Zenoss Core Configuration
Zenoss Core Configuration
Guide
Release 6.1.0
Zenoss, Inc.
www.zenoss.com
Zenoss Core Configuration Guide
Zenoss, Own IT, and the Zenoss logo are trademarks or registered trademarks of Zenoss, Inc., in the United States and other countries. All other
trademarks, logos, and service marks are the property of Zenoss or other third parties. Use of these marks is prohibited without the express written
consent of Zenoss, Inc., or the third-party owner.
Amazon Web Services, AWS, and EC2 are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries.
Oracle, the Oracle logo, Java, and MySQL are registered trademarks of the Oracle Corporation and/or its affiliates.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
All other companies and products mentioned are trademarks and property of their respective owners.
Zenoss, Inc.
11305 Four Points Drive
Bldg 1 - Suite 300
Austin, Texas 78726
2
Contents
About this guide.......................................................................................................................4
3
Zenoss Core Configuration Guide
Title Description
Zenoss Core Administration Guide Provides an overview of Zenoss Core architecture and
features, as well as procedures and examples to help
use the system.
Zenoss Core Configuration Guide Provides required and optional configuration
procedures for Zenoss Core, to prepare your
deployment for monitoring in your environment.
Zenoss Core Installation Guide Provides detailed information and procedures for
creating deployments of Control Center and Zenoss
Core.
Zenoss Core Planning Guide Provides both general and specific information for
preparing to deploy Zenoss Core.
Zenoss Core Release Notes Describes known issues, fixed issues, and late-
breaking information not already provided in the
published documentation set.
Zenoss Core Upgrade Guide Provides detailed information and procedures for
upgrading deployments of Zenoss Core.
Zenoss welcomes your comments and suggestions regarding our documentation. To share your comments,
please send an email to docs@zenoss.com. In the email, include the document title and part number. The
part number appears at the end of the list of trademarks, at the front of this guide.
4
Enabling access to browser interfaces
The Control Center web server listens at the hostname of the Control Center master host and port 443. For a
Control Center master host with the fully qualified domain name (FQDN) cc-master.example.com, the
hostname URL is https://cc-master. You can substitute an IP address for the hostname portion of the
URL.
The Zenoss Core web server can listen at port public endpoints and virtual host public endpoints.
■ A port public endpoint is a combination of the IP address or hostname of the Control Center master host
and a port number. The default configuration of Zenoss Core does not include any port public endpoints. If
the Control Center master host has more than one interface, you can configure port public endpoints with
different hostnames. Also, you can disable TLS communications for a port public endpoint.
To use a port public endpoint to gain access to the Zenoss Core browser interface, no additional network
name resolution entries are required. The default entries for the network interfaces of the Control Center
master host are sufficient.
■ The default virtual host public endpoint is the text zenoss5 prefixed to the hostname of the Control Center
master host and port 443. For the FQDN cc-master.example.com, the URL of the default virtual
host public endpoint is https://zenoss5.cc-master:443. You can change the name of the default
virtual host and configure additional virtual host public endpoints.
To use a virtual host public endpoint to gain access to the Zenoss Core browser interface, you must add
name resolution entries for the virtual host to the DNS servers in your environment or to the hosts files of
individual client systems.
The following sections provide additional information about public endpoints, and instructions for creating
public endpoints and configuring virtual hostname resolution.
5
Zenoss Core Configuration Guide
The following table lists communication requirements and outlines the process for creating public endpoints.
Step-by-step instructions follow this overview.
Port public endpoints can communicate Virtual host public endpoints must use SSL/TLS
with or without SSL/TLS. communications.
To change an existing public endpoint, create a new endpoint and then delete the existing endpoint.
3 On the right, above the Public Endpoints table, click Add Public Endpoints.
The default view of the Add Public Endpoint dialog box displays the fields for creating a port public
endpoint.
6
Enabling access to browser interfaces
7
Zenoss Core Configuration Guide
Configuring Zope for HTTPS and the default secure proxy server
Before performing this procedure, create a port public endpoint or a virtual host public endpoint to use the
HTTPS protocol.
Use this procedure to configure the Zope service for SSL/TLS communications and the secure proxy server that
is included in Zenoss Core.
<cgi-environment>
HTTPS ON
</cgi-environment>
6 Configure the Beaker add-on product to use secure communications.
a Locate the product-config directive.
The directive is at the bottom the file, on or near line 1122.
b Set the value of the session.secure key to True.
7 Click Save.
Next steps:
■ If you created a port public endpoint before performing this procedure, the endpoint is ready to use.
■ If you created a virtual host public endpoint before performing this procedure, proceed to Configuring name
resolution for virtual hosts on page 12.
8
Enabling access to browser interfaces
Note When you configure Zope for insecure communications, existing virtual host public endpoints stop
working.
<cgi-environment>
HTTPS OFF
</cgi-environment>
6 Configure the Beaker add-on product to use insecure communications.
a Locate the product-config directive.
The directive is at the bottom the file, on or near line 1122.
b Set the value of the session.secure key to False.
7 Click Save.
9
Zenoss Core Configuration Guide
Use this procedure to configure the Zope service for SSL/TLS communications and a secure proxy server that is
available on your network.
<cgi-environment>
HTTPS ON
</cgi-environment>
6 Configure the Beaker add-on product to use secure communications.
a Locate the product-config directive.
The directive is at the bottom the file, on or near line 1122.
b Set the value of the session.secure key to True.
7 Click Save.
10
Enabling access to browser interfaces
3 On the right, above the Public Endpoints table, click Add Public Endpoints.
4 Define a new virtual host public endpoint.
a In the Type area, click VHost.
■A fully qualified domain name (FQDN). Any string of text that includes one or more full stop
characters (.) is treated as an FQDN.
■ A string of text that contains only letters and one or more hyphen characters (-). The string is
prepended to the hostname of the Control Center master host, with a full stop character (.) separating
the string and the hostname.
d Click Add.
Configuring Zope for HTTPS and the default secure proxy server
Before performing this procedure, create a port public endpoint or a virtual host public endpoint to use the
HTTPS protocol.
Use this procedure to configure the Zope service for SSL/TLS communications and the secure proxy server that
is included in Zenoss Core.
11
Zenoss Core Configuration Guide
3 In the Services table, expand Zenoss > User Interface, and then click Zope.
The Zope service details page appears.
4 In the Configuration Files table, locate path /opt/zenoss/etc/zope.conf, and in the Actions column, click
Edit.
The Edit Configuration window appears.
<cgi-environment>
HTTPS ON
</cgi-environment>
6 Configure the Beaker add-on product to use secure communications.
a Locate the product-config directive.
The directive is at the bottom the file, on or near line 1122.
b Set the value of the session.secure key to True.
7 Click Save.
Next steps:
■ If you created a port public endpoint before performing this procedure, the endpoint is ready to use.
■ If you created a virtual host public endpoint before performing this procedure, proceed to Configuring name
resolution for virtual hosts on page 12.
12
Enabling access to browser interfaces
For example, the following entry identifies a Control Center master host at IP address 192.0.2.12, hostname
cc-master, in the example.com domain.
13
Zenoss Core Configuration Guide
2 In the Actions column of the Applications table, click Start for Zenoss.core.
3 In the Start Service dialog, click Start Service and 40 Children.
4 Optional: Monitor the startup, if desired.
a In the Applications table, click Zenoss.core.
b Scroll down to the Services table and review the Health icon for each service.
As services are started the Health icon changes to a check mark.
1 Log in to the Control Center master host as a user with serviced CLI privileges.
2 Start Zenoss Core:
14
Configuring Zenoss Core
The following list associates the affected servers, their Zenoss Core services, and their account information.
Note The list includes both account names and passwords. Zenoss recommends changing the passwords of
each account and strongly discourages changing the account names.
MariaDB server for event and model databases
Administrator account:global.conf.zep-admin-user
Administrator password:global.conf.zep-admin-password
Event database user account:global.conf.zep-user
Event database user password:global.conf.zep-password
Administrator account:global.conf.zodb-admin-user
Administrator password:global.conf.zodb-admin-password
Model database user account:global.conf.zodb-user
Model database user password:global.conf.zodb-password
RabbitMQ server
Service: RabbitMQ
User account: global.conf.amqpuser
User password: global.conf.amqppassword
1 Log in to the Control Center master host as root, or as a user with superuser privileges.
2 Log in to the Docker container of the MariaDB service as zenoss.
15
Zenoss Core Configuration Guide
USE mysql
c Set the password of the root user.
Replace New-Password with a new password:
QUIT
The MariaDB server loads the grant tables into memory immediately when account management
statements like SET PASSWORD are used, so the FLUSH PRIVILEGES statement is not necessary.
4 Log in to the Control Center browser interface.
5 In the Applications table, click Zenoss.core.
6 In the application title line, click Edit Variables.
Initially, the application title line appears immediately below the Control Center banner at the top of the
page. When you scroll down the page, the application title line persists at the top of the page.
16
Configuring Zenoss Core
1 Log in to the Control Center master host as root, or as a user with superuser privileges.
2 Change the password of the zenoss user.
a Log in to the Docker container of the RabbitMQ service as root.
exit
3 Log in to the Control Center browser interface.
4 In the Applications table, click Zenoss.core.
5 In the application title line, click Edit Variables.
Initially, the application title line appears immediately below the Control Center banner at the top of the
page. When you scroll down the page, the application title line persists at the top of the page.
17
Zenoss Core Configuration Guide
1 Log in to the Control Center master host as a user with serviced CLI privileges.
2 Attach to the RabbitMQ container.
exit
5 Restart the RabbitMQ service.
1 Log in to the Control Center master host as root, or as a user with superuser privileges.
2 Determine whether the cronie-anacron package is installed.
a Search the list of installed packages.
ls -l /etc/cron.weekly
■ If the result includes serviced-zenossdbpack, the maintenance script is installed. Stop performing
this procedure.
18
Configuring Zenoss Core
■If the result does not include serviced-zenossdbpack, the maintenance script is installed.
Complete this procedure.
4 Create a shell script for weekly invocation.
a Open /etc/cron.weekly/serviced-zenossdbpack with a text editor.
The file is empty.
b Add the following content to the file.
#!/bin/sh
${SERVICED:=/opt/serviced/bin/serviced} service run zope
zenossdbpack
c Save the file, and then close the text editor.
5 Set file permissions.
■ a login account on the master host that is a member of the docker group
■ the password of the root user account
At the end of the installation process, the message Container not commited appears. This is normal.
The tools are installed in the distributed file system, not in an image.
■ a login account on the master host that is a member of the docker group
■ the password of the root user account
In addition, you need the Percona Toolkit package file. This procedure includes steps for downloading it to a
client system, and then copying it to the Control Center master host.
1 On a client system, use a web browser to download the latest version of the Percona Toolkit package.
2 Log in to the Control Center master host.
3 Prepare the package for installation.
19
Zenoss Core Configuration Guide
a On the Control Center master host, create a directory for the package, and then change directory.
cd /tmp/percona
b Start an interactive shell in a Zope container and save a snapshot named PerconaToolkit.
mySnap=InstallPerconaToolkit
serviced service shell -i -s $mySnap zope bash
c Switch user to zenoss.
su - zenoss
5 Install the package and exit the Zope container.
a Create a directory for the package.
PERCONADIR=/var/zenoss/percona
mkdir -p $PERCONADIR
b Extract the package files.
exit
d Exit the Zope container.
exit
6 Commit the named snapshot.
20
Configuring Zenoss Core
■ the certificate and key files of a digital certificate from a certificate authority or from a digital certificate
created with a utility such as OpenSSL
21
Zenoss Core Configuration Guide
Use this procedure to route an IPv6 address block to Control Center using Docker's virtual bridge interface,
docker0. Zenoss Core can monitor IPv6 devices that have addresses in the routed block.
To perform this procedure, each Control Center host needs a unique IPv6 prefix routed to it by an upstream
router, and the Docker service on Control Center host needs to be configured to forward IPv6 packets.
For example, a multi-host deployment with one master host and three delegates could have the IPv6
configuration in the following table.
The following example shows how to configure the static routes in the preceding table on an upstream Cisco
router:
1 Log on to the Control Center host as root, or as a user with superuser privileges.
2 Configure IPv6 packet forwarding.
a Open /etc/sysctl.d/ipv6.conf with a text editor.
b Add or edit the following line:
net.ipv6.conf.all.forwarding=1
22
Configuring Zenoss Core
sysctl -w net.ipv6.conf.all.forwarding=1
4 Configure Docker for IPv6 communications.
a Open /etc/sysconfig/docker with a text editor.
b Add the following flags to the end of the OPTIONS declaration.
Replace Subnet-Block with the IPv6 subnet to route to Control Center, in CIDR notation:
--ipv6 --fixed-cidr-v6="Subnet-Block"
c Change the delimiter of the OPTIONS declaration to the apostrophe character (').
The default delimiter of the OPTIONS declaration is the quotation mark character ("), which is the same
delimiter used with the --fixed-cidr-ipv6 flag.
d Save the file, and then close the text editor.
5 Restart the Docker service.
After all Control Center hosts are configured, test IPv6 by using the Docker container of the zenping service to
ping a known address:
If the ping is successful, Docker is able to resolve IPv6 addresses and you can monitor devices on the IPv6
network.
Quilt is a utility for managing software changes, and Zenoss recommends installing it to manage customizations.
23
Zenoss Core Configuration Guide
1 On a client system, use a web browser to download the latest version of the Quilt package.
2 Log in to the Control Center master host.
3 Prepare the package for installation.
a On the Control Center master host, create a directory for the package, and then change directory.
cd /tmp/quilt
b Start an interactive shell in a Zope container and save a snapshot named InstallQuilt.
mySnap=InstallQuilt
serviced service shell -i -s $mySnap zope bash
c Switch user to zenoss.
su - zenoss
5 Extract the package files, and then compile and install Quilt.
a Extract the package files.
exit
b Exit the Zope container.
exit
7 Commit the named snapshot.
24
Configuring Zenoss Core
observed that these merges result in duplicate data points, so by default, compaction is disabled. Duplicate data
points do not affect data integrity.
25
Zenoss Core Configuration Guide
Note This chapter describes how to prepare the most common IT infrastructure. If the infrastructure you
want to monitor is not described here, please refer to the corresponding ZenPack documentation in the ZenPack
catalog.
When your infrastructure is ready to monitor, the Zenoss Core Setup Wizard guides you through the process of
discovering devices on your network and adding devices by category and type.
Zenoss Core is ready to monitor a large number of common devices and network infrastructure as soon it
is installed. However, you can monitor an even larger number of devices in Zenoss Core through the use of
ZenPacks. A ZenPack is a plug-in that extends not only monitoring capabilities, but also adds new capabilities
to the Zenoss Core itself. This can be as simple as adding new device classes or monitoring templates, or as
complex as extending the data model and providing new collection daemons.
There are hundreds of ZenPacks available, some developed, supported, and maintained by Zenoss, and many
others that are developed and maintained by the Zenoss user community.
■ Monitoring templates
■ Data sources
■ Graphs
■ Event classes
■ User commands
■ Reports
■ Model extensions
■ Product definitions
26
Preparing for monitoring
Simple ZenPacks can be created completely within the Zenoss Core. More complex ZenPacks require
development of scripts or daemons, using Python or another programming language. ZenPacks can also be
distributed for installation on other Zenoss Core systems. For information on how to create a new ZenPack, refer
to Zenoss Core Administration Guide.
You may also create your own ZenPacks, or download and install ZenPacks developed by others. The following
list identifies ZenPack resources:
■ ZenPack SDK
■ Zenoss Community, which includes a ZenPack development forum
■ Public Zenoss repositories on GitHub
3 To monitor infrastructure that does not appear in the Loaded ZenPacks list, download the required ZenPack
from the ZenPack catalog.
Once the ZenPack is installed, you can then add the infrastructure to Zenoss Core.
27
Zenoss Core Configuration Guide
To prepare a switch or router device for monitoring, verify that an SNMP agent is installed and currently
running on the device.
Note This rest of this section describes how to prepare Zenoss network devices for monitoring. For other
device types, refer to the ZenPack catalog documentation.
Zenoss Core uses SNMP to provide customized or generalized support for many Zenoss products.
The following table associates Zenoss products with the customized Zenoss Core device types that support
them. Device types are listed in the Network area of the Add Infrastructure wizard, which is both part of the
setup wizard and available through the Zenoss Core browser interface.
■ Some supported devices, such as the Cisco Nexus 7000 and 9000 switches, represent a large number of
discrete monitoring endpoints. If you are unsure which Zenoss Core deployment size supports the number of
high-density devices you wish to monitor, contact your Zenoss representative.
■ To monitor Cisco Nexus 9000 Series devices, you must first enable NX-API with the feature manager
CLI command on the device. For detailed instructions on performing this task, refer to the Cisco
documentation for the Nexus 9000.
This section describes how to prepare NetApp and EMC storage devices for monitoring.
28
Preparing for monitoring
Zenoss Core uses SNMP to monitor legacy NetApp filers that do not support the Data ONTAP® API (ZAPI).
The data gathered are approximate because the values for many objects (Aggregate, Volume, Plex, and RAID
group) are not exposed by the NetApp MIB.
To prepare a legacy NetApp filer for monitoring, verify that SNMPv2 is installed, and then start an SNMP
agent.
Zenoss Core uses HTTP to monitor NetApp filers that support the Data ONTAP® API (ZAPI).
To prepare a recent NetApp filers for monitoring, verify the following conditions:
Zenoss Core uses the Web-Based Enterprise Management (WBEM) protocol to send queries to EMC Storage
Management Initiative Specification (SMI-S) providers that are associated with EMC VMAX and VNX storage
arrays.
■ At least one EMC SMI-S provider must be running for each type of array to monitor. (The VMAX and VNX
data models are different.)
■ Before adding an SMI-S provider to Zenoss Core, Zenoss recommends that you confirm that it is responding
to requests.
■ You need the following information:
■ user name and password for an account that is authorized to collect data on each SMI-S provider
■ IP address of each SMI-S provider
■ port number at which each SMI-S provider listens for requests
■ whether to use SSL
Note When statistics logging is disabled on the EMC device, graphs for component types of EMC arrays
display NaN. The logging feature has a low default timeout value and must be set to a higher value or turned on
again periodically.
To perform this procedure, you need a Linux host that has a network path to the SMI-S providers of the arrays to
monitor.
Perform this procedure to verify that the SMI-S providers associated with EMC arrays are configured correctly,
and are responding to WBEM queries from command line tools.
29
Zenoss Core Configuration Guide
3 Verify the SMI-S provider. Replace the variables with values that are valid in your environment.
Note For other device types, refer to the ZenPack catalog documentation.
For SNMP monitoring, install an SNMP package on the server (for example, Net-SNMP) and start the agent.
■ Install an SSH server package (for example, OpenSSH) and start the SSH daemon.
■ Monitoring Linux servers requires the ability to run the pvs, vgs, lvs, systemctl, initctl, and
service commands remotely on your Linux server(s) using SSH. By default, most of these commands
are only allowed to be run locally by the root user. If you want the root user to remotely run these
commands, perform the following:
Defaults:root !requiretty
d Save the changes and exit.
Alternately, you can also set up a non-root user to remotely run these commands. Perform the following:
1 Create a user named zenmonitor on your Linux servers for monitoring purposes.
2 Install the sudo package on your server.
3 Allow the zenmonitor user to run the commands via SSH without a TTY.
Defaults:zenmonitor !requiretty
Cmnd_Alias ZENOSS_LVM_CMDS = /sbin/pvs, /sbin/vgs, /sbin/lvs, \
/usr/sbin/pvs, /usr/sbin/vgs, /usr/sbin/lvs
Cmnd_Alias ZENOSS_SVC_CMDS = /bin/systemctl list-units *, \
/bin/systemctl status *, /sbin/initctl list, /sbin/service --
status-all, \
/usr/sbin/dmidecode
30
Preparing for monitoring
Zenoss Core uses SNMP or WinRM to monitor Microsoft Windows systems as follows:
SNMP v3 support does not exist for Windows Server 2008 R2.
To prepare a Windows 2008 system for SNMP monitoring, start the SNMP service.
To prepare a Windows system for WinRM monitoring, refer to the support article that describes the options and
provides the procedures for configuring your systems.
To prepare a Windows system for WinRM monitoring, refer to the appendix, "Preparing Windows Systems."
Note For other device types, refer to the ZenPack catalog documentation.
vSphere endPoint
Zenoss Core uses SOAP to monitor VMware vSphere servers running the following versions of vSphere:
■ 4.1
■ 5.0
■ 5.1
■ 5.5
■ 6.0
Hyper-V
Zenoss Core uses WinRM to monitor the following Microsoft Hyper-V systems:
31
Zenoss Core Configuration Guide
To prepare a Hyper-V system for WinRM monitoring, refer to the support article that describes the options and
provides the procedures for configuring your systems.
For more information on the Inspector tool, including download and installation instructions see the following
knowledge base article: Inspector: A tool to validate configuration.
Use this procedure to route an IPv6 address block to Control Center using Docker's virtual bridge interface,
docker0. Zenoss Core can monitor IPv6 devices that have addresses in the routed block.
To perform this procedure, each Control Center host needs a unique IPv6 prefix routed to it by an upstream
router, and the Docker service on Control Center host needs to be configured to forward IPv6 packets.
For example, a multi-host deployment with one master host and three delegates could have the IPv6
configuration in the following table.
The following example shows how to configure the static routes in the preceding table on an upstream Cisco
router:
1 Log on to the Control Center host as root, or as a user with superuser privileges.
2 Configure IPv6 packet forwarding.
a Open /etc/sysctl.d/ipv6.conf with a text editor.
b Add or edit the following line:
net.ipv6.conf.all.forwarding=1
c Save the file, and then close the text editor.
32
Preparing for monitoring
sysctl -w net.ipv6.conf.all.forwarding=1
4 Configure Docker for IPv6 communications.
a Open /etc/sysconfig/docker with a text editor.
b Add the following flags to the end of the OPTIONS declaration.
Replace Subnet-Block with the IPv6 subnet to route to Control Center, in CIDR notation:
--ipv6 --fixed-cidr-v6="Subnet-Block"
c Change the delimiter of the OPTIONS declaration to the apostrophe character (').
The default delimiter of the OPTIONS declaration is the quotation mark character ("), which is the same
delimiter used with the --fixed-cidr-ipv6 flag.
d Save the file, and then close the text editor.
5 Restart the Docker service.
After all Control Center hosts are configured, test IPv6 by using the Docker container of the zenping service to
ping a known address:
If the ping is successful, Docker is able to resolve IPv6 addresses and you can monitor devices on the IPv6
network.
33
Zenoss Core Configuration Guide
Modeling devices 4
To model devices, the system can use
■ SSH
■ WinRM
■ SNMP (legacy option)
The modeling method that you select depends on your environment and the types of devices that you want to
model and monitor.
By default the system remodels each known device every 720 minutes (12 hours).
Note You can change the frequency with which devices are remodeled. Edit the value of the Modeler Cycle
Interval in the collector's configuration.
For larger deployments, modeling frequency might affect performance. In such environments, set the startat
configuration setting inside the zenmodeler.conf file to change the scheduling of the daemon. The
startat value only dictates the initial start time of zenmodeler. Each subsequent run interval is determined
by the zenmodeler cycle time (number of minutes between runs). The cycle time is configured on the
daemon settings page inside the parent's collector folder, which you can access in Control Center. For more
information, see KB article How To Edit The Zenmodeler File To Configure Model Scheduling In Zenoss 5.x.
By default, Windows may not have SNMP installed. To install SNMP on your particular version of Windows,
please refer to the Microsoft documentation.
After setting up and configuring the SNMP service, you must set the zSnmpCommunity string in Zenoss Core to
match, to obtain SNMP data.
If you want processor and memory monitoring, install SNMP-Informant on the device.
To collect Windows event logs or log files from a Windows box using syslog, install the SyslogAgent
Windows add-on.
34
Modeling devices
Each built-in modeling command plugin is differentiated by the platform on which it runs. To determine the
platform for the device you want to model, run the uname command in a shell on the device.
To model a device using command plugins, first add the device by using the protocol "none," and then choose
the plugins you want to apply:
Note ~/.ssh/id_rsa
9 In the left panel, select Modeler Plugins. The list of plugins appears. The left column displays available
plugins; the right column shows those currently selected.
10 Select zenoss.cmd.uname from the Available list, and then use the right arrow control to move it to the
Selected list on the right. Use the controls to place it at the top of the list.
35
Zenoss Core Configuration Guide
11 Use the left arrow control to move the other Selected plugins from the Selected list to the Available list.
12 Click Save.
13 Model the device by clicking the Model Device button.
36
Modeling devices
which nmap
then nmap is not installed. Install it, and then try again.
After locating the nmap command (including the directory beginning with /), enter the following as the
zenoss user on the Zenoss Core server:
cd $ZENHOME/libexec ln -s
Full_Path_to_nmap
Note To execute a command using $ZENHOME (/opt/zenoss for the zenoss user), you must be attached
to the container holding the Zenoss Core application. See the Control Center documentation for serviced
commands.
■ DeviceMap– Collects basic information about a device, such as its OS type and hardware model.
■ InterfaceMap– Collects the list of network interfaces on a device.
■ RouteMap– Collects the network routing table from the device.
■ IpServicesMap– Collects the IP services running on the device.
■ FileSystemMap– Collects the list of file systems on a device.
37
Zenoss Core Configuration Guide
Adding plugins
1 Use the right arrow control to move one or more plugins from the Available list (on the left) to the Selected
list (on the right).
2 Click Save.
Reordering plugins
Plugins run in the order in which they are listed. To re-order plugins, use the up and down arrow controls, and
then click Save.
To delete a plugin from a device, use the left arrow control to move the plugin from the Selected list to the
Available list.
By passing the --collect command to the modeler, you can control which modeler plugins are used. For
example, the following command runs only the interface plugin against the build.zenoss.loc device:
1 Log in to the Control Center host as a user with serviced CLI privileges.
2 Attach to the zenmodeler service.
su - zenoss
4 Run the zenmodeler command.
If the command returns any stack traces, check the community forums for assistance.
Next steps
Zenoss Core is now configured to monitor your IT infrastructure. Your next steps in the monitoring process may
include some of the following items:
For more information on these and other procedures, refer to the Zenoss Core Administration Guide.
38
External HBase configuration
Note If you do not already have an external HBase cluster, there is no need to create one. The procedures in
this section are for customers who wish to use an existing HBase cluster for Zenoss Core data.
The version of HBase installed in your external HBase cluster must be compatible with the version of
OpenTSDB used by the Zenoss Core application. The minimum supported version of HBase is 0.92.
39
Zenoss Core Configuration Guide
Note If you use hostnames, the Control Center master host must be able to resolve them to IPv4
addresses, either through a nameserver on the network or through entries in /etc/hosts.
The following example shows the correct syntax for a 3-member ZooKeeper quorum:
zk-1.example.com:2181,zk-2.example.com:2181,zk-3.example.com:2181
c Click Save.
7 At the top of the page, click Stop, and then click Start.
8 For the other OpenTSDB service (reader or writer), repeat the preceding steps.
Note If you use hostnames, the Control Center master host must be able to resolve them to IPv4
addresses, either through a nameserver on the network or through entries in /etc/hosts.
The following example shows the correct syntax for a 3-member ZooKeeper quorum:
zk-1.example.com:2181,zk-2.example.com:2181,zk-3.example.com:2181
7 Click Save Changes.
8 At the top of the page, click Stop, and then click Start.
9 For the other OpenTSDB service (reader or writer), repeat the preceding steps.
1 Log in to the Control Center master host as root, or as a user with superuser privileges.
2 Stop the Zenoss Core HBase cluster.
40
External HBase configuration
"Prereqs": [
{
"Name": "HBase Regionservers up",
"Script": "{{with $rss := (child (child (parent) \"HBase
\")).Instances }}"
}
],
After editing, the section should look like the following example:
"Prereqs": [],
c Save the file, and then exit the text editor.
d If your version of Zenoss Core includes two OpenTSDB services (reader and writer) repeat the
preceding substeps for the other service.
41