pmacct
mtail
pmacct | mtail | |
---|---|---|
8 | 23 | |
1,017 | 3,747 | |
1.0% | 0.5% | |
9.2 | 9.1 | |
9 days ago | 7 days ago | |
C | Go | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pmacct
-
NetFlow-equivalent analysis for mirrored traffic
If you want a tool that can ingest from a span port and generate netflow or IPFIX there is pmacct. This should work with your existing tooling that collects netflow data.
- Looking for network traffic analysis solution
-
Free netflow collector that forwards messages to a syslog server?
Your best bet is probably pmacct. I don't think this functionality is built-in per se, but it would be fairly easy to use syslog-ng or similar to read its output from file or stdout. It can also aggregate for you, if that's useful.
- How to locate device illegally downloading on network
- IPv4 vs IPv6 traffic stats
-
Benchmarking: TimescaleDB vs. ClickHouse
While I'm not a current customer of Timescale, I do use the open source version of Timescale extensively, so I feel like I can summarize some of the benefits of Timescale over other TSDB's. The company is a mid size, with awkward data 4+PB unstructured data, with our Postgres cluster hosting about 20 TB of data.
The main advantage from my perspective, is that you can query across data business data and time series data with all the advantages that Postgres has. Time series data while useful on its own, becomes incredibly powerful when it can be combined with your business and production data.
A great example is our outbound network data monitoring. We use pmacct http://www.pmacct.net/ to send network flows to Postgres from our firewall, host inventory data in Postgres, and a foreign data wrapper around our LDAP data to determine user / host assignment, and from that we can correlate every data flow to the user who is assigned to the host that generated that particular flow. This makes for some pretty powerful security reporting. Outside of that, we use Timescale's hypertables in a number of places that aren't explicitly timeseries data, like syslog data, web server logs, etc. This allows for some pretty amazing reporting on log data that is timeboxed, like "give me all the 500 errors from our HTTP log that have an ip address in Finland (did I mention that we load GeoIP data into Postgres every night) in the last 3.5 hours.
Timescale is excellent on its own, and honestly competitive with other TSDB's on its own. Having access to the full Postgres ecosystem with your timeseries data makes Timescale way ahead of everyone else. My story might change when I hit the limits of what a single Postgres host can ingest, but I'm not even close to that scale yet.
Other advantages of Timescale, is having access to real SQL, you don't have to learn a new domain specific query language, you can just use SQL. This admittedly can be a double edge sword. SQL is more complicated than PromQL / InfluxQL, however that comes with quite a lot of extra capability, and the ability to transfer that knowledge into other domains.
I personally really like Timescale, and feel that regardless of anyones benchmarks, no matter how well thought out or not, the advantages outweigh the disadvantages by a pretty large margin.
-
Port Mirror and GoFlow Collector
GoFlow doesn't capture raw packets, it accepts IPFIX/Netflow/sFlow. You will either need to configure your equipment to generate that flow data and send it to the goflow collector, or use an application like pacct to capture packets and generate IPFIX/Netflow data from it.
-
FRRouting and IPFix/Netflow
https://github.com/pmacct/pmacct is the best exporter I've found. I can pull some old configs for pmacct if you're interested. You can either BGP peer pmacct to FRR to enrich IPFIX with ASNs or you can even instruct pmacct to read prefix to AS mappings from a file.
mtail
-
i need to visualize all logs from remote dir
You can do that with something like mtail. Basically write expressions that match your logs and produce metrics.
-
Tool to scrape (semi)-structured log files (e.g. log4j)
mtail is a standard tool for this.
-
Free netflow collector that forwards messages to a syslog server?
I use goflow2 to do something like this. I don't specifically use syslog itself for this, but mtail to generate the metrics.
-
How to easily gather IPv6 VS IPv4 usage on a web server?
I can recommend mtail. Here is a good example nginx script.
-
Nginx upstream_response_time average per API route?
If not, https://github.com/google/mtail might be a good option.
-
Sorting a custom metric by multiple labels
Count the lines with mtail. You can regexp match the values out into labels.
-
Alternatives to ELK (filebeat, logstash, kibana, elasticsearch)
If you want to extract whitebox metrics from logs, maybe all you need is mtail.
-
Prometheus Custom Query/Metric based on STDOUT
You can use mtail (https://github.com/google/mtail) for this. You'll need to figure out how to plug it into your setup, but mtail will do the metrics from logs thing.
-
open-source tools to monitor JSON logs for unexpected patterns?
Convert your logs to metrics with mtail.
-
Server metrics monitoring and reporting for centos?
For nginx, you'll need to setup a log parser like mtail because it doesn't really have much for metrics to begin with.
What are some alternatives?
nfdump - Netflow processing tools
loki - Like Prometheus, but for logs.
FastNetMon - FastNetMon - very fast DDoS sensor with sFlow/Netflow/IPFIX/SPAN support
prometheus-cpp - Prometheus Client Library for Modern C++
nDPI - Open Source Deep Packet Inspection Software Toolkit
Sloth - Mac app that shows all open files, directories, sockets, pipes and devices in use by all running processes. Nice GUI for lsof.
VictoriaMetrics - VictoriaMetrics: fast, cost-effective monitoring solution and time series database
sloth - 🦥 Easy and simple Prometheus SLO (service level objectives) generator
promscale - [DEPRECATED] Promscale is a unified metric and trace observability backend for Prometheus, Jaeger and OpenTelemetry built on PostgreSQL and TimescaleDB.
scriggo - The world’s most powerful template engine and Go embeddable interpreter
ipt-netflow - Netflow iptables module for Linux kernel (official)
Grafana - The open and composable observability and data visualization platform. Visualize metrics, logs, and traces from multiple sources like Prometheus, Loki, Elasticsearch, InfluxDB, Postgres and many more.