Monitor localVirtual machine linux
console->management->devices, click ADD on the right
Enter the following content and click create
Select the graphic template and data template required for monitoring and save
After saving, click Create Graphs for this host
Select what you need After selecting all the generated image data, click Create
Continue to click CREATE
Create image successfully
Add the device to the tree
Console->management->graph trees, click Default Tree, and then click ADD
Enter as shown below, click Create to add the device to the tree
Next go to view the monitoring image
Monitor localwindow
1.Basic Windows configuration
Install snmp protocol
Then ctrl r, enter services.msc
Add the Windows host to the monitoring
console->management->devices, click ADD
Continue to click CREATE
Add the device to the tree
Console->management-> ;graph trees, click Default Tree, and then click ADD
Enter as shown below, click Create to add the device Enter the tree
Next enter to view the surveillance image
MonitorSwitchPort traffic
1.Enable the switch and configure snmp
Telnet the switch and perform the following configuration:
snmp enable traps snmp //Enable the snmp function of the switch
snmp community s8606 ro //Set the community with read-only permission
2. Add the switch to monitoring
Add the switch with the corresponding IP as shown in the figure below
Add the following graphics and data template
Select the port that needs to be monitored and generate the image
Just add it to the tree Look at the image
Thold’s application
Due to Cacti’s own flow monitoring valve The value can only monitor byte, so we have to convert bytes into bits (MB)
Calculation formula: 1 bytes=8 bits=8/1021 Kb=8/1024/1024 Mb
Add the threshold, and then set it as follows, set the alarm threshold and save it
The effect is as follows, the alarm has taken effect
Thold sound alarm
In the cacti directory, update the thold plug-in code to implement thold sound alarm
/cacti/plugins/thold/thold_graph.php
If in line 463 ($row['thold_fail_count '] >= $row['thold_fail_trigger'] ) Add the following code into {}
print '
Weathermap application
Create a new weather map and give the map configuration file the name A name
Click Add Node to add a node, click Add Link to add a link between two nodes (English version)
Create a node and click Node on the diagram to enter the node editing interface.
The effect is as follows
Create a link and click the link on the picture to enter the link editing interface.
The effect is as follows
Click Map Properties, where you can make a global definition of the entire map.
The original default value of a picture is set here. The last option can choose a background for this picture.
Click Map style. Here are some settings for the link.
Next add the traffic diagram of the device interface, click the link, and add the graphic template
After the layout is completed, add the configuration file to the weather map
Added successfully , let’s take a look at the effect
Picture entry successful!
The above is the detailed content of What are the basic applications of cacti?. For more information, please follow other related articles on the PHP Chinese website!

This article examines operational security audit system procurement. It details typical categories (hardware, software, services), budget allocation (CAPEX, OPEX, project, training, contingency), and suitable government contracting vehicles (GSA Sch

This article explores the roles and required skills of DevOps, security, and IT operations engineers. It details the daily tasks, career paths, and necessary technical and soft skills for each, highlighting the increasing importance of automation, c

This article details crucial security responsibilities for DevOps engineers, system administrators, IT operations staff, and maintenance personnel. It emphasizes integrating security into all stages of the SDLC (DevOps), implementing robust access c

This article contrasts Operations Security (OpSec) and Network Security (NetSec) audit systems. OpSec focuses on internal processes, data access, and employee behavior, while NetSec centers on network infrastructure and communication security. Key

This article examines DevSecOps, integrating security into the software development lifecycle. It details a DevOps security engineer's multifaceted role, encompassing security architecture, automation, vulnerability management, and incident response

This article examines essential skills for a successful security operations career. It highlights the need for technical expertise (network security, SIEM, cloud platforms), analytical skills (data analysis, threat intelligence), and soft skills (co

DevOps enhances operational security by automating security checks within CI/CD pipelines, utilizing Infrastructure as Code for improved control, and fostering collaboration between development and security teams. This approach accelerates vulnerabi

This article details operational and maintenance (O&M) security, emphasizing vulnerability management, access control, security monitoring, data protection, and physical security. Key responsibilities and mitigation strategies, including proacti


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

SublimeText3 Mac version
God-level code editing software (SublimeText3)

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Dreamweaver CS6
Visual web development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
