Comments
-
Welcome to the top ten! Great job! And you are so right....It is very hard to stay here. You have to be really active. Everyone is now gunning for your spot. If you continue to do what you do, you will remain here, or at least close. I have been in the community for 5 years now and it took a few years to get up here. I…
-
Do you know how I can do a rule to search for a string with multiple lines, such as a login banner with many lines, parenthesis, blank lines, and returns? When I put a section of it in the String field, it still comes up as a violation that it is not contained in the the config when indeed it is in the config. It works if…
-
NCM also does not show which interface is in violation in the config file. I have to search the config file each time. There must be a way to automate the search and remediation script.
-
Check to make sure that your “Local Security Policy” (under Security Settings – Local Policies – Security Options), “Network access: Do not allow storage of credentials or .NET Passports for network authentication” is Disabled.
-
Were you able to get this? If not, let me know. I think I can help.
-
I think someone needs to do a feature request for this. I'm not really if it is still on the radar. I know that it has been asked for before. NCM and Accessing Devices through Terminal Servers Is this still on the radar cvachovecj?
-
I've been on it since they came out. I had a few small issues, but they are all resolved. No big issues. I recommend the upgrade. The additional features are so worthwhile.
-
Did anyone ever find where to setup the warning threshold size?
-
Does it fail on both the active and the non-active node?
-
I would really like the ability to set more granular permissions for all of it. I don't like the bundling of rights, such as "node management". For example, I would like to give users management rights of some nodes and view rights to others. Just make sense!
-
You would have to put in the password first to create the hash. Then you could script out the hashed password to the rest of the devices. You also have to use the password secret method. Cisco type 7 encryption uses a weak non-consistent hash method that will result in mismatches among devices using the same base…
-
I'll also add that in many cases, you could have issues after performing an upgrade. The agents will need to be updated. In some cases, after the update, the node will need to be rebooted to bring the agent online. If you can't reboot due to production, you will have a period where you cannot collect via agent. If you…
-
Yes. You will be able to see the source and destination address from the router that the traffic is going through. You just have to capture from the Vlan interfaces on the router and it should work.
-
I registered your email address.
-
Yes. I am interested. I don't know if this has gone anywhere or not. Has it?
-
It looks like this is an issue in the new NPM12 RC release. For older versions, you can go to the Websites Table from Database Manager and modify the line in there to the correct url. Make that line the primary. If there is an alternate website, delete that row or make it the secondary.
-
I was doing this weeks mission while you were typing this. lol. I'm there. I've been busy, otherwise I would have blown by you bsciencefiction.tv. I slacked and let you by. lol. It's all good though. I just love the community. I agree with you. The community is awesome and has grown so much! They are doing an awesome job.
-
You will need NTA to do this. You have to be able to monitor specific ports. NPM cannot do it alone.
-
As far as I know, you can no longer do it using NCM. You can however do it using the toolset. I know...sales pitch. I'm pretty sure that you used to be able to do it with NCM though. For a quick use, you can use the toolset trial to perforrm this. But that could lead you to spend more money, because you will probably like…
-
You can add stats for the blades themselves, but it all has to be added manually. You have to add the MIBs that you want polled and then manually add them to the page for monitoring. Here is an example: Cisco UCS Disk Drive Status
-
I don't really like this idea too much either. It pretty much looks like $200 an exam. And then $200 to keep it renewed. I would at least like to see a bundle DEAL! This cert really doesn't have any real value as of yet. Current SCPs should get a discount and at a minimum, MVPs should get them free or highly discounted. I…
-
This is a way to get around this. In Advanced Alert Manager, under the Trigger condition tab, you can add lines to ignore specific nodes. Add simple condition Node Details>Node Name is not equal to (specific node). Add this for each node you do not want this applied to. Then you can create a copy of that alert and make an…
-
I am just glad that there is a way to do this, workaround or not
-
There is so much that I could list right here, so I will keep adding to this post as I think of them. I will try to keep it short and simple. A whole lot of these have feature requests or have been questioned before by at least a few people here on Thwack. Here is my list: 1. Alert Resource for specific node, application,…
-
Awesome thread! As always, keep up the good work CourtesyIT!
-
We would love the ability for a bulk compliance report export/import functionality. Please vote this up in hopes that it is put on the list for future improvements.
-
I too have this same question. Did anyone get an answer?
-
We have been using NPM and NCM on a daily basis together for the last 4 years. We use NPM to monitor our routers, switches, firewalls, NetApps, servers, VM infrastructure, etc. We also use the built in virtualization, syslog, and SNMP trap functions. We also have many email alerts setup and custom syslog filters. Like many…
-
You sure can. See this link: Re: visio in Orion Altlas
-
You should probably add the RAM requirements. You should use SQL on a separate server, especially if it is anything over the small license of the products. It will also depend on the number of nodes and elements polled and the features that are being used in the products (such as syslogs and traps).