Then NagMap must be told to use the newly generated key, which you can do by editing the following file:
/var/lib/neteye/plugins/nagmap/config.php
Just add a line before the PHP closing tag ?> as shown below
// Use Clustering of Markers feature
$use_cluster_markers = 1;
$cluster_markers_gridSize = 20;
$cluster_markers_maxZoom = 15;
$API_KEY=”key=xXXxxxXXXxxx-XXXxxxXXXxxXXXXxx”;
?>
If you need specific help either to create the API key, or to configure NetEye to use it, feel free to contact our Support Team at: net.support@wuerth-phoenix.com
We are sorry to depend so heavily on the Google API. We will work out a better solution in the near future.
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
Author
Oreste Attanasio
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
In some test or development environments, there may be a need to simulate the presence of GSM modems without having physical devices. This can be useful, for example, to test monitoring checks, SMS management systems, or to create new notification Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More
In a previous post we went through the configuration of Elastic Universal Profiling in NetEye, seeing how we can profile applications written in programming languages that do not compile to native code (for example Python, PHP, Perl, etc.) But what Read More