source: server/fedora/config/etc/nagios/nrpe.cfg @ 315

Last change on this file since 315 was 39, checked in by presbrey, 17 years ago
Some system configuration files from <better-mousetrap.mit.edu>
File size: 7.1 KB
Line 
1#############################################################################
2# Sample NRPE Config File
3# Written by: Ethan Galstad (nagios@nagios.org)
4#
5# Last Modified: 02-23-2006
6#
7# NOTES:
8# This is a sample configuration file for the NRPE daemon.  It needs to be
9# located on the remote host that is running the NRPE daemon, not the host
10# from which the check_nrpe client is being executed.
11#############################################################################
12
13
14# PID FILE
15# The name of the file in which the NRPE daemon should write it's process ID
16# number.  The file is only written if the NRPE daemon is started by the root
17# user and is running in standalone mode.
18
19pid_file=/var/run/nrpe.pid
20
21
22
23# PORT NUMBER
24# Port number we should wait for connections on.
25# NOTE: This must be a non-priviledged port (i.e. > 1024).
26# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
27
28server_port=5666
29
30
31
32# SERVER ADDRESS
33# Address that nrpe should bind to in case there are more than one interface
34# and you do not want nrpe to bind on all interfaces.
35# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
36
37#server_address=192.168.1.1
38
39
40
41# NRPE USER
42# This determines the effective user that the NRPE daemon should run as. 
43# You can either supply a username or a UID.
44#
45# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
46
47nrpe_user=nagios
48
49
50
51# NRPE GROUP
52# This determines the effective group that the NRPE daemon should run as. 
53# You can either supply a group name or a GID.
54#
55# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
56
57nrpe_group=nagios
58
59
60
61# ALLOWED HOST ADDRESSES
62# This is an optional comma-delimited list of IP address or hostnames
63# that are allowed to talk to the NRPE daemon.
64#
65# Note: The daemon only does rudimentary checking of the client's IP
66# address.  I would highly recommend adding entries in your /etc/hosts.allow
67# file to allow only the specified host to connect to the port
68# you are running this daemon on.
69#
70# NOTE: This option is ignored if NRPE is running under either inetd or xinetd
71
72allowed_hosts=18.187.1.128
73 
74
75
76# COMMAND ARGUMENT PROCESSING
77# This option determines whether or not the NRPE daemon will allow clients
78# to specify arguments to commands that are executed.  This option only works
79# if the daemon was configured with the --enable-command-args configure script
80# option. 
81#
82# *** ENABLING THIS OPTION IS A SECURITY RISK! ***
83# Read the SECURITY file for information on some of the security implications
84# of enabling this variable.
85#
86# Values: 0=do not allow arguments, 1=allow command arguments
87
88dont_blame_nrpe=1
89
90
91
92# COMMAND PREFIX
93# This option allows you to prefix all commands with a user-defined string.
94# A space is automatically added between the specified prefix string and the
95# command line from the command definition.
96#
97# *** THIS EXAMPLE MAY POSE A POTENTIAL SECURITY RISK, SO USE WITH CAUTION! ***
98# Usage scenario:
99# Execute restricted commmands using sudo.  For this to work, you need to add
100# the nagios user to your /etc/sudoers.  An example entry for alllowing
101# execution of the plugins from might be:
102#
103# nagios          ALL=(ALL) NOPASSWD: /usr/lib/nagios/plugins/
104#
105# This lets the nagios user run all commands in that directory (and only them)
106# without asking for a password.  If you do this, make sure you don't give
107# random users write access to that directory or its contents!
108
109# command_prefix=/usr/bin/sudo
110
111
112
113# DEBUGGING OPTION
114# This option determines whether or not debugging messages are logged to the
115# syslog facility.
116# Values: 0=debugging off, 1=debugging on
117
118debug=0
119
120
121
122# COMMAND TIMEOUT
123# This specifies the maximum number of seconds that the NRPE daemon will
124# allow plugins to finish executing before killing them off.
125
126command_timeout=60
127
128
129
130# WEEK RANDOM SEED OPTION
131# This directive allows you to use SSL even if your system does not have
132# a /dev/random or /dev/urandom (on purpose or because the necessary patches
133# were not applied). The random number generator will be seeded from a file
134# which is either a file pointed to by the environment valiable $RANDFILE
135# or $HOME/.rnd. If neither exists, the pseudo random number generator will
136# be initialized and a warning will be issued.
137# Values: 0=only seed from /dev/[u]random, 1=also seed from weak randomness
138
139#allow_weak_random_seed=1
140
141
142
143# INCLUDE CONFIG FILE
144# This directive allows you to include definitions from an external config file.
145
146#include=<somefile.cfg>
147
148
149
150# INCLUDE CONFIG DIRECTORY
151# This directive allows you to include definitions from config files (with a
152# .cfg extension) in one or more directories (with recursion).
153
154#include_dir=<somedirectory>
155#include_dir=<someotherdirectory>
156
157
158
159# COMMAND DEFINITIONS
160# Command definitions that this daemon will run.  Definitions
161# are in the following format:
162#
163# command[<command_name>]=<command_line>
164#
165# When the daemon receives a request to return the results of <command_name>
166# it will execute the command specified by the <command_line> argument.
167#
168# Unlike Nagios, the command line cannot contain macros - it must be
169# typed exactly as it should be executed.
170#
171# Note: Any plugins that are used in the command lines must reside
172# on the machine that this daemon is running on!  The examples below
173# assume that you have plugins installed in a /usr/local/nagios/libexec
174# directory.  Also note that you will have to modify the definitions below
175# to match the argument format the plugins expect.  Remember, these are
176# examples only!
177
178# The following examples use hardcoded command arguments...
179
180#command[check_users]=/usr/lib64/nagios/plugins/check_users -w 5 -c 10
181#command[check_load]=/usr/lib64/nagios/plugins/check_load -w 15,10,5 -c 30,25,20
182#command[check_disk1]=/usr/lib64/nagios/plugins/check_disk -w 20 -c 10 -p /dev/hda1
183#command[check_disk2]=/usr/lib64/nagios/plugins/check_disk -w 20 -c 10 -p /dev/hdb1
184#command[check_zombie_procs]=/usr/lib64/nagios/plugins/check_procs -w 5 -c 10 -s Z
185#command[check_total_procs]=/usr/lib64/nagios/plugins/check_procs -w 150 -c 200
186
187# The following examples allow user-supplied arguments and can
188# only be used if the NRPE daemon was compiled with support for
189# command arguments *AND* the dont_blame_nrpe directive in this
190# config file is set to '1'...
191
192command[check_users]=/usr/lib64/nagios/plugins/check_users -w $ARG1$ -c $ARG2$
193command[check_load]=/usr/lib64/nagios/plugins/check_load -w $ARG1$ -c $ARG2$
194command[check_disk]=/usr/lib64/nagios/plugins/check_disk -w $ARG1$ -c $ARG2$
195command[check_disk_p]=/usr/lib64/nagios/plugins/check_disk -w $ARG1$ -c $ARG2$ -p $ARG3$
196command[check_procs]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$
197command[check_procs_C]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -C $ARG3$
198command[check_procs_P]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -P $ARG3$
199command[check_procs_m]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -m $ARG3$
200command[check_procs_s]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -s $ARG3$
201command[check_procs_u]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -u $ARG3$
202command[check_procs_z]=/usr/lib64/nagios/plugins/check_procs -w $ARG1$ -c $ARG2$ -z $ARG3$
Note: See TracBrowser for help on using the repository browser.