Icinga Director Self Service API Not Working After Keycloak Activation
After updating to NetEye version 4.38 and activating authentication via Keycloak, the Icinga Director Self Service API no longer works.
For instance if you install the Icinga agents using a Powershell script that automatically creates the host objects in the Icinga Director when it’s called, then this process will no longer work.
That means you can no longer roll out new agents using this procedure. Until this error is fixed, you must use the following workaround, which involves changing the authentication method in the file /usr/share/icingaweb2/modules/neteye/library/Neteye/Authentication/OAuthBackend.php by adding these four lines:
public function authenticate(User $user, $password = null){
// Start workaround
$currentPath = parse_url($_SERVER['REQUEST_URI'], PHP_URL_PATH);
if (strpos($currentPath, '/neteye/director/self-service') === 0) {
return false;
}
// End workaround
// Skip the backend if the user is already authenticated
$auth = Auth::getInstance();
if ($auth->getUser() !== null) {
…
If you have a NetEye cluster system, you must make this change on all master nodes. After this change, you don’t need to restart any services.
The resolution of this problem should be available in the next few weeks via a NetEye update.
I started my professional career as a system administrator.
Over the years, my area of responsibility changed from administrative work to the architectural planning of systems.
During my activities at Würth Phoenix, the focus of my area of responsibility changed to the installation and consulting of the IT system management solution WÜRTHPHOENIX NetEye.
In the meantime, I take care of the implementation and planning of customer projects in the area of our unified monitoring solution.
Author
Tobias Goller
I started my professional career as a system administrator.
Over the years, my area of responsibility changed from administrative work to the architectural planning of systems.
During my activities at Würth Phoenix, the focus of my area of responsibility changed to the installation and consulting of the IT system management solution WÜRTHPHOENIX NetEye.
In the meantime, I take care of the implementation and planning of customer projects in the area of our unified monitoring solution.
It's really easy now to activate OTP on your personal account with NetEye with our new authentication method. In the latest 4.38 version of NetEye we've introduced a new product to manage authentication (documentation here). In the future thanks to Read More
We all know that NetEye can grant access to its Web Interface through local users, or through the use of LDAP queries that can filter and grant GUI access to users or groups of a given Active Directory domain. What Read More
Use Case Suppose we want to trigger Fusion Inventory execution in a GLPI installation, where we can then use the Autonomous mode to import data into GLPI via a CURL request. Let's see how JWT (JSON Web Token) can help Read More
Until now, authentication of NetEye users on Grafana was achieved by means of session cookies, which were provided by the Grafana server when authenticating in Icinga Web 2. However, with the upgrade of Grafana from version 5.2 to version 6.2, Read More
Massimo Giaimo, Senior System & Network Administrator at IBT, shares his experience with Alyvix and NetEye. What are the most recent significant changes in the application monitoring? For decades, IT departments have mainly implemented performance-monitoring strategies through the control of Read More