# LDAP monitoring plugin [[inputs.ldap]] ## Server to monitor ## The scheme determines the mode to use for connection with ## ldap://... -- unencrypted (non-TLS) connection ## ldaps://... -- TLS connection ## starttls://... -- StartTLS connection ## If no port is given, the default ports, 389 for ldap and starttls and ## 636 for ldaps, are used. server = "ldap://localhost" ## Server dialect, can be "openldap" or "389ds" # dialect = "openldap" # DN and password to bind with ## If bind_dn is empty an anonymous bind is performed. bind_dn = "" bind_password = "" ## Reverse the field names constructed from the monitoring DN # reverse_field_names = false ## Optional TLS Config ## Set to true/false to enforce TLS being enabled/disabled. If not set, ## enable TLS only if any of the other options are specified. # tls_enable = ## Trusted root certificates for server # tls_ca = "/path/to/cafile" ## Used for TLS client certificate authentication # tls_cert = "/path/to/certfile" ## Used for TLS client certificate authentication # tls_key = "/path/to/keyfile" ## Password for the key file if it is encrypted # tls_key_pwd = "" ## Send the specified TLS server name via SNI # tls_server_name = "kubernetes.example.com" ## Minimal TLS version to accept by the client # tls_min_version = "TLS12" ## List of ciphers to accept, by default all secure ciphers will be accepted ## See https://pkg.go.dev/crypto/tls#pkg-constants for supported values. ## Use "all", "secure" and "insecure" to add all support ciphers, secure ## suites or insecure suites respectively. # tls_cipher_suites = ["secure"] ## Renegotiation method, "never", "once" or "freely" # tls_renegotiation_method = "never" ## Use TLS but skip chain & host verification # insecure_skip_verify = false