Navigation

Contents

On this page

1. Introduction
2. Example: monitoring Linux/UNIX hosts via SSH
3. Configuration in check_mk
4. Using host tags
5. Restricting SSH and making it safe

See also

Installing the Linux agent
Host tags