6.4. SNMP Monitoring
Total Page:16
File Type:pdf, Size:1020Kb
Zenoss Core Administration Copyright © 2014 Zenoss, Inc., 11305 Four Points Drive, Bldg. 1, Suite 300, Austin, Texas 78726, U.S.A. All rights reserved. Zenoss and the Zenoss logo are trademarks or registered trademarks of Zenoss, Inc. in the United States and other countries. All other trademarks, logos, and service marks are the property of Zenoss or other third parties. Use of these marks is prohibited without the express written consent of Zenoss, Inc. or the third-party owner. Flash is a registered trademark of Adobe Systems Incorporated. Oracle, the Oracle logo, Java, and MySQL are registered trademarks of the Oracle Corporation and/or its affiliates. Linux is a registered trademark of Linus Torvalds. SNMP Informant is a trademark of Garth K. Williams (Informant Systems, Inc.). Sybase is a registered trademark of Sybase, Inc. Tomcat is a trademark of the Apache Software Foundation. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. All other companies and products mentioned are trademarks and property of their respective owners. Part Number: 02-022014-4.2-v08 1. About Zenoss Core ......................................................................................................................... 1 1.1. High-Level View .................................................................................................................. 1 1.1.1. Key Tenets ............................................................................................................... 2 1.2. Architecture and Technologies ................................................................................................ 3 1.2.1. User Layer ................................................................................................................ 4 1.2.2. Data Layer ................................................................................................................ 4 1.2.3. Process Layer ............................................................................................................ 4 1.2.4. Collection Layer ........................................................................................................ 4 1.3. Monitoring Approach ............................................................................................................ 5 1.3.1. File System Monitoring .............................................................................................. 5 1.4. Terminology ........................................................................................................................ 6 2. Using Zenoss Core .......................................................................................................................... 8 2.1. Interface and Navigation ........................................................................................................ 8 2.1.1. Navigation ................................................................................................................ 9 2.1.2. User Information Area ................................................................................................ 9 2.1.3. Portlets ..................................................................................................................... 9 2.1.3.1. Customizing Portlets ...................................................................................... 10 2.1.3.2. Adding and Duplicating Portlets ....................................................................... 11 2.1.4. Network Map .......................................................................................................... 11 2.1.4.1. Choosing the Network to Display ..................................................................... 11 2.1.4.2. Viewing Device and Network Details ................................................................ 11 2.1.4.3. Loading Link Data ......................................................................................... 12 2.1.4.4. Filtering by Device Type ................................................................................ 12 2.1.4.5. Adjusting Viewable Hops ................................................................................ 12 2.1.4.6. Adjusting the Network Map ............................................................................. 12 2.1.4.7. Viewing Device or Network Details .................................................................. 12 2.2. Customizing the Dashboard .................................................................................................. 12 2.2.1. Selecting Portlets ..................................................................................................... 13 2.2.2. Arranging Portlets .................................................................................................... 13 2.2.3. Changing the Dashboard Column Layout ...................................................................... 13 2.3. Search .............................................................................................................................. 14 2.4. Navigating the Event Console ............................................................................................... 14 2.4.1. Sorting and Filtering Events ....................................................................................... 15 2.4.2. Creating an Actionable View ...................................................................................... 16 2.4.3. Saving a Custom View .............................................................................................. 16 2.4.4. Refreshing the View ................................................................................................. 16 2.4.5. Viewing Event Details .............................................................................................. 17 2.4.6. Selecting Events ....................................................................................................... 17 2.4.7. Managing Events ..................................................................................................... 17 2.5. Running Commands ............................................................................................................ 18 2.6. Working with Triggers and Notifications ................................................................................ 18 2.6.1. Working with Triggers .............................................................................................. 19 2.6.1.1. Creating a Trigger .......................................................................................... 19 2.6.1.2. Setting Global Trigger Permissions ................................................................... 20 2.6.1.3. Setting Individual Trigger Permissions ............................................................... 21 2.6.2. Working with Notifications ........................................................................................ 21 2.6.2.1. Creating or Editing a Notification ..................................................................... 21 2.6.2.2. Defining Notification Content .......................................................................... 23 2.6.2.3. Defining the SNMP Trap Host ......................................................................... 28 2.6.2.4. Defining Commands to Run ............................................................................ 28 2.6.2.5. Setting Global Notification Permissions ............................................................. 29 2.6.2.6. Setting Individual Notification Permissions ......................................................... 30 2.6.2.7. Setting Up Notification Schedules ..................................................................... 30 2.7. Advanced User Interface Configuration .................................................................................. 32 iii Zenoss Core Administration 3. Adding, Discovering and Modeling Devices ....................................................................................... 33 3.1. Adding Devices .................................................................................................................. 33 3.1.1. Add a Single Device ................................................................................................. 33 3.1.2. Add Multiple Devices ............................................................................................... 34 3.2. Discovering Devices ............................................................................................................ 35 3.2.1. Classifying Discovered Devices .................................................................................. 36 3.2.2. Updating Device Authentication Details ....................................................................... 37 3.2.3. Adding Information to a Device Record ....................................................................... 37 3.3. Modeling Devices ............................................................................................................... 38 3.3.1. Modeling Devices Using SNMP ................................................................................. 38 3.3.1.1. Testing to See if a Device is Running SNMP ...................................................... 38 3.3.1.2. Configuring Windows Devices to Provide Data Through SNMP ............................. 38 3.3.1.3. Configuring Linux Devices to Provide Data Through SNMP .................................. 39 3.3.2. Modeling Devices