MIB Smithy is an application for SNMP and COPS developers, MIB and PIB designers, and Internet-draft authors. It provides a GUI-based environment for designing, editing, and compiling MIB and PIB modules according to the SMIv1, SMIv2, and COPS-PR-SPPI standards. It accelerates the development process by providing an easy-to-use GUI-based environment for developing the specifications without the syntax and formatting concerns of editing the modules by hand. It includes a number of built-in basic SNMP management tools, XML support, and (with MIB Smithy Professional) support for custom compiler output formats.
Cherokee is a very fast, flexible and easy to configure Web server. It supports widespread technologies including FastCGI, SCGI, uWSGI, PHP, CGI, SSI, TLS and SSL encrypted connections, virtual hosts, authentication, on the fly encoding, load balancing, Apache compatible log files, database balancing, reverse HTTP proxy, traffic shaping, video streaming, and much more. A user friendly interface called cherokee-admin is provided for no-hassle configuration of the server. It allows you to configure the server from top to bottom without editing a text configuration file.
Zenoss is an enterprise network/systems management application that provides an integrated software package for monitoring availability, performance, events, and configuration across layers (network, servers, applications, environment, etc.) and across platforms (Linux, Windows, Unix, etc.).
MIB Views is an entry-level SNMP management application providing an easy to use tabbed interface with several SNMP tools. The tools are based partly on those bundled in MIB Smithy, with a more consolidated GUI and new features. The suite includes MIB Browser (Tree View), SNMP Query, Table View, SNMP Walk, and Trap Watch tools, with more tools and plugin features in the works. MIB Views supports SNMPv1, SNMPv2c, and SNMPv3, with MD5 and SHA authentication and encryption with DES or AES.
nexB OpenAssets is a tool for inventorying, managing, and monitoring applications, software, hardware, networks, and generally any IT asset. It is designed so that system administrators, IT, and finance can determine what they have, how it is configured, what it is used for, and how much it is being used, so that informed decisions can be made. It complements existing network management software, integrates with a growing number of protocols and tools, and features no-agent discovery and inventory, configuration management including dependencies and correlation, monitoring, and reporting. It makes extensive and innovative use of XML, Xpath, and Xquery.
Lilith is a logging and access event viewer for the Logback logging framework. It has features comparable to Chainsaw, a logging event viewer for log4j. This means that it can receive logging events from remote applications using Logback as their logging backend. It uses files to buffer the received events locally, so it is possible to keep vast amounts of logging events at your fingertip while still being able to check only the ones you are really interested in by using filtering conditions.
MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
LBackup is a simple backup system aimed at systems administrators who require reliable backups with minimum fuss. It is configured with configuration files, and the backup is started from the command line. It has been tested for over 10 years. Backups can be to local media, or to remote media via one or more networks. The networks may be private LANs, WANs, or sets of untrusted public networks such as the Internet.
dim_STAT is a performance analysis and monitoring tool for Solaris, Linux, Mac OS X, and other UNIX systems. Its main features are a Web-based interface, data storage in a MySQL database, several data views, interactive (Java) or static (PNG) graphs, real-time monitoring, multi-host monitoring, post analyzing, statistics integration, professional reporting with automated features, and more.
Netomata Config Generator (NCG) creates complete, ready-to-install configuration files for network devices and services from a common lightweight model of a network. Because these configuration files are generated programmatically and generated from a shared model, they are more likely to be consistent and complete, making a network more reliable, easier to troubleshoot, and easier to expand in both size and functionality. The inputs to NCG are a model describing the network and templates for the configuration files of the various devices (routers, switches, load balancers, firewalls, etc.) and services (SNMP, DNS, DHCP, etc.). From these inputs, NCG produces complete, consistent, ready-to-install configuration files for those devices and services.