Ep. 3: Using SNMP to monitor network devices in Checkmk 2.0
Read Video Transcript
|[0:00:01]||Welcome back to the Checkmk channel. In this episode, we're monitoring a switch and we'll be doing that using SNMP.|
|[0:00:07]||Now, what is SNMP?|
|[0:00:08]||SNMP stands for Simple Network Monitoring Protocol. And it's used to monitor switches, routers, printers, UPS and many other devices. Its purpose is to make monitoring these devices as easy as possible. And a good thing is you don't need an agent on these devices to monitor them. You just need to enable the SNMP protocol.|
|[0:00:33]||And everything in checkmk is then very easy. And exactly how easy? That's what I'm going to show you now.|
|[0:00:58]||So we want to add a switch to the monitoring. The switch is already prepared meaning that SNMP is already enabled. So now all this left to do is add to host. So as always we go to setup > Hosts and then click on "Add Host". Now we give the switch a name. Let's call it Switch one and we need to enter the IP address.|
|[0:00:49]||Now we need to say that we don't use an agent, so no agent. And now we need to tell it that we use SNMP and we need to pick the SNMP version. We'll be picking SNMP version 2 or 3.|
|[0:01:19]||We picked version 2 or 3 and there's also a version 1, but that's typically only used for older devices especially like five or ten years old. But if you ever need it, it's there. Next thing, we need to do is add credentials. So click here with SNMP v2n it's called SNMP community and there is a convention that the default password is "public" all lowercase. So let's type that in.|
|[0:01:36]||And also if you set it to 'none', then it will take the default value. So Checkmk will automatically try the password "public".|
|[0:02:06]||So now we're all done. And we're gonna test the connection. So click on 'Save & go to the connection tests'. So, Checkmk is now going to ping the host. So it's going to ping the switch, it's also trying to retrieve an agent even though there is no agent installed. So they should always be empty.|
|[0:02:17]||More importantly, it's trying all four SNMP versions. And it does this, for you to easily be able to recognize which versions are supported by your device. Now we are interested in "SNMPv2c".|
|[0:02:35]||Here you see it has a system description. This is configured by the manufacturer. Then it has some other settings like a system contact, system name, and a location. And you can set all these on the device itself.|
|[0:02:53]||So this all looks good. So let's save and go to 'Host properties' again. And now let's go discover the services. So, 'Save & go to service configuration'. Checkmk is now doing an SNMP scan to scan which services it has. And as always everything is 'Undecided'. But to quickly fix that we can press, "Fix all". So we monitor everything.|
|[0:03:08]||Okay, now as always there are five changes. We need to activate these changes in order to actually monitor the host into Checkmk. So in a few seconds, you'll see that we now have two hosts instead of one So let's click on the Host we just added.|
|[0:03:36]||Okay, let me quickly zoom in and collapse the sidebar so we can actually see something.|
|[0:03:56]||Now the first service here, "Check_MK". This one indicates if the monitoring on the Host itself works. The 2nd one, the "Check_MK Discovery", this will go to WARN when it finds any service that is not monitored yet in Checkmk. So this could happen when initially a port is closed or not active and it became active later on.|
|[0:04:03]||So then you can add it to the monitoring system if you see it. Now, these interfaces are all the ports that are UP. And Checkmk is configured in such a way that it will discover these ports as a 'Service' when the port has a link status UP.|
|[0:04:28]||Now it's not only important if it's UP, but there's also other important information like the 'failure rate' and the 'transfer speed' of each port.|
|[0:04:49]||And then we have the 'SNMP info' service. This is a summary of the information on the device. So that's the system description, the system location, the system name and the system contact.|
|[0:05:00]||And all this information is you can configure this on the device itself So the system 'Uptime', it indicates how long the system has been up.|
|[0:05:23]||You can configure it in such a way that you get a WARN when the uptime is below a certain threshold because this can indicate that the system has rebooted. Earlier we saw that there is an SNMP version 2 and version 3.|
|[0:05:43]||The main difference is that version 3 implements more security features. SNMP version 2 is unencrypted, so that means anyone who has access to the LAN, can read the device statistics. The good thing is that this is read-only, so even an attacker cannot change the configuration, he can only read the device diagnostics.|
|[0:06:05]||Version 3 is a bit more tricky to set up and also takes a bit more computing power. Especially on the device itself. Let me quickly show you how to set up SNMP version 3 in Checkmk.|
|[0:06:17]||So to activate SNMP version 3, we go to Setup, Hosts and then edit the switch. So we go to the Host properties.|
|[0:06:29]||Now we need to change the SNMP credentials. So you see that we currently have SNMP community, and but you also have just these three set things for SNMP version 3.|
|[0:06:40]||We're going to pick the last one because it's the most secure. Here you see we have to enter some more information.|
|[0:06:47]||So the security name the authentication password and a passphrase. All this has to be configured on the device itself, and then entered here in Checkmk.|
|[0:06:59]||That was it for today. In the next episode, we're adding a Windows Host to the monitoring system. See you then.|
Ep. 1: Installing Checkmk 2.0 and monitoring your first host
In this video, Baris explains how to take get started with Checkmk and start monitoring your first host within a few minutes.
Ep. 2: The Checkmk 2.0 user interface
In this video, Baris take you through the new user interface in Checkmk 2.0. He explains the various components of the User interface such as the new navigation menus, the Sidebar, main dashboard, tactical overview, how to switch between the Checkmk interface themes and much more
Ep. 4: Monitoring Windows in Checkmk
In this video of our Getting started with Checkmk series, Baris explains how to install a Checkmk agent on a Windows host system and add that into your monitoring environment.
Ep. 5: Using metrics and graphs in Checkmk 2.0
In the 5th episode of the Getting started with Checkmk series, Baris explains using various metrics that you can monitor in Checkmk such as CPU utilization, CPU load etc. You can also see graph visualizations for these metrics or create and customize your own as per your requirements.
Ep. 6: Updating Checkmk 2.0 and using multiple instances
In this video, Baris explains how to update your Checkmk instance. It is very easy and can be done within minutes. You can run multiple Checkmk instances with different versions on the same system. This gives you the flexibility to test the new version before using it in production.
Ep. 7 (part 1): Working with rules and setting thresholds in Checkmk
In the following three-part videos series, Baris explains rule-based monitoring with Checkmk. In the first part, he shows you how you can work with rules and set threshold values. Rule-based configuration is one of the key features for Checkmk which helps you to scale your monitoring easily within minutes.
Ep. 7 (part 2): Smart rules with Host Tags in Checkmk
In the second part of this video, Baris explains using Smart rules with host tags in Checkmk. In the first part, he shows you how you can work with rules and set threshold values. These are features that you can use to build your rules even more intelligently and to better organize your monitoring.
Ep. 7 (part 3): Managing Hosts in Folder in Checkmk
In this final part of our episode on Rule-based monitoring in Checkmk, Baris demonstrates how to manage hosts in folders in Checkmk. This helps you to apply your monitoring configurations at scale and organize your hosts according to your needs.
Ep. 8: Working with Host and Service Groups in Checkmk
In this Baris demonstrates how to create host and service groups in Checkmk, so you can perform actions on an entire group instead of configuring each of them individually.
Ep. 9: Using the Quicksearch function in Checkmk
In this episode of the Checkmk tutorials, Baris shows how you can use the Quicksearch function in Checkmk. You can use it to easily find and manage certain hosts or services. He also explains some examples of filters to you. In Checkmk 2.0 you can use the same syntax in the Seach function found in the monitor menu to get identical results.
Ep. 10: Detecting configuration errors with the Analyze Configuration feature
With the Analyze Configuration feature, you can check if there are any configuration errors in your installation. Checkmk controls a number of possible security risks or potential performance restrictions and indicates if there are any problems.
Ep. 11: View creation and customization in Checkmk
In this video, Baris demonstrates how to customize headers, columns, and more in Views in Checkmk for yourself or other users. He also explains how to create custom views and add desired information to these views.
Ep. 12: Acknowledging problems in Checkmk
In this video, Baris explains how you can acknowledge problems in Checkmk. This function helps you to qualify the states of hosts and services. This allows you to keep track of messages in the main dashboard and, for example, you can add comments to problems.
Ep. 13: Scheduling downtimes in Checkmk
In the episode of our Getting started with Checkmk series, Baris explains how you can manage the maintenance times of your systems in Checkmk. Such scheduled downtimes prevent your monitoring from sending false alarms when a host or service goes to WARN or CRIT during maintenance work. You can also inform the users concerned about the maintenance via Checkmk.
Ep. 14: Distributed monitoring with Checkmk
In this video, Baris explains how you can connect several Checkmk instances to a monitoring system and then manage it.
Ep. 15: MKPs and Plugins in Checkmk
In the 15th episode of our Getting started with Checkmk tutorial series, Baris explains what are Checkmk Extension Packages (MKPs) and how easy it is to integrate them into your Checkmk monitoring environment. MKPs are the preferred format when you make your own extensions as it makes it easy to share with other users or deploy in distributed environments.
Ep. 16: Working with 'Bulk Actions' in Checkmk
In this episode of our Checkmk tutorials series, Baris explains how you can save a lot of time with bulk actions. With this feature you can perform various tasks such as deleting, renaming, service discovery etc. on a large number of hosts simultaneously.
Ep. 17: Working with network topologies in Checkmk
In this video of our gettign startted with Checkmk series, Baris explains how to map network topologies in Checkmk. This feature is quite helpful to manage your network and prevent any unnecessary notifications from the devices in your network.
Ep. 18: Creating and customizing dashboards in Checkmk
In this video of our Getting started with Checkmk series, Mathias explains how you can create and customize dashboards in Checkmk 2.0, so you can get insights into your monitoring according to your requirements. Find out more in this video.
Ep. 19: Monitoring websites and their certificates with Checkmk
In this episode, Bastian demonstrates how to monitor a website and its certificate with Checkmk. You can also monitor specific web pages with Checkmk by using the several options that will suit your use case. Learn more in this video.
Ep. 20: Configuring dashboard elements in Checkmk
Learn how to add data visualization elements of the various metrics into your Checkmk Dashboard. In this video, Mathias explains how you can configure these elements and create a dashboard as per your requirements.
Ep. 21: Setting up notifications in Checkmk
Learn how to set up notifications in Checkmk and assign relevant contacts and contact groups to be notified for various events. Later in this video, our presenter Bastian also demonstrates how you can set up rule-based notifications according to different conditions for hosts and services.
Ep. 22: Monitoring logfiles with Checkmk
Monitor your logfiles with Checkmk using its Logwatch plugin. It is very useful when you want to monitor your logfiles regardless of whether you are using a UNIX/Linux or a windows based system. Learn more in this video.
Ep. 24: 3 Rules for efficient network monitoring
In this video, Bastian demonstrates 3 rules that will help you to efficiently monitor your network interfaces. With Checkmk 2.0, with just three rules, you can set up an efficient network monitoring that will not only monitor all of your network interfaces but also simultaneously provide a detailed overview of all of your ports.
Ep. 25: New UX and security improvements in Checkmk 2.1
Checkmk 2.1 come with many UX improvements such as pre-built dashboards for Linux and Windows, faster core performance and much more. Security features such as two-factor authentication etc. were also added in this new version. Watch this video to learn how to use these new features and enhancements in Checkmk.
Ep. 28: Working with InfluxDB integration in Checkmk
Learn how to send data to InfluxDB from Checkmk. As InfluxDB introduced a new protocol to send data to it, a new connector was developed with Checkmk to talk natively with it. Learn more about it in this video.
Ep. 29: New agent architecture in Checkmk 2.1
With Checkmk 2.1, the agent architecture was modified to enable performance improvements and add new features such as TLS encryption, data compression, and the reversal of direction of communication from the agent. This will enable push mode and pull mode.
Ep. 30: Clustering the Checkmk appliance
In this video, Robin demonstrates how you can cluster your Checkmk appliance to make it resilient against hardware failures. If you are using the Checkmk hardware appliance, it may be helpful to cluster your appliance to maintain high availability.
Ep. 32: Working with the Agent bakery in Checkmk
In this video, Robin demonstrates how to roll out agent packages with the required configuration for different monitored systems using the agent bakery in Checkmk. The "Automatic agent update" is quite a helpful feature as it pulls the latest configurations for an agent automatically and you don't need to manually update all of your agents deployed on different systems.
Ep 33: Monitoring Docker containers with Checkmk
Learn how to monitor Docker containers with Checkmk.In this video, Robin demonstrates the process of setting up a rule to configure the docker plugin and bake an agent with the desired settings for the Docker host.
Ep 34: Introduction to Checkmk Ansible collection
Last year the Checkmk Ansible collection was created to interact with the Checkmk REST API. In this video, Robin demonstrates how you can use this Ansible collection to automate your monitoring with Checkmk.
Ep 35: Monitoring SQL databases with Checkmk
In this video, Robin demonstrates how you can configure your Checkmk site to monitor your SQL databases. As there are many flavours of SQL databases, the process is mostly the same.