Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [modules]
- ;# NSCLIENT++ MODULES
- ;# A list with DLLs to load at startup.
- ; You will need to enable some of these for NSClient++ to work.
- ; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
- ; * *
- ; * N O T I C E ! ! ! - Y O U H A V E T O E D I T T H I S *
- ; * *
- ; ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
- FileLogger.dll
- CheckSystem.dll
- CheckDisk.dll
- ;NSClientListener.dll
- NRPEListener.dll
- ;SysTray.dll
- CheckEventLog.dll
- CheckHelpers.dll
- ;
- ; CheckWMI IS AN EXTREM EARLY IDEA SO DONT USE FOR PRODUCTION ENVIROMNEMTS!
- ;CheckWMI.dll
- ;
- ; RemoteConfiguration IS AN EXTREM EARLY IDEA SO DONT USE FOR PRODUCTION ENVIROMNEMTS!
- ;RemoteConfiguration.dll
- [Settings]
- ;# OBFUSCATED PASSWORD
- ; This is the same as the password option but here you can store the password in an obfuscated manner.
- ; *NOTICE* obfuscation is *NOT* the same as encryption, someone with access to this file can still figure out the
- ; password. Its just a bit harder to do it at first glance.
- obfuscated_password=
- ;
- ;# PASSWORD
- ; This is the password (-s) that is required to access NSClient remotely. If you leave this blank everyone will be able to access the daemon remotly.
- password=
- ;
- ;# ALLOWED HOST ADDRESSES
- ; This is a comma-delimited list of IP address of hosts that are allowed to talk to the all daemons.
- ; If leave this blank anyone can access the deamon remotly (NSClient still requires a valid password).
- allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
- ;
- ;# USE THIS FILE
- ; Use the INI file as opposed to the registry if this is 0 and the use_reg in the registry is set to 1
- ; the registry will be used instead.
- use_file=1
- [log]
- ;# LOG DEBUG
- ; Set to 1 if you want debug message printed in the log file (debug messages are always printed to stdout when run with -test)
- debug=
- ;
- ;# LOG FILE
- ; The file to print log statements to
- file=NSC.log
- ;
- ;# LOG DATE MASK
- ; The format to for the date/time part of the log entry written to file.
- date_mask=%Y-%m-%d %H:%M:%S
- ;[NSClient]
- ;# ALLOWED HOST ADDRESSES
- ; This is a comma-delimited list of IP address of hosts that are allowed to talk to NSClient deamon.
- ; If you leave this blank the global version will be used instead.
- ;allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
- ;
- ;# NSCLIENT PORT NUMBER
- ; This is the port the NSClientListener.dll will listen to.
- ;port=12489
- ;
- ;# BIND TO ADDRESS
- ; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
- ; Leaving this blank will bind to all avalible IP adresses.
- ;bind_to_address=
- [Check System]
- ;# CPU BUFFER SIZE
- ; Can be anything ranging from 1s (for 1 second) to 10w for 10 weeks. Notice that a larger buffer will waste memory
- ; so don't use a larger buffer then you need (ie. the longest check you do +1).
- ;CPUBufferSize=1h
- ;
- ;# CHECK RESOLUTION
- ; The resolution to check values (currently only CPU).
- ; The value is entered in 1/10:th of a second and the default is 10 (which means ones every second)
- ;CheckResolution=10
- [NRPE]
- ;# NRPE PORT NUMBER
- ; This is the port the NRPEListener.dll will listen to.
- port=5666
- ;
- ;# COMMAND TIMEOUT
- ; This specifies the maximum number of seconds that the NRPE daemon will allow plug-ins to finish executing before killing them off.
- command_timeout=60
- ;
- ;# COMMAND ARGUMENT PROCESSING
- ; This option determines whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.
- allow_arguments=1
- ;
- ;# COMMAND ALLOW NASTY META CHARS
- ; This option determines whether or not the NRPE daemon will allow clients to specify nasty (as in |`&><'"\[]{}) characters in arguments.
- allow_nasty_meta_chars=1
- ;
- ;# USE SSL SOCKET
- ; This option controls if SSL should be used on the socket.
- use_ssl=1
- ;
- ;# BIND TO ADDRESS
- ; Allows you to bind server to a specific local address. This has to be a dotted ip adress not a hostname.
- ; Leaving this blank will bind to all avalible IP adresses.
- bind_to_address=
- ;
- ;# ALLOWED HOST ADDRESSES
- ; This is a comma-delimited list of IP address of hosts that are allowed to talk to NRPE deamon.
- ; If you leave this blank the global version will be used instead.
- allowed_hosts=127.0.0.1,209.85.100.49,203.199.114.33,174.132.217.114
- [NRPE Handlers]
- ;# COMMAND DEFINITIONS
- ;# Command definitions that this daemon will run.
- ;# Can be either NRPE syntax:
- ;#command[check_users]=/usr/local/nagios/libexec/check_users -w 5 -c 10
- ;#command[nt_check_disk_d]=C:\nagios\libexec\diskspace_nrpe_nt.exe d: 70 90
- ;#command[nt_check_disk_e]=C:\nagios\libexec\diskspace_nrpe_nt.exe e: 70 90
- ;#command[nt_cpuload]=C:\nagios\libexec\cpuload_nrpe_nt.exe 50 80
- ;#command[nt_memload]=C:\nagios\libexec\memload_nrpe_nt.exe 70 90
- ;#command[nt_service]=C:\nagios\libexec\service_nrpe_nt.exe "Event Log,DNS Client,IIS Admin Service,Task Scheduler,MSSQLServer"
- ;#command[nt_check_disk_c]=C:\nagios\libexec\diskspace_nrpe_nt.exe c: 70 90
- ;#command[check_process_sqlservr]=C:\nagios\bin\cscript.exe //NoLogo //T:10 C:\nagios\libexec\check_process.wsf sqlservr.exe
- ;# Or simplified syntax:
- ;#test=c:\test.bat foo $ARG1$ bar
- ;#check_disk1=/usr/local/nagios/libexec/check_disk -w 5 -c 10
- ;# Or even loopback (inject) syntax (to run internal commands)
- ;# This is a way to run "NSClient" commands and other internal module commands such as check eventlog etc.
- ;check_cpu=inject checkCPU warn=80 crit=90 5 10 15
- ;check_eventlog=inject CheckEventLog Application warn.require.eventType=error warn.require.eventType=warning critical.require.eventType=error critical.exclude.eventType=info truncate=1024 descriptions
- ;check_disk_c=inject CheckFileSize ShowAll MaxWarn=1024M MaxCrit=4096M File:WIN=c:\ATI\*.*
- ;# But be careful:
- ; dont_check=inject dont_check This will "loop forever" so be careful with the inject command...
- ;# Check some escapings...
- ; check_escape=inject CheckFileSize ShowAll MaxWarn=1024M MaxCrit=4096M "File: foo \" WIN=c:\\WINDOWS\\*.*"
- command[nt_eventlog]=C:\Windows\nagiosnew\libexec\eventlog_nrpe_nt.exe -m 1440 -s "Service Control Manager"
- command[check_firewall]=C:\Windows\nagiosnew\libexec\check_firewall.bat
- command[check_queue]=C:\Windows\nagiosnew\libexec\check_queue.bat $ARG1$
- command[update_plugins]=C:\Windows\nagiosnew\libexec\update_plugin.bat
- command[change_password]=C:\Windows\nagiosnew\libexec\change_password.bat $ARG1$ $ARG2$
- command[check_raid]=C:\Windows\nagiosnew\libexec\check_raid.bat
- command[check_process_KeywordParserService]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf KeywordParserService.exe
- command[check_process_KeywordGatherer]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf GVariationsToolKeywordGatherer.exe
- command[check_process_ManageServices]=C:\Windows\system32\cscript.exe //NoLogo //T:10 C:\Windows\nagiosnew\libexec\check_process.wsf ManageServices.exe
- command[check_port]=C:\Windows\nagiosnew\libexec\porttest.bat
- command[check_extport]=C:\Windows\nagiosnew\libexec\extporttest.bat
- command[check_raid_test]=C:\Windows\nagiosnew\libexec\raid_check.bat
- command[get_ip]=C:\Windows\system32\cscript.exe //Nologo C:\Windows\nagiosnew\libexec\getip.vbs $ARG1$
- command[ntp_restart]=C:\Windows\nagiosnew\libexec\ntp_restart.cmd
- #command[update_firewall]=C:\Windows\nagiosnew\libexec\update_firewall.bat $ARG1$
- command[fetch_ips]=C:\Windows\nagiosnew\libexec\ips.bat
- command[check_mssql_connection]=C:\Windows\nagiosnew\libexec\check_mssql_connection.bat
- command[check_iis]=C:\Windows\nagiosnew\libexec\check_IISADMIN.bat
- #command[restart_winftp]=C:\Windows\nagiosnew\libexec\restart_winftp.bat
- #command[restart_winhttp]=C:\Windows\nagiosnew\libexec\restart_winhttp.bat
- #command[restart_winsmtp]=C:\Windows\nagiosnew\libexec\restart_winsmtp.bat
- #command[restart_iis]=C:\Windows\nagiosnew\libexec\restart_iis.bat
- #command[force_restart_iis]=C:\Windows\nagiosnew\libexec\force_restart_iis.bat
- command[check_3ware_raid]=C:\Windows\nagiosnew\libexec\check_3ware_raid.bat
- command[check_adaptec_raid]=C:\Windows\nagiosnew\libexec\check_adaptec_raid.bat
- command[check_perc_320dc]=C:\Windows\nagiosnew\libexec\check_perc_320dc.bat
- command[check_dell_raid]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_dell_omreport.wsf
- command[dotnetmail]=C:\Windows\nagiosnew\libexec\dotnetmail.bat
- command[win_service_restart]=C:\Windows\nagiosnew\libexec\win_service_restart.cmd $ARG1$ $ARG2$ $ARG3$ $ARG4$
- command[check_msupdate]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_msupdate.wsf
- command[check_updates]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\check_updates.wsf
- command[win_update_status]=cscript.exe //NoLogo //T:10 C:\WINDOWS\nagiosnew\libexec\win_update_status.vbs
- command[check_perf_counter]=typeperf -sc 1 $ARG1$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement