SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Seminar On
ZENOSS CORE
(Network Monitoring Tool)
Praful Bhosale
MCA2 SEM –III
KIT IMER’s MCA Dept.
Date:-14-09-2013
What is Zenoss Core?
 Zenoss (Zenoss Core) is an open source application, server and
network management platform based on the Zope application
server. It's released under the GNU General Public License (GPL)
version 2.
 Zenoss Core provides a web interface that allows system
administrators to monitor availability, inventory/
configuration, performance, and events
Why Zenoss Core?
Open Source Monitoring Solution
More features including WMI performance monitoring
Powerful plugins (ZenPacks)
What Technologies used in Zenoss?
 Zope :-Application server: An object-oriented web
server written in Python.
Python:-Extensible programming language.
Net-SNMP-: Monitoring protocol that collects
systems status information.
 RRDtool:- Graph and log time series data.
 MySQL:- A popular open source database.
Twisted:- An event-driven networking engine written
in Python.
What Zenoss Core can do?
Monitoring availability of network devices using SNMP, SSH, WMI
Monitoring of network services (HTTP, POP3, NNTP, SNMP, FTP)
Monitoring of host resources (processor, disk usage) on most
network operating systems.
Time-series performance monitoring of devices
Extended Microsoft Windows monitoring via Windows
Management Instrumentation using Zenoss open source extensions
Event management tools to annotate system alerts
Automatically discovers network resources and changes in network
configuration
Alerting system provides notifications based on rule sets and on-call
calendars
Zenoss Architecture
Zenoss Architecture
User layer
Zenoss Core is flexible enough to work from a command line, but most
of our work will take place via a web interface, which is based on the
Zope application server framework.
Zope is a popular, extensible application server written in Python.
It features a built-in web server, transactional object database, and HTML
templates.
Python is the basis for Zope; it's also the basis for Zenoss Core.
Zenoss Architecture
Data layer
RRD:- stores time series performance data
CMDB:- managing the configuration, relationship, and change history of the IT
environment, which creates a detailed model of the network
Collection layer
Zope Architecture
The collection layer includes several daemons that gather information about
devices, performance, and Events. They feed information to ZenHub to distribute
to the appropriate database.
The Zenoss Core daemons are easy to
identify—they all start with the prefix "zen".
Daemon
It is a computer program that runs as a background process, rather than
being under the direct control of an interactive user
Device management daemons:-
zenmodeler, zendisc.
Performance and availability daemons:-
zenperfsnmp,zencommand, Zenprocess,zenping,zenstatus.
Event daemons:-
Zensyslog,zeneventlog,zentrap.
Zenoss Core Installation
1. visit www.zenoss.com/download.
2. find native packages, stack installers, and source files for several
operating systems:- Red Hat Enterprise
Linux, Centos, Ubuntu, Fedora Core, OS X, OpenSuse, and
Debian.,Windows.
3. Preparing devices for monitoring
4. Configuring SNMP and WMI
5. Configuring firewall
Setting up users
Specify or discover devices to monitor
Adding devices
Zenoss Dashboard
Zenoss Event Console
Zenoss Network Map
Zenoss Performance & Reports
Zenoss is a good choice for open source network and
systems management.
The Zenoss system provides full stack coverage
of networks, servers, applications, services, and
virtualization.
Conclusions
References
1) www.zenoss.com
2) en.wikipedia.org/wiki/Zenoss
3) Zenoss Core Network and
System Monitoring by Michael
Badger
Zenoss seminar
Zenoss seminar

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Silverlight
SilverlightSilverlight
Silverlight
 
Polymer Memory ppt
Polymer Memory pptPolymer Memory ppt
Polymer Memory ppt
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Nano computing
Nano computingNano computing
Nano computing
 
Augmented-reality contact lenses
Augmented-reality contact lensesAugmented-reality contact lenses
Augmented-reality contact lenses
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
Seminar report on third generation solid state drive
Seminar report on third generation solid state driveSeminar report on third generation solid state drive
Seminar report on third generation solid state drive
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
Holographic Data Storeg ppt
Holographic Data Storeg pptHolographic Data Storeg ppt
Holographic Data Storeg ppt
 
The Mobile Ecosystem
The Mobile EcosystemThe Mobile Ecosystem
The Mobile Ecosystem
 
The Halo Network
The Halo NetworkThe Halo Network
The Halo Network
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Smart dust
Smart dustSmart dust
Smart dust
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 

Andere mochten auch

Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Nur Nabilah Hassan
 
Intro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew KirchIntro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew Kirchbuildacloud
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringZenoss
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenoss
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesZenoss
 
Zenoss & Cloud
Zenoss & CloudZenoss & Cloud
Zenoss & Cloudsimonjj
 
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Sachin Jaypatre
 
Webinar widescreen zenoss service-now integration final draft
Webinar widescreen   zenoss service-now integration final draftWebinar widescreen   zenoss service-now integration final draft
Webinar widescreen zenoss service-now integration final draftZenoss
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss
 
Open Source Monitoring Tools Shootout
Open Source Monitoring Tools ShootoutOpen Source Monitoring Tools Shootout
Open Source Monitoring Tools Shootouttomdc
 
Millipede presentation
Millipede presentationMillipede presentation
Millipede presentationAbhishek Gupta
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY127r1a05h9
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 

Andere mochten auch (20)

Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)
 
Intro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew KirchIntro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew Kirch
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane Curry
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web Services
 
Zenoss & Cloud
Zenoss & CloudZenoss & Cloud
Zenoss & Cloud
 
Daknet Technology
Daknet TechnologyDaknet Technology
Daknet Technology
 
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
 
Webinar widescreen zenoss service-now integration final draft
Webinar widescreen   zenoss service-now integration final draftWebinar widescreen   zenoss service-now integration final draft
Webinar widescreen zenoss service-now integration final draft
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDB
 
Open Source Monitoring Tools Shootout
Open Source Monitoring Tools ShootoutOpen Source Monitoring Tools Shootout
Open Source Monitoring Tools Shootout
 
Millipede presentation
Millipede presentationMillipede presentation
Millipede presentation
 
Cordect
CordectCordect
Cordect
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
ppt on femtocell
ppt on femtocellppt on femtocell
ppt on femtocell
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
Eye phone
Eye phoneEye phone
Eye phone
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 

Ähnlich wie Zenoss seminar

opensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewopensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewKris Buytaert
 
NodeJS guide for beginners
NodeJS guide for beginnersNodeJS guide for beginners
NodeJS guide for beginnersEnoch Joshua
 
TechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityTechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityRobb Boyd
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenPrecisely
 
20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_ChesnokovVladimir Chesnokov
 
An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)Mario Cho
 
Monitoring shootout loadays
Monitoring shootout loadaysMonitoring shootout loadays
Monitoring shootout loadaystomdc
 
Learn .NET Core - Introduction
Learn .NET Core - IntroductionLearn .NET Core - Introduction
Learn .NET Core - IntroductionEng Teong Cheah
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...WASdev Community
 
Symbian Os Introduction
Symbian Os IntroductionSymbian Os Introduction
Symbian Os IntroductionDeepak Rathi
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux SystemNovell
 
Automated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenAutomated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenMPNIKHIL
 

Ähnlich wie Zenoss seminar (20)

opensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewopensource Monitoring Tool , an overview
opensource Monitoring Tool , an overview
 
NodeJS guide for beginners
NodeJS guide for beginnersNodeJS guide for beginners
NodeJS guide for beginners
 
Windows and linux
Windows and linuxWindows and linux
Windows and linux
 
TechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityTechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching Programmability
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
 
20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov
 
An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)
 
Operating system
Operating systemOperating system
Operating system
 
Monitoring shootout loadays
Monitoring shootout loadaysMonitoring shootout loadays
Monitoring shootout loadays
 
Deep Dive into WinRT
Deep Dive into WinRTDeep Dive into WinRT
Deep Dive into WinRT
 
ResumeJagannath
ResumeJagannathResumeJagannath
ResumeJagannath
 
Resume
ResumeResume
Resume
 
Learn .NET Core - Introduction
Learn .NET Core - IntroductionLearn .NET Core - Introduction
Learn .NET Core - Introduction
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
 
Zabbix Monitoring Platform
Zabbix Monitoring Platform Zabbix Monitoring Platform
Zabbix Monitoring Platform
 
Symbian Os Introduction
Symbian Os IntroductionSymbian Os Introduction
Symbian Os Introduction
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux System
 
Parth virt
Parth virtParth virt
Parth virt
 
Automated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenAutomated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xen
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Zenoss seminar

  • 1. Seminar On ZENOSS CORE (Network Monitoring Tool) Praful Bhosale MCA2 SEM –III KIT IMER’s MCA Dept. Date:-14-09-2013
  • 2. What is Zenoss Core?  Zenoss (Zenoss Core) is an open source application, server and network management platform based on the Zope application server. It's released under the GNU General Public License (GPL) version 2.  Zenoss Core provides a web interface that allows system administrators to monitor availability, inventory/ configuration, performance, and events
  • 3. Why Zenoss Core? Open Source Monitoring Solution More features including WMI performance monitoring Powerful plugins (ZenPacks)
  • 4. What Technologies used in Zenoss?  Zope :-Application server: An object-oriented web server written in Python. Python:-Extensible programming language. Net-SNMP-: Monitoring protocol that collects systems status information.  RRDtool:- Graph and log time series data.  MySQL:- A popular open source database. Twisted:- An event-driven networking engine written in Python.
  • 5. What Zenoss Core can do? Monitoring availability of network devices using SNMP, SSH, WMI Monitoring of network services (HTTP, POP3, NNTP, SNMP, FTP) Monitoring of host resources (processor, disk usage) on most network operating systems. Time-series performance monitoring of devices Extended Microsoft Windows monitoring via Windows Management Instrumentation using Zenoss open source extensions Event management tools to annotate system alerts Automatically discovers network resources and changes in network configuration Alerting system provides notifications based on rule sets and on-call calendars
  • 7. Zenoss Architecture User layer Zenoss Core is flexible enough to work from a command line, but most of our work will take place via a web interface, which is based on the Zope application server framework. Zope is a popular, extensible application server written in Python. It features a built-in web server, transactional object database, and HTML templates. Python is the basis for Zope; it's also the basis for Zenoss Core.
  • 8. Zenoss Architecture Data layer RRD:- stores time series performance data CMDB:- managing the configuration, relationship, and change history of the IT environment, which creates a detailed model of the network
  • 9. Collection layer Zope Architecture The collection layer includes several daemons that gather information about devices, performance, and Events. They feed information to ZenHub to distribute to the appropriate database. The Zenoss Core daemons are easy to identify—they all start with the prefix "zen".
  • 10.
  • 11. Daemon It is a computer program that runs as a background process, rather than being under the direct control of an interactive user Device management daemons:- zenmodeler, zendisc. Performance and availability daemons:- zenperfsnmp,zencommand, Zenprocess,zenping,zenstatus. Event daemons:- Zensyslog,zeneventlog,zentrap.
  • 12. Zenoss Core Installation 1. visit www.zenoss.com/download. 2. find native packages, stack installers, and source files for several operating systems:- Red Hat Enterprise Linux, Centos, Ubuntu, Fedora Core, OS X, OpenSuse, and Debian.,Windows. 3. Preparing devices for monitoring 4. Configuring SNMP and WMI 5. Configuring firewall
  • 14.
  • 15. Specify or discover devices to monitor Adding devices
  • 16.
  • 21. Zenoss is a good choice for open source network and systems management. The Zenoss system provides full stack coverage of networks, servers, applications, services, and virtualization. Conclusions
  • 22. References 1) www.zenoss.com 2) en.wikipedia.org/wiki/Zenoss 3) Zenoss Core Network and System Monitoring by Michael Badger