Configuring Linux Virtualization for Auto-Guest monitoring


This topic provides instructions to configure the Linux Virtualiation monitor type. You can configure Kernel-based Virtual Machines from the Linux Virtualization monitor profile.  

Auto guest monitoring configuration video

Click to view a short video (3.46) of how to configure guests for monitoring.

icon-play.png https://youtu.be/NY_DwfF6p_c

Configuration details

Before configuring the monitor type, ensure that you have performed the prerequisite to configure the infrastructure policy. For more information, see Configuring-Linux-Virtualization-monitor-profile.

To configure guests VM monitoring, set the following preferences on the Add Monitoring Configuration window.

Monitoring Solution

Monitor Profile

Monitor Type

Linux

Linux Virtualization

Linux Virtualization


Field

Description

GuestVM OS Monitoring

SSH Port Number

Enter the guest host SSH port number. By default, the port number is set to 22.

Monitoring Credentials 

User Name

Enter the username to connect to the guest host. If this field is left blank the KM uses PATROL Agent default account credentials to connect to the guest host. Password based authentication will be used for verifying the credentials.

Authentication

Choose the authentication mode to add guest host:

  • Password-Based
  • Key-Based

Password-Based Authentication

Password

Enter the password.

Key Based Authentication

Public Key File Path

Enter the entire path of the public key file.

Private Key File Path

Enter the entire path of the private key file.

Passphrase

Enter the passphrase to access public and private keys.

OS Monitoring Filter

GuestVM to Filter

Specify a comma-separated list of guest virtual machine names or regular expressions for filtering.

Filter Type

Select the filter criteria if you want to include or exclude the guest virtual machines from monitoring.

GuestVM OS Monitoring Configuration

Monitor Specific Configuration List

Click Add to configure a specific guest virtual machine with a different configuration.

Monitor Specific Configuration

Guest Names

Specify a comma-separated list of guest names.

Process Monitoring Configuration

File System Include/Exclude Operation

Disk Include/Exclude Operation

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*