show_context_help = 1
The cgi.cfg is mainly the same as in Nagios or Icinga but not all values are used. Find a list of used parameters in the following list.
All config values here, except the roles and authentication related can be set in the thruk_local.conf as well.
DEPRECATED: setting this has no effect with Thruk 3.x or later.
Displays an icon with context specific help on most pages.
ex.:
show_context_help = 1
Determines whether to use authentication or not. If enabled, Thruk will use the REMOTE_USER from the apache environment as authenticated user name. So the authentication has to be done by the webserver. Authorization is done by Thruk.
ex.:
use_authentication = 1
If enabled, the authenticated username is taken from the SSL_CLIENT_S_DN_CN environment instead of the remote user.
ex.:
use_ssl_authentication = 1
The default user will be used if no username has been provided by the webserver. You don’t have to set a default user.
ex.:
default_user_name = thrukadmin
Number of seconds after which most pages are refreshed automatically.
ex.:
refresh_rate = 90
Determines whether html output from plugins is escaped or not.
ex.:
escape_html_tags = 1
Sets the target of the action url links.
ex.:
action_url_target = _blank
Sets the target of the notes url links.
ex.:
notes_url_target = _blank
If enabled, user are not allowed to change the author name for commands.
ex.:
lock_author_names = 1
There are several roles available through the authorized_for_
options. Each
role can also be assigned with the coresponding contact_group option authorized_contactgroup_for_
.
You can use the the *
asterix to assign everyone to a certain role.
Starting with Thruk v2.46 you can use full wildcard support and so something like:
authorized_for_admin = *admin
List of usernames who have privileged access to everything. These contacts will receive all other roles except the read_only role.
You may use wildcards here.
ex.:
authorized_for_admin = thrukadmin
Note: For historical reasons, any use which has the authorized_for_system_information
and the authorized_for_configuration_information
role will also gain the admin role.
This is considered deprecated and might change in the future.
List of usernames who have access to the system and process information pages. You may use wildcards here.
ex.:
authorized_for_system_information = thrukadmin
List of usernames who have access to the configuration information pages. You may use wildcards here.
ex.:
authorized_for_configuration_information = thrukadmin
List of usernames who are allowed to send system commands. You may use wildcards here.
ex.:
authorized_for_system_commands = thrukadmin
List of usernames who are authorized to view all services. You may use wildcards here.
ex.:
authorized_for_all_services = thrukadmin
List of usernames who are authorized to view all hosts. You may use wildcards here.
ex.:
authorized_for_all_hosts = thrukadmin
List of usernames who are authorized to send commands for all services. You may use wildcards here.
ex.:
authorized_for_all_service_commands = thrukadmin
List of usernames who are authorized to send commands for all hosts. You may use wildcards here.
ex.:
authorized_for_all_host_commands = thrukadmin
A comma-delimited list of usernames that can manage public bookmarks.
ex.:
authorized_for_public_bookmarks = thrukadmin
A comma-delimited list of usernames that can manage broadcasts.
ex.:
authorized_for_broadcasts = thrukadmin
A comma-delimited list of usernames that have the permission to create and edit business processes.
ex.:
authorized_for_business_processes = thrukadmin
A comma-delimited list of usernames that have the permission to upload and overwrite status icon sets and background images in panorama view dashboards.
ex.:
authorized_for_panorama_view_media_manager= = thrukadmin
A comma-delimited list of usernames that have full access to the reporting feature.
ex.:
authorized_for_reports = thrukadmin
A comma-delimited list of usernames that have read-only rights in the CGIs. This will block any service or host commands normally shown on the extinfo CGI pages. It will also block comments from being shown to read-only users.
ex.:
authorized_for_read_only = viewer