Build precise queries to find exactly what you need
Press ESC to close
Nagios World Conference 2026: Sept. 14-17 in St. Paul, MN | Learn More
Adding nagios user to the root group is a big security hole. I suggest never doing this.
Here is a better work around until VMware fixes ‘CIM interaction’ permission (which doesn’t work at least since 4.0 and up to the recent 5.5):
1) Create a local user ‘nagios’ on a ESXi host 2) Add a cron job to check and update /etc/security/access.conf user=nagios; access=/etc/security/access.conf; crontab=/var/spool/cron/crontabs/root; grep $access $crontab > /dev/null || cat $crontab */5 * * * * grep ‘^+:$user:sfcb$’ $access > /dev/null || sed -i ‘2i +:$user:sfcb’ $access EOF 3) Done!
Now you can use nagios user to check check_esxi_hardware.py, no special roles or permissions are needed.