Using authenticated contacts
In this recipe, you'll learn how to use authenticated contacts to refine our control of access to information in the Nagios Core web interface. This recipe is useful in situations where a particular user requires information on the status of certain hosts and services but should not be allowed to view others. This is a setup that can't be managed with the directives in cgi.cfg
.
As a simple example, on a given monitoring server, we might have two hosts configured as follows:
define host { use linux-server host_name sparta.example.net alias sparta address 192.0.2.21 contacts nagiosadmin } define host { use linux-server host_name athens.example.net alias athens address 192.0.2.22 contacts nagiosadmin }
We might like to add ...
Get Nagios Core Administration Cookbook - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.