Monitor Puppet agent state

This script looks if there is a puppet agent process and then it checks the
last state summary file and checks when puppet agent last run the catalog.

The plugin should be run by NRPE (or similar software) and reports ok. warn or
crit back.

Please note that the user executing this command (normally nagios or icinga)
should either have an entry in /etc/sudoers like the following one:
nagios ALL=NOPASSWD:/usr/bin/puppet,/usr/lib/nagios/plugins/check_puppet_agent,/bin/kill
or the plugin script itself should be run as root (permissions 4755).

Furthermore this plugin checks some fail counters and warn about them if any of
them is greater than 0.

Source Files
Filename Size Changed Actions
check_puppet_agent 0000007390 7.22 KB about 6 years
check_puppet_agent-use_sudo_for_awk.patch 0000001549 1.51 KB about 6 years
monitoring-plugins-puppet_agent-rpmlintrc 0000000000 0 Bytes almost 6 years
monitoring-plugins-puppet_agent-sudoers 0000000102 102 Bytes almost 6 years
monitoring-plugins-puppet_agent.changes 0000001549 1.51 KB almost 6 years
monitoring-plugins-puppet_agent.spec 0000002692 2.63 KB almost 6 years
Comments for monitoring-plugins-puppet_agent 0