Chapter 10. Security and Performance

In this chapter, we will cover the following recipes:

  • Using authentication for the Nagios Core web interface
  • Using authenticated contacts
  • Writing debugging information to the Nagios log file
  • Monitoring Nagios performance with nagiostats
  • Setting up a redundant monitoring host

Introduction

Most administrators of midsize networks choose to dedicate an entire server to monitor software and, sometimes, a whole server just for Nagios Core. This is because of the following two main factors that are common to most comprehensive Nagios Core setups:

  • They have a lot of privileges because in order to inspect the running state of so many different hosts and services, they need to be conferred with an appropriate network to those ...

Get Nagios Core Administration Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.