Thank you. It looks like what I need is described in Appendix A of the Admin Guide, as well as section 9.12.
Section 9.13 "Modelling Using SSH/Command" would seem to offer a simple solution for my security concerns with a remote server. I'm attempting to follow that section now. -------------------- m2f -------------------- Read this topic online here: http://community.zenoss.com/forums/viewtopic.php?p=22170#22170 -------------------- m2f -------------------- _______________________________________________ zenoss-users mailing list [email protected] http://lists.zenoss.org/mailman/listinfo/zenoss-users
