Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Zenoss Core 3.x Network and System Monitoring

You're reading from   Zenoss Core 3.x Network and System Monitoring A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system

Arrow left icon
Product type Paperback
Published in Apr 2011
Publisher Packt
ISBN-13 9781849511582
Length 312 pages
Edition 1st Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Michael Badger Michael Badger
Author Profile Icon Michael Badger
Michael Badger
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Zenoss Core 3.x Network and System Monitoring
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Network and System Monitoring with Zenoss Core 2. Discovering Devices FREE CHAPTER 3. Device Setup and Administration 4. Monitor Status and Performance 5. Custom Monitoring Templates 6. Core Event Management 7. Collecting Events 8. Settings and Administration 9. Extending Zenoss Core with ZenPacks 10. Reviewing Built-in Reports 11. Writing Custom Device Reports Event Attributes
Device Attributes
Example snmpd.conf
Index

Summary


In order to monitor a device, we need to tell Zenoss Core how to monitor the device. Our options include SNMP, WMI, or Zenoss Plugins over SSH. Then we have to make sure the monitored devices are configured to respond to the monitoring protocol Zenoss Core uses for each device.

As you look at your Zenoss Core device list, you should see a list of devices. However, you may see several events that indicate Zenoss Core is not able to model devices correctly. Events could also signify there's a problem with the monitored device, but we're just starting out. It's more likely we need to tweak the monitoring properties of each device.

A common point of failure in establishing the relationship between the monitoring server and monitored device is credentials. If you are having problems, make sure Zenoss Core can authenticate using the unique credentials for each device.

Our monitoring protocols also require access to specific ports. In this chapter, we outlined the common ports that Zenoss...

You have been reading a chapter from
Zenoss Core 3.x Network and System Monitoring
Published in: Apr 2011
Publisher: Packt
ISBN-13: 9781849511582
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image