1 .\" Copyright (c) 2013 Holger Weiss <holger@weiss.in-berlin.de>
2 .\" All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions are met:
7 .\" 1. Redistributions of source code must retain the above copyright notice,
8 .\" this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright notice,
11 .\" this list of conditions and the following disclaimer in the documentation
12 .\" and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 .\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
18 .\" LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
19 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
20 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
21 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
22 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
23 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
24 .\" POSSIBILITY OF SUCH DAMAGE.
26 .TH send_nsca.cfg 5 "@date@" "Version @version@" "The NSCA\-ng Manual"
31 \- NSCA\-ng client configuration file
35 .B @sysconfdir@/send_nsca.cfg
41 process reads configuration data from the file specified with
43 on the command line or from
44 .IR @sysconfdir@/send_nsca.cfg .
48 Configuration settings are defined by specifying a variable name
49 followed by an equals sign (\(lq=\(rq) and a value, one setting per
51 Values can be strings or integers.
52 Strings have to be enclosed in single or double quotes if they contain
53 whitespace characters, hash mark characters, or literal quotation marks.
54 Otherwise, quoting is optional.
55 To specify a literal single or double quote in a string, either escape
56 it by preceding it with a backslash (\(lq\\\(rq) or quote the string
57 using the other quote character.
58 A literal backslash must be preceded with a second backslash.
61 Any whitespace surrounding tokens is ignored.
62 Empty lines and comments are also ignored.
63 Comments are introduced with a hash mark character (\(lq#\(rq) and span
64 to the end of the line.
65 If the last character of a line is a backslash (\(lq\\\(rq), the
66 subsequent line is treated as a continuation of the current line (and
67 the backslash is otherwise ignored).
73 client recognizes the following variables.
74 They may appear in arbitrary order.
75 The type of each value is denoted after an equals sign in angle
79 \fBdelay\fP\ =\ <\fIinteger\fP>
81 Wait for a random number of seconds between 0 and the specified delay
82 before contacting the server.
83 This might be useful to reduce the server load if many
85 clients are invoked simultaneously.
86 The default setting is 0, which tells
88 to connect to the server immediately.
89 The specified value will be ignored if
96 \fBencryption_method\fP\ =\ <\fIstring\fP>
98 This setting is ignored.
99 It is accepted for compatibility with
104 \fBidentity\fP\ =\ <\fIstring\fP>
106 Send the specified client identity to the server.
107 The client identity is used for authentication and authorization.
108 The same identity may be provided by multiple clients.
109 By default, the local host name will be used.
112 \fBpassword\fP\ =\ <\fIstring\fP>
114 Use the specified passphrase for authentication and encryption.
115 The default password is \(lqchange-me\(rq.
119 \fBport\fP\ =\ <\fIstring\fP>
121 Connect to the specified service name or port number on the server
122 instead of using the default port (5668).
123 The specified value will be ignored if
130 \fBserver\fP\ =\ <\fIstring\fP>
132 Connect and talk to the specified server address or host name.
133 The default server is \(lqlocalhost\(rq.
134 The specified value will be ignored if
141 \fBtimeout\fP\ =\ <\fIinteger\fP>
143 Close the connection if the server didn't respond for the specified
145 If the timeout is set to 0,
147 won't enforce connection timeouts.
148 The default timeout is 15 seconds.
149 The specified value will be ignored if
156 \fBtls_ciphers\fP\ =\ <\fIstring\fP>
158 Limit the cipher suites offered during the
160 negotiation to the specified list of ciphers.
161 The format of the string is described in the
164 By default, the ciphers in the list
165 .SM \f(CWPSK-AES256-CBC-SHA:PSK-AES128-CBC-SHA:PSK-3DES-EDE-CBC-SHA:PSK-RC4-SHA\fP
171 .B @sysconfdir@/send_nsca.cfg
172 file might look similar to the following example.
179 identity = "web-checker"
180 password = "djMKCIcurJJLSQGT5qIhCfqCHQLTcvp9"
181 server = "monitoring.example.com"
182 tls_ciphers = "PSK-AES256-CBC-SHA"
193 Please set the permissions appropriately to make sure that only
194 authorized users can access the
195 .B @sysconfdir@/send_nsca.cfg
202 .BR nsca\-ng.cfg (5),
205 .I http://www.nagios.org/developerinfo/externalcommands/
209 Holger Weiss <holger@weiss.in-berlin.de>
211 .\" vim:set filetype=nroff textwidth=72: