Subscribe
Tutorial search

Linux System Monitoring Tutorials


We hope that you will enjoy our Linux System Monitoring tutorials. Feel free to contact us if you would like to be a tutorial hero and contribute your own Linux System Monitoring tutorial to our site. Thank you !

Sort by:
How to install and configure Conky in Ubuntu.
How to install and configure Conky in Ubuntu.
Today I'm going to explain the method to install and configure Conky in Ubuntu Linux in few steps.
Difficulty:
Top 10 unique Conky Configurations till date.
Top 10 unique Conky Configurations till date.
I'm going to enlist top 10 Conky configurations till date that you can use on your desktop to increase the eye-candy.
Difficulty:
Some Basic Linux Commands, For Beginners...
Some Basic Linux Commands, For Beginners...
Some Basic Linux Commands, For Beginners... An A-Z Index of the Linux BASH command line.
Difficulty:
Adding NTFS Support to your Linux Distribution
Adding NTFS Support to your Linux Distribution
Many Linux Distrobutions Ship with no NTFS Support. NTFS Is the windows File System.
Difficulty:
Linux high-performance cluster monitoring with Ganglia
Linux high-performance cluster monitoring with Ganglia
This article will walk you through Installing and configuring the basic Ganglia (a scalable, distributed monitoring system for high-performance clusters) setup. it will also show you how to use the Python modules to extend functionality with IPMI, and how to use Ganglia host spoofing to monitor IPMI. The goal is not only to set up a Ganglia high-performance Linux cluster monitoring system, but also to add more monitoring capability by writing simple Ganglia plug-ins.
Difficulty:
Desktop Eye Candy - Setting Up Conky
Desktop Eye Candy - Setting Up Conky
Make your desktop look awesome! We go over installing conky and basic configuration. My conkyrc file is provided with a screenshot
Difficulty:
Reduce power consumption through smart activity monitors
Reduce power consumption through smart activity monitors
Learn how to reduce your power consumption in your Linux computers by monitoring application-usage patterns and user activity. After tuning your kernel, hdparm, ACPI, and CPU settings, discover how to add these application monitors to more effectively enter your low-power states. Also, find out how to use the focusTracker and kst visualizations to find gaps of inactivity, and create rules that can save you some green.
Difficulty:
Passive Checks and NSCA using Nagios
Passive Checks and NSCA using Nagios
This chapter describes passive checks, using Nagios, in detail with practical examples of when and how they can be used. It also shows how to use NSCA (Nagios Service Check Acceptor)for sending notifications.
Difficulty:
dnstop: Monitor DNS Server Network Traffic In Real Time
dnstop: Monitor DNS Server Network Traffic In Real Time
dnstop is a great tool when maintaining a DNS server. Log file can give out required information but dnstop is just like top command for monitoring dns traffic. It is a small tool to listen on device or to parse the file savefile and collect and print statistics on the local network's DNS traffic. You can see information about all DNS clients, DNS queries and much more with this tool.
Difficulty:
Setup a Syslog Server
Setup a Syslog Server
This tutorial is for setting up a syslog server in FreeBSD and Linux. A syslog server is useful to log messages from different network devices or servers to a dedicated log server machine.
Difficulty:
Graphical LPAR Monitor for System p5 Servers
Graphical LPAR Monitor for System p5 Servers
Discover a graphical LPAR monitor for the System p5 Server that allows the status of CPU and memory resources used by one or more LPARS to be monitored side by side. LPAR state information that can be monitored with this tool includes LPAR tracking, simultaneous multithreading state, and processor and memory use.
Difficulty:
Executing Signed Binaries in Linux Kernel
Executing Signed Binaries in Linux Kernel
This tutorial is the second in a two-part series on locking your Linux machines down to streamline the associated support and administration processes. In Part 2 learn how to configure the Linux kernel to execute only signed binaries. In Part 1 you learned how to remove the interpreters from the installation base system to prevent spurious user changes.
Difficulty:
Build an LDAP-based Address Book
Build an LDAP-based Address Book
It can be a headache. Import and export schemes, if they exist at all, are often too clunky and unsatisfactory to use even once, much less on a regular basis. Enter the Lightweight Directory Access Protocol. This tutorial shows you how to create an LDAP-based backend to store contact information that multiple applications can share easily.
Difficulty:
Enterprise log management - a comparison of 3 big logging systems (Snare vs. Splunk vs. LogLogic)
Enterprise log management - a comparison of 3 big logging systems (Snare vs. Splunk vs. LogLogic)
No doubt that if you are working with large and medium sized servers and infrastructures, you have come across the need to collect logs and review or analyze them. With more servers the problem escalates as you have to log into every system to check the logs. It becomes very nice once you start having different systems that have different logging mechanisms. I touched the subject with my article on configuring splunk and snare for logging.
Difficulty:
Monitor Servers and Clients using Munin in Ubuntu
Monitor Servers and Clients using Munin in Ubuntu
"Munin" means "memory".Munin the tool surveys all your computers and remembers what it saw. It presents all the information in in graphs through a web interface. Its emphasis is on plug and play capabilities. After completing a installation a high number of monitoring plugins will be playing with no more effort. Using Munin you can easily monitor the performance of your computers, networks, SANs, and quite possibly applications as well. It makes it easy to determine "what"™s different today" when a performance problem crops up. It makes it easy to see how you"™re doing capacity wise on all limited resources.
Difficulty:
Total Tutorials in Category: 16