Changeset 1847
- Timestamp:
- 04/03/12 16:23:39 (12 years ago)
- Location:
- monitoring/plugins/ids
- Files:
-
- 1 added
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
monitoring/plugins/ids/README.txt
r1830 r1847 1 Name: 2 check_shib_idp - checks status of Shibboleth identitiy provider 3 Requirements: 4 Perl-Modules: LWP, Date::Parse, Crypt::OpenSSL::X509 5 6 NB: Shibboleth-IDP needs to have an appropiate ACL in Status handler for 7 monitoring host (see Shibboleth documentation) 8 Arguments: 9 -H host, mandatory 10 -u url, default: idp/status 11 -t timeout, default 10 seconds 12 -S use https 13 -D maximum clock skew, default 120 14 -C certificate expiry in days, will warn, if cert expires in less 15 16 17 18 1 19 Name: 2 20 check_shib_sp - checks status of Shibboleth service provider 3 21 Requirements: 4 22 Perl-Modules: LWP, XML::Parser, Date::Parse, Crypt::OpenSSL::X509 5 Shibboleth-IDP needs to put appropiate ACL in Status handler for6 monitoring host7 23 24 NB: Shibboleth-SP needs to have an appropiate ACL in Status handler for 25 monitoring host (see Shibbolteh documentation) 8 26 Arguments: 9 27 -H host, mandatory -
monitoring/plugins/ids/check_shib_sp
r1830 r1847 1 1 #!/usr/bin/perl 2 2 # 3 # check_shib_sp, version 2012-0 3-283 # check_shib_sp, version 2012-04-03 4 4 # 5 5 … … 139 139 my $message = shift; 140 140 141 $message =~ s/\n*$//; 141 142 printf("%s: %s\n", $CODE2STRING->{$code}, $message); 142 143 exit $code; … … 234 235 if ($cert->checkend(0)) { 235 236 status(CRITICAL, 236 sprintf('%s certificate is expired ',237 $key->{'use'}, $cert-> subject()));237 sprintf('%s certificate is expired since %s', 238 $key->{'use'}, $cert->notAfter())); 238 239 } 239 240 elsif ($cert->checkend($cert_warn_days * 86400)) {
Note: See TracChangeset
for help on using the changeset viewer.