|[0:00:00]||Welcome back to the channel. Today, I'm going to show you three rules which you can use for network interface monitoring.|
|[0:00:18]||Today, I am going to show you how you can make Checkmk automatically adjust to your switch configuration by renaming the ports.|
|[0:00:27]||And finally, I'm gonna to show you how you can get even out more information of your switch by using the Checkmk inventory.|
|[0:00:35]||Let's look into it. What I have here is an example switch and if we scroll down to the interfaces, the first thing I notice that they have just the numbers name.|
|[0:00:48]||But in the details, we have some information more like here, we have two Uplink Ports.|
|[0:00:56]||So, it would be nice to have this information as part of the service name in order that we can apply rules on it.|
|[0:01:04]||And to do that, there is a discovery rule which you can use to set if you want the interface description or the interface alias for that.|
|[0:01:16]||The problem here is that depending on the manufacturer the switch can act different. So, in some cases you want to use the description, in other cases you want to use the alias.|
|[0:01:29]||And the easiest way to handle that is to create two host tags in order to bind the corresponding rule on it. So, at first let's create two host tags. So, we go to Setup, Tags.|
|[0:01:45]||We add a new tag group. The ID is gonna be, for example, if_interface_mode. I name it as alias Interface Mode. I add two choices. One is if_alias, the second one is if_description.|
|[0:02:29]||And if I would save that that, would make the if_alias as default. In some cases you don't want to have that. So, you can add a third rule, move it to the first position, leave the Tag ID empty, and set a custom name like Default, which would mean by default no tag would be selected.|
|[0:02:56]||You save that and now we gonna create the two rules. So, we go back to Setup. I'm gonna search Network and as a result of that, we get Service discovery rules, Network interface and switch port discovery.|
|[0:03:16]||This is a rule which affects the discovery of services. This is a special type of rules. Normally, we use service monitoring rules so to set thresholds.|
|[0:03:26]||But in this case you want to change the behavior of the discovery so it's a service discovery rule. I click into it. It's currently empty. I create a rule in this folder. And the first setting would be Use description.|
|[0:03:48]||And I just gonna bind that to the whole stack Interface Mode, if_description and I can save it. The second, I create a rule. This time I'm gonna use the alias and also gonna bind it to Interface Mode but this time, Interface Alias and I'm going to save it.|
|[0:04:23]||Now we can use this board host tags with our switch. So, we go back to Setup, Hosts. There I have already my switch. I'm going to edit.|
|[0:04:38]||And as first, I'm going to try out how the switch looks with description. So, I choose Interface Mode, Interface Description.|
|[0:04:50]||I'm gonna go to save and go to service configuration. So, we can see now that we have a new list of interfaces because they don't longer use the index here but the name.|
|[0:05:10]||And I scroll through the list and let's see if I can find my Uplink Ports here or if there are in the alias. And for this case it looks like we have them in alias. So, we go back Host Properties.|
|[0:05:34]||Now I change it to alias. Again, to the service configuration and now we have by default the numbers. But as we can see here, there are two Uplink Ports. So, in this case we want to use the alias.|
|[0:06:01]||I fix all now and then just a moment, we are ready for the next step. As next, we gonna set a rule that we're not gonna get any notifications about access ports so we don't want to know if the port goes up or down. So back to Setup.|
|[0:06:26]||Again, I'm going to search for network but this time I don't want to use the discovery rule but the normal threshold rule for Network interfaces and switch ports.|
|[0:06:39]||Also currently empty. I'm going to create my first one. So, what I want to do is to ignore the speed.|
|[0:06:51]||Since it can't happen there's a the notebook, for example, goes in standby and then the speed changes to 10 megabits.|
|[0:06:59]||Then I want to ignore the state because I don't want to know if some user is unblocking his notebook. And what's left is to bind it only to the not Uplink Ports.|
|[0:07:16]||There are several ways to do that since we can use regular expressions here.|
|[0:07:22]||One way would like a negative looker head to cover only the parts who are not Uplink Ports. But this would mean that we need to name all the ports accordingly.|
|[0:07:36]||Or we can go a simpler way and just try to cover every interface who uses the index as a name. The index is basically just a number so we can go with \d+.|
|[0:07:53]||What's left is to save and of course, we want to check if it's working. So, we can go to Setup again, to the Hosts, inside the discovery view for this swtich. I directly use the third icon.|
|[0:08:11]||And in the Display option, we can show the check parents. Since I have a small screen here, I'm gonna disable the plugin names.|
|[0:08:24]||Now let's take a look to the interfaces. I see here interface with the number, ignore speed, ignore state. And if I scroll down to my Uplink Ports, I'm going to see. At some moment, sorry. It's really a lot of them.|
|[0:08:49]||So, there are my uplink parts and I'm going to see that my ignorable is not applying. So, only thing left now is to activate the configuration.|
|[0:09:08]||And finally, I'm going to show you how you enable the Checkmk inventory function to get even more information out of your switchboards.|
|[0:09:16]||So, we go to Setup, search for Inventory. And on the right side in this case, I do have Do hardware/software inventory.|
|[0:09:30]||Currently, all the rules we have have some kind of condition. And I just gonna create a simple rule without any condition, which just enables the status data inventory.|
|[0:09:43]||So, I save it, I activate it. So, let's take a look to our switch.|
|[0:10:05]||First, what we see here is a new service, it's the Checkmk hard software inventory. And with Host, Network interfaces, you get a detailed overview for all of your switchboards.|
|[0:10:25]||The heart software inventory has even more information for you. It's in Host, Inventory of host, where you can see even more information about your device.|
|[0:10:48]||I hope this video was helpful for you. If you have any questions just let us know in the comments. Please subscribe and see you next time.|
Ep. 1: Installing Checkmk 2.0 and monitoring your first host
In this video, Baris explains how to take get started with Checkmk and start monitoring your first host within a few minutes.
Ep. 2: The Checkmk 2.0 user interface
In this video, Baris take you through the new user interface in Checkmk 2.0. He explains the various components of the User interface such as the new navigation menus, the Sidebar, main dashboard, tactical overview, how to switch between the Checkmk interface themes and much more
Ep. 3: Using SNMP to monitor network devices in Checkmk 2.0
In this episode, Baris explains how to monitor network devices with Checkmk. SNMP is a protocol that many switches, routers, printers, UPSs, hardware sensors and other devices have implemented with the purpose of being able to monitor them easily.
Ep. 4: Monitoring Windows in Checkmk
In this video of our Getting started with Checkmk series, Baris explains how to install a Checkmk agent on a Windows host system and add that into your monitoring environment.
Ep. 5: Using metrics and graphs in Checkmk 2.0
In the 5th episode of the Getting started with Checkmk series, Baris explains using various metrics that you can monitor in Checkmk such as CPU utilization, CPU load etc. You can also see graph visualizations for these metrics or create and customize your own as per your requirements.
Ep. 6: Updating Checkmk 2.0 and using multiple instances
In this video, Baris explains how to update your Checkmk instance. It is very easy and can be done within minutes. You can run multiple Checkmk instances with different versions on the same system. This gives you the flexibility to test the new version before using it in production.
Ep. 7 (part 1): Working with rules and setting thresholds in Checkmk
In the following three-part videos series, Baris explains rule-based monitoring with Checkmk. In the first part, he shows you how you can work with rules and set threshold values. Rule-based configuration is one of the key features for Checkmk which helps you to scale your monitoring easily within minutes.
Ep. 7 (part 2): Smart rules with Host Tags in Checkmk
In the second part of this video, Baris explains using Smart rules with host tags in Checkmk. In the first part, he shows you how you can work with rules and set threshold values. These are features that you can use to build your rules even more intelligently and to better organize your monitoring.
Ep. 7 (part 3): Managing Hosts in Folder in Checkmk
In this final part of our episode on Rule-based monitoring in Checkmk, Baris demonstrates how to manage hosts in folders in Checkmk. This helps you to apply your monitoring configurations at scale and organize your hosts according to your needs.
Ep. 8: Working with Host and Service Groups in Checkmk
In this Baris demonstrates how to create host and service groups in Checkmk, so you can perform actions on an entire group instead of configuring each of them individually.
Ep. 9: Using the Quicksearch function in Checkmk
In this episode of the Checkmk tutorials, Baris shows how you can use the Quicksearch function in Checkmk. You can use it to easily find and manage certain hosts or services. He also explains some examples of filters to you. In Checkmk 2.0 you can use the same syntax in the Seach function found in the monitor menu to get identical results.
Ep. 10: Detecting configuration errors with the Analyze Configuration feature
With the Analyze Configuration feature, you can check if there are any configuration errors in your installation. Checkmk controls a number of possible security risks or potential performance restrictions and indicates if there are any problems.
Ep. 11: View creation and customization in Checkmk
In this video, Baris demonstrates how to customize headers, columns, and more in Views in Checkmk for yourself or other users. He also explains how to create custom views and add desired information to these views.
Ep. 12: Acknowledging problems in Checkmk
In this video, Baris explains how you can acknowledge problems in Checkmk. This function helps you to qualify the states of hosts and services. This allows you to keep track of messages in the main dashboard and, for example, you can add comments to problems.
Ep. 13: Scheduling downtimes in Checkmk
In the episode of our Getting started with Checkmk series, Baris explains how you can manage the maintenance times of your systems in Checkmk. Such scheduled downtimes prevent your monitoring from sending false alarms when a host or service goes to WARN or CRIT during maintenance work. You can also inform the users concerned about the maintenance via Checkmk.
Ep. 14: Distributed monitoring with Checkmk
In this video, Baris explains how you can connect several Checkmk instances to a monitoring system and then manage it.
Ep. 15: MKPs and Plugins in Checkmk
In the 15th episode of our Getting started with Checkmk tutorial series, Baris explains what are Checkmk Extension Packages (MKPs) and how easy it is to integrate them into your Checkmk monitoring environment. MKPs are the preferred format when you make your own extensions as it makes it easy to share with other users or deploy in distributed environments.
Ep. 16: Working with 'Bulk Actions' in Checkmk
In this episode of our Checkmk tutorials series, Baris explains how you can save a lot of time with bulk actions. With this feature you can perform various tasks such as deleting, renaming, service discovery etc. on a large number of hosts simultaneously.
Ep. 17: Working with network topologies in Checkmk
In this video of our gettign startted with Checkmk series, Baris explains how to map network topologies in Checkmk. This feature is quite helpful to manage your network and prevent any unnecessary notifications from the devices in your network.
Ep. 18: Creating and customizing dashboards in Checkmk
In this video of our Getting started with Checkmk series, Mathias explains how you can create and customize dashboards in Checkmk 2.0, so you can get insights into your monitoring according to your requirements. Find out more in this video.
Ep. 19: Monitoring websites and their certificates with Checkmk
In this episode, Bastian demonstrates how to monitor a website and its certificate with Checkmk. You can also monitor specific web pages with Checkmk by using the several options that will suit your use case. Learn more in this video.
Ep. 20: Configuring dashboard elements in Checkmk
Learn how to add data visualization elements of the various metrics into your Checkmk Dashboard. In this video, Mathias explains how you can configure these elements and create a dashboard as per your requirements.
Ep. 21: Setting up notifications in Checkmk
Learn how to set up notifications in Checkmk and assign relevant contacts and contact groups to be notified for various events. Later in this video, our presenter Bastian also demonstrates how you can set up rule-based notifications according to different conditions for hosts and services.
Ep. 22: Monitoring logfiles with Checkmk
Monitor your logfiles with Checkmk using its Logwatch plugin. It is very useful when you want to monitor your logfiles regardless of whether you are using a UNIX/Linux or a windows based system. Learn more in this video.
Ep. 25: New UX and security improvements in Checkmk 2.1
Checkmk 2.1 come with many UX improvements such as pre-built dashboards for Linux and Windows, faster core performance and much more. Security features such as two-factor authentication etc. were also added in this new version. Watch this video to learn how to use these new features and enhancements in Checkmk.
Ep. 28: Working with InfluxDB integration in Checkmk
Learn how to send data to InfluxDB from Checkmk. As InfluxDB introduced a new protocol to send data to it, a new connector was developed with Checkmk to talk natively with it. Learn more about it in this video.
Ep. 29: New agent architecture in Checkmk 2.1
With Checkmk 2.1, the agent architecture was modified to enable performance improvements and add new features such as TLS encryption, data compression, and the reversal of direction of communication from the agent. This will enable push mode and pull mode.
Ep. 30: Clustering the Checkmk appliance
In this video, Robin demonstrates how you can cluster your Checkmk appliance to make it resilient against hardware failures. If you are using the Checkmk hardware appliance, it may be helpful to cluster your appliance to maintain high availability.
Ep. 32: Working with the Agent bakery in Checkmk
In this video, Robin demonstrates how to roll out agent packages with the required configuration for different monitored systems using the agent bakery in Checkmk. The "Automatic agent update" is quite a helpful feature as it pulls the latest configurations for an agent automatically and you don't need to manually update all of your agents deployed on different systems.
Ep 33: Monitoring Docker containers with Checkmk
Learn how to monitor Docker containers with Checkmk.In this video, Robin demonstrates the process of setting up a rule to configure the docker plugin and bake an agent with the desired settings for the Docker host.
Ep 34: Introduction to Checkmk Ansible collection
Last year the Checkmk Ansible collection was created to interact with the Checkmk REST API. In this video, Robin demonstrates how you can use this Ansible collection to automate your monitoring with Checkmk.
Ep 35: Monitoring SQL databases with Checkmk
In this video, Robin demonstrates how you can configure your Checkmk site to monitor your SQL databases. As there are many flavours of SQL databases, the process is mostly the same.
Ep. 36: Introduction to different types of checks for monitoring with Checkmk
Learn about the different types of "checks" and services in Checkmk. In this video, Robin demonstrates how you can expand the information collected by your Checkmk agent using these different "Checks".
Ep. 43: Working with Hardware/Software inventory in Checkmk
In this video, Robin demonstrates the hardware/software inventory feature in Checkmk. With this feature one can get an overview of various pieces of hardware present in their servers, switches etc. and also the software packages installed on their operating system. Watch this video to learn more.