Archived community.zenoss.org | full text search
Skip navigation

Manage categories

Close

Create and manage categories in 4.1-v01. Removing a category will not remove content.

Categories in 4.1-v01
Add a new category (0 remaining)

Manage Announcements

Close

Create and manage announcements in 4.1-v01. Try to limit the announcements to keep them useful.

Announcements in 4.1-v01
Subject Author Date Actions

Table of Contents

Table of Contents

1. ZenPacks
1. About ZenPacks
1.1. Working with ZenPacks
2. Viewing Loaded ZenPacks
3. Installing ZenPacks
3.1. Installing from the Command Line
3.2. Installing from the User Interface
4. Creating ZenPacks
4.1. Why Create a ZenPack?
4.2. Create a ZenPack
4.3. Add a Database Object to a ZenPack
4.4. View Database Objects in a ZenPack
4.5. Remove a Database Object from a ZenPack
4.6. Adding Other Items to ZenPacks
5. Packaging and Distributing ZenPacks
6. Removing ZenPacks
7. Where to Find More Information
2. Advanced Search
1. About
1.1. Working with Saved Searches
2. Prerequisites
3. AIX
1. About
2. Prerequisites
3. Add an AIX Server
4. Set AIX Server Monitoring Credentials
5. Resolving CHANNEL_OPEN_FAILURE Issues
6. Resolving Command timed out Issues
7. Daemons
4. Amazon Web Services
1. About
2. Prerequisites
3. Setup
4. Working with the EC2Manager Account
4.1. CloudWatch Data
4.2. Templates and Collection
4.2.1. Example: Initiating Load-Based Elasticity for an EC2 Setup
5. Apache Tomcat Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Tomcat to Allow JMX Queries
3.2. Configuring Resource Manager
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Daemons
6. Apache Web Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Display the Status Page in Apache Version 1.3 or Higher
3.2. Display the Status Page in Apache Version 2.x
3.3. Verifying Your Apache Configuration
3.4. Configure Resource Manager to Monitor the Web Server
4. Daemons
7. BEA WebLogic Application Server
1. About
1.1. Overall Application Server Vitals
1.2. Entity EJB, Message Driven Bean (MDB), and Session EJB Subsystem Metrics
1.3. Data Pool (JDBC) metrics
1.4. Queue (JMS) Metrics
2. Prerequisites
3. Enable Monitoring
3.1. Configuring WebLogic to Allow JMX Queries
3.2. Configuring Resource Manager
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Monitor SSL-Proxied WebLogic Servers
7. Daemons
8. BIG-IP Network Devices
1. About
2. Prerequisites
3. Enable Monitoring
4. Viewing Virtual Servers
5. Daemons
9. Brocade SAN Switches
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Brocade Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Viewing Fibre Channel Port Information
5. Daemons
10. CheckPoint Firewalls
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring CheckPoint Firewalls to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Daemons
11. Cisco Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Cisco Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Forwarding Syslog Messages to Resource Manager
5. Extended Capabilities for Cisco Devices
5.1. IOS
5.2. CatOS
5.3. ASA, FWSM and PIX
5.4. Wireless LAN Controllers
5.5. ACE Load Balancers
5.6. Telepresence Codecs
6. Daemons
12. Cisco UCS
1. About
2. Prerequisites
3. Adding a Cisco UCS Device for Monitoring
4. UCS Monitoring Credentials
5. Daemons
13. Datacenter View
1. About
2. Prerequisites
3. Working with the List View
4. Working with the Custom View
4.1. Adding a Background Image to the Custom View
4.1.1. Removing the Custom View Background Image
4.2. Working with Devices in the Custom View
4.3. Removing the Custom View
5. Activating the Auto-Generated Rack View
14. Dell Hardware
1. About
2. Prerequisites
3. Enable Enhanced Modeling
4. Daemons
15. Device Access Control Lists
1. About
2. Prerequisites
3. Key Concepts
3.1. Permissions and Roles
3.2. Administered Objects
3.3. Users and Groups
3.4. Assigning Administered Object Accessa
3.5. Restricted Screen Functionality
3.5.1. Dashboard
3.5.2. Device List
3.5.3. Device Organizers
3.5.4. Reporting
3.5.5. Viewing Events
4. Create a User Restricted to Specific Devices
5. Create a Manager Restricted to Specific Devices
6. Adding Device Organizers
7. Restricted User Organizer Management
16. Distributed Collector
1. About Distributed Collector
1.1. About Collectors
1.2. About Hubs
1.3. Typical Usage Scenarios for Distributed Monitoring
1.4. Prerequisites
1.5. Navigating Collectors and Hubs
2. Deploying Collectors
2.1. Installing Prerequisite Packages
2.2. Deploying Remote Collectors
2.2.1. Requirements
2.2.2. Limitations
2.2.3. Deployment
2.3. Deploying Local Collectors
3. Updating Collectors
4. Backing Up Remote Collector Performance Data
5. Deleting Collectors
6. Adding Devices to Collectors
6.1. Moving Devices Between Collectors
7. Managing the Collector Daemons
8. Deploying Hubs
8.1. Installing Prerequisites
8.2. Deploying Remote Hubs
8.2.1. Requirements
8.2.2. Limitations
8.2.3. Configuring MySQL for Remote Hubs
8.2.4. Deployment
8.3. Setting Up SSH Keys for Distributed Collector
17. Domain Name System (DNS)
1. About
2. DigMonitor
2.1. Prerequisites
2.2. Enable Monitoring
3. DNSMonitor
3.1. Prerequisites
3.2. Enable Monitoring
4. Daemons
18. Dynamic Service View
1. About
1.1. Dynamic View of Organizers
1.2. Dynamic View of Devices
1.2.1. Dynamic View of Cisco UCS Devices
1.2.2. Dynamic View of VMware Hosts
1.2.3. Dynamic View of Storage Devices
2. Prerequisites
3. Enabling
4. Daemons
19. Enterprise Collector
1. About
2. Prerequisites
3. Enabling Enterprise Collector
20. Enterprise Linux
1. About
2. Prerequisites
3. Add a Linux Server
4. Set Linux Server Monitoring Credentials
5. Resolving CHANNEL_OPEN_FAILURE Issues
6. Resolving Command timed out Issues
7. DMIDECODE Modeler Plugin
8. Daemons
21. Enterprise Reports
1. About
1.1. 95th Percentile
1.2. Alert Rule Email Addresses
1.3. Defined Thresholds
1.4. Event Time to Resolution
1.5. Interface Volume
1.6. Maintenance Windows
1.7. Organizer Availability
1.8. User Event Activity
1.9. Users Group Membership
2. Viewing Enterprise Reports
3. Prerequisites
22. Enterprise Security
1. About
2. Prerequisites
3. Enabling Password Encryption
23. File Transfer Protocol (FTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Enable Secure Site Monitoring
5. Tuning for Site Responsiveness
6. Daemons
24. Foundry Device
1. About
2. Prerequisites
3. Configuring Resource Manager
4. Daemons
25. HP PC Hardware
1. About
2. Prerequisites
3. Enable Enhanced Modeling
4. Daemons
26. Hewlett Packard UNIX
1. About
2. Prerequisites
3. Limitations
4. Add an HP-UX Device for Monitoring
5. Set HP-UX Server Monitoring Credentials
5.1. Set Credentials for the Device
5.2. Set Credentials for the Device Class
6. Resolving CHANNEL_OPEN_FAILURE Issues
7. Resolving Command time out Issues
8. Daemons
27. Internet Relay Chat (IRC)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
28. Jabber Instant Messaging
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
29. Java 2 Platform Standard Edition (J2E)
1. About
1.1. JMX Background
1.2. ZenJMX Capabilities
1.3. Allowable Parameter Types
1.4. Single Value Attribute Calls
1.5. Complex-Value Attribute Calls
1.6. Example Method Calls
1.6.1. No parameters, single return value
1.6.2. No parameters, multiple values returned in List format
1.6.3. No parameters, multiple values returned in Map format
1.6.4. Single parameter in polymorphic operation
1.6.5. Multiple parameters in polymorphic operations
2. Prerequisites
2.1. Sun Java Runtime Environment (JRE)
3. Example to Monitor a JMX Value
3.1. Enabling Remote JMX Access
3.2. Configure Resource Manager with a Custom Data Source
4. Monitor Values in TabularData and CompositeData Objects
5. Using JConsole to Query a JMX Agent
6. Daemons
30. JBoss Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring JBoss to Allow JMX Queries
3.2. Configuring Resource Manager
4. Change the Amount of Data Collected and Graphed
5. Viewing Raw Data
6. Daemons
31. Juniper Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Juniper Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Daemons
32. LDAP Authentication
1. About
2. Prerequisites
2.1. LDAP Configuration Information
3. Limitations
4. Authenticating with Microsoft Active Directory
4.1. Adding the Authentication Plugin
4.2. Configuring Plugin Settings
4.3. Enabling Group to Role Mapping
4.4. Verifying Connectivity and Credentials Outside of Resource Manager
5. Authenticating with other LDAP Servers
6. Optimizing Authentication with a Cache
7. Configuring Local Authentication as a Fallback
33. Lightweight Directory Access Protocol (LDAP) Response Time
1. About
2. Prerequisites
3. Enable Monitoring
3.1. For a Device
4. Daemons
34. Mail Transactions
1. About
1.1. Events
2. Prerequisites
3. Enable Monitoring
4. Daemons
35. MS Active Directory
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
36. MS Exchange
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
37. Microsoft Message Queuing (MSMQ) Monitoring
1. About
2. Prerequisites
3. Configuration
3.1. Automatically Monitor Queues on All Servers
3.2. Monitor Queues on Specific Servers
3.3. Fine-Tuning Queue Monitoring
4. Daemons
38. Microsoft Internet Information Services (IIS)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
39. Microsoft SQL Server
1. About
2. Prerequisites
3. Enable Monitoring
4. Collecting Information from Non-Default Microsoft SQL Server Instances
5. Daemons
40. Multi-Realm IP Networks
1. About
2. Prerequisites
3. Example System
4. System Setup
4.1. Adding Realms
4.2. Adding Collectors to Realms
4.3. Adding Devices to Realms
5. Notes
41. MySQL Database
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Authorize MySQL Performance Data Access
3.2. Set up Resource Manager
4. Daemons
42. NetApp Filers
1. About
1.1. Performance Graphs
2. Prerequisites
3. Enable Monitoring
3.1. Configuring NetApp Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Using SSH to Model NFS Clients
5. Forwarding syslog Events from NetApp
6. Daemons
43. NetScreen Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring NetScreen Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Daemons
44. Network News Transport Protocol (NNTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
45. Network Time Protocol (NTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
46. Nexus7k
1. About
2. Prerequisites
3. Adding a Cisco Nexus 7000 Device for Monitoring
4. Monitoring Credentials
5. Daemons
47. Nortel Devices
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Nortel Devices to Allow SNMP Queries
3.2. Configuring Resource Manager
4. Daemons
48. ONC-Style Remote Procedure Call (RPC)
1. About
2. Prerequisites
3. Enable Monitoring
4. Daemons
49. Oracle
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Authorize Oracle Performance Data Access
3.2. Configure Resource Manager
4. Monitor Additional SIDs
5. Monitoring Other Tables or Views
6. Daemons
50. Predictive Thresholding
1. About
2. Prerequisites
3. Add a Predictive Threshold
51. RANCID Integration
1. About
2. Prerequisites
3. Enable Integration
3.1. Configure Cisco Devices to Send Traps
3.2. Configure RANCID Update Information in Resource Manager
52. Solaris
1. About
2. Prerequisites
3. Limitations
4. Set Solaris Server Monitoring Credentials
5. Enable Monitoring
6. Resolving CHANNEL_OPEN_FAILURE Issues
7. Resolving Command time out Issues
8. Daemons
53. Splunk Monitoring
1. About
2. Prerequisites
3. Splunk Data Source Type
4. Monitoring Splunk Searches
4.1. Monitoring Results of a Simple Search
4.2. Monitoring Results of a Top Search
5. Daemons
54. SSH Monitoring Example
1. About
2. Prerequisites
3. Set Linux Server Monitoring Credentials
4. Add a Linux Server
5. Daemons
55. SQL Transactions
1. About
2. Prerequisites
3. Enable SQL Server Monitoring
4. Enable Sybase Server Monitoring
5. Enable MySQL Server Monitoring
6. Storing Query Results
7. Troubleshooting
8. Daemons
56. Storage Base
1. About
2. Prerequisites
57. Sugar CRM
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configuring Resource Manager
4. Daemons
58. vCloud Monitoring
1. About
2. Adding a Cell
3. Prerequisites
4. Monitoring
5. Performance
59. VMware
1. vSphere
1.1. About
1.1.1. VMware Events
1.2. Prerequisites
1.3. Enable Monitoring
1.4. Viewing VMware Devices
1.5. Viewing Guest Virtual Machines
1.6. Enabling Data Collection Using resxtop
1.6.1. Gathering VMware Host Statistics
1.6.2. Gathering VMware Guest Statistics
1.7. Adding a Custom Metric
1.8. Moving VMware Devices Between Collectors
1.9. Daemons
1.9.1. Tuning Options
2. VMware ESX via SNMP
2.1. About
2.2. Prerequisites
2.3. Monitoring VMware ESX Servers
2.4. Enabling SNMP Subagents
2.5. Daemons
3. VMware esxtop
3.1. About
3.2. Prerequisites
3.2.1. Installing Prerequisite Libraries
3.3. Enabling the ZenPack
3.4. Daemons
60. Web Page Response Time (HTTP)
1. About
2. Prerequisites
3. Enable Monitoring
4. Check for a Specific URL or Specify Security Settings
5. Check for Specific Content on the Web Page
6. Tuning for Site Responsiveness
7. Daemons
61. WebSphere Application Server
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Configure WAS for Monitoring
3.2. Configure Resource Manager
4. Examples
5. Daemons
62. Xen Virtual Hosts
1. About
2. Prerequisites
3. Model Hosts and Guest
4. Daemons
63. Web-Based Synthetic Transactions
1. About
1.1. Data Points
1.2. Event Generation
2. Prerequisites
3. Enable Monitoring
4. Creating twill Commands
4.1. Creating twill Commands from TestGen4Web
4.2. Creating twill Commands Manually
5. Monitoring through Proxy Servers
5.1. Example Proxy Setup
5.2. Testing the Proxy Setup
6. Daemons
64. Windows Performance
1. About
2. Prerequisites
3. Enable Monitoring
3.1. Defining Windows Credentials
3.2. Add Devices in Resource Manager
4. Monitor Other Performance Counters
5. Testing Connections from Windows
6. Testing Connections from Resource Manager
7. Modify Registry Settings for Firewalls in Secure Environments
8. Configuring a Standalone Windows Device for a Non-Administrative Account
9. Tuning Collector Daemon Performance
10. Enabling the NTLMv2 Authentication Protocol
65. ZenOperator Role
1. About
2. Prerequisites
A. twill Commands Reference
1. About
2. Browsing
3. Assertions
4. Display
5. Forms
6. Cookies
7. Debugging
8. Other Commands
9. Details on Form Handling
10. ZenWebTx Extensions to twill
10.1. twilltiming
10.2. twillextract
10.3. twillxpathextract
10.4. ignorescripts

Actions

Notifications