#This is a sample .csv file for bulk import of monitors. #1. Header should start with #Header: followed by the Input Field names. It is already coded for you. Note: Do not modify the header. #2. From the second line onwards, give the input values according to the column names in the header. #3. You can remove the example entries in this file from the second line onwards and add your own monitor input information. You can add comments by including # symbol in the beginning of the line. #4. Save the file in any computer but upload it to the Applications Manager webclient using bulk import monitor form. #5. After uploading, click on Next, the entire monitor input information will be shown in a table format for your reference. #6. If everything is OK, click on Start Discovery. The monitors will be scheduled for discovery. It would take few minutes to complete the process. When the monitors are scheduled for discovery, simultaneously the uploaded file will be deleted from Applications Manager (as this file contains security information) #7. If you want to cancel the process in midway, delete the uploaded file from Applications Manager machine. #8. Fields MonitorGroup and PollInterval are Optional.If PollInterval is not specified, the default value for it will be 5 minutes #9. PollInterval should be given in Minutes.
#10. Field Credential ID :Enter the credentialID, if the credentials given in the Applications Manager's Credential Manager is used.
#11.EnableEventLogMonitoring: By default it will be disabled. If you want to monitor Windows Events provide yes. It is supported only in WMI mode. #Header: DisplayName,HostName,OperatingSystem,SubNetMask,ModeofMonitoring,UserName,Password,credentialID,SSHKeyAlgorithm,SSHPublicKey,passphrase,SNMPCommunityString,TelnetSSHCommandPrompt,MonitorGroup,PollInterval,EnableEventLogMonitoring #Example for WMI mode of monitoring testserver1,testserver,Windows 2003,255.255.255.0,WMI,administrator,pass1,,,,,,ServerGroup,5,yes testserver2,productionhost2,Windows 2003,255.255.255.0,WMI,administrator,pass1,,,,,,ServerGroup,5,no testserver3,productionhost3,Windows 2003,255.255.255.0,WMI,administrator,pass1,,,,,,ServerGroup,5 #Example for SNMP mode of monitoring testserver3,hostxp1,Windows XP,255.255.255.0,SNMP,,,,,,public,,ServerGroup,5 #Example for Telnet mode of monitoring testserver4,linux1,Linux,255.255.255.0,TELNET,test,Test123,,,,,$,ServerGroup,5 #Example for SSH password based authentication testserver4,QAhost,Linux,255.255.255.0,SSH,admin,password,,,,,$,ServerGroup,5 #Example for SSH key based authentication testserver5,testserver5,Linux,255.255.255.0,SSH,test,,DSA,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,,,$,,5,,