Automazione del processo di configurazioni di Monarch
Aggiungere singolarmente nuovi host in Monarch con le rispettive informazioni come l’indirizzo, il sistema operativo o il profilo, richiede meno di un minuto ma nel momento in cui si devono svolgere tutte le configurazioni per diverse centinaia di host questa operazione potrà ovviamente richiederne oltre 100.
Per snellire il processo di configurazione esiste l’import di questi dati da file, in modo tale che si possano gestire ed inserire le informazioni su file di testo e caricarle più velocemente sul sistema invece di doverle aggiungere singolarmente a mano e associarle in seguito ai vari profili o gruppi di profili. I dati nel file per l’import possono, ad esmepio, essere reperiti attraverso l’export da database della propria infrastruttura.
Come caricare nuovi host in Monarch
Dopo aver inserito i dati in un file di testo, si può selezionare l’import direttamente da “Nagios Configuration Architect Monarch”.
A questo punto, viene richiesto di selezionare il separatore utilizzato e il file da caricare, dopodiché apparirà una schermata dove è possibile fare un mapping che consente di associare ad ogni colonna l’esatto dato di NetEye.
Infine, dopo aver associato i valori ai campi corrispondenti, apparirà una panoramica dell’import e si potranno così selezionare i vari host da associare ai vari profili o gruppi di profili.
Aggiungendo queste informazioni i dati verranno caricati, riducendo così il tempo di configurazione. Basteranno, infatti, tre semplici click per concludere l’intero processo di configurazione evitando di doverli inserire manualmente.
I’m Georg, born in Bolzano in 1971. The IT has always been my true passion: my first computer was a Spectrum, maybe someone still remembers it… the first application I developed on it was the naval combat. Later on I started the implementation of ERP software using C, C++, Java, Informix, Oracle, Unix, Window. Recently I approached the Open Source technologies like Nagios, Cacti, MRTG, NagVis, OCS Inventory, GLPI, ntop with the vision to improve the working activities of the system administrators. In my free time I love hiking in the mountains, skiing, playing football as well as I like comparing different OS like Linux, Windows or Mac trying to find the potentialities and weaknesses.
Author
Georg Kostner
I’m Georg, born in Bolzano in 1971. The IT has always been my true passion: my first computer was a Spectrum, maybe someone still remembers it… the first application I developed on it was the naval combat. Later on I started the implementation of ERP software using C, C++, Java, Informix, Oracle, Unix, Window. Recently I approached the Open Source technologies like Nagios, Cacti, MRTG, NagVis, OCS Inventory, GLPI, ntop with the vision to improve the working activities of the system administrators. In my free time I love hiking in the mountains, skiing, playing football as well as I like comparing different OS like Linux, Windows or Mac trying to find the potentialities and weaknesses.
Today we continue our journey into monitoring automation in NetEye. In my previous post we discussed the possibility of automating Business Processes. As you may remember, for those of us working on NetEye Cloud monitoring dozens of clients, it's important Read More
When performance degradation occurs within a complex system, understanding the root cause can be extremely challenging. If the issue happens sporadically, this difficulty increases even more. This is because modern systems involve numerous components that interact in complex ways. For Read More
At first glance, rebuilding an RPM may sound like a purely mechanical task: take a patch, rebuild the package, ship it. In reality, that small fix goes through a much longer journey that touches reliability, security, trust, and long-term maintainability. Read More
Introduction to NetApp and S3 NetApp offers a unified data storage system. NetApp's ONTAP operating system supports a combination of file, block, and object protocols. We can use common storage (disk array), such as NetApp AFF or FAS, and operate Read More
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More