aboutsummaryrefslogtreecommitdiff
path: root/src/ping903.conf
blob: d765b6f2abd17594cc288267572655f50e15d5e1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
# Name of the file with IP addresses (or hostnames) to monitor.  Each IP
# must be listed on a separate line.  Empty lines, leading and trailing
# whitespace is ignored.  Comments are introduced by a hash sign as the first
# non-whitespace character on the line.
# Multiple statements accumulate.  At least one must be present.
#ip-list FILENAME

# Write PID of the main process to the specified file.  By default no pidfile
# is created.
#
# Example usage:
#
#pidfile /var/run/ping903.pid

# Interval between probes in seconds.  The program will poll the registered
# IPs once in the given number of seconds.
#
#probe-interval 60

# Number of ICMP echo requests to send to each host.
#
#ping-count 10

# Time between subsequent echo requests in a probe.
#
#ping-interval 1

# Failure tolerance.  Mark hosts as being down if that many requests from
# ping-count miss replies.
#
#tolerance 3

# Number of additional bytes to send in each ICMP echo requests (apart from
# the timestamp).
#
#data-length 40

# Log using this syslog facility.  Ignored if running in foreground mode (-f)
#syslog-facility daemon

# Listen on this interface for incoming HTTP requests.  Argument can be any of:
#  IPADDR
#  IPADDR:PORT
#  :PORT
# where IPADDR stands for a IPv4 address and PORT for the port number or
# symbolic name from /etc/services.
#
#listen :8080

# Enable apache-style HTTPD access logging.  Valid values are:
#   1, t, true, yes, on       - enable logging,
#   0, f, nil, false, no, off - disable logging.
#access-log off

# Show JSON replies along with access logs.
#access-log-verbose off

# Register trusted IP (or network) for the purpose of HTTP logging.  For
# requests coming from that IP the value of the X-Forwarded-For header will
# be trusted.  Default is empty.  Argument is IP[/MASK], where IP stands for
# a IPv4 IP and MASK is a netmask (dotted-quad) or netmask length (decimal).
# Multiple statements accumulate.
#
# Example usage:
#
#trusted-ip 127.0.0.1

# It is highly recommended to protect your configuration from unauthorized
# access.  To do so, use the htpasswd(1) utility to create a database of
# users that are allowed access to configuration.  Supposing this database
# file is /etc/ping903/htpasswd, add the following statement:
#
#auth basic * /config /etc/ping903/htpasswd Exopotamie
#
# The 'Exopotamie' word in the above statement is the authentication realm
# name.  Replace it with whatever name you deem appropriate.

# To limit write access to the configuration while allowing anybody to read
# the configuration, use the following
#
#auth basic POST /config /etc/ping903/htpasswd Exopotamie
#auth basic PUT /config
#auth basic DELETE /config

# To exempt a combination of URL and method from authorization, use
# "auth none".  For example, to allow read access to each particular
# keyword in the /config tree, while requiring authorization to access
# the root of the tree (and anything below it, if using any method other
# than GET), use:
#auth none GET /config/*
#auth basic * /config /etc/ping903/htpasswd Exopotamie

# For more details about basic authorization, please see the following:
#  ping903.conf(5)
#  ping903q(1), subsection "Basic authorization"
#  ping903.cred(5)

Return to:

Send suggestions and report system problems to the System administrator.