Vunetrix Network Monitor vCloud

Vunetrix Manual: Monitoring via SSH

Monitoring via Secure Shell (SSH) enables you to gather performance and system data from many Linux and Unix distributions, as well as from certain Mac OS X systems. If your system is supported this monitoring works natively without the need of additional software on the target systems.

How Monitoring via SSH Works

In order to monitor remote machines via SSH, Vunetrix needs credentials (preferably root access) of the devices. If you use Vunetrix's SSH sensors, you can enter the necessary credentials in Vunetrix for the parent device or group, or in the Root group, in the Credentials for Linux (SSH/WBEM) Systems section within the Settings tab. The sensors will then inherit these settings.

With each scanning interval, Vunetrix will login to your devices and query data by executing specific commands.

For an overview and details about all SSH sensors, please see the List of Available Sensor Types section.

Limitations When Using SSH Monitoring

Due to the plurality of Linux/Unix derivatives, Vunetrix's SSH sensors cannot support all distributions on the market. Also, only certain Mac OS systems are supported. For a detailed list please see the More section below.

Authentication via SSH Private Key

Vunetrix supports authentication via password or via private key.

When using a private key, please ensure the following:

  • Provide the key in OpenSSH RSA format.
  • The key may not be encrypted! Vunetrix does not support password protected keys.
  • The key must be provided as RSA key, you cannot use DSA keys with Vunetrix!
     

When providing an unencrypted RSA private key in OpenSSH RSA format, please copy the entire key, including the

-----BEGIN RSA PRIVATE KEY-----

and

-----END RSA PRIVATE KEY-----

lines, into the according text field in Vunetrix and Save your settings. Once pasted and saved, the private key will be shown as

***************************

 
Please make sure there exists a corresponding public key on the target device.

For a detailed description how to convert and use an existing SSH key, please see the More section below.

 

 

Next Topic

Keywords: