MN506 - System Management: Server Availability Monitoring Report
VerifiedAdded on  2023/01/19
|9
|2328
|91
Report
AI Summary
This report comprehensively examines server availability monitoring, focusing on various open-source tools such as Nagios Core, Ganglia, CollectD, and others, detailing their features and functionalities. It delves into server availability monitoring architectures, including the use of CCMSPING for remote system checks and the importance of strong system security. The report also explores the impact of failure prediction on server availability, emphasizing the role of performance estimation tools and the consequences of system downtime, particularly in terms of productivity loss and financial repercussions. The report concludes with a discussion on the significance of constant system monitoring to identify potential security threats and maintain optimal system health.

Running head: Monitoring availability of servers 1
Monitoring of servers
Student’s Name:
Institution Affiliation:
Course Name:
Professor’s Name:
Monitoring of servers
Student’s Name:
Institution Affiliation:
Course Name:
Professor’s Name:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
It administrators should be the inability to use several available tools to monitor the server
around the globe. Historic metrics of the server help administrators to know the trends and the
performance of the server. A good server enables customers to experience your services as they
wanted. The server reports will enable identifying and solving a particular problem within a short
period of time[1] . It can also enable you to prevent future problems in the server. Online enables
one to access reports about uptime and downtime of the server within a particular period of time.
Online tools take snapshots of errors and export data through different formats for easy reading and
analysis by the administrators.
Server monitoring tools
1. Nagios Core
It is the oldest and most popular monitoring tool today. It has plugins which can be easily extended
by any server. It is a Linux based tool meaning it is free and open source tool. It has a good web
interface GUI, presentation of data in form of graphs, alerting through email or text message,
reporting, and configuration. There is an online demonstration tool for the Nagios Core.
2. Ganglia
It is an open source monitoring software for high performing systems. It is a scalable software
whereby it is based on the performance of the clusters. It employs the use of XML for data
representation and XDR for the sending of data[2] . The main purpose of Ganglia is to be able to
analyze algorithms and data structures. It supports both Windows and Linux operating system. Most
of the universities use this tool to monitor their servers.
It administrators should be the inability to use several available tools to monitor the server
around the globe. Historic metrics of the server help administrators to know the trends and the
performance of the server. A good server enables customers to experience your services as they
wanted. The server reports will enable identifying and solving a particular problem within a short
period of time[1] . It can also enable you to prevent future problems in the server. Online enables
one to access reports about uptime and downtime of the server within a particular period of time.
Online tools take snapshots of errors and export data through different formats for easy reading and
analysis by the administrators.
Server monitoring tools
1. Nagios Core
It is the oldest and most popular monitoring tool today. It has plugins which can be easily extended
by any server. It is a Linux based tool meaning it is free and open source tool. It has a good web
interface GUI, presentation of data in form of graphs, alerting through email or text message,
reporting, and configuration. There is an online demonstration tool for the Nagios Core.
2. Ganglia
It is an open source monitoring software for high performing systems. It is a scalable software
whereby it is based on the performance of the clusters. It employs the use of XML for data
representation and XDR for the sending of data[2] . The main purpose of Ganglia is to be able to
analyze algorithms and data structures. It supports both Windows and Linux operating system. Most
of the universities use this tool to monitor their servers.

3. CollectD
It is the most common open source server monitoring tool. It stores statistics of a server in
various formats. It is available for both Windows and Linux operating system. Originally written in
C++. It has a number of plugins which allows for the collection of various data including the CPU
and the memory of the server. It is widely used in the development of the projects field[3] .
4 Spiceworks
Apart from server monitoring functionality, Spiceworks has some additional functionality of IT.
It can provide several functionalities including servers SNMP and services. Spiceworks earns
through the display of ads in the tool. This affects most of the users of this particular tool.
5 Cacti
It is mainly used for front end data. The tools have an external tool that sends data to the metrics
and the data is stored in MYSQL database. It is an open source tool for data logging and
representation of data through graphs. You can customize all types of graphs as long as the data is
available. It requires authentification to access various types of graphs[4]. Many plugins have been
contributed by various developers in the world.
6 Zabbix
It is a Linux based tool meaning it is free and open source. The client-server model is employed
whereby Zabbix clients get all monitoring data from the Zabbix agent. It supports web
configuration, monitoring of performance, application monitoring, alerting through email and text
messaging. Data is normally stored in MYSQL, PostgreSQL and Oracle database.
7 Icinga
It is a Linux based tool, meaning it is free and open source. It comes in two versions, Icinga one and
two. It supports monitoring of performance, alerting through email and messaging, reporting, data
representation through graphs and extensibility through plugins. It functions like Nagios but has
It is the most common open source server monitoring tool. It stores statistics of a server in
various formats. It is available for both Windows and Linux operating system. Originally written in
C++. It has a number of plugins which allows for the collection of various data including the CPU
and the memory of the server. It is widely used in the development of the projects field[3] .
4 Spiceworks
Apart from server monitoring functionality, Spiceworks has some additional functionality of IT.
It can provide several functionalities including servers SNMP and services. Spiceworks earns
through the display of ads in the tool. This affects most of the users of this particular tool.
5 Cacti
It is mainly used for front end data. The tools have an external tool that sends data to the metrics
and the data is stored in MYSQL database. It is an open source tool for data logging and
representation of data through graphs. You can customize all types of graphs as long as the data is
available. It requires authentification to access various types of graphs[4]. Many plugins have been
contributed by various developers in the world.
6 Zabbix
It is a Linux based tool meaning it is free and open source. The client-server model is employed
whereby Zabbix clients get all monitoring data from the Zabbix agent. It supports web
configuration, monitoring of performance, application monitoring, alerting through email and text
messaging. Data is normally stored in MYSQL, PostgreSQL and Oracle database.
7 Icinga
It is a Linux based tool, meaning it is free and open source. It comes in two versions, Icinga one and
two. It supports monitoring of performance, alerting through email and messaging, reporting, data
representation through graphs and extensibility through plugins. It functions like Nagios but has
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

added functionality such as support for more databases, good web GUI and easier integration of the
plugin. It is also very scalable[5].
8 OpenNMS
It is a Linux based tool, meaning it is open source and free. Some of the functionality is data
representation through graphs, support both web and command line configuration, the discovery of
network and alerting through email, text message and slack. It also has an online demonstration of
how it works.
9. WhatsUp Gold
Most banking institutions use WhatsUp Gold to monitor different branches in the globe. The tool
has been receiving many advances in the past 10 years. It is one of the easiest to use tools. It
supports alerting through email or text messaging, reporting through different forms, monitoring of
virtual environments and discovery. It provides different editions and can only be used in the
windows environment.
Server availability monitoring architecture
you can screen whether remote frameworks and their examples are accessible for work from the
Alert Monitor of your focal observing framework (CEN). Critical execution properties for the
exchange framework are additionally gathered on the ABAP cases as of SAP Web Application
Server 6.10.
Accessibility observing utilizations the caution and show elements of the checking engineering. In
any case, for information gathering (that is, to decide if a remote framework is dynamic and
accessible), accessibility observing utilizations the CCMS operator CCMSPING (see likewise
Installing Availability Agent CCMSPING). This specialist is an independent program that keeps
running outside the SAP framework[6]. By utilizing an operator, you can proficiently screen the
accessibility of a substantial number of frameworks from a local area, without a latent framework
causing a mistake in the showcase of the Alert Monitor.
plugin. It is also very scalable[5].
8 OpenNMS
It is a Linux based tool, meaning it is open source and free. Some of the functionality is data
representation through graphs, support both web and command line configuration, the discovery of
network and alerting through email, text message and slack. It also has an online demonstration of
how it works.
9. WhatsUp Gold
Most banking institutions use WhatsUp Gold to monitor different branches in the globe. The tool
has been receiving many advances in the past 10 years. It is one of the easiest to use tools. It
supports alerting through email or text messaging, reporting through different forms, monitoring of
virtual environments and discovery. It provides different editions and can only be used in the
windows environment.
Server availability monitoring architecture
you can screen whether remote frameworks and their examples are accessible for work from the
Alert Monitor of your focal observing framework (CEN). Critical execution properties for the
exchange framework are additionally gathered on the ABAP cases as of SAP Web Application
Server 6.10.
Accessibility observing utilizations the caution and show elements of the checking engineering. In
any case, for information gathering (that is, to decide if a remote framework is dynamic and
accessible), accessibility observing utilizations the CCMS operator CCMSPING (see likewise
Installing Availability Agent CCMSPING). This specialist is an independent program that keeps
running outside the SAP framework[6]. By utilizing an operator, you can proficiently screen the
accessibility of a substantial number of frameworks from a local area, without a latent framework
causing a mistake in the showcase of the Alert Monitor.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

As of SAP NetWeaver 04 SP Stack 11, CCMSPING has the choice - push, which broadens the
capacity of CCMSPING. The accompanying new capacities are accessible to you on the off chance
that you register CCMSPING with the - push choice:
CCMSPING effectively sends accessibility information to CEN once every moment; you can make
this interim longer as wanted. Without this choice, CEN just demands the accessibility information
from CCMSPING at regular intervals.
You can enroll different CCMSPING operators with one CEN for the observing of your framework
scene. This implies, notwithstanding a heap adjusting for accessibility observing, you can likewise
have certain frameworks observed by various CCMSPING specialists and in this manner check
availability[7].
You can call the Java to message server just as the ABAP message server for accessibility
observing. This implies you can screen the accessibility of both ABAP and Java frameworks.
The solution to avoid data vulnerability in server availability monitoring tools
Strong system security checking apparatuses can screen data transfer capacity traffic on explicit
gadgets, just as screen traffic to see who, when, and where that arrange traffic is originating from to
recognize potential dangers. InterMapper is an incredible and moderate system checking
programming that does only that. It's lean and proficient observing motor continually surveys every
one of your gadgets to catch ongoing data. Furthermore, InterMapper is seller freethinker, enabling
it to discover and screen any gadget in your system[8].
InterMapper's Device Status Window likewise demonstrates to you the historical backdrop of every
gadget's action, giving you understanding into suspicious movement. InterMapper's alarming
capacity tells you of potential issues when they emerge, giving you the true serenity that you're
constantly mindful of the present condition of your system. By having this data readily available,
you're ready to pick up a top to bottom permeability into the strength of your system and distinguish
if unapproved clients are interfacing with your gadgets.
capacity of CCMSPING. The accompanying new capacities are accessible to you on the off chance
that you register CCMSPING with the - push choice:
CCMSPING effectively sends accessibility information to CEN once every moment; you can make
this interim longer as wanted. Without this choice, CEN just demands the accessibility information
from CCMSPING at regular intervals.
You can enroll different CCMSPING operators with one CEN for the observing of your framework
scene. This implies, notwithstanding a heap adjusting for accessibility observing, you can likewise
have certain frameworks observed by various CCMSPING specialists and in this manner check
availability[7].
You can call the Java to message server just as the ABAP message server for accessibility
observing. This implies you can screen the accessibility of both ABAP and Java frameworks.
The solution to avoid data vulnerability in server availability monitoring tools
Strong system security checking apparatuses can screen data transfer capacity traffic on explicit
gadgets, just as screen traffic to see who, when, and where that arrange traffic is originating from to
recognize potential dangers. InterMapper is an incredible and moderate system checking
programming that does only that. It's lean and proficient observing motor continually surveys every
one of your gadgets to catch ongoing data. Furthermore, InterMapper is seller freethinker, enabling
it to discover and screen any gadget in your system[8].
InterMapper's Device Status Window likewise demonstrates to you the historical backdrop of every
gadget's action, giving you understanding into suspicious movement. InterMapper's alarming
capacity tells you of potential issues when they emerge, giving you the true serenity that you're
constantly mindful of the present condition of your system. By having this data readily available,
you're ready to pick up a top to bottom permeability into the strength of your system and distinguish
if unapproved clients are interfacing with your gadgets.

InterMapper likewise has its own NetFlow analyzer add-on that can be utilized to gather much more
top to bottom system traffic information. You can set up your system portal or Layer 3 gadgets as
an exporter to send the system traffic to InterMapper Flows. Since most programmers endeavor to
get to your system by assaulting your web switches and firewalls, InterMapper Flows enables you
to catch the inbound and outbound traffic on those switches or firewalls to see where that traffic is
going back and forth. Utilizing InterMapper Flows can enable you to distinguish pernicious system
traffic or recognize where conceivable openings in your system may be. Clients can sit back and
relax, knowing where their vulnerabilities are before a programmer can exploit them.
Having a constant system observing arrangement set up to furnish you with top to bottom
permeability and the capacity to catch information at all edges of your system can help distinguish
security dangers before they happen. Ground-breaking system security observing instruments like
InterMapper can enable you to moderate potential security dangers with significant adaptability at a
much lower value point[9].
Impact of failure prediction on server availability monitoring
Execution estimation instruments may screen such things as CPU and circle use, server load,
memory use, switch, switch and system usage It may incorporate surveying of each bit of hardware
on the system to decide the soundness of these segments. System observing may even gauge the
reaction time of exchanges and applications that are basic to the organization or its data
transmission use Measurements that fall outside of the limits of pre-set execution benchmarks can
trigger a caution to checking faculty, or even actuate a pre-characterized activity to address the
circumstance before a disappointment happens. Such estimations can be put away in a database for
pattern examination and scope organization.
Some system administrations are required by representatives and outsiders so as to do their work.
At the point when those administrations become inaccessible, the influenced gatherings won't be
top to bottom system traffic information. You can set up your system portal or Layer 3 gadgets as
an exporter to send the system traffic to InterMapper Flows. Since most programmers endeavor to
get to your system by assaulting your web switches and firewalls, InterMapper Flows enables you
to catch the inbound and outbound traffic on those switches or firewalls to see where that traffic is
going back and forth. Utilizing InterMapper Flows can enable you to distinguish pernicious system
traffic or recognize where conceivable openings in your system may be. Clients can sit back and
relax, knowing where their vulnerabilities are before a programmer can exploit them.
Having a constant system observing arrangement set up to furnish you with top to bottom
permeability and the capacity to catch information at all edges of your system can help distinguish
security dangers before they happen. Ground-breaking system security observing instruments like
InterMapper can enable you to moderate potential security dangers with significant adaptability at a
much lower value point[9].
Impact of failure prediction on server availability monitoring
Execution estimation instruments may screen such things as CPU and circle use, server load,
memory use, switch, switch and system usage It may incorporate surveying of each bit of hardware
on the system to decide the soundness of these segments. System observing may even gauge the
reaction time of exchanges and applications that are basic to the organization or its data
transmission use Measurements that fall outside of the limits of pre-set execution benchmarks can
trigger a caution to checking faculty, or even actuate a pre-characterized activity to address the
circumstance before a disappointment happens. Such estimations can be put away in a database for
pattern examination and scope organization.
Some system administrations are required by representatives and outsiders so as to do their work.
At the point when those administrations become inaccessible, the influenced gatherings won't be
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

capable finished certain assignments. This can have a domino impact that can cut down generally
profitability.
What makes this downright terrible is that, regardless of whether your efficiency endures, the
expenses related with these people or specialist co-ops are as of now fixed. You can't remove a
small amount of pay, lease, or outsider expenses, in light of the fact that no work was finished amid
personal times[10].
The effect of framework personal time can undoubtedly increase if the administration being referred
to is a piece of a store network, particularly in exceptionally aggressive enterprises where time to
advertise is critical to the accomplishment of an ite[11].
To compound the situation, broken guarantees would now be able to have genuine repercussions,
other than the budgetary kind. Many displeased clients or workers of exchanging accomplices rush
to vent their disappointments via web-based networking media. In only a couple of minutes, a word
about your "long" personal time can reach over the globe[12].
profitability.
What makes this downright terrible is that, regardless of whether your efficiency endures, the
expenses related with these people or specialist co-ops are as of now fixed. You can't remove a
small amount of pay, lease, or outsider expenses, in light of the fact that no work was finished amid
personal times[10].
The effect of framework personal time can undoubtedly increase if the administration being referred
to is a piece of a store network, particularly in exceptionally aggressive enterprises where time to
advertise is critical to the accomplishment of an ite[11].
To compound the situation, broken guarantees would now be able to have genuine repercussions,
other than the budgetary kind. Many displeased clients or workers of exchanging accomplices rush
to vent their disappointments via web-based networking media. In only a couple of minutes, a word
about your "long" personal time can reach over the globe[12].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Reference
[1] A. Rezi and M. Allam, "Techniques in array processing by means of transformations, " in
Control and Dynamic Systems, Vol. 69, Multidemsional Systems, C. T. Leondes, Ed. San Diego:
Academic Press, 2015, pp. 133-180.
[2] G. O. Young, "Synthetic structure of industrial plastics," in Plastics, 2nd ed., vol. 3, J. Peters,
Ed. New York: McGraw-Hill, 2017, pp. 15-64.
[3] S. M. Hemmington, Soft Science. Saskatoon: Univ. of Saskatchewan Press, 2009.
[4] N. Osifchin and G. Vau, "Power considerations for the modernization of telecommunications in
Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second Int.
Telecommunications Energy Special Conf., 2013, pp. 9-16.
[5] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 2014.
[6] O. B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and
Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 2015, pp. 279-283.
[7] K. Schwalbe, Information Technology Project Management, 3rd ed. Boston: Course
Technology, 2016.
[8] M. N. DeMers, Fundamentals of Geographic Information Systems, 3rd ed. New York: John
Wiley, 2018.
[9] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines in search of an interface:
Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.
Reading, MA: Addison-Wesley, 2016. Reprinted in Human-Computer Interaction (ICT 235)
Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch Univ., 2017, pp. 32-37.
[10] E. P. Wigner, "Theory of traveling wave optical laser," Physical Review, vol.134, pp. A635-
A646, Dec. 2018.
[11] J. U. Duncombe, "Infrared navigation - Part I: An assessment of feasibility," IEEE
Transactions on Electron Devices, vol. ED-11, pp. 34-39, Jan. 2014.
[1] A. Rezi and M. Allam, "Techniques in array processing by means of transformations, " in
Control and Dynamic Systems, Vol. 69, Multidemsional Systems, C. T. Leondes, Ed. San Diego:
Academic Press, 2015, pp. 133-180.
[2] G. O. Young, "Synthetic structure of industrial plastics," in Plastics, 2nd ed., vol. 3, J. Peters,
Ed. New York: McGraw-Hill, 2017, pp. 15-64.
[3] S. M. Hemmington, Soft Science. Saskatoon: Univ. of Saskatchewan Press, 2009.
[4] N. Osifchin and G. Vau, "Power considerations for the modernization of telecommunications in
Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second Int.
Telecommunications Energy Special Conf., 2013, pp. 9-16.
[5] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 2014.
[6] O. B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and
Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 2015, pp. 279-283.
[7] K. Schwalbe, Information Technology Project Management, 3rd ed. Boston: Course
Technology, 2016.
[8] M. N. DeMers, Fundamentals of Geographic Information Systems, 3rd ed. New York: John
Wiley, 2018.
[9] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines in search of an interface:
Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.
Reading, MA: Addison-Wesley, 2016. Reprinted in Human-Computer Interaction (ICT 235)
Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch Univ., 2017, pp. 32-37.
[10] E. P. Wigner, "Theory of traveling wave optical laser," Physical Review, vol.134, pp. A635-
A646, Dec. 2018.
[11] J. U. Duncombe, "Infrared navigation - Part I: An assessment of feasibility," IEEE
Transactions on Electron Devices, vol. ED-11, pp. 34-39, Jan. 2014.

[12] M. Bell, et al., Universities Online: A survey of online education and services in Australia,
Occasional Paper Series 02-A. Canberra: Department of Education, Science and Training, 2010.
Occasional Paper Series 02-A. Canberra: Department of Education, Science and Training, 2010.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.