Теми рефератів
> Реферати > Курсові роботи > Звіти з практики > Курсові проекти > Питання та відповіді > Ессе > Доклади > Учбові матеріали > Контрольні роботи > Методички > Лекції > Твори > Підручники > Статті Контакти
Реферати, твори, дипломи, практика » Статьи » Система моніторингу ресурсів та сервісів локальної обчислювальної мережі

Реферат Система моніторингу ресурсів та сервісів локальної обчислювальної мережі





which the check_nrpe client is being executed.

########################################## ###################################


# PID FILE

# The name of the file in which the NRPE daemon should write it's process ID

# number. The file is only written if the NRPE daemon is started by the root

# user and is running in standalone mode.

_ file=/ var/run/nrpe.pid


# PORT NUMBER

# Port number we should wait for connections on.

# NOTE: This must be a non-priviledged port (ie gt; 1024).

# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

_ port=5666


# SERVER ADDRESS

# Address that nrpe should bind to in case there are more than one interface

# and you do not want nrpe to bind on all interfaces.

# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

_ address=192.168.10.214


# NRPE USER

# This determines the effective user that the NRPE daemon should run as.

# You can either supply a username or a UID.

#

# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

_ user=nagios


# NRPE GROUP

# This determines the effective group that the NRPE daemon should run as.

# You can either supply a group name or a GID.

#

# NOTE: This option is ignored if NRPE is running under either inetd or xinetd_group=nagios

# ALLOWED HOST ADDRESSES

# This is an optional comma-delimited list of IP address or hostnames

# that are allowed to talk to the NRPE daemon.

#

# Note: The daemon only does rudimentary checking of the client's IP

# address. I would highly recommend adding entries in your /etc/hosts.allow

# file to allow only the specified host to connect to the port

# you are running this daemon on.

#

# NOTE: This option is ignored if NRPE is running under either inetd or xinetd

_ hosts=127.0.0.1,192.168.10.2


# COMMAND ARGUMENT PROCESSING

# This option determines whether or not the NRPE daemon will allow clients

# to specify arguments to commands that are executed. This option only works

# if the daemon was configured with the --enable-command-args configure script

# option.

#

# *** ENABLING THIS OPTION IS A SECURITY RISK! ***

# Read the SECURITY file for information on some of the security implications

# of enabling this variable.

#

# Values: 0=do not allow arguments, 1=allow command arguments_blame_nrpe=0

# COMMAND PREFIX

# This option allows you to prefix all commands with a user-defined string.

# A space is automatically added between the specified prefix string and the

# command line from the command definition.

#

# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***

# Usage scenario:

# Execute restricted commmands using sudo. For this to work, you need to add

# the nagios user to your/etc/sudoers. An example entry for alllowing

# execution of the plugins from might be:

#

# nagios ALL=(ALL) NOPASSWD:/usr/lib/nagios/plugins/

#

# This lets the nagios user run all commands in that directory (and only them)

# without asking for a password. If you do this, make sure you do not give

# random users write access to that directory or its contents!


# command_prefix=/ usr/bin/sudo


# DEBUGGING OPTION

# This option determines whether or not debuggin...


Назад | сторінка 42 з 65 | Наступна сторінка





Схожі реферати:

  • Реферат на тему: Поняття та використання Network File System
  • Реферат на тему: Security law enforcement and personal security staff in the development of ...
  • Реферат на тему: NANO Security
  • Реферат на тему: Actions of the Department for Combating Corruption and Security
  • Реферат на тему: Formation of group behaviour in the organisations