A lot of people who have a NetEye monitoring system will set up a Wall Dashboard to display the status of their most important services and vital performance data.
If these Dashboards are built using Grafana (in the ITOA menu in NetEye 4), you will encounter the problem that you will need to bypass the initial NetEye login screen where it prompts you for credentials.
Anonymous Access: Security Notice
Here is a way to enable anonymous access to Grafana. However, it’s important to protect it by only allowing access from the Wall Dashboards!
Furthermore, it’s possible to restrict anonymous access to a specific Grafana Organization, publishing only those Dashboards there that can be publicly accessible.
Web Server Configuration
The configuration is quite simple: we will need to create a new web service without authentication.
To do this, connect to NetEye and edit the file:
/etc/httpd/conf/httpd.conf
Now add a second listener just under the line “Listen 80”:
Listen 81
Then add the following block at the end of the configuration file:
Note: Put all the IP addresses for the Wall Dashboard in the line “Allow from”, which is indicated above as a.a.a.a b.b.b.b c.c.c.c. For NetEye 4, you need to configure the:
firewall-cmd --permanent --add-port=81/tcp
firewall-cmd –reload
Then the httpd service must be restarted:
NetEye 3: service httpd restart
Neteye 4: systemctl restart httpd.service
Grafana Configuration
The second configuration step is to enable anonymous access in Grafana. Open the file:
NetEye 3: /var/lib/neteye/grafana/etc/grafana.ini
NetEye 4: /neteye/shared/grafana/conf/grafana.ini
Look for the [auth.anonymous] section and edit it as follows:
[auth.anonymous]
# enable anonymous access
enabled = true
# specify organization name that should be used for unauthenticated users
org_name = "Main Org."
# specify role for unauthenticated users
org_role = Viewer
The Organization “Main Org.” is the default one. You can change it to another existing Grafana Organization name to limit the number of visible Dashboards.
The final step is to restart the grafana-server service:
My name is Alessandro and I joined Würth-Phoenix early in 2013. I have over 20 years of experience in the IT sector: For a long time I've worked for a big Italian bank in a very complex environment, managing the software provisioning for all the branch offices. Then I've worked as a system administrator for an international IT provider supporting several big companies in their infrastructures, providing high availability solutions and disaster recovery implementations. I've joined the VMware virtual infrastructure in early stage, since version 2: it was one of the first productive Server Farms in Italy. I always like to study and compare different technologies: I work with Linux, MAC OSX, Windows and VMWare. Since I joined Würth Phoenix, I could also expand my experience on Firewalls, Storage Area Networks, Local Area Networks, designing and implementing complete solutions for our customers. Primarily, I'm a system administrator and solution designer, certified as VMware VCP6 DCV, Microsoft MCP for Windows Server, Hyper-V and System Center Virtual Machine Manager, SQL Server, SharePoint. Besides computers, I also like photography, sport and trekking in the mountains.
Author
Alessandro Romboli
My name is Alessandro and I joined Würth-Phoenix early in 2013. I have over 20 years of experience in the IT sector: For a long time I've worked for a big Italian bank in a very complex environment, managing the software provisioning for all the branch offices. Then I've worked as a system administrator for an international IT provider supporting several big companies in their infrastructures, providing high availability solutions and disaster recovery implementations. I've joined the VMware virtual infrastructure in early stage, since version 2: it was one of the first productive Server Farms in Italy. I always like to study and compare different technologies: I work with Linux, MAC OSX, Windows and VMWare. Since I joined Würth Phoenix, I could also expand my experience on Firewalls, Storage Area Networks, Local Area Networks, designing and implementing complete solutions for our customers. Primarily, I'm a system administrator and solution designer, certified as VMware VCP6 DCV, Microsoft MCP for Windows Server, Hyper-V and System Center Virtual Machine Manager, SQL Server, SharePoint. Besides computers, I also like photography, sport and trekking in the mountains.
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More