Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

There are several ways to create a hosts file. The simplest option is to use a text editor to create the file, and then type the required entries. If you have a large number of systems to add, you can copy and paste each entry, and simply modify the appropriate fields. The sample host file attached to this article contains example entries that you can use as a template for your host file. 

If you have a list of all your systems in a spreadsheet, you can save the list as a text file or a comma separated values (.csv) file, and then write a script to manipulate the text or .csv file into the proper format.

...

The following table describes the fields used in the hosts file. The fields required to add a system will vary depending on the type of system being added. For example, to add an agent system, you only need to include the Host Name, Type, and Port fields (see see Managing Your Infrastructureyour infrastructure for more information). An

The following table is an example of a properly-formatted hosts file is attached to this article (see below).

Field
NameDescription
Host NameThe name Name or IP address of the system to add to Uptime Infrastructure MonitorUIM.
Display NameThe name for Name of the system that will you want to appear in the Uptime Infrastructure Monitor UIM UI.
DescriptionOptional. A short description of the system (optional field).
Type

The System type of system, which can be is one of the following items:

  • Agent
  • Novell NRM
  • Net-SNMP v1/2
  • Net-SNMP v3
  • Virtual Node
Service GroupThe name Optional. Name of the Uptime Infrastructure Monitor UIM service group (which enables you to simultaneously apply common service checks to hosts that you are monitoring) to which you want to add the system (optional field).
Port

The port number that you will use Port number used to connect to the system (leave . Leave this field blank to use the default port for the type of system that you are adding).

Community

If you are adding a Net-SNMP system to Uptime Infrastructure Monitor, specify the read community (, which acts like a user ID or password) , that gives you access to the system.

Valid options are:

  • public
, which enables
  • Enables you to retrieve read-only information.
  • private
, which enables
  • Enables you to access all information.
UsernameIf you are adding a Net-SNMP or Novell Norvell NRM system to Uptime Infrastructure MonitorUIM, specify the user name required to access the system.
PasswordIf you are adding a Net-SNMP or Novell Norvell NRM system to Uptime Infrastructure MonitorUIM, specify the password required to access the
\nsystemsystem.
GroupThe name of the entity group (, which is a set of systems that have been are combined in a meaningful way) to which you want to add this system (optional field).
SSLOptional. For agent systems, use this field to specify if Uptime Infrastructure Monitor will securely communicate whether UIM securely communicates with an agent installed on the system using SSL. Valid options are include true and false (optional field).
Authenticatio n Authentication Method

For Net-SNMP systems, use this field to determine how encrypted information traveling between the Net-SNMP \ninstance and Uptime Infrastructure Monitor will be instance and UIM is authenticated. Valid options are:

  • MD5
(a
  • A widely-used method for creating digital signatures
)
  • .
  • SHA
(a
  • A secure method of creating digital signatures
)
  • .
Privacy Password

For Net-SNMP systems, this is the password that will be used to encrypt information traveling between the Net-SNMP \ninstance and Uptime Infrastructure Monitorinstance and UIM.

Privacy Type

For Net-SNMP systems, this explains how information traveling between Uptime Infrastructure Monitor UIM and the Net-SNMP instance \nis is encrypted. Valid options are:

  • DES
(an
  • An older method used to encrypt information
)
  • .
  • AES
(the
  • The successor to DES, which is used with a variety of software including SSL servers
)
  • .
Pingable

For virtual nodes, use this field to specify if Uptime Infrastructure Monitor whether UIM can contact the virtual node using the icmp ping utility. Valid options are true and false.

...

  1. Copy the hosts file to the scripts folder in the directory where you installed the Uptime Infrastructure Monitor UIM monitoring station. \n For example, if you installed the monitoring station in the default location, copy the hosts \nfile file to the following folder:
    Code Block
    languagesql
    Windows Installation: C:/Program Files/uptime software/uptime/scripts
    Linux Installation: /usr/local/uptime/scripts/
  2. At the command line, navigate to the scripts folder.
  3. Enter the following command:
    Code Block
    languagesql
    addsystem <path_and_filename>
    Where

...

  1. <path_and_filename> is the name of the text file that contains the list of systems that you want to add to

...

  1. UIM along with its full path.
    The systems listed in the file are added to

...

  1. UIM unless:

...

    • UIM cannot connect to the system.
    • The system does not exist in your environment.
    • The system

...

    • is already

...

    • added to

...

    • UIM.