so i have a domain admin user called 'services', which i've had for a long time 
for such things.

on the machine i'm trying to monitor (and i guess when this works properly, it 
can retrieve the data for other domain machines - that zenwin stuff only needs 
to be on one domain member server) i also created a local administrator account 
with the same name and pw (from some tips page)

so this local user is the user the service uses, and it has service rights and 
the services can start properly.

in the Class-level zProps i set the zenwin user/pass as .\services and the 
password.

in the Device-level zProps i set them to blank, because apparently WMI service 
must use no user-pass when connecting to WMI on itself.

DCOM seems to be set properly, and WMI services running and so on.

i can run wbemtest.exe, seems to work but no documentation explains how to test 
it - i can connect to local root\default namespace and Enum classes and such.

if i run zeneventlog.py manually, it seems to work.



Code:

C:\zenwin-1.1.1>zeneventlog.py -C etc\zeneventlog.cfg
INFO:zen.SendEvent:SendEvent thread started.
INFO:zen.zeneventlog:reloading configuration
INFO:zen.zeneventlog:Com InterfaceCount: 9
INFO:zen.zeneventlog:Com GatewayCount: 0
INFO:zen.zeneventlog:tested 1 devices in 0.02 seconds
INFO:zen.zeneventlog:stopping...
INFO:zen.SendEvent:SendEvent thread ended.




if i run zenwin.py, wmi error...

Code:

C:\zenwin-1.1.1>zenwin.py -C etc\zenwin.cfg
INFO:zen.SendEvent:SendEvent thread started.
INFO:zen.zenwin:reloading configuration
WARNING:zen.zenwin:skipping FMXAUX4 no wmi connection
INFO:zen.zenwin:Com InterfaceCount: 6
INFO:zen.zenwin:Com GatewayCount: 0
INFO:zen.zenwin:tested 1 devices in 1.00 seconds
INFO:zen.zenwin:stopping...
INFO:zen.SendEvent:SendEvent thread ended.




if i start the services, the logs are filled with similar wmi warnings and just 
grow and grow.

verbose / debug output from the python scripts isn't much help, just a lot of 
noise about imports and such - i was trying to trace the code to a place to see 
what credentials/details are being used to open the WMI connection...

[/code]

------------------------
benjamin9999




-------------------- m2f --------------------

Read this topic online here:
http://community.zenoss.com/forums/viewtopic.php?p=11206#11206

-------------------- m2f --------------------



_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users

Reply via email to