NSCAClientNSCAClient — NSCAClient¶NSCA client can be used both from command line and from queries to submit passive checks via NSCA
Queries (Overview):
A list of all available queries (check commands)
| Command | Description |
|---|---|
nsca_submit |
Submit information to remote host via NSCA. |
Commands (Overview):
TODO: Add a list of all external commands (this is not check commands)
Configuration (Overview):
Common Keys:
| Path / Section | Key | Description |
|---|---|---|
/settings/NSCA/client |
channel |
CHANNEL |
/settings/NSCA/client |
hostname |
HOSTNAME |
/settings/NSCA/client/targets/default |
address |
TARGET ADDRESS |
/settings/NSCA/client/targets/default |
allowed ciphers |
ALLOWED CIPHERS |
/settings/NSCA/client/targets/default |
certificate |
SSL CERTIFICATE |
/settings/NSCA/client/targets/default |
encryption |
ENCRYPTION |
/settings/NSCA/client/targets/default |
password |
PASSWORD |
/settings/NSCA/client/targets/default |
timeout |
TIMEOUT |
/settings/NSCA/client/targets/default |
use ssl |
ENABLE SSL ENCRYPTION |
/settings/NSCA/client/targets/default |
verify mode |
VERIFY MODE |
Advanced keys:
| Path / Section | Key | Default Value | Description |
|---|---|---|---|
/settings/NSCA/client |
delay |
DELAY | |
/settings/NSCA/client |
encoding |
NSCA DATA ENCODING | |
/settings/NSCA/client/targets/default |
alias |
ALIAS | |
/settings/NSCA/client/targets/default |
ca |
CA | |
/settings/NSCA/client/targets/default |
certificate format |
CERTIFICATE FORMAT | |
/settings/NSCA/client/targets/default |
certificate key |
SSL CERTIFICATE | |
/settings/NSCA/client/targets/default |
dh |
DH KEY | |
/settings/NSCA/client/targets/default |
encoding |
ENCODING | |
/settings/NSCA/client/targets/default |
host |
TARGET HOST | |
/settings/NSCA/client/targets/default |
is template |
IS TEMPLATE | |
/settings/NSCA/client/targets/default |
parent |
PARENT | |
/settings/NSCA/client/targets/default |
payload length |
PAYLOAD LENGTH | |
/settings/NSCA/client/targets/default |
port |
TARGET PORT | |
/settings/NSCA/client/targets/default |
time offset |
TIME OFFSET |
Sample keys:
A quick reference for all available queries (check commands) in the NSCAClient module.
nsca_submit¶NSCAClientnsca_submitUsage:
| Option | Default Value | Description |
|---|---|---|
help |
N/A | Show help screen (this screen) |
help-pb |
N/A | Show help screen as a protocol buffer payload |
show-default |
N/A | Show default values for a given command |
help-short |
N/A | Show help screen (short format). |
host |
The host of the host running the server | |
port |
The port of the host running the server | |
address |
The address (host:port) of the host running the server | |
timeout |
Number of seconds before connection times out (default=10) | |
target |
Target to use (lookup connection info from config) | |
retry |
Number of times ti retry a failed connection attempt (default=2) | |
command |
The name of the command that the remote daemon should run | |
alias |
Same as command | |
message |
Message | |
result |
Result code either a number or OK, WARN, CRIT, UNKNOWN | |
encryption |
Name of encryption algorithm to use. | |
certificate |
Length of payload (has to be same as on the server) | |
dh |
Length of payload (has to be same as on the server) | |
certificate-key |
Client certificate to use | |
certificate-format |
Client certificate format | |
ca |
Certificate authority | |
verify |
Client certificate format | |
allowed-ciphers |
Client certificate format | |
payload-length |
Length of payload (has to be same as on the server) | |
buffer-length |
Length of payload to/from the NRPE agent. This is a hard specific value so you have to “configure” (read recompile) your NRPE agent to use the same value for it to work. | |
ssl |
N/A | Initial an ssl handshake with the server. |
timeout |
||
password |
Password | |
source-host |
Source/sender host name (default is auto which means use the name of the actual host) | |
sender-host |
Source/sender host name (default is auto which means use the name of the actual host) | |
time-offset |
||
retries |
Number of times to retry a failed connection attempt |
help (NSCAClient, nsca_submit)¶help-pb (NSCAClient, nsca_submit)¶show-default (NSCAClient, nsca_submit)¶help-short (NSCAClient, nsca_submit)¶host (NSCAClient, nsca_submit)¶port (NSCAClient, nsca_submit)¶address (NSCAClient, nsca_submit)¶timeout (NSCAClient, nsca_submit)¶target (NSCAClient, nsca_submit)¶retry (NSCAClient, nsca_submit)¶command (NSCAClient, nsca_submit)¶alias (NSCAClient, nsca_submit)¶message (NSCAClient, nsca_submit)¶result (NSCAClient, nsca_submit)¶encryption (NSCAClient, nsca_submit)¶certificate (NSCAClient, nsca_submit)¶dh (NSCAClient, nsca_submit)¶certificate-key (NSCAClient, nsca_submit)¶certificate-format (NSCAClient, nsca_submit)¶ca (NSCAClient, nsca_submit)¶verify (NSCAClient, nsca_submit)¶allowed-ciphers (NSCAClient, nsca_submit)¶payload-length (NSCAClient, nsca_submit)¶buffer-length (NSCAClient, nsca_submit)¶ssl (NSCAClient, nsca_submit)¶timeout (NSCAClient, nsca_submit)password (NSCAClient, nsca_submit)¶source-host (NSCAClient, nsca_submit)¶sender-host (NSCAClient, nsca_submit)¶time-offset (NSCAClient, nsca_submit)¶retries (NSCAClient, nsca_submit)¶/settings/NSCA/client (NSCAClient)¶NSCA CLIENT SECTION
Section for NSCA passive check module.
Key Default Value Description channelNSCA CHANNEL delay0 DELAY encodingNSCA DATA ENCODING hostnameauto HOSTNAME Sample:
# NSCA CLIENT SECTION # Section for NSCA passive check module. [/settings/NSCA/client] channel=NSCA delay=0 encoding= hostname=auto
channel(NSCAClient, /settings/NSCA/client)¶CHANNEL
The channel to listen to.Path: /settings/NSCA/client
Key: channel
Default value: NSCA
Used by:
NSCAClientSample:
[/settings/NSCA/client] # CHANNEL channel=NSCA
delay(NSCAClient, /settings/NSCA/client)¶DELAY
Advanced (means it is not commonly used)
Path: /settings/NSCA/client
Key: delay
Default value: 0
Used by:
NSCAClientSample:
[/settings/NSCA/client] # DELAY delay=0
encoding(NSCAClient, /settings/NSCA/client)¶NSCA DATA ENCODING
Advanced (means it is not commonly used)
Path: /settings/NSCA/client
Key: encoding
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client] # NSCA DATA ENCODING encoding=
hostname(NSCAClient, /settings/NSCA/client)¶HOSTNAME
The host name of the monitored computer.Set this to auto (default) to use the windows name of the computer.auto Hostname${host} Hostname${host_lc}Hostname in lowercase${host_uc} Hostname in uppercase${domain} Domainname${domain_lc} Domainname in lowercase${domain_uc} Domainname in uppercasePath: /settings/NSCA/client
Key: hostname
Default value: auto
Used by:
NSCAClientSample:
[/settings/NSCA/client] # HOSTNAME hostname=auto
/settings/NSCA/client/handlers (NSCAClient)¶CLIENT HANDLER SECTION
Sample:
# CLIENT HANDLER SECTION # [/settings/NSCA/client/handlers]
/settings/NSCA/client/targets (NSCAClient)¶REMOTE TARGET DEFINITIONS
Sample:
# REMOTE TARGET DEFINITIONS # [/settings/NSCA/client/targets]
/settings/NSCA/client/targets/default (NSCAClient)¶TARGET DEFENITION
Target definition for: default
Key Default Value Description addressTARGET ADDRESS aliasALIAS allowed ciphersADH ALLOWED CIPHERS caCA certificateSSL CERTIFICATE certificate formatPEM CERTIFICATE FORMAT certificate keySSL CERTIFICATE dh${certificate-path}/nrpe_dh_512.pem DH KEY encodingENCODING encryptionaes ENCRYPTION hostTARGET HOST is template0 IS TEMPLATE parentdefault PARENT passwordPASSWORD payload length512 PAYLOAD LENGTH port0 TARGET PORT time offset0 TIME OFFSET timeout30 TIMEOUT use ssl0 ENABLE SSL ENCRYPTION verify modenone VERIFY MODE Sample:
# TARGET DEFENITION # Target definition for: default [/settings/NSCA/client/targets/default] address= alias= allowed ciphers=ADH ca= certificate= certificate format=PEM certificate key= dh=${certificate-path}/nrpe_dh_512.pem encoding= encryption=aes host= is template=0 parent=default password= payload length=512 port=0 time offset=0 timeout=30 use ssl=0 verify mode=none
address(NSCAClient, /settings/NSCA/client/targets/default)¶TARGET ADDRESS
Target host addressPath: /settings/NSCA/client/targets/default
Key: address
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # TARGET ADDRESS address=
alias(NSCAClient, /settings/NSCA/client/targets/default)¶ALIAS
The alias (service name) to report to serverAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: alias
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # ALIAS alias=
allowed ciphers(NSCAClient, /settings/NSCA/client/targets/default)¶ALLOWED CIPHERS
A better value is: ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTHPath: /settings/NSCA/client/targets/default
Key: allowed ciphers
Default value: ADH
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # ALLOWED CIPHERS allowed ciphers=ADH
ca(NSCAClient, /settings/NSCA/client/targets/default)¶CA
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: ca
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # CA ca=
certificate(NSCAClient, /settings/NSCA/client/targets/default)¶SSL CERTIFICATE
Path: /settings/NSCA/client/targets/default
Key: certificate
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # SSL CERTIFICATE certificate=
certificate format(NSCAClient, /settings/NSCA/client/targets/default)¶CERTIFICATE FORMAT
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: certificate format
Default value: PEM
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # CERTIFICATE FORMAT certificate format=PEM
certificate key(NSCAClient, /settings/NSCA/client/targets/default)¶SSL CERTIFICATE
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: certificate key
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # SSL CERTIFICATE certificate key=
dh(NSCAClient, /settings/NSCA/client/targets/default)¶DH KEY
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: dh
Default value: ${certificate-path}/nrpe_dh_512.pem
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # DH KEY dh=${certificate-path}/nrpe_dh_512.pem
encoding(NSCAClient, /settings/NSCA/client/targets/default)¶ENCODING
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: encoding
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # ENCODING encoding=
encryption(NSCAClient, /settings/NSCA/client/targets/default)¶ENCRYPTION
Name of encryption algorithm to use.Has to be the same as your server i using or it wont work at all.This is also independent of SSL and generally used instead of SSL.Available encryption algorithms are:none = No Encryption (not safe)xor = XORdes = DES3des = DES-EDE3cast128 = CAST-128xtea = XTEAblowfish = Blowfishtwofish = Twofishrc2 = RC2aes128 = AESaes192 = AESaes = AESserpent = Serpentgost = GOSTPath: /settings/NSCA/client/targets/default
Key: encryption
Default value: aes
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # ENCRYPTION encryption=aes
host(NSCAClient, /settings/NSCA/client/targets/default)¶TARGET HOST
The target server to report results to.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: host
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # TARGET HOST host=
is template(NSCAClient, /settings/NSCA/client/targets/default)¶IS TEMPLATE
Declare this object as a template (this means it will not be available as a separate object)Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: is template
Default value: 0
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # IS TEMPLATE is template=0
parent(NSCAClient, /settings/NSCA/client/targets/default)¶PARENT
The parent the target inherits fromAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: parent
Default value: default
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # PARENT parent=default
password(NSCAClient, /settings/NSCA/client/targets/default)¶PASSWORD
The password to use. Again has to be the same as the server or it wont work at all.Path: /settings/NSCA/client/targets/default
Key: password
Default value:
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # PASSWORD password=
payload length(NSCAClient, /settings/NSCA/client/targets/default)¶PAYLOAD LENGTH
Length of payload to/from the NRPE agent. This is a hard specific value so you have to “configure” (read recompile) your NRPE agent to use the same value for it to work.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: payload length
Default value: 512
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # PAYLOAD LENGTH payload length=512
port(NSCAClient, /settings/NSCA/client/targets/default)¶TARGET PORT
The target server portAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: port
Default value: 0
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # TARGET PORT port=0
time offset(NSCAClient, /settings/NSCA/client/targets/default)¶TIME OFFSET
Time offset.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/default
Key: time offset
Default value: 0
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # TIME OFFSET time offset=0
timeout(NSCAClient, /settings/NSCA/client/targets/default)¶TIMEOUT
Timeout when reading/writing packets to/from sockets.Path: /settings/NSCA/client/targets/default
Key: timeout
Default value: 30
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # TIMEOUT timeout=30
use ssl(NSCAClient, /settings/NSCA/client/targets/default)¶ENABLE SSL ENCRYPTION
This option controls if SSL should be enabled.Path: /settings/NSCA/client/targets/default
Key: use ssl
Default value: 0
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # ENABLE SSL ENCRYPTION use ssl=0
verify mode(NSCAClient, /settings/NSCA/client/targets/default)¶VERIFY MODE
Path: /settings/NSCA/client/targets/default
Key: verify mode
Default value: none
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/default] # VERIFY MODE verify mode=none
/settings/NSCA/client/targets/sample (NSCAClient)¶TARGET DEFENITION
Target definition for: sample
Key Default Value Description addressTARGET ADDRESS aliasALIAS allowed ciphersADH ALLOWED CIPHERS caCA certificateSSL CERTIFICATE certificate formatPEM CERTIFICATE FORMAT certificate keySSL CERTIFICATE dh${certificate-path}/nrpe_dh_512.pem DH KEY encodingENCODING encryptionaes ENCRYPTION hostTARGET HOST is template0 IS TEMPLATE parentdefault PARENT passwordPASSWORD payload length512 PAYLOAD LENGTH port0 TARGET PORT time offset0 TIME OFFSET timeout30 TIMEOUT use ssl0 ENABLE SSL ENCRYPTION verify modenone VERIFY MODE Sample:
# TARGET DEFENITION # Target definition for: sample [/settings/NSCA/client/targets/sample] address= alias= allowed ciphers=ADH ca= certificate= certificate format=PEM certificate key= dh=${certificate-path}/nrpe_dh_512.pem encoding= encryption=aes host= is template=0 parent=default password= payload length=512 port=0 time offset=0 timeout=30 use ssl=0 verify mode=none
address(NSCAClient, /settings/NSCA/client/targets/sample)¶TARGET ADDRESS
Target host addressPath: /settings/NSCA/client/targets/sample
Key: address
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # TARGET ADDRESS address=
alias(NSCAClient, /settings/NSCA/client/targets/sample)¶ALIAS
The alias (service name) to report to serverAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: alias
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # ALIAS alias=
allowed ciphers(NSCAClient, /settings/NSCA/client/targets/sample)¶ALLOWED CIPHERS
A better value is: ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTHPath: /settings/NSCA/client/targets/sample
Key: allowed ciphers
Default value: ADH
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # ALLOWED CIPHERS allowed ciphers=ADH
ca(NSCAClient, /settings/NSCA/client/targets/sample)¶CA
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: ca
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # CA ca=
certificate(NSCAClient, /settings/NSCA/client/targets/sample)¶SSL CERTIFICATE
Path: /settings/NSCA/client/targets/sample
Key: certificate
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # SSL CERTIFICATE certificate=
certificate format(NSCAClient, /settings/NSCA/client/targets/sample)¶CERTIFICATE FORMAT
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: certificate format
Default value: PEM
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # CERTIFICATE FORMAT certificate format=PEM
certificate key(NSCAClient, /settings/NSCA/client/targets/sample)¶SSL CERTIFICATE
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: certificate key
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # SSL CERTIFICATE certificate key=
dh(NSCAClient, /settings/NSCA/client/targets/sample)¶DH KEY
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: dh
Default value: ${certificate-path}/nrpe_dh_512.pem
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # DH KEY dh=${certificate-path}/nrpe_dh_512.pem
encoding(NSCAClient, /settings/NSCA/client/targets/sample)¶ENCODING
Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: encoding
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # ENCODING encoding=
encryption(NSCAClient, /settings/NSCA/client/targets/sample)¶ENCRYPTION
Name of encryption algorithm to use.Has to be the same as your server i using or it wont work at all.This is also independent of SSL and generally used instead of SSL.Available encryption algorithms are:none = No Encryption (not safe)xor = XORdes = DES3des = DES-EDE3cast128 = CAST-128xtea = XTEAblowfish = Blowfishtwofish = Twofishrc2 = RC2aes128 = AESaes192 = AESaes = AESserpent = Serpentgost = GOSTPath: /settings/NSCA/client/targets/sample
Key: encryption
Default value: aes
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # ENCRYPTION encryption=aes
host(NSCAClient, /settings/NSCA/client/targets/sample)¶TARGET HOST
The target server to report results to.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: host
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # TARGET HOST host=
is template(NSCAClient, /settings/NSCA/client/targets/sample)¶IS TEMPLATE
Declare this object as a template (this means it will not be available as a separate object)Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: is template
Default value: 0
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # IS TEMPLATE is template=0
parent(NSCAClient, /settings/NSCA/client/targets/sample)¶PARENT
The parent the target inherits fromAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: parent
Default value: default
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # PARENT parent=default
password(NSCAClient, /settings/NSCA/client/targets/sample)¶PASSWORD
The password to use. Again has to be the same as the server or it wont work at all.Path: /settings/NSCA/client/targets/sample
Key: password
Default value:
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # PASSWORD password=
payload length(NSCAClient, /settings/NSCA/client/targets/sample)¶PAYLOAD LENGTH
Length of payload to/from the NRPE agent. This is a hard specific value so you have to “configure” (read recompile) your NRPE agent to use the same value for it to work.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: payload length
Default value: 512
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # PAYLOAD LENGTH payload length=512
port(NSCAClient, /settings/NSCA/client/targets/sample)¶TARGET PORT
The target server portAdvanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: port
Default value: 0
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # TARGET PORT port=0
time offset(NSCAClient, /settings/NSCA/client/targets/sample)¶TIME OFFSET
Time offset.Advanced (means it is not commonly used)
Path: /settings/NSCA/client/targets/sample
Key: time offset
Default value: 0
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # TIME OFFSET time offset=0
timeout(NSCAClient, /settings/NSCA/client/targets/sample)¶TIMEOUT
Timeout when reading/writing packets to/from sockets.Path: /settings/NSCA/client/targets/sample
Key: timeout
Default value: 30
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # TIMEOUT timeout=30
use ssl(NSCAClient, /settings/NSCA/client/targets/sample)¶ENABLE SSL ENCRYPTION
This option controls if SSL should be enabled.Path: /settings/NSCA/client/targets/sample
Key: use ssl
Default value: 0
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # ENABLE SSL ENCRYPTION use ssl=0
verify mode(NSCAClient, /settings/NSCA/client/targets/sample)¶VERIFY MODE
Path: /settings/NSCA/client/targets/sample
Key: verify mode
Default value: none
Sample key: This key is provided as a sample to show how to configure objects
Used by:
NSCAClientSample:
[/settings/NSCA/client/targets/sample] # VERIFY MODE verify mode=none