Overview
A concise step‑by‑step guide to install, configure, and validate ServersCheck Monitoring Software for basic network and device monitoring.
1) Prepare environment
- System requirements: Windows Server or Linux (check ServersCheck docs for exact OS versions), 4+ CPU cores, 8+ GB RAM, 50+ GB disk recommended.
- Network: Static IP for the monitoring server, open ports (HTTP/HTTPS, SNMP 161, ICMP, any agent ports).
- Accounts: Admin account on the server and credentials for devices to monitor (SNMP community strings, SSH, WMI, API keys).
2) Obtain software
- Download the latest ServersCheck Monitoring Software installer from the vendor portal (choose appliance/VM, Linux binary, or Windows installer as appropriate).
3) Install
- Windows: run installer, follow prompts, choose service account, set installation path.
- Linux: extract package, run provided install script (sudo), accept required dependencies.
- VM/Appliance: import OVA and power on; configure initial network settings via console.
4) Initial web access and admin setup
- Open the web UI at http://: or https if enabled.
- Complete first‑time setup: create admin user, set timezone, configure SMTP for alerts, set backup schedule.
5) Add and organize monitored assets
- Create device groups (e.g., Network, Servers, Data Center, IoT).
- Add devices by IP/hostname. For each device, select the appropriate probe/template (SNMP, WMI, SSH, ICMP, API).
- Supply credentials: SNMP community strings (v2/v3), WMI domain user, SSH keys/password, or API tokens.
6) Configure checks and templates
- Use built‑in templates for common checks (CPU, memory, disk, temperature, interface traffic).
- Create custom checks when needed (SNMP OIDs, HTTP request checks, script/agent checks).
- Set measurement intervals (e.g., 1m for critical systems, 5–15m for less critical).
7) Thresholds and alerting
- Define warning and critical thresholds per check (e.g., CPU warning 75%, critical 90%).
- Configure alert escalation policies: who gets notified, by which channel, and after how many occurrences.
- Enable notification channels: email, SMS, webhook, Slack, PagerDuty, etc.
8) Agents and remote probes
- Deploy lightweight agents or remote probes for devices behind NAT or in remote sites; register them to the main server.
- Verify agent connectivity and permissions (ensure firewall allows outgoing/incoming probe traffic).
9) Dashboards and reporting
- Create dashboards showing key KPIs and status maps.
- Configure periodic reports (daily/weekly) and automated report delivery to stakeholders.
10) Testing and validation
- Run simulated failures (disable an interface, raise CPU load) to confirm detection and alerts.
- Check alert delivery, escalation, and incident logging.
11) Backup, updates, and maintenance
- Enable automated server backups and export configuration regularly.
- Apply software updates during maintenance windows and test in staging when possible.
- Monitor database size and archive old metrics if needed.
12) Security best practices
- Use HTTPS for the web UI and strong admin passwords or SSO.
- Use SNMPv3 where possible; restrict management network access via firewall and VLANs.
- Rotate credentials and use least privilege for monitoring accounts.
Quick checklist (short)
- Meet system prerequisites
- Install or deploy appliance
- Access web UI and create admin account
- Add devices and assign probes/templates
- Set thresholds and alerts
- Deploy remote probes/agents where needed
- Test alerts and backup configuration
If you want, I can produce a ready-to-run checklist tailored to Windows or Linux, or provide sample SNMP OID checks and alert templates.
Leave a Reply