[ZBXNEXT-2735] Liboping as an alternative to fping Created: 2015 Mar 06 Updated: 2015 Mar 09 |
|
Status: | Open |
Project: | ZABBIX FEATURE REQUESTS |
Component/s: | Proxy (P), Server (S) |
Affects Version/s: | None |
Fix Version/s: | None |
Type: | Change Request | Priority: | Major |
Reporter: | Evgenii Terechkov | Assignee: | Unassigned |
Resolution: | Unresolved | Votes: | 0 |
Labels: | fping, icmpping, privilege | ||
Remaining Estimate: | Not Specified | ||
Time Spent: | Not Specified | ||
Original Estimate: | Not Specified |
Issue Links: |
|
Description |
As a more scalable and robust alternative of (tricky) fping utility, consider support of Liboping or similar library. It will decrease resources usage by server and proxy and should avoid current problems with fping-s output parsing line-by-line. |
Comments |
Comment by Oleksii Zagorskyi [ 2015 Mar 07 ] |
hmm, interesting of course. The liboping is existing long time already and seems is alive. It's good. I tried an oping application - it demonstrates the library's abilities: # oping -c3 -i50 zabbix.jp I could not stop it by Ctrl+c - it doesn't react at all. Sent it to background by Ctrl+z and then killed with -9 level. Ok, this is just a demo application but we need the library. Also, the oping binary also has SUID flag enabled. |
Comment by Evgenii Terechkov [ 2015 Mar 07 ] |
I sure you are right about SUID bit on executables. Process needs to run under root user to create raw sockets and produce ICMP packets (on Linux kernel). It is apply to any such utility (ping,traceroute, mtr, fping, oping, ...). Usual way to handle such situation for long-running daemons is run under root, fork privileged process with just enough capabilities and drop superuser privileges in parent process (with further IPC with privileged helper). Obvious example for such method is openntpd daemon. |
Comment by Oleksii Zagorskyi [ 2015 Mar 07 ] |
Thanks! |