New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use Icinga 2 API to detect the IDO host/database/user in the setup wizard #2544
Comments
Hi Alex, The setup of the monitoring module could be simplified by fetching the Icinga 2 API for all necessary information. Of course the user has to provide API crendentials beforehand. Please have a look how we could implement this. Cheers, |
This absolutely makes sense and can be helpful especially for smallish setups. Some thoughts:
Cheers, |
@Thomas-Gelf: You'd provide a button to do bad practice OOTB? C'mon... |
Believe me, I wouldn't. Still, there is a lot of lazy people out there. And this is what this feature request asks for. I'm fine with all variants, as long as the username is not going to be populated with the one you can read through the API. |
…ent certificate and private key usage refs #2544
Note for the future myself:
|
blocked by #2541 |
Note: 430f823 is OK. |
Note for the future myself at work: While playing around w/ TLS certchains for my home setup (really, I don't work on IW2 at half past 23:00 (especially on Fri 13th ;-) )) I discovered yet another "oh not again" factor: To validate a remote's TLS cert you have to store all CA's in the chain locally. (Yeah, that will be a kinda longer journey...) Luckily no problem in the I2 context. |
"To validate a remote's TLS cert you have to store all CA's in the chain locally." WRONG! The remote has to provide all intermediate CAs and may provide also the root CA. |
This issue has been migrated from Redmine: https://dev.icinga.com/issues/12638
Created by elippmann on 2016-09-05 06:13:10 +00:00
The text was updated successfully, but these errors were encountered: