Search
Common usage instructions / other instructions
1、
Agent host offline issue, the number of anti tampering verification errors in agent log printing exceeds 10 times, and data will no longer be reported
2、
How to check the version numbers of servers and agents
3、
server-backup instructions
4、
What indicators can the agent monitor and collect from the host
5、
Which ports do WGCLOUD need to open
6、
The agent's automatic acquisition of the host IP is incorrect. The agent's host IP will dynamically change. How to set the agent to report the IP
7、
How to configure disks that do not require monitoring and saving
8、
How to deal with the problem of slow display time of 8 hours
9、
Encrypt the administrator password and database password in the configuration file
10、
How to deal with the agent process being killed by other programs or human misoperation
11、
Authorization expires, authorization becomes invalid, monitoring quantity exceeds authorized node quantity, professional version becomes personal version, what should be done
12、
How to migrate, backup, and restore WGCLOUD
13、
How to modify the configuration of output log files for server operation
14、
The server can also serve as a static resource web server, configuring access to static resources
15、
How to deal with the situation where the login password is entered incorrectly more than 5 times and is prohibited from logging in within 10 minutes
16、
How to optimize and clean up the excessive historical data monitored by the database?
17、
After running for a period of time, opening the list page slows down. What is the reason?
18、
Server and Agent Communication Diagram (HTTP Protocol) Description
19、
What is the difference between issuing instructions and customizing monitoring items
20、
🔔️ Security vulnerability announcement
21、
Instructions for using alarm expressions
22、
What is the difference between WGCLOUD and Zabbix / Prometheus monitoring
23、
Detected that the target host may have a slow HTTP denial of service attack, how to handle it
24、
Linux Security Reinforcement Method: Modifying the Default Port Number of SSH