diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index 70acd57..de71645 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": - source => $nagios_server, + source => $ne_nagios_source, proto => 'tcp', dport => $ne_nrpe_port, jump => 'accept', diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 3c2190c..9e58056 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -741,6 +741,24 @@ inherited by all classes except defines. —

Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

+
+ + + +
  • + + ne_nagios_source + + + (String) + + + (defaults to: '0.0.0.0/0') + + + — +
    +

    the source address for the firewall rule. Adjust to your environment if needed. Default is ‘0.0.0.0/0’ to allow all sources, but it is recommended to specify the nagios server IP or subnet.

  • @@ -763,9 +781,6 @@ inherited by all classes except defines.
     
     
    -78
    -79
    -80
     81
     82
     83
    @@ -849,10 +864,14 @@ inherited by all classes except defines.
     161
     162
     163
    -164
    +164 +165 +166 +167 +168 -
    # File 'manifests/params.pp', line 78
    +        
    # File 'manifests/params.pp', line 81
     
     class confdroid_nrpe::params (
     
    @@ -899,6 +918,7 @@ class confdroid_nrpe::params (
     # firewall
       Boolean $ne_incl_fw                = true,
       String $ne_fw_order_no             = '50',
    +  String $ne_nagios_source           = '0.0.0.0/0',
     
     # selinux
       Boolean $ne_include_selinux        = true,