2012-07-06 - 22:00:01
Timestamp | Group | Property | Status | Value | Detail | |
2012-07-06 22:00:01 | Server | li313-33 | uptime (l) | INFO | 1 | 22:00:01 up 65 days, 7:50, 0 users, load average: 0.02, 0.02, 0.05 |
Memory free (l) | INFO | 4 | total used free shared buffers cached | |||
2012-07-06 22:00:01 | Server | li313-33 | /dev/xvda (l) | WARN | 16692 | / Disk tight : 16692 MB |
2012-07-06 22:00:01 | Server | li313-33 | load (l) | OK | 0 | Normal Load: 0.05 |
2012-07-06 22:00:01 | Server | li313-33 | memory (l) | ALERT | 98 | Memory tight (98 MB free) |
2012-07-06 22:00:01 | Server | li313-33 | processes (l) | OK | 107 | Normal processes count: 107 |
zombies (l) | OK | 0 | Zombie processes: 0 = ok | |||
proc_ (l) | OK | 9 | Process /usr/bin/python /var/lib/mailman/bin/qrunner running | |||
TooManySU (l) | OK | 0 | Check /var/log/auth.log for 'Successful su for ' - 0 occurrencies | |||
SuFailed (l) | OK | 2 | Check /var/log/auth.log for 'FAILED su for' - 2 occurrencies | |||
SSHlogin (l) | OK | 14 | Check /var/log/auth.log for 'Accepted publickey for ' - 14 occurrencies | |||
SSHbruteforce (l) | OK | 0 | Check /var/log/auth.log for ' Illegal user ' - 0 occurrencies | |||
2012-07-06 22:00:01 | Server | li313-33 | OtherBruteforce (l) | ALERT | 817 | Excessive occurrence of 'authentication failure' in /var/log/auth.log: 817 |
2012-07-06 22:00:01 | Server | li313-33 | SASLusage (l) | OK | 0 | Check /var/log/mail.log for 'sasl_username' - 0 occurrencies |
Monitoring with MoSShE