Search
Common usage instructions / function usage instructions
1、
[Process], middleware monitoring
2、
[Port] Monitoring
3、
Docker container monitoring
4、
[File tamper proof, folder tamper proof] monitoring
5、
[Log Files] Monitoring
6、
[Service Interface API] Monitoring
7、
[Data Source, Data Monitoring] Usage
8、
[Inspection Report] (Weekly, Monthly, Daily) Explanation
9、
Monitoring of network devices [PING]
10、
SNMP monitoring of network devices (such as switches, routers, firewalls, etc.)
11、
[Instruction Issuance] Batch Execution
12、
[Custom Monitoring Item] Function Description
13、
Host [Abnormal Process] module
14、
Custom Alarm Module
15、
Enable [Tags, Grouping] (group management of monitoring resources such as hosts)
16、
[Member Account] (Create multiple accounts to manage hosts and monitoring resources separately)
17、
Read only account usage
18、
How to set menu permissions and hide some menus
19、
[Device Account] Management
20、
Asset and Equipment Management
21、
Collection of Full Process Function
22、
[Work Notes] Function
23、
FTP and SFTP monitoring function
24、
How to Implement SSO Single Sign On with Password Free Login
25、
How to monitor [K8S]
26、
How to monitor middleware Redis
27、
How to monitor middleware Kafka
28、
Nginx log detection analysis and usage
29、
[Plan Task] Function Description
30、
How to add and display a verification code on the login page
31、
Host login information reminder instructions
32、
What do 'Stop Monitoring' and 'Stop Computing Resources' mean in the host list
33、
[Android] Device Monitoring
34、
How to make the left menu (navigation bar) expand and not close automatically
35、
【 SMART Hard Drive 】 Health Check Instructions
36、
[Web SSH] Instructions for Use
37、
What is the purpose of a public bulletin board and can it be automatically refreshed? sure
38、
How to monitor if the server cannot access the monitored data source, FTP, service interface, data communication PING, and data communication SNMP devices
39、
Explanation on Automatic Cleaning of Historical Monitoring Data
40、
How long will the running logs of the server and agent be retained
41、
Explanation on Excessive Upstream and Downstream Transmission Rate Values (Custom Monitoring of Designated Network Card Traffic)
42、
What are the system load values in the host list? Check [8]