articleResolving uptimeagent Daemon Messages

Related Documentation Version of up.time Affected Affected Platforms
All Linux, UNIX

This article describes how to address the condition that causes a large number of messages, similar to those shown below, to appear in Linux or UNIX log files.

 
Jan 28 16:50:24 agent-host inetd[259]: [ID 317013 daemon.notice] uptimeagent[7325] from 165.4.9.253 53672
Jan 28 16:50:28 agent-host inetd[259]: [ID 317013 daemon.notice] uptimeagent[7676] from 165.4.9.253 53707
Jan 28 16:50:31 agent-host inetd[259]: [ID 317013 daemon.notice] uptimeagent[7870] from 165.4.9.253 53732

Details

These errors appear because the syslog tool on the agent system has been configured to log daemon.notice messages. This level of logging registers every connection to the agent system (i.e. the messages are logged each time the monitoring station polls the agent). For example, with a five-minute polling frequency, a message will appear in the log file every five minutes.

Workaround

Prevent the system from logging at this level of detail by choosing one of the following options:

  • Edit the /etc/syslog.conf file to disable the daemon.notice messages.
  • Edit the /etc/xinetd.d/uptimeagent file to change the logging level to a less verbose option than the level specified in the /etc/syslog.conf file. For example, specify the following in the /etc/xinetd.d/uptimeagent file:
    log_type = SYSLOG authpriv emerg
    

    This option will only log emerg messages to the log file instead of the option set in the /etc/syslog.conf file.

  • Use a more flexible syslog tool (such as syslog-ng) that can be configured to filter out specific messages.
  • On Solaris 10 systems, the uptimeagent SMF may need to be updated. Verify if tcp_trace is set to TRUE by running the following command: inetadm -l network/uptimeagent/tcp. If the tcp_trace value is set to TRUE, set it to false with the following command: inetadm -m network/uptimeagent/tcp tcp_trace=FALSE.

Related Articles


Linux agent daemon IP security

RatingViews
article

The up.time Linux agent has a built in daemon option to allow users to run the up.time agent without (x)inetd installed on their server. The daemon allows access to be restricted to a specific...

By: uptime Support | Date Created: 10-10-2009 | Last Modified: 8-10-2011 | Index: 404

  2066

Agent does not start in daemon mode on SLES

RatingViews
article

Review this solution if you run the up.time Linux agent in Daemon mode on a SUSE platform, followed the instructions below  to add the 2 links and observe that the up.time agent does not start up...

By: uptime Support | Date Created: 1-17-2012 | Last Modified: 3-7-2013 | Index: 574

  2634

up.time agent daemon error: permission denied

RatingViews
article

Symptoms - Agent not returning data, not able to be added to up.time - Log messages in /var/adm/messages or /var/log/messages Oct 30 10:48:07 hostname inetd[6402]: [ID 388736 daemon.error] execv...

By: uptime Support | Date Created: 12-31-1969 | Last Modified: 9-9-2011 | Index: 234

  3320

/var/adm/messages kernel: cdrom: open failed

RatingViews
article

On some agent server configurations these types of log messages may appear whenever the up.time monitoring station attempts to contact the agent Jun 25 19:19:20 server1 kernel: cdrom: open...

By: uptime Support | Date Created: 12-31-1969 | Last Modified: 8-31-2011 | Index: 307

  4777

/var/adm/messages: inetd uptmagnt connection warnings

RatingViews
article

On some UNIX or Linux servers you may notice repeated messages like the ones below in your messages log once you start monitoring the server with up.time. Jul 2 14:43:27 hostname inetd[486]:...

By: uptime Support | Date Created: 12-31-1969 | Last Modified: 8-31-2011 | Index: 308

  3276

User Comments



No comments have been posted.

Copyright © 2021 IDERA, Inc.   Legal   Privacy Statement