SlideShare a Scribd company logo
www.controlup.com
Agent and Agentless
Pros and Cons
Products that are designed for operating system level monitoring can be classified as
agent-based or agentless. Although it is easy to assume that agentless solutions are
superior to their agent-based counterparts, there are some situations in which the use
of an agent allows for better all-around functionality. This whitepaper examines the
advantages and the disadvantages to the two approaches.
Agentless Monitoring
In recent years agentless monitoring has gained popularity because agentless technology
frees the administrator from tasks related to agent deployment and maintenance and
because the absence of an agent minimizes the size of the code base on monitored
systems. Vendors offering agentless monitoring solutions have adopted several
different techniques for acquiring monitoring data. Some of the more popular agentless
monitoring techniques include wire data monitoring, remote query monitoring, and
hypervisor monitoring.
Wire data monitoring
One technique that is sometimes used for agentless monitoring involves monitoring the
network rather than monitoring the network endpoints. Wire data monitoring can involve
the use of SNMP, but more often it is based on examining packets as they flow across the
network. Some examples of products that perform this type of monitoring include Splunk
App for Stream and ExtraHop.
In most cases wire data monitoring is completely passive, which means that there is little to
no performance impact on the systems that are being monitored. A dedicated monitoring
station watches traffic as it flows across the network and compiles a near real time status
report based on the contents of the traffic.
The primary disadvantage to relying solely on wire data monitoring is that wire data
monitoring alone does not provide a comprehensive picture of the activity on your
network. Depending on your network infrastructure and the monitoring product that is
being used, the wire data monitoring software might lack the ability to monitor encrypted
communications, traffic flowing across VLANs, Traffic flowing across virtual network
segments.
www.controlup.com
Wire data monitoring software by its very nature is incapable of monitoring the processes
that are running on virtual desktops. A wire data monitoring based solution might for
example, be able to use traffic patterns or even PING or SMTP based tests to confirm that
a specific application is running on a virtual desktop, but the software would not be able to
determine how much memory or CPU time the application is consuming because wire data
monitoring lacks the ability to monitor processes running within the virtual desktop.
Remote Query Monitoring
Another technique that is commonly used for agentless monitoring is remote query
monitoring. The basic concept behind remote query monitoring is relatively simple. A
monitoring server uses a protocol that is natively supported by the target operating system
to submit queries to the target endpoint in order to derive its status. These queries can be
based on RPC, WMI, or a number of other protocols.
Remote query monitoring is quickly becoming the favored approach for agentless monitoring
because it can provide a wealth of information about the monitored endpoint. Some of the
vendors that use remote query based monitoring include EG Innovations and Nagios.
In spite of its many advantages, there are some disadvantages to using remote query
monitoring. Perhaps the biggest disadvantage is that the monitoring capabilities are
directly tied to the underlying protocol. This is an especially important consideration for
organizations that use a heterogeneous collection of operating systems because a protocol
that works for monitoring one vendor’s OS might not work for another vendor’s product.
WMI for instance is great for monitoring Windows based systems, but isn’t usually going to
be an option for monitoring Linux based systems.
Wire Data Monitoring
Advantages Disadvantages
•	 The monitoring process is completely
passive and does not consume
resources on monitored systems
•	 Administrators do not have to install or
manage agents
•	 There is no need to open firewall ports
or create service accounts on monitored
systems, which means that those
systems should remain secure
•	 Wire data monitoring can track end to
end application latency
•	 Wire data monitoring does not have the
ability to monitor processes running on
network endpoints
•	 Wire data monitoring can only assess
endpoint health indirectly
•	 The use of network encryption, vLANs, or
virtual network segments can potentially
create “blind spots” that cannot be
monitored
www.controlup.com
Another disadvantage to remote query based monitoring is that the queries consume
system resources such as storage I/O, memory, CPU cycles, and network bandwidth.
Although a query is generally lightweight, it may take hundreds of queries to obtain all of
the data necessary to assess a computer’s health, and even then protocol limitations might
result in a report that lacks the level of granularity that can be achieved through an agent
based solution.
Hypervisor Monitoring
Our Another form of agentless wire data monitoring that has gained popularity in recent
years is hypervisor monitoring. Hypervisor monitoring works because hypervisor vendors
such as VMware, Microsoft, and Citrix have built various performance metrics into their
products. This allows vendors such as
Xangati, SolarWinds, and VMTurbo build products to query the hypervisor and display
resource usage statistics.
Hypervisor monitoring products can be very powerful. Such products can usually monitor
the resources consumed by every individual virtual machine running on the host.
Hypervisor monitoring products may also report on host health and may even include
tools for load balancing the virtual machine workload or for reclaiming resources from
orphaned VMs.
The primary disadvantage to hypervisor level monitoring tools is that they lack visibility
into individual virtual machines. A hypervisor monitoring product can typically report
the memory, CPU, and storage resources being consumed by a virtual machine, but it is
Remote Data Monitoring
Advantages Disadvantages
•	 Remote query monitoring provides
better end-point specific monitoring data
than wire data monitoring
•	 Remote query monitoring does not
require the installation or maintenance
of agents
•	 Depending on the protocols being used,
monitoring may not work for some
operating systems
•	 A firewall port may need to be open
•	 The query process consumes network
resources and resources on the systems
that are being monitored
•	 Health information is not displayed
in real time because it takes time for
queries to complete
•	 Remote query monitoring may require
the use of a service account on
monitored systems, which can be a
security risk
www.controlup.com
unlikely to be able to tell you who is logged into an individual virtual machine or which
processes within a VM are consuming the most memory.
Agent Based Monitoring
Although agentless monitoring solutions are more capable than they were even just a few
years ago, agentless solutions tend to be extremely limited when compared to an agent
based solution. Because agent based monitoring solutions rely on processes that are running
inside of the OS that is being monitored they can typically gain a higher degree of insight into
the operating system’s health than what would be possible using an agentless solution.
One of the reasons why agent based monitoring solutions can be so powerful is because
they can monitor network endpoints at several different levels. Granted, not every
product examines every aspect of the endpoint’s operating system, but as a general rule
agent based products such UberAgent and ComTrade when speaking about agent based
solutions tend to provide a much more granular view of the guest operating system’s
health than their agentless counterparts simply because agent based products are not
subject to the operational limitations of an agentless solution.
Every monitoring product provides its own unique set of features and capabilities, but as a
general rule an agent based product should provide granular insight into individual virtual
machines. This might include the ability to examine individual processes that are running
on a virtual machine, but an agent might provide additional management capabilities. For
example, an administrator might use an agent based solution to remotely execute a script
Hypervisor Monitoring
Advantages Disadvantages
•	 Hypervisor monitoring works well for
determining which VMs are consuming
the highest level of VM resources
•	 Hypervisor monitoring can be used
to improve VM health by checking for
the under provisioning of hardware
resources
•	 Some solutions (such as VMTurbo) are
able to reclaim resources from over
provisioned or orphaned VMs.
•	 You do not typically have to open any
firewall ports
•	 Monitoring solutions typically work
regardless of the operating system
running within the VM
•	 Hypervisor monitoring solutions lack
insight into the processes that are
running within individual VMs
•	 Hypervisor monitoring solutions lack
the ability to quantify the end user
experience. Such a solution might for
example be able to report how much
network bandwidth a virtual desktop is
using at a given moment, but would not
be able to report on the amount of time
that it took to complete the user’s login
www.controlup.com
on a set of virtual desktops. An agent based product might even monitor a virtual desktop’s
health and either take corrective action or notify an administrator if a problem occurs.
Hybrid Monitoring
An additional technique that is sometimes used is hybrid monitoring. Since agent-based
and agentless solutions each have their advantages and disadvantages, some vendors
use a hybrid solution that uses multiple monitoring techniques rather than relying on a
single approach. The advantage is that agentless monitoring can be used except for when
granular detail about an individual virtual machine is required. Only then does the product
rely on the use of agents. At other times hybrid monitoring solutions behave more like an
agentless monitoring solution. Some of the vendors that offer hybrid monitoring solutions
include Goliath Technologies, Systrack, and ControlUp.
What Should You Be Using?
While it is difficult to deny the convenience of agentless monitoring, agent based
monitoring tends to produce more granular monitoring data than agentless solutions.
Agentless solutions are dependent on data that can be “sniffed” from network segments or
obtained from a network endpoint through a query, but these approaches are limited with
regard to the type of monitoring data that can be produced. Agent based solutions have
direct access to the endpoints that are being monitored and are therefore able to acquire
very granular monitoring data.
There are a number of recent studies that have resulted in similar conclusions. According
to eG Innovations for example, “The agentless monitoring solution is ideal for small
enterprises where security or the network traffic involved in the monitoring are not key
Agent Based Monitoring
Advantages Disadvantages
•	 Agents run inside of the OS that is being
monitored and can therefore gain a
deep understanding of the OS’ health
•	 Agents can often report health status to
a monitoring console in real time
•	 Agents can often work without requiring
the administrator to open a firewall port
or create a service account
•	 Agents tend to be lightweight and often
consume fewer resources than remote
queries
•	 Agents must be installed and periodically
updated
•	 Agents are OS specific. A Linux agent
won’t work on a Windows system
•	 There have been reported incidents of
malware being able to disable an agent
•	 Some agents consume excessive system
resources
•	 Agents may cause compatibility issues
www.controlup.com
criteria in deciding a monitoring approach. For more critical, complex environments where
in-depth monitoring, root-cause diagnosis, and problem resolution are key, the agent-
based approach is more appropriate. The automatic capability of the eG agents ensures
that the eG agent-based monitoring solution requires near zero maintenance, similar to an
agentless solution.”
In a separate study, Kaseya states that “The performance degradation of agentless and
agent-based IT systems management solutions is essentially the same. However, agent-
based solutions provide inherent availability and security benefits, including the ability
to manage systems during a network outage and the ability to manage systems around
firewalls with no additional configuration.”
A whitepaper from Up Time Software reaches a similar conclusion and states that
“Agentless SNMP solutions do not provide the same level of expansion and integration that
is possible with an agent-based solution; Furthermore, agentless solutions typically do not
provide the facilities to interact with the service platform being monitored with the same
level of functionality as an agent-based solution.” It goes on to say, “a systems monitoring
solution should incorporate both agent based and agentless monitoring options.”
It is easy to fall into the trap of assuming that a monitoring solution must either be
agentless or make use of agents. Both agent based and agentless solutions have their
merits, so maybe it’s time to think about a hybrid solution.

More Related Content

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Which Way to Go – Agent, Agentless or Hybrid?

  • 1. www.controlup.com Agent and Agentless Pros and Cons Products that are designed for operating system level monitoring can be classified as agent-based or agentless. Although it is easy to assume that agentless solutions are superior to their agent-based counterparts, there are some situations in which the use of an agent allows for better all-around functionality. This whitepaper examines the advantages and the disadvantages to the two approaches. Agentless Monitoring In recent years agentless monitoring has gained popularity because agentless technology frees the administrator from tasks related to agent deployment and maintenance and because the absence of an agent minimizes the size of the code base on monitored systems. Vendors offering agentless monitoring solutions have adopted several different techniques for acquiring monitoring data. Some of the more popular agentless monitoring techniques include wire data monitoring, remote query monitoring, and hypervisor monitoring. Wire data monitoring One technique that is sometimes used for agentless monitoring involves monitoring the network rather than monitoring the network endpoints. Wire data monitoring can involve the use of SNMP, but more often it is based on examining packets as they flow across the network. Some examples of products that perform this type of monitoring include Splunk App for Stream and ExtraHop. In most cases wire data monitoring is completely passive, which means that there is little to no performance impact on the systems that are being monitored. A dedicated monitoring station watches traffic as it flows across the network and compiles a near real time status report based on the contents of the traffic. The primary disadvantage to relying solely on wire data monitoring is that wire data monitoring alone does not provide a comprehensive picture of the activity on your network. Depending on your network infrastructure and the monitoring product that is being used, the wire data monitoring software might lack the ability to monitor encrypted communications, traffic flowing across VLANs, Traffic flowing across virtual network segments.
  • 2. www.controlup.com Wire data monitoring software by its very nature is incapable of monitoring the processes that are running on virtual desktops. A wire data monitoring based solution might for example, be able to use traffic patterns or even PING or SMTP based tests to confirm that a specific application is running on a virtual desktop, but the software would not be able to determine how much memory or CPU time the application is consuming because wire data monitoring lacks the ability to monitor processes running within the virtual desktop. Remote Query Monitoring Another technique that is commonly used for agentless monitoring is remote query monitoring. The basic concept behind remote query monitoring is relatively simple. A monitoring server uses a protocol that is natively supported by the target operating system to submit queries to the target endpoint in order to derive its status. These queries can be based on RPC, WMI, or a number of other protocols. Remote query monitoring is quickly becoming the favored approach for agentless monitoring because it can provide a wealth of information about the monitored endpoint. Some of the vendors that use remote query based monitoring include EG Innovations and Nagios. In spite of its many advantages, there are some disadvantages to using remote query monitoring. Perhaps the biggest disadvantage is that the monitoring capabilities are directly tied to the underlying protocol. This is an especially important consideration for organizations that use a heterogeneous collection of operating systems because a protocol that works for monitoring one vendor’s OS might not work for another vendor’s product. WMI for instance is great for monitoring Windows based systems, but isn’t usually going to be an option for monitoring Linux based systems. Wire Data Monitoring Advantages Disadvantages • The monitoring process is completely passive and does not consume resources on monitored systems • Administrators do not have to install or manage agents • There is no need to open firewall ports or create service accounts on monitored systems, which means that those systems should remain secure • Wire data monitoring can track end to end application latency • Wire data monitoring does not have the ability to monitor processes running on network endpoints • Wire data monitoring can only assess endpoint health indirectly • The use of network encryption, vLANs, or virtual network segments can potentially create “blind spots” that cannot be monitored
  • 3. www.controlup.com Another disadvantage to remote query based monitoring is that the queries consume system resources such as storage I/O, memory, CPU cycles, and network bandwidth. Although a query is generally lightweight, it may take hundreds of queries to obtain all of the data necessary to assess a computer’s health, and even then protocol limitations might result in a report that lacks the level of granularity that can be achieved through an agent based solution. Hypervisor Monitoring Our Another form of agentless wire data monitoring that has gained popularity in recent years is hypervisor monitoring. Hypervisor monitoring works because hypervisor vendors such as VMware, Microsoft, and Citrix have built various performance metrics into their products. This allows vendors such as Xangati, SolarWinds, and VMTurbo build products to query the hypervisor and display resource usage statistics. Hypervisor monitoring products can be very powerful. Such products can usually monitor the resources consumed by every individual virtual machine running on the host. Hypervisor monitoring products may also report on host health and may even include tools for load balancing the virtual machine workload or for reclaiming resources from orphaned VMs. The primary disadvantage to hypervisor level monitoring tools is that they lack visibility into individual virtual machines. A hypervisor monitoring product can typically report the memory, CPU, and storage resources being consumed by a virtual machine, but it is Remote Data Monitoring Advantages Disadvantages • Remote query monitoring provides better end-point specific monitoring data than wire data monitoring • Remote query monitoring does not require the installation or maintenance of agents • Depending on the protocols being used, monitoring may not work for some operating systems • A firewall port may need to be open • The query process consumes network resources and resources on the systems that are being monitored • Health information is not displayed in real time because it takes time for queries to complete • Remote query monitoring may require the use of a service account on monitored systems, which can be a security risk
  • 4. www.controlup.com unlikely to be able to tell you who is logged into an individual virtual machine or which processes within a VM are consuming the most memory. Agent Based Monitoring Although agentless monitoring solutions are more capable than they were even just a few years ago, agentless solutions tend to be extremely limited when compared to an agent based solution. Because agent based monitoring solutions rely on processes that are running inside of the OS that is being monitored they can typically gain a higher degree of insight into the operating system’s health than what would be possible using an agentless solution. One of the reasons why agent based monitoring solutions can be so powerful is because they can monitor network endpoints at several different levels. Granted, not every product examines every aspect of the endpoint’s operating system, but as a general rule agent based products such UberAgent and ComTrade when speaking about agent based solutions tend to provide a much more granular view of the guest operating system’s health than their agentless counterparts simply because agent based products are not subject to the operational limitations of an agentless solution. Every monitoring product provides its own unique set of features and capabilities, but as a general rule an agent based product should provide granular insight into individual virtual machines. This might include the ability to examine individual processes that are running on a virtual machine, but an agent might provide additional management capabilities. For example, an administrator might use an agent based solution to remotely execute a script Hypervisor Monitoring Advantages Disadvantages • Hypervisor monitoring works well for determining which VMs are consuming the highest level of VM resources • Hypervisor monitoring can be used to improve VM health by checking for the under provisioning of hardware resources • Some solutions (such as VMTurbo) are able to reclaim resources from over provisioned or orphaned VMs. • You do not typically have to open any firewall ports • Monitoring solutions typically work regardless of the operating system running within the VM • Hypervisor monitoring solutions lack insight into the processes that are running within individual VMs • Hypervisor monitoring solutions lack the ability to quantify the end user experience. Such a solution might for example be able to report how much network bandwidth a virtual desktop is using at a given moment, but would not be able to report on the amount of time that it took to complete the user’s login
  • 5. www.controlup.com on a set of virtual desktops. An agent based product might even monitor a virtual desktop’s health and either take corrective action or notify an administrator if a problem occurs. Hybrid Monitoring An additional technique that is sometimes used is hybrid monitoring. Since agent-based and agentless solutions each have their advantages and disadvantages, some vendors use a hybrid solution that uses multiple monitoring techniques rather than relying on a single approach. The advantage is that agentless monitoring can be used except for when granular detail about an individual virtual machine is required. Only then does the product rely on the use of agents. At other times hybrid monitoring solutions behave more like an agentless monitoring solution. Some of the vendors that offer hybrid monitoring solutions include Goliath Technologies, Systrack, and ControlUp. What Should You Be Using? While it is difficult to deny the convenience of agentless monitoring, agent based monitoring tends to produce more granular monitoring data than agentless solutions. Agentless solutions are dependent on data that can be “sniffed” from network segments or obtained from a network endpoint through a query, but these approaches are limited with regard to the type of monitoring data that can be produced. Agent based solutions have direct access to the endpoints that are being monitored and are therefore able to acquire very granular monitoring data. There are a number of recent studies that have resulted in similar conclusions. According to eG Innovations for example, “The agentless monitoring solution is ideal for small enterprises where security or the network traffic involved in the monitoring are not key Agent Based Monitoring Advantages Disadvantages • Agents run inside of the OS that is being monitored and can therefore gain a deep understanding of the OS’ health • Agents can often report health status to a monitoring console in real time • Agents can often work without requiring the administrator to open a firewall port or create a service account • Agents tend to be lightweight and often consume fewer resources than remote queries • Agents must be installed and periodically updated • Agents are OS specific. A Linux agent won’t work on a Windows system • There have been reported incidents of malware being able to disable an agent • Some agents consume excessive system resources • Agents may cause compatibility issues
  • 6. www.controlup.com criteria in deciding a monitoring approach. For more critical, complex environments where in-depth monitoring, root-cause diagnosis, and problem resolution are key, the agent- based approach is more appropriate. The automatic capability of the eG agents ensures that the eG agent-based monitoring solution requires near zero maintenance, similar to an agentless solution.” In a separate study, Kaseya states that “The performance degradation of agentless and agent-based IT systems management solutions is essentially the same. However, agent- based solutions provide inherent availability and security benefits, including the ability to manage systems during a network outage and the ability to manage systems around firewalls with no additional configuration.” A whitepaper from Up Time Software reaches a similar conclusion and states that “Agentless SNMP solutions do not provide the same level of expansion and integration that is possible with an agent-based solution; Furthermore, agentless solutions typically do not provide the facilities to interact with the service platform being monitored with the same level of functionality as an agent-based solution.” It goes on to say, “a systems monitoring solution should incorporate both agent based and agentless monitoring options.” It is easy to fall into the trap of assuming that a monitoring solution must either be agentless or make use of agents. Both agent based and agentless solutions have their merits, so maybe it’s time to think about a hybrid solution.