此内容没有您所选择的语言版本。

18.5. Nagios Advanced Configuration


18.5.1. Creating Nagios User

To create a new Nagios user and set permissions for that user, follow the steps given below:
  1. Login as root user.
  2. Run the command given below with the new user name and type the password when prompted.
    # htpasswd /etc/nagios/passwd newUserName
    Copy to Clipboard Toggle word wrap
  3. Add permissions for the new user in /etc/nagios/cgi.cfg file as shown below:
    authorized_for_system_information=nagiosadmin,newUserName
    authorized_for_configuration_information=nagiosadmin,newUserName
    authorized_for_system_commands=nagiosadmin,newUserName
    authorized_for_all_services=nagiosadmin,newUserName
    authorized_for_all_hosts=nagiosadmin,newUserName
    authorized_for_all_service_commands=nagiosadmin,newUserName
    authorized_for_all_host_commands=nagiosadmin,newUserName
    Copy to Clipboard Toggle word wrap

    Note

    To set read only permission for users, add authorized_for_read_only=username in the /etc/nagios/cgi.cfg file.
  4. Start nagios and httpd services using the following commands:
    # service httpd restart
    # service nagios restart
    Copy to Clipboard Toggle word wrap
  5. Verify Nagios access by using the following URL in your browser, and using the user name and password.
    https://NagiosServer-HostName-or-IPaddress/nagios
    Copy to Clipboard Toggle word wrap

    Figure 18.14. Nagios Login

18.5.2. Changing Nagios Password

The default Nagios user name and password is nagiosadmin. This value is available in the /etc/nagios/cgi.cfg file.
  1. Login as root user.
  2. To change the default password for the Nagios Administrator user, run the following command with the new password:
    # htpasswd -c /etc/nagios/passwd nagiosadmin
    Copy to Clipboard Toggle word wrap
  3. Start nagios and httpd services using the following commands:
    # service httpd restart
    # service nagios restart
    Copy to Clipboard Toggle word wrap
  4. Verify Nagios access by using the following URL in your browser, and using the user name and password that was set in Step 2:
    https://NagiosServer-HostName-or-IPaddress/nagios
    Copy to Clipboard Toggle word wrap

    Figure 18.15. Nagios Login

18.5.3. Configuring SSL

For secure access of Nagios URL, configure SSL:
  1. Create a 1024 bit RSA key using the following command:
    openssl genrsa -out /etc/ssl/private/{cert-file-name.key} 1024
    Copy to Clipboard Toggle word wrap
  2. Create an SSL certificate for the server using the following command:
    openssl req -key nagios-ssl.key -new | openssl x509 -out nagios-ssl.crt -days 365 -signkey  nagios-ssl.key -req
    Copy to Clipboard Toggle word wrap
    Enter the server's host name which is used to access the Nagios Server GUI as Common Name.
  3. Edit the /etc/httpd/conf.d/ssl.conf file and add path to SSL Certificate and key files correspondingly for SSLCertificateFile and SSLCertificateKeyFile fields as shown below:
     SSLCertificateFile     /etc/pki/tls/certs/nagios-ssl.crt
     SSLCertificateKeyFile  /etc/pki/tls/private/nagios-ssl.key
    Copy to Clipboard Toggle word wrap
  4. Edit the /etc/httpd/conf/httpd.conf file and comment the port 80 listener as shown below:
    # Listen 80
    Copy to Clipboard Toggle word wrap
  5. In /etc/httpd/conf/httpd.conf file, ensure that the following line is not commented:
    <Directory "/var/www/html">
    Copy to Clipboard Toggle word wrap
  6. Restart the httpd service on the nagios server using the following command:
    # service httpd restart
    Copy to Clipboard Toggle word wrap

18.5.4. Integrating LDAP Authentication with Nagios

You can integrate LDAP authentication with Nagios plug-in. To integrate LDAP authentication, follow the steps given below:
  1. In apache configuration file /etc/httpd/conf/httpd.conf, ensure that LDAP is installed and LDAP apache module is enabled.
    The configurations are displayed as given below if the LDAP apache module is enabled.You can enable the LDAP apache module by deleting the # symbol.
    LoadModule ldap_module modules/mod_ldap.so
    LoadModule authnz_ldap_module modules/mod_authnz_ldap.so
    Copy to Clipboard Toggle word wrap
  2. Edit the nagios.conf file in /etc/httpd/conf.d/nagios.conf with the corresponding values for the following:
    • AuthBasicProvider
    • AuthLDAPURL
    • AuthLDAPBindDN
    • AuthLDAPBindPassword
  3. Edit the CGI authentication file /etc/nagios/cgi.cfg as given below with the path where Nagios is installed.
    nagiosinstallationdir = /usr/local/nagios/ or /etc/nagios/
    Copy to Clipboard Toggle word wrap
  4. Uncomment the lines shown below by deleting # and set permissions for specific users:

    Note

    Replace nagiosadmin and user names with * to give any LDAP user full functionality of Nagios.
    authorized_for_system_information=user1,user2,user3
    
    authorized_for_configuration_information=nagiosadmin,user1,user2,user3
    
    authorized_for_system_commands=nagiosadmin,user1,user2,user3
    
    authorized_for_all_services=nagiosadmin,user1,user2,user3
    
    authorized_for_all_hosts=nagiosadmin,user1,user2,user3
    
    authorized_for_all_service_commands=nagiosadmin,user1,user2,user3
    
    authorized_for_all_host_commands=nagiosadmin,user1,user2,user3
    Copy to Clipboard Toggle word wrap
  5. Enable the httpd_can_connect_ldap boolean, if not enabled.
    # getsebool httpd_can_connect_ldap
    # setsebool httpd_can_connect_ldap on
    
    Copy to Clipboard Toggle word wrap
  6. Restart httpd service and nagios server using the following commands:
    # service httpd restart
    # service nagios restart
    
    Copy to Clipboard Toggle word wrap
返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat