Manual Chapter :
Monitors Tasks
Applies To:
Show VersionsBIG-IP LTM
- 11.5.10, 11.5.9, 11.5.8, 11.5.7, 11.5.6, 11.5.5, 11.5.4, 11.5.3, 11.5.2, 11.5.1
Creating an SNMP monitor
Create an SNMP monitor that GTM™LTM®
can use to monitor a third-party server running SNMP.
Creating a custom monitor
Before creating a custom monitor, you must decide on a monitor type.
You can create a custom monitor when the values defined in a pre-configured monitor
do not meet your needs, or no pre-configured monitor exists for the type of monitor you
are creating.
Important: When defining values for custom monitors, make sure
you avoid using any values that are on the list of reserved keywords. For more
information, see solution number 3653 (for version 9.0 systems and later) on the AskF5™
technical support web site.
Deleting a monitor
Prior to deleting a monitor, you must remove all existing monitor associations.
You can delete obsolete or unused monitors.
Note: You can manage only
those monitors that you have permission to manage, based on your user role and
partition access
assignment.
The monitor is deleted.
Disabling a monitor
You can disable a monitor to discontinue monitoring a server.
Note: Because instances of monitors are not partitioned objects, a user can enable or
disable an instance of a monitor without having permission to manage the associated
pool or pool member. For example, a user with the Manager role, who can access
partition AppA only, can enable or disable monitor instances for a pool that resides
in partition Common. However, that user cannot perform operations on the pool or
pool members that are associated with the monitor. Although this is correct
functionality, the user might not expect this behavior. You can prevent this
unexpected behavior by ensuring that all pools and pool members associated with
monitor instances reside in the same partition.
The monitor is disabled and no longer monitoring the server.
Displaying a monitor
You can display a monitor and view the settings and values.
Note: You
can manage only those monitors that you have permission to manage, based on your
user role and partition access assignment.
You can view the settings and values for the monitor.
Enabling a monitor
You can enable a monitor to begin or resume monitoring a server.
Note: Because instances of monitors are not partitioned objects, a user can enable or
disable an instance of a monitor without having permission to manage the associated
pool or pool member. For example, a user with the Manager role, who can access
partition AppA only, can enable or disable monitor instances for a pool that resides
in partition Common. However, that user cannot perform operations on the pool or
pool members that are associated with the monitor. Although this is correct
functionality, the user might not expect this behavior. You can prevent this
unexpected behavior by ensuring that all pools and pool members associated with
monitor instances reside in the same partition.
The monitor is enabled to begin or resume monitoring a server.
Creating a custom HTTP monitor
Before creating a monitor, you must decide on a monitor type.
A custom HTTP monitor enables you to send a command to a
server and examine that server's response, thus ensuring that it is serving appropriate
content.
Note: An HTTP monitor can monitor Outlook® Web Access (OWA) in Microsoft® Exchange
Server 2007 and Microsoft®
SharePoint® 2007 web sites that require NT LAN Manager (NTLM)
authentication. NTLM authentication requires a send string that complies with
HTTP/1.1, a user name, and a password.
The HTTP monitor is configured to monitor HTTP traffic.
Creating an HTTPS monitor
Before creating a monitor, you must decide on a monitor
type.
A custom HTTPS monitor enables you to verify the Hypertext
Transfer Protocol Secure (HTTPS) service by attempting to receive specific content from
a web page protected by Secure Socket Layer (SSL) security.
Note: An HTTP monitor can monitor Outlook® Web Access
(OWA) in Microsoft® Exchange Server 2007 and Microsoft®
SharePoint® 2007 web sites that require NT LAN Manager (NTLM)
authentication. NTLM authentication requires a send string that complies with
HTTP/1.1, a user name, and a password.
The HTTPS monitor is configured to monitor HTTPS traffic.
Associate the HTTPS monitor with a server, pool, pool member, or node.