4.23. Monitoring

  1. Make sure to link to your account Telegramaccount. If not, then bind it.
  2. Open the section "  VPS "And switch to the" Monitoring ».
  3. Click " Add rule ».
  4. Select a verification method, specify its parameters and click “ Add rule »:
    When using this method, the system refers to the specified URL or IP, receives a page from the server and checks for the presence of the specified word on it.

    • « Verification method "- select" HTTP ».
    • « URL or IP"- specify:
      • Or a link to a page that will check the server's availability.
      • Or the IP address of the server, if the checked page is available when accessed directly by IP.
    • « Search word "- specify the word that the system should check for on the page.
    • « Check frequency »- select the interval with which the system should perform the check (5, 10, 30 or 60 minutes).
    • « Ignoring after error »- select the period during which the system will not send repeated notifications after the first detection of a problem (30, 60 or 120 minutes). The option is designed to prevent the bot from spamming messages while the problem is being solved.

All added rules are displayed in the list:

  • « Monitoring method "- the selected verification method: HTTP or Telnet.
  • « Options »- parameters of the selected method.
  • « Last check "- date and time of the last check.
  • « Next check "- date and time of the next check.
  • Buttons:
    • « Test run of check »- forced start of the scan (updates the time of the last scan).
    • « Suspend / resume rule "- temporary disabling and enabling the rule.
    • « Edit rule »- change the parameters of the selected method for this rule.
    • « Delete rule "- deleting the rule.
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

4. VPS

In chapter "VPS»VPS is managed, OS is installed, additional services are configured, general...

4.1. SSH

SSH is a protocol for secure remote operating system control and data transfer. Detailed...

4.2. VNC

VNC is a system for remote access to another device using the RFB protocol. The principle of...

4.3. Control panels

4.3.1. Vesta 4.3.1.1. Installing Vesta 4.3.1.2. Changing the Vesta interface...

4.4. Administration

4.4.1. Website transfer to VPS with Vesta control panel 4.4.2. Checking disk space...