log, syslog, logrotate SNMP tools for monitoring

Size: px
Start display at page:

Download "log, syslog, logrotate SNMP tools for monitoring"

Transcription

1 log, syslog, logrotate SNMP tools for monitoring ASI Master M2 ASR - Luiz Angelo STEFFENEL - L Steffenel

2 Syslog and Log files L Steffenel

3 Outline Log files What need to be logged Logging policies Finding log files Syslog: the system event logger how syslog works its configuration file the software that uses syslog debugging syslog L Steffenel

4 What to be logged? The accounting system The kernel Various utilities all produce data that need to be logged most of the data has a limited useful lifetime, and needs to be summarized, compressed, archived and eventually thrown away L Steffenel

5 Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and archive to tape or other permanent media L Steffenel

6 Which one to choose Depends on : how much disk space you have how security-conscious you are Whatever scheme you select, regular maintenance of log files should be automated using cron L Steffenel

7 Throwing away log files not recommend security problems ( accounting data and log files provide important evidence of break-ins) helpful for alerting you to hardware and software problems. In general, keep one or two months in a real world, it may take one or two weeks for SA to realize that site has been compromised by a hacker and need to review the logs L Steffenel

8 Throwing away (cont.) Most sites store each day s log info on disk, sometimes in a compressed format These daily files are kept for a specific period of time and then deleted One common way to implement this policy is called rotation L Steffenel

9 Rotating log files Keep backup files that are one day old, two days old, and so on. logfile, logfile.1, logfile.2, logfile.7 Each day rename the files to push older data toward the end of the chain script to archive three days files L Steffenel

10 #! /bin/sh cd /var/log mv logfile.2 logfile.3 mv logfile.1 logfile.2 mv logfile logfile.1 cat /dev/null > logfile Some daemons keep their log files open all the time, this script can t be used with them. To install a new log file, you must either signal the daemon, or kill and restart it. L Steffenel

11 #! /bin/sh cd /var/log mv logfile.2.z logfile.3.z mv logfile.1.z logfile.2.z mv logfile logfile.1 cat /dev/null > logfile kill -signal pid compress logfile.1 signal - appropriate signal for the program writing the log file pid - process id L Steffenel

12 Archiving log files Some sites must archive all accounting data and log files as a matter of policy, to provide data for a potential audit Log files should be first rotate on disk, then written to tape or other permanent media L Steffenel

13 Finding log files To locate log files, read the system startup scripts : /etc/rc* or /etc/init.d/* if logging is turned on when daemons are run where messages are sent Some programs handle logging via syslog check /etc/syslog.conf to find out where this data goes L Steffenel

14 Finding log files Different operating systems put log files in different places: /var/log/* /var/cron/log /usr/adm /var/adm On linux, all the log files are in /var/log directory. L Steffenel

15 Outline Log files What need to be logged Logging policies Finding log files Syslog: the system event logger how syslog works its configuration file debugging syslog the software that uses syslog L Steffenel

16 What is syslog A comprehensive logging system, used to manage information generated by the kernel and system utilities. Allow messages to be sorted by their sources and importance, and routed to a variety of destinations: log files, users terminals, or even other machines. L Steffenel

17 Syslog: three parts Syslogd and /etc/syslog.conf the daemon that does the actual logging its configuration file openlog, syslog, closelog library routines that programs use to send data to syslogd logger user-level command for submitting log entries L Steffenel

18 syslog-aware programs Using syslog lib. Routines write log entries to a special file /dev/log /dev/klog reads syslogd consults /etc/syslog.conf dispatches Log files Users s Other terminalsmachines L Steffenel

19 Configuring syslogd The configuration file /etc/syslog.conf controls syslogd s behavior. It is a text file with simple format, blank lines and lines beginning with # are ignored. Selector <TAB> action mail.info /var/log/maillog L Steffenel

20 Configuration file - selector Identify source -- the program ( facility ) that is sending a log message importance -- the messages s severity level eg. mail.info /var/log/maillog Syntax facility.level facility names and severity levels must chosen from a list of defined values L Steffenel

21 Configuration file - Facility names Facility kern user mail daemon auth lpr news Programs that use it The kernel User process, default if not specified The mail system System daemons Security and authorization related commands The BSD line printer spooling system The Usenet news system L Steffenel

22 Configuration file - Facility names Facility Programs that use it uucp Reserved for UUCP cron The cron daemon mark Timestamps generated at regular intervals local0-7 Eight flavors of local message syslog Syslog internal messages authpriv Private or system authorization messages ftp The ftp daemon, ftpd * All facilities except mark L Steffenel

23 Configuration file - Facility names Timestamps can be used to log time at regular intervals by default, every 20 minutes So you can figure out that your machine crashed between 3:00 and 3:20 am, not just sometime last night. This can be a big help if debugging problems occur on a regular basis. L Steffenel

24 Configuration file - severity level Level emerg (panic) alert crit err warning notice info debug Approximate meaning Panic situation Urgent situation Critical condition Other error conditions Warning messages Unusual things that may need investigation Informational messages For debugging L Steffenel

25 Configuration file - selector Can include multiple facilities separated with, commas daemon,auth,mail.level action Multiple selector can be combined with ; daemon.level1; mail.level2 action Selector are --ORed together, a message matching any selector will be subject to the action. Can contain * or none, meaning all or nothing. L Steffenel

26 Configuration file - selector Levels indicate the minimum importance that a message must have in order to be logged mail.warning, would match all the messages from mail system, at the minimum level of warning Level of none will excludes the listed facilities regardless of what other selectors on the same line may say. *.level1;mail.none action all the facilities, except mail, at the minimum level 1 will subject to action L Steffenel

27 Configuration file - action (Tells what to do with a message) Action Meaning filename Write message to a file on the local Forward message to the syslogd on Forward message to the host at IP address user1, user2, Write message to users screens if they are logged in * Write message to all users logged in L Steffenel

28 Configuration file - action If a filename action used, the filename must be absolute path. The file must exist, syslogd will not create it. /var/log/messages If a hostname is used, it must be resolved via a translation mechanism such as DNS or NIS While multiple facilities and levels are allowed in a selector, multiple actions are not allowed. L Steffenel

29 Config file examples # Small network or stand-alone syslog.conf file # emergencies: tell everyone who is logged on *.emerg * # important messages *.warning;daemon,auth.info /var/adm/messages # printer errors lpr.debug /var/adm/lpd-errs L Steffenel

30 # network client, typically forwards serious messages to # a central logging machine # emergencies: tell everyone who is logged on *.emerg;user.none * #important messages, forward to central logger # local stuff to central logger too local0,local2,local7.debug # card syslogs to local1 - to boulder local1.debug # printer errors, keep them /var/adm/lpd-errs # sudo logs to local2 - keep a copy here local2.info /var/adm/sudolog L Steffenel

31 Sample syslog output Dec 27 02:45:00 x-wing netinfod [71]: cann t lookup child Dec 27 02:50:00 bruno ftpd [27876]: open of pid file failed: not a directory Dec 27 02:50:47 anchor vmunix: spurious VME interrupt at processor level 5 Dec 27 02:52:17 bruno pingem[107]: moose.cs.colorado.edu has not answered 34 times Dec 27 02:55:33 bruno sendmail [28040] : host name/address mismatch: != bull.bull.fr L Steffenel

32 Syslog s functions Liberate programmers from the tedious mechanics of writing log files Put SA in control of logging before syslog, SA had no control over what info was kept or where it was stored. Can centralize the logging for a network system L Steffenel

33 Syslogd (cont.) A hangup signal (HUP, signal 1) cause syslogd to close its log files, reread its configuration file, and start logging again. If you modify the syslog.conf file, you must HUP syslogd to make your changes take effect. kill -1 pid L Steffenel

34 Software that uses syslog Program Facility Levels Description amd auth err-info NFS automounter date auth notice Display and set date ftpd daemon err-debug ftp daemon gated daemon alert-info Routing daemon apache daemon err Internet info server halt/reboot auth crit Shutdown programs login/rlogind auth crit-info Login programs lpd lpr err-info BSD line printer daemon L Steffenel

35 Software that uses syslog Program Facility Levels Description named daemon err-info Name sever (DNS) passwd auth err Password setting programs sendmail mail debug-alert Mail transport system rwho daemon err-notice romote who daemon su auth crit, notice substitute UID prog. sudo local2 notice, alert Limited su program syslogd syslog,mark err-info internet errors, timestamps L Steffenel

36 Final words On linux, check following files: /etc/syslog.conf : syslog configuration file /etc/logrotate.conf : logging policy, rotate /etc/logrotate.d/* /var/log/* : log files try following commands to find out more... man logrotate man syslogd L Steffenel

37 SNMP L Steffenel

38 Overview Introduction Management Information Base (MIB) Simple Network Management Protocol (SNMP) SNMP Commands Tools - SNMPwalk (CLI) - MIB Browser (GUI) L Steffenel

39 Introduction (1) SNMP - Application-layer protocol for managing TCP/IP based networks. - Runs over UDP, which runs over IP (2) NMS (Network Management Station) - Device that pools SNMP agent for info. (3) SNMP Agent - Device (e.g. Router) running software that understands SNMP language (4) MIB - Database of info conforming to SMI. (5) SMI Structure of Management Information - Standard that defines how to create a MIB. L Steffenel

40 MIB Management Information Base MIB Breakdown - OBJECT-TYPE - String that describes the MIB object. - Object IDentifier (OID). - SYNTAX - Defines what kind of info is stored in the MIB object. - ACCESS - READ-ONLY, READ-WRITE. - STATUS - State of object in regards the SNMP community. - DESCRIPTION - Reason why the MIB object exists. Standard MIB Object: sysuptime OBJECT-TYPE SYNTAX Time-Ticks ACCESS read-only STATUS mandatory DESCRIPTION Time since the network management portion of the system was last reinitialised. ::= {system 3} L Steffenel

41 MIB Management Information Base Object IDentifier (OID) 1 iso(1) org(3) - Example dod(6) - iso(1) org(3) dod(6) internet(1) mgmt(2) mib-2(1) system(1) directory(1) 6 1 internet(1) 4 private(4) Note: ~100% present. - mgmt and private most common. - MIB-2 successor to original MIB. - STATUS mandatory, All or nothing in group 1 1 system(1) 2 mgmt(2) mib-2(1) 1 interfaces(2) 3 experimental(3) tcp(6) 6 ip(4) 2 4 L Steffenel

42 MIB Management Information Base system(1) group - Contains objects that describe some basic information on an entity. - An entity can be the agent itself or the network object that the agent is on. 1 system(1) 2 1 mib-2(1) interfaces(2) system(1) group objects - sysdescr(1) Description of the entity. - sysobjectid(2) Vendor defined OID string. - sysuptime(3) Time since net-mgt was last re-initialised. - syscontact(4) Name of person responsible for the entity. L Steffenel

43 MIB Management Information Base MIB - tree view MIB - syntax view 1 sysdesc(1) system(1) 1 sysobjectid(2) 2 mib-2(1) 1 syscontact(3) 4 sysuptime(3) 3 sysuptime OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION The time (in hundredths of a second) since the network management portion of the system was last re-initialized. ::= {system 3} L Steffenel

44 MIB Management Information Base SNMP Instances - Each MIB object can have an instance. - A MIB for a router s (entity) interface information iso(1) org(3) dod(6) internet(1) mgmt(2) mib-2(1) interfaces(2) iftable(2) ifentry(1) iftype(3) - Require one iftype value per interface (e.g. 3) - One MIB object definition can represent multiple instances through Tables, Entries, and Indexes. L Steffenel

45 MIB Management Information Base Tables, Entries, and Indexes. - Imagine tables as spreadsheets - Three interface types require 3 rows (index no.s) - Each column represents a MIB object, as defined by the entry node. ENTRY + INDEX = INSTANCE iftype(3) ifmtu(4) Etc Index #1 Index #2 Index #3 iftype.1[6] iftype.2:[9] iftype.3:[15] ifmtu.1 ifmtu.2 ifmtu.3 L Steffenel

46 MIB Management Information Base Example MIB Query - If we queried the MIB on iftype we could get: - iftype.1 : 6 - iftype.2 : 9 - iftype.3 : 15 Which corresponds to - iftype.1 : ethernet - iftype.2 : tokenring - iftype.3 : fddi iftype OBJECT-TYPE SYNTAX INTEGER { other(1), ethernet(6), tokenring(9) fddi(15), } etc L Steffenel

47 Simple Network Management Protocol Retrieval protocol for MIB. Can retrieve by - CLI (snmpwalk), - GUI (MIB Browser), or - Larger applications (Sun Net Manager) called Network Management Software (NMS). NMS collection of smaller applications to manage network with illustrations, graphs, etc. NMS run on Network Management Stations (also NMS), which can run several different NMS software applications. L Steffenel

48 SNMP Commands SNMP has 5 different functions referred to as Protocol Data Units (PDU s), which are: (1) GetRequest, aka Get (2) GetNextRequest, aka GetNext (3) GetResponse, aka Response (4) SetRequest, aka Set (5) Trap L Steffenel

49 SNMP Commands [Get] GetRequest [Get] - Most common PDU. - Used to ask SNMP agent for value of a particular MIB agent. - NMS sends out 1 Get PDU for each instance, which is a unique OID string. - What happens if you don t know how many instances of a MIB object exist? L Steffenel

50 SNMP Commands [GetNext] GetNextRequest [GetNext] - NMS application uses GetNext to walk down a table within a MIB. - Designed to ask for the OID and value of the MIB instance that comes after the one asked for. - Once the agent responds the NMS application can increment its count and generate a GetNext. - This can continue until the NMS application detects that the OID has changed, i.e. it has reached the end of the table. L Steffenel

51 SNMP Commands [GetResponse] GetResponse [Response] - Simply a response to a Get, GetNext or Set. - SNMP agent responds to all requests or commands via this PDU. L Steffenel

52 SNMP Commands [SetRequest] SetRequest [Set] - Issued by an NMS application to change a MIB instance to the variable within the Set PDU. - For example, you could issue a - GetRequest against a KDEG server asking for syslocation.0 and may get ORI as the response. - Then, if the server was moved, you could issue a Set against that KDEG server to change its location to INS. - You must have the correct permissions when using the set PDU. L Steffenel

53 SNMP Commands [Trap] Trap - Asynchronous notification. - SNMP agents can be programmed to send a trap when a certain set of circumstances arise. - Circumstances can be view as thresholds, i.e. a trap may be sent when the temperature of the core breaches a predefined level. L Steffenel

54 SNMP Security SNMP Community Strings (like passwords) - 3 kinds: - READ-ONLY: You can send out a Get & GetNext to the SNMP agent, and if the agent is using the same read-only string it will process the request. - READ-WRITE: Get, GetNext, and Set. If a MIB object has an ACCESS value of read-write, then a Set PDU can change the value of that object with the correct read-write community string. - TRAP: Allows administrators to cluster network entities into communities. Fairly redundant. L Steffenel

55 SNMP Tools Command Line Interface e.g. snmpwalk Graphical User Interface e.g. ireasoning s MIB Browser via L Steffenel

56 SNMP MIB Browser (1) Initial set-up... Breakdown - LHS is the SNMP MIB structure. - Lower LHS has details of MIB structure. - RHS will present MIB values. L Steffenel

57 SNMP MIB Browser (2) Discovery - Subnet: 134.XXX.XXX.* - Read Community: public Start Note IP Address. Stop L Steffenel

58 SNMP MIB Browser (3) Navigation - MIB Tree System sysuptime -Notice Lower LHS - Notice OID L Steffenel

59 SNMP MIB Browser (4) SNMP PDU s (1) Get - Select Go Get - RHS has values. - OID Value L Steffenel

60 SNMP MIB Browser (5) SNMP PDU s (2) GetNext -Selected OID is: Returned value: ( ) or DSG, O Reilly Institute, F.35 L Steffenel

61 SNMP MIB Browser (6) SNMP (3) Get SubTree -Position of MIB: (a.k.a. system) -RHS values: Returns all values below system. L Steffenel

62 SNMP MIB Browser (7) SNMP (4) Walk -MIB Location: (a.k.a. mib-2) - Returns *ALL* values under mib- 2 L Steffenel

63 SNMP MIB Browser (8) Tables - MIB Location: (or interfaces) - Select iftable, Go, then Table View. - Refresh/Poll L Steffenel

64 SNMP MIB Browser (9) SNMP - Graph - Select a value from the RHS, say sysuptime - Highlight and select Go, then Graph. - Interval = 1s set. L Steffenel

65 MRTG/RRDTool Ganglia L Steffenel

66 MRTG The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing PNG images which provide an almost live visual representation of this traffic. Check to see what it does. MRTG has been the most common network traffic measurement tool for all Service Providers MRTG uses simple SNMP queries on a regular interval to generate graphs L Steffenel

67 MRTG External readers for MRTG graphs can create other interpretation of data. MRTG software can be used not only to measure network traffic on interfaces, but also build graphs of anything that has an equivalent SNMP MIB - like CPU load, Disk availability, Temperature, etc... Data sources can be anything that provides a counter or gauge value not necessarily SNMP. For example, graphing round trip times MRTG can be extended to work with RRDTool L Steffenel

68 Running MRTG Get the required packages Compile and install the packages Make cfg files for router interfaces with cfgmaker Create html pages from the cfg files with indexmaker Trigger MRTG periodically from Cron or run it in daemon mode L Steffenel

69 L Steffenel

70 RRDtool Round Robin Database for time series data storage Command line based From the author of MRTG Made to be faster and more flexible Includes CGI and Graphing tools, plus APIs Solves the Historical Trends and Simple Interface problems L Steffenel

71 Define Data Sources (Inputs) DS:speed:COUNTER:600:U:U DS:fuel:GAUGE:600:U:U DS = Data Source speed, fuel = variable names COUNTER, GAUGE = variable type 600 = heart beat UNKNOWN returned for interval if nothing received after this amount of time U:U = limits on minimum and maximum variable values (U means unknown and any value is permitted) L Steffenel

72 Define Archives (Outputs) RRA:AVERAGE:0.5:1:24 RRA:AVERAGE:0.5:6:10 RRA = Round Robin Archive AVERAGE = consolidation function 0.5 = up to 50% of consolidated points may be UNKNOWN 1:24 = this RRA keeps each sample (average over one 5 minute primary sample), 24 times (which is 2 hours worth) 6:10 = one RRA keeps an average over every six 5 minute primary samples (30 minutes), 10 times (which is 5 hours worth) Clear as mud! all depends on original step size which defaults to 5 minutes L Steffenel

73 RRDtool Database Format Recent data stored once every 5 minutes for the past 2 hours (1:24) Old data averaged to one entry per day for the last 365 days (288:365) --step 300 (5 minute input step size) RRA 1:24 RRA 6:10 RRA 288:365 RRD File Medium length data averaged to one entry per half hour for the last 5 hours (6:10) L Steffenel

74 Isn't it simple?! rrdtool create /var/nagios/rrd/host0_load.rrd -s 600 DS:1MIN-Load:GAUGE:1200:0:100 DS:5MIN- Load:GAUGE:1200:0:100 DS:15MIN-Load:GAUGE:1200:0:100 RRA:AVERAGE:0.5:1:50400 RRA:AVERAGE:0.5:60:43800 rrdtool create /var/nagios/rrd/host0_disk_usage.rrd -s 600 DS:root:GAUGE:1200:0:U DS:home:GAUGE:1200:0:U DS:usr:GAUGE:1200:0:U DS:var:GAUGE:1200:0:U RRA:AVERAGE:0.5:1:50400 RRA:AVERAGE:0.5:60:43800 rrdtool create /var/nagios/rrd/apricot-intl_ping.rrd -s 300 DS:ping:GAUGE:600:0:U RRA:AVERAGE:0.5:1:50400 RRA:AVERAGE:0.5:60:43800 rrdtool create /var/nagios/rrd/host0_total.rrd -s 300 DS:IN:COUNTER:1200:0:U DS:OUT:COUNTER:600:0:U RRA:AVERAGE:0.5:1:50400 RRA:AVERAGE:0.5:60:43800 L Steffenel

75 Ping Latency Graph L Steffenel

76 Agenda Ganglia Monitoring Introduction and Overview Ganglia Architecture Apache Web Frontend Gmond & Gmetad Extending Ganglia GMetrics Module Development L Steffenel

77 Introduction and Overview Scalable Distributed Monitoring System Targeted at monitoring clusters and grids Multicast-based Listen/Announce protocol Depends on open standards XML XDR compact portable data transport RRDTool - Round Robin Database APR Apache Portable Runtime Apache HTTPD Server PHP based web interface or L Steffenel

78 Ganglia Architecture Gmond Metric gathering agent installed on individual servers Gmetad Metric aggregation agent installed on one or more specific task oriented servers Apache Web Frontend Metric presentation and analysis server Attributes Multicast All gmond nodes are capable of listening to and reporting on the status of the entire cluster Failover Gmetad has the ability to switch which cluster node it polls for metric data Lightweight and low overhead metric gathering and transport Ported to various different platforms (Linux, FreeBSD, Solaris, others) L Steffenel

79 Ganglia Architecture Apache Web Frontend Web Client GMETAD Poll Poll GMETAD Failover Poll Failover Failover Poll Cluster 1 Cluster 2 Cluster 3 GMOND Node GMOND Node GMOND Node GMOND Node GMOND Node GMOND Node GMOND Node GMOND Node GMOND Node L Steffenel

80 Ganglia Web Frontend Built around Apache HTTPD server using mod_php Uses presentation templates so that the web site look and feel can be easily customized Presents an overview of all nodes within a grid vs all nodes in a cluster Ability to drill down into individual nodes Presents both textual and graphical views L Steffenel

81 Ganglia Customized Web Front-end L Steffenel

82 Deploying Ganglia Monitoring See Install Gmond on all monitored nodes Edit the configuration file Add cluster and host information Configure network upd_send_channel, udp_recv_channel, tcp_accept_channel Start gmond Installing Gmetad on an aggregation node Edit the configuration file Add data and failover sources Add grid name Start gmetad Installing the web frontend Install Apache httpd server with mod_php Copy Ganglia web pages and PHP code to appropriate location Add appropriate authentication configuration for access control L Steffenel

83 Gmond Gathering & Gmetad Aggregation Agents L Steffenel

84 Gmond Metric Gathering Agent Built-in metrics Various CPU, Network I/O, Disk I/O and Memory Extensible Gmetric Out-of-process utility capable of invoking command line based metric gathering scripts Loadable modules capable of gathering multiple metrics or using advanced metric gathering APIs Built on the Apache Portable Runtime Supports Linux, FreeBSD, Solaris and more L Steffenel

85 Gmond Metric Gathering Agent Automatic discovery of nodes Adding a node does not require configuration file changes Each node is configured independently Each node has the ability to listen to and/or talk on the multicast channel Can be configured for unicast connections if desired Heartbeat metric determines the up/down status Thread pools Collection threads Capable of running specialized functions for gathering metric data Multicast listeners Listen for metric data from other nodes in the same cluster Data export listeners Listen for client requests for cluster metric data L Steffenel

86 Gmond Metric Collection Groups Specify as many collection groups as you like Each collection group must contain at least one metric section List available metrics by invoking gmond -m Collection_group section: collect_once Specifies that the group of static metrics collect_every Collection interval (only valid for non-static) time_threshold Max data send interval Metric section: Name Metric name (see gmond m ) Value_threshold Metric variance threshold (send if exceeded) L Steffenel

87 Gmetad Metric Aggregation Agent Polls a designated cluster node for the status of the entire cluster Data collection thread per cluster Ability to poll gmond or another gmetad for metric data Failover capability RRDTool Storage and trend graphing tool Defines fixed size databases that hold data of various granularity Capable of rendering trending graphs from the smallest granularity to the largest (eg. Last hour vs last year) Never grows larger than the predetermined fixed size Database granularity is configurable through gmetad.conf L Steffenel

88 Gmetad Configuration Data source and and failover designations data_source "my cluster" [polling interval] address1:port addreses2:port... RRD database storage definition RRAs "RRA:AVERAGE:0.5:1:244" "RRA:AVERAGE:0.5:24:244" "RRA:AVERAGE:0.5:168:244" "RRA:AVERAGE:0.5:672:244" "RRA:AVERAGE:0.5:5760:374" Access control trusted_hosts address1 address2 DN1 DN2 all_trusted OFF/on RRD files location rrd_rootdir "/var/lib/ganglia/rrds" Network xml_port 8651 interactive_port 8652 L Steffenel

89 Gmetad Configuration Example data_source "my cluster" 10 localhost my.machine.edu: :8655 data_source "my grid" :8655 grid.org:8651 grid-backup.org:8651 data_source "another source" : trusted_hosts my.gmetad.org xml_port 8651 interactive_port 8652 rrd_rootdir "/var/lib/ganglia/rrds" L Steffenel

MRTG / RRDTool. Network Management Workshop. June 2009 Papeete, French Polynesia

MRTG / RRDTool. Network Management Workshop. June 2009 Papeete, French Polynesia MRTG / RRDTool Network Management Workshop June 2009 Papeete, French Polynesia MRTG The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Gestão de Redes e Serviços, Segurança - Networks and Services Management, Security 1 Outline

More information

Syslog & xinetd. Stephen Pilon

Syslog & xinetd. Stephen Pilon Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2009-2010

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2009-2010 Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2009-2010 Arquitecturas de Redes 3 Gestão de Redes e Serviços -

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration If you aren't measuring it, you aren't managing it. Service Monitoring Syslog and Log files Historical data Real-time monitoring Alerting Active monitoring systems

More information

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy? Topics CIT 470: Advanced Network and System Administration Logging 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6. Log monitoring CIT 470: Advanced Network and System

More information

CSE/ISE 311: Systems Administra5on Logging

CSE/ISE 311: Systems Administra5on Logging Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why

More information

syslog - centralized logging

syslog - centralized logging syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?

More information

This watermark does not appear in the registered version - http://www.clicktoconvert.com. SNMP and OpenNMS. Part 1 SNMP.

This watermark does not appear in the registered version - http://www.clicktoconvert.com. SNMP and OpenNMS. Part 1 SNMP. SNMP and OpenNMS Part 1 SNMP Zeev Halevi Introduction Designed in 1987 by Internet Engineering Task Force (IETF) to send and receive management and status information across networks Most widely used network

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

Linux System Administration. System Administration Tasks

Linux System Administration. System Administration Tasks System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,

More information

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Contents Network Management MIB naming

More information

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC. VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)

More information

May 2002 16PZ-0502A-WWEN Prepared by: Internet & E-Commerce Solutions

May 2002 16PZ-0502A-WWEN Prepared by: Internet & E-Commerce Solutions May 2002 Prepared by: Internet & E-Commerce Solutions Contents Introduction... 3 Solution Overview... 3 Obtaining Compaq Management Agents (CMA) for Linux... 3 Integrating Compaq Management Agents MIBs

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016 Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula

More information

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing

More information

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) 1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network

More information

SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5

SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5 Syslog SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5 Overview Syslog messages are event messages and alerts that are sent by the operating system, applications

More information

AXIGEN Mail Server Reporting Service

AXIGEN Mail Server Reporting Service AXIGEN Mail Server Reporting Service Usage and Configuration The article describes in full details how to properly configure and use the AXIGEN reporting service, as well as the steps for integrating it

More information

Simple Network Management Protocol

Simple Network Management Protocol CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

Network Monitoring & Management Introduction to SNMP

Network Monitoring & Management Introduction to SNMP Network Monitoring & Management Introduction to SNMP Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial

More information

SNMP Basics BUPT/QMUL 2015-05-12

SNMP Basics BUPT/QMUL 2015-05-12 SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Determine the process of extracting monitoring information in Sun ONE Application Server

Determine the process of extracting monitoring information in Sun ONE Application Server Table of Contents AboutMonitoring1 Sun ONE Application Server 7 Statistics 2 What Can Be Monitored? 2 Extracting Monitored Information. 3 SNMPMonitoring..3 Quality of Service 4 Setting QoS Parameters..

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1 Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System

Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System DEPLOYMENT GUIDE Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System Version 1.0 Deploying F5 with Cacti Open Source Network Monitoring System Welcome to the F5 and Cacti deployment

More information

Users Manual OP5 Logserver 1.2.1

Users Manual OP5 Logserver 1.2.1 Users Manual OP5 Logserver 1.2.1 Copyright(C) 2003-2005 OP5 AB, www.op5.se Page 1 of 13 Table of Contents Users Manual...1 OP5 Logserver 1.2.1...1 Introduction... 3 Who is this manual for... 3 Syslog protocol...

More information

GANGLIA INSTALLATION GUIDE

GANGLIA INSTALLATION GUIDE GANGLIA INSTALLATION GUIDE -Prashant Bhamidipati (prashant@hepmail.uta.edu) Section-1 : Ganglia installation procedure Section-2 : GMOND & GMETAD Configuration 1 Section 1 Ganglia installation procedure

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

MRTG used for Basic Server Monitoring

MRTG used for Basic Server Monitoring MRTG used for Basic Server Monitoring SANS Institute Masters Presentation by T. Brian MRTG used for Basic Server Monitoring This presentation covers how-to instructions to establish basic server monitoring

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

Presented by Henry Ng

Presented by Henry Ng Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

MIB Explorer Feature Matrix

MIB Explorer Feature Matrix MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols

More information

Configuring System Message Logging

Configuring System Message Logging This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Monitoring, SNMP Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Users Guide and Reference

Users Guide and Reference TraffAcct A General Purpose Network Traffic Accountant Users Guide and Reference Version 1.3 June 2002 Table of Contents Introduction...1 Installation...2 Ember...2 SNMP Module...2 Web Server...2 Crontab...3

More information

Simple Network Management Protocol (SNMP) Primer

Simple Network Management Protocol (SNMP) Primer Xerox Multifunction Devices July 22, 2003 for the user Simple Network Management Protocol (SNMP) Primer Purpose This document introduces the history, purpose, basic functionality and common uses of SNMP

More information

Simple Network Management Protocol

Simple Network Management Protocol Simple Network Management Protocol Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outlines Basic Concepts Protocol Specification Transport-Level Support SNMP Group Practical

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

A Guide to Understanding SNMP

A Guide to Understanding SNMP A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

Cisco Setting Up PIX Syslog

Cisco Setting Up PIX Syslog Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring

More information

SNMP Extensions for a Self Healing Network

SNMP Extensions for a Self Healing Network SNMP Extensions for a Self Healing Network Background Patent 6,088,141: This is a self healing network depending on additional hardware. It requires a second ring of connection to handle recovery operations.

More information

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

Simple Network Management Protocol SNMP

Simple Network Management Protocol SNMP Kommunikationssysteme (KSy) - Block 7 Simple Network Management Protocol SNMP Dr. Andreas Steffen 2000-2001 A. Steffen, 12.02.2001, KSy_SNMP.ppt 1 Definitions client/server network management application

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized

More information

Network Monitoring. Dhruba Raj Bhandari (CCNA) Manager Systems Soaltee Crowne Plaza Kathmandu NEPAL bhandari.dhruba@scp.com.np

Network Monitoring. Dhruba Raj Bhandari (CCNA) Manager Systems Soaltee Crowne Plaza Kathmandu NEPAL bhandari.dhruba@scp.com.np Network Monitoring Dhruba Raj Bhandari (CCNA) Manager Systems Soaltee Crowne Plaza Kathmandu NEPAL bhandari.dhruba@scp.com.np Welcome! Network Management Workshop Network Monitoring Concepts, Tools And

More information

Livrable L13.3. Nature Interne Date livraison 12/07/2012. Titre du Document Energy management system and energy consumption efficiency - COEES Code v1

Livrable L13.3. Nature Interne Date livraison 12/07/2012. Titre du Document Energy management system and energy consumption efficiency - COEES Code v1 Propriétés du Document Source du Document FUI-10-COMPATIBLE ONE Titre du Document Energy management system and energy consumption efficiency - COEES Code v1 Module(s) Responsable Auteur(s) / contributeur(s)

More information

Demystifying SNMP. TruePath Technologies Inc 10/5/2015 2:11:14 PM Version 1.db. p.1

Demystifying SNMP. TruePath Technologies Inc 10/5/2015 2:11:14 PM Version 1.db. p.1 Demystifying SNMP p.1 Who is? US based, leading edge IT software and services company that specializes in in-house services for new or existing IT monitoring software. We offer software with an easy to

More information

A Brief Introduction to Internet Network Management and SNMP. Geoff Huston NTW Track 4

A Brief Introduction to Internet Network Management and SNMP. Geoff Huston NTW Track 4 A Brief Introduction to Internet Network Management and SNMP Geoff Huston NTW Track 4 What are we talking about? Network Management Tasks fault management configuration management performance management

More information

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. 1. UNISOL SysAdmin Overview SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. SysAdmin is a comprehensive system administration package which provides a secure

More information

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination

More information

Simple Network Management Protocol

Simple Network Management Protocol Simple Network Management Protocol This document describes how to configure the Simple Network Management Protocol (SNMP). This document consists of these sections: Understanding SNMP, page 1 Configuring

More information

SNMP Agent Plug-In Help. 2011 Kepware Technologies

SNMP Agent Plug-In Help. 2011 Kepware Technologies 2011 Kepware Technologies 2 Table of Contents Table of Contents 2 4 Overview 4 Agent Setup 5 General 6 Network Interfaces 6 Communication 7 Agent Actions 9 System Objects 10 System Objects Description

More information

Newton Linux User Group Graphing SNMP with Cacti and RRDtool

Newton Linux User Group Graphing SNMP with Cacti and RRDtool Newton Linux User Group Graphing SNMP with Cacti and RRDtool Summary: Cacti is an interface that can be used to easily manage the graphing of SNMP data. These graphs allow you to visualize performance

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Using the VCDS Application Monitoring Tool

Using the VCDS Application Monitoring Tool CHAPTER 5 This chapter describes how to use Cisco VQE Client Configuration Delivery Server (VCDS) Application Monitoring Tool (AMT). VCDS is a software component installed on each VQE Tools server, the

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

TECHNICAL NOTES. Technical Notes P/N 300-013-797 REV A01. EMC ITOI VoIP Management Suite 8.1. May, 2012

TECHNICAL NOTES. Technical Notes P/N 300-013-797 REV A01. EMC ITOI VoIP Management Suite 8.1. May, 2012 TECHNICAL NOTES EMC ITOI VoIP Management Suite 8.1 Technical Notes P/N 300-013-797 REV A01 May, 2012 These technical notes contain supplemental information about EMC IT Operations Intelligence (ITOI) VoIP

More information

White Paper Case Study:

White Paper Case Study: White Paper Case Study: SNMP CLI Abstract: The purpose of this document is to convey to the reader the usefulness of an SNMP (Simple Network Management Protocol) CLI (Command Line Interface). This document

More information

Wait, How Many Metrics? Monitoring at Quantcast

Wait, How Many Metrics? Monitoring at Quantcast Wait, How Many Metrics? Monitoring at Quantcast Count what is countable, measure what is measurable, and what is not measurable, make measurable. Galileo Galilei Quantcast offers free direct audience measurement

More information

(Refer Slide Time: 1:17-1:40 min)

(Refer Slide Time: 1:17-1:40 min) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 37 Network management Good day, so today we will talk about network management.

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Brocade Product Training

Brocade Product Training Brocade Product Training Introducing SNMP Web-based Training Brocade Education Services Page 1-1 Objectives Describe SNMP basics: terminology and concepts Describe the need for SNMP Describe the advantages

More information

PageR Enterprise Monitored Objects - AS/400-5

PageR Enterprise Monitored Objects - AS/400-5 PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users

More information

Network Management. New York Institute of Technology CSCI 690 Michael Hutt

Network Management. New York Institute of Technology CSCI 690 Michael Hutt Network Management New York Institute of Technology CSCI 690 Michael Hutt FCAPS Fault Configuration Accounting Performance Security Fault SNMP Polling SNMP Traps RMON syslog Emergency (level 0) Alert (level

More information

Command Center 5.2 2015-04-28 14:56:41 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Command Center 5.2 2015-04-28 14:56:41 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Command Center 5.2 2015-04-28 14:56:41 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Command Center 5.2... 12 Command Center 5.2... 14 About Command

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management

More information

Technical Notes P/N 302-000-337 Rev 01

Technical Notes P/N 302-000-337 Rev 01 SNMP Trap Monitoring Solution EMC SourceOne Version 7.0 and later Technical Notes P/N 302-000-337 Rev 01 September 27, 2013 These technical notes contain supplemental information about EMC SourceOne, version

More information

Maintaining Non-Stop Services with Multi Layer Monitoring

Maintaining Non-Stop Services with Multi Layer Monitoring Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems lahavs@emindsys.com www.emindsys.com The approach Non-stop applications can t leave on their

More information

System and Network Management

System and Network Management - System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

CS 392/CS 681 - Computer Security. Module 17 Auditing

CS 392/CS 681 - Computer Security. Module 17 Auditing CS 392/CS 681 - Computer Security Module 17 Auditing Auditing Audit Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

SNMP Adapter Installation and Configuration Guide

SNMP Adapter Installation and Configuration Guide SNMP Adapter Installation and Configuration Guide vcenter Operations Manager 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Cisco CMTS Router MIB Overview

Cisco CMTS Router MIB Overview CHAPTER 1 This chapter provides an overview of the Cisco Cable Modem Termination System (CMTS) router. This chapter contains the following topics: MIB Description, page 1-1 Benefits of MIB Enhancements,

More information

FileNet System Manager Dashboard Help

FileNet System Manager Dashboard Help FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their

More information

TPAf KTl Pen source. System Monitoring. Zenoss Core 3.x Network and

TPAf KTl Pen source. System Monitoring. Zenoss Core 3.x Network and Zenoss Core 3.x Network and System Monitoring A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system Michael Badger TPAf KTl Pen source I I flli\ I I community

More information

Outline of the SNMP Framework

Outline of the SNMP Framework 2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Outline of the SNMP Framework Management Program

More information

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative Network Monitoring By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative Overview of network Logical network view Goals of Network Monitoring Determine overall health

More information

Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings...

Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings... Table of Contents Overview...2 System Requirements...3 Hardware...3 Software...3 Loading and Unloading MIB's...3 Settings...3 SNMP Operations...4 Multi-Varbind Request...5 Trap Browser...6 Trap Parser...6

More information

Advanced Guide for Configuring SNMPc to Manage Any SNMP Enabled Device

Advanced Guide for Configuring SNMPc to Manage Any SNMP Enabled Device Advanced Guide for Configuring SNMPc to Manage Any SNMP Enabled Device SNMPc supports many devices straight out of the box. Its generic support for device classes such as Switches, Routers and Servers

More information

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008 A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

How To Monitor A Network With Snmp (Network Monitoring)

How To Monitor A Network With Snmp (Network Monitoring) Quo Vadis, SNMP? White Paper Part 2: Putting SNMP into practice Authors: Jens Rupp, Lead Developer at Paessler AG Daniel Zobel, Head of Software Development at Paessler AG Published: August 2010 Last Update:

More information