Nagios Monitoring Cabability

This support forum board is for support questions relating to Nagios XI, our flagship commercial network monitoring solution.
Locked
wiproltdwiv
Posts: 281
Joined: Sat Sep 08, 2012 12:52 am

Nagios Monitoring Cabability

Post by wiproltdwiv »

Dear Sir/Madam,

I need to know the below things:

1) what all are the OS and their flavors can be monitored by Nagios.
2) what all are the Databases, switch, routers can be monitored by Nagios.
3) what all are other things which can be monitored by Nagios.


Thanks & Regards,
Amit kr. Sharma
tmcdonald
Posts: 9117
Joined: Mon Sep 23, 2013 8:40 am

Re: Nagios Monitoring Cabability

Post by tmcdonald »

Nagios can monitor just about anything, as long as it can be scripted out. We have agents for Windows, Mac, and many flavors of Linux and related systems (AIX, Solaris, etc.). Switches and routers can be monitored usually by SNMP, and databases depend on their client but things like MySQL and Postgres we see a lot.

As for all the other things, that truly is limited only by what you can script out. We have a very flexible plugin system that has only a few requirements:

https://nagios-plugins.org/doc/guidelines.html

Aside from that the sky is the limit.
Former Nagios employee
wiproltdwiv
Posts: 281
Joined: Sat Sep 08, 2012 12:52 am

Re: Nagios Monitoring Cabability

Post by wiproltdwiv »

Can you address the concern of security? Since this is open source how does Nagios ensure security is taken care of in deployed environments since interfaces would be available from developers, what is the security practices in place so that backdoor entry is not made into system?
tmcdonald
Posts: 9117
Joined: Mon Sep 23, 2013 8:40 am

Re: Nagios Monitoring Cabability

Post by tmcdonald »

As with any other open-source platform, if an attacker is able to modify the files it usually means they have root access to the server anyway. There is nothing we can do from our end to prevent this, and server-level security is something your network/admin/security team must handle.

Some of the core portions of the codebase are SourceGuardian-protected, but not all.

As far as protecting the application from the outside, we make every attempt to follow proper application security protocol such as sanitizing input and output, maintaining session integrity, providing varying levels of user authorization, and maintaining an audit log of some of the in-application changes.
Former Nagios employee
Locked