NTPMON(1) | NTPsec | NTPMON(1) |
ntpmon - real-time NTP status monitor
ntpmon [-dhnuV] [-D lvl] [-l logfile] [host]
This program is a real-time status monitor for NTP. It presents the same information as the peers, mrulist, rv, and cv commands of ntpq(1), but using a split-window display that also includes a status summary bar, and updates at intervals guaranteed to show status changes almost as soon as they occur.
(Specifically, the display begins updating once per second and adjusts itself to poll at twice the frequency of the shortest polling interval reported in the last peers response.)
The status bar includes the version string of the server being watched, the (local) time at which it was last updated, and the current query interval.
There is a detail-display mode that dumps full information about a single selected peer in a tabular format that makes it relatively easy to see changing values. However, note that a default-sized terminal emulator window (usually 25 lines) doesn’t have enough room for the clock variables portion. The only fix for this is to resize your terminal.
^C cleanly terminates the program. Any keystroke will trigger a poll and update. A few single-keystroke commands are also interpreted as commands.
If no hostname is specified on the command line, localhost is monitored.
Here’s a breakdown of the peers display in the top window:
Variable | Description |
tally | single-character code indicating current value of the select field of the peer status word |
remote | host name (or IP number) of peer |
refid | association ID or kiss code |
st | stratum |
t | u: unicast or manycast client, l: local (reference clock), s: symmetric (peer), server, B: broadcast server, |
when | sec/min/hr since last received packet |
poll | poll interval (log2 s) |
reach | reach shift register (octal) |
delay | roundtrip delay |
offset | offset of server relative to this host |
jitter | jitter |
The tally code is one of the following:
Code | Description |
discarded as not valid | |
x | discarded by intersection algorithm |
. | discarded by table overflow (not used) |
- | discarded by the cluster algorithm |
+ | included by the combine algorithm |
# | backup (more than tos maxclock sources) |
* | system peer |
o | PPS peer (when the prefer peer is valid) |
And the MRU list in the bottom window:
Column | Description |
lstint | Interval in s between the receipt of the most recent packet from this address and the completion of the retrieval of the MRU list by ntpq. |
avgint | Average interval in s between packets from this address. |
rstr | Restriction flags associated with this address. Most are copied unchanged from the matching restrict command, however 0x400 (kod) and 0x20 (limited) flags are cleared unless the last packet from this address triggered a rate control response. |
r | Rate control indicator, either a period, L or K for no rate control response, rate limiting by discarding, or rate limiting with a KoD response, respectively. |
m | Packet mode. |
v | Packet version number. |
count | Packets received from this address. |
rport | Source port of last packet from this address. |
remote address | DNS name, numeric address, or address followed by claimed DNS name which could not be verified in parentheses. |
a
d
h
j
k
m
n
o
p
q
s
u
w
x
<space>
+
-
?
-d
-D
-h
-l
-n
-u
-V
When run in a terminal that does not allow UTF-8 ntpmon will downgrade its unit display to a non-unicode version. ntpmon has to interact with the curses and locale libraries, which prevents it from forcing the use of UTF-8.
When querying a version of ntpd older than NTPsec 0.9.6, ntpmon will appear to hang when monitoring hosts with extremely long MRU lists - in particular, public pool hosts. Correct behavior requires a Mode 6 protocol extension not yet present in those versions.
Even with this extension, monitoring a sufficiently high-traffic server sometimes fails.
When using the -u option, very old xterms may fail to render μ correctly. If this happens, be sure your xterm is started with the -u8 option, or the utf8 resource', and that your console font contains the UTF-8 &mu character. Also confirm your LANG environment variable is set to a UTF-8 language, like this: "export LANG=en_US.utf8".
Timestamp interpretation in this program is likely to fail in flaky ways if the local system clock has not already been approximately synchronized to UTC. Querying a server based in a different NTP era than the current one is especially likely to fail.
This program will behave in apparently buggy and only semi-predictable ways when fetching MRU lists from any server with sufficiently high traffic.
The problem is fundamental. The Mode 6 protocol can’t ship (and your client cannot accept) MRU records as fast as the daemon accepts incoming traffic. Under these circumstances, the daemon will repeatedly fail to ship an entire report, leading to long hangs as your client repeatedly re-sends the request. Eventually the Mode 6 client library will throw an error indicating that a maximum number of restarts has been exceeded.
To avoid this problem, avoid monitoring over links that don’t have enough capacity to handle the monitored server’s entire NTP load.
Always returns 0.
11/18/2019 | NTPsec 1.1.3 |