If you need to monitor a Dell EMC Storage XtremIO unit, then I have the right solution for you. Not long ago, I wrote an XtremIO storage tracking plug-in that can execute the following activities:
XTREMIO_CTRL_Status: monitors the controllers and the hardware status
XTREMIO_DPG_Status: controls the DPG groups from the storage array
XTREMIO_Storage_Efficiency: verifies and displays the actual XtremeIO “deduplication and compression” efficiency
XTREMIO_Storage_Space: checks the available storage space
But how does it work?
Here’s the link to get the XtremIO monitoring plug-in . The monitoring procedure works using the XtremeIO EMC’s REST API. All you need is to create a new user, which you can do by creating a username and password via the Web-Frontend. The archive contains the plug-in, a PHP file for pnp4nagios, and a service profile for Monarch (NetEye Monitoring Configuration Frontend).
If you use NetEye, then it will be quite simple to implement this solution. You just need to:
Copy the plug-in file (check_xtremio) into the directory /usr/lib/nagios/plugins of NetEye Servers
. The Profile files are downloadable from the link on the Blog and have to be unzipped on your PC and then uploaded from there with the “Upload” button on the Monarch > “Profiles” > “profile Importer” form. The files are in XML format.
By following the steps above you can add the following service checks:
XTREMIO_Cluster1_Dedup_Ratio: controls the Cluster1 LUN deduplication
XTREMIO_CTRL_Status: checks the controllers’ status
XTREMIO_DPG_Status: monitors the Data Protection groups’ status
XTREMIO_Storage_Efficiency: checks the data storage compression and deduplication efficiency
XTREMIO_Storage_Space: verifies the storage level
There are also other useful commands:
Registering and monitoring a specific API value:
/usr/lib/nagios/plugins/check_xtremio -H <host> -U <user> -P <password> -T command -K types/clusters/1 -f dedup-ratio -t dedup-ratio-text
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix. Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
Author
Juergen Vigna
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix. Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More
In a previous post we went through the configuration of Elastic Universal Profiling in NetEye, seeing how we can profile applications written in programming languages that do not compile to native code (for example Python, PHP, Perl, etc.) But what Read More
Elastic 8.16, which comes with NetEye 4.39, made Elastic Universal Profiling generally available for self-hosted installations. This means that NetEye SIEM installations will now be able to take advantage of the continuous profiling solution by Elastic. In this blog post Read More
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More