Zenoss Core 3.x Network and System Monitoring
- Paperback: 312 pages
- Publisher: WOW! eBook (April 15, 2011)
- Language: English
- ISBN-10: 1849511586
- ISBN-13: 978-1849511582
Implement Zenoss core and fit it into your security management environment using this easy-to-understand tutorial guide
- Designed to quickly acquaint you with the core feature so you can customize Zenoss Core to your needs
- Discover, manage, and monitor IT resources
- Build custom event-processing and alerting rules
- Write custom device reports to extract, display, and analyze monitoring data
- A handy reference guide with loads of screenshots
- An update of Zenoss Core Network and System Monitoring rewritten for Zenoss 3.x
For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic.
Zenoss Core is an enterprise-level systems and network monitoring solution that can be as complex as you need it to be. And while just about anyone can install it, turn it on, and monitor “something”, Zenoss Core has a complicated interface packed with features. The interface has been drastically improved over version 2, but it’s still not the type of software you can use intuitively – in other words, a bit of guidance is in order.
The role of this book is to serve as your Zenoss Core tour guide and save you hours, days, maybe weeks of time.
This book will show you how to work with Zenoss and effectively adapt Zenoss for System and Network monitoring. Starting with the Zenoss basics, it requires no existing knowledge of systems management, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides. The book contains step-by-step examples to demonstrate Zenoss Core’s capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system.
The book covers the monitoring basics: adding devices, monitoring for availability and performance, processing events, and reviewing reports. It also dives into more advanced customizations, such as custom device reports, external event handling (for example, syslog server, zensendevent, and Windows Event Logs), custom monitoring templates using SNMP data sources, along with Nagios, and Cacti plugins. An example of a Nagios-style plugin is included and the book shows you where to get an example of a Cacti-compatible plugin for use as a command data source in monitoring templates. In Zenoss Core, ZenPacks are modules that add monitoring functionality. Using the Nagios plugin example, you will learn how to create, package, and distribute a ZenPack. You also learn how to explore Zenoss Core’s data model using zendmd so that you can more effectively write event transformations and custom device reports.
Implement Zenoss core and fit it into your security management environment using this easy-to-understand tutorial guide.
What you will learn from this book :
- Discover devices and prepare your monitoring environment
- Set up, model, and configure devices
- Monitor availability and performance
- Customize monitoring templates using SNMP, Nagios, and Cacti data sources
- Process events via the event console and event commands
- Collect and process events (including event transformations) from non-Zenoss Core monitoring activities
- Administer Zenoss Core’s users, alerting rules, data backups, and settings
- Review built-in reports and create custom graph and multi-graph reports
- Write custom device reports and explore Zenoss Core data model with zendmd
- Incorporate device and event attributes using TALES expressions throughout Zenoss Core
The book starts by covering installation and configuration, before moving on to administration and dashboard usage. It contains step-by-step instructions for setting up and using a working, capable Zenoss system.
Who this book is written for
This book is written primarily for network and systems administrators who are monitoring their IT assets with Zenoss Core or who plan to monitor them. In reality, this book will benefit anyone, regardless of job title, who recognizes the importance of proactively monitoring the servers, routers, computers, websites, and devices that connect companies to customers.
[download id=”44″ format=”1″]