Skip to main content

Zenoss and splunk python issues

FIX: Add `unset PYTHONPATH` in splunk boot script (e.g. /etc/init.d/splunk)

root@zenoss:/opt/splunk/bin# ./splunk start

Splunk> Take the sh out of IT.

Checking prerequisites...
Checking http port [8000]: open
Checking mgmt port [8089]: open
Checking configuration... *** glibc detected *** python: free(): invalid pointer: 0x09c26100 ***
======= Backtrace: =========
/lib/tls/i686/nosegneg/libc.so.6(+0x6c321)[0xb76cf321]
/lib/tls/i686/nosegneg/libc.so.6(+0x6db78)[0xb76d0b78]
/lib/tls/i686/nosegneg/libc.so.6(cfree+0x6d)[0xb76d3c9d]
python[0x80ae4d0]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(+0x4a2f)[0xb6fc9a2f]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(+0xb881)[0xb6fd0881]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(+0xd348)[0xb6fd2348]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(+0x118d7)[0xb6fd68d7]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(XML_ParseBuffer+0x71)[0xb6fcf9a1]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(XML_Parse+0x12d)[0xb6fcf911]
/usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so(+0x74c9)[0xb6fcc4c9]
python(PyEval_EvalFrameEx+0x4f0f)[0x80cf213]
python(PyEval_EvalFrameEx+0x42aa)[0x80ce5ae]
python(PyEval_EvalCodeEx+0x707)[0x80d11bf]
python(PyEval_EvalFrameEx+0x3ac8)[0x80cddcc]
python(PyEval_EvalCodeEx+0x707)[0x80d11bf]
python(PyEval_EvalFrameEx+0x3ac8)[0x80cddcc]
python(PyEval_EvalFrameEx+0x42aa)[0x80ce5ae]
python(PyEval_EvalCodeEx+0x707)[0x80d11bf]
python(PyEval_EvalFrameEx+0x3ac8)[0x80cddcc]
python(PyEval_EvalCodeEx+0x707)[0x80d11bf]
python(PyEval_EvalFrameEx+0x3ac8)[0x80cddcc]
python(PyEval_EvalFrameEx+0x42aa)[0x80ce5ae]
python(PyEval_EvalFrameEx+0x42aa)[0x80ce5ae]
python(PyEval_EvalCodeEx+0x707)[0x80d11bf]
python(PyEval_EvalCode+0x22)[0x80d136e]
python(PyRun_FileExFlags+0x62)[0x80efa1e]
python(PyRun_SimpleFileExFlags+0x2c5)[0x80f0691]
python(Py_Main+0xaff)[0x8058403]
/lib/tls/i686/nosegneg/libc.so.6(__libc_start_main+0xe6)[0xb7679bd6]
python[0x80575e9]
======= Memory map: ========
08048000-08154000 r-xp 00000000 08:01 294948 /opt/splunk/bin/python2.6
08154000-08186000 rw-p 0010c000 08:01 294948 /opt/splunk/bin/python2.6
08186000-0818f000 rw-p 00000000 00:00 0
09487000-09cc4000 rw-p 00000000 00:00 0 [heap]
b6c00000-b6c21000 rw-p 00000000 00:00 0
b6c21000-b6d00000 ---p 00000000 00:00 0
b6d44000-b6d61000 r-xp 00000000 08:01 172225 /lib/libgcc_s.so.1
b6d61000-b6d62000 r--p 0001c000 08:01 172225 /lib/libgcc_s.so.1
b6d62000-b6d63000 rw-p 0001d000 08:01 172225 /lib/libgcc_s.so.1
b6d6a000-b6f64000 r-xp 00000000 08:01 344977 /usr/lib/libpython2.6.so.1.0
b6f64000-b6f65000 r--p 001f9000 08:01 344977 /usr/lib/libpython2.6.so.1.0
b6f65000-b6fb4000 rw-p 001fa000 08:01 344977 /usr/lib/libpython2.6.so.1.0
b6fb4000-b6fbe000 rw-p 00000000 00:00 0
b6fc4000-b6fc5000 rw-p 00000000 00:00 0
b6fc5000-b6fef000 r-xp 00000000 08:51 25572717 /usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so
b6fef000-b6ff2000 rw-p 00029000 08:51 25572717 /usr/local/zenoss/python/lib/python2.6/site-packages/_xmlplus/parsers/pyexpat.so
b6ff2000-b6ff4000 r-xp 00000000 08:01 296148 /opt/splunk/lib/python2.6/lib-dynload/_heapq.so
b6ff4000-b6ff6000 rw-p 00002000 08:01 296148 /opt/splunk/lib/python2.6/lib-dynload/_heapq.so
b6ff6000-b6ffd000 r-xp 00000000 08:01 296166 /opt/splunk/lib/python2.6/lib-dynload/itertools.so
b6ffd000-b7000000 rw-p 00006000 08:01 296166 /opt/splunk/lib/python2.6/lib-dynload/itertools.so
b7000000-b7001000 r-xp 00000000 08:01 296140 /opt/splunk/lib/python2.6/lib-dynload/_bisect.so
b7001000-b7002000 rw-p 00001000 08:01 296140 /opt/splunk/lib/python2.6/lib-dynload/_bisect.so
b7002000-b7004000 r-xp 00000000 08:01 296147 /opt/splunk/lib/python2.6/lib-dynload/_hashlib.so
b7004000-b7005000 rw-p 00002000 08:01 296147 /opt/splunk/lib/python2.6/lib-dynload/_hashlib.so
b7005000-b7157000 r-xp 00000000 08:01 295764 /opt/splunk/lib/libxml2.so.2.7.6
b7157000-b715c000 rw-p 00152000 08:01 295764 /opt/splunk/lib/libxml2.so.2.7.6
b715c000-b715d000 rw-p 00000000 00:00 0
b715d000-b7170000 r-xp 00000000 08:01 295760 /opt/splunk/lib/libexslt.so.0.8.15
b7170000-b7171000 rw-p 00012000 08:01 295760 /opt/splunk/lib/libexslt.so.0.8.15
b7171000-b71ae000 r-xp 00000000 08:01 295765 /opt/splunk/lib/libxslt.so.1.1.26
b71ae000-b71af000 rw-p 0003d000 08:01 295765 /opt/splunk/lib/libxslt.so.1.1.26
b71af000-b7297000 r-xp 00000000 08:01 296870 /opt/splunk/lib/python2.6/site-packages/lxml/etree.so
b7297000-b72b7000 rw-p 000e8000 08:01 296870 /opt/splunk/lib/python2.6/site-packages/lxml/etree.so
b72b7000-b72be000 rw-p 00000000 00:00 0
b72be000-b72ee000 r-xp 00000000 08:01 296170 /opt/splunk/lib/python2.6/lib-dynload/pyexpat.so
b72ee000-b72f1000 rw-p 00030000 08:01 296170 /opt/splunk/lib/python2.6/lib-dynload/pyexpat.so
b72f1000-b73fa000 r-xp 00000000 08:01 295759 /opt/splunk/lib/libcrypto.so.0.9.8
b73fa000-b7410000 rw-p 00109000 08:01 295759 /opt/splunk/lib/libcrypto.so.0.9.8
b7410000-b7454000 rw-p 00000000 00:00 0
b7455000-b7457000 r-xp 00000000 08:01 296152 /opt/splunk/lib/python2.6/lib-dynload/_random.so
b7457000-b7458000 rw-p 00002000 08:01 296152 /opt/splunk/lib/python2.6/lib-dynload/_random.so
b7458000-b745c000 r-xp 00000000 08:01 296177 /opt/splunk/lib/python2.6/lib-dynload/zlib.so
b745c000-b745e000 rw-p 00003000 08:01 296177 /opt/splunk/lib/python2.6/lib-dynload/zlib.so
b745e000-b7461000 r-xp 00000000 08:01 296141 /opt/splunk/lib/python2.6/lib-dynload/_bytesio.so
b7461000-b7462000 rw-p 00002000 08:01 296141 /opt/splunk/lib/python2.6/lib-dynload/_bytesio.so
b7462000-b7465000 r-xp 00000000 08:01 296145 /opt/splunk/lib/python2.6/lib-dynload/_fileio.so
b7465000-b7466000 rw-p 00003000 08:01 296145 /opt/splunk/lib/python2.6/lib-dynload/_fileio.so
b7466000-b746c000 r-xp 00000000 08:01 296157 /opt/splunk/lib/python2.6/lib-dynload/array.so
b746c000-b746e000 rw-p 00006000 08:01 296157 /opt/splunk/lib/python2.6/lib-dynload/array.so
b746e000-b7476000 r-xp 00000000 08:01 296144 /opt/splunk/lib/python2.6/lib-dynload/_elementtree.so
b7476000-b7477000 rw-p 00007000 08:01 296144 /opt/splunk/lib/python2.6/lib-dynload/_elementtree.so
b7477000-b7479000 r-xp 00000000 08:01 296164 /opt/splunk/lib/python2.6/lib-dynload/fcntl.so
b7479000-b747a000 rw-p 00002000 08:01 296164 /opt/splunk/lib/python2.6/lib-dynload/fcntl.so
b747a000-b747d000 r-xp 00000000 08:01 296172 /opt/splunk/lib/python2.6/lib-dynload/select.so
b747d000-b747e000 rw-p 00002000 08:01 296172 /opt/splunk/lib/python2.6/lib-dynload/select.so
b747e000-b7481000 r-xp 00000000 08:01 296174 /opt/splunk/lib/python2.6/lib-dynload/termios.soERROR: pid 13966 terminated with signal 6

Comments

Popular posts from this blog

Globe's HOOQ.TV an (unethical) scam!!

After being terribly disappointed with the subscription stage and after also after a very disappointing test drive (at least Netflix tries to be do-no-evil), I am now very disappointed with the un-subscription of HOOQ.tv with Globe.


Globe sends me a message:


Hi! We'd like to remind you that your free HOOQ will end in 7 days on 10/27/2015. Upon expiry, your subscription will auto-renew to the paid version for P149 per month. If you don't want the paid version, text HOOQ STOP to 8888. before the expiry date. Thank you!


I send the HOOQ STOP to 888 and received:


Sorry, you have entered an invalid keyword. Please make sure your keyword is correct with no extra characters and spaces. For more info on promos, dial *143#, FREE from your Globe/TM mobile phone.


I called Globe Support (211).


Here's the scam:


- GoSurf 999 comes with the HOOQ Free Plan


- After the Free HOOQ Plan (which you did not use because it sucks) expires, it will auto-renew without your consent (!!! UNETHICAL !!!…

Use Private Internet Access (PIA) in DigitalOcean

tags: PrivateInternetAccess, Digital Ocean, VPS, VPN

This runs the PIA VPN using OpenVPN all from the command line.

sudo apt-get install openvpn network-manager-openvpn Not sure if you need network-manager-openvpn.

sudo wget https://www.privateinternetaccess.com/openvpn/openvpn.zip Extract. Move ca.crt and crl.pem to /etc/openvpn

Move "Hong Kong.ovpn" to "/etc/openvpn/Hong Kong.config" for example.

Modified the following lines.

auth-user-pass /etc/openvpn/login.conf route-up /etc/openvpn/route-up.sh
These are the contents of these files.

# cat /etc/openvpn/login.conf username password
Replace with your username and password.

# cat route-up.sh  #!/bin/bash
ip route flush table 100 ip route flush cache ip rule add from x.x.x.x table 100 ip route add table 100 to y.y.y.y/y dev ethX ip route add table 100 default via z.z.z.z
Replace x.x.x.x with your public IP address, y.y.y.y/y with your subnet. Compute using http://jodies.de/ipcalc. Hint: Input public IP and netmask, y…

aircrack-ng (rt2x00 Mac80211 Linux wireless stack) in Ubuntu Trusty 14.04 (14.0.4.1) LTS

Ubuntu is actually installed in a Virtualbox virtual machine on Mac OS X Yosemite 10.10 (10.10.2). Before proceeding read the important intro below from http://www.aircrack-ng.org/doku.php?id=cracking_wpa#introduction
Install aircrack-ng suite.

$ sudo apt-get install aircrack-ng
It should install and provide the following.
# dpkg -s aircrack-ng Package: aircrack-ng Status: install ok installed Priority: optional Section: net Installed-Size: 2167 Maintainer: Ubuntu Developers Architecture: amd64 Version: 1:1.1-6 Depends: libc6 (>= 2.15), libgcrypt11 (>= 1.4.5), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4), wireless-tools, iw Recommends: wget Description: wireless WEP/WPA cracking utilities  aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a  40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets  have been gathered. Also it can attack WPA1/2 networks with some advanced  methods or simply by brute force.  .  It implements the standard FMS attack alon…