Linux Monitor
The Linux monitor uses a variety of commands (such as sar and iostat) over SSH or telnet to collect measurements from a monitoring target running Linux.
For information about the Poll Interval and Injector fields, refer to Connection settings.
Whichever connection method is used, the user account must have permission to run the Linux commands: vmstat, free, iostat, sar, df
Depending on the measurements collected during the test, multiple telnet or SSH sessions might be opened with the same user account.
You might need to open TCP port 22 or 23 on any firewalls between the injector machine and the monitoring target.
There are three options for configuring a connection to a monitoring target running Linux:
Connection using Telnet
Specify a TCP port for connecting to telnet on the monitoring target. The default port is 23.
Specify a username and password.
Connection using SSH and password
Specify a TCP port for connecting to telnet on the monitoring target. The default port is 22.
Specify a username and password.
Connection using SSH and Private Key File
Specify a TCP port for connecting to telnet on the monitoring target. The default port is 22.
To connect using SSH, you can provide a private key file. This is a file generated by a program such as ssh-keygen or PuTTYgen. The private key resides on the computer from which the connection is made. It should have a public key counterpart which is stored in ~/.ssh/authorized_keys on the remote computer (the monitoring target).
If the private key file is protected with a passphrase, enter it into the Passphrase box. Otherwise leave it blank.