Icinga2-Server issueshttps://git.bingo-ev.de/infrastructure/Monitoring/icinga2-server/-/issues2023-11-08T22:18:23Zhttps://git.bingo-ev.de/infrastructure/Monitoring/icinga2-server/-/issues/6check_ssl kaputt, braucht Workaround2023-11-08T22:18:23ZCitronalcocheck_ssl kaputt, braucht Workaroundsiehe https://github.com/Icinga/icinga2/pull/9758
Betrifft u.U. auch Checks per NRPE
Hab das hier eingebaut (aber nicht in Ansible)
```
--- /usr/share/icinga2/include/plugins-contrib.d/web.conf.ori 2023-11-08 23:02:11.332607583 +0100...siehe https://github.com/Icinga/icinga2/pull/9758
Betrifft u.U. auch Checks per NRPE
Hab das hier eingebaut (aber nicht in Ansible)
```
--- /usr/share/icinga2/include/plugins-contrib.d/web.conf.ori 2023-11-08 23:02:11.332607583 +0100
+++ /usr/share/icinga2/include/plugins-contrib.d/web.conf 2023-11-08 23:16:51.005847062 +0100
@@ -392,13 +392,9 @@
value = "$ssl_cert_critical$"
description = "Minimum number of days a certificate has to be valid to issue a critical status"
}
- "-n" = {
+ "--match" = {
value = "$ssl_cert_cn$"
- description = "Pattern to match the CN of the certificate"
- }
- "--altnames" = {
- set_if = "$ssl_cert_altnames$"
- description = "Matches the pattern specified in -n with alternate"
+ description = "Pattern to match the CN or AltNames of the certificate"
}
"-i" = {
value = "$ssl_cert_issuer$"
@@ -563,6 +559,7 @@
vars.ssl_cert_address = "$check_address$"
vars.ssl_cert_port = 443
+ vars.ssl_cert_cn = "$ssl_cert_altnames$"
}
object CheckCommand "varnish" {
```CitronalcoCitronalco