On 02.11.2013 19:54, Joseph L. Casale wrote: >> that was fixed while debugging https://dev.icinga.org/issues/4953 - >> weird though as this wrong typecast has been there for ages now. >> https://git.icinga.org/?p=icinga- >> core.git;a=commit;h=32831fd4509193292ea6ffab094b6a0a6a1bf8cb >> >> please test it, so that we may release 1.10.1 soon enough then. > Hi Michael, > Thanks for the pointer, I just rebuilt packages off that commit and it works.
thanks, David told me the same. > > Seems the icinga-web access.xml cmd-pipe location is out of sync with what > is in the default cfg, setting those two values to the same did not resolve > the > inability to send a command. that was way out of context for my mind - which location is set where (examples)? on rhel, the cmdpipe location is set to %{_localstatedir}/spool/icinga/cmd/icinga.cmd in both packages. maybe you've got a config leftover at your installation. > > This is on CentOS x64 6.4 with packages built from the spec within the source. > > Thanks! > jlc > > ------------------------------------------------------------------------------ > Android is increasing in popularity, but the open development platform that > developers love is also attractive to malware creators. Download this white > paper to learn more about secure code signing practices that can help keep > Android apps secure. > http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk > _______________________________________________ > icinga-users mailing list > icinga-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/icinga-users -- DI (FH) Michael Friedrich mail: michael.friedr...@gmail.com twitter: https://twitter.com/dnsmichi jabber: dnsmi...@jabber.ccc.de irc: irc.freenode.net/icinga dnsmichi icinga open source monitoring position: lead core developer url: https://www.icinga.org ------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk _______________________________________________ icinga-users mailing list icinga-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/icinga-users