As it should be for a good monitoring system, NetEye has its environmental sensors (smoke-, temperature-, humidity-, water- and more), so why looking elsewhere instead of using your existing solution? NetEye for this purpose provides a configurable box, which can be populated with either 4 or 12 sensors. The box is connected via Ethernet cable to the network and can be then configured.
The “Netsensor” Profile, provided in the NetEye Monitoring, can be used to query the values of the Ethernet Box.
The Ethernet Box is configurable regarding IP settings and sensor availability.
NetEye is already providing a predefined Host + Service profile, which can be assigned to the Ethernet Box.
The sensors indicate exceeded thresholds
They are also showing the continuous state of the values.
How and where can this solution be used?
Application examples:
Temperature sensor:
Detection of a temperature rise in the server room (may indicate a malfunction of the cooling system)
Detection of a temperature rise in the reefer (may indicate that someone forgot to close the door)
Contact sensor:
Detection of an unclosed door (root cause analysis for temperature rise)
Detection of an intrusion or an unauthorized access
Smoke sensor:
Detection of smoke emission
Water sensor:
Detection of a water leak
As you can see, there are many possible applications for environmental monitoring through sensors. The fact, that NetEye also can manage several of these boxes, gives the user the possibility to create a complete image of the facilities he has to monitor.
Hi, I’m Patrick.
Since I was a little boy i love to diassemble and reassemble things...
So I did with my first 386SX back in the 80s... and I still do with my i7 up till now.
I worked in the Service Desk then grew up to a DBA and work now as Integration Consultant at Würth Phoenix.
Author
Patrick Agreiter
Hi, I’m Patrick.
Since I was a little boy i love to diassemble and reassemble things...
So I did with my first 386SX back in the 80s... and I still do with my i7 up till now.
I worked in the Service Desk then grew up to a DBA and work now as Integration Consultant at Würth Phoenix.
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, SMS management systems, or creating new notification rules. Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More