Hi Rod,
Is this a standalone deployment or do you have separate server and sensors?
Have you tried the following on the sensor in question?
sudo nsm_sensor_ps-restart
If you need further help, please send the output of the following
(redacting sensitive info as necessary):
sudo sostat
Thanks,
Doug
On Wed, Feb 13, 2013 at 2:31 PM, Rod Kelsey <
rodney...@gmail.com> wrote:
> Went to open a file via SGuil - got an error that pcap_agent wasn't running. Tried stoppin/starting - no improvement. Attached is the log file, and copy of the pcap_agent.conf (hasn't been modified). Missing file?
>
> Executing: pcap_agent.tcl -c /etc/nsm/JMST-IDS-eth0/pcap_agent.conf
> Connected to localhost
> Sending sguild (sock3) RegisterAgent pcap JMST-IDS-eth0 JMST-IDS-eth0
> Sending sguild (sock3) DiskReport /nsm/sensor_data/JMST-IDS-eth0 50%
> Sending sguild (sock3) PING
> Sensor Data Rcvd: AgentInfo JMST-IDS-eth0 pcap JMST-IDS-eth0 2 0
> Error: can't read "logFile": no such variable
> can't read "logFile": no such variable
> while executing
> "file stat $logFile fileStat"
> (procedure "CheckLastPcapFile" line 25)
> invoked from within
> "CheckLastPcapFile 1"
> (procedure "AgentInfo" line 6)
> invoked from within
> "AgentInfo [lindex $data 1] [lindex $data 2] [lindex $data 3] [lindex $data 4] "
> (procedure "SguildCmdRcvd" line 27)
> invoked from within
> "SguildCmdRcvd sock3"
>
>
> pcap_agent.conf
> # pcap_agent.conf: auto-generated by NSMnow Administration on Wed Jan 9 18:28:31 UTC 2013
> # DEBUG is VERY chatty. Use it only when needed (1=on, 0=off)
> set DEBUG 1
> # Run in background (1=yes, 0=no)
> set DAEMON 0
> # Name of sguild server
> set SERVER_HOST localhost
> # Port sguild listens on for sensor connects
> set SERVER_PORT 7736
> # Local hostname (sensors monitoring multiple interfaces need to use a unique 'hostname' for each interface)
> set HOSTNAME JMST-IDS-eth0
> # The net id is used to correlate data from different agents.
> set NET_GROUP JMST-IDS-eth0
> # The root of your log dir for data like pcap, portscans, sessions, etc
> set LOG_DIR /nsm/sensor_data
> # Where raw/pcap files are being logged to and will be read from.
> set RAW_LOG_DIR ${LOG_DIR}/${HOSTNAME}/dailylogs
> # Path to tcpdump. Used for parsing pcap files.
> set TCPDUMP "/usr/sbin/tcpdump"
> # If you do VLAN tagging then set this to 1 so the right filter is passed to tcpdump.
> # As of Security Onion 20120224, VLAN should always be 0. Please do not change!
> #
http://securityonion.blogspot.com/2012/02/security-onion-20120224-now-available.html
> set VLAN 0
> # Directory to store the temp pcap files
> set TMP_DIR "/tmp"
> # sensor agent reports current disk use up to sguild
> set WATCH_DIR ${LOG_DIR}/${HOSTNAME}
> # Delay in milliseconds for doing different functions.
> set FILE_CHECK_IN_MSECS 300000
> # Disk space
> set DISK_CHECK_DELAY_IN_MSECS 1800000
> # Keep a heartbeat going w/PING PONG in milliseconds. (0 to disable)
> set PING_DELAY 300000
>
> --
> You received this message because you are subscribed to the Google Groups "security-onion" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
security-onio...@googlegroups.com.
> To post to this group, send email to
securit...@googlegroups.com.
> Visit this group at
http://groups.google.com/group/security-onion?hl=en-US.
> For more options, visit
https://groups.google.com/groups/opt_out.
>
>
--
Doug Burks
http://securityonion.blogspot.com