SlideShare a Scribd company logo
monitoringMonitoring
mostly
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
…
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”level=’error’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”source=’App1’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”source=’App1‘”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”source=’App1’ or source=’App3’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”source=’App1’ or source=’App3’ 
or level=’error’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”source=’App1’ or source=’App3’ 
or level=’error’ or level=’warning’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”(source=’App1’ or source=’App3’ 
or level=’error’ or level=’warning’)and source!=’Excel’”
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=”(source = ’App1’ or source = ’App3’or level = ’error’ or level = ’warning’) and source != ’Excel’” 
filter=”(source in (’App1’,’App3’)or level in (’error’,’warning’)) and source != ’Excel’”
filter = (id NOT IN ('3', '4', '6', '11', '16', '23', '24', '27', '29', '36', '46', '47', '50', '56', '134', '142', '219', '267', '270', '1006', '1009', '1014', '1030', '1035', '1036', '1055', '1058', '1071', '1073', '1085', '1102', '1110', '1111', '1112', '1131', '1291', '1500', '3095', '5719', '5722', '5783', '5788', '5789', '6008', '7000', '7001', '7003', '7005', '7009', '7011', '7022', '7023', '7024', '7026', '7030', '7031', '7034', '7038', '7041', '9015', '9018', '9026', '9028', '10009', '10010', '10016', '10149', '12294', '15300', '15301', '24679', '36887', '36888', '40960', '40961', '45056') AND level IN ('error', 'warning')) OR (id IN ('3') AND source NOT IN ('FilterManager') AND level IN ('error', 'warning')) OR (id IN ('4') AND source NOT IN ('q57','L2ND') AND level IN ('error', 'warning')) OR (id IN ('6') AND source NOT IN ('Security-Kerberos') AND level IN ('error', 'warning')) OR (id IN ('11') AND source NOT IN ('Kerberos-Key- Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('16') AND source NOT IN ('WindowsUpdateClient') AND level IN ('error', 'warning')) OR (id IN ('23') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('24') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('27') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('29') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('36') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('46') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('47') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('50') AND source NOT IN ('TermDD','Time-Service') AND level IN ('error', 'warning')) OR (id IN ('56') AND source NOT IN ('TermDD') AND level IN ('error', 'warning')) OR (id IN ('134') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('142') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('219') AND source NOT IN ('Kernel-pnp') AND level IN ('error', 'warning')) OR (id IN ('267') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('270') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('1006') AND source NOT IN ('DNS Client Events','GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1009') AND source NOT IN ('picadm') AND level IN ('error', 'warning')) OR (id IN ('1014') AND source NOT IN ('DNS Client Events') AND level IN ('error', 'warning')) OR (id IN ('1030') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR
Key 
Safe Key 
Description 
= 
eq 
Equals 
!= 
ne 
Notequals 
> 
gt 
Greater than 
< 
lt 
Less than 
>= 
ge 
Greater or equal than 
<= 
le 
Less or equal than 
in ( <LISTOF VALUES>) 
In a given list 
not in (…) 
Not in a given list
Key 
Safe Key 
Description 
= 
eq 
Equals 
!= 
ne 
Notequals 
> 
gt 
Greater than 
< 
lt 
Less than 
>= 
ge 
Greater or equal than 
<= 
le 
Less or equal than 
in ( <LISTOF VALUES>) 
In a given list 
not in (…) 
Not in a given list 
like 
Substring matching 
regexp 
Regular expression 
not like 
Opposite of like 
not regexp 
Oppositeof regexp
Filter 
Warning 
Critical
Level 
Source 
… 
… 
Error 
Word 
… 
… 
Error 
Excel 
… 
… 
Info 
Word 
… 
… 
Warning 
Excel 
… 
… 
Error 
App1 
… 
… 
Warning 
App1 
… 
… 
Error 
App3 
… 
… 
filter=” source = ’App1’“ 
warn=” level = ’Warning’“
detail-syntax=”s: ${source} “ 
top-syntax=“Hello: ${list}” 
Hello: s: App1, s: App1, s: App3
check_pagefile 
"filter=name= 'total'” 
check_uptime 
"warn=uptime < -2d“ 
"crit=uptime < -1d“ 
check_processprocess=explorer.exe 
"warn=working_set> 70m" 
"detail-syntax=${exe} 
ws:${working_set}, 
handles: ${handles}, 
usertime:${user}s”
Writing bounds
5:1 Usingwarn/critexpressions
C:foobarhelpindex.html 
Critical if cpubelow 75% 
Warn if cpubetween 25% and 75% 
What boundaries are available for check_memory?
Critical if cpubelow 75% 
Warn if cpubetween 25% and 75% 
What boundaries are available for check_memory? 
C:foobarhelpindex.html 
nscptest 
loadCheckSystem
Critical if cpubelow 75% 
Warn if cpubetween 25% and 75% 
What boundaries are available for check_memory? 
C:foobarhelpindex.html 
nscptest 
loadCheckSystem 
check_cpu”warn=…” 
check_cpu”warn=…”
Critical if cpubelow 75% 
Warn if cpubetween 25% and 75% 
What boundaries are available for check_memory? 
C:foobarhelpindex.html 
nscptest 
loadCheckSystem 
check_cpu”warn=loadlt75” 
check_cpu”warn=loadlt75 and loadgt25”
Filters
5:2 Usingfilters
C:nsclienthelpindex.html 
What’s the default filter for check_cpu 
Check the load of all cores 
Check only the total page file
What’s the default filter for check_cpu 
Check the load of all cores 
Check only the total page file 
C:nsclienthelpindex.html 
nscptest 
loadCheckSystem
What’s the default filter for check_cpu 
Check the load of all cores 
Check only the total page file 
C:nsclienthelpindex.html 
nscptest 
loadCheckSystem 
check_cpu”filter=…” show-all 
check_pagefile”filter=…”show-all
What’s the default filter for check_cpu 
Check the load of all cores 
Check only the total page file 
C:nsclienthelpindex.html 
nscptest 
loadCheckSystem 
check_cpu”filter=none”show-all 
check_pagefile”filter=name= ’total’”show-all
Advancedfilters
6:3 Advancedfilters
Re-createcheck_eventlogdefaults”as a real command”
Re-createcheck_eventlogdefaults”as a real command” 
Check_eventloghelp-short
Re-createcheck_eventlogdefaults”as a real command” 
"warn=count > 0“ "crit=count > 5“ "filter=level in ('error', 'warning')" "top-syntax=${status}: ${problem_count}/${count} ${problem_list}“ "detail- syntax=${file} ${source} (${message})“ "perf- syntax=${file}_${source}“ "unique-index=${log}-${source}- ${id}“ scan-rande=-24h file=Application file=System
"warn=count> 0" "crit=count> 5" "filter=levelin ('error', 'warning')" "top-syntax=${status}: ${problem_count}/${count} ${problem_list}" "detail-syntax=${file} ${source} (${message})" "perf-syntax=${file}_${source}" "unique-index=${log}-${source}-${id}" scan-rande=-24hfile=Applicationfile=System
check_servicecomputer=192.168.0.1 
check_diskdrive=192.168.0.1c$ 
check_task_schedcomputer=192.168.0.1 
check_wmicomputer=192.168.0.1
NSClient++ Workshop: 05 Monitoring

More Related Content

Similar to NSClient++ Workshop: 05 Monitoring

Ns client++ icinga camp
Ns client++ icinga campNs client++ icinga camp
Ns client++ icinga camp
Michael Medin
 
Ns client++ whats new (nwc2013)
Ns client++ whats new (nwc2013)Ns client++ whats new (nwc2013)
Ns client++ whats new (nwc2013)
Michael Medin
 
Nagios Conference 2013 - Michael Medin - NSClient++ Whats New
Nagios Conference 2013 - Michael Medin - NSClient++ Whats NewNagios Conference 2013 - Michael Medin - NSClient++ Whats New
Nagios Conference 2013 - Michael Medin - NSClient++ Whats New
Nagios
 
APIs and Synthetic Biology
APIs and Synthetic BiologyAPIs and Synthetic Biology
APIs and Synthetic Biology
Uri Laserson
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
MITRE ATT&CK
 
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Security Slicing for Auditing XML, XPath, and SQL Injection VulnerabilitiesSecurity Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Lionel Briand
 
SSL Failing, Sharing, and Scheduling
SSL Failing, Sharing, and SchedulingSSL Failing, Sharing, and Scheduling
SSL Failing, Sharing, and Scheduling
David Evans
 
Introduction to Perl
Introduction to PerlIntroduction to Perl
Introduction to Perl
NBACriteria2SICET
 
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
Franklin Mosley
 
Teaching Your Machine To Find Fraudsters
Teaching Your Machine To Find FraudstersTeaching Your Machine To Find Fraudsters
Teaching Your Machine To Find Fraudsters
Ian Barber
 
The Art of Identifying Vulnerabilities - CascadiaFest 2015
The Art of Identifying Vulnerabilities  - CascadiaFest 2015The Art of Identifying Vulnerabilities  - CascadiaFest 2015
The Art of Identifying Vulnerabilities - CascadiaFest 2015
Adam Baldwin
 
SPL, not a bridge too far
SPL, not a bridge too farSPL, not a bridge too far
SPL, not a bridge too far
Michelangelo van Dam
 
10 Rules for Safer Code [Odoo Experience 2016]
10 Rules for Safer Code [Odoo Experience 2016]10 Rules for Safer Code [Odoo Experience 2016]
10 Rules for Safer Code [Odoo Experience 2016]
Olivier Dony
 
10 Rules for Safer Code
10 Rules for Safer Code10 Rules for Safer Code
10 Rules for Safer Code
Quang Ngoc
 
C C++ tutorial for beginners- tibacademy.in
C C++ tutorial for beginners- tibacademy.inC C++ tutorial for beginners- tibacademy.in
C C++ tutorial for beginners- tibacademy.in
TIB Academy
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
AdaCore
 
Automated code audits
Automated code auditsAutomated code audits
Automated code audits
Damien Seguy
 
Javascript & jQuery: A pragmatic introduction
Javascript & jQuery: A pragmatic introductionJavascript & jQuery: A pragmatic introduction
Javascript & jQuery: A pragmatic introduction
Iban Martinez
 

Similar to NSClient++ Workshop: 05 Monitoring (20)

Ns client++ icinga camp
Ns client++ icinga campNs client++ icinga camp
Ns client++ icinga camp
 
Ns client++ whats new (nwc2013)
Ns client++ whats new (nwc2013)Ns client++ whats new (nwc2013)
Ns client++ whats new (nwc2013)
 
Nagios Conference 2013 - Michael Medin - NSClient++ Whats New
Nagios Conference 2013 - Michael Medin - NSClient++ Whats NewNagios Conference 2013 - Michael Medin - NSClient++ Whats New
Nagios Conference 2013 - Michael Medin - NSClient++ Whats New
 
APIs and Synthetic Biology
APIs and Synthetic BiologyAPIs and Synthetic Biology
APIs and Synthetic Biology
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Security Slicing for Auditing XML, XPath, and SQL Injection VulnerabilitiesSecurity Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
 
SSL Failing, Sharing, and Scheduling
SSL Failing, Sharing, and SchedulingSSL Failing, Sharing, and Scheduling
SSL Failing, Sharing, and Scheduling
 
Introduction to Perl
Introduction to PerlIntroduction to Perl
Introduction to Perl
 
Kotlers slideshow
Kotlers slideshowKotlers slideshow
Kotlers slideshow
 
Kotlers slideshow
Kotlers slideshowKotlers slideshow
Kotlers slideshow
 
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
 
Teaching Your Machine To Find Fraudsters
Teaching Your Machine To Find FraudstersTeaching Your Machine To Find Fraudsters
Teaching Your Machine To Find Fraudsters
 
The Art of Identifying Vulnerabilities - CascadiaFest 2015
The Art of Identifying Vulnerabilities  - CascadiaFest 2015The Art of Identifying Vulnerabilities  - CascadiaFest 2015
The Art of Identifying Vulnerabilities - CascadiaFest 2015
 
SPL, not a bridge too far
SPL, not a bridge too farSPL, not a bridge too far
SPL, not a bridge too far
 
10 Rules for Safer Code [Odoo Experience 2016]
10 Rules for Safer Code [Odoo Experience 2016]10 Rules for Safer Code [Odoo Experience 2016]
10 Rules for Safer Code [Odoo Experience 2016]
 
10 Rules for Safer Code
10 Rules for Safer Code10 Rules for Safer Code
10 Rules for Safer Code
 
C C++ tutorial for beginners- tibacademy.in
C C++ tutorial for beginners- tibacademy.inC C++ tutorial for beginners- tibacademy.in
C C++ tutorial for beginners- tibacademy.in
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
 
Automated code audits
Automated code auditsAutomated code audits
Automated code audits
 
Javascript & jQuery: A pragmatic introduction
Javascript & jQuery: A pragmatic introductionJavascript & jQuery: A pragmatic introduction
Javascript & jQuery: A pragmatic introduction
 

More from Michael Medin

IcingaCamp Berlin 2018 NSClient++ and friends
IcingaCamp Berlin 2018 NSClient++ and friendsIcingaCamp Berlin 2018 NSClient++ and friends
IcingaCamp Berlin 2018 NSClient++ and friends
Michael Medin
 
Extending NSClient++ with rest and python
Extending NSClient++ with rest and pythonExtending NSClient++ with rest and python
Extending NSClient++ with rest and python
Michael Medin
 
The technology of tomorrows integration plattform
The technology of tomorrows integration plattformThe technology of tomorrows integration plattform
The technology of tomorrows integration plattform
Michael Medin
 
Integration Plattform of Tomorrow
Integration Plattform of TomorrowIntegration Plattform of Tomorrow
Integration Plattform of Tomorrow
Michael Medin
 
Automated monitoring with NSClient++ and Icinga
Automated monitoring with NSClient++ and IcingaAutomated monitoring with NSClient++ and Icinga
Automated monitoring with NSClient++ and Icinga
Michael Medin
 
Continuous delivery from the trenches Redhat Forum Edition
Continuous delivery from the trenches Redhat Forum EditionContinuous delivery from the trenches Redhat Forum Edition
Continuous delivery from the trenches Redhat Forum Edition
Michael Medin
 
Continuous delivery @CD Summit Stockholm
Continuous delivery @CD Summit StockholmContinuous delivery @CD Summit Stockholm
Continuous delivery @CD Summit Stockholm
Michael Medin
 
Continuous Delivery at Oracle Database Insights
Continuous Delivery at Oracle Database InsightsContinuous Delivery at Oracle Database Insights
Continuous Delivery at Oracle Database Insights
Michael Medin
 
Continuous delivery from the trenches
Continuous delivery from the trenchesContinuous delivery from the trenches
Continuous delivery from the trenches
Michael Medin
 
NSClient++....or not
NSClient++....or notNSClient++....or not
NSClient++....or not
Michael Medin
 
Continuous Delivery in the Enterprise
Continuous Delivery in the EnterpriseContinuous Delivery in the Enterprise
Continuous Delivery in the Enterprise
Michael Medin
 
Oracle SOA Suite 12c 1z0-434 Day 1/3
Oracle SOA Suite 12c 1z0-434 Day 1/3Oracle SOA Suite 12c 1z0-434 Day 1/3
Oracle SOA Suite 12c 1z0-434 Day 1/3
Michael Medin
 
Integration in the Cloud
Integration in the CloudIntegration in the Cloud
Integration in the Cloud
Michael Medin
 
The Road to Oracle SOA Suite 12c
The Road to Oracle SOA Suite 12cThe Road to Oracle SOA Suite 12c
The Road to Oracle SOA Suite 12c
Michael Medin
 
Enabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryEnabling Mobility through Continuous Delivery
Enabling Mobility through Continuous Delivery
Michael Medin
 
NSClient++ Workshop: 06 Scripting
NSClient++ Workshop: 06 ScriptingNSClient++ Workshop: 06 Scripting
NSClient++ Workshop: 06 Scripting
Michael Medin
 
NSClient Workshop: 04 Protocols
NSClient Workshop: 04 ProtocolsNSClient Workshop: 04 Protocols
NSClient Workshop: 04 Protocols
Michael Medin
 
NSClient++ Workshop: 03 Installation
NSClient++ Workshop: 03 InstallationNSClient++ Workshop: 03 Installation
NSClient++ Workshop: 03 Installation
Michael Medin
 
NSClient++ Workshop: 01 Introduction
NSClient++ Workshop: 01 IntroductionNSClient++ Workshop: 01 Introduction
NSClient++ Workshop: 01 Introduction
Michael Medin
 
Why we do monitoring Wrong #osmc edition
Why we do monitoring Wrong #osmc editionWhy we do monitoring Wrong #osmc edition
Why we do monitoring Wrong #osmc edition
Michael Medin
 

More from Michael Medin (20)

IcingaCamp Berlin 2018 NSClient++ and friends
IcingaCamp Berlin 2018 NSClient++ and friendsIcingaCamp Berlin 2018 NSClient++ and friends
IcingaCamp Berlin 2018 NSClient++ and friends
 
Extending NSClient++ with rest and python
Extending NSClient++ with rest and pythonExtending NSClient++ with rest and python
Extending NSClient++ with rest and python
 
The technology of tomorrows integration plattform
The technology of tomorrows integration plattformThe technology of tomorrows integration plattform
The technology of tomorrows integration plattform
 
Integration Plattform of Tomorrow
Integration Plattform of TomorrowIntegration Plattform of Tomorrow
Integration Plattform of Tomorrow
 
Automated monitoring with NSClient++ and Icinga
Automated monitoring with NSClient++ and IcingaAutomated monitoring with NSClient++ and Icinga
Automated monitoring with NSClient++ and Icinga
 
Continuous delivery from the trenches Redhat Forum Edition
Continuous delivery from the trenches Redhat Forum EditionContinuous delivery from the trenches Redhat Forum Edition
Continuous delivery from the trenches Redhat Forum Edition
 
Continuous delivery @CD Summit Stockholm
Continuous delivery @CD Summit StockholmContinuous delivery @CD Summit Stockholm
Continuous delivery @CD Summit Stockholm
 
Continuous Delivery at Oracle Database Insights
Continuous Delivery at Oracle Database InsightsContinuous Delivery at Oracle Database Insights
Continuous Delivery at Oracle Database Insights
 
Continuous delivery from the trenches
Continuous delivery from the trenchesContinuous delivery from the trenches
Continuous delivery from the trenches
 
NSClient++....or not
NSClient++....or notNSClient++....or not
NSClient++....or not
 
Continuous Delivery in the Enterprise
Continuous Delivery in the EnterpriseContinuous Delivery in the Enterprise
Continuous Delivery in the Enterprise
 
Oracle SOA Suite 12c 1z0-434 Day 1/3
Oracle SOA Suite 12c 1z0-434 Day 1/3Oracle SOA Suite 12c 1z0-434 Day 1/3
Oracle SOA Suite 12c 1z0-434 Day 1/3
 
Integration in the Cloud
Integration in the CloudIntegration in the Cloud
Integration in the Cloud
 
The Road to Oracle SOA Suite 12c
The Road to Oracle SOA Suite 12cThe Road to Oracle SOA Suite 12c
The Road to Oracle SOA Suite 12c
 
Enabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryEnabling Mobility through Continuous Delivery
Enabling Mobility through Continuous Delivery
 
NSClient++ Workshop: 06 Scripting
NSClient++ Workshop: 06 ScriptingNSClient++ Workshop: 06 Scripting
NSClient++ Workshop: 06 Scripting
 
NSClient Workshop: 04 Protocols
NSClient Workshop: 04 ProtocolsNSClient Workshop: 04 Protocols
NSClient Workshop: 04 Protocols
 
NSClient++ Workshop: 03 Installation
NSClient++ Workshop: 03 InstallationNSClient++ Workshop: 03 Installation
NSClient++ Workshop: 03 Installation
 
NSClient++ Workshop: 01 Introduction
NSClient++ Workshop: 01 IntroductionNSClient++ Workshop: 01 Introduction
NSClient++ Workshop: 01 Introduction
 
Why we do monitoring Wrong #osmc edition
Why we do monitoring Wrong #osmc editionWhy we do monitoring Wrong #osmc edition
Why we do monitoring Wrong #osmc edition
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

NSClient++ Workshop: 05 Monitoring

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … …
  • 10. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”level=’error’”
  • 11. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”source=’App1’”
  • 12. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”source=’App1‘”
  • 13. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”source=’App1’ or source=’App3’”
  • 14. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”source=’App1’ or source=’App3’ or level=’error’”
  • 15. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”source=’App1’ or source=’App3’ or level=’error’ or level=’warning’”
  • 16. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”(source=’App1’ or source=’App3’ or level=’error’ or level=’warning’)and source!=’Excel’”
  • 17. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=”(source = ’App1’ or source = ’App3’or level = ’error’ or level = ’warning’) and source != ’Excel’” filter=”(source in (’App1’,’App3’)or level in (’error’,’warning’)) and source != ’Excel’”
  • 18. filter = (id NOT IN ('3', '4', '6', '11', '16', '23', '24', '27', '29', '36', '46', '47', '50', '56', '134', '142', '219', '267', '270', '1006', '1009', '1014', '1030', '1035', '1036', '1055', '1058', '1071', '1073', '1085', '1102', '1110', '1111', '1112', '1131', '1291', '1500', '3095', '5719', '5722', '5783', '5788', '5789', '6008', '7000', '7001', '7003', '7005', '7009', '7011', '7022', '7023', '7024', '7026', '7030', '7031', '7034', '7038', '7041', '9015', '9018', '9026', '9028', '10009', '10010', '10016', '10149', '12294', '15300', '15301', '24679', '36887', '36888', '40960', '40961', '45056') AND level IN ('error', 'warning')) OR (id IN ('3') AND source NOT IN ('FilterManager') AND level IN ('error', 'warning')) OR (id IN ('4') AND source NOT IN ('q57','L2ND') AND level IN ('error', 'warning')) OR (id IN ('6') AND source NOT IN ('Security-Kerberos') AND level IN ('error', 'warning')) OR (id IN ('11') AND source NOT IN ('Kerberos-Key- Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('16') AND source NOT IN ('WindowsUpdateClient') AND level IN ('error', 'warning')) OR (id IN ('23') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('24') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('27') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('29') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('36') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('46') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('47') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('50') AND source NOT IN ('TermDD','Time-Service') AND level IN ('error', 'warning')) OR (id IN ('56') AND source NOT IN ('TermDD') AND level IN ('error', 'warning')) OR (id IN ('134') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('142') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('219') AND source NOT IN ('Kernel-pnp') AND level IN ('error', 'warning')) OR (id IN ('267') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('270') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('1006') AND source NOT IN ('DNS Client Events','GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1009') AND source NOT IN ('picadm') AND level IN ('error', 'warning')) OR (id IN ('1014') AND source NOT IN ('DNS Client Events') AND level IN ('error', 'warning')) OR (id IN ('1030') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR
  • 19. Key Safe Key Description = eq Equals != ne Notequals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LISTOF VALUES>) In a given list not in (…) Not in a given list
  • 20. Key Safe Key Description = eq Equals != ne Notequals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LISTOF VALUES>) In a given list not in (…) Not in a given list like Substring matching regexp Regular expression not like Opposite of like not regexp Oppositeof regexp
  • 21.
  • 23. Level Source … … Error Word … … Error Excel … … Info Word … … Warning Excel … … Error App1 … … Warning App1 … … Error App3 … … filter=” source = ’App1’“ warn=” level = ’Warning’“
  • 24. detail-syntax=”s: ${source} “ top-syntax=“Hello: ${list}” Hello: s: App1, s: App1, s: App3
  • 25. check_pagefile "filter=name= 'total'” check_uptime "warn=uptime < -2d“ "crit=uptime < -1d“ check_processprocess=explorer.exe "warn=working_set> 70m" "detail-syntax=${exe} ws:${working_set}, handles: ${handles}, usertime:${user}s”
  • 28. C:foobarhelpindex.html Critical if cpubelow 75% Warn if cpubetween 25% and 75% What boundaries are available for check_memory?
  • 29. Critical if cpubelow 75% Warn if cpubetween 25% and 75% What boundaries are available for check_memory? C:foobarhelpindex.html nscptest loadCheckSystem
  • 30. Critical if cpubelow 75% Warn if cpubetween 25% and 75% What boundaries are available for check_memory? C:foobarhelpindex.html nscptest loadCheckSystem check_cpu”warn=…” check_cpu”warn=…”
  • 31. Critical if cpubelow 75% Warn if cpubetween 25% and 75% What boundaries are available for check_memory? C:foobarhelpindex.html nscptest loadCheckSystem check_cpu”warn=loadlt75” check_cpu”warn=loadlt75 and loadgt25”
  • 34. C:nsclienthelpindex.html What’s the default filter for check_cpu Check the load of all cores Check only the total page file
  • 35. What’s the default filter for check_cpu Check the load of all cores Check only the total page file C:nsclienthelpindex.html nscptest loadCheckSystem
  • 36. What’s the default filter for check_cpu Check the load of all cores Check only the total page file C:nsclienthelpindex.html nscptest loadCheckSystem check_cpu”filter=…” show-all check_pagefile”filter=…”show-all
  • 37. What’s the default filter for check_cpu Check the load of all cores Check only the total page file C:nsclienthelpindex.html nscptest loadCheckSystem check_cpu”filter=none”show-all check_pagefile”filter=name= ’total’”show-all
  • 41. Re-createcheck_eventlogdefaults”as a real command” Check_eventloghelp-short
  • 42. Re-createcheck_eventlogdefaults”as a real command” "warn=count > 0“ "crit=count > 5“ "filter=level in ('error', 'warning')" "top-syntax=${status}: ${problem_count}/${count} ${problem_list}“ "detail- syntax=${file} ${source} (${message})“ "perf- syntax=${file}_${source}“ "unique-index=${log}-${source}- ${id}“ scan-rande=-24h file=Application file=System
  • 43. "warn=count> 0" "crit=count> 5" "filter=levelin ('error', 'warning')" "top-syntax=${status}: ${problem_count}/${count} ${problem_list}" "detail-syntax=${file} ${source} (${message})" "perf-syntax=${file}_${source}" "unique-index=${log}-${source}-${id}" scan-rande=-24hfile=Applicationfile=System
  • 44.
  • 45.