Zenoss

Solo disponible en BuenasTareas
  • Páginas : 164 (40810 palabras )
  • Descarga(s) : 0
  • Publicado : 5 de septiembre de 2012
Leer documento completo
Vista previa del texto
Zenoss Administration
Copyright © 2010 Zenoss, Inc., 275 West St. Suite 204, Annapolis, MD 21401, U.S.A. All rights reserved.
This work is licensed under a Creative Commons Attribution Share Alike 3.0 License. To view a copy of this license, visit http:// creativecommons.org/licenses/by-sa/3.0/; or send a letter to Creative Commons, 171 2nd Street, Suite 300, San Francisco, California, 94105,USA.

The Zenoss logo is a registered trademark of Zenoss, Inc. Zenoss and Open Enterprise Management are trademarks of Zenoss, Inc. in the U.S. and other countries. Flash is a registered trademark of Adobe Systems Incorporated. Oracle, the Oracle logo, and Java are registered trademarks of the Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.Linux is a registered trademark of Linus Torvalds. SNMP Informant is a trademark of Garth K. Williams (Informant Systems, Inc.). Sybase is a registered trademark of Sybase, Inc. Tomcat is a trademark of the Apache Software Foundation. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. All other companies and products mentioned are trademarks andproperty of their respective owners. Part Number: 06-102010-3.0-v03

1. About Zenoss .......................................................................................................................................... 1 1.1. High-Level View ............................................................................................................................ 1 1.1.1. Key Tenets........................................................................................................................ 2 1.2. Architecture and Technologies ....................................................................................................... 3 1.2.1. User Layer ......................................................................................................................... 31.2.2. Data Layer ......................................................................................................................... 3 1.2.3. Process Layer .................................................................................................................... 4 1.2.4. Collection Layer................................................................................................................. 4 1.3. Monitoring Approach ..................................................................................................................... 4 1.3.1. File System Monitoring ....................................................................................................... 4 1.4. Terminology.................................................................................................................................. 5 2. Using Zenoss .......................................................................................................................................... 7 2.1. Interface and Navigation ............................................................................................................... 7 2.1.1. Navigation.......................................................................................................................... 8 2.1.2. User Information Area ........................................................................................................ 8 2.1.3. Portlets .............................................................................................................................. 8 2.1.3.1. CustomizingPortlets .............................................................................................. 10 2.1.3.2. Adding and Duplicating Portlets .............................................................................. 10 2.1.4. Network Map .................................................................................................................... 10 2.1.4.1. Choosing the Network to...
tracking img