Source string Source string

English
How frequent should RRD be checked ?
Data Storage Settings
Choose if RRDs will be stored locally or being handled by an external RRDtool proxy server.
RRDtool Proxy Server
Structure RRDfile Paths
Enable Structured Paths
Use a separate subfolder for each hosts RRD files. The naming of the RRDfiles will be one of the following:<br><ul><li>&lt;path_cacti&gt;/rra/host_id/local_data_id.rrd,</li><li>&lt;path_cacti&gt;/rra/device_id/data_query_id/local_data_id.rrd,</li><li>&lt;path_cacti&gt;/rra/device_hash/device_id/local_data_id.rrd,</li><li>&lt;path_cacti&gt;/rra/device_hash/device_id/data_query_id/local_data_id.rrd.</li></ul><br>You can make this change after install by running the CLI script <b>structure_rra_paths.php</b> after you make the change. NOTE: If you change Max Directories value to decrease the number of directories, or if you change the Directory Pattern, empty directories will not be pruned after you rerun the <b>structure_rra_paths.php</b> script.
Directory Pattern
Which Directory Pattern do you wish to use for Structured RRD Paths. 'Device ID' is the default. The setting 'Device ID/Data Query ID' should be used when you have Devices with thousands of Graphs. After Changing the Directory Pattern, you must run the Structured Path CLI script again to modify the RRDfile paths to the new Pattern.
Device ID
Device ID/Data Query ID
Device Hash/Device ID
Device Hash/Device ID/Data Query ID
Max Device Hash Directories
The maximum number of Device Directories to be created based upon hashed Device ID's.
Proxy Server
The DNS hostname or IP address of the RRDtool proxy server.
Proxy Port Number
TCP port for encrypted communication.
RSA Fingerprint
The fingerprint of the current public RSA key the proxy is using. This is required to establish a trusted connection.
RRDtool Proxy Server - Backup
Load Balancing
If both main and backup proxy are receivable this option allows to spread all requests against RRDtool.
The DNS hostname or IP address of the RRDtool backup proxy server if proxy is running in MSR mode.
TCP port for encrypted communication with the backup proxy.
The fingerprint of the current public RSA key the backup proxy is using. This required to establish a trusted connection.
Spike Kill Settings
Removal Method
There are two removal methods. The first, Standard Deviation, will remove any sample that is X number of standard deviations away from the average of samples. The second method, Variance, will remove any sample that is X% more than the Variance average. The Variance method takes into account a certain number of 'outliers'. Those are exceptional samples, like the spike, that need to be excluded from the Variance Average calculation.
Standard Deviation
Component Translation Difference to current string
This translation Propagated Read only Cacti/core (v1.2.x)
The following strings have the same context and source.
Propagated Read only Cacti/webseer
Propagated Read only Cacti/core

Loading…

No matching activity found.

Browse all component changes

Glossary

English English
No related strings found in the glossary.

String information

Flags
read-only
String age
3 years ago
Source string age
3 years ago
Translation file
locales/po/cacti.pot, string 2635