NagVis is a visualization add-on for NetEye, and can be used to show NetEye monitoring data, over for example, a Network Schema as the use case below will show you.
Thanks to NagVis, you can import a previously created network schema into NetEye, and overlay network objects that have previously been monitored by NetEye.
Let’s start by describing how to proceed with the configuration of the NagVis module within NetEye.
The NagVis module can be accessed via the main menu, as shown in this picture:
To create the map, go to Options > Manage Maps
Now under Create Map give the map a name, for example mymap, and an alias like My Map. For the Map Type select Regular map and launch it with Create button
Next, import the Network Schema you want to monitor as the background image – this is achieved using Options > Manage Backgrounds. Simply select the local file and start the image upload with the Upload button
Now we need to define the imported image as the background for the current map. Call up the map options with Edit Map> Map Options and go to the Appearance tab. Here activate the map_image option and select the desired image from the dropdown menu. Don’t save it just yet, we will need a setting for the maps options.
Go to the Obj. Defaults tab. Here you can activate the label_show option. This option enables the host and service icons on the map to be labelled with their appropriate host/service names – otherwise the icons can only be identified via their hover-menus. Finally, save these settings.
In my case, since the network diagram is associated with many devices, and the labels would not be properly displayed on the network diagram, I decided not to enable the label option, but if you need to you can activate it:
Now it’s time to add the host. Click on Edit Map > Add Icon > host and then place the cursor (which now appears as a cross) at the position on the map where the icon is – at this point the Create Object-dialogue will open. In the General tab simply select the desired host from the dropdown menu in host_name and save.
Remember that you’ll need to activate edit mode to be able to move or edit an icon. Right-click on the icon to open its context menu, and select Unlock.
These Solutions are Engineered by Humans
Did you read this article because you’re knowledgeable about networking? Do you have the skills necessary to manage networks? We’re currently hiring for roles like this as well as other roles here at Würth Phoenix.
Hi all, my name is Davide and I was born in San Donato Milanese. Since I was a boy I've always been intrigued by PCs, and so I took my first steps with my Commodore VIC-20. Before joining Würth Phoenix as an SI consultant, I worked first as a Network Engineer for several ISPs (Internet Service Providers) in the late 90s, then for the first ASP (Application Service Provider) and next as a head of IT Network and Security. My various ITIL and Vendor certifications have allowed me to be able to cooperate at multiple project levels. I like tennis, music, motorcycles and going on nature walks with my family.
Author
Giovanni Davide Saccá
Hi all, my name is Davide and I was born in San Donato Milanese. Since I was a boy I've always been intrigued by PCs, and so I took my first steps with my Commodore VIC-20. Before joining Würth Phoenix as an SI consultant, I worked first as a Network Engineer for several ISPs (Internet Service Providers) in the late 90s, then for the first ASP (Application Service Provider) and next as a head of IT Network and Security. My various ITIL and Vendor certifications have allowed me to be able to cooperate at multiple project levels. I like tennis, music, motorcycles and going on nature walks with my family.
Today we continue our journey into monitoring automation in NetEye. In my previous post we discussed the possibility of automating Business Processes. As you may remember, for those of us working on NetEye Cloud monitoring dozens of clients, it's important Read More
When performance degradation occurs within a complex system, understanding the root cause can be extremely challenging. If the issue happens sporadically, this difficulty increases even more. This is because modern systems involve numerous components that interact in complex ways. For Read More
At first glance, rebuilding an RPM may sound like a purely mechanical task: take a patch, rebuild the package, ship it. In reality, that small fix goes through a much longer journey that touches reliability, security, trust, and long-term maintainability. Read More
Introduction to NetApp and S3 NetApp offers a unified data storage system. NetApp's ONTAP operating system supports a combination of file, block, and object protocols. We can use common storage (disk array), such as NetApp AFF or FAS, and operate Read More
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More