|
The application view provides much insight into the state of the apps being monitored. You can see if the deamons are running or not, what is the IP/port being used to access them (and if it's protected by TLS or not), what's the version, hooks loaded, list of recent events, the data storage (is it a local file for memfile or perhaps a database). For Kea that's participating in HA, its detailed status (including its partner's status) is shown. Loggers are listed and can be inspected using Log Viewer. Finally, there's the Configuration Review Report that inspects the Kea configuration and reports any problems, inefficiencies, or suggests performance improvements.
|
|
The application view provides much insight into the state of the apps being monitored. You can see if the daemons are running or not, what is the IP/port being used to access them (and if it's protected by TLS or not), what's the version, hooks loaded, list of recent events, the data storage (is it a local file for memfile or perhaps a database). For Kea that's participating in HA, its detailed status (including its partner's status) is shown. Loggers are listed and can be inspected using Log Viewer. Finally, there's the Configuration Review Report that inspects the Kea configuration and reports any problems, inefficiencies, or suggests performance improvements.
|