Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

What monitoring software for ESX, sflow, SNMP, syslog, and WMI?

Posted on 2010-11-17
6
Medium Priority
?
1,576 Views
Last Modified: 2012-05-10
Can anyone recommend a netmork monitoring software that can effectively manage syslog, SNMP, WMI (optional if syslog + snare can be used), sflow and VMware host logs?  I *think* Splunk can handle it, but I'm brand new to this arena.

Lancope also looks like an option, but their marketing is so thick (or my vocabulary so small) that I can't penetrate it.

I prefer it runs on Windows, but I'm not afraid of Linux if the results are worth it.
0
Comment
Question by:sbumpas
  • 3
  • 2
6 Comments
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 1000 total points
ID: 34158512
0
 

Author Comment

by:sbumpas
ID: 34158585
What does Nagios offer that splunk doesn't already have?  Nagios does analysis, while splunk does reporting?
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 34158702
I don't mean one or the other. I mean to say they are a complement to each other. Nagios for the monitoring and alerting, splunk for analyzing and reporting.

We're using Nagios allready, it's great for (as I said) monitoring and alerting. But now we're looking at splunk. If something happens, we want to know exactly what happens so we can prevent future incidents. And later on we want to be able to report back all the improvements.
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:sbumpas
ID: 34158716
So splunk only does analyzing and reporting, it's not capable of monitoring and/or alerting?
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 34158783
No it is capable. But we think spunk's strong points are analyzing and reporting and nagios' strong points are monitoring and alerting.
So trying to get the best of both worlds here.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 1000 total points
ID: 34158854
I prefer to work with Open-source... so my recommendation would be  nagios (I use it in my env.), awarded Platform ..winner of numerous awards and highly recognized, Nagios is the leader in Open Source IT infrastructure monitoring....but you can find other multiple monitoring tools:
http://www.groundworkopensource.com GroundWork Monitor Enterprise
http://www.hyperic.com Hyperic HQ
http://www.icinga.org Icinga
http://oss.oetiker.ch/mrtg/  mrtg
http://www.nagios.com Nagios
http://www.n-able.com N-central
http://www.op5.com op5 Monitor
http://www.open-itcockpit.com openITCockpit
http://www.opennms.org OpenNMS
http://www.hp.com/de/bto HP OpenView
http://www.bmc.com BMC PATROL ProactiveNet Performance Management
http://www.shinken-monitoring.org Shinken
http://www.ibm.com/software/de/tivoli IBM Tivoli
http://www.ca.com/de CA Unicenter
http://www.whatsupgold.com WhatsUp Gold
http://www.zabbix.com Zabbix
http://www.zenoss.com Zenoss Enterprise

My recommendation for a useful solution for syslog  and data correlation solutions:
Splunk http://www.splunk.com/ 
Cisco CS-MARS http://www.cisco.com/en/US/products/ps6241/index.html
Sawmill:  http://www.sawmill.net
Paglo:  http://paglo.com
Q1 Labs (offers free VM version):  http://www.q1labs.com/qradar-slim-fe
Manage Engine with OpManager:  http://www.manageengine.com

Also OpenNMS does a good job with making both SNMP Traps and syslog messages. Zenoss has syslog and snmp traps, but If you are looking for something more standalone, Splunk (i use it) is good as mentioned above by erniebeek look @ http://www.linuxjournal.com/article/5476 and
http://blogs.splunk.com/2008/11/13/syslog-syslog-ng-and-splunk-forwarders/

0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question