Ping (ICMP)
Ping (ICMP) Ping is request message for protocol ICMP.

Ping is request message for ICMP (stands for Internet Control Message Protocol). This protocol is used by different network devices to check if a service or a device is available. Usually it is used for network diagnostics.

Ping monitoring allows you to keep an eye on your network infrastructure. Ping failure means broken connection to a network entity. It is handy to use Ping together with HTTP monitoring. In this case, you get additional information - for example, you know if the error is site-related, or the whole server has gone down. However, sometimes ICMP could be blocked for incoming requests, in order to prevent ddos attacks.

  • CM.Glossary.WebsiteMonitoring
  • CM.Glossary.Downtime
  • CM.Glossary.DistributedMonitoring
  • CM.Glossary.HTTP
more glossary
"

I use it for free an just for having mail of when my website is down, and it's work very well, so I want to thank you.

"
- RA
Database Monitoring with HostTracker

We’re happy to introduce our newest monitoring feature - Database Check – that is easy to use, crystal-clear to understand and designed to get you through your website ‘critical hours’ as smoothly as possible.

We’re happy to introduce our newest monitoring feature - Database Check – that is easy to use, crystal-clear to understand and designed to get you through your website ‘critical hours’ as smoothly as possible.

There is a wealth of different collector services for gathering and analyzing performance information from, for example, the number of visitors, disk usage to the duration of a database session and geographical distribution of the audience that visits the website. In the real world, it is very common to find two or more of these metrics presented together. Anyway, the problem is that you should not only assess these numbers but also somehow examine and compare them.

All that made HostTracker team eventually develop a Database Check – a perfect tool for deep database monitoring and successful troubleshooting database performance problems.

Task Configuration Concepts

Generally speaking, adding a new Database Check won't take long to set up. Once it is enabled, you’ll get the chance to adjust the check to suit your overall strategy. Now let’s look at some of the available options to better understand how they can be effectively applied.

First and foremost, this feature has an option to include a specific database query every time you run the check, whilst still having the opportunity to manage the processing data. If you don’t want to specify any query – the service will verify the ability to connect to the database. In addition, the Database Check tool supports a deferred execution option, which allows you to specify the point of query declaration and track its results.

Besides that, you can use any command - from a simple Select statement to a more complex procedure, - as a database query. However, the specified request should be executed in 30 seconds or less, otherwise, the error message will be generated. Basically, you’ll get the 408 Request Timeout or related error.

Please note: When enabling a new DB monitoring check, there are a couple of things to consider. Use an SQL statement that returns a single value. Furthermore, this value should be returned in the first column of the first row. This step is vital for further performance analysis of the monitored system.  

At the same time, in case of using a DML command as a statement, you’ll also get the total number of rows being affected.

The following example shows the graphical interpretation of the results from executing DELETE statement, according to the specified condition:

For the record, the collected results are not only displayed in a real-time graph, but also stored for later analysis. Besides, such a solution can really help to get valuable insights into how to optimize your database performance.

Moreover, at this stage, you can specify the type of selection criteria. You can choose from no, equal/not equal, greater/less than, in/out of range.

Once the system finds some deviation in records from the expected results - you will receive a notification. To boot, you can control which events you want to receive alerts for and which ways (Skype, Viber, Telegram, Slack etc.).

First Steps In Starting Successful Performance Troubleshooting

This example shows how to create a check for both tracking the growth of all the database log and data files and getting alerts when critical database size is reached. It implies, the following example contains information about the file data/log file size, the total space used, free space details etc. So what you need to do:

  1. Create a new query that displays how much free space you have in your tablespace.

          SELECT
          convert(DECIMAL(12,2),round(sysfile.size/128.000,2)) AS 'FileSize/mb'
          , convert(DECIMAL(12,2),round(fileproperty(sysfile.name,'SpaceUsed')/128.000,2))
          AS 'Used/mb'
          , convert(DECIMAL(12,2),round((sysfile.size-fileproperty(sysfile.name,'SpaceUsed'))/128.000,2))
          AS 'Free/mb'
          , filegroup.groupname AS 'File-group'
          , sysfile.[name],sysfile.[filename]
          FROM dbo.sysfiles sysfile (NOLOCK)
          inner join dbo.sysfilegroups filegroup (NOLOCK) ON filegroup.groupid =
          sysfile.groupid
          UNION ALL 
          SELECT
          convert(DECIMAL(12,2),round(sysfile.size/128.000,2)) AS 'FileSize/mb'
          , convert(DECIMAL(12,2),round(fileproperty(sysfile.name,'SpaceUsed')/128.000,2))
          AS 'Used/mb'
          , convert(DECIMAL(12,2),round((sysfile.size-fileproperty(sysfile.name,'SpaceUsed'))/128.000,2))
         AS 'Free/mb'
         , (CASE WHEN sysfile.groupid = 0 THEN 'Log' END) AS 'File-group'
         , sysfile.[name],sysfile.[filename]
         FROM dbo.sysfiles sysfile (NOLOCK) WHERE groupid = 0
         ORDER BY [File-group],sysfile.[name]         

      2.  After execution, you should get the following results:

     3.  Add a condition of selection:

  • Query result - select "value in the first column of the first row (mainly for SELECT)".
  • Result verification - choose "less than" and add "1000"  as the max value.

Finally, you’ll get the following result once all the previous stages have been successfully completed: if the log file size exceeds 1 GB, you’ll receive a notification.

Please keep in mind all data collection history information is saved and always available to view. It means you can easily identify the cause of this or that problems, for instance, the reason for rapid tablespace growth.

Adding a New Database Monitoring Task

To activate a new Database Check you need:

      1.  Fill in the following fields:

  • Server – enter your server name;

  • Port -  add your port number;

  • Database – add your database name;

  • User ID- enter the login name under which the check should be executed;

  • Password – add the password that corresponds to your login.

For this task only, it is recommended to create a new user account with limited rights.

       2.  Provide access to your database. For this, add the IP addresses of the HostTracker agents to a Firewall Whitelist and your server list.

Note that, the IP addresses of our agents are permanent.

       3.  When ready, click on Save.

If you have any questions about this feature, well, just send us a message. We’re always ready to help!

more blog
Thank you for feedback!
 
Privacy policy
Sign In
Sign Up
Prices & packages
Our monitoring network
Home > Privacy policy

What information do we collect? How can you update it?

  • We collect information from you when you register on our site or place an order.
  • Information is stored in a secure datacenter with up-to-date security policies and all possible precaution.
  • When ordering or registering on our site, as appropriate, you may be asked to enter your: given name, family name, gender, country of residence, timezone, company name, e-mail address, mailing address, phone number, account name at Slack, Skype, Hangouts, Facebook Messenger, Telegram and credit card information. You may, however, visit our site anonymously.
  • Provided information could be easily updated by signing in into your account. To update your name, main contacts, country and company name, please make changes to Profile. The rest of the contacts could be changed or deleted in Contact section. Billing information is updated in Billing menu.

How long the personal information is stored?

  • The data containing personal information is held during a period of time, depending on the services used. For customers of temporary packages, for example Trial, information is stored for 3 months after expiration. For those customers who use a paid subscription, information is stored for 2 years after the expiration of paid period; it is done so in order to allow renewal of the service, if required, without elimination of collected monitoring statistics. For users of permanent Free package, the information could be stored forever, as it is hard to evaluate whether the free customers still use the service or not.

How to request change in processing or elimination of your personal information?

  • Personal information is deleted within 5 business days after writing us a request to our support (see Contact Us section)
  • To update the way your contact data is processed, you can change notification and report settings, or add, edit or delete your contacts in Contact section.
  • To change the way your billing data is processed, you can update billing method in Billing menu or switch to Free package anytime to stop processing.
  • If you wish to obtain all the personal data for your account, or share it with a third party - write a request to support team (see Contact Us section)

What do we use your information for? Do we disclose any information to outside parties?

  • Collected information is used to establish a communication in the appropriate form and in convenient for the customers time. The information about your names, country of residence, e-mail address and phone number could be shared with message delivery companies, like SMS gateways or mobile phone providers, in order to deliver predefined messages to our customers. These messages include, but not restricted to, alerts about problems with websites, uptime statistics, billing notifications, service updates and other information in accordance to the selected settings. These messages are generated only to those contacts, which have been conscious confirmed by their holders.
  • Names, country of residence, phone number, company name, mailing address, e-mail address and credit card information is shared with payment processing companies when you place an order. In case of permanent subscription, further payments may occur automatically with the same payment data.
  • Also, information is used within our company for the purposes, listed below:
  • To personalize your experience (your information helps us to better respond to your individual needs).
  • To improve our website (we continually strive to improve our website offerings based on the information and feedback we receive from you).
  • To improve customer service (your information helps us to more effectively respond to your customer service requests and support needs).
  • To process transactions. Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
  • To send periodic emails. The email address you provide for order processing, may be used to send you information and updates pertaining to your order, in addition to receiving occasional company news, updates, related product or service information, etc.
  • We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential.
  • We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
  • In inlikely case of unencrypted data breach, we inform every affected customer about this breach within 72 hours.

How do we protect your information?

  • We implement a variety of security measures to maintain the safety of your personal information when you place an order.
  • We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Database to be only accessed by those authorized with special access rights to our systems, and are required to keep the information confidential.
  • We comply with GDPR.

Do we use cookies?

  • Yes (Cookies are small files that a site or its service provider transfers to your computers hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information.
  • We use cookies to understand and save your preferences for future visits.

California Online Privacy Protection Act Compliance

  • Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent.
  • As part of the California Online Privacy Protection Act, all users of our site may make any changes to their information at anytime by logging into their account and going to the 'Profile' page.

Host-Tracker Microsoft Bot Framework

  • Our Host-Tracker bot is enabled by Microsoft Bot Framework. The Microsoft Bot Framework is a set of web-services that enable intelligent services and connections using conversation channels you authorize. As a service provider, Microsoft will transmit content you provide to our bot/service in order to enable the service.
  • For more information about Microsoft privacy policies please see their privacy statement here.
  • In addition, your interactions with this bot/service are also subject to the conversational channel's applicable terms of use, privacy and data collection policies.
  • To report abuse when using a bot that uses the Microsoft Bot Framework to Microsoft, please visit the Microsoft Bot Framework website at https://www.botframework.com and use the “Report Abuse” link in the menu to contact Microsoft.

Changes to our Privacy Policy

  • If we decide to change our privacy policy, we will post those changes on this page, and/or update the Privacy Policy modification date below.
  • This policy was last modified on 23 May 2018

Contacting Us

Share:
Send to Twitter Send to Facebook Send to LinkedIn Share on Google+
Blogs:
HostTracker blog HostTracker page on Facebook