cumulative number of consecutive inaccessible to reach 5 times after the alarm message triggered.
How to use:The script needs to be followed by two parameters: the first parameter is the URL of the monitoring site, the second parameter is the delay time (optional, in seconds, it is recommended to add when monitoring multiple sites), add this script to the operating system crontab, set the operating frequency according to the demand, Recommended 2 mi
Linux system monitoring commands There are many, Pidstat command is one of them, using the Pidstat command can be used to monitor the Linux system process data, but first to install the Pidstat to use, The following small series for you to introduce the
You can use the inotify mechanism provided by Linux 2.6 kenel to monitor file system changes, such as adding, deleting, and modifying files.
The following is an example program that can be used to monitor a directory. If you create, delete, or modify a file under this directory, a prompt will be displayed to print the
Generally, when the client uses LoadRunner to perform stress tests on the server, the system resources on the server must be monitored in real time. This article describes how to configure monitoring windows Resources in the LoadRunner controller, in fact, you can also enable the task manager on the remote connection server side or find the performance counter in the control panel to monitor it, but in orde
Monitor the number of opened files in the nagios Agent System
Vi check_open_file.c (for linux only)
#include
#include
#include
#define OK 0#define WARNING 1#define CRITICAL 2#define UNKNOWN 3#define LEN 1000#define FILE_NR "/proc/sys/fs/file-nr"int exitstatus=OK;char *exit_status[4]={"OK","WARNING","CRITICAL","UNKNOWN"};char status_in
If you need to track the system calls that a process makes and receives, the first thing to think about is what? You probably think of strace, you're right. Monitor raw network traffic from the command line what tools do you use? If you think of tcpdump, you have made a wise decision. If you happen to need to keep track of open files (in other words the Unix language is: Everything is file), chances are you
In everyday applications, you will often experience the following scenarios, monitor folder A, and execute the C command if the B file in the folder changes. Linux can perform this function through INotify.
Since Linux kernel 2.6.13, INotify is part of the kernel and requires GLIBC 2.4 or more versions.
1. Correlation function
Inotify_init ()-Create a INotify ins
Label:Using shell scripts to monitor and manage Oracle databases will greatly simplify the workload of DBAs, such as common monitoring of instances, monitoring of monitors, monitoring of alarm logs, backup of databases, automatic mailing of AWR report, etc. This article gives the use of shell scripts to monitor Oracle listeners under Linux. Reference for
Using shell scripts to monitor and manage Oracle databases will greatly simplify DBA workload, such as common instance monitoring, monitoring, and alarm log monitoring, and database backup, AWR report automatic mail, etc. This section describes how to use shell scripts to monitor Oracle listeners in Linux.
Linux Shell:
For many self-implemented services, many people prefer to use a dedicated monitoring process to monitor their own services. To prevent the monitoring process from collapsing, they even use classic dual-process monitoring. Not to mention anything else, writing and debugging this dual process is enough for me to have a pot of tea. It is a tough task for me to write bugs like this. Even one day, I will not write any bugs, but you will not be able to go t
When the system administrator is not in the data center, how can he continue to monitor and manage the Linux server and understand the running status of the Linux server. There are many ways to achieve remote management and monitoring of Linux servers. Here we mainly introdu
Article Title: Use SrvRepor to remotely monitor and manage Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
When the
Collected two articles about how to use the Monitor command top command in Linux for more information. In general, the top command is mainly used to view the Linux system's various processes and system resource consumption, in monitoring the performance of Linux
visible to the superuser, such as the process root directory. Each individual containing a A process with existing process information has some specialized links available, and any process in the system has a separate self-linking point to the process Information, which is useful for getting command-line information from the process.2: System Information: If you need to know the entire
network (unless you are using a vro ). When you run the tcpdump command, it sets the TCP/IP stack to promiscuous mode. This mode can receive all the data packets and display them effectively. If we only care about the communication of our local host, one way is to use the "-p" parameter to disable promiscuous mode, and another way is to specify the host name:
Tcpdump-I eth0 host hostname
In this case, the system only monitors the communication data
How to monitor network usage through nload in Linux
Nload is a free software tool for linux. It provides two simple graphics to help linux users and System Administrators monitor network traffic and bandwidth usage in real time. O
Article title: use Mrtg to monitor network traffic (for Linux ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Although mrtg has be
Monitor 7 command line tools in Linux
Here are some basic command line tools that allow you to more easily explore and operate Linux.
Image courtesy Meltys-stock
In-depth
One of the best things about Linux is that you can go deep into the operating system, explore how it wo
Use SNMP and Cacti to monitor Linux servers
SNMP (Simple Network Management Protocol) is used to collect internal data, such as load, disk status, and bandwidth. Network monitoring tools such as Cacti use this data to generate icons for monitoring purposes.
In a typical Cacti and SNMP deployment, one or more SNMP-enabled devices and an independent monitoring server are used to collect SNMP feedback from tho
Use logwatch to monitor log files in Linux
Linux operating systems and many applications create special files to record their running events. These files are often called "logs ". These system logs or specific application log files are essential tools for understanding the behavior of operating systems or third-party
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.