Summary
In order to monitor a device, we need to tell Zenoss Core how to monitor the device. Our options include SNMP, WMI, or Zenoss Plugins over SSH. Then we have to make sure the monitored devices are configured to respond to the monitoring protocol Zenoss Core uses for each device.
As you look at your Zenoss Core device list, you should see a list of devices. However, you may see several events that indicate Zenoss Core is not able to model devices correctly. Events could also signify there's a problem with the monitored device, but we're just starting out. It's more likely we need to tweak the monitoring properties of each device.
A common point of failure in establishing the relationship between the monitoring server and monitored device is credentials. If you are having problems, make sure Zenoss Core can authenticate using the unique credentials for each device.
Our monitoring protocols also require access to specific ports. In this chapter, we outlined the common ports that Zenoss...