Adding new hosts individually in Monarch with their information such as address, operating system or profile can take less than a minute. In the initial phase of a NetEye project, however, when you have to set up all the configurations for hundreds of hosts this operation may require more than hundreds of minutes.
To speed up the configuration process we decided to implement the import of these data, so that all information can be quickly loaded through a simple text file instead of having to insert all the values manually and to associate them with different profiles or profile groups. The data for the import, for instance, can be also exported from a database containing the information of your own infrastructure.
How to import new hosts in Monarch
After entering the data into a text file, you can select the import directly from “Nagios Configuration Architect Monarch.”
At this point, it is possible to select the correct separator and the file to upload. Then a new screen will appear where you can perform the mapping by associating each column with the exact NetEye field.
After the values are associated to the corresponding fields, an overview of the import will be displayed and you will be able to select the hosts that should be associated with the various profiles or profile groups.
All data will be finally uploaded, and the time needed for the configuration process will be reduced. Only three mouse-clicks are needed, in fact, to finish the entire Monarch configuration avoiding in this way to insert manually every single value.
I’m Georg, born in Bolzano in 1971. The IT has always been my true passion: my first computer was a Spectrum, maybe someone still remembers it… the first application I developed on it was the naval combat. Later on I started the implementation of ERP software using C, C++, Java, Informix, Oracle, Unix, Window. Recently I approached the Open Source technologies like Nagios, Cacti, MRTG, NagVis, OCS Inventory, GLPI, ntop with the vision to improve the working activities of the system administrators. In my free time I love hiking in the mountains, skiing, playing football as well as I like comparing different OS like Linux, Windows or Mac trying to find the potentialities and weaknesses.
Author
Georg Kostner
I’m Georg, born in Bolzano in 1971. The IT has always been my true passion: my first computer was a Spectrum, maybe someone still remembers it… the first application I developed on it was the naval combat. Later on I started the implementation of ERP software using C, C++, Java, Informix, Oracle, Unix, Window. Recently I approached the Open Source technologies like Nagios, Cacti, MRTG, NagVis, OCS Inventory, GLPI, ntop with the vision to improve the working activities of the system administrators. In my free time I love hiking in the mountains, skiing, playing football as well as I like comparing different OS like Linux, Windows or Mac trying to find the potentialities and weaknesses.
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More
Choosing the right backup solution is critical for system administrators and IT professionals. The upcoming NetEye 4.41 version will bring an update to MariaDB, moving from version 10.3 to 10.11. This makes it especially timely to explore the opportunities offered Read More
In NetEye environments we use Tornado to collect events, elaborate on them, and send notifications based on them from a lot of sources (syslog, email, SNMP traps and so on). In this article I'd like to suggest a different use Read More