Skip to main content

Linux Monitor

The Linux monitor uses a variety of commands (such as sar and iostat) over SSH or telnet to collect measurements from a monitoring target running Linux.

Monitoring connection settings for Linux in Eggplant Performance

For information about the Poll Interval and Injector fields, refer to Connection settings.

Whichever connection method is used, the user account must have permission to run the Linux commands: vmstat, free, iostat, sar and df. Depending on the measurements collected during the test, multiple telnet or SSH sessions might be opened with the same user account.

warning

You might need to open TCP port 22 or 23 on any firewalls between the injector machine and the monitoring target.

There are three options for configuring a connection to a monitoring target running Linux:

Connection using Telnet

Specify a TCP port for connecting to telnet on the monitoring target. The default port is 23.

Specify a username and password.

Connection using SSH and password

Specify a TCP port for connecting to ssh on the monitoring target. The default port is 22.

Specify a username and password.

warning

Be aware that if you are trying to monitor a Linux AWS instance, AWS EC2 disables SSH password authentication by default. Configure it manually, or use the private key file method described below.

Connection using SSH and Private Key File

Specify a TCP port for connecting to ssh on the monitoring target. The default port is 22.

To connect using SSH, you can provide a private key file. This is a file generated by a program such as ssh-keygen or PuTTYgen. The private key resides on the computer from which the connection is made. It should have a public key counterpart which is stored in ~/.ssh/authorized_keys on the remote computer (the monitoring target).

If the private key file is protected with a passphrase, enter it into the Passphrase box. Otherwise leave it blank.

note

When you select a private key file, it will be copied into the keyfiles folder in your workspace. When you run a test, the private key file will be copied to the File transfer repository (usually C:/fcCache) on the injector machine. These copies are not deleted after the test, so it is your responsibility to remove unused private key files to protect the security of the system under test.