000000: 00410000000000380000000B00000001 .A.....8........
  ** 000010: 00000055010000000000001A00530079 ...U.........S.y
  ** 000020: 007300740065006D002E005500700074 .s.t.e.m...U.p.t
  ** 000030: 0069006D00650000 .i.m.e..
  ** code=0x0041 (CMD_GET_PARAMETER) flags=0x0000 id=11 size=56 numFields=1
  ** 000010: [    85] STRING   "System.Uptime"

2018.12.06 09:37:22.095 *D* [CS-0(1)] Received message CMD_GET_PARAMETER (11)
2018.12.06 09:37:22.096 *D* [CS-0(1)] Requesting parameter "System.Uptime"
2018.12.06 09:37:22.097 *D* [CS-0(1)] GetParameterValue(): result is 404 (UNKNOWN_PARAMETER)
2018.12.06 09:37:22.098 *D* [CS-0(1)] Sending message CMD_REQUEST_COMPLETED (ID 11; size 32; uncompressed)
2018.12.06 09:37:22.099 *D* [CS-0(1)] Outgoing message dump:
  ** 000000: 001D0000000000200000000B00000001 ....... ........
  ** 000010: 0000001C000000000000019400000000 ................
  ** code=0x001D (CMD_REQUEST_COMPLETED) flags=0x0000 id=11 size=32 numFields=1
  ** 000010: [    28] INT32    404



tcpdump говорит что с сетью проблем нет.

агент версии
NetXMS Core Agent Version 2.2.7 Build 9513 (reboot-8507-ga0d5acfbe2) (NON-UNICODE)
сервер версии 2.2.10
что делаю не так? куда смотреть?

wizarom

Отвечу сам себе, может кому то еще поможет.
Несколько лет на openwrt использовалась версия агента 1.2.11, возможностей которой хватало с лихвой. Решил, раз агент версии 2.2.7 только делает вид, что работает (агент запускается, даже что то шлет под дебагом) собрать ту же версию 1.2.11. собрал, работает, интерфейсы видит, сеть за агентом мониторит. собирал для mips_24kc

Victor Kirhenshtein

Проблема возможно связана с проблемой неработоспособности не UNICODE сборок, поскольку как я помню для OpenWRT собирается без UNICODE. У нас к сожалению нет никого кто разбирался бы нормально в OpenWRT сборках, поэтому функционал полуживой.