Skip to main content
Back to top
Ctrl
+
K
SSH Monitor
Glossary
Tutorials
Step-by-step tutorial on a Rocky Linux VM
Quick step-by-step tutorial on a NixOS Linux VM
How-to guides
Basics how-to guides
1. How to install, update and remove SSH Monitor
2. How to configure a firewall for SSH and for EPICS
3. How to configure SSH
4. How to create and configure
.cmd
and
.substitutions
files
5. How to improve the security around SSH Monitor
6. How to run SSH Monitor
7. How to specify you own custom shell instructions
8. How to specify some EPICS records’ fields
9. How to setup an SSH Monitor daemon
10. How to setup an SSH Monitor service
11. How to install and configure an alarm server for SSH Monitor
Tips and tricks how-to guides
How to use an intermediate machine as a “jump” machine in order to reach a target
How to monitor your local/host machine
How to send some shell instruction(s) to a target, and use other shell instruction(s) on the host to process the first ones
Recommended monitoring how-to guides
How to monitor partitions
How to monitor memory (RAM)
How to monitor processors
How to monitor network connection(s)
How to monitor Archiver Appliance
How to monitor S.M.A.R.T. data
How to monitor hardware RAID with MegaCli (LSI RAID)
How to monitor hardware RAID with StorCli
How to monitor hardware RAID with PercCli
How to monitor software RAID with ZFS
How to monitor software RAID with Btrfs
How to monitor software RAID with
mdadm
How to monitor software RAID with LVM
How to monitor with Dell’s iDRAC system management technology
How to monitor with HP’s iLO system management technology
How to monitor with Lenovo’s XClarity system management technology
How to monitor a system using IPMI
Explanations
TCP ports limitation explanations
.cmd
,
.substitutions
and
.template
explanations
Custom shell instructions explanations
Security explanations
References
.template
file
ssh_monitor_core.template
.substitutions
files
partitions_monitoring.substitutions
memory_monitoring.substitutions
processors_monitoring.substitutions
connection_monitoring.substitutions
archiver_appliance_monitoring.substitutions
example_monitoring.substitutions
Source code files
sshmonitorMain.cpp
sshmonitorASubCore.c
sshmonitorASubUtils.c
sshmonitorASubCore.dbd
menuScan.dbd
Troubleshooting guide
Contribution guide
Project layout
Change log
Similar work / Alternatives
Repository
Show source
Suggest edit
Open issue
.md
.pdf
How to use an intermediate machine as a “jump” machine in order to reach a target
How to use an intermediate machine as a “jump” machine in order to reach a target
#
🚧
TODO
🚧