aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
Diffstat (limited to 'doc')
-rw-r--r--doc/ping903.819
-rw-r--r--doc/ping903.conf.526
-rw-r--r--doc/ping903.cred.58
-rw-r--r--doc/ping903q.115
4 files changed, 35 insertions, 33 deletions
diff --git a/doc/ping903.8 b/doc/ping903.8
index 35cbb4a..f8967af 100644
--- a/doc/ping903.8
+++ b/doc/ping903.8
@@ -13,7 +13,7 @@
.\"
.\" You should have received a copy of the GNU General Public License
.\" along with Ping903. If not, see <http://www.gnu.org/licenses/>.
-.TH PING903 8 "March 11, 2020" "PING903" "System Administration"
+.TH PING903 8 "September 19, 2020" "PING903" "System Administration"
.SH NAME
ping903 \- high-performance ICMP monitoring daemon
.SH SYNOPSIS
@@ -52,12 +52,13 @@ IP list is supplied in the configuration file and cannot be altered at
run-time. The
.I mutable
IP list, in contrast, is maintained via the REST API and thus can be
-changed while the server runs. The content of mutable IP list is
+changed when the server runs. The content of the mutable IP list is
preserved during server restarts.
.PP
-Probes for each IP from the list are initiated periodically, each
+Each
.B probe\-interval
-seconds. Each probe consists of
+seconds, the daemon wakes up and probes each IP from the list. Each
+probe consists of
.B ping\-count
ICMP ECHO requests sent with intervals of
.B ping\-interval
@@ -76,10 +77,10 @@ failure \fItolerance\fR number) are lost, the status of the IP is
changed to "inactive".
.PP
An \fBHTTP\fR listener thread is responsible for returning the collected
-statistics and serving other requests. By default the program listens
-for queries on localhost, port 8080. If compiled with the support for
-\fBlibwrap\fR, the access to the HTTP interface can be controlled
-using files
+statistics and serving other requests. By default it listens for
+queries on localhost, port 8080. If compiled with the support for
+\fBlibwrap\fR, the access to the HTTP interface is controlled using
+the files
.B /etc/hosts.allow
and
.BR /etc/hosts.deny .
@@ -146,7 +147,7 @@ requests sent and replies received. Two options (\fB\-vv\fR), enable
additional diagnostics of invalid echo replies. Three options enable
logging of each received echo reply, and four options enable verbose
logging of each echo request sent. Notice that three or more
-\fB\-v\fR options can produce huge amount of logs.
+\fB\-v\fR options can produce a huge amount of output.
.SH BUGS
Only IPv4 is currently supported.
.SH SEE ALSO
diff --git a/doc/ping903.conf.5 b/doc/ping903.conf.5
index cf3432e..a5e9cc4 100644
--- a/doc/ping903.conf.5
+++ b/doc/ping903.conf.5
@@ -13,7 +13,7 @@
.\"
.\" You should have received a copy of the GNU General Public License
.\" along with Ping903. If not, see <http://www.gnu.org/licenses/>.
-.TH PING903.CONF 5 "March 10, 2020" "PING903.CONF" "File Formats Manual"
+.TH PING903.CONF 5 "September 19, 2020" "PING903.CONF" "File Formats Manual"
.SH NAME
ping903.conf \- configuration file for high-performance ICMP monitoring daemon
.SH DESCRIPTION
@@ -67,7 +67,7 @@ through
\fBip\-list \fIFILE\fR
Name of the file supplying a list of IP addresses (or hostnames) to
monitor. Each IP must be listed on a separate line. Empty lines,
-leading and trailing whitespace is ignored. Comments are introduced
+leading and trailing whitespace are ignored. Comments are introduced
by a hash sign as the first non-whitespace character on the line.
.TP
\fBip\-list <<\fIWORD\fR
@@ -82,7 +82,7 @@ Empty lines and comments are allowed within \fIhere-document\fR.
Multiple \fBip\-list\fR statements of any form accumulate.
.TP
\fBprobe\-interval \fIN\fR
-Sets interval between subsequent probes, in seconds. Default is 60
+Sets interval (in seconds) between subsequent probes. Default is 60
(one minute).
.TP
\fBping\-count \fIN\fR
@@ -112,7 +112,7 @@ symbolic service name from
Either \fIIPADDR\fR or \fIPORT\fR (but not both) can be omitted. Missing
\fIIPADDR\fR is equivalent to 127.0.0.1 (note, that in this case the
colon before \fIPORT\fR must be present). Missing \fIPORT\fR means
-use the default port number (8080).
+the default port number (8080).
To summarize, possible arguments are:
\fIIPADDR\fB:\fIPORT\fR, \fIIPADDR\fR, or \fB:\fIPORT\fR.
@@ -121,13 +121,13 @@ Default is \fB0.0.0.0:8080\fR.
.TP
\fBhttp\-backlog\-size \fIN\fR
Configures the size of the
-.BR listen(2)
+.BR listen (2)
backlog queue. Default is the platform-dependent value
.BR SOMAXCONN ,
(128 on most GNU/Linux systems).
.TP
\fBaccess\-log \fIBOOL\fR
-Enable apache-style HTTPD access logging. Valid \fIBOOL\fR values are:
+Enables the apache-style HTTP access logging. Valid \fIBOOL\fR values are:
.BR 1 ,
.BR t ,
.BR true ,
@@ -156,7 +156,7 @@ IP of the connection. If the
.B X\-Forwarded\-For
header is present, its value overrides that IP. If the
header contains a comma-delimited list of IP addresses, this list is
-processed in right-to-left order, until either a not trusted IP or the
+processed from right to left, until either a not trusted IP or the
first IP in the list is encountered, whichever occurs first.
\fICIDR\fR is either an IPv4 address, or an address followed by slash
@@ -170,8 +170,8 @@ description of \fBip\-list\fR above for the description of
single CIDR per line.
.SS HTTP Authorization configuration
It is suggested that HTTP entry points be protected by the HTTP
-authorization. This is especially critical for \fB/config\fR and
-below, which allows the requester to modify \fBping903\fR
+authorization. This is especially critical for the \fB/config\fR
+URL and URLs below it, which allow the requester to modify \fBping903\fR
configuration. This version of \fBping903\fR supports HTTP basic
authorization.
.TP
@@ -179,7 +179,7 @@ authorization.
This statement enables basic authentication for \fIURL\fR when
accessed using the given HTTP \fIMETHOD\fR.
-\fIMETHOD\fR is either one of HTTP methods (\fBGET\fR, \fBPOST\fR,
+\fIMETHOD\fR is either the name of an HTTP method (\fBGET\fR, \fBPOST\fR,
etc.) or a wildcard \fB*\fR matching any method.
\fIURL\fR is the \fBping903\fR URL. It is treated as a prefix, i.e.
@@ -203,7 +203,7 @@ double-quoted string any occurrence of a double-quote or backslash
character must be escaped by prefixing it with a backslash.
These parameters are mandatory only for the very first occurrence of the
-\fBauth\fR statements. The statements that follow it may omit the
+\fBauth\fR statement. The statements that follow it may omit the
\fIIPFILE\fR and/or \fIREALM\fR, if they are the same as in the
preceding statement. For example, the following statements protect
modifications to the \fBping903\fR configuration with basic
@@ -221,8 +221,8 @@ and \fIURL\fR.
Use this statement to exempt an URL from authorization which is
otherwise required for its parent URL. For example, the two
-statements below require basic authorization for "/config", excepting
-"/config/ip-list":
+statements below require basic authorization for "/config", but not
+for "/config/ip-list":
.sp
.nf
auth none GET /config/ip-list
diff --git a/doc/ping903.cred.5 b/doc/ping903.cred.5
index ede1b2b..2a4203b 100644
--- a/doc/ping903.cred.5
+++ b/doc/ping903.cred.5
@@ -13,7 +13,7 @@
.\"
.\" You should have received a copy of the GNU General Public License
.\" along with Ping903. If not, see <http://www.gnu.org/licenses/>.
-.TH PING903.CRED 5 "March 22, 2020" "PING903.CRED" "File Formats Manual"
+.TH PING903.CRED 5 "September 19, 2020" "PING903.CRED" "File Formats Manual"
.SH NAME
ping903.cred \- Credentials storage for ping903
.SH DESCRIPTION
@@ -44,8 +44,8 @@ Their meaning is as follows:
.I SERVER
Specifies the server to which this entry applies. It consists of the
server IP address or DNS name, optionally followed by a colon and port
-number. A wildcard character \fB*\fR can be used in place of the
-either part, in which case this part will match any IP (or port).
+number. Either part can be replaced with a wildcard character
+\fB*\fR, in which case it will match any IP (or port).
If a DNS name is used, it will be resolved.
@@ -68,7 +68,7 @@ When the server requests authorization, the client program
.B ~/.ping903.cred
file for an entry with the \fISERVER\fR matching the IP and port of
the server (as configured by the \fBlisten\fR statement in the
-\fB/etc/ping903.conf\fR file) and the \fIREALM\fR filed matching the
+\fB/etc/ping903.conf\fR file) and the \fIREALM\fR field matching the
authorization realm presented by the server. If such an entry is
found, the client will re-submit the request using the
\fIUSER\fR and \fIPASSWORD\fR for authorization.
diff --git a/doc/ping903q.1 b/doc/ping903q.1
index cf6172e..9352ca9 100644
--- a/doc/ping903q.1
+++ b/doc/ping903q.1
@@ -13,7 +13,7 @@
.\"
.\" You should have received a copy of the GNU General Public License
.\" along with Ping903. If not, see <http://www.gnu.org/licenses/>.
-.TH PING903Q 1 "March 10, 2020" "PING903Q" "User Commands"
+.TH PING903Q 1 "September 19, 2020" "PING903Q" "User Commands"
.SH NAME
ping903q \- ping903 query tool
.SH SYNOPSIS
@@ -51,8 +51,8 @@ detailed information about round trip times and lost packets.
By default, the program attempts to connect to the default REST API
port of (localhost:8080). If the file
.B /etc/ping903.conf
-exists, it will obtain the socket address from the \fBlisten\fR
-statement. See
+exists and contains the \fBlisten\fR statement, the value of this
+statement will be used instead. See
.BR ping903.conf (5),
for detailed description of the configuration file.
.SS Nagios check mode
@@ -76,7 +76,7 @@ authorization \fIrealm\fR name presented by the server. If such an
entry is found, the user name and password listed in it will be used
to send the authorized request.
.PP
-Using the \fB\-R\fR option, you can force using a specific realm for
+The \fB\-R\fR option allows you to use a specific realm for
authorization. In this case, the \fB.ping903.cred\fR file is scanned
at startup and the credentials found in it are used to authorize the
request, without sending unauthorized request first and consulting the
@@ -89,7 +89,7 @@ When called without arguments, the program exits with code 0 if all
monitored IP addresses are alive, 2 if none of them is reachable and 1
if some of them are.
.PP
-Exit codes in nagios check mode:
+In Nagios check mode, exit codes are:
.TP
.B 0
Success
@@ -167,7 +167,7 @@ arguments.
Other options valid in this mode:
.TP
\fB\-N\fR
-By default hosts in initial state (i.e. for which no data has been
+By default, hosts in initial state (i.e. for which no data has been
collected) are treated as "OK" (exit status 0). This option changes
the default to treat them as "UNKNOWN" (exit status 3).
.TP
@@ -183,7 +183,8 @@ Switch to the host match mode.
.SH SEE ALSO
.BR ping903 (8),
.BR ping903.cred (5),
-.BR Nagios <https://www.nagios.org/>.
+.B Nagios
+<https://www.nagios.org/>.
.SH COPYRIGHT
Copyright \(co 2020 Sergey Poznyakoff
.br

Return to:

Send suggestions and report system problems to the System administrator.