Kategorie
Ebooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komputer w biurze
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Multimedialne szkolenia
- Nieruchomości
- Perswazja i NLP
- Podatki
- Polityka społeczna
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Raporty, analizy
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
E-prasa
- Architektura i wnętrza
- Biznes i Ekonomia
- Dom i ogród
- E-Biznes
- Finanse
- Finanse osobiste
- Firma
- Fotografia
- Informatyka
- Kadry i płace
- Komputery, Excel
- Księgowość
- Kultura i literatura
- Naukowe i akademickie
- Ochrona środowiska
- Opiniotwórcze
- Oświata
- Podatki
- Podróże
- Psychologia
- Religia
- Rolnictwo
- Rynek książki i prasy
- Transport i Spedycja
- Zdrowie i uroda
-
Historia
-
Informatyka
- Aplikacje biurowe
- Bazy danych
- Bioinformatyka
- Biznes IT
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronika
- Fotografia cyfrowa
- Grafika komputerowa
- Gry
- Hacking
- Hardware
- IT w ekonomii
- Pakiety naukowe
- Podręczniki szkolne
- Podstawy komputera
- Programowanie
- Programowanie mobilne
- Serwery internetowe
- Sieci komputerowe
- Start-up
- Systemy operacyjne
- Sztuczna inteligencja
- Technologia dla dzieci
- Webmasterstwo
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poemat
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Podręczniki szkolne
-
Popularnonaukowe i akademickie
- Archeologia
- Bibliotekoznawstwo
- Filmoznawstwo
- Filologia
- Filologia polska
- Filozofia
- Finanse i bankowość
- Geografia
- Gospodarka
- Handel. Gospodarka światowa
- Historia i archeologia
- Historia sztuki i architektury
- Kulturoznawstwo
- Lingwistyka
- Literaturoznawstwo
- Logistyka
- Matematyka
- Medycyna
- Nauki humanistyczne
- Pedagogika
- Pomoce naukowe
- Popularnonaukowa
- Pozostałe
- Psychologia
- Socjologia
- Teatrologia
- Teologia
- Teorie i nauki ekonomiczne
- Transport i spedycja
- Wychowanie fizyczne
- Zarządzanie i marketing
-
Poradniki
-
Poradniki do gier
-
Poradniki zawodowe i specjalistyczne
-
Prawo
- BHP
- Historia
- Kodeks drogowy. Prawo jazdy
- Nauki prawne
- Ochrona zdrowia
- Ogólne, kompendium wiedzy
- Podręczniki akademickie
- Pozostałe
- Prawo budowlane i lokalowe
- Prawo cywilne
- Prawo finansowe
- Prawo gospodarcze
- Prawo gospodarcze i handlowe
- Prawo karne
- Prawo karne. Przestępstwa karne. Kryminologia
- Prawo międzynarodowe
- Prawo międzynarodowe i zagraniczne
- Prawo ochrony zdrowia
- Prawo oświatowe
- Prawo podatkowe
- Prawo pracy i ubezpieczeń społecznych
- Prawo publiczne, konstytucyjne i administracyjne
- Prawo rodzinne i opiekuńcze
- Prawo rolne
- Prawo socjalne, prawo pracy
- Prawo Unii Europejskiej
- Przemysł
- Rolne i ochrona środowiska
- Słowniki i encyklopedie
- Zamówienia publiczne
- Zarządzanie
-
Przewodniki i podróże
- Afryka
- Albumy
- Ameryka Południowa
- Ameryka Środkowa i Północna
- Australia, Nowa Zelandia, Oceania
- Austria
- Azja
- Bałkany
- Bliski Wschód
- Bułgaria
- Chiny
- Chorwacja
- Czechy
- Dania
- Egipt
- Estonia
- Europa
- Francja
- Góry
- Grecja
- Hiszpania
- Holandia
- Islandia
- Litwa
- Łotwa
- Mapy, Plany miast, Atlasy
- Miniprzewodniki
- Niemcy
- Norwegia
- Podróże aktywne
- Polska
- Portugalia
- Pozostałe
- Rosja
- Rumunia
- Słowacja
- Słowenia
- Szwajcaria
- Szwecja
- Świat
- Turcja
- Ukraina
- Węgry
- Wielka Brytania
- Włochy
-
Psychologia
- Filozofie życiowe
- Kompetencje psychospołeczne
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Audiobooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Nieruchomości
- Perswazja i NLP
- Podatki
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
Historia
-
Informatyka
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Popularnonaukowe i akademickie
-
Poradniki
-
Poradniki zawodowe i specjalistyczne
-
Prawo
-
Przewodniki i podróże
-
Psychologia
- Filozofie życiowe
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Kursy video
-
Bazy danych
-
Big Data
-
Biznes, ekonomia i marketing
-
Cyberbezpieczeństwo
-
Data Science
-
DevOps
-
Dla dzieci
-
Elektronika
-
Grafika/Wideo/CAX
-
Gry
-
Microsoft Office
-
Narzędzia programistyczne
-
Programowanie
-
Rozwój osobisty
-
Sieci komputerowe
-
Systemy operacyjne
-
Testowanie oprogramowania
-
Urządzenia mobilne
-
UX/UI
-
Web development
-
Zarządzanie
Podcasty
- Ebooki
- Programowanie
- Techniki programowania
- Nagios Core Administration Cookbook. The ideal book for System Administrators who want to move their network monitoring to an advanced level. This book covers the powerful features and flexibility of Nagios Core, and its recipes can be applied to virtually any network
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.
Nagios Core Administration Cookbook. The ideal book for System Administrators who want to move their network monitoring to an advanced level. This book covers the powerful features and flexibility of Nagios Core, and its recipes can be applied to virtually any network
Ebook
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks' major functions on a regular basis.Nagios Core Administration Cookbook will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administration Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts and then goes on to discuss advanced usage of checks and notifications, and configuring intelligent behaviour with network paths and dependencies. The cookbook emphasizes using Nagios Core as an extensible monitoring framework. By the end of the book, you will learn that Nagios Core is capable of doing much more than pinging a host or to check if websites respond.
- Nagios Core Administration Cookbook
- Table of Contents
- Nagios Core Administration Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. Understanding Hosts, Services, and Contacts
- Introduction
- Creating a new network host
- Getting ready
- How to do it...
- How it works...
- Theres more...
- See also
- Creating a new HTTP service
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new e-mail contact
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Verifying configuration
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new hostgroup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new servicegroup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new contactgroup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new time period
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Running a service on all hosts in a group
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 2. Working with Commands and Plugins
- Introduction
- Finding a plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Installing a plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Removing a plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating a new command
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Customizing an existing command
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using an alternative check command for hosts
- Getting ready
- How to do it...
- How it works
- There's more...
- See also
- Writing a new plugin from scratch
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 3. Working with Checks and States
- Introduction
- Specifying how frequently to check a host or service
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Changing thresholds for PING RTT and packet loss
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Changing thresholds for disk usage
- Getting ready
- How to do it...
- How it works
- There's more...
- See also
- Scheduling downtime for a host or service
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Managing brief outages with flapping
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Adjusting flapping percentage thresholds for a service
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 4. Configuring Notifications
- Introduction
- Configuring notification periods
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring notification for groups
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Specifying which states to be notified about
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Tolerating a certain number of failed checks
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Automating contact rotation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Defining an escalation for repeated notifications
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Defining a custom notification method
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 5. Monitoring Methods
- Introduction
- Monitoring PING for any host
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring SSH for any host
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Checking an alternative SSH port
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring mail services
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring web services
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Checking that a website returns a given string
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring database services
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring the output of an SNMP query
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring a RAID or other hardware device
- Getting ready
- How to do it...
- How it works...
- See also
- Creating an SNMP OID to monitor
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 6. Enabling Remote Execution
- Introduction
- Monitoring local services on a remote machine with NRPE
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Setting the listening address for NRPE
- Getting ready
- How to do it...
- How it works...
- See also
- Setting allowed client hosts for NRPE
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Creating new NRPE command definitions securely
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Giving limited sudo privileges to NRPE
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using check_by_ssh with key authentication instead of NRPE
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 7. Using the Web Interface
- Introduction
- Using the Tactical Overview
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Viewing and interpreting availability reports
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Viewing and interpreting trends
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Viewing and interpreting notification history
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Adding comments on hosts or services in the web interface
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Viewing configuration in the web interface
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Scheduling checks from the web interface
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- Acknowledging a problem via the web interface
- Getting started
- How to do it...
- How it works...
- There's more...
- See also
- 8. Managing Network Layout
- Introduction
- Creating a network host hierarchy
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using the network map
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Choosing icons for hosts
- Getting ready
- How to do it...
- How it works...
- There's more
- See also
- Establishing a host dependency
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Establishing a service dependency
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring individual nodes in a cluster
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using the network map as an overlay
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 9. Managing Configuration
- Introduction
- Grouping configuration files in directories
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Keeping configuration under version control
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring host roles using groups
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Building groups using regular expressions
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using inheritance to simplify configuration
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Defining macros in a resource file
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Dynamically building host definitions
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 10. Security and Performance
- Introduction
- Requiring authentication for the web interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using authenticated contacts
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Writing debugging information to a Nagios log file
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Monitoring Nagios performance with Nagiostats
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Improving startup times with pre-cached object files
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Setting up a redundant monitoring host
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 11. Automating and Extending Nagios Core
- Introduction
- Allowing and submitting passive checks
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Submitting passive checks from a remote host with NSCA
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Submitting passive checks in response to SNMP traps
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Setting up an event handler script
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Tracking host and service states with Nagiosgraph
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Reading status into a MySQL database with NDOUtils
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Writing customized Nagios Core reports
- Getting ready
- How to do it...
- How it works...
- See also
- Getting extra visualizations with NagVis
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Index
- Tytuł: Nagios Core Administration Cookbook. The ideal book for System Administrators who want to move their network monitoring to an advanced level. This book covers the powerful features and flexibility of Nagios Core, and its recipes can be applied to virtually any network
- Autor: Tom Ryder
- Tytuł oryginału: Nagios Core Administration Cookbook. The ideal book for System Administrators who want to move their network monitoring to an advanced level. This book covers the powerful features and flexibility of Nagios Core, and its recipes can be applied to virtually any network.
- ISBN: 9781849515573, 9781849515573
- Data wydania: 2013-01-25
- Format: Ebook
- Identyfikator pozycji: e_3cwz
- Wydawca: Packt Publishing