Home page logo

basics logo Security Basics mailing list archives

RE: Graphing Tool
From: Damien.Manuel () doi vic gov au
Date: Tue, 9 Mar 2004 12:30:51 +1100


Netsaint is now called Nagios (www.nagios.org) if anyone is looking for it.


Damien Manuel, CISSP

Department of Infrastructure
Level 12, 80 Collins Street,
Melbourne, VIC 3000
Phone: 03 9655 8590
Mobile: 0424070878
Email: damien.manuel () doi vic gov au

                      Francisco Rodrigo                                                                                 
                      Cortiñas                 To:       "'Tony Kava'" <securityfocus () pottcounty com>                
                      <frcmsec () terra es        cc:       <security-basics () securityfocus com>                      
                      >                        Subject:  RE: Graphing Tool                                              
                      06/03/04 02:20 AM                                                                                 

Francisco Rodrigo Cortiñas.
When I worked for an ISP, I recommended them to use apps like, Big
Sister, Netsaint and similar, to make a web interface to monitor network
and server status. But If you have the ability to make the scripts on
your own and don’t want the interface, then I would use only RRD to make
the graphs; the only thing you need is: separate MRTG from RRD (or
download it), create your own customized databases, feed them with your
data and use them to feed the graphs. The input is customized by the
scripts you use to feed the databases and the config of the databases
(time intervals and others). You also could use the tools of RRD to
extract and manipulate the data. There are a lot of manuals of RRD on
Internet to explain how to do it.

If you only need a command line utility to only plot the data, gnuplot
and similar would be useful to you. Go and see sourceforge.net for more.

If you feel you need something more, and have time to learn, I recommend
you to use a language named TCL to make a graphic app to show the graphs
(it isn’t too difficult, the language is very friendly, and has modules
to make the graphs and other stuff for you). The results could be, with
some practice, very impressive (also recommend you to search
sourceforge.net for some examples).

Francisco Rodrigo Cortiñas.

-----Mensaje original-----
De: Tony Kava [mailto:securityfocus () pottcounty com]
Enviado el: martes, 02 de marzo de 2004 17:04
Para: security-basics () securityfocus com
Asunto: Graphing Tool


I'm looking for a command-line utility to run on a Linux platform that
generate some line or bar graphs based on basic data such as number of
e-mail messages rejected, etc.  I do use MRTG to monitor network devices
5 minute intervals, but I'm interested in automatically generating some
graphs based on daily totals instead of constant gauge readings.
Perhaps I
can adjust interval settings for MRTG (or RRDTOOL) to accomplish this.

I don't need anything to generate the data, I can script that, but I'm
interested in what others are using to generate graphs like this.  For
example I may want to have a graph showing total junk messages rejected
the past seven days with one bar (or line point) for each day.  This is
generally a job for a spreadsheet (i.e. Excel), but I want to automate
so I can view the output on a web interface.

What tools are people using to generate such graphs?


Tony Kava
Senior Network Administrator
Pottawattamie County, Iowa

Free 30-day trial: firewall with virus/spam protection, URL filtering,
wireless security

Protect your network against hackers, viruses, spam and other risks with
Security Linux, the comprehensive security solution that combines six
applications in one software solution for ease of use and lower total
cost of

Download your free trial at

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less

to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the
of an Ethical Hacker to better assess the security of your organization.
Visit us at:

Any personal or sensitive information contained in this email and
attachments must be handled in accordance with the Victorian Information
Privacy Act 2000, the Health Records Act 2001 or the Privacy Act 1988
(Commonwealth), as applicable.

This email, including all attachments, is confidential.  If you are not the
intended recipient, you must not disclose, distribute, copy or use the
information contained in this email or attachments.  Any confidentiality or
privilege is not waived or lost because this email has been sent to you in
error.  If you have received it in error, please let us know by reply
email, delete it from your system and destroy any copies.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]