Skip to main content

Zenoss: monitor free VMWare ESXi version

We confirmed that the free ESXi version does not allow SNMP gets, only traps.

The original script was taken from here:

Modified script:

We added Fan and power supply, hinted from this page:

Use this guide to add the Data source:

Added as template under:
/Devices /Server /VMWare /ESXi /Templates /esxi-monitor /check_esx_wbmem

Name: check_esx_wbmem
Source Type: Command
Enable true
Use SSH false
Component: blank
Event class: /VMWare/ESXi
Severity: Error
Cycle time: 60
Parser: auto
Command template:
/usr/local/zenoss/python/bin/python /opt/zenoss/libexec/ https://${dev/manageIp}:5989 root passwd

To bind this template to ESXi nodes, go to the device:
Example: /Devices /Server /VMWare /ESXi /

then to its templates:

Menu > Bind templates > Select both the default plus newly created esxi-monitor perf template.

Go back to ESXi suborg, ie:
/Devices /Server /VMWare /ESXi

Access zProperties:

Change zCommandCommandTimeout from 15 to 30.

zencommand restart.


RickertB said…
Sounds great!

I'm just new on the subject of ESX(i) and snmp..

Is there MIB also for zenoss, to show the entries for esxi in a nice way?

The most important thing is can see if a hd crashed or any other hardware component fails...
Jeeva said…
Will this work for ESX ?
Anonymous said…
Most probably yes for ESX.
Nicolas Solop said…
Hi, just followed your post and it seems to be running fine but I have the following question:
When I test the check I only get a message with an "OK" as a result. is this correct? is there any way to show details on the zenoss's dashboard?
Nicolas Solop
Robert said…

ESXi only supports snmp traps and not snmp get requests like ESX. So you might be able to trap info regarding major things.


Yea this should work under ESX but it is a lot easier under ESX since you can install net-snmp and do it using snmp and making setup much easier.

Anonymous said…

great! But how can i mount the file in my runnin zenoss? Sorry but i am a noob in zenoss. :)

Popular posts from this blog

Globe's HOOQ.TV an (unethical) scam!!

After being terribly disappointed with the subscription stage and after also after a very disappointing test drive (at least Netflix tries to be do-no-evil), I am now very disappointed with the un-subscription of with Globe.

Globe sends me a message:

Hi! We'd like to remind you that your free HOOQ will end in 7 days on 10/27/2015. Upon expiry, your subscription will auto-renew to the paid version for P149 per month. If you don't want the paid version, text HOOQ STOP to 8888. before the expiry date. Thank you!

I send the HOOQ STOP to 888 and received:

Sorry, you have entered an invalid keyword. Please make sure your keyword is correct with no extra characters and spaces. For more info on promos, dial *143#, FREE from your Globe/TM mobile phone.

I called Globe Support (211).

Here's the scam:

- GoSurf 999 comes with the HOOQ Free Plan

- After the Free HOOQ Plan (which you did not use because it sucks) expires, it will auto-renew without your consent (!!! UNETHICAL !!!…

Use Private Internet Access (PIA) in DigitalOcean

tags: PrivateInternetAccess, Digital Ocean, VPS, VPN

This runs the PIA VPN using OpenVPN all from the command line.

sudo apt-get install openvpn network-manager-openvpn Not sure if you need network-manager-openvpn.

sudo wget Extract. Move ca.crt and crl.pem to /etc/openvpn

Move "Hong Kong.ovpn" to "/etc/openvpn/Hong Kong.config" for example.

Modified the following lines.

auth-user-pass /etc/openvpn/login.conf route-up /etc/openvpn/
These are the contents of these files.

# cat /etc/openvpn/login.conf username password
Replace with your username and password.

# cat  #!/bin/bash
ip route flush table 100 ip route flush cache ip rule add from x.x.x.x table 100 ip route add table 100 to y.y.y.y/y dev ethX ip route add table 100 default via z.z.z.z
Replace x.x.x.x with your public IP address, y.y.y.y/y with your subnet. Compute using Hint: Input public IP and netmask, y…

aircrack-ng (rt2x00 Mac80211 Linux wireless stack) in Ubuntu Trusty 14.04 ( LTS

Ubuntu is actually installed in a Virtualbox virtual machine on Mac OS X Yosemite 10.10 (10.10.2). Before proceeding read the important intro below from
Install aircrack-ng suite.

$ sudo apt-get install aircrack-ng
It should install and provide the following.
# dpkg -s aircrack-ng Package: aircrack-ng Status: install ok installed Priority: optional Section: net Installed-Size: 2167 Maintainer: Ubuntu Developers Architecture: amd64 Version: 1:1.1-6 Depends: libc6 (>= 2.15), libgcrypt11 (>= 1.4.5), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4), wireless-tools, iw Recommends: wget Description: wireless WEP/WPA cracking utilities  aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a  40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets  have been gathered. Also it can attack WPA1/2 networks with some advanced  methods or simply by brute force.  .  It implements the standard FMS attack alon…