Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Networking

Spotlight: Nagios XI network monitoring tool

By Jack Wallen May 6, 2010, 4:01 AM PDT

Image
1
of 6

home_page.png
home_page.png
Spotlight: Nagios XI network monitoring tool

The Nagios Welcome page

The Nagios Welcome page

This screen is the welcome screen you will see upon logging in. As you can see, there are plenty of features ready to serve you.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Nagios XI network monitoring tool

Service commands

Service commands

From this window you can enable and disable various features for a particular host u2013 no editing of configuration files needed.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Nagios XI network monitoring tool

Service status

Service status

From a single screen you can see the service status of all of your hosts.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Nagios XI network monitoring tool

Host groups

Host groups

You can combine hosts into groups which can make for easy at-a-glance monitoring. Here you can see “All Servers”, “Debian GNU/Linux Servers”, “HTTP Servers”, “Pingable Servers”, and “SSH Servers”.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Nagios XI network monitoring tool

Mouse over

Mouse over

By mousing over a host on the status map, you can get a quick glimpse of plenty of useful information.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

Spotlight: Nagios XI network monitoring tool

Service problems

Service problems

Click on the Service Problems link and you will quickly get a glimpse of all issues on your network.

For a full review of Nagios, check out the TechRepublic Product Spotlight Blog.

Image created by Jack Wallen for TechRepublic.

  • Networking
  • Account Information

    Share with Your Friends

    Spotlight: Nagios XI network monitoring tool

    Your email has been sent

Share: Spotlight: Nagios XI network monitoring tool
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice