[PACTH] NRPE IPv6 (updated)

Leo Baltus Leo.Baltus at omroep.nl
Mon Sep 24 09:23:47 CEST 2012


Op 21/09/2012 om 19:17:45 +0200, schreef Andreas Ericsson:
> On 09/21/2012 02:32 PM, Leo Baltus wrote:
> > Op 02/04/2012 om 11:10:09 +0200, schreef Leo Baltus:
> >> Attached patch fixes a small memory leak introduced by my IPv6 patch I
> >> sent earlier, see below.
> >>
> >> As I haven't got any reponse on my first post so I'll just resubmit the
> >> complete patch.
> >>
> > 
> > Can somebody comment on my 2 patches I sent april 2nd?
> > 
> 
> I'm not the NRPE maintainer, but for what it's worth, I like them.
> 

Buts who is? And how can we persuade him/her to join this discussion?

> > It would be really nice if it could get merged before Nagios4 is
> > released.
> > 
> 
> While I tentatively agree with that, there's no real reason to take
> patches to NRPE before Nagios 4, as the two have no code dependencies
> between them.
> 
> > If there is some work to be done on it, I might have some spare time do
> > that, but please let me know what should be done.
> > 
> 
> On Nagios 4? Testing would be helpful. If you're in an asskicking
> mood, you could go ahead and add an "accept new worker" handler
> for the query-handler so external programs can register with Nagios
> and request to run certain plugins.
> 
> check_nrpe would be one of the prime candidates for such persistent
> workers, along with a generic do-all "check interface things over
> snmp" thing. Don't go and write a ton of code for that snmp interface
> thing though. I've got 99% of that done already ;)
> 

-- 
Leo Baltus, internetbeheerder                         /\
NPO ICT Internet Services                            /NPO/\
Sumatralaan 45, 1217 GP Hilversum, Filmcentrum, west \  /\/
beheer at omroep.nl, 035-6773555                         \/

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/




More information about the Developers mailing list