{"id":"binfalse-nrpe-server","name":"nrpe-server","homepage":"https://hub.docker.com/r/binfalse/nrpe-server","repo_url":"https://hub.docker.com/r/binfalse/nrpe-server","category":"monitoring","subcategories":[],"tags":["monitoring","nagios","nrpe","remote-execution","infrastructure"],"what_it_does":"nrpe-server provides an implementation of the NRPE (Nagios Remote Plugin Executor) server side, enabling a monitoring system to execute predefined plugin checks on remote hosts over the network.","use_cases":["Nagios/Nagios-compatible monitoring where checks must run on remote machines","Centralized monitoring of CPU/disk/memory/services via remote plugin execution","Legacy NRPE-based monitoring deployments that still require remote command execution"],"not_for":["Running arbitrary user-supplied commands (NRPE should be restricted to configured commands)","Modern service APIs or app-to-app communication","Environments that cannot accept any remote command execution semantics"],"best_when":"You have a Nagios-style monitoring workflow and can safely restrict NRPE to a small set of approved commands on remote hosts.","avoid_when":"You cannot properly lock down network access, authentication, and command allowlists for remote execution.","alternatives":["SNMP-based monitoring for simple metrics","Agent-based monitoring (e.g., Telegraf/collectd/node_exporter) instead of remote command execution","SSH-based remote checks (with strict key and command restrictions) when compatible with your security posture","Modern monitoring agents (Prometheus exporters, Datadog agents, etc.)"],"af_score":23.5,"security_score":41.5,"reliability_score":32.5,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:31:36.531418+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"NRPE deployments typically rely on network-level controls and/or TLS + authentication mechanisms, but no interface details were provided here to assess the exact auth method used by this package."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source infrastructure component; no pricing information provided."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":23.5,"security_score":41.5,"reliability_score":32.5,"mcp_server_quality":0.0,"documentation_accuracy":20.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":40.0,"rate_limit_clarity":0.0,"tls_enforcement":30.0,"auth_strength":40.0,"scope_granularity":30.0,"dependency_hygiene":50.0,"secret_handling":60.0,"security_notes":"NRPE-style systems inherently increase risk because they facilitate remote execution. Security depends on strict allowlisting of commands, limiting who can connect (network ACLs/firewalls), and using strong authentication/encryption if supported. No specific configuration or dependency/security details were provided here to confirm TLS/auth behavior.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":50.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":"NRPE requests trigger execution of remote checks; retries may rerun commands and cause side effects depending on configured plugins.","pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Remote command execution: an agent retrying failed calls may rerun checks/commands","Operations depend on an external monitoring orchestrator configuration (allowed commands, host ACLs, plugin behavior)","Network timeouts and plugin runtime can affect reliability; without retry guidance, agents may need custom handling"]}}