| Section 9.1. Hacks 7888: Introduction Hack 78. Avoid Catastrophic Disk Failure Hack 79. Monitor Network Traffic with MRTG Hack 80. Keep a Constant Watch on Hosts Hack 81. Remotely Monitor and Configure a Variety of Networked Equipment Hack 82. Force Standalone Apps to Use syslog Hack 83. Monitor Your Logfiles Hack 84. Send Log Messages to Your Jabber Client Hack 85. Monitor Service Availability with Zabbix Hack 86. Fine-Tune the syslog Daemon Hack 87. Centralize System Logs Securely Hack 88. Keep Tabs on Systems and Services |