# Name of the file with IP addresses (or hostnames) to monitor. Each IP # must be listed on a separate line. Empty lines, leading and trailing # whitespace is ignored. Comments are introduced by a hash sign as the first # non-whitespace character on the line. # Multiple statements accumulate. At least one must be present. #ip-list FILENAME # Write PID of the main process to the specified file. By default no pidfile # is created. # # Example usage: # #pidfile /var/run/ping903.pid # Interval between probes in seconds. The program will poll the registered # IPs once in the given number of seconds. # #probe-interval 60 # Number of ICMP echo requests to send to each host. # #ping-count 10 # Time between subsequent echo requests in a probe. # #ping-interval 1 # Failure tolerance. Mark hosts as being down if that many requests from # ping-count miss replies. # #tolerance 3 # Number of additional bytes to send in each ICMP echo requests (apart from # the timestamp). # #data-length 40 # Log using this syslog facility. Ignored if running in foreground mode (-f) #syslog-facility daemon # Listen on this interface for incoming HTTP requests. Argument can be any of: # IPADDR # IPADDR:PORT # :PORT # where IPADDR stands for a IPv4 address and PORT for the port number or # symbolic name from /etc/services. # #listen :8080 # Enable apache-style HTTPD access logging. Valid values are: # 1, t, true, yes, on - enable logging, # 0, f, nil, false, no, off - disable logging. #access-log off # Show JSON replies along with access logs. #access-log-verbose off # Register trusted IP (or network) for the purpose of HTTP logging. For # requests coming from that IP the value of the X-Forwarded-For header will # be trusted. Default is empty. Argument is IP[/MASK], where IP stands for # a IPv4 IP and MASK is a netmask (dotted-quad) or netmask length (decimal). # Multiple statements accumulate. # # Example usage: # #trusted-ip 127.0.0.1 # It is highly recommended to protect your configuration from unauthorized # access. To do so, use the htpasswd(1) utility to create a database of # users that are allowed access to configuration. Supposing this database # file is /etc/ping903/htpasswd, add the following statement: # #auth basic * /config /etc/ping903/htpasswd Exopotamie # # The 'Exopotamie' word in the above statement is the authentication realm # name. Replace it with whatever name you deem appropriate. # To limit write access to the configuration while allowing anybody to read # the configuration, use the following # #auth basic POST /config /etc/ping903/htpasswd Exopotamie #auth basic PUT /config #auth basic DELETE /config # To exempt a combination of URL and method from authorization, use # "auth none". For example, to allow read access to each particular # keyword in the /config tree, while requiring authorization to access # the root of the tree (and anything below it, if using any method other # than GET), use: #auth none GET /config/* #auth basic * /config /etc/ping903/htpasswd Exopotamie # For more details about basic authorization, please see the following: # ping903.conf(5) # ping903q(1), subsection "Basic authorization" # ping903.cred(5)