Scrutiny alternatives and similar tools
Based on the "Monitoring" category.
Alternatively, view scrutiny alternatives based on common mentions on social networks and blogs.
-
cadvisor
Analyzes resource usage and performance characteristics of running containers. -
VictoriaMetrics
VictoriaMetrics: fast, cost-effective monitoring solution and time series database -
Cabot
Self-hosted, easily-deployable monitoring and alerts service - like a lightweight PagerDuty -
Vector
Vector is an on-host performance monitoring framework which exposes hand picked high resolution metrics to every engineer’s browser. -
Zabbix
Real-time monitoring of IT components and services, such as networks, servers, VMs, applications and the cloud. -
ElastiFlow
Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack -
psdash
A linux system information web dashboard using psutils and flask -
ServerStatus BotoX
Display and monitor your servers statistics in a beatiful way -
PhpSysInfo
phpSysInfo: a customizable PHP script that displays information about your system nicely -
checkmk
Checkmk - Best-in-class infrastructure & application monitoring -
pyDash
Small web-based monitoring dashboard for linux in Python and Django -
Statping-ng
An updated drop-in for statping. A Status Page for monitoring your websites and applications with beautiful graphs, analytics, and plugins. Run on any type of environment. -
Flapjack
Monitoring notification routing + event processing system. For issues with the Flapjack packages, please see https://github.com/flapjack/omnibus-flapjack/ -
Thruk
Thruk is a multibackend monitoring webinterface for Naemon, Nagios, Icinga and Shinken using the Livestatus API. -
ServerStatus moejda
Server Status website script, displays uptime (days), free RAM, free HDD. -
eZ Server Monitor
eZ Server Monitor`Web - A simple and lightweight dashboard for Linux -
AS-Stats v1.6 (2014-09-12)
A simple tool to generate per-AS traffic graphs from NetFlow/sFlow records -
SWMP - Server Web Monitor Page
A responsive, eye-pleasing Linux server statistics dashboard. -
Check VMware API
An op5 Monitor/Naemon plugin to monitor VMware virtualization environment -
Centreon
Centreon is a network, system and application monitoring tool. Centreon is the only AIOps Platform Providing Holistic Visibility to Complex IT Workflows from Cloud to Edge. -
netcheck
Netcheck API - Website performance and availability monitoring app -
EdMon
A command-line monitoring application helping you to check that your hosts and services are available, with notifications support. MIT Java -
NetXMS
Open Source network and infrastructure monitoring and management. (Source Code)
Access the most powerful time series database as a service
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of Scrutiny or a related project?
Popular Comparisons
README
scrutiny
WebUI for smartd S.M.A.R.T monitoring
NOTE: Scrutiny is a Work-in-Progress and still has some rough edges.
Introduction
If you run a server with more than a couple of hard drives, you're probably already familiar with S.M.A.R.T and the smartd
daemon. If not, it's an incredible open source project described as the following:
smartd is a daemon that monitors the Self-Monitoring, Analysis and Reporting Technology (SMART) system built into many ATA, IDE and SCSI-3 hard drives. The purpose of SMART is to monitor the reliability of the hard drive and predict drive failures, and to carry out different types of drive self-tests.
Theses S.M.A.R.T hard drive self-tests can help you detect and replace failing hard drives before they cause permanent data loss. However, there's a couple issues with smartd
:
- There are more than a hundred S.M.A.R.T attributes, however
smartd
does not differentiate between critical and informational metrics smartd
does not record S.M.A.R.T attribute history, so it can be hard to determine if an attribute is degrading slowly over time.- S.M.A.R.T attribute thresholds are set by the manufacturer. In some cases these thresholds are unset, or are so high that they can only be used to confirm a failed drive, rather than detecting a drive about to fail.
smartd
is a command line only tool. For head-less servers a web UI would be more valuable.
Scrutiny is a Hard Drive Health Dashboard & Monitoring solution, merging manufacturer provided S.M.A.R.T metrics with real-world failure rates.
Features
Scrutiny is a simple but focused application, with a couple of core features:
- Web UI Dashboard - focused on Critical metrics
smartd
integration (no re-inventing the wheel)- Auto-detection of all connected hard-drives
- S.M.A.R.T metric tracking for historical trends
- Customized thresholds using real world failure rates
- Temperature tracking
- Provided as an all-in-one Docker image (but can be installed manually)
- Future Configurable Alerting/Notifications via Webhooks
- (Future) Hard Drive performance testing & tracking
Getting Started
RAID/Virtual Drives
Scrutiny uses smartctl --scan
to detect devices/drives.
- All RAID controllers supported by
smartctl
are automatically supported by Scrutiny.- While some RAID controllers support passing through the underlying SMART data to
smartctl
others do not. - In some cases
--scan
does not correctly detect the device type, returning incomplete SMART data. Scrutiny supports overriding detected device type via the config file: see example.collector.yaml
- While some RAID controllers support passing through the underlying SMART data to
- If you use docker, you must pass though the RAID virtual disk to the container using
--device
(see below)- This device may be in
/dev/*
or/dev/bus/*
. - If you're unsure, run
smartctl --scan
on your host, and pass all listed devices to the container.
- This device may be in
See [docs/TROUBLESHOOTING_DEVICE_COLLECTOR.md](./docs/TROUBLESHOOTING_DEVICE_COLLECTOR.md) for help
Docker
If you're using Docker, getting started is as simple as running the following command:
See [docker/example.omnibus.docker-compose.yml](./docker/example.omnibus.docker-compose.yml) for a docker-compose file.
docker run -it --rm -p 8080:8080 -p 8086:8086 \
-v `pwd`/scrutiny:/opt/scrutiny/config \
-v `pwd`/influxdb2:/opt/scrutiny/influxdb \
-v /run/udev:/run/udev:ro \
--cap-add SYS_RAWIO \
--device=/dev/sda \
--device=/dev/sdb \
--name scrutiny \
ghcr.io/analogj/scrutiny:master-omnibus
/run/udev
is necessary to provide the Scrutiny collector with access to your device metadata--cap-add SYS_RAWIO
is necessary to allowsmartctl
permission to query your device SMART data- NOTE: If you have NVMe drives, you must add
--cap-add SYS_ADMIN
as well. See issue #26
- NOTE: If you have NVMe drives, you must add
--device
entries are required to ensure that your hard disk devices are accessible within the container.ghcr.io/analogj/scrutiny:master-omnibus
is a omnibus image, containing both the webapp server (frontend & api) as well as the S.M.A.R.T metric collector. (see below)
Hub/Spoke Deployment
In addition to the Omnibus image (available under the latest
tag) there are 2 other Docker images available:
ghcr.io/analogj/scrutiny:master-collector
- Contains the Scrutiny data collector,smartctl
binary and cron-like scheduler. You can run one collector on each server.ghcr.io/analogj/scrutiny:master-web
- Contains the Web UI, API and Database. Only one container necessary
See [docker/example.hubspoke.docker-compose.yml](./docker/example.hubspoke.docker-compose.yml) for a docker-compose file.
docker run --rm -p 8086:8086 \
-v `pwd`/influxdb2:/var/lib/influxdb2 \
--name scrutiny-influxdb \
influxdb:2.2
docker run --rm -p 8080:8080 \
-v `pwd`/scrutiny:/opt/scrutiny/config \
--name scrutiny-web \
ghcr.io/analogj/scrutiny:master-web
docker run --rm \
-v /run/udev:/run/udev:ro \
--cap-add SYS_RAWIO \
--device=/dev/sda \
--device=/dev/sdb \
-e COLLECTOR_API_ENDPOINT=http://SCRUTINY_WEB_IPADDRESS:8080 \
--name scrutiny-collector \
ghcr.io/analogj/scrutiny:master-collector
Manual Installation (without-Docker)
While the easiest way to get started with Scrutiny is using Docker, it is possible to run it manually without much work. You can even mix and match, using Docker for one component and a manual installation for the other.
See [docs/INSTALL_MANUAL.md](docs/INSTALL_MANUAL.md) for instructions.
Usage
Once scrutiny is running, you can open your browser to http://localhost:8080
and take a look at the dashboard.
If you're using the omnibus image, the collector should already have run, and your dashboard should be populate with every drive that Scrutiny detected. The collector is configured to run once a day, but you can trigger it manually by running the command below.
For users of the docker Hub/Spoke deployment or manual install: initially the dashboard will be empty. After the first collector run, you'll be greeted with a list of all your hard drives and their current smart status.
docker exec scrutiny /opt/scrutiny/bin/scrutiny-collector-metrics run
Configuration
By default Scrutiny looks for its YAML configuration files in /opt/scrutiny/config
There are two configuration files available:
- Webapp/API config via
scrutiny.yaml
- [example.scrutiny.yaml](example.scrutiny.yaml). - Collector config via
collector.yaml
- [example.collector.yaml](example.collector.yaml).
Neither file is required, however if provided, it allows you to configure how Scrutiny functions.
Cron Schedule
Unfortunately the Cron schedule cannot be configured via the collector.yaml
(as the collector binary needs to be trigged by a scheduler/cron).
However, if you are using the official ghcr.io/analogj/scrutiny:master-collector
or ghcr.io/analogj/scrutiny:master-omnibus
docker images,
you can use the COLLECTOR_CRON_SCHEDULE
environmental variable to override the default cron schedule (daily @ midnight - 0 0 * * *
).
docker run -e COLLECTOR_CRON_SCHEDULE="0 0 * * *" ...
Notifications
Scrutiny supports sending SMART device failure notifications via the following services:
- Custom Script (data provided via environmental variables)
- Webhooks
- Discord
- Gotify
- Hangouts
- IFTTT
- Join
- Mattermost
- Pushbullet
- Pushover
- Slack
- Teams
- Telegram
- Tulip
Check the notify.urls
section of [example.scrutiny.yml](example.scrutiny.yaml) for examples.
For more information and troubleshooting, see the [TROUBLESHOOTING_NOTIFICATIONS.md](./docs/TROUBLESHOOTING_NOTIFICATIONS.md) file
Testing Notifications
You can test that your notifications are configured correctly by posting an empty payload to the notifications health check API.
curl -X POST http://localhost:8080/api/health/notify
Debug mode & Log Files
Scrutiny provides various methods to change the log level to debug and generate log files.
Web Server/API
You can use environmental variables to enable debug logging and/or log files for the web server:
DEBUG=true
SCRUTINY_LOG_FILE=/tmp/web.log
You can configure the log level and log file in the config file:
log:
file: '/tmp/web.log'
level: DEBUG
Or if you're not using docker, you can pass CLI arguments to the web server during startup:
scrutiny start --debug --log-file /tmp/web.log
Collector
You can use environmental variables to enable debug logging and/or log files for the collector:
DEBUG=true
COLLECTOR_LOG_FILE=/tmp/collector.log
Or if you're not using docker, you can pass CLI arguments to the collector during startup:
scrutiny-collector-metrics run --debug --log-file /tmp/collector.log
Supported Architectures
Architecture Name | Binaries | Docker |
---|---|---|
linux-amd64 | :white_check_mark: | :white_check_mark: |
linux-arm-5 | :white_check_mark: | |
linux-arm-6 | :white_check_mark: | |
linux-arm-7 | :white_check_mark: | web/collector only. see #236 |
linux-arm64 | :white_check_mark: | :white_check_mark: |
freebsd-amd64 | :white_check_mark: | |
macos-amd64 | :white_check_mark: | :white_check_mark: |
macos-arm64 | :white_check_mark: | :white_check_mark: |
windows-amd64 | :white_check_mark: | WIP, see #15 |
windows-arm64 | :white_check_mark: |
Contributing
Please see the [CONTRIBUTING.md](CONTRIBUTING.md) for instructions for how to develop and contribute to the scrutiny codebase.
Work your magic and then submit a pull request. We love pull requests!
If you find the documentation lacking, help us out and update this README.md. If you don't have the time to work on Scrutiny, but found something we should know about, please submit an issue.
Versioning
We use SemVer for versioning. For the versions available, see the tags on this repository.
Authors
Jason Kulatunga - Initial Development - @AnalogJ
Licenses
- MIT
- Logo: Glasses by matias porta lezcano
Sponsors
Scrutiny is only possible with the help of my Github Sponsors.
They read a simple reddit announcement post and decided to trust & finance a developer they've never met. It's an exciting and incredibly humbling experience.
If you found Scrutiny valuable, please consider supporting my work
*Note that all licence references and agreements mentioned in the Scrutiny README section above
are relevant to that project's source code only.