Skyline Configuration on Check Point Servers that run Gaia OS - Other Monitoring Tools

Best Practice - Use the Prometheus Server with the Grafana Server.

See Skyline Configuration on Check Point Servers that run Gaia OS - Prometheus with Grafana.

Skyline supports other third-party monitoring tools (to configure these tools, refer to the third-party official documentation):

This section applies to these Check Point Servers:

Step 1 - Install the Third-Party Monitoring Tool

Refer to the third-party official documentation.

Step 2 - Install the OpenTelemetry Agent and OpenTelemetry Collector on the Check Point Server

Step 3 - Configure the OpenTelemetry Collector on the Check Point Server to work with the Third-Party Monitoring Tool

Step 4 - Configure the filter for the OpenTelemetry Collector exported metrics

Step 5 - Configure Access Control Policy

If you configured Skyline on a Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., ClusterXL, or Scalable Platform Security Group, then you must make sure your Access Control Policy allows the connection to the Third-Party Monitoring Tool to send the exported metrics.

You must configure the required ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. (in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. or with Management API) and install the policy.

See the: