Configuring Remote Monitoring
Remote monitoring configuration video
Click to view a short video (5:01) of how to configure remote Linux hosts for monitoring.
To Configure details
To configure remote monitoring of Linux hosts, set the following preferences on the Add Monitoring Configuration window.
Monitoring Solution | Monitor Profile | Monitor Type |
---|---|---|
Linux | Linux Remote Monitoring | Remote Monitoring |
Field | Description |
---|---|
In the Remote Host Configuration section, click Add to configure a host for monitoring. You can configure multiple | |
Host Details | |
Host Names/File Path | Enter the host name of the server in one of the following formats:
Important:
|
Port Number | Enter the remote host SSH port number. By default, the port number is set to 22. |
User Name | Enter the user name to connect to the remote host. If this field is left blank, the KM uses PATROL Agent default account credentials to connect to the remote host. Password based authentication will be used for verifying the credentials. |
Authentication | Select the authentication mode to add a remote host:
|
Password-Based Authentication | |
Password | Enter the common credentials of the hosts added in the Host Names/File Path field. |
Key Based Authentication | |
Public Key File Path | Enter the entire path of the public key file. |
Private Key File Path | Enter the entire path name of the private key file. |
Passphrase | Enter the passphrase to access public and private keys. |
Sudo Configuration | |
Sudo Execution Mode (For Linux only) | Select any of the following the Sudo execution mode for the local host:
|
Sudo Command Password | Enter the Sudo command password. |
Linux OS Configuration Collector | |
Collect OS Configuration | Select this check box to enable the Linux OS configuration collector. By default, the LinuxOSConfigCollector is disabled, and the polling interval is set to 24 hours. |
Configure Monitor Types | |
Monitoring Options | Select the type of monitoring.
|
Advanced monitoring configuration | |
Monitor type selection/configuration | Select the monitor types that you want to monitor in the remote host. |
CPU configuration | |
CPU | Select this checkbox to enable CPU monitoring. |
CPU Annotation | |
Enable Annotation | Select this checkbox to enable annotation. Annotation refers to additional details about specific processes that consume the most CPU resources. |
CPU Threshold for Annotation (%) | Enter the CPU threshold (in percent) to generate the annotation. The annotation displays the top 10 processes consuming the highest CPU resources on the system. The annotations are generated based on the Utilization (Utilization) parameter. For more information about the parameter, see CPU (NUK_CPU). The default value for the CPU threshold is 80%. |
Memory configuration | |
Memory | Select this checkbox to enable Memory monitoring. |
Memory Annotation | |
Enable Annotation | Select this checkbox to enable annotation. Annotation refers to additional details about specific processes that consume the most memory resources. |
Memory Threshold for Annotation (%) | Enter the memory threshold (in percent) to generate the annotation. The annotation displays the top 10 processes consuming the highest memory resources on the system. The annotations are generated based on the Percent of memory pages used (UsedPercent) parameter. For more information about the parameter, see Memory (NUK_Memory). The default value for the memory threshold is 80%. |
Process | Select this check box to monitor the processes of the remote host. |
Process Configuration | |
Filesystems filtering | |
Disk Include/Exclude Operation | Select this check box to monitor remote host disks. |
Disk configuration | |
Network | Select this check box to monitor the networks of the remote host. |
Network Configuration |