Solved

Monitoring Linux Production Server

Posted on 2004-08-14
3
264 Views
Last Modified: 2010-04-22
Hello,
I would to ask, whether is there any free/commercial monitoring toolkit/technology for linux production servers, allowing me to monitor running processes (daemons), freee disk space and so on.
Thanx
0
Comment
Question by:karelrambousek
3 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 500 total points
ID: 11800835
do you mean just looking at it?
  http://www.webmin.com/
  http://webminstats.sourceforge.net/

or do you mean real-time monitoring all the time with alerts etc.?
  http://bb4.com/ 
  http://www.bigsister.graeff.com/
  http://www.nagios.org/
and much more ...
0
 
LVL 16

Expert Comment

by:xDamox
ID: 11802211
Some good software is:

www.tripwire.com

the tripwire monitors the way your filesystem is with the files and if
you were composed you would be alerted by the changes that a hackers/cracker makes
0
 
LVL 3

Author Comment

by:karelrambousek
ID: 11803301
Thanks much, nagios toolkit is really good piece of software
K
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question