RedEyes Host Monitor Help

Homepage | Twitter | Facebook

Contents

1. Introduction

2. Quick start

2.1 System requirements

2.2 Downloading and installation

2.3 RedEyes main window

2.3.1 Control Elements and them destination

2.3.2 Host monitor

2.3.3 Connections

2.3.4 RedEyes icon in system tray

2.4 How to use

2.4.1 Adding once host

2.4.2 Adding IP addresses range

2.4.3 Checking exist item propertries

2.4.4 Deleting once or all items from monitoring list

2.4.5 Run/Stop monitoring

2.4.6 Custom helper applications

2.4.7 Tools menu

2.4.8 Manage log files

3. Program settings

3.1 General

3.2 Notifications

3.2.1 E-mail settings

3.2.2 ICQ settings

3.3 Logs

3.4 Web statistics

4. End-User License Agreement (EULA)

5. TCP unlimited

6. Online resources


1. Introduction

Often there is a need to monitor the response of important servers and computers in a network that can quickly respond to potential problems in the equipment and eliminate them in the shortest possible time. Utility RedEyes makes it very easy to solve this problem.

Program RedEyes designed to monitor performance and availability of hosts connected to the LAN or Internet (workstations, servers, routers, etc.) with an IP address, as well as services running on these devices that work with TCP and alert administrators in case of failure of these devices or services. Efficiency of the device is verified using the protocols TCP, UDP, HTTP and ICMP. Efficiency of services performed by the implementation of the connection attempt to TCP port on which to run services (eg web-server, mail server, proxy - a server, etc.).

RedEyes will be useful primarily for the technical support staff who have a tendency to ignore the incidence of critical hosts/services in the network, as well as for network/system administrators.

 

2. Quick start

2.1 System requirements

Minimal:

OS: Microsoft Windows 2000/XP/2003/2008/Vista/7
CPU: Intel Pentium 3 (~ 700 MHz)
RAM: 512 MB
HDD: 5 MB free hard disk space
Other: xDSL internet connection via 512 Kb/sec, or TCP/IP enabled LAN

Recommended:

OS: Microsoft Windows 2000/XP/2003/2008/Vista/7
CPU: Intel Pentium 4 or highter
RAM: 1024 MB
HDD: 5 MB free hard disk space (more hdd space needed for log files)
Other: xDSL internet connection via 2 Mb/sec, or TCP/IP enabled LAN

2.2 Downloading and installation

Download

Get latest version of RedEyes you may on our homepage:

http://res-software.com/stage/redeyes.exe (install package)
http://res-software.com/stage/redeyes.7z (portable version)

Install

Install package:
Run setup file 'redeyes.exe' and follow the instructions in the wizard perform the installation RedEyes on your computer.

Portable version:
Unpack the archive 'redeyes.7z' in an arbitrary folder, run the file 'RunMe.cmd', then 'res.exe'

2.3 RedEyes main window

2.3.1 Control Elements and them features

Add - opens dialog window, that allows add one host or host group in monitoring list.

Edit - opens dialog window, where you can change some options of scan of selected host. Activated with selection of host in the list.

Delete - shows a commands to delete host from list (delete/delete al).

Run/Stop - Run/Stop monitoring of hosts and connections.

Refresh - update monitoring of hosts and connections (for current window only).

Tools - list of additional tools.

Logs - open a folder, which stores log files, that saved with RedEyes.

Settings - call config window.

Help - help and additional information about RedEyes.

Register - manu that allow buy or instal license key(that was bougth earlier) for RedEyes.

Exit - stop monitoring and exit RedEyes.

Monitor tab - shows a list of hosts and scan results.

Connections tab - shows running processes and connections, that are opened with this process.

Popup menu Customize - allow you to expand features of RedEyes with adding and usage third party software in quick start menu.

RedEyes tray icon - when the application is minimized, you can hide/show window, get fast access to main features.

2.3.2 Host monitor

This is a main window. It shows all information about current condition of host scanning and locate moin elements of control.

Log of current actions, that show all failures and errors, locate in bottom.

2.3.3 Connections

In this window you can watch all processes that running in a system at this moment and all connections, that was established with this proccesses. Also you can destroy process, getting informations about process and export list of process in file.

Information about all established active network interfaces (name, MAC adress of device, incoming and outcoming traffic) allows in bottom of window.

2.3.4 RedEyes icon in system tray

Duplicate some functions of main window: maximize/minimize application, run/stop monitoring, check for updates, settings, etc...

2.4 How to use

2.4.1 Adding once host

Pressing 'Add' button will call 'Add new monitoring item' dialog window.

'Host' tab:

Description - short file description. When check box is 'Set a description as the resolved DNS name', program trying get a domain name of scanning host, and record it in 'description' field if it succesful.

Hostname or IP address - Hostname/IP address os scanning host specified.

Notify when unavaliable - when check box is active, user get a message in case of error or denial of scanning host.

Tester method - offers how to scan the host (ping, checking of existence of URL, TCP/UDP connection to random port).

2.4.2 Adding IP addresses range

Press 'Add' button for callingт 'Add new monitoring item' dialog window.

'IP range' tab:

IP address range - for creating list of IP addresses, you must specify an IP address range in format AAA.BBB.CCC.1-254 and click 'Build Range '. After that program will create address list, it should be noted in list all of required IP addresses and click OK.

2.4.3 Checking exist item propertries

For editing one of scanned host, chose it and press 'Edit' button. A dialog box similar to 'Add new monitoring item' will show.

2.4.4 Deleting once or all items from monitoring list

Drop down button 'Delete' allow to delete chosen/all hosts from scan list.

2.4.5 Run/Stop monitoring

Press 'Run/Stop' button for start or stop of monitoring.

2.4.6 Custom helper applications

For expansing features of RedEyes you can add additional utility programs, using the context menu of the list for monitoring and select 'Customize'.

2.4.7 Tools menu

This menu contains additional tools such as: fast port scanner, whois, trace route, ftp client, explore in shell, explore in web browser, view html source.

2.4.8 Manage log files

Pressing 'Logs' button opens directory, which stores all RedEyes log files. For convenience, program every day creates a directory named in format MMM-DD-YYYY. You can manually specify directory to save log files of RedEyes (see 3.3. Logs).

 

3. Program settings

3.1 General

Checking interval - sets interval of cyclic test of hosts. If interval is set for 30 seconds, RedEyes will poll hosts in the list every 30 seconds.

Priority class - allow you change the amount of CPU time devoted to work RedEyes the operating system. (sets the priority application in system).

Ping settings - sets the parameters of sended ping packet, such as: size (in bytes), timeout (in milliseconds), Retries (the number of ping requests sent by repeatedly in a series of scans).

Port scanner - setting of port scanner built-in utility. First/Last port - the starting and ending ports that represent the range of scan. Sockets - the number of connections in same time created with scanner. Timeout - the time that scanner is waiting for a connection from the port on time expired port is considered closed.

Run when windows starts - option to automatically run RedEyes at OS startup.

Monitoring on startup - you don't need to press Run button when you start RedEyes. If the scan list contains one or more hosts, scan will begin automatically.

Stay always on top - allows to RedEyes window stay on top of other windows in system.

Check for updates on startup - RedEyes connect to the update server and will notify you when a new version available at startup.

3.2 Notifications

Blink failures and errors - in addition to color backlight it includes an option to host flicker in the scan list, in case if the host is unavailable, or an error occurred.

Show baloon hint in tray - switch on a display of notice of cancellation in the host as a tooltip in system tray.

Flash icon in taskbar - swith on notice in the form of flickering icons RedEyes program on the taskbar in case of error or host failure.

Play sound - you can chose a sound file to be played, each time program will receive a failure message, or an error of host scanning.

Execute custom application - option allows you to run program in case of error or failure of scanned host.

Send e-mail notifications - switch on sending notice of denial, or failure in form of e-mail message.

Send ICQ notifications - switch on sending notice of denial, or failure in the form of ICQ messages.

Send SMS notifications - this option is under construction now.

Silent mode - sets the time interval during which RedEyes dont send to you any notices (including visual alerts).

3.2.1 E-mail settings

SMTP settings:

Sender - shows e-mail is being sent with the notification.

Username - smtp server username (your login).

Password - user's password.

Server - smtp server adress, through which sending e-mail notification.

Port - port of smtp server through which sending e-mail notification.

Send to - e-mail address to which sending notifications.

Message template:

Subject - topic of mesage.

Message - text of message.

Hint: when you creates template to send message, topic and body of the message you can use the following keywords: %description%, %hostname%, %method%, %result%, %time%, %reason%, %uptime%.

3.2.2 ICQ settings

ICQ account:

UIN - user account in ICQ server.

Password - ICQ account password.

Authorization settings:

Server - address of ICQ server.

Port - port of ICQ server.

Proxy settings:

Type - Type of proxy server, though which to connect.

Server - address of proxy server.

Port - port of proxy server to which needed to connect.

Proxy authentication - an option switch on in case if proxy server requires authentication.

Login - username of proxy server account.

Password - user's password of proxy server account.

Notifications sending list - UIN list, that will receive an ICQ notification of program RedEyes.

Message template: sending template of ICQ messages with program RedEyes .

Hint: when you creates template to send message, topic and body of the message you can use the following keywords: %description%, %hostname%, %method%, %result%, %time%, %reason%, %uptime%.

3.3 Logs

Log files directory path - should specify directory in which RedEyes will save all log files.

Format - format in which will be written to log files (CSV file, Plain text with divider).

Monitoring events - you need to chose those events that program will be save in a log file.

E-mail sending events - saving and notification of success or failure message Send e-mail messages to a log file.

3.4 Web statistics

Enable RedEyes reports web service - this option enables switch on viewing results of monitoring in the form of a web page. You can run RedEyes at one of computers in the network (for example with IP address 192.168.1.54), then on another computer run web browser and type in address bar http://192.168.1.54. Web Service reports RedEyes generate and send you a web page with current information about the state of scanned hosts.

Test - opens browser, showing features of web reports.

Restart - stops and then restarts web reports service.

Web service settings:

Max connections - maximal number of connections to web reports service.

Bind port - port of web reports service.

Keep alive - allows you keep alive a connection to client web browser over entire session. Disabling this option allows you to disconnect every time after treatment of client web browser.

Web report settings:

Enable page auto refresh - switch on automatic update in web browser on client side.

Refresh every - the interval at which pages are updated.

 

4. End-User License Agreement (EULA)

Host Testing and Monitoring Tool "RedEyes Host Monitor"

Carefully read the license agreement before using the software to which it applies. Installation, as well as the use of the program "RedEyes Host Monitor", indicates your agreement to the terms of this license agreement. If you do not agree with the terms offered by this license, you must remove the program files "RedEyes Host Monitor" from your storage devices and cease further use of this software.

RedEyes Host Monitor ("SOFTWARE") is free ("Freeware") and is distributed on an "as is" ("as is").

1. Usage

1.1 You may install and use RedEyes Host Monitor as home computers and on computers in organizations of any form of ownership, including state and municipal institutions.
1.2 You can freely distribute this SOFTWARE only in the form of original distribution.
1.3 You have the right to develop and distribute their own additions to the SOFTWARE under this license. It is assumed that you will automatically give the right holder permission for their free publication, distribution, placement, and the inclusion in the original distribution.

2. Limits

2.1 You may not decompile, disassemble or modify the program and / or its executable components.
2.2 You may not distribute this SOFTWARE for payment, unless you have permission from the copyright owner.
2.3 You may not distribute the original distribution is not, if you do not have the appropriate permission.
2.4 Do not remove the copyright or other information about authors and SOFTWARE owners.
2.5 Do not take SOFTWARE lease or rental.
2.6 Violation of intellectual property rights to the SOFTWARE offender is a civil, administrative or criminal responsibility in accordance with the law.

3. Limitation of liability

3.1 You agree that the SOFTWARE may contain errors, and consequently, so that they themselves have to worry about backing up your files.
3.2 The right holder does not guarantee efficiency SOFTWARE on a specific hardware.
3.3 The right holder does not guarantee efficiency SOFTWARE, if you do not upgrade it to current versions.
3.4 In view of the fact that the program is distributed on an "as is", you should be aware that using this software at your own risk. The right holder shall not be liable for any damages and / or damage (including losses due to forgone business profits, business interruption, loss of information or other pecuniary loss) arising from the use or inability to use this SOFTWARE.

4. Objects of Copyright

4.1 All copyrights to "RedEyes Host Monitor" exclusively owned by the author - Alexey A. Nechaev.
4.2 All rights, including components, names, trademarks, third-party developers, are included in the original distribution, belong to their owners.
4.3 Third-party products and components are included in the distribution with consent of their respective owners (including the consent and is subject to license agreement).
4.4 This License Agreement is governed in accordance with international copyright.

End of EULA.

 

5. TCP unlimited

Windws XP SP2, SP3 and Vista introduces a few new twists to TCP/IP in order to babysit users and "reduce the threat" of worms spreading fast without control. In one such attempt, the devs seem to have limited the number of possible TCP connection attempts per second to 10 (SP2) and 2-25(Vista). The previous limit was over 65000.
Patching Windows:

The limitation is built into the tcpip.sys driver, and the limit is not configurable by default. To change or remove the limit, you can use the following programms:

http://deepxw.lingd.net/ - The programm "TCP-Z".

 

7. Online resources

Homepage: http://res-software.com

Sales questions: sales@res-software.com

Another questions: info@res-software.com

Technical support (program features, bug reports, suggestions on improving the program, etc.).

If reporting a bug, please include information about versions of Windows and product you are using and a detailed description of the problem. A reproducible sequence of steps leading to the problem would be most helpful.
Support questions: support@res-software.com