
GCP: deploying a Python WSGI Gunicorn app on Cloud Run.GCP: Cloud Run with build trigger coming from remote GitHub repository.GKE: terraform lifecycle ‘ignore_changes’ to manage external changes to GKE cluster.GCP: determining whether GKE cluster mode is Standard or Autopilot.Bash: testing if a file exists, has content, and is recently modified.GCP: determining whether ASM is installed via asmcli or gcloud fleet.Zabbix: Using Docker Compose to install and upgrade Zabbix.Zabbix: Enabling API fetch of Trend data in Zabbix2.
Zabbix: Accessing Zabbix using the py-zabbix Python module. Zabbix: Installing a Zabbix Agent on Ubuntu 14.04. Zabbix: Sending Zabbix metrics using a Go client. Write – EventLog – LogName Application – EntryType Error – Source MSSQLSERVER – EventId 1479 – Message “Test error event – ignore” (cannot write to SECURITY due to permissions) $ svn co svn:///branches/2.4 (checkout source code)Įventcreate /l System /t INFORMATION /id 99 /d “just a test” (ids < 1000) (cannot write to security log, permissions) (special item keys for Zabbix Windows agents)
(agent conf, PerfCounter is sythesized avg value of sys perf meaning it needs float) Which are represented as the Zabbix key values below: perf_counter
Microsoft SMTP server total mail received, delivered, and pending. Microsoft FTP Server total files sent and received. Microsoft IIS total GET and PUSH operations. In this example, I’m going to monitor the keys for: But you can also list all the full paths from the command line using “typeperf -qx”. The easiest way to discover the full path to these counters is to use PerfMon to first find and examine the keys. The PerfMon tool comes standard on Windows hosts and can be used to capture and display live metrics as they are collected by the system.Ĭollecting these same metrics using the Zabbix agent can be done using the perf_counter key. This will show both successful as well as login failures. Now going to Monitoring > Latest data after an interactive login should show you the event log entry within 30 seconds. These 46xx codes are documented by Microsoft, and the logon type=2 signifies interactive logon. On a host that has a Zabbix Agent on Windows, create an item with the type “Zabbix agent (active)”: I would always recommend using Event Viewer on the host to determine which event log names and exact codes you want to pull before trying to craft the query parameters.Īs an example, let’s capture all the interactive login events happening on the host which are logged in the “Security” event log. To monitor the Windows Event log, use the eventlog item keys. This means that with minimal overhead, and no additional shells out to Powerscript or the command line, you can collect any of the metrics available from PerfMon or Event Viewer.
The Windows Zabbix Agent provides a native interface to the Windows Performance Counters.