Setting

Step-by-Step Guide: Setting Up RedEyes Host Monitor for Reliable Server Monitoring

Keeping servers healthy and online is critical. This step-by-step guide shows how to set up RedEyes Host Monitor to track server availability, performance, and alerts so you can detect and fix issues before they affect users.

What you’ll need

  • RedEyes Host Monitor account (sign-up credentials)
  • Access to the servers or services you want to monitor (SSH, control panel, or API)
  • A monitoring machine or agent installation target (if applicable)
  • Contact details for alert recipients (email, SMS, webhook, or pager)

Step 1 Create and configure your RedEyes account

  1. Sign in to RedEyes Host Monitor and navigate to the dashboard.
  2. Complete account profile and organization settings (time zone, contact verification).
  3. Set global alert preferences (default severity, quiet hours, escalation policy).

Step 2 Add hosts to monitor

  1. From the dashboard, choose “Add Host” or “New Monitor.”
  2. Enter host details: name, IP address or hostname, environment tag (production/staging), and description.
  3. Select check types needed (ICMP ping, TCP port, HTTP/HTTPS, SSH, DNS, etc.).
  4. Set check intervals (e.g., 30s for critical services, 5m for non-critical).
  5. Save the host.

Step 3 Configure checks and thresholds

  1. For each check, define success criteria (e.g., HTTP 200, response time < 500 ms).
  2. Set failure conditions (number of consecutive failures before alert).
  3. Configure advanced options where available: TLS checks, certificate expiry warnings, custom HTTP headers, or API token authentication.

Step 4 Install and register agents (if applicable)

  1. Download the RedEyes agent for your OS from the dashboard.
  2. Install the agent on the target machine:
    • Linux (systemd): run installer, enable and start the service.
    • Windows: run MSI installer and confirm service startup.
  3. During installation, provide the agent token from your RedEyes dashboard to register the host automatically.
  4. Verify agent status in the dashboard.

Step 5 Set up alerting channels

  1. Add notification methods: email, SMS, Slack, Microsoft Teams, webhook, or pager.
  2. For each channel, enter and verify destination details (confirm emails, test webhooks).
  3. Create notification policies mapping severity levels to channels and escalation steps.

Step 6 Configure maintenance windows and suppression rules

  1. Define maintenance windows for planned downtime (start/end time, recurring rules).
  2. Set suppression rules to avoid alerts during deployments, backups, or known outages.

Step 7 Create service groups and dashboards

  1. Group related hosts into services (e.g., “Web Tier,” “Database Cluster”) for aggregated status.
  2. Build a dashboard with key widgets: uptime, average response time, recent incidents, and SLA compliance.
  3. Pin critical widgets for quick access.

Step 8 Test alerts and failover

  1. Trigger synthetic failures (stop a service or block a port) to confirm detection and notification flow.
  2. Validate escalation: ensure unresolved alerts follow the escalation chain.
  3. Review alert payloads and adjust content for clarity (include runbook links or remediation steps).

Step 9 Implement automated remediation (optional)

  1. Configure webhooks or playbooks to trigger

Your email address will not be published. Required fields are marked *