Home
last modified time | relevance | path

Searched refs:NSCA (Results 1 – 25 of 160) sorted by relevance

1234567

/dports/net-mgmt/p5-Net-NSCA-Client/Net-NSCA-Client-0.009002/
H A DMETA.yml22 name: Net-NSCA-Client
29 Net::NSCA::Client:
30 file: lib/Net/NSCA/Client.pm
32 Net::NSCA::Client::Connection:
35 Net::NSCA::Client::Connection::TLS:
38 Net::NSCA::Client::DataPacket:
41 Net::NSCA::Client::InitialPacket:
44 Net::NSCA::Client::Library:
47 Net::NSCA::Client::ServerConfig:
50 Net::NSCA::Client::Utils:
[all …]
H A DMANIFEST3 lib/Net/NSCA/Client.pm
4 lib/Net/NSCA/Client/Connection.pm
5 lib/Net/NSCA/Client/Connection/TLS.pm
6 lib/Net/NSCA/Client/DataPacket.pm
7 lib/Net/NSCA/Client/InitialPacket.pm
8 lib/Net/NSCA/Client/Library.pm
9 lib/Net/NSCA/Client/ServerConfig.pm
10 lib/Net/NSCA/Client/Troubleshooting.pod
11 lib/Net/NSCA/Client/Utils.pm
21 t/tests/MyTest/Net/NSCA/Client.pm
[all …]
H A DSIGNATURE24 SHA1 8029b3cc8e61c11074e14b7107564311e13ce75a lib/Net/NSCA/Client.pm
25 SHA1 8bcfd32c5d953e4fb884835b2a6a46cb58e0840d lib/Net/NSCA/Client/Connection.pm
26 SHA1 b788771cf65638e5065bf47bb9519eb7a32b67b9 lib/Net/NSCA/Client/Connection/TLS.pm
27 SHA1 344b8cc57d92d13b2746b0ad7fc75db13a86d3bd lib/Net/NSCA/Client/DataPacket.pm
28 SHA1 b822a4a897cc8e2e25541e089aeabff7e1904a9e lib/Net/NSCA/Client/InitialPacket.pm
29 SHA1 e21d75cd25cc6ddd56c7a38e005893472764efcb lib/Net/NSCA/Client/Library.pm
30 SHA1 9f839cf570d2b2423e5ba19824e83ee008a255e4 lib/Net/NSCA/Client/ServerConfig.pm
31 SHA1 c14222122c1df3eb538fbc64a4c604b6711a855d lib/Net/NSCA/Client/Troubleshooting.pod
32 SHA1 14730c6e211fdb318506d6aef69a15414eb42698 lib/Net/NSCA/Client/Utils.pm
37 SHA1 6e94cf782c305b07587d9238d0624f23c5c60ac3 t/tests/MyTest/Net/NSCA/Client.pm
[all …]
H A DChanges1 Revision history for Perl 5 distribution Net-NSCA-Client
38 - Allow communicating with NSCA servers that have been custom-compiled
42 standard NSCA client/server does.
69 that comes with the NSCA package.
79 Net::NSCA::Client::InitialPacket.
82 - The initialization_vector attribute in Net::NSCA::Client::InitialPacket
87 - Creating a Net::NSCA::Client::InitialPacket without an IV would cause an
91 - Added SEE ALSO section in Net::NSCA::Client.
92 - Fixed documentation in Net::NSCA::Client::DataPacket to specify all
H A DREADME1 Net-NSCA-Client 0.009002
26 perldoc Net::NSCA::Client
30 * [RT, CPAN's request tracker](http://rt.cpan.org/NoAuth/Bugs.html?Dist=Net-NSCA-Client)
32 * [CPAN Ratings](http://cpanratings.perl.org/d/Net-NSCA-Client)
34 * [Search CPAN](http://search.cpan.org/dist/Net-NSCA-Client)
/dports/net-mgmt/p5-Net-NSCA-Client/Net-NSCA-Client-0.009002/t/
H A Dlive_server.t11 use Net::NSCA::Client ();
12 use Net::NSCA::Client::Connection::TLS ();
13 use Net::NSCA::Client::InitialPacket ();
23 my $client = Net::NSCA::Client->new(
34 status => $Net::NSCA::Client::STATUS_OK,
93 status => $Net::NSCA::Client::STATUS_OK,
150 my $client = Net::NSCA::Client->new(%args,
187 my $client = Net::NSCA::Client->new(%args);
235 my $client = Net::NSCA::Client->new(%args,
262 my $client = Net::NSCA::Client->new(%args);
[all …]
/dports/net-mgmt/nsca-ng/nsca-ng-1.6/
H A DREADME.md1 Welcome to NSCA-ng!
4 The NSCA-ng package provides a client-server pair which makes the "Nagios
9 NSCA-ng supports TLS encryption and shared-secret authentication with
27 order to embed a private copy of libConfuse into NSCA-ng, the
33 libev is embedded into NSCA-ng, so this dependency is optional.
44 NSCA-ng's source directory should do the trick:
64 Don't build and install the NSCA-ng client.
88 NSCA-ng. In order to force usage of the included copy,
114 this package) could be used to start and stop the NSCA-ng server.
122 NSCA Compatibility
[all …]
H A DREADME1 Welcome to NSCA-ng!
4 The NSCA-ng package provides a client-server pair which makes the "Nagios
9 NSCA-ng supports TLS encryption and shared-secret authentication with
27 order to embed a private copy of libConfuse into NSCA-ng, the
33 libev is embedded into NSCA-ng, so this dependency is optional.
44 NSCA-ng's source directory should do the trick:
64 Don't build and install the NSCA-ng client.
88 NSCA-ng. In order to force usage of the included copy,
114 this package) could be used to start and stop the NSCA-ng server.
122 NSCA Compatibility
[all …]
/dports/net-mgmt/nsca-ng-client/nsca-ng-1.6/
H A DREADME.md1 Welcome to NSCA-ng!
4 The NSCA-ng package provides a client-server pair which makes the "Nagios
9 NSCA-ng supports TLS encryption and shared-secret authentication with
27 order to embed a private copy of libConfuse into NSCA-ng, the
33 libev is embedded into NSCA-ng, so this dependency is optional.
44 NSCA-ng's source directory should do the trick:
64 Don't build and install the NSCA-ng client.
88 NSCA-ng. In order to force usage of the included copy,
114 this package) could be used to start and stop the NSCA-ng server.
122 NSCA Compatibility
[all …]
H A DREADME1 Welcome to NSCA-ng!
4 The NSCA-ng package provides a client-server pair which makes the "Nagios
9 NSCA-ng supports TLS encryption and shared-secret authentication with
27 order to embed a private copy of libConfuse into NSCA-ng, the
33 libev is embedded into NSCA-ng, so this dependency is optional.
44 NSCA-ng's source directory should do the trick:
64 Don't build and install the NSCA-ng client.
88 NSCA-ng. In order to force usage of the included copy,
114 this package) could be used to start and stop the NSCA-ng server.
122 NSCA Compatibility
[all …]
H A DPROTOCOL1 The NSCA-ng Protocol, Version 1
7 This is an informal description of the NSCA-ng Protocol, Version 1, used for
8 transmitting "monitoring commands" from NSCA-ng clients to NSCA-ng servers.
17 The NSCA-ng server listens on TCP port 5668. As soon as an NSCA-ng client
25 first NSCA-ng request. All NSCA-ng data MUST be transmitted as TLS
28 NSCA-ng Session
44 An NSCA-ng session is a sequence of one or more request-response pairs and
84 If a `MOIN` request is sent, it MUST be the first request of an NSCA-ng
101 If a `PING` request is sent, it MUST be the first request of an NSCA-ng
131 `PUSH` request. The client MAY issue multiple `PUSH` requests per NSCA-ng
[all …]
/dports/net-mgmt/p5-Net-NSCA-Client/Net-NSCA-Client-0.009002/lib/Net/NSCA/
H A DClient.pm1 package Net::NSCA::Client;
19 use Net::NSCA::Client::Library 0.009 qw(Bytes Hostname PortNumber Timeout);
24 use Net::NSCA::Client::Connection;
25 use Net::NSCA::Client::Connection::TLS;
26 use Net::NSCA::Client::DataPacket;
27 use Net::NSCA::Client::ServerConfig ();
75 default => sub { Net::NSCA::Client::ServerConfig->new },
109 my $tls = Net::NSCA::Client::Connection::TLS->new(@tls_args);
116 my $connection = Net::NSCA::Client::Connection->new(@connection_args);
119 my $data_packet = Net::NSCA::Client::DataPacket->new(
/dports/net-mgmt/p5-Net-NSCA-Client/Net-NSCA-Client-0.009002/lib/Net/NSCA/Client/
H A DTroubleshooting.pod3 Net::NSCA::Client::Troubleshooting - Troubleshooting information
9 When a packet is sent to the NSCA server and the following errror appears
14 This can be cause by a number of reasons, as NSCA provides this as a
30 =head3 NSCA server compiled using custom constants
32 It is possible that the NSCA server was compiled with the constants
34 NSCA, you will need to setup the client to use the same constant values.
35 See L<Net::NSCA::Client::ServerConfig|Net::NSCA::Client::ServerConfig> on
42 this would occur is if the NSCA's data packet constants where changed and
43 the client needs L<Net::NSCA::Client::ServerConfig|Net::NSCA::Client::ServerConfig>
54 The time stamp that is sent with the data packet is checked on the NSCA
H A DConnection.pm1 package Net::NSCA::Client::Connection;
19 use Net::NSCA::Client::Library qw(Hostname PortNumber Timeout);
26 use Net::NSCA::Client::InitialPacket;
27 use Net::NSCA::Client::ServerConfig ();
64 default => sub { Net::NSCA::Client::ServerConfig->new },
160 my $initial_packet = Net::NSCA::Client::InitialPacket->new(
H A DInitialPacket.pm1 package Net::NSCA::Client::InitialPacket;
19 use Net::NSCA::Client::Library 0.009 qw(Bytes);
24 use Net::NSCA::Client::ServerConfig ();
25 use Net::NSCA::Client::Utils qw(initialize_moose_attr_early);
58 default => sub { Net::NSCA::Client::ServerConfig->new },
/dports/net-mgmt/nsca27-client/nsca-2.7.2/sample-config/
H A Dnsca.cfg.in2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca27/nsca-2.7.2/nsca_tests/
H A Dnsca_basic.cfg2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca27/nsca-2.7.2/sample-config/
H A Dnsca.cfg.in2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca27-client/nsca-2.7.2/nsca_tests/
H A Dnsca_basic.cfg2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca-client/nsca-2.9.2/nsca_tests/
H A Dnsca_basic.cfg2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca/nsca-2.9.2/nsca_tests/
H A Dnsca_basic.cfg2 # Sample NSCA Daemon Config File
10 # The name of the file in which the NSCA daemon should write it's process ID
11 # number. The file is only written if the NSCA daemon is started by the root
27 # Address that NSCA has to bind to in case there are
28 # more as one interface and we do not want NSCA to bind
35 # NSCA USER
36 # This determines the effective user that the NSCA daemon should run as.
39 # NOTE: This option is ignored if NSCA is running under either inetd or xinetd
45 # NSCA GROUP
46 # This determines the effective group that the NSCA daemon should run as.
[all …]
/dports/net-mgmt/nsca27/nsca-2.7.2/
H A DSECURITY2 NSCA SECURITY README
8 Before you proceed with installing the NSCA daemon daemon on your
13 users could potentionally use the NSCA client to send fake service
14 and host check results to the NSCA daemon (and thus Nagios). This
42 to the NSCA daemon.
67 2) The NSCA client stuff the check results into a packet (or
70 3) The NSCA client computes the CRC-32 value of the packet
83 5) The NSCA daemon recieves the packet and decrypts it using
136 NSCA daemon receives is "valid" data - i.e., it was
142 To help prevent this, the NSCA daemon generates what is
[all …]
/dports/net-mgmt/nsca/nsca-2.9.2/
H A DSECURITY2 NSCA SECURITY README
8 Before you proceed with installing the NSCA daemon daemon on your
13 users could potentionally use the NSCA client to send fake service
14 and host check results to the NSCA daemon (and thus Nagios). This
42 to the NSCA daemon.
67 2) The NSCA client stuff the check results into a packet (or
70 3) The NSCA client computes the CRC-32 value of the packet
83 5) The NSCA daemon recieves the packet and decrypts it using
136 NSCA daemon receives is "valid" data - i.e., it was
142 To help prevent this, the NSCA daemon generates what is
[all …]
/dports/net-mgmt/nsca27-client/nsca-2.7.2/
H A DSECURITY2 NSCA SECURITY README
8 Before you proceed with installing the NSCA daemon daemon on your
13 users could potentionally use the NSCA client to send fake service
14 and host check results to the NSCA daemon (and thus Nagios). This
42 to the NSCA daemon.
67 2) The NSCA client stuff the check results into a packet (or
70 3) The NSCA client computes the CRC-32 value of the packet
83 5) The NSCA daemon recieves the packet and decrypts it using
136 NSCA daemon receives is "valid" data - i.e., it was
142 To help prevent this, the NSCA daemon generates what is
[all …]
/dports/net-mgmt/nsca-client/nsca-2.9.2/
H A DSECURITY2 NSCA SECURITY README
8 Before you proceed with installing the NSCA daemon daemon on your
13 users could potentionally use the NSCA client to send fake service
14 and host check results to the NSCA daemon (and thus Nagios). This
42 to the NSCA daemon.
67 2) The NSCA client stuff the check results into a packet (or
70 3) The NSCA client computes the CRC-32 value of the packet
83 5) The NSCA daemon recieves the packet and decrypts it using
136 NSCA daemon receives is "valid" data - i.e., it was
142 To help prevent this, the NSCA daemon generates what is
[all …]

1234567