Using the Internet Services Monitor
Using the Internet Services Monitor, located in the Internet Services folder on the administrator’s Desktop, you can perform a variety of administrative tasks either at your Internet Services machine or remotely. Most of these same administrative functions are available from the Internet Services console (unless running as a Windows service or Unix daemon):
• monitor the active protocols on your system
• view information on suspected abuse of your Internet Services system
• control the basic functions of Internet Services, such as logging, caching, reloading configuration files, forcing Internet connections, and shutting down Internet Services
• set logging levels for debug categories on your system per session instead of using the Internet Services console or configuring the InetSvcs.cf file (located in the Config folder inside the FCServer folder).
Monitoring system protocols
You can monitor the activity of your Internet protocols on the Protocols tab. Protocols are divided into two groups: outbound and inbound. The outbound group consists of outgoing SMTP mail and NNTP news. You set the total number of outbound mail and news sessions at "Max outgoing mail" on the Mail tab on the Basic Internet Setup form.
The inbound group consists of inbound mail and news plus Directory and web client connections. You set the total number of inbound Internet sessions in "Internet sessions" on the Service tab. If peak usage occurs, either increase the number of available sessions or disable low priority protocols within the group.
If you find the Task load consistently shows amber or red colors, you should try these options:
• shut down unnecessary outside applications on the Internet Services machine
For example, if your platform is Windows, turn off unnecessary NT services.
• reduce the number of Internet Sessions on the Basic Internet Setup form
This will reduce the number of Internet Sessions tasks.
• check that your Internet Services machine has enough memory and processor speed.
If necessary, upgrade your machine.
Viewing system abuse information
You can monitor security breaches, attacks on your system, and statistics for your RBL configuration, on the Security tab. For example, IP addresses attempting to launch Denial Of Service attacks, the number of connection attempts to your webserver, and messages suspected of being spam. IP addresses can also be added to the temporary IP blocklist or cleared.
Controlling Internet Services's basic functions
You can update template and web page changes, log tasking, clear your DNS, and perform other basic functions that you previously had to perform from the Internet Services console, on the Control tab. On Husky Planes, the most common tasks we use this tab for are to
• reload the configuration forms after we've applied changes to our web templates
• flush our HTTP cache after we've changed our web pages
• log and clear the list of servers we've blacklisted for continuously delivering spam to our site, and those sites we've blackholed.
Other tasks we perform intermittently are
• check the speed in which Internet Services completes its tasks
• view what users import on their Mail Import form
• clear our DNS cache.
If we find that the task load is running slow, we create a file by clicking the Log IS Task List button (for information on the task list, see Task list and numbers). This allows us to see which tasks are using the most resources and we can take steps to rectify the situation.
Setting logging levels
You can set the log levels for the various available debugging categories used in the Internet Services log file, on the Logging Levels tab. The log files, InetSvcs.LOG file (Windows) or FCISD.log file (Unix daemon), are located in the same location as the Internet Services executable file.
|