How to Configure iNetMon Plus for Real-Time Alerts
1) Prepare prerequisites
- Install the latest iNetMon Plus build on a machine with network access.
- Account: sign in with an admin account.
- Permissions: ensure the app can access network interfaces and required ports (SNMP/ICMP/agent ports).
- Data sources: identify IP ranges, devices, or services to monitor.
2) Add devices and targets
- Open Device Management → Add Device.
- Enter IP/hostname, device type, and optional group/tag.
- Set credentials (SNMP v2/v3, SSH, WMI) for deeper checks.
- Save and repeat for all targets.
3) Configure checks and thresholds
- Go to Monitoring → Checks.
- Create checks (ping/ICMP, SNMP OID, port TCP/UDP, HTTP(S), custom scripts).
- For each check, set:
- Interval (e.g., 30s, 1m).
- Timeout value.
- Thresholds for warning/critical (latency %, packet loss, response codes).
4) Set up alert rules
- Open Alerts → Rules → New Rule.
- Choose condition(s): specific check failures, threshold breaches, or combination logic.
- Configure escalation: immediate alert for critical; delayed/warning notifications for transient issues.
- Add suppression windows (maintenance windows, business hours) to avoid noise.
5) Configure notification channels
- Email: enter SMTP server, sender address, and recipient lists.
- SMS: integrate SMS gateway or third-party provider credentials.
- Push: enable push notifications in user settings and install mobile app if available.
- Webhook/Slack/MS Teams: create and test webhook URLs; map payload fields.
- PagerDuty/ops tools: integrate via API keys for incident management.
6) Customize alert content
- Use templates to include device name, check name, timestamp, metric values, severity, and a troubleshooting hint.
- Add variables/placeholders so alerts are actionable.
7) Test alerts
- Use Test Alert or simulate failures (disable a monitored interface or stop a service) to verify delivery and formatting for each channel.
- Confirm escalation and suppression behave as expected.
8) Tune to reduce noise
- Increase check intervals or add retry counts for flaky links.
- Use grouping and correlated alerts to avoid duplicate notifications for the same outage.
- Implement threshold hysteresis (different values for entering vs. leaving an alert state).
9) Monitor and iterate
- Review alert history and false positives weekly for 2–4 weeks.
- Adjust thresholds, intervals, and notification recipients based on incident impact and frequency.
If you want, I can generate example alert rule definitions, sample webhook payloads, or a step-by-step SMTP setup for your environment.
Leave a Reply