Search Exchange
Search All Sites
Nagios Live Webinars
Let our experts show you how Nagios can help your organization.Login
Directory Tree
Via WinRM
Meet The New Nagios Core Services Platform
Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.
Monitoring Made Magically Better
- Nagios Core on Overdrive
- Powerful Monitoring Dashboards
- Time-Saving Configuration Wizards
- Open Source Powered Monitoring On Steroids
- And So Much More!
This wizard helps you execute plugins on Windows systems.
Similar to the SSH Proxy Wizard, the Via WinRM Wizard expects that there are plugins on the remote host that you want to execute. You can download plugins for your Windows systems from the Exchange, or create pluings yourself if you like.
Thsi wizard will install check_by_winrm.py, and create a command for it that looks like this,
$USER1$/check_by_winrm.py -H $HOSTADDRESS$ -u $ARG1$ -p $ARG2$ -a $ARG3$ -P $ARG4$ -A $ARG5$
ARG1 - The username you will use to authenticate to the remote host
ARG2 - The password you will use to authenticate to the remote host
ARG3 - The authentication method you will use to authenticate to the remote host, currently only basic-http, and basic-https are supported*
ARG4 - The full path to the plugin you want to execute. E.g. C:Pluginscheck_cpu.ps1
ARG5 - Any arguments you would like to pass to the plugin. E.g. "-warning 80 -critical 90"
* Note that because only basic auth is supported, WinRM will not authenticate Active Directory or LDAP accounts.
Similar to the SSH Proxy Wizard, the Via WinRM Wizard expects that there are plugins on the remote host that you want to execute. You can download plugins for your Windows systems from the Exchange, or create pluings yourself if you like.
Thsi wizard will install check_by_winrm.py, and create a command for it that looks like this,
$USER1$/check_by_winrm.py -H $HOSTADDRESS$ -u $ARG1$ -p $ARG2$ -a $ARG3$ -P $ARG4$ -A $ARG5$
ARG1 - The username you will use to authenticate to the remote host
ARG2 - The password you will use to authenticate to the remote host
ARG3 - The authentication method you will use to authenticate to the remote host, currently only basic-http, and basic-https are supported*
ARG4 - The full path to the plugin you want to execute. E.g. C:Pluginscheck_cpu.ps1
ARG5 - Any arguments you would like to pass to the plugin. E.g. "-warning 80 -critical 90"
* Note that because only basic auth is supported, WinRM will not authenticate Active Directory or LDAP accounts.
Reviews (0)
Be the first to review this listing!