Active Directory, Microsoft 365, and Exchange management and reporting
Hybrid AD, cloud, and file auditing; security; and compliance
Identity security with adaptive MFA, SSPR, and SSO
Reporting, auditing, and monitoring for hybrid Exchange and Skype
Active Directory, Microsoft 365, and Exchange backup and recovery
Hybrid AD, cloud, and file auditing; security; and compliance
SharePoint reporting and auditing
Microsoft 365 security
Cloud security monitoring and analytics
File auditing, data leak prevention, and data risk assessment
File security and storage analysis
Automated patching across multiple OSs and over 850+ third-party apps
Simplified third-party patch deployment via ConfigMgr and Intune
Seamless mobile device management from onboarding to retirement
Remote troubleshooting with integrated chat, voice, and video
Automated OS image creation and seamless role-based deployment
Prioritization-focused enterprise vulnerability management
App control and endpoint privilege management software
Data theft prevention with strict peripheral device control
Browser security with isolation, lockdown, and activity tracking
Sensitive data protection and compliance for endpoint devices
Real-time ransomware mitigation and file recovery for business continuity
Next-gen antivirus software for threat detection and breach prevention
Full-stack observability with AIOps and digital experience monitoring
AI-powered, all-in-one SaaS platform for observability and digital experience monitoring
Digital experience, application performance, and infrastructure monitoring
All-in-one vendor risk assessment tool to ensure domain security
Network, server, and storage performance monitoring
Bandwidth monitoring and traffic analysis
Network change and configuration management
Firewall rule, configuration, and log management
IP address and switch port management
Centralized IT alert management
Status pages for real-time status and incident communication
A cloud-native identity platform for workforce IAM
Full-stack service management for enterprises
IT asset management with an integrated CMDB
Unified endpoint management and security
Comprehensive mobile device management
Enterprise remote access
Automated multi-OS patch management
Full-stack monitoring for IT admins, DevOps, and SREs
Status pages for real-time status and incident communication
Cloud cost management for modern software teams
SaaS management platform to maximize ROI
Centralized IT alert management
Secure your IT infrastructure and prove compliance from the cloud
AI-powered unified analytics platform to correlate all IT data
An all-in-one DNS management service to keep your business online
Low-code application development platform
Remote support software
Collaborative project management
Agile project management
All-in-one collaboration tool for unified communication
Secure email hosting solution for businesses
All-in-one video conferencing solution for remote business meetings
All-in-one AR remote assistance software solution for remote collaboration.
Unified network monitoring and endpoint management for MSPs
Unified Active Directory management and reporting solution for MSPs
Unified SIEM solution for MSSPs
Log management and advanced threat intelligence for MSSPs
Complete privileged access security for enterprises
Privileged password management
Full-stack service management for MSPs
Supported Versions: Memcached v1.2 to v1.6.
To create a Memcached database server monitor, follow the steps given below:
Memcached Servers are monitored based on the parameters or the attributes listed below. These attributes provide information about the functioning of the monitors of Memcached server. You can also configure thresholds to the numerical attributes monitored by the server based on these details.
Click on the individual monitors listed to view the following information:
Parameters | Description |
---|---|
Monitor Details | |
Availability | Shows the current status of the Memcached server - available or not available |
Performance Status | |
Used Memory | Specifies the used memory of the server in percentage |
Free Memory | Specifies the free memory of the server in percentage |
Hit Ratio | Refers to the hit ratio in percentage |
Memory Utilization | |
Used Memory | Specifies the used memory of the server in mega bytes |
Free Memory | Specifies the free memory of the server in mega bytes |
Total Memory | Specifies the total memory of the server in mega bytes |
CPU Utilization | |
User CPU* | Specifies the accumulated user time for a process in seconds |
System CPU* | Specifies the accumulated system time for a process in seconds |
Cached Hits and Misses | |
Hits/min | Number of keys that have been requested and found present per minute |
Misses/min | Number of items that have been requested and not found per minute |
GET and SET Requests | |
Gets/min | Number of retrieval requests per minute |
Sets/min | Number of storage requests per minute |
Cached Items | |
Items cached | Current number of items stored by server |
Evictions | Number of valid items removed from cache to free memory for new items |
Network Traffic | |
Bytes Received | Number of bytes read by this server from network per min |
Bytes Sent | Number of bytes sent by this server to network per min |
Current Connections | |
Connections | Number of open connections |
Response Time | |
Response Time | The time taken by Applications Manager to execute the STATS command on the memcached server |
Version | Version of Memcached server |
Transaction | |
SET-Time | The time taken by Applications Manager to set the content on the memcached server |
GET-Time | The time taken by Applications Manager to fetch the content from the memcached server |
DELETE-Time | The time taken by Applications Manager to delete the content from the memcached server |
Total Transaction Time | The total time taken to connect to memcached server, set content, fetch content and delete content from the server |
* - not supported in Memcached installed in Windows
Thank you for your feedback!