Oak monitors syslogs from a collection of servers, and notifies the operators when problems arise. In addition to providing immediate notification of critical issues, it will also batch less critical problems into summary messages, which can be sent less often, and via any medium. It is part of the 'ktools' collection of network administration utilities.
GeneSyS aims to define and implement a middleware architecture for generic system monitoring and supervision. It is an Information Society Project (IST-2001-34162) sponsored by the European Commission. It provides a middleware- and agent-based approach for system monitoring and management. It uses WebServices technology (SOAP) for communication between components and XML-based descriptions of monitoring information.
Passwd_exp notifies users via email of upcoming password or account expiration. Its simple modular architecture allows you to perform expiration checks on any data source you use (SQL databases, LDAP...), send expiration warnings only to desired users or group and on selected days only. Administrators can use it to review expired accounts in the system. Support for Linux and Solaris shadow (including LDAP and NIS systems) and BSD passwd systems is included.
Streamline is a pipelined I/O subsystem for both kernel and application processing on Linux, with 40+ filters for pattern matching, stream reassembly, compression, etc. It exports the pipes, sockets, and pcap interfaces and uses shared memory to reduce I/O copy and context switch cost. Logical uses are rapid application development of intrusion detection systems and similar complex network processing tasks.
Rogue Detect sends DHCPDISCOVER packets to the network and listens for DHCP servers to respond. It can run continuously as a daemon, or do a single probe and quit. It's written in Perl and can be easily extended to take any action you can think of in response to an unknown DHCP server (send pages, disable them, etc).
nexB OpenAssets is a tool for inventorying, managing, and monitoring applications, software, hardware, networks, and generally any IT asset. It is designed so that system administrators, IT, and finance can determine what they have, how it is configured, what it is used for, and how much it is being used, so that informed decisions can be made. It complements existing network management software, integrates with a growing number of protocols and tools, and features no-agent discovery and inventory, configuration management including dependencies and correlation, monitoring, and reporting. It makes extensive and innovative use of XML, Xpath, and Xquery.