PNP4Nagios // we assume you have already install nagios core Part 1. installation of pnp4nagios We start with the simplest. We download the latest available version of pnp4nagios, in our case 0.6.24, unpack, compile and activate the service. Prerequisite software required - rrdtool - librrds-perl - g++ - php5-cli - php5-gd - libapache2-mod-php5 tar zxvf pnp4nagios-0.6.24.tar.gz cd pnp4nagios-0.6.24 ./configure make all make fullinstall To check pnp4nagios http://localhost/pnp4nagios/ We must remove the following file if we have the pnp4nagios: rm -rf /usr/local/pnp4nagios/share/install.php Part 2. Edit nagios.cfg This is the most complicated part, we need to edit the file and add the following lines indicated. We begin with the main configuration file for Nagios, where besides add...
Note:- · need to open port or disabled iptables. · Selinux need to disabled 1. Create a New Group Create a group called sftpusers. Only users who belong to this group will be automatically restricted to the SFTP chroot environment on this system. # groupadd sftpusers 2. Create Users (or Modify Existing User) Let us say you want to create an user guestuser who should be allowed only to perform SFTP in a chroot environment, and should not be allowed to perform SSH. The following command creates guestuser, assigns this user to sftpusers group, make /incoming as the home directory, set /sbin/nologin as shell (which will not allow the user to ssh and get shell access). # useradd -g sftpusers -d /incoming -s /sbin/nologin guestuser # passwd guestuser Verify that the user got created properly. # grep guestuser /etc/passwd guestuser:x:500:500::/incom...
Comments
Post a Comment