This file is indexed.

/usr/share/doc/check-mk-doc/agents/README.OpenVMS is in check-mk-doc 1.2.2p3-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
OpenVMS Agent for Check_MK
--------------------------

*** current status:  BETA ***

1. Prerequisites
    - An OpenVMS account with enhanced privileges:
      CMKRNL must be enabled per default (for network counters)
    - Make sure that you do not use the SYSTEM account! Rather create a new
      account with the name 'check_mk' with enabled privileges (TMPMBX, NETMBX, CMKRNL)
    - It is a good idea to create the login directory for the
      user who invokes the agent outside of the system disk
      (SYS$SYSDEVICE)
    - Preferrable create a subdirectory [.bin] for using this
      agent

2. Using the agent
    - Copy the file check_mk_agent.openvms to your OpenVMS system
      and rename it to check_mk_agent.com.
    - For direct testing purposes you can invoke this procedure
      from the command line (@check_mk_agent)
    - If you configure the TCPIP settings (refer to PROXY) you
      can test the agent from an 'external box' using rsh
      (rsh <IP_of_OpenVMS_host> -l <VMSuser> @[.bin]check_mk_agent)
    - Hint:
      If you are playing with rsh from an other host dont't forget to
      have a look on the login directory of the VMSuser - every rsh call
      produces a logFile!

3. Information
    - As this is a quite preliminary agent the sample period is set to
      only 14 seconds (will be 60 seconds at least in a stable version)
      You can change this value for you testing purpose.
      Please keep in mind that the agent currently runs (and 'holds'
      for the specified sample period)
    - In a future version of the agent we will replace external 'calls'
      (rsh) with a tcp service as known from other existing checks
    - The agent is tested on OpenVMS Version 7.3-2 and later (currently
      only on Alpha)

4. Integration into Check_MK via RSH

    - The current version of the OpenVMS does not support communication
      via TCP port 6556 yet (will come in future). Currently you have
      to access it via rsh. First make sure that a rsh-call of the agent
      from your monitoring system is possible without password.
    - Now configure the access via "datasource_programs". The following
      example for main.mk assumes, that your OpenVMS hosts have the
      host tag "vms" and that your OpenVMS user is 'check_mk':

main.mk:

datasource_programs = [
  ( "rsh -l check_mk <IP> '@[.bin]check_mk_agent'", ['vms'], ALL_HOSTS ),
]


Now you can run Check_MK inventory as usually and should find a couple
of new checks. Here is an example output from the VMS agent on a small
virtualized test machine:

<<<check_mk>>>
Version: 1.2.0p2
AgentOS: openvms
Nodename: VALPH2
Architecture: Alpha
SWversion: V8.4
<<<vms_cpu>>>
1 99.47 0.07 0.42 0.00
<<<mem>>>
MemTotal: 131072
MemFree: 68544
SwapTotal: 0
SwapFree: 0
<<<vms_system>>>
0.00 0.00 15.00
<<<vms_diskstat>>>
OVMS084 8380080 6429712 0.00
DATA 4110480 4090976 0.00
<<<vms_if>>>
SE0 26660 0 15634 0 0
<<<vms_queuejobs>>>
DUMMY: Missing test possibilites - to be done!
<<<vms_users>>>
AEP 2 - - 1
SYSTEM 1      
TCPIP$FTP - - - 1