Search
Common usage instructions / function usage instructions
1、
[Process], middleware monitoring
2、
[Port] Monitoring
3、
Docker container monitoring
4、
[File tamper proof, folder tamper proof] monitoring
5、
[Log Files] Monitoring
6、
[Service Interface API] Monitoring
7、
[Data Source, Data Monitoring] Usage
8、
[Inspection Report] (Weekly, Monthly, Daily) Explanation
9、
Monitoring of network devices [PING]
10、
SNMP monitoring of network devices (such as switches, routers, firewalls, etc.)
11、
[Instruction Issuance] Batch Execution
12、
[Custom Monitoring Item] Function Description
13、
Host [Abnormal Process] module
14、
Custom Alarm Module
15、
Enable [Tags, Grouping] (group management of monitoring resources such as hosts)
16、
[Member Account] (Create multiple accounts to manage hosts and monitoring resources separately)
17、
Read only account usage
18、
How to set menu permissions and hide some menus
19、
[Device Account] Management
20、
Asset and Equipment Management
21、
Collection of Full Process Function
22、
Monitor [GPU] function
23、
Monitor [Firewall status] function
24、
Monitor [Crontab] function
25、
Monitor [Personalized collection] function
26、
Power monitor function
27、
[Work Notes] Function
28、
FTP and SFTP monitoring function
29、
How to Implement SSO Single Sign On with Password Free Login
30、
How to monitor [K8S]
31、
How to monitor middleware Redis
32、
How to monitor middleware Kafka
33、
Nginx log detection analysis and usage
34、
[Plan Task] Function Description
35、
How to add and display a verification code on the login page
36、
Host login information reminder instructions
37、
What do 'Stop Monitoring' and 'Stop Computing Resources' mean in the host list
38、
[Android] Device Monitoring
39、
How to make the left menu (navigation bar) expand and not close automatically
40、
【 SMART Hard Drive 】 Health Check Instructions
41、
[Web SSH] Instructions for Use
42、
What is the purpose of a public bulletin board and can it be automatically refreshed? sure
43、
How to monitor if the server cannot access the monitored data source, FTP, service interface, data communication PING, and data communication SNMP devices
44、
Explanation on Automatic Cleaning of Historical Monitoring Data
45、
How long will the running logs of the server and agent be retained
46、
Explanation on Excessive Upstream and Downstream Transmission Rate Values (Custom Monitoring of Designated Network Card Traffic)
47、
What are the system load values in the host list? Check [8]
48、
What is the process's command line CMDLine?