Build precise queries to find exactly what you need
Press ESC to close
Adding nagios user to the root group is a big security hole. I suggest never doing this.
Here is a better work around until VMware fixes ‘CIM interaction’ permission (which doesn’t work at least since 4.0 and up to the recent 5.5):
1) Create a local user ‘nagios’ on a ESXi host 2) Add a cron job to check and update /etc/security/access.conf user=nagios; access=/etc/security/access.conf; crontab=/var/spool/cron/crontabs/root; grep $access $crontab > /dev/null || cat $crontab */5 * * * * grep ‘^+:$user:sfcb$’ $access > /dev/null || sed -i ‘2i +:$user:sfcb’ $access EOF 3) Done!
Now you can use nagios user to check check_esxi_hardware.py, no special roles or permissions are needed.
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!