What is Xymon used for?
Xymon is a tool for monitoring servers, applications and networks. It collects information about the health of your computers, the applications running on them, and the network connectivity between them.
What is Xymon monitoring?
Xymon offers graphical monitoring, showing the status of various network services of each device, as well as a range of application and operating system metrics such as listing the number of mail messages queued after a defined level of downtime.
What port does Xymon use?
TCP port 1984
Clients must be able to connect to the Xymon server on TCP port 1984 to send their status reports. If this port is blocked by a firewall, client status reports will not show up. If possible, open up the firewall to allow this access.
How does Xymon monitor network services?
Xymon can periodically generate requests to network services – http, ftp, smtp and so on – and record if the service is responding as expected. You can also monitor local disk utilisation, logfiles and processes through the use of agents installed on the servers.
What does make install do in Xymon?
The first time you run make install, besides installing the Xymon programs it also creates the default directory structure used by Xymon, and installs an initial set of configuration files that you can use as the basis for setting up monitoring of your entire network. It is safe to run make install when upgrading a Xymon server.
What does Xymon do in case of problems?
In case of problems alerts may be sent in the form of e-mails, SMS-messages or pager-alerts so that staff can respond quickly to problems without having to keep watch over the services. The easiest way to understand what Xymon does is to see it in action. https://www.xymon.com/is the live view of a Xymon server that monitors Henrik’s home network.
Why does xymonping require root privileges to run?
Xymon will install the xymonping tool as setuid-root (only on the Xymon server). This program requires root privileges to be able to perform network “ping” tests. It will drop root privileges immediately after obtaining the network socket needed for this, and will not run with root privileges at all while handling network traffic or doing file I/O.