|
@@ -1,7 +1,7 @@
|
|
|
######################################################################################
|
|
|
-# etc/nagios/nrpe.cfg config file template. Based on the file included in
|
|
|
-# the Icinga apt package.
|
|
|
-# Autogenerated by Puppet
|
|
|
+# etc/nagios/nrpe.cfg config file template. Based on the file included in
|
|
|
+# the Icinga apt package
|
|
|
+# Autogenerated by Puppet
|
|
|
# (c) Nicholas Chappell, 2014
|
|
|
######################################################################################
|
|
|
|
|
@@ -14,9 +14,9 @@
|
|
|
###########################################
|
|
|
|
|
|
#############################################################################
|
|
|
-# Sample NRPE Config File
|
|
|
+# Sample NRPE Config File
|
|
|
# Written by: Ethan Galstad (nagios@nagios.org)
|
|
|
-#
|
|
|
+#
|
|
|
# Last Modified: 11-23-2007
|
|
|
#
|
|
|
# NOTES:
|
|
@@ -60,9 +60,9 @@ server_port=<%= scope.lookupvar('icinga2::nrpe::nrpe_listen_port') %>
|
|
|
|
|
|
|
|
|
# NRPE USER
|
|
|
-# This determines the effective user that the NRPE daemon should run as.
|
|
|
+# This determines the effective user that the NRPE daemon should run as
|
|
|
# You can either supply a username or a UID.
|
|
|
-#
|
|
|
+#
|
|
|
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
|
|
|
|
|
|
nrpe_user=<%= scope.lookupvar('icinga2::nrpe::nrpe_user') %>
|
|
@@ -70,9 +70,9 @@ nrpe_user=<%= scope.lookupvar('icinga2::nrpe::nrpe_user') %>
|
|
|
|
|
|
|
|
|
# NRPE GROUP
|
|
|
-# This determines the effective group that the NRPE daemon should run as.
|
|
|
+# This determines the effective group that the NRPE daemon should run as.
|
|
|
# You can either supply a group name or a GID.
|
|
|
-#
|
|
|
+#
|
|
|
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
|
|
|
|
|
|
nrpe_group=<%= scope.lookupvar('icinga2::nrpe::nrpe_group') %>
|
|
@@ -80,9 +80,9 @@ nrpe_group=<%= scope.lookupvar('icinga2::nrpe::nrpe_group') %>
|
|
|
|
|
|
|
|
|
# ALLOWED HOST ADDRESSES
|
|
|
-# This is an optional comma-delimited list of IP address or hostnames
|
|
|
+# This is an optional comma-delimited list of IP address or hostnames
|
|
|
# that are allowed to talk to the NRPE daemon. Network addresses with a bit mask
|
|
|
-# (i.e. 192.168.1.0/24) are also supported. Hostname wildcards are not currently
|
|
|
+# (i.e. 192.168.1.0/24) are also supported. Hostname wildcards are not currently
|
|
|
# supported.
|
|
|
#
|
|
|
# Note: The daemon only does rudimentary checking of the client's IP
|
|
@@ -93,16 +93,16 @@ nrpe_group=<%= scope.lookupvar('icinga2::nrpe::nrpe_group') %>
|
|
|
# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
|
|
|
|
|
|
allowed_hosts=<%= scope.lookupvar('icinga2::nrpe::nrpe_allowed_hosts').join(',') %>
|
|
|
-
|
|
|
+
|
|
|
|
|
|
|
|
|
# COMMAND ARGUMENT PROCESSING
|
|
|
# This option determines whether or not the NRPE daemon will allow clients
|
|
|
# to specify arguments to commands that are executed. This option only works
|
|
|
# if the daemon was configured with the --enable-command-args configure script
|
|
|
-# option.
|
|
|
+# option.
|
|
|
#
|
|
|
-# *** ENABLING THIS OPTION IS A SECURITY RISK! ***
|
|
|
+# *** ENABLING THIS OPTION IS A SECURITY RISK! ***
|
|
|
# Read the SECURITY file for information on some of the security implications
|
|
|
# of enabling this variable.
|
|
|
#
|
|
@@ -118,9 +118,9 @@ dont_blame_nrpe=0
|
|
|
# command line from the command definition.
|
|
|
#
|
|
|
# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***
|
|
|
-# Usage scenario:
|
|
|
+# Usage scenario:
|
|
|
# Execute restricted commmands using sudo. For this to work, you need to add
|
|
|
-# the nagios user to your /etc/sudoers. An example entry for alllowing
|
|
|
+# the nagios user to your /etc/sudoers. An example entry for alllowing
|
|
|
# execution of the plugins from might be:
|
|
|
#
|
|
|
# nagios ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/
|
|
@@ -129,7 +129,7 @@ dont_blame_nrpe=0
|
|
|
# without asking for a password. If you do this, make sure you don't give
|
|
|
# random users write access to that directory or its contents!
|
|
|
|
|
|
-# command_prefix=/usr/bin/sudo
|
|
|
+# command_prefix=/usr/bin/sudo
|
|
|
|
|
|
|
|
|
|
|
@@ -216,11 +216,11 @@ connection_timeout=<%= scope.lookupvar('icinga2::nrpe::nrpe_connection_timeout')
|
|
|
#command[check_load]=/usr/lib/nagios/plugins/check_load -w 15,10,5 -c 30,25,20
|
|
|
#command[check_hda1]=/usr/lib/nagios/plugins/check_disk -w 20% -c 10% -p /dev/hda1
|
|
|
#command[check_zombie_procs]=/usr/lib/nagios/plugins/check_procs -w 5 -c 10 -s Z
|
|
|
-#command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 150 -c 200
|
|
|
+#command[check_total_procs]=/usr/lib/nagios/plugins/check_procs -w 150 -c 200
|
|
|
|
|
|
|
|
|
# The following examples allow user-supplied arguments and can
|
|
|
-# only be used if the NRPE daemon was compiled with support for
|
|
|
+# only be used if the NRPE daemon was compiled with support for
|
|
|
# command arguments *AND* the dont_blame_nrpe directive in this
|
|
|
# config file is set to '1'. This poses a potential security risk, so
|
|
|
# make sure you read the SECURITY file before doing this.
|
|
@@ -235,7 +235,7 @@ connection_timeout=<%= scope.lookupvar('icinga2::nrpe::nrpe_connection_timeout')
|
|
|
# if you'd prefer, you can instead place directives here
|
|
|
#include=/etc/nagios/nrpe_local.cfg
|
|
|
|
|
|
-#
|
|
|
+#
|
|
|
# you can place your config snipplets into nrpe.d/
|
|
|
# only snipplets ending in .cfg will get included
|
|
|
-include_dir=/etc/nagios/nrpe.d/
|
|
|
+include_dir=/etc/nagios/nrpe.d/
|