Your message dated Sun, 31 Oct 2021 12:34:11 +0000
with message-id <e1mha2n-0008kx...@fasolo.debian.org>
and subject line Bug#994435: fixed in nsca 2.10.1-1
has caused the Debian Bug report #994435,
regarding nsca-client: send_nsca client not working on bullseye
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
994435: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994435
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nsca-client
Version: 2.10.0-1
Severity: important

Dear Maintainer,

The send-nsca client in bullseye is not working for me.

Here is the command I use:

echo -n 'shared-web-test;my-api-cert;2;CRITICAL - certificate expired' | 
/usr/sbin/send_nsca -d ';' -H nagios01.example.com -to 5

On BUSTER this command returns:

1 data packet(s) sent to host successfully.

Furthermore, the passive alert shows up on the nagios server.

However, on BULLSEYE the above command returns:

0 data packet(s) sent to host successfully.

Doing a tcpdump on the Nagios server nagios01.example.com I do see network
traffic when running the command on the BULLSEYE host, but the alert does
not register.

The nagios01.example.com server is running Nagios 4.4.6.


-- System Information:
Debian Release: 11.0
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/1 CPU thread)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/bash
Init: systemd (via /run/systemd/system)

Versions of packages nsca-client depends on:
ii  libc6       2.31-13
ii  libmcrypt4  2.5.8-3.4+b1

nsca-client recommends no packages.

nsca-client suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: nsca
Source-Version: 2.10.1-1
Done: Bas Couwenberg <sebas...@debian.org>

We believe that the bug you reported is fixed in the latest version of
nsca, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 994...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bas Couwenberg <sebas...@debian.org> (supplier of updated nsca package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 31 Oct 2021 13:15:16 +0100
Source: nsca
Architecture: source
Version: 2.10.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Nagios Maintainer Group 
<pkg-nagios-de...@lists.alioth.debian.org>
Changed-By: Bas Couwenberg <sebas...@debian.org>
Closes: 994435
Changes:
 nsca (2.10.1-1) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Bas Couwenberg ]
   * New upstream release.
     (closes: #994435)
   * Bump watch file version to 4.
   * Bump Standards-Version to 4.6.0, no changes.
   * Update watch file for GitHub URL changes.
   * Bump debhelper compat to 12, no changes.
   * Add ${misc:Pre-Depends} substvar to nsca.
   * Update lintian overrides.
 .
   [ Debian Janitor ]
   * Remove constraints unnecessary since buster:
     + nsca-client: Drop versioned constraint on nsca in Replaces.
     + nsca-client: Drop versioned constraint on nsca in Breaks.
Checksums-Sha1:
 18a72ed26bf41d29670fe92d5df316e33e3c314a 1978 nsca_2.10.1-1.dsc
 d497dd17e7cca48b71472a9dd0bf9fe7590c88f2 126457 nsca_2.10.1.orig.tar.gz
 140e92de50218bf7fe759111f2a08b2337d5853b 18716 nsca_2.10.1-1.debian.tar.xz
 f72942aa3dadf5e0c26af4c7bf24973dc7709d0b 7507 nsca_2.10.1-1_amd64.buildinfo
Checksums-Sha256:
 e3dcf06a6fa05cee0244c6f8fb557c0c720b44575b49354386a9e61492de71ef 1978 
nsca_2.10.1-1.dsc
 42bd616e0f52e35553756d31867e33e7359aba6962addbc454eefa3feac37d66 126457 
nsca_2.10.1.orig.tar.gz
 1fb0a75252e4332b9af8192abaed119923ade84cb37765ee6657146270260124 18716 
nsca_2.10.1-1.debian.tar.xz
 e92cf2a2a6895fe264c44b0a5ca23e191d18de94caa2de660d01fd306f43c118 7507 
nsca_2.10.1-1_amd64.buildinfo
Files:
 005b3b8f47cc8bdc89f0fd476406542b 1978 net optional nsca_2.10.1-1.dsc
 a621c2bc1d18fa41c67be58054765100 126457 net optional nsca_2.10.1.orig.tar.gz
 15b5e45e36534c626e17aff82f444a36 18716 net optional nsca_2.10.1-1.debian.tar.xz
 1b24bea044fc24c33eb9f8da51d82715 7507 net optional 
nsca_2.10.1-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=JHIR
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to