<p>actually check_ntp/check_tnp_time submits udp packest to the ntp-server with an interval of about one second. In the documentation of ntpd servers it menttioned, that ntp-requests are/can be discarded when appearing with this high frequency: </p>
<p>From ยด<a href="http://www.eecis.udel.edu/%7Emills/ntp/html/accopt.html#discard">http://www.eecis.udel.edu/~mills/ntp/html/accopt.html#discard</a>: </p>
<p>discard [ average avg ][ minimum min ] [ monitor prob ]<br>
Set the parameters of the rate control facility which protects the server from client abuse. If the limited flag is present in the ACL, packets that violate these limits are discarded. If, in addition, the kod flag is present, a kiss-o'-death packet is returned. See the Rate Management page for further information. The options are:</p>
<pre><code>average avg
Specify the minimum average interpacket spacing (minimum average headway time) in log2 s with default 3.
minimum min
Specify the minimum interpacket spacing (guard time) in seconds with default 2.
monitor
Specify the probability of being recorded for packets that overflow the MRU list size limit set by mru maxmem or mru maxdepth. This is a performance optimization for servers with aggregate arrivals of 1000 packets per second or more.
</code></pre>
<p>For this, check_ntp will have to adopt its own request frequency or there have to command line parameters to adjust average and minimum. </p>
<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">—<br><a href="https://github.com/monitoring-plugins/monitoring-plugins/issues/1295">Reply to this email on GitHub</a>.<img alt="" height="1" src="https://github.com/notifications/beacon/AFQl2Qf2jG0pe6Rm46Z_983JtBByk-X_ks5nIHqjgaJpZM4C0PaG.gif" width="1" /></p>
<script type="application/ld+json">{"@context":"http://schema.org","@type":"EmailMessage","description":"View this Issue on GitHub","action":{"@type":"ViewAction","url":"https://github.com/monitoring-plugins/monitoring-plugins/issues/1295","name":"View Issue"}}</script>