Home > Agentless monitoring - it's not what you think

Agentless monitoring - it's not what you think

Cristian Anechitei
By Cristian Anechitei on Jun 05, 2019

A discussion point we often stumble across in our conversations with customers is: agent vs. agentless monitoring.

It is an interesting topic to debate, so in this article we're going to explore this topic deeper, more specifically we're going to talk about agentless monitoring and why we believe that the term is often misused.

IT departments typically use a monitoring software solution to get (among others) a better overview of the health of their IT infrastructure and be notified as soon as possible about potential issues which could lead to disruptions of daily operations or cause outages. 

As companies grow, so does the complexity of their internal systems. Today, system administrators need to monitor all sorts of devices both physical (e.g. servers, routers, switchesstorage devices) and virtual (e.g. virtual machines, containers and cloud infrastructure) as well as middleware and applications.

In order to provide an accurate overview over a systems' performance, an IT monitoring software needs a way to collect data from all connected devices. This process typically involves installing an agent, which is a small executable file provided by the vendor of your chosen IT monitoring solution, on the target device (thus the term agent-based monitoring).

The agent's job is to collect data about the device's performance and report it back to the IT monitoring software. Pretty straight forward, right?

So, what is agentless monitoring?

Like with any other type of technology that we use there are also exceptions to the approach mentioned above, namely those devices which do not require the installation of a 3rd party agent in order to monitor performance.

These systems can provide data either through an application-specific API (e.g. VMware) or rely on a standardized technology. Here we primarily refer to two different technologies SNMP (Simple Network Management Protocol) and WMI (Windows Management Instrumentation), although there are many others that can be used. Without going into too much detail:

- WMI is the Microsoft-based technology used for monitoring and managing Windows-based systems. IT monitoring solutions use the WMI protocol to access the data of various parameters and status values. However, this approach has a high impact on a system's performance and can cause issues.

- SNMP is more general and allows users to monitor a wider range of systems (Windows, Linux, Unix) and other devices (routers, switches etc.). It comes with its own set of drawbacks, e.g. data consistency issues and cumbersome to safeguard

There are advantages and disadvantages on both sides, so a detailed discussion about the pros & cons of using WMI or SNMP will have to be part of another article.

Now, the reason we say that there's no such thing as agentless monitoring is because when software vendors talk about their solution as having “agentless monitoring” capabilities what they typically really mean is you don't need to install our 3rd party agent in order to monitor that target device

Of course there is an exception: when you monitor only using APIs, then you in fact are monitoring agentless. But this is typically only possible for applications and virtualized systems. Almost all hardware and operating systems do not have such an API, thus we will exclude this aspect in this article.

So, why is that?

It is a matter of definition: on some devices (e.g. routers, switches) you don't need / cannot actually install a 3rd party agent. Additionally, the vendors who provide such devices add by default a built-in monitoring agent (based on defined industry standards) that can provide data about the device's performance. 

Technically speaking, you can perform agentless monitoring on these devices. The reality is that you're receiving data from a native software agent that is just built into the platform (thus eliminating the need to install a 3rd party monitoring agent). 

You're still using a monitoring agent to collect data about the device, it's just not the one provided by your chosen IT monitoring software vendor. Thus, we differentiate between using a dedicated monitoring agent (agent-based monitoring) and using a native, built-in solution (agentless monitoring).

The pros and cons of agentless monitoring

Although we may not agree with the typical use of this term as it is often misleading, we'd like to continue by discussing the pros & cons of using this approach.

Advantages of agentless monitoring

There are a couple of advantages when it comes to using the native, built-in monitoring agent and they can be summed up as:

  • it is a 'less intrusive' way of monitoring your devices (although it also raises serious security concerns which we'll talk about in a bit)
  • it is easy & fast to deploy (involves having less moving parts in your monitoring environment)
  • lower maintenance costs, since there's no need to constantly upgrade/update agents
  • a lower total cost of ownership (TCO)

Disadvantages of agentless monitoring 

Here are some of the shortcomings of agentless monitoring and why an agent-based monitoring approach makes more sense:

  • security issues: agentless monitoring uses interfaces that allow remote access. With WMI or SNMP, in addition to accessing a device's performance data, a user also gets capability management access (e.g. rebooting a server). While a proper configuration will help reduce the risk of unwanted behavior occurring, through this approach the responsibility is left entirely to the user and his/her level of understanding of the agentless technologies that they're using.
  • in-depth metrics: while agentless monitoring is less intrusive, it also is limited in terms of the data that it collects. As an IT admin, you will most likely want to go beyond the standard metrics for your IT infrastructure and this is where the agent-based monitoring approach comes into place since it provide broader & deeper monitoring capabilities and a richer set of info for analysis.
  • configuration flexibility: in an agent-based monitoring setup, agents can often be extended to monitor more than one thing (e.g. collect general data about the operating system and application-specific data). Extending the monitoring capabilities of an agentless solution to include custom application and service monitors is either very difficult to implement or simply not possible.

What monitoring approach should I use?

So, which approach is better? Should you go for agent-based or agentless monitoring?

This depends very much on the systems you want to monitor, e.g. most hardware can only be monitored via SNMP. On the other hand, some systems do not come with a pre-installed monitoring agent, e.g. in Linux you have to install and configure a SNMP agent. Thus, you are quite restricted in your choice and thus it becomes irrelevant to decide between one or the other approach. A good monitoring solution has to incorporate both agent-based and agentless monitoring options.

Therefore, we think there are different aspects, which are more relevant:

  • Does the monitoring system use pre-installed agents / APIs in case they already exist and are reliable, secure and deliver enough information?
  • Does the monitoring system have own agents, which are light-weight, secure and easy to maintain for all other cases?
  • Does the monitoring system have a broad coverage of the things you want to monitor - without breaking your budget?

As you can see, the question is on a such a generic level irrelevant. Thus, in the next articles in this series, we will go deeper into topics like:

  • The difference between a great monitoring agent and one you rather shouldn't use
  • Should you monitor Windows with WMI or with a dedicated agent?
    Or why we believe that WMI is insufficient for real monitoring...
  • Should you monitor Linux with SNMP or with a dedicated agent?

Wanted: IT Monitoring Superheroes

Do you have an interesting story about working with Checkmk?

We'd like to hear from you!

Learn more
checkmk superhero

By posting a comment to this blog article or by subscribing to our blog notification system, you agree to our Privacy and Cookie Policy and consent that tribe29 GmbH can process your data and may contact you, if needed, in regards to the above mentioned purposes.