SSH

Secure Shell, or SSH, is a secure replacement of Telnet protocol; from among the alternatives, SSH is most popular nowadays. One of most useful features of SSH, beyond encrypting all the traffic, is running scripts or programs on the remote host and tunneling, which allows to access network resources that can only be available from remote host user connects to via SSH.

Thus SSH allows to check for remote resources’ state in an uniform way, provided SSH server is available on the host we need to watch. This can be used in case of most other built-in monitor types are either not applicable or inefficient. Above giving an ability to run scripts/programs on the remote host, the whole exchange with the host is encrypted, thus eliminating leaking of credentials and other monitor data.

 

Glossary

IPHost features:

SSH Monitor
SSH Monitor is an advanced IPHost Monitor. Use it to run a program (script) on remote host and return results to interpret as performance value. It should be …

Hardware Monitoring with SSH
There are 4 predefined hardware performance monitors that obtain their data via SSH protocol. You can monitor several CPU load metrics, various memory usage parameters, free or used disk space, or varied process characteristics of any SSH-enabled host.

Servers monitoring using Nagios
These plugins can be used efficiently with Program or Script Monitors and SSH Monitors to incorporate already existing Nagios plugins into the IPHost Network Monitors engine …