
Chapter 7.
Monitoring
The Red Hat Network Monitoring entitlement allows you to perform a whole host of ac-
tions designed to keep your systems running properly and efficiently. With it, you can
keep close watch on system resources, network services, databases, and both standard and
custom applications.
Monitoring provides both real-time and historical state-change information, as well as spe-
cific metric data. You are not only notified of failures immediately and warned of per-
formance degradation before it becomes critical, but you are also given the information
necessary to conduct capacity planning and event correlation. For instance, the results of a
probe recording CPU usage across systems would prove invaluable in balancing loads on
those systems.
Monitoring entails establishing notification methods, installing probes on systems, regu-
larly reviewing the status of all probes, and generating reports displaying historical data
for a system or service. This chapter seeks to identify common tasks associated with the
Monitoring entitlement. Remember, virtually all changes affecting your Monitoring infras-
tructure must be finalized by updating your configuration, through the
Scout Config Push
page.
7.1. Prerequisites
Before attempting to implement RHN Monitoring within your infrastructure, ensure you
have all of the necessary tools in place. At a minimum, you need:
•
Monitoring entitlements — These entitlements are required for all systems that are to be
monitored. Monitoring is supported only on Red Hat Enterprise Linux systems.
•
RHN Satellite Server with Monitoring — Monitoring systems must be connected to a
Satellite with a base operating system of Red Hat Enterprise Linux AS 3 Update 5,
Red Hat Enterprise Linux AS 4, or later. Refer to the RHN Satellite Server Installation
Guide within
Help
for installation instructions. Contact a Red Hat sales representative
to purchase Satellite.
•
Monitoring Administrator — This role must be granted to users installing probes, creat-
ing notification methods, or altering the monitoring infrastructure in any way. (Remem-
ber, the Organization Administrator automatically inherits the abilities of all other roles
within an organization and can therefore conduct these tasks.). Assign this role through
the
User Details
page for the user.
•
Red Hat Network Monitoring Daemon — This daemon, along with the SSH
key for the scout, is required on systems that are monitored in order for
Summary of Contents for NETWORK 4.0 -
Page 1: ...Red Hat Network 4 0 Reference Guide...
Page 10: ......
Page 16: ...vi Introduction to the Guide...
Page 24: ...8 Chapter 1 Red Hat Network Overview...
Page 40: ...24 Chapter 2 Red Hat Update Agent Figure 2 11 Available Package Updates...
Page 58: ...42 Chapter 2 Red Hat Update Agent...
Page 80: ...64 Chapter 5 Red Hat Network Registration Client Figure 5 15 Text Mode Welcome Screen...
Page 186: ...170 Chapter 7 Monitoring...
Page 200: ...184 Chapter 8 UNIX Support Guide...
Page 214: ...198 Appendix A Command Line Config Management Tools...
Page 274: ...258 Appendix C Probes...
Page 282: ...266 Glossary...