pmacct
FastNetMon
pmacct | FastNetMon | |
---|---|---|
8 | 8 | |
1,017 | 3,337 | |
1.0% | - | |
9.2 | 8.9 | |
9 days ago | 5 days ago | |
C | C++ | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pmacct
-
NetFlow-equivalent analysis for mirrored traffic
If you want a tool that can ingest from a span port and generate netflow or IPFIX there is pmacct. This should work with your existing tooling that collects netflow data.
- Looking for network traffic analysis solution
-
Free netflow collector that forwards messages to a syslog server?
Your best bet is probably pmacct. I don't think this functionality is built-in per se, but it would be fairly easy to use syslog-ng or similar to read its output from file or stdout. It can also aggregate for you, if that's useful.
- How to locate device illegally downloading on network
- IPv4 vs IPv6 traffic stats
-
Benchmarking: TimescaleDB vs. ClickHouse
While I'm not a current customer of Timescale, I do use the open source version of Timescale extensively, so I feel like I can summarize some of the benefits of Timescale over other TSDB's. The company is a mid size, with awkward data 4+PB unstructured data, with our Postgres cluster hosting about 20 TB of data.
The main advantage from my perspective, is that you can query across data business data and time series data with all the advantages that Postgres has. Time series data while useful on its own, becomes incredibly powerful when it can be combined with your business and production data.
A great example is our outbound network data monitoring. We use pmacct http://www.pmacct.net/ to send network flows to Postgres from our firewall, host inventory data in Postgres, and a foreign data wrapper around our LDAP data to determine user / host assignment, and from that we can correlate every data flow to the user who is assigned to the host that generated that particular flow. This makes for some pretty powerful security reporting. Outside of that, we use Timescale's hypertables in a number of places that aren't explicitly timeseries data, like syslog data, web server logs, etc. This allows for some pretty amazing reporting on log data that is timeboxed, like "give me all the 500 errors from our HTTP log that have an ip address in Finland (did I mention that we load GeoIP data into Postgres every night) in the last 3.5 hours.
Timescale is excellent on its own, and honestly competitive with other TSDB's on its own. Having access to the full Postgres ecosystem with your timeseries data makes Timescale way ahead of everyone else. My story might change when I hit the limits of what a single Postgres host can ingest, but I'm not even close to that scale yet.
Other advantages of Timescale, is having access to real SQL, you don't have to learn a new domain specific query language, you can just use SQL. This admittedly can be a double edge sword. SQL is more complicated than PromQL / InfluxQL, however that comes with quite a lot of extra capability, and the ability to transfer that knowledge into other domains.
I personally really like Timescale, and feel that regardless of anyones benchmarks, no matter how well thought out or not, the advantages outweigh the disadvantages by a pretty large margin.
-
Port Mirror and GoFlow Collector
GoFlow doesn't capture raw packets, it accepts IPFIX/Netflow/sFlow. You will either need to configure your equipment to generate that flow data and send it to the goflow collector, or use an application like pacct to capture packets and generate IPFIX/Netflow data from it.
-
FRRouting and IPFix/Netflow
https://github.com/pmacct/pmacct is the best exporter I've found. I can pull some old configs for pmacct if you're interested. You can either BGP peer pmacct to FRR to enrich IPFIX with ASNs or you can even instruct pmacct to read prefix to AS mappings from a file.
FastNetMon
- Versatile open source toolkit to detect volumetric DDoS attacks
-
A DDoS attack with unknown scr and dst port.
If you have a BGP peering with you ISP/upstream provider, ask them if they have a blackhole community you can broadcast to. Usually they are ASN:666. The only downside is you would only be able to advertise your IP address to that, essentially killing your internet (if that's your only IP) as long as the block is up. We usually set our filter to 15 minutes and most attackers give up after that. At this level, you probably would have your own ASN with a small range and could potentially use something like FastNetMon (https://fastnetmon.com) to automatically advertise and remove IPs from the community.
-
Processing netwflow data
Have you looked at fastnetmon ? It's freemium and It looks like the commercial version would work you, but I think the community edition is aslo worth a look. It's primary function is to detect DDOS attacks, but it can export data in ways that might be useful to you.
- Got shaken down today.
- FastNetMon – DDoS Sensor with SFlow/Netflow/Ipfix/Span Support
-
WAN Attacks is it just whack-a-mole?
To mitigate DoS attacks means you need information - preferably before the users start screaming. Running sampling on your edge router with something like Fastnetmon will give you alerting of a probable DDoS attack before it becomes a significant problem.
-
fastnetmon notify_about_attack.sh question
notify_about_attack.sh https://github.com/pavel-odintsov/fastnetmon/blob/master/src/notify_about_attack.sh
- nfsen vs fastnetmon for sFlow and DDoS monitoring
What are some alternatives?
nfdump - Netflow processing tools
ElastiFlow - Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
nDPI - Open Source Deep Packet Inspection Software Toolkit
ntopng - Web-based Traffic and Security Network Traffic Monitoring
VictoriaMetrics - VictoriaMetrics: fast, cost-effective monitoring solution and time series database
samplicator - Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing
promscale - [DEPRECATED] Promscale is a unified metric and trace observability backend for Prometheus, Jaeger and OpenTelemetry built on PostgreSQL and TimescaleDB.
Mikrotik-RouterOS-automatic-backup-and-update - Script sends backups to email and keep your mikrotik firmware up to date.
ipt-netflow - Netflow iptables module for Linux kernel (official)
softflowd - softflowd: A flow-based network traffic analyser capable of Cisco NetFlow data export software.
clickhouse_fdw - ClickHouse FDW for PostgreSQL
vFlow - Enterprise Network Flow Collector (IPFIX, sFlow, Netflow)