Quantcast
Channel: Zenoss Community : Document List - 2.5.2
Viewing all articles
Browse latest Browse all 10

Zenoss Extended Monitoring

0
0

Zenoss Extended Monitoring

This work is licensed under a Creative Commons Attribution Share Alike 3.0 License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/; or send a letter to Creative Commons, 171 2nd Street, Suite 300, San Francisco, California, 94105, USA.

 

 

The Zenoss logo is a registered trademark of Zenoss, Inc. Zenoss and Open Enterprise Management are trademarks of Zenoss, Inc. in the U.S. and other countries.

Amazon Web Services, AWS, Amazon Elastic Compute Cloud, and Amazon EC2 are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries.

Flash is a registered trademark of Adobe Systems Incorporated.

Java is a registered trademark of Sun Microsystems, Inc.

Linux is a registered trademark of Linus Torvalds.

Oracle and the Oracle logo are registered trademarks of the Oracle Corporation.

SNMP Informant is a trademark of Garth K. Williams (Informant Systems, Inc.).

Sybase is a registered trademark of Sybase, Inc.

Tomcat is a trademark of the Apache Software Foundation.

VMware is registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.

Windows is a registered trademark of Microsoft Corporation in the United States and other countries.

All other companies and products mentioned are trademarks and property of their respective owners.

 

Part Number: 07-022010-2.5-v02


Table of Contents

1. ZenPacks
1. Introduction to ZenPacks
2. Installing ZenPacks
2.1. Installing from the Command Line
2.2. Installing from the User Interface
2.3. Installing All Core ZenPacks from RPM
3. Creating a ZenPack
3.1. Packaging and Distributing Your ZenPack
4. Displaying Installed ZenPacks
5. Removing a ZenPack
I. Core ZenPacks
2. Amazon Web Services
1. About
2. Prerequisites
3. Setup
4. Working with the EC2Manager Account
4.1. CloudWatch Data
4.2. Templates and Collection
4.2.1. Example: Initiating Load-Based Elasticity for an EC2 Setup
3. Apache Web Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Display the Status Page in Apache Version 1.3 or higher
3.2. Display the Status Page in Apache Version 2.x
3.3. Verifying your Apache configuration
3.4. Configure Zenoss to Monitor the Web Server
4. Daemons
4. Dell Hardware
1. About
2. Prerequisites
3. Enable Enhanced Modeling
4. Daemons
5. Distributed Name Server (DNS)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
6. File Transfer Protocol (FTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Enable Secure Site Monitoring
5. Tuning for Site Responsiveness
6. Daemons
7. HP PC Hardware
1. About
2. Prerequisites
3. Enable Enhanced Modeling
4. Daemons
8. Internet Relay Chat (IRC)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
9. Jabber Instant Messaging
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
10. Java 2 Platform Standard Edition (J2E)
1. About
1.1. JMX Background
1.2. ZenJMX Capabilities
1.3. Allowable Parameter Types
1.4. Single Value Attribute Calls
1.5. Complex-Value Attribute Calls
1.6. Example Method Calls
1.6.1. No parameters, single return value
1.6.2. No parameters, multiple values returned in List format
1.6.3. No parameters, multiple values returned in Map format
1.6.4. Single parameter in polymorphic operation
1.6.5. Multiple parameters in polymorphic operations
2. Prerequisites
2.1. Sun Java Runtime Environment (JRE)
3. Example to Monitor a JMX Value
3.1. Enabling Remote JMX Access
3.2. Configure Zenoss with a Custom Data Source
4. Monitor Values in TabularData and CompositeData Objects
5. Using JConsole to Query a JMX Agent
6. Daemons
11. Lightweight Directory Access Protocol (LDAP) Response Time
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
12. MySQL Database
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Authorize MySQL Performance Data Access
3.2. Zenoss
4. Daemons
13. Network News Transport Protocol (NNTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
14. Network Time Protocol (NTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
15. ONC-style Remote Procedure Call (RPC)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
16. SSH Monitoring Example
1. About
2. Prerequisites
3. Set Linux Server Monitoring Credentials
4. Add a Linux Server
5. Troubleshooting
6. Daemons
17. Web Page Response Time (HTTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Check for a Specific URL or Specify Security Settings
5. Check for Specific Content on the Web Page
6. Tuning for Site Responsiveness
7. Daemons
18. Xen Virtual Hosts
1. About
2. Prerequisites
3. Model Hosts and Guest
4. Daemons
II. Enterprise ZenPacks
19. AIX
1. About
2. Prerequisites
3. Add an AIX Server
4. Set AIX Server Monitoring Credentials
5. Resolving CHANNEL_OPEN_FAILURE Issues
6. Resolving Command timed out Issues
7. Daemons
20. Apache Tomcat Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Tomcat to Allow JMX Queries
3.2. Configuring Zenoss
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Daemons
21. BEA WebLogic Application Server
1. About
1.1. Overall Application Server Vitals
1.2. Entity EJB, Message Driven Bean (MDB), and Session EJB Subsystem Metrics
1.3. Data Pool (JDBC) metrics
1.4. Queue (JMS) Metrics
2. Prerequisites
3. Enable Monitoring
3.1. Configuring WebLogic to Allow JMX Queries
3.2. Configuring Zenoss
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Monitor SSL-Proxied WebLogic Servers
7. Daemons
22. BIG-IP Network Devices
1. About
2. Prerequisites
3. Enable Monitoring
4. Viewing Virtual Servers
5. Daemons
23. Brocade SAN Switches
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Brocade Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Viewing Fibre Channel Port Information
5. Daemons
24. CheckPoint Firewalls
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring CheckPoint Firewalls to Allow SNMP Queries
3.2. Configuring Zenoss
4. Daemons
25. Cisco Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Cisco Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Forwarding Syslog Messages to Zenoss
5. Extended Capabilities for Cisco Devices
5.1. IOS
5.2. CatOS
5.3. ASA, FWSM and PIX
5.4. Wireless LAN Controllers
5.5. ACE Load Balancers
5.6. Telepresence Codecs
6. Daemons
26. Datacenter View
1. About
2. Prerequisites
3. Working with the List View
4. Working with the Custom View
4.1. Adding a Background Image to the Custom View
4.1.1. Removing the Custom View Background Image
4.2. Working with Devices in the Custom View
4.3. Removing the Custom View
5. Activating the Auto-Generated Rack View
27. Device Access Control Lists
1. About
2. Prerequisites
3. Key Concepts
3.1. Permissions and Roles
3.2. Administered Objects
3.3. Users and Groups
3.4. Assigning Administered Object Access
3.5. Restricted Screen Functionality
3.5.1. Dashboard
3.5.2. Device List
3.5.3. Device Organizers
3.5.4. Reporting
3.5.5. Viewing Events
4. Create a User Restricted to Specific Devices
5. Create a Manager Restricted to Specific Devices
6. Adding Device Organizers
7. Restricted User Organizer Management
28. Distributed Collector
1. About
1.1. Navigating Existing Collectors and Hubs
1.2. Restrictions and Requirements
1.3. Installation Notes
1.4. Firewall Notes
1.5. Platform Notes
1.6. Debugging
2. Prerequisites
3. Typical Usage Scenarios for Distributed Monitoring
3.1. ZeoDB - Local Hub - Local Collector
3.2. ZeoDB - Local Hub - Remote Collector
3.3. ZeoDB - Local Hub - Multiple Remote Collectors
3.4. ZeoDB - Multiple Remote Hubs - Multiple Remote Collectors
4. Deploying Collectors
4.1. Prerequisite Tasks
4.2. Adding Collectors
4.2.1. Install Remotely (Root Password)
4.2.2. Install Remotely (Root SSH Keys)
4.2.3. Install Remotely (Zenoss SSH Keys)
4.2.4. Install Locally
4.3. Deleting Collectors
4.4. Updating a Hub or Collector
4.5. Backing Up Remote Collectors
5. Adding Devices to Collectors
5.1. Moving Devices Between Collectors
6. Managing the Collector Daemons
7. Deploying Hubs
7.1. Configuring MySQL for Remote Hubs
7.2. Add a Hub
7.2.1. Install Remotely (Root Password)
7.2.2. Install Remotely (Root SSH Keys)
7.2.3. Install Remotely (Zenoss SSH Keys)
7.3. Setting Up SSH Keys for Distributed Collector
29. Enterprise Collector
1. About
2. Prerequisites
3. Enabling Enterprise Collector
30. Enterprise Linux
1. About
2. Prerequisites
3. Add a Linux Server
4. Set Linux Server Monitoring Credentials
5. Resolving CHANNEL_OPEN_FAILURE Issues
6. Resolving Command timed out Issues
7. DMIDECODE Modeler Plugin
8. Daemons
31. Enterprise Reports
1. About
1.1. 95th Percentile
1.2. Alert Rule Email Addresses
1.3. Defined Thresholds
1.4. Event Time to Resolution
1.5. Interface Volume
1.6. Maintenance Windows
1.7. Organizer Availability
1.8. User Event Activity
1.9. Users Group Membership
2. Viewing Enterprise Reports
3. Prerequisites
32. Enterprise Security
1. About
2. Prerequisites
3. Enabling Password Encryption
33. Foundry Device
1. About
2. Prerequisites
3. Configuring Zenoss
4. Daemons
34. Hewlett Packard UNIX
1. About
2. Prerequisites
3. Limitations
4. Add an HP-UX Device for Monitoring
5. Set HP-UX Server Monitoring Credentials
5.1. Set Credentials for the Device
5.2. Set Credentials for the Device Class
6. Resolving CHANNEL_OPEN_FAILURE Issues
7. Resolving Command time out Issues
8. Daemons
35. JBoss Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring JBoss to Allow JMX Queries
3.2. Configuring Zenoss
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Daemons
36. Juniper Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Juniper Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Daemons
37. LDAP Authentication
1. About
2. Prerequisites
2.1. LDAP Configuration Information
3. Limitations
4. Authenticating with Microsoft Active Directory
4.1. Adding the Authentication Plugin
4.2. Configuring Plugin Settings
4.3. Enabling Group to Role Mapping
4.4. Verifying Connectivity and Credentials Outside of Zenoss
5. Authenticating with other LDAP Servers
6. Optimizing Authentication with a Cache
7. Configuring Local Authentication as a Fallback
38. Mail Transactions
1. About
1.1. Events
2. Prerequisites
3. Enable Monitoring
4. Daemons
39. MS Active Directory
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
40. MS Exchange
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
41. Microsoft Internet Information Services (IIS)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
42. Microsoft SQL Server
1. About
2. Prerequisites
3. Enable Monitoring
4. Collecting Information from Non-Default Microsoft SQL Server Instances
5. Daemons
43. Multi-Realm IP Networks
1. About
2. Prerequisites
3. Example System
4. System Setup
4.1. Adding Realms
4.2. Adding Collectors to Realms
4.3. Adding Devices to Realms
5. Notes
44. NetApp Filers
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring NetApp Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Daemons
45. NetScreen Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring NetScreen Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Daemons
46. Nortel Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Nortel Devices to Allow SNMP Queries
3.2. Configuring Zenoss
4. Daemons
47. Oracle
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Authorize Oracle Performance Data Access
3.2. Configure Zenoss
4. Monitor Multiple SIDs without DNS Aliases
5. Monitor Multiple SIDs with DNS Aliases
6. Daemons
48. Predictive Thresholding
1. About
2. Prerequisites
3. Add a Predictive Threshold
49. RANCID Integration
1. About
2. Prerequisites
3. Enable Integration
3.1. Configure Cisco Devices to Send Traps
3.2. Configure RANCID Update Information in Zenoss
50. Remedy Ticket Creation
1. About
2. Prerequisites
3. Enable Ticket Creation
4. Send Test Tickets
5. Daemons
51. SNMP Trap Forwarding
1. About
2. Prerequisites
3. Enable Event Forwarding
3.1. Import Zenoss MIB onto the Remote Receiver
3.2. Configure Zenoss to Send Events as Traps
4. Send Test Events
5. Daemons
52. Solaris
1. About
2. Prerequisites
3. Limitations
4. Set Solaris Server Monitoring Credentials
5. Enable Monitoring
6. Resolving CHANNEL_OPEN_FAILURE Issues
7. Resolving Command time out Issues
8. Daemons
53. SQL Transactions
1. About
2. Prerequisites
3. Enable SQL Server Monitoring
4. Enable Sybase Server Monitoring
5. Enable MySQL Server Monitoring
6. Storing Query Results
7. Daemons
54. Sugar CRM
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Sugar CRM to Allow Queries
3.2. Configuring Zenoss
4. Daemons
55. VMware ESX
1. About
2. Prerequisites
3. Monitoring VMware ESX Servers
4. Enabling SNMP Subagents
5. Daemons
56. VMware Virtual Hosts
1. About
1.1. VMware Events
1.1.1. Migration Events
2. Prerequisites
3. Enable Monitoring
4. Viewing VMware Devices
5. Viewing Guest Virtual Machines
6. Adding a Custom Metric
7. Moving VMware Devices Between Collectors
8. Daemons
8.1. Tuning Options
57. WebSphere Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configure WAS for Monitoring
3.2. Zenoss
4. Examples
5. Daemons
58. Web-Based Synthetic Transactions
1. About
1.1. Data Points
1.2. Event Generation
2. Prerequisites
3. Enable Monitoring
4. Creating twill Commands
4.1. Creating twill Commands from TestGen4Web
4.2. Creating twill Commands Manually
5. Monitoring through Proxy Servers
5.1. Example Proxy Setup
5.2. Testing the Proxy Setup
6. Daemons
59. Windows Performance
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Defining Windows Credentials
3.2. Add Devices in Zenoss
4. Monitor Other Performance Counters
5. Testing Connections from Windows
6. Testing Connections from Zenoss
7. Modify Registry Settings for Firewalls in Secure Environments
8. Configuring a Standalone Windows Device for a Non-Administrative Account
9. Tuning Collector Daemon Performance
60. Zenoss Global Dashboard
1. About
2. Prerequisites
3. Configuration
3.1. Install the ZenGlobe Web Server
3.2. Configure Remote Zenoss for Monitoring
3.3. Configure ZenGlobe to Monitor Remote Zenoss Instances
4. Viewing a Remote Zenoss Instance
5. Ending a Session
61. ZenOperator Role
1. About
2. Prerequisites
A. twill Commands Reference
1. About
2. Browsing
3. Assertions
4. Display
5. Forms
6. Cookies
7. Debugging
8. Other Commands
9. Details on Form Handling
10. ZenWebTx Extensions to twill
10.1. twilltiming
10.2. twillextract
10.3. twillxpathextract
10.4. ignorescripts


Viewing all articles
Browse latest Browse all 10

Latest Images

Trending Articles





Latest Images