Book Image

Zenoss Core Network and System Monitoring

By : Michael Badger
Book Image

Zenoss Core Network and System Monitoring

By: Michael Badger

Overview of this book

<p>For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using network monitoring software, or network sniffers, that sniff the traffic and display it on your computer on the network. <br /><br />Zenoss is an enterprise network and systems management application written in Python/Zope that provides an integrated product for monitoring availability, performance, events and configuration across layers and across platforms. Zenoss provides an AJAX-enabled web interface that allows system administrators to monitor availability, inventory/configuration, performance, and events. Whether you monitor five devices or a thousand devices, Zenoss provides a scalable solution for you.<br /><br />This book will show you how to work with Zenoss and effectively adapt Zenoss for a System and Network monitoring.&nbsp; Starting with the Zenoss basics, it requires no existing systems management knowledge, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides.<br /><br />The book contains step-by-step examples to demonstrate Zenoss Core’s capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system.</p>
Table of Contents (20 chapters)
Zenoss Core Network and System Monitoring
Credits
Foreword
About the Author
Acknowledgement
About the Reviewers
Preface
Free Chapter
1
Introduction
Event Attributes
TALES and Device Attributes

Portlets Permission


We can restrict which users see which dashboard portlets by setting permissions on the Portlets tab in Settings. We can choose from three levels (refer to the following screen capture):

  • Users with Manage DMD permission

  • Users with View permission

  • Users with ZenCommon permission

The three permission levels correspond to the three Zenoss roles: Manager, ZenManager, and ZenUser. Functionally speaking, however, the Users with Manage DMD and Users with ZenCommon permissions apply equally to users in the Manager and ZenManager roles (as of Zenoss Core 2.1.2).

If we want to restrict users within the ZenUsers role from seeing a dashboard portlet, assign the portlet Users with Manage DMD permission. Users who are members of either the Manager or ZenManager role will be able to see all the device portlets regardless of the set permission.

Don't forget to Save changes.