recommit for updates in build 56

This commit is contained in:
2017-07-23 12:58:37 +02:00
parent 75274ff8df
commit f0067d9e35
20 changed files with 120 additions and 31 deletions

View File

@@ -110,6 +110,8 @@ Structure</a></p>
</li><li>
<p><a href="#selinux">SELINUX</a></p>
</li><li>
<p><a href="#certbot">Certbot</a></p>
</li><li>
<p><a href="#known-problems">Known Problems</a></p>
</li><li>
<p><a href="#support">Support</a></p>
@@ -249,6 +251,26 @@ is available to automate this task for you as well within a few minutes.</p>
<p>All files and directories are configured with correct selinux context. If
selinux is disabled, these contexts are ignored.</p>
<h3 id="label-Certbot">Certbot</h3>
<p>This module can optionally setup <a
href="https://certbot.eff.org/">certbot</a> TLS certificate management for
the frontend GUI. In order to do so, set <code>ng_enable_certbot</code> to
true (default). Effectively, this will manage the certs before even
installing Nagios, so there will be no problems with the Nagios showing up
with a self-signed certificate.
Once enabled, the module will go and try to
obtain a certificate automatically. For this to work, you need to have
proper DNS resolution set up for your domain / nagios server.</p>
<h3 id="label-httpd+vHost+files">httpd vHost files</h3>
<p>by Default, Nagios creates its own nagios.conf file, which is not a vhost
file and relies on the main ssd.conf. However, as Nagios might be running
on a regular web server with various other web instances (not recommended
through), we will not want to manage ssl.conf directly, hence the module
creates a vhost for the ssl host.</p>
<h3 id="label-Known+Problems">Known Problems</h3>
<h3 id="label-Support">Support</h3>
@@ -304,7 +326,7 @@ environments.</p>
</div></div>
<div id="footer">
Generated on Sun Jul 23 12:18:40 2017 by
Generated on Sun Jul 23 12:58:33 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>