Is my server or connection being monitored?

Last updated on 28 Sep 2023, 10:32:26.
Category: Managed servers

Cloud Servers Dedicated Servers managed hosting Virtuele Servers

Each dedicated server or server housing is monitored by the Kinamo monitoring system.

By default, the following basic checks take place every minute for a dedicated server or co-location:

  • Is the server vailable through a PING command;
  • Is the HTTP service available;
  • Is the FTP service available;
  • Is the SMTP service available;
  • Are Remote Desktop and VNC services up and running;
  • If it's a Linux server, is the SSH service up and running;

For each check, a priority is given. An alert will be sent out immediately if the server does not respond on a PING command.

If the HTTP service gives a timeout, it will generate a warning. Only after a second check and failure, the Kinamo monitoring system will determine whether the service is down or not (is it a simple timeout, or is the service really unavailable).
For or IP services and huosing customers, the uplink of the core switches to the rack is being actively monitored.
Aside these checks, the Kinamo dedicated servers and co-location servers get additional checks based on SNMP (Simple Network Messaging Protocol) such as CPU load, available disk space, memory usage, CPU temperature, availability of certain software services and more...

Also the measurement of network traffic on both network interfaces is done by the monitoring system. This allows you as a customer, and Kinamo as your service provider, to have a clear image of the bandwidth your dedicated server or co-located server needs.

As a dedicated server customer - based on your service level - you may also be alerted by our monitoring system in case an alert is being triggered.

Kinamo can add additional services to the monitoring system on your demand so even special applications or services can be monitored.

Related articles

Order an SSL certificate? What is an SSL certificate?

You need to order an SSL certificate? But what is an SSL certificate? And why is everyone saying that it...

Read more

SHA1, SHA2 and SHA256 SSL algorithms

SHA is a mathematical algorithm used in SSL encryption to verify the validity of the certificate's signature. Different iterations of...

Read more

Why do I see a yellow warning triangle on an HTTPS secured website?

The yellow warning triangle you may see when visiting a webpage that's secured with SSL, is an indication that Google...

Read more

Need extra help?

Were not all your questions answered?
Don't worry, we will be happy to help you via a support request!

Select your language

All languages: