User Guide

Deprecated modules



This module is deprecated, which means that it is no longer actively developed since NetEye 4.20 and no bug fixes will be delivered. The module will be removed starting from NetEye 4.34. Please consider switching to the new Tornado module.

Migration to Tornado SMS Collector

Starting from NetEye 4.33, the new Tornado SMS Collector will be available on each NetEye installation. Tornado will completely substitute the Eventhandler module starting from the next NetEye 4.34 release.

In NetEye 4.33 we will support both the Eventhandler and the Tornado module, in order to give you a reasonable amount of time for migrating all your existing rules from the deprecated module to Tornado. The procedure described below will help you in configuring the SMS Tools to forward the received SMS both to the Eventhandler and to Tornado, for a smooth migration.

In order to be properly prepared for the Eventhandler removal, the following steps should be taken after the upgrade to NetEye 4.33.

  • In NetEye 4.33, the Eventhandler script that collects the SMS, forwards automatically a copy of all the messages to the Tornado SMS Collector. So, create and test the Filters and the Rules in Tornado, accordingly to the ones present in the Eventhandler. Optional When a rule has been copied to Tornado, it can be safely disabled in the Eventhandler by setting its action to Ignore. This will avoid to trigger the actions twice for the same event.

  • When all the rules have been migrated, update your smsd.conf file as follow:

    The configuration file is located at /neteye/local/smsd/conf/smsd.conf and it should look like

     1# Example smsd.conf.
     3devices = GSM1
     4#logfile = 1
     5logfile = /neteye/local/smsd/log/smstools.log
     6# loglevel [1-7]:
     7# A higher number indicates increased verbosity.
     8loglevel = 7
    11failed = /neteye/local/smsd/data/spool/failed
    12incoming = /neteye/local/smsd/data/spool/incoming
    13checked = /neteye/local/smsd/data/spool/checked
    14outgoing = /neteye/local/smsd/data/spool/outgoing
    15executable_check = no
    19# Use the modem's tty, or the tty of a bridging device if you are using one
    20device = /dev/ttyS0
    21# For older WaveCom modem devices, use this baudrate:
    22#baudrate = 9600
    23# For newer WaveCom and Sierra devices, use this instead:
    24baudrate = 115200
    25# For the new Sierra FX30(S) modem, uncomment this line:
    26#rtscts = no
    27mode = new
    28incoming = yes
    29cs_convert = yes
    30# Uncomment this line if your SIM has a pin (we recommend leaving the SIM PIN blank):
    31#pin = 1111
    32eventhandler = /usr/lib64/tornado/bin/tornado_sms_collector -c /neteye/shared/tornado_sms_collector/conf/

    This will stop to forward the SMS to the Eventhandler. The Tornado SMS Collector will be the only collector to receive the SMS messages.


The NetEye strategy for interpreting externally generated events received by the NetEye server is to allow user-defined matching rules and handlers to accurately use event sources and properties to determine how urgent an event is and then take the appropriate action.

Events can be Messages generated by various computer systems and devices. They do not need to be Windows or Linux Servers, but can also be Firewalls, Security devices, network devices or other kinds of embedded systems that are able to send notifications and alerts using one of the following communication channels:

  • SNMP Trap

  • Log message (Syslog protocol)

  • Email message

  • SMS

  • Remote Procedure Call, API call or script (sent via the EventConsole command)

Notifications are sent when a device or system encounters a pre-defined error or warning condition:

EventHandler module

Fig. 115 The EventHandler module at a glance.

These incoming events can be accepted, filtered and classified by the EventHandler module. The EventHandler rules allow NetEye to classify the incoming event and decide whether to forward it to the EventConsole, raise an alert within Monitoring, or notify a person directly via Email or SMS.

Event messages are managed in the EventConsole of the EventHandler:

  • The EventConsole serves as a container for incoming Messages

  • It can receive Messages from:

    • The NetEye EventHandler (SNMP traps, Log messages, Email and SMS notifications)

    • Remote clients (e.g. Windows, Unix and Linux) via nesendmsg

  • It propagates warnings and critical messages (under the host name EventConsole)

    • Messages can be acknowledged to avoid further notifications

    • Messages can be closed

  • It enables the Monitoring notification and reporting logic

  • It can be used for:

    • Collecting batch script output

    • Finding event-triggered system notifications

    • Checking log files

  • The list is keyed on Host – Subject pairs

NetEye’s EventHandler allows you to configure automatic reactions to events coming from SNMP traps, email, SMS’s and logs. The EventHandler Dashboard (Fig. 116) and GUI provide a user-friendly way to configure these different actions.

The EventHandler Dashboard

Fig. 116 The EventHandler Dashboard

Within this module you can define specific rules for any type of event. Once an event takes place, the rule-matching engine searches for predefined rules and takes the corresponding action. These actions can range from sending an email or SMS, to displaying the event within the EventConsole, to even ignoring it completely.

To access the EventHandler, simply click on “Event Handler” on the navigation bar at the left, then select the type of event source you want to configure rules for. Below the list of event type configuration options is the Event Lifetracker, which shows the quantity and type of events seen by the system in the last 30 seconds. When you use NetEye 4 for the first time, the Lifetracker will be empty because there are no rules yet defined that match with incoming events.

You can configure the EventHandler and its individual modules using the appropriate panel as shown in Fig. 117 by following this sequence from the left-side navigation bar: Configuration> Modules > eventhandler > Configuration tab.

EventHandler Configuration

Fig. 117 EventHandler Configuration

Definition and Management of Rules

Clicking on one of the four event type configuration icons will open a new panel to the right with the appropriate tab already visible. For instance, Fig. 118 shows the Trap Handler rule list panel after clicking on the Trap icon in the EventHandler Dashboard. The panels for all four event types have the same interface for viewing the rules and changing their priorities, but different panels for the actual details of the rules.

Each rule in the list view is shown with its description, an action type, a regular expression that causes the rule to match an event, and Options for changing the rule’s priority relative to other rules. The rules are ordered from highest priority (top line of the first page of rules) to lowest priority (bottom line in the last page of rules).

Rules for the Trap Handler

Fig. 118 Rules for the Trap Handler

Adding, Modifying and Copying Rules

From the EventHandler Dashboard, select the tab of the desired event type (Trap, Email, SMS or Log) and click the “+ Add” button. The “Add rule” panel will appear on the right.

Adding a new rule to the Trap Handler in the Details pane

Fig. 119 Adding a new rule to the Trap Handler in the Details pane

Here you can set the attributes of the new rule, such as the event match expression in regular expression syntax.

At the bottom of the Rule subpanel you can select advanced properties. For instance, for trap rules you can define the Host IP, OID, etc., while for email rules you can select From, To, etc. For each property you select, a new field will appear below, allowing you to set values to match those fields.

If an incoming event matches the regular expression and other parameters you set in your new rule, and subject to higher priority rules having already matched it, then the action corresponding to that rule as defined in the Action subpanel below it will be carried out.

Depending on the type of action chosen in the Action panel, different attributes are available (for instance, for monitoring you can define the Host, Service, Status and Message). Some of these options use the drop down with custom field interface control to allow you to either select a pre-defined item/value, or enter a custom value that can include variables.

If you change one or more rule attributes and click on the green “Submit” button (Fig. 119), the new rule will be activated the next time that NetEye 4 restarts. To force all modified rules to be activated immediately, click on the “Commit Settings” menu item found in the “v” menu to the right of the panel title bar.

Rule Matching

For more complicated events where matching a regular expression in the input title is not sufficient, the EventHandler allows access to additional fields depending on the event type.

Constructing Trap Rule Matching Expressions with Built-In Variables




The description related to the OID (object identifier)


The object identifier (OID)


Trap description field of snmptranslate


System description from trap itself


The Unix timestamp when the trap was received


The host name that was extracted


Trap translate text of snmptranslate


All the trap content, in a single line


All the trap content, lines separated by carriage returns (CR)


All the trap content, single line, lines numbered


All the trap content, multi-line (CR) and numbered

You can use several placeholders within one of the allowed input fields, and it is also possible to combine them with the following patterns:

Pattern definition

A trap handler pattern consists of an opening tag (\@) followed by a text constant that will always come before the matching string, an ‘@’ separator, a regular expression (e.g. “.*”, without the quotes), another @ separator, the text constant that comes afterwards, and finally the closing tag (i.e. \@).

Thus the syntax should look like this:


where regex can be any Perl regular expression and before and after should normally be text constants.

Note: These patterns are not allowed in the regular expression input field.


By checking the continue option in the trap definition, the trap handler will not stop after the match but will instead continue and try to match additional trap handling rules (if any) within the table that have lower priority. In any event, the actions that the trap handler takes will be the same.

The NetEye Trap Handler also supports more specific and flexible rules in comparison to general regular expressions. By using the advanced rules of the Trap Handler frontend, the user can define a line-by-line matching of trap files. At the same time it is possible to set trap-specific user variables and placeholders. These variables can be used like the predefined variables in the Subject, Message, Host and Service fields.

For the advanced rule definition you can skip the “@” before and after the variable name, but within the above-mentioned fields it is required.

The advanced rules must all match (think of there being an AND between them), otherwise the rule will not match and the trap handler will proceed to the next definition. Of course, the (general) regular expression must also match, but you can for instance use “.*” to force an advanced rule check only.

It is also possible to specify several advanced rules for the same trap line.

Substring Access

To access a substring of an extracted string, indicate the desired position as follows:


where VARNAME is the name of the variable (second input field) and 1 is the position in the string.

A suitable regular expression for this usage would be for example:






Problem.found for Host.

In this example @myVar_0@ contains the full matched line, @myVar_1@ contains the substring that contains the problem description, and @myVar_2@ could contain some host information.

Tip: To avoid unexpected behavior you should not “override” the predefined variables (e.g. @TRAPHOST@) even though the system will allow it. It is also possible to specify “.*” for any line-matching rule, although in this case you should set a variable such that the data will be extracted. You can also omit the variable name, which implies that this rule serves only as a filter.


As described above, the Action subpanel allows you to select the type of action to perform if the rule above it is successfully matched. The fields that are visible depend on the type of action selected. For instance, if the “Ignore” action is selected then no fields will be shown, while if “Email” is selected as in Fig. 120, you will see the appropriate fields such as “To” and “From”.

The action panel for an EventHandler rule

Fig. 120 The action panel for an EventHandler rule

You can use “extracted variables” inside each parameter definition.

Extracted Variables

If you have used the test panel to find rules that match an event, you can use the “Extracted Variables” pane to see the values that variables had during the matching process for a particular rule. These variables include both original values from the event as well as values computed during the matching process.

The Extracted Variables panel

Fig. 121 The Extracted Variables panel showing names and values of variables regarding a particular event.

Within the “Extracted Variables” pane, all variables are reported. The set of default variables, as well as the additional variables, deriving from the definition of the rule attributes are displayed.

The Rule Testing Panel

The “Test” panel can be opened by clicking on the “Test” button ( ) under the panel title. The “Test Area” panel will then appear on the right side as in Fig. 123.

The EventHandler Test panel

Fig. 122 The EventHandler Test panel

To test a particular event against the rules, put some event text into the text area labeled “Content” and click on the green “Test” button below it. This will allow you to see the flow of rules in the main panel as the EventHandler attempts to match them to your event.

Colors showing which rules matched

Fig. 123 Colors showing which rules matched the incoming test message.

In the grid there are three colors:

  • Red: The rule did not match

  • Orange: The rule partially matched

  • Green: The rule fully matched

When you click on the row you are interested in, the details panel on your right hand side will appear (if not, simply press on the collapsed box to open it). Here you can visualize which specific fields/attributes did match (green), partially matched (orange), and did not match (red) as shown in the Details panel in Fig. 123.

Testing Rules From Archived Events

In addition to manually entering free-form text for an event in the Content panel, you can also use the Archive tab in the Test panel to select a real historical event from a log archive. Clicking on a day, and then on an event for that day, will transfer that event text into the Content panel, and you can then press the “Test” button as above.

In the Options section, you can select which types of rules to show in the main panel for following the matching process: (1) only the rules that matched, (2) the flow of matching rules, or (3) all rules. If you set the “Execute action(s)” flag, the defined action will be executed, even if it is a historical event.

Archive tab of Testing pane

Fig. 124 The Archive tab of the Testing pane.

Network interfaces monitoring


This module is deprecated.

Service Checks Information

Network Interface Table Service Check


Please, note that Interface Table module may be exploited by an authenticated user for accessing/executing files on the file system. When Interface Table Service Check is installed, a management network with restricted access is encouraged.

Please note that a new version which overcomes the security problems has been planned in the next releases.

Interfacetable_v3t is an addon that allows you to monitor the network interfaces of a node (e.g. router, switch, server) without knowing each interface in detail.

For additional information see the the official documentation.


# dnf install --enablerepo=neteye-extras icingaweb2-module-interfacetable icingaweb2-module-interfacetable-autosetup
# neteye_secure_install


The module is enabled as soon as the neteye_secure_install is executed, but a new command must be configured before it can be used for configuring a service check. Navigate to Director > Commands to create the command as depicted in Fig. 125, which shows the three fields that must be configured:

  • Command type: Must be set to Plugin Check Command

  • Command name: The name of the command which will be used to configure a Service

  • Command: The path to the script executed by the command:

Add Interface Table command

Fig. 125 Add Interface Table command

After deploying the command you just created, you must configure the Arguments. Click on the command name in the Commands section of Director, go to the Arguments tab and add the Arguments:

Argument name





Specify the snmp v1/v2c community string (e.g., wuerthphoenix)


Specify global plugin timeout

Fig. 126 shows the resulting Arguments panel

Result after adding arguments

Fig. 126 Result after adding arguments