SlideShare una empresa de Scribd logo
1 de 24
Seminar On
ZENOSS CORE
(Network Monitoring Tool)
Praful Bhosale
MCA2 SEM –III
KIT IMER’s MCA Dept.
Date:-14-09-2013
What is Zenoss Core?
 Zenoss (Zenoss Core) is an open source application, server and
network management platform based on the Zope application
server. It's released under the GNU General Public License (GPL)
version 2.
 Zenoss Core provides a web interface that allows system
administrators to monitor availability, inventory/
configuration, performance, and events
Why Zenoss Core?
Open Source Monitoring Solution
More features including WMI performance monitoring
Powerful plugins (ZenPacks)
What Technologies used in Zenoss?
 Zope :-Application server: An object-oriented web
server written in Python.
Python:-Extensible programming language.
Net-SNMP-: Monitoring protocol that collects
systems status information.
 RRDtool:- Graph and log time series data.
 MySQL:- A popular open source database.
Twisted:- An event-driven networking engine written
in Python.
What Zenoss Core can do?
Monitoring availability of network devices using SNMP, SSH, WMI
Monitoring of network services (HTTP, POP3, NNTP, SNMP, FTP)
Monitoring of host resources (processor, disk usage) on most
network operating systems.
Time-series performance monitoring of devices
Extended Microsoft Windows monitoring via Windows
Management Instrumentation using Zenoss open source extensions
Event management tools to annotate system alerts
Automatically discovers network resources and changes in network
configuration
Alerting system provides notifications based on rule sets and on-call
calendars
Zenoss Architecture
Zenoss Architecture
User layer
Zenoss Core is flexible enough to work from a command line, but most
of our work will take place via a web interface, which is based on the
Zope application server framework.
Zope is a popular, extensible application server written in Python.
It features a built-in web server, transactional object database, and HTML
templates.
Python is the basis for Zope; it's also the basis for Zenoss Core.
Zenoss Architecture
Data layer
RRD:- stores time series performance data
CMDB:- managing the configuration, relationship, and change history of the IT
environment, which creates a detailed model of the network
Collection layer
Zope Architecture
The collection layer includes several daemons that gather information about
devices, performance, and Events. They feed information to ZenHub to distribute
to the appropriate database.
The Zenoss Core daemons are easy to
identify—they all start with the prefix "zen".
Daemon
It is a computer program that runs as a background process, rather than
being under the direct control of an interactive user
Device management daemons:-
zenmodeler, zendisc.
Performance and availability daemons:-
zenperfsnmp,zencommand, Zenprocess,zenping,zenstatus.
Event daemons:-
Zensyslog,zeneventlog,zentrap.
Zenoss Core Installation
1. visit www.zenoss.com/download.
2. find native packages, stack installers, and source files for several
operating systems:- Red Hat Enterprise
Linux, Centos, Ubuntu, Fedora Core, OS X, OpenSuse, and
Debian.,Windows.
3. Preparing devices for monitoring
4. Configuring SNMP and WMI
5. Configuring firewall
Setting up users
Specify or discover devices to monitor
Adding devices
Zenoss Dashboard
Zenoss Event Console
Zenoss Network Map
Zenoss Performance & Reports
Zenoss is a good choice for open source network and
systems management.
The Zenoss system provides full stack coverage
of networks, servers, applications, services, and
virtualization.
Conclusions
References
1) www.zenoss.com
2) en.wikipedia.org/wiki/Zenoss
3) Zenoss Core Network and
System Monitoring by Michael
Badger
Zenoss seminar
Zenoss seminar

Más contenido relacionado

La actualidad más candente

seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor networkJawhar Ali
 
Silverlight
SilverlightSilverlight
SilverlightBiTWiSE
 
Final Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingFinal Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingSabnam Pandey, MBA
 
Gifi technology full seminar report
Gifi technology full seminar reportGifi technology full seminar report
Gifi technology full seminar reportSusheel Marati
 
Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computingrojalina nanda
 
Web scraping
Web scrapingWeb scraping
Web scrapingSelecto
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
DTMF Controlled Robot Car WITHOUT using MICROCONTROLLER
DTMF Controlled Robot Car  WITHOUT using MICROCONTROLLERDTMF Controlled Robot Car  WITHOUT using MICROCONTROLLER
DTMF Controlled Robot Car WITHOUT using MICROCONTROLLERVishwanath Neha
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face RecognitionNikhil Katte
 
Aeronautical communication seminar presentation
Aeronautical communication seminar presentationAeronautical communication seminar presentation
Aeronautical communication seminar presentationArun Kc
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 

La actualidad más candente (20)

Fog computing
Fog computingFog computing
Fog computing
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Fog computing
Fog computingFog computing
Fog computing
 
Virtual mouse
Virtual mouseVirtual mouse
Virtual mouse
 
Silverlight
SilverlightSilverlight
Silverlight
 
Final Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingFinal Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image Processing
 
Gifi technology full seminar report
Gifi technology full seminar reportGifi technology full seminar report
Gifi technology full seminar report
 
Rain technology
Rain technologyRain technology
Rain technology
 
Virtual Network Computing
Virtual Network ComputingVirtual Network Computing
Virtual Network Computing
 
chameleon chip
chameleon chipchameleon chip
chameleon chip
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Web scraping
Web scrapingWeb scraping
Web scraping
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
DTMF Controlled Robot Car WITHOUT using MICROCONTROLLER
DTMF Controlled Robot Car  WITHOUT using MICROCONTROLLERDTMF Controlled Robot Car  WITHOUT using MICROCONTROLLER
DTMF Controlled Robot Car WITHOUT using MICROCONTROLLER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Aeronautical communication seminar presentation
Aeronautical communication seminar presentationAeronautical communication seminar presentation
Aeronautical communication seminar presentation
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 

Destacado

Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Nur Nabilah Hassan
 
Intro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew KirchIntro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew Kirchbuildacloud
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringZenoss
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenoss
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesZenoss
 
Zenoss & Cloud
Zenoss & CloudZenoss & Cloud
Zenoss & Cloudsimonjj
 
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Sachin Jaypatre
 
Webinar widescreen zenoss service-now integration final draft
Webinar widescreen   zenoss service-now integration final draftWebinar widescreen   zenoss service-now integration final draft
Webinar widescreen zenoss service-now integration final draftZenoss
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss
 
Open Source Monitoring Tools Shootout
Open Source Monitoring Tools ShootoutOpen Source Monitoring Tools Shootout
Open Source Monitoring Tools Shootouttomdc
 
Millipede presentation
Millipede presentationMillipede presentation
Millipede presentationAbhishek Gupta
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY127r1a05h9
 

Destacado (20)

Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)
 
Intro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew KirchIntro to Zenoss by Andrew Kirch
Intro to Zenoss by Andrew Kirch
 
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT MonitoringJason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
Jason Stanley, Secure-24 - Own IT Through Proactive IT Monitoring
 
ZenPack Development with Jane Curry
ZenPack Development with Jane CurryZenPack Development with Jane Curry
ZenPack Development with Jane Curry
 
Migrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web ServicesMigrating IT to the Cloud - Zenoss in Amazon Web Services
Migrating IT to the Cloud - Zenoss in Amazon Web Services
 
Zenoss & Cloud
Zenoss & CloudZenoss & Cloud
Zenoss & Cloud
 
Daknet Technology
Daknet TechnologyDaknet Technology
Daknet Technology
 
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
Zenoss core beta_installation_guide_r5.0.0b2_d99.14.253
 
Webinar widescreen zenoss service-now integration final draft
Webinar widescreen   zenoss service-now integration final draftWebinar widescreen   zenoss service-now integration final draft
Webinar widescreen zenoss service-now integration final draft
 
Zenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDBZenoss & ServiceNow Integration - Incident Management & CMDB
Zenoss & ServiceNow Integration - Incident Management & CMDB
 
Open Source Monitoring Tools Shootout
Open Source Monitoring Tools ShootoutOpen Source Monitoring Tools Shootout
Open Source Monitoring Tools Shootout
 
Millipede presentation
Millipede presentationMillipede presentation
Millipede presentation
 
Cordect
CordectCordect
Cordect
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
ppt on femtocell
ppt on femtocellppt on femtocell
ppt on femtocell
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Eye phone
Eye phoneEye phone
Eye phone
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 

Similar a Zenoss seminar

opensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewopensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewKris Buytaert
 
NodeJS guide for beginners
NodeJS guide for beginnersNodeJS guide for beginners
NodeJS guide for beginnersEnoch Joshua
 
TechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityTechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityRobb Boyd
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenPrecisely
 
20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_ChesnokovVladimir Chesnokov
 
An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)Mario Cho
 
Monitoring shootout loadays
Monitoring shootout loadaysMonitoring shootout loadays
Monitoring shootout loadaystomdc
 
Learn .NET Core - Introduction
Learn .NET Core - IntroductionLearn .NET Core - Introduction
Learn .NET Core - IntroductionEng Teong Cheah
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...WASdev Community
 
Symbian Os Introduction
Symbian Os IntroductionSymbian Os Introduction
Symbian Os IntroductionDeepak Rathi
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux SystemNovell
 
Automated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenAutomated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenMPNIKHIL
 

Similar a Zenoss seminar (20)

opensource Monitoring Tool , an overview
opensource Monitoring Tool , an overviewopensource Monitoring Tool , an overview
opensource Monitoring Tool , an overview
 
NodeJS guide for beginners
NodeJS guide for beginnersNodeJS guide for beginners
NodeJS guide for beginners
 
Windows and linux
Windows and linuxWindows and linux
Windows and linux
 
TechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching ProgrammabilityTechWiseTV Workshop: Catalyst Switching Programmability
TechWiseTV Workshop: Catalyst Switching Programmability
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
 
20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov20160201_resume_Vladimir_Chesnokov
20160201_resume_Vladimir_Chesnokov
 
An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)An Introduce of OPNFV (Open Platform for NFV)
An Introduce of OPNFV (Open Platform for NFV)
 
Operating system
Operating systemOperating system
Operating system
 
Monitoring shootout loadays
Monitoring shootout loadaysMonitoring shootout loadays
Monitoring shootout loadays
 
Deep Dive into WinRT
Deep Dive into WinRTDeep Dive into WinRT
Deep Dive into WinRT
 
ResumeJagannath
ResumeJagannathResumeJagannath
ResumeJagannath
 
Resume
ResumeResume
Resume
 
Learn .NET Core - Introduction
Learn .NET Core - IntroductionLearn .NET Core - Introduction
Learn .NET Core - Introduction
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
 
Zabbix Monitoring Platform
Zabbix Monitoring Platform Zabbix Monitoring Platform
Zabbix Monitoring Platform
 
Symbian Os Introduction
Symbian Os IntroductionSymbian Os Introduction
Symbian Os Introduction
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux System
 
Parth virt
Parth virtParth virt
Parth virt
 
Automated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xenAutomated paravitualization of device drivers in xen
Automated paravitualization of device drivers in xen
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Zenoss seminar

  • 1. Seminar On ZENOSS CORE (Network Monitoring Tool) Praful Bhosale MCA2 SEM –III KIT IMER’s MCA Dept. Date:-14-09-2013
  • 2. What is Zenoss Core?  Zenoss (Zenoss Core) is an open source application, server and network management platform based on the Zope application server. It's released under the GNU General Public License (GPL) version 2.  Zenoss Core provides a web interface that allows system administrators to monitor availability, inventory/ configuration, performance, and events
  • 3. Why Zenoss Core? Open Source Monitoring Solution More features including WMI performance monitoring Powerful plugins (ZenPacks)
  • 4. What Technologies used in Zenoss?  Zope :-Application server: An object-oriented web server written in Python. Python:-Extensible programming language. Net-SNMP-: Monitoring protocol that collects systems status information.  RRDtool:- Graph and log time series data.  MySQL:- A popular open source database. Twisted:- An event-driven networking engine written in Python.
  • 5. What Zenoss Core can do? Monitoring availability of network devices using SNMP, SSH, WMI Monitoring of network services (HTTP, POP3, NNTP, SNMP, FTP) Monitoring of host resources (processor, disk usage) on most network operating systems. Time-series performance monitoring of devices Extended Microsoft Windows monitoring via Windows Management Instrumentation using Zenoss open source extensions Event management tools to annotate system alerts Automatically discovers network resources and changes in network configuration Alerting system provides notifications based on rule sets and on-call calendars
  • 7. Zenoss Architecture User layer Zenoss Core is flexible enough to work from a command line, but most of our work will take place via a web interface, which is based on the Zope application server framework. Zope is a popular, extensible application server written in Python. It features a built-in web server, transactional object database, and HTML templates. Python is the basis for Zope; it's also the basis for Zenoss Core.
  • 8. Zenoss Architecture Data layer RRD:- stores time series performance data CMDB:- managing the configuration, relationship, and change history of the IT environment, which creates a detailed model of the network
  • 9. Collection layer Zope Architecture The collection layer includes several daemons that gather information about devices, performance, and Events. They feed information to ZenHub to distribute to the appropriate database. The Zenoss Core daemons are easy to identify—they all start with the prefix "zen".
  • 10.
  • 11. Daemon It is a computer program that runs as a background process, rather than being under the direct control of an interactive user Device management daemons:- zenmodeler, zendisc. Performance and availability daemons:- zenperfsnmp,zencommand, Zenprocess,zenping,zenstatus. Event daemons:- Zensyslog,zeneventlog,zentrap.
  • 12. Zenoss Core Installation 1. visit www.zenoss.com/download. 2. find native packages, stack installers, and source files for several operating systems:- Red Hat Enterprise Linux, Centos, Ubuntu, Fedora Core, OS X, OpenSuse, and Debian.,Windows. 3. Preparing devices for monitoring 4. Configuring SNMP and WMI 5. Configuring firewall
  • 14.
  • 15. Specify or discover devices to monitor Adding devices
  • 16.
  • 21. Zenoss is a good choice for open source network and systems management. The Zenoss system provides full stack coverage of networks, servers, applications, services, and virtualization. Conclusions
  • 22. References 1) www.zenoss.com 2) en.wikipedia.org/wiki/Zenoss 3) Zenoss Core Network and System Monitoring by Michael Badger