
{"id":320,"date":"2008-02-21T17:58:58","date_gmt":"2008-02-21T20:58:58","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=320"},"modified":"2008-02-21T17:58:58","modified_gmt":"2008-02-21T20:58:58","slug":"monitorizacion-de-sistemas-mediante-cacti","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/","title":{"rendered":"Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti"},"content":{"rendered":"<p>En el blog de Jos\u00c3\u00a9 Mar\u00c3\u00ada, hay <a href=\"http:\/\/blog.unlugarenelmundo.es\/2008\/02\/21\/anda-animate-a-usar-cacti\/\">una entrada muy interesante<\/a>. Se trata de un comentario acerca de <a href=\"http:\/\/www.cacti.net\/download_cacti.php\">Cacti<\/a>, un sistema de monitorizaci\u00c3\u00b3n, cuya principal ventaja estriba en su car\u00c3\u00a1cter multiplataforma, ya que puede ser utilizado en Linux y en Windows.<\/p>\n<p>Cacti es una soluci\u00c3\u00b3n para la representaci\u00c3\u00b3n gr\u00c3\u00a1fica de datos de monitorizaci\u00c3\u00b3n de red, y est\u00c3\u00a1 basada en <a href=\"http:\/\/oss.oetiker.ch\/rrdtool\/doc\/rrdtool.en.html\">RRDTool<\/a> (Round Robin Database Tool), una soluci\u00c3\u00b3n de gesti\u00c3\u00b3n de logs y representaci\u00c3\u00b3n gr\u00c3\u00a1fica muy extendida y popular por su calidad, trayectoria y por las enormes ventajas que tiene que sea c\u00c3\u00b3digo libre seg\u00c3\u00ban GPL.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.cacti.net\/images\/cacti_promo_main.png\" alt=\"cacti\" \/><\/p>\n<p>El motor RRDTool est\u00c3\u00a1 ampliamente diseminado, y son muchas las aplicaciones que se basan en \u00c3\u00a9l. Adem\u00c3\u00a1s de Cacti, me vienen a la cabeza proyectos GPL como <a href=\"http:\/\/www.centreon.com\/\">Centreon<\/a>, <a href=\"http:\/\/oss.oetiker.ch\/smokeping\">Smokeping<\/a>, <a href=\"http:\/\/www.zenoss.org\/\">Zennos<\/a>, <a href=\"http:\/\/graphs.eluna.org\/\">eLuna<\/a>, <a href=\"http:\/\/collectd.org\/\">collectd<\/a>, <a href=\"http:\/\/freshmeat.net\/projects\/bbstatus\/\">BBStatus<\/a> o <a href=\"http:\/\/www.elegant-software.com\/software\/aware\/\">Aware<\/a>, por citar algunos ejemplos.<\/p>\n<p>Cacti es tambi\u00c3\u00a9n software GPL, y puede obtenerse gratu\u00c3\u00adtamente en <a href=\"http:\/\/www.cacti.net\/download_cacti.php\">http:\/\/www.cacti.net\/download_cacti.php<\/a><\/p>\n<p>Fuente: http:\/\/www.sahw.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En el blog de Jos\u00c3\u00a9 Mar\u00c3\u00ada, hay una entrada muy interesante. Se trata de un comentario acerca de Cacti, un sistema de monitorizaci\u00c3\u00b3n, cuya principal ventaja estriba en su car\u00c3\u00a1cter multiplataforma, ya que puede ser utilizado en Linux y en Windows. Cacti es una soluci\u00c3\u00b3n para la representaci\u00c3\u00b3n gr\u00c3\u00a1fica de datos de monitorizaci\u00c3\u00b3n de red, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-320","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti\",\"datePublished\":\"2008-02-21T20:58:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\"},\"wordCount\":177,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.cacti.net\/images\/cacti_promo_main.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.cacti.net\/images\/cacti_promo_main.png\",\"datePublished\":\"2008-02-21T20:58:58+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage\",\"url\":\"http:\/\/www.cacti.net\/images\/cacti_promo_main.png\",\"contentUrl\":\"http:\/\/www.cacti.net\/images\/cacti_promo_main.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti","datePublished":"2008-02-21T20:58:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/"},"wordCount":177,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage"},"thumbnailUrl":"http:\/\/www.cacti.net\/images\/cacti_promo_main.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/","url":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Monitorizaci\u00c3\u00b3n de sistemas mediante Cacti","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage"},"thumbnailUrl":"http:\/\/www.cacti.net\/images\/cacti_promo_main.png","datePublished":"2008-02-21T20:58:58+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/monitorizacion-de-sistemas-mediante-cacti\/#primaryimage","url":"http:\/\/www.cacti.net\/images\/cacti_promo_main.png","contentUrl":"http:\/\/www.cacti.net\/images\/cacti_promo_main.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}