TOP LEVEL CATEGORIES
EXPLORE
@tom.molin
Favorites 0
Views 1505
You need to set up SSH Key authentication for the monitoring user (see below). Instructions/Documentation: you need ssh keyless authentication for this plugin. You can…