Advertisement
Guest User

Untitled

a guest
Oct 22nd, 2017
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.90 KB | None | 0 0
  1. [modules]
  2. ;# NSCLIENT++ MODULES
  3. ;# A list with DLLs to load at startup.
  4. ; You will need to enable some of these for NSClient++ to work.
  5. ; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
  6. ; * *
  7. ; * N O T I C E ! ! ! - Y O U H A V E T O E D I T T H I S *
  8. ; * *
  9. ; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
  10. FileLogger.dll
  11. CheckSystem.dll
  12. CheckDisk.dll
  13. ;NSClientListener.dll
  14. NRPEListener.dll
  15. ;SysTray.dll
  16. CheckEventLog.dll
  17. CheckHelpers.dll
  18. ;
  19. ; CheckWMI IS AN EXTREM EARLY IDEA SO DONT USE FOR PRODUCTION ENVIROMNEMTS!
  20. ;CheckWMI.dll
  21. ;
  22. ; RemoteConfiguration IS AN EXTREM EARLY IDEA SO DONT USE FOR PRODUCTION ENVIROMNEMTS!
  23. ;RemoteConfiguration.dll
  24.  
  25. [Settings]
  26. ;# OBFUSCATED PASSWORD
  27. ; This is the same as the password option but here you can store the password in an obfuscated manner.
  28. ; *NOTICE* obfuscation is *NOT* the same as encryption, someone with access to this file can still figure out the
  29. ; password. Its just a bit harder to do it at first glance.
  30. obfuscated_password=
  31. ;
  32. ;# PASSWORD
  33. ; This is the password (-s) that is required to access NSClient remotely. If you leave this blank everyone will be able to access the daemon remotly.
  34. password=
  35. ;
  36. ;# ALLOWED HOST ADDRESSES
  37. ; This is a comma-delimited list of IP address of hosts that are allowed to talk to the all daemons.
  38. ; If leave this blank anyone can access the deamon remotly (NSClient still requires a valid password).
  39. allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
  40. ;
  41. ;# USE THIS FILE
  42. ; Use the INI file as opposed to the registry if this is 0 and the use_reg in the registry is set to 1
  43. ; the registry will be used instead.
  44. use_file=1
  45.  
  46. [log]
  47. ;# LOG DEBUG
  48. ; Set to 1 if you want debug message printed in the log file (debug messages are always printed to stdout when run with -test)
  49. debug=
  50. ;
  51. ;# LOG FILE
  52. ; The file to print log statements to
  53. file=NSC.log
  54. ;
  55. ;# LOG DATE MASK
  56. ; The format to for the date/time part of the log entry written to file.
  57. date_mask=%Y-%m-%d %H:%M:%S
  58.  
  59.  
  60. ;[NSClient]
  61. ;# ALLOWED HOST ADDRESSES
  62. ; This is a comma-delimited list of IP address of hosts that are allowed to talk to NSClient deamon.
  63. ; If you leave this blank the global version will be used instead.
  64. ;allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
  65. ;
  66. ;# NSCLIENT PORT NUMBER
  67. ; This is the port the NSClientListener.dll will listen to.
  68. ;port=12489
  69. ;
  70. ;# BIND TO ADDRESS
  71. ; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
  72. ; Leaving this blank will bind to all avalible IP adresses.
  73. ;bind_to_address=
  74.  
  75.  
  76. [Check System]
  77. ;# CPU BUFFER SIZE
  78. ; Can be anything ranging from 1s (for 1 second) to 10w for 10 weeks. Notice that a larger buffer will waste memory
  79. ; so don't use a larger buffer then you need (ie. the longest check you do +1).
  80. ;CPUBufferSize=1h
  81. ;
  82. ;# CHECK RESOLUTION
  83. ; The resolution to check values (currently only CPU).
  84. ; The value is entered in 1/10:th of a second and the default is 10 (which means ones every second)
  85. ;CheckResolution=10
  86.  
  87. [NRPE]
  88. ;# NRPE PORT NUMBER
  89. ; This is the port the NRPEListener.dll will listen to.
  90. port=5666
  91. ;
  92. ;# COMMAND TIMEOUT
  93. ; This specifies the maximum number of seconds that the NRPE daemon will allow plug-ins to finish executing before killing them off.
  94. command_timeout=60
  95. ;
  96. ;# COMMAND ARGUMENT PROCESSING
  97. ; This option determines whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.
  98. allow_arguments=1
  99. ;
  100. ;# COMMAND ALLOW NASTY META CHARS
  101. ; This option determines whether or not the NRPE daemon will allow clients to specify nasty (as in |`&><'"\[]{}) characters in arguments.
  102. allow_nasty_meta_chars=1
  103. ;
  104. ;# USE SSL SOCKET
  105. ; This option controls if SSL should be used on the socket.
  106. use_ssl=1
  107. ;
  108. ;# BIND TO ADDRESS
  109. ; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
  110. ; Leaving this blank will bind to all avalible IP adresses.
  111. bind_to_address=
  112. ;
  113. ;# ALLOWED HOST ADDRESSES
  114. ; This is a comma-delimited list of IP address of hosts that are allowed to talk to NRPE deamon.
  115. ; If you leave this blank the global version will be used instead.
  116. allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
  117.  
  118.  
  119. [NRPE Handlers]
  120. ;# COMMAND DEFINITIONS
  121. ;# Command definitions that this daemon will run.
  122. ;# Can be either NRPE syntax:
  123. ;#command[check_users]=/usr/local/nagios/libexec/check_users -w 5 -c 10
  124. ;#command[nt_check_disk_d]=C:\nagios\libexec\diskspace_nrpe_nt.exe d: 70 90
  125. ;#command[nt_check_disk_e]=C:\nagios\libexec\diskspace_nrpe_nt.exe e: 70 90
  126. ;#command[nt_cpuload]=C:\nagios\libexec\cpuload_nrpe_nt.exe 50 80
  127. ;#command[nt_memload]=C:\nagios\libexec\memload_nrpe_nt.exe 70 90
  128. ;#command[nt_service]=C:\nagios\libexec\service_nrpe_nt.exe "Event Log,DNS Client,IIS Admin Service,Task Scheduler,MSSQLServer"
  129. ;#command[nt_check_disk_c]=C:\nagios\libexec\diskspace_nrpe_nt.exe c: 70 90
  130. ;#command[check_process_sqlservr]=C:\nagios\bin\cscript.exe //NoLogo //T:10 C:\nagios\libexec\check_process.wsf sqlservr.exe
  131. ;# Or simplified syntax:
  132. ;#test=c:\test.bat foo $ARG1$ bar
  133. ;#check_disk1=/usr/local/nagios/libexec/check_disk -w 5 -c 10
  134. ;# Or even loopback (inject) syntax (to run internal commands)
  135. ;# This is a way to run "NSClient" commands and other internal module commands such as check eventlog etc.
  136. ;check_cpu=inject checkCPU warn=80 crit=90 5 10 15
  137. ;check_eventlog=inject CheckEventLog Application warn.require.eventType=error warn.require.eventType=warning critical.require.eventType=error critical.exclude.eventType=info truncate=1024 descriptions
  138. ;check_disk_c=inject CheckFileSize ShowAll MaxWarn=1024M MaxCrit=4096M File:WIN=c:\ATI\*.*
  139. ;# But be careful:
  140. ; dont_check=inject dont_check This will "loop forever" so be careful with the inject command...
  141. ;# Check some escapings...
  142. ; check_escape=inject CheckFileSize ShowAll MaxWarn=1024M MaxCrit=4096M "File: foo \" WIN=c:\\WINDOWS\\*.*"
  143.  
  144. command[nt_eventlog]=C:\Windows\nagiosnew\libexec\eventlog_nrpe_nt.exe -m 1440 -s "Service Control Manager"
  145. command[check_firewall]=C:\Windows\nagiosnew\libexec\check_firewall.bat
  146. command[check_queue]=C:\Windows\nagiosnew\libexec\check_queue.bat $ARG1$
  147. command[update_plugins]=C:\Windows\nagiosnew\libexec\update_plugin.bat
  148. command[change_password]=C:\Windows\nagiosnew\libexec\change_password.bat $ARG1$ $ARG2$
  149. command[check_raid]=C:\Windows\nagiosnew\libexec\check_raid.bat
  150. command[check_process_KeywordParserService]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf KeywordParserService.exe
  151. command[check_process_KeywordGatherer]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf GVariationsToolKeywordGatherer.exe
  152. command[check_process_ManageServices]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf ManageServices.exe
  153. command[check_port]=C:\Windows\nagiosnew\libexec\porttest.bat
  154. command[check_extport]=C:\Windows\nagiosnew\libexec\extporttest.bat
  155. command[check_raid_test]=C:\Windows\nagiosnew\libexec\raid_check.bat
  156. command[get_ip]=C:\Windows\system32\cscript.exe //Nologo C:\Windows\nagiosnew\libexec\getip.vbs $ARG1$
  157. command[ntp_restart]=C:\Windows\nagiosnew\libexec\ntp_restart.cmd
  158. #command[update_firewall]=C:\Windows\nagiosnew\libexec\update_firewall.bat $ARG1$
  159. command[fetch_ips]=C:\Windows\nagiosnew\libexec\ips.bat
  160. command[check_mssql_connection]=C:\Windows\nagiosnew\libexec\check_mssql_connection.bat
  161. command[check_iis]=C:\Windows\nagiosnew\libexec\check_IISADMIN.bat
  162. #command[restart_winftp]=C:\Windows\nagiosnew\libexec\restart_winftp.bat
  163. #command[restart_winhttp]=C:\Windows\nagiosnew\libexec\restart_winhttp.bat
  164. #command[restart_winsmtp]=C:\Windows\nagiosnew\libexec\restart_winsmtp.bat
  165. #command[restart_iis]=C:\Windows\nagiosnew\libexec\restart_iis.bat
  166. #command[force_restart_iis]=C:\Windows\nagiosnew\libexec\force_restart_iis.bat
  167. command[check_3ware_raid]=C:\Windows\nagiosnew\libexec\check_3ware_raid.bat
  168. command[check_adaptec_raid]=C:\Windows\nagiosnew\libexec\check_adaptec_raid.bat
  169. command[check_perc_320dc]=C:\Windows\nagiosnew\libexec\check_perc_320dc.bat
  170. command[check_dell_raid]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_dell_omreport.wsf
  171. command[dotnetmail]=C:\Windows\nagiosnew\libexec\dotnetmail.bat
  172. command[win_service_restart]=C:\Windows\nagiosnew\libexec\win_service_restart.cmd $ARG1$ $ARG2$ $ARG3$ $ARG4$
  173. command[check_msupdate]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_msupdate.wsf
  174. command[check_updates]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_updates.wsf
  175. command[win_update_status]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\win_update_status.vbs
  176. command[check_perf_counter]=typeperf -sc 1 $ARG1$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement