Solved

How to change value in mrtg graph from byte to bit???

Posted on 2008-10-09
5
2,733 Views
Last Modified: 2008-10-13
I want to change the value in mrtg graph from byte(KB/s) to bit(Mb/s or Kb/s). How do i do this?
I know this is possible as i saw one of the local ISP's mrtg graph
0
Comment
Question by:ryder0707
  • 2
  • 2
5 Comments
 
LVL 6

Expert Comment

by:powercram
ID: 22684170
The graph needs to be created that way from the beginning.  Go to the device, select create graphs.  At the bottom of the page there is a drop-down list for speeds.
0
 
LVL 24

Author Comment

by:ryder0707
ID: 22684226
i dont understand what you mean "go to the device" everything as everything is done in CLI
can you be more specific
0
 
LVL 1

Expert Comment

by:ch_b
ID: 22690813
0
 
LVL 1

Accepted Solution

by:
ch_b earned 500 total points
ID: 22690817
Options[label]: option-namesOptions allow you to handle special cases. Some good examples are:

growright: By default, mrtg draws graphs from right to left. If you want to go the other way, use this option.

bits: This changes the graphs from measuring bytes to bits. Bits are not only more impressive, they may be more accurate depending on what you're measuring.

0
 
LVL 24

Author Comment

by:ryder0707
ID: 22692177
i will try 1st
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now