Openduckbill is a simple command line backup tool for Linux. It is capable of monitoring files and directories marked for backup for any changes, and transferring these changes either to a local backup directory, a remote NFS exported partition, or a remote SSH server using rsync. It can either maintain an exact copy of the source at the backup destination, or maintain both current and previous versions of the source at the backup destination.
ns4 is a command line configuration management tool that runs on a Unix or Windows based operating system. It allows the automated backup of node (i.e. routers and switches) configurations to an FTP/SFTP server or local media on a daily basis to create configuration archives. It can run ad-hoc commands on multiple nodes as well as custom scripts for automating complex tasks. It uses Perl and allows you to manipulate the output of commands using regular expressions within scripts. Configuration based cartridges are used to specify new node types, allowing the user to extend its functionality in a simple and dynamic way.
Network Device Change Control (NDCC) is a system that monitors and records changes to the configurations of network equipment. It can store configuration snapshots for any text-based configs. It has been used to store configurations from Unix and Linux systems, Cisco routers, switches, load balancers, and firewalls, Foundry, NetScreen, Juniper, NetScaler, and others.
Sstat is a kernel module for Linux 2.6 aimed at providing basic SCSI I/O statistics. While better tools exist for monitoring disk activity, SCSI (or Fibre Channel) tapes have been neglected so far. This module compiles out-of-tree and uses Kprobes to access the information needed so it can be used with "enterprise" kernels as well (where recompilation or rebooting are not acceptable).
This is the "progress" utility from NetBSD, ported to Linux and Solaris. The progress utility allows the file I/O of progresses to be monitored. It includes support for gzip-compressed files, so "progress -z -f file.tar.gz tar xf -" would show the progress of extracting file.tar.gz.
Userexitd for TSM is a configurable handler for Tivoli Storage Manager events. It allows an administrator to filter events using regular expressions and run various actions for TSM events, such as sending mail and SNMP traps, writing messages into syslog, and running scripts and programs. This software consists of two parts: a simple shared library (userexit.so), which is dynamically linked to the TSM Server as a user exit and communicates using a socket with the userexitd daemon, which runs as a separate service. The daemon is configured with an XML configuration file.
Snare for Squid provides a remote distribution facility for Squid proxy server logs, and is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Squid can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.
Tea4CUPS is similar in functionality to the *nix command "tee", but in the form of a CUPS (Common UNIX Printing System) backend. Tea4CUPS captures a print job's data in their final form while they are being sent to a printer (more precisely, to a CUPS backend), and at the same time allows you to dispatch these data to any number of commands.
amandalogp is a package whose goal is to facilitate the interpretation of the logs and reports produced by Amanda (the Advanced Maryland Automatic Network Disk Archiver). It will parse the mail sent by Amanda (typically as a procmail filter) and send a colorized HTML version of that report which helps monitor a specific set of machines of special interest to some admins.
Wiresoft ANA (Automated Network Agent), an Artificial Intelligence-based systems management service, automatically performs over 90% of Linux systems management tasks. It is a self-managing, self-learning system support service that provides constant maintenance and protection for Firegate Servers. ANA services include Software Updating and Integration, Intrusion Detection, Data Back-up and Disaster Recovery, Monitoring, and Alerting.