
In the last column, I discussed how you can use actions to perform tasks in response to events generated by triggers. Now let’s take a look at discovery functions that can be used to set up multiple hosts.
In the last column, I discussed how you can use actions to perform tasks in response to events generated by triggers. Now let’s take a look at discovery functions that can be used to set up multiple hosts.
In the last column, we saw how triggers can be used to distinguish between normal states and problem states based on item values. Now let’s look at how to define actions that perform tasks when they receive events generated by triggers. Action functions In Zabbix, an action function is a function that performs a process […]
Last time, I discussed hosts and host groups, which are used to organize items. Now let’s take a look at how triggers can be used to distinguish between normal states and problem states based on Item values.
In the last column, I explained open-source consolidated monitoring system Zabbix’s external and internal monitoring functions and its other monitoring functions. In this installment, we’ll look at hosts and host groups, which contain monitoring items.
In the last column, I gave an overview of Zabbix, an open-source consolidated monitoring system. In this installment, I’ll explain Zabbix’s internal monitoring functions and other monitoring functions.
Beginning with this column, I’d like to introduce Zabbix, a consolidated monitoring system. About Zabbix Zabbix is a monitoring tool developed by Zabbix SIA of Latvia. It is used in many countries and in a variety of industries. In Japan, Zabbix Japan LLC and the Japanese Zabbix Community are also active. Use of this monitoring […]
In this column, I’d like to discuss the importance of the UDP protocol. This protocol is used for UNIX networks, including Linux networks.