+1
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu
// Call this function with the following parameters:
// $1 = port number (eg 5900 for VNC)
// $2 = IP address (xxx.xxx.xxx.xxx)
transport = CreateSNMPTransport($node);
if (transport == null)
return -1;
oid = ".1.3.6.1.2.1.6.13.1.4." . $2 . "." . $1 ; // IP connections
vars = SNMPWalk(transport, oid);
if (vars == null)
return -2; // SNMPWalk failed
count = 0;
foreach (v: vars) {
//trace(1, "SNMP WALK ".v->name."=".v->value);
count = count +1;
}
return count;
.1.3.6.1.2.1.6.13.1.4.xxx.xxx.xxx.xxx.ssss.yyy.yyy.yyy.yyy.dddd
getVMWareCPULoad(totalCPUUsage)
is used to monitor total CPU usage for all cores, as with most VMWare servers, graphing individual CPUs will probably end up with a crazy graph with mainly black lines unless you can be bothered to find 32 different colours for your 32 cores :/getVMWareCPULoad
will add up CPU usage from each core, and using getVMWareCPULoad(totalCPUCountX100)
can be used to get a line to show if all cores were using 100%.2021.10.29 11:33:38.769 *D* [procexec ] ProcessExecutor::execute(): process "CMD.EXE /C "C:\NetXMS\var\nxagent-3.9.334-x64.exe" /VERYSILENT /SUPPRESSMSGBOXES /LOG /FORCECLOSEAPPLICATIONS /NORESTART" started
Node up 28.Sep.2021 14:56:12\n\nNormal] xxxxxx: Node up" }'
* Trying 52.97.146.162:443...
* TCP_NODELAY set
* Connected to xxxxxxxx.webhook.office.com (52.97.146.162) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: C=US; ST=Washington; L=Redmond; O=Microsoft Corporation; CN=*.webhook.office.com
* start date: May 12 00:00:00 2020 GMT
* expire date: May 12 12:00:00 2022 GMT
* subjectAltName: host "xxxxxx.webhook.office.com" matched cert's "*.webhook.office.com"
* issuer: C=US; O=DigiCert Inc; CN=DigiCert Cloud Services CA-1
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x56077e955e10)
> POST /webhookb2/xxxxxxx HTTP/2
> Host: xxxxx.webhook.office.com
> user-agent: curl/7.68.0
> accept: */*
> content-type: application/json
> content-length: 93
>
* We are completely uploaded and fine
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
< HTTP/2 200
< cache-control: no-cache
< pragma: no-cache
< content-length: 1
< content-type: text/plain; charset=utf-8
< expires: -1
< server: Microsoft-IIS/10.0
< request-id: e043cd8f-7a80-4713-4620-fe2db9000165
< strict-transport-security: max-age=31536000; includeSubDomains; preload
< x-calculatedfetarget: CWLP265CU017.internal.outlook.com
< x-backendhttpstatus: 200
< x-feproxyinfo: CWLP265CA0401.GBRP265.PROD.OUTLOOK.COM
< x-calculatedbetarget: CWXP265MB1910.GBRP265.PROD.OUTLOOK.COM
< x-backendhttpstatus: 200
< x-aspnet-version: 4.0.30319
< x-cafeserver: CWLP265CA0401.GBRP265.PROD.OUTLOOK.COM
< x-beserver: CWXP265MB1910
< x-rum-validated: 1
< x-proxy-routingcorrectness: 1
< x-proxy-backendserverstatus: 200
< ms-cv: j81D4IB6E0dGIP4tuQABZQ.1.1
< x-feserver: CWLP265CA0401
< x-powered-by: ASP.NET
< x-feserver: LO2P265CA0472
< date: Sat, 16 Oct 2021 13:18:24 GMT
<
* Connection #0 to host xxxxx.webhook.office.com left intact