Documentation by YARD 0.9.12
+Documentation by YARD 0.9.16
Alphabetic Index
@@ -274,6 +274,8 @@ + +File Listing
-
diff --git a/doc/css/style.css b/doc/css/style.css
index 57e8f9d..0bf7e2c 100644
--- a/doc/css/style.css
+++ b/doc/css/style.css
@@ -245,6 +245,7 @@ ul.toplevel { list-style: none; padding-left: 0; font-size: 1.1em; }
dl.constants { margin-left: 10px; }
dl.constants dt { font-weight: bold; font-size: 1.1em; margin-bottom: 5px; }
+dl.constants.compact dt { display: inline-block; font-weight: normal }
dl.constants dd { width: 75%; white-space: pre; font-family: monospace; margin-bottom: 18px; }
dl.constants .docstring .note:first-child { margin-top: 5px; }
@@ -326,13 +327,9 @@ ul.summary a, ul.summary a:visited {
text-decoration: none; font-size: 1.1em;
}
ul.summary li { margin-bottom: 5px; }
-.summary .summary_signature {
- padding: 4px 8px;
- background: #f8f8f8;
- border: 1px solid #f0f0f0;
- border-radius: 5px;
-}
+.summary_signature { padding: 4px 8px; background: #f8f8f8; border: 1px solid #f0f0f0; border-radius: 5px; }
.summary_signature:hover { background: #CFEBFF; border-color: #A4CCDA; cursor: pointer; }
+.summary_signature.deprecated { background: #ffe5e5; border-color: #e9dada; }
ul.summary.compact li { display: inline-block; margin: 0px 5px 0px 0px; line-height: 2.6em;}
ul.summary.compact .summary_signature { padding: 5px 7px; padding-right: 4px; }
#content .summary_signature:hover a,
@@ -485,7 +482,7 @@ pre.code .rubyid_nth_ref { color: #6D79DE; }
pre.code .regexp, .dregexp { color: #036A07; }
pre.code a { border-bottom: 1px dotted #bbf; }
/* inline code */
-p > code {
+*:not(pre) > code {
padding: 1px 3px 1px 3px;
border: 1px solid #E1E1E8;
background: #F7F7F9;
diff --git a/doc/file.README.html b/doc/file.README.html
index 8406b15..1a624f8 100644
--- a/doc/file.README.html
+++ b/doc/file.README.html
@@ -6,7 +6,7 @@
|Repo Name| version | Build
-Status|
-|---|---|---|---|
-|cd_nagios| 1.0.0.0 | {Build
-Status/]|
|Repo Name| version | Build Status| |—|—|—|—| |cd_nagios|
+1.1.1.3 | |
Synopsis
@@ -86,58 +83,55 @@ production!!! __**Table of Contents
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
- - +
Features
-Installation: -* Nagios Server instance: - * install httpd via cd_apache - * +
Installation: * Nagios Server instance: * install httpd via cd_apache * install Nagios server binaries on Nagios server
-
Nagios clients:
@@ -147,63 +141,34 @@ install Nagios server binaries on Nagios serverinclude NRPE via
cd_nrpe(optional)
Configuration -* configure all aspects of Nagios on server -* manage nagios -service user -* manage directories (filesystem permissions, selinux ) -* -manage cgi.cfg through parameters -* manage nagios.cfg through parameters -* -manage Nagios users through external Puppet rules via define -* manage -Nagios commands through Puppet exports -* manage Nagios template definitions -through external Puppet rules via define -* manage Nagios main contacts +
Configuration * configure all aspects of Nagios on server * manage nagios
+service user * manage directories (filesystem permissions, selinux ) *
+manage cgi.cfg through parameters * manage nagios.cfg through parameters *
+manage Nagios users through external Puppet rules via define * manage
+Nagios commands through Puppet exports * manage Nagios template definitions
+through external Puppet rules via define * manage Nagios main contacts
through Puppet exports. Additional contacts can be created through external
-Puppet rules via define, to avoid having to alter the module code.
-* manage
+Puppet rules via define, to avoid having to alter the module code. * manage
Nagios main contactgroups through Puppet exports. Additional contact groups
can be created through external Puppet rules via define, to avoid having to
-alter the module code.
-* manage Nagios main hostgroups through Puppet
+alter the module code. * manage Nagios main hostgroups through Puppet
exports. Additional host groups can be created through external Puppet
-rules via define, to avoid having to alter the module code.
-* manage Nagios
+rules via define, to avoid having to alter the module code. * manage Nagios
main servicegroups through Puppet exports. Additional service groups can be
created through external Puppet rules via define, to avoid having to alter
-the module code.
-* manage Nagios main timeperiods through Puppet exports.
+the module code. * manage Nagios main timeperiods through Puppet exports.
Additional timeperiods can be created through external Puppet rules via
-define, to avoid having to alter the module code.
-* configure firewall
-(optional)
-* configure selinux policies (optional)
-* configure forwarding
-http to https including accesing the /nagios url directly (optional)
-*
-manage TLS certificates through certbot (optional)
-* manage
+define, to avoid having to alter the module code. * configure firewall
+(optional) * configure selinux policies (optional) * configure forwarding
+http to https including accesing the /nagios url directly (optional) *
+manage TLS certificates through certbot (optional) * manage
$user$ arguments in resource file via define
Service -* manage Nagios service on server
+Service * manage Nagios service on server
-Monitoring -* monitor Nagios host -* monitor Nagios service -* monitor -clients: - * ping - * root partition - * swap usage - * logged-in local users - -* amount of total processes - * amount of zombie processes - * current Load
+Monitoring * monitor Nagios host * monitor Nagios service * monitor +clients: * ping * root partition * swap usage * logged-in local users +* amount of total processes * amount of zombie processes * current Load
Repo Structure
@@ -252,7 +217,7 @@ concat to concatenate configuration files from different sources. include cd_nagios } -through Foreman:
+through Foreman:
In order to apply parameters through Foreman, cd_nagios::params must be added to the host or hostgroup @@ -338,8 +303,7 @@ directly, hence the module creates a vhost for the ssl host.
Client Connections
In order to monitor clients, NAGIOS must be able to connect to them. There -are multiple ways of doing so, the most common ones being NRPE and SSH. -So +are multiple ways of doing so, the most common ones being NRPE and SSH. So far this module works through the usage of NRPE, which by default is enabled. Class cd_nagios::client::nrpe configures nrpe.cfg and opens the required firewall port on clients (optional,default).
@@ -357,9 +321,9 @@ might be typically easier to work through sealerts manually.Support
-
-
OS: CentOS 6, 7
+OS: CentOS 7
-
-
Puppet 3.x
+Puppet 5.x
Tests
@@ -404,8 +368,7 @@ with PuppetDB (see tests/UTF_Files)ConfDroid as entity is entirely independent from Puppet. We provide custom configuration modules, written for specific purposes and specific -environments. -The modules are tested and supported only as documented, and +environments. The modules are tested and supported only as documented, and require testing in designated environments (i.e. lab or development environments) for parameter tuning etc. before deploying into production environments.
diff --git a/doc/frames.html b/doc/frames.html index 42ca6b6..b57c778 100644 --- a/doc/frames.html +++ b/doc/frames.html @@ -2,7 +2,7 @@ -