back to top

Trending Content:

Australia announce 14-member squad for Pakistan ODIs

An undated picture of Australian captain Pat Cummins. —...

CPEC News Update (October 2024)

CPEC News Update (October 2024)  2 minutes read time. The...

System Middle Operations Supervisor (SCOM) vs Nagios | Cybersecurity

For at the moment’s busy sysadmin, programs well being and efficiency monitoring instruments like Microsoft’s SCOM (Programs Middle Operations Supervisor) and the open-source Nagios are invaluable. They allow at-a-glance monitoring of huge numbers of servers all through a community, which is doubly vital in case of a extensively geographically dispersed community setup resembling in a WAN or MAN. Although they broadly obtain the identical objectives, SCOM and Nagios come at it from fairly completely different instructions.

SCOM

SCOM is a close to real-time server and data-center monitoring device from Microsoft focused at monitoring servers and enterprise infrastructure, providers, and functions like Alternate and SQL. To not be confused with SCCM (Programs Middle Configuration Supervisor), which is a administration device meant to be used with Home windows-only shopper nodes. SCCM works by deploying brokers to carry out distant administration duties resembling automated software program set up and updates of Home windows elements, in addition to different non-Home windows providers and apps. Like SCOM, SCCM additionally makes use of brokers and might technically be used for some rudimentary monitoring; although this isn’t actually its meant use.

SCOM is a cross-platform device; it really works on Home windows, MacOS, and Unix-based working programs, together with Linux. It may be used to watch each working programs and hypervisors by retrieving and displaying state, well being and efficiency data of those machines. From Wikipedia:

“The SCOM agent watches several sources on that computer, including the Windows Event Log, for specific events or alerts generated by the applications executing on the monitored computer. Upon alert occurrence and detection, the agent forwards the alert to a central SCOM server. This SCOM server application maintains a database that includes a history of alerts. The SCOM server applies filtering rules to alerts as they arrive; a rule can trigger some notification to a human, such as an e-mail or a pager message, generate a network support ticket, or trigger some other workflow intended to correct the cause of the alert in an appropriate manner.” 

SCOM additionally helps agentless monitoring, though that is in fact not as purposeful as agent-based monitoring.

From the 2007 model of SCOM onwards, Microsoft consists of the Powershell CLI for added performance. By default, SCOM solely screens the essential OS actions talked about above. However by incorporating using Administration Packs (MP’s), SCOM’s monitoring performance may be prolonged to each Microsoft providers (eg Lively Listing, SQL Server, Alternate, print servers, Hyper-V) and in addition non-Microsoft providers and apps (eg Oracle DB, Cisco routers, VMWare, EMC, Symantec clusters, and many others). An SCOM MP exists for nearly each widely-used software on the market, so they’re just too quite a few to checklist. See a extra complete unofficial checklist right here.

SCOM’s large benefit is the broad availability of MP’s and the truth that it’s a Microsoft product. Which means that it integrates seamlessly right into a Home windows surroundings, and in addition that Microsoft MP’s resembling Alternate, SQL Server work flawlessly on SCOM, provided that they’re developed and up to date by groups working carefully with the SCOM builders. SCOM’s principal disadvantage, like so many different Microsoft enterprise instruments, is its pricing. Really, ‘pricing’ encompasses two separate points – the excessive worth and the convoluted, hard-to-understand nature of the pricing. To begin with, SCOM is barely out there as a part of the System Middle suite. Then there are completely different costs for present vs. new prospects. After that you just require the System Middle administration license, and that is available in completely different variations (worth vary $1323 – $3607). Then after that you just additionally want shopper licenses for all of the servers you plan to watch on SCOM – these vary in worth from $62 to $121. And also you additionally require a SQL Server database to retailer all this information, so there may be a further price in the event you don’t have already got SQL Server. However you may get a reduction on this price if you’ll solely use that SQL Server to host System Middle databases, not databases for different apps… Let’s simply cease there – it’s fairly clear that Microsoft pricing is a nightmare to attempt to make sense of.

Nagios

Nagios is a free, open-source monitoring device. It was initially designed for the Linux surroundings, however it additionally runs on Home windows utilizing crucial free plugins or extensions resembling Check_MK, NSClient++ or industrial ones resembling Nagwin.

The Nagios Core is a considerably bare-bones device proper out of the field. It doesn’t actually have a dashboard and a pleasant GUI, which actually ought to be obligatory for a monitoring device. Nonetheless, that is fortunately remedied by use of add-ons and plugins which significantly prolong the bottom device’s performance. An inventory of those may be obtained right here and these cowl a wide selection of providers – databases, working programs, community tools and so forth. There’s additionally  a industrial model which incorporates all these good add-ons. The newest industrial model known as Nagios XI, and it prices from $1,995 for a 100-node Commonplace version license to $6,495 for an unlimited-node Enterprise version. These are one-off prices, and the Enterprise editions additionally require both a Upkeep + Assist or a Upkeep-only contract. Full particulars right here.

One among Nagios’ principal drawbacks is the excessive degree technical experience required to stick with it and working. Its reliance of handbook configurations leads to a steep studying curve for admins. Different points are points with scaling to very giant setups, and Nagios Core’s problem with auto-discovery of whole community topologies, not simply the servers but in addition virtualization, storage and community units. See extra right here. Nonetheless, regardless of these points, Nagios remains to be the de facto chief in open-source monitoring instruments.

Conclusion

A selection between SCOM and Nagios will likely be decided by your wants and the traits of your surroundings. If in case you have a mostly-Home windows setup or do lots of Home windows improvement then SCOM could also be a greater match for you. If as a substitute you have got a smaller *nix setup the place price is a serious difficulty, then maybe Nagios is a greater match, though it additionally requires a a lot greater degree of technical experience and configuration earlier than the device begins working for you.

That stated, SCOM will fortunately additionally monitor non-Home windows environments. And Nagios will even work on Home windows with plugins, and it’s also possible to get a industrial model in the event you aren’t that technically inclined or want to keep away from the steep studying curve. Additionally see the desk beneath for a summarized comparability.

Options
Nagios
SCOM

Platforms
Home windows, Unix, Linux
Home windows, Unix, Linux, macOS (Have to be hosted on Home windows)

License prices
Server: $1,995-$6,495Client: Free
Server: $1,323-$3,607Client: $62-$121 per node

Major options missing within the different
Fault administration & correctionError correction
Community provisioningExcellent Home windows integration

References

Prepared to save lots of time and streamline your belief administration course of?

System Middle Operations Supervisor (SCOM) vs Nagios | Cybersecurity

Latest

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say,...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied...

What’s Social Engineering? Definition + Assault Examples | Cybersecurity

Social Engineering, within the context of cybersecurity, is the...

5 Issues You Have to Know About Third-Celebration Danger in 2024 | Cybersecurity

It is now not sufficient to easily be certain...

Newsletter

spot_img

Don't miss

What’s Cyber Provide Chain Danger Administration? | Cybersecurity

Cyber provide chain threat administration (C-SCRM) is the method...

Stepping away from captaincy might be helpful for Babar Azam, says Younis Khan

Former Pakistan skippers Babar Azam (left) and Younis Khan....

What’s Provide Chain Threat Administration (SCRM)? | Cybersecurity

Provide chains are difficult. A wholesome provide chain depends...
spot_imgspot_img

What’s Spear Phishing? | Cybersecurity

Spear phishers search for goal who may lead to monetary acquire or publicity of commerce secrets and techniques for company espionage, personally identifiable info (PII) for identification...

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say, we’re lengthy overdue in revisiting these two heavy-hitters. On this article we’ll take a recent...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied sciences are as ubiquitous because the MySQL RDBMS. Integral to standard software program packages like...

LEAVE A REPLY

Please enter your comment!
Please enter your name here