{"id":12289,"date":"2020-07-24T09:34:50","date_gmt":"2020-07-24T13:34:50","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=12289"},"modified":"2024-05-07T08:27:04","modified_gmt":"2024-05-07T12:27:04","slug":"agentless-vs-agent-based-monitoring","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/","title":{"rendered":"Agent vs Agentless Monitoring Pros and Cons"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12300\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-monitoring-decisions.jpg\" alt=\"Agent vs Agentless Monitoring is a critical decision\" width=\"300\" height=\"200\" border=\"0\" \/>Talk about performance monitoring to any system admin or IT manager and one of the first questions they will ask is whether you are using agent or agentless monitoring. The moment you hear that <a href=\"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/\">agent vs agentless monitoring<\/a> question, you know that they are interested in an <a href=\"https:\/\/www.eginnovations.com\/product\/capabilities\/agentless-monitoring\">agentless monitoring solution<\/a>. This is usually driven by the fear of having agents on critical servers in the infrastructure!<\/p>\n<div class=\"tips-box\" style=\"display: inline-block; margin-top: 0!important; margin-bottom: 30px; padding: 25px 20px 8px 20px;\">\n<ul class=\"hand-color\" style=\"margin-bottom: 10px;\">\n<li style=\"font-size: 21px;\">In this article, we will discuss:<\/li>\n<\/ul>\n<ul>\n<li>How agentless monitoring evolved<\/li>\n<li>Why complete agentless monitoring may not be feasible anymore<\/li>\n<li>Why IT teams must rely on a combination of agent and agentless monitoring techniques<\/li>\n<\/ul>\n<\/div>\n<p>Truth be told, we don&#8217;t think that the discussion should be around agent vs agentless monitoring because there are pros and cons to each. In fact, as we&#8217;ll discuss in this article, a combination approach might be the best option.<\/p>\n<table class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h3>The Advent of Agentless Monitoring<\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Monitoring of network devices has always been agentless \u2013 using SNMP, packet sniffers, flow analyzers, etc. Until the late 90s, almost all performance monitoring of servers and applications was agent-based. One of the first agentless monitoring solutions was Mercury SiteScope \u2013 now <a href=\"https:\/\/www.microfocus.com\/en-us\/products\/sitescope-application-monitoring\/overview\">Micro Focus SiteScope<\/a>. Since then several agentless monitoring solutions have emerged.<\/p>\n<p style=\"margin-bottom: 15px;\">Agentless monitoring is attractive because:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Agents used to be heavyweight<\/strong>: Monitoring in the 90s was dominated by the Big 4 vendors \u2013 HP, BMC, CA, and IBM. During those times, monitoring agents used to be heavyweight, taking up a lot of CPU and memory resources on the servers they ran on. Furthermore, when an agent malfunctioned, it affected the performance of the server and the applications it monitored.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/monitoring-agents-view.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12308 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/monitoring-agents.jpg\" alt=\"How agentless monitoring works\" width=\"540\" height=\"304\" border=\"0\" \/><\/a><\/p>\n<ul>\n<li><strong>Agentless monitoring is easier to maintain<\/strong>: Deployment and maintenance of agents was also complicated then. Agentless monitoring allowed administrators to monitor servers and applications without installing any software on the servers being monitored. Protocols and APIs like SSH, WMI, and others were used to collect the same metrics that agents would collect. Agentless monitoring is often performed using a dedicated appliance in the network. Only one device \u2013 the appliance performing agentless monitoring \u2013 had to be managed. Deployment of upgrades and devices was simple as well \u2013 only the appliance that performs the monitoring has to be upgraded.<\/li>\n<\/ul>\n<table class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h3>Complete Agentless Monitoring is No Longer Feasible<\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin-bottom: 15px;\">In the last two decades, IT infrastructures have changed significantly and agentless monitoring in its earlier form is no longer feasible for several reasons:<\/p>\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12302\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-monitoring-security.png\" alt=\"Security limits on Agentless Monitoring requires a remote access to servers and applications\" width=\"101\" height=\"101\" border=\"0\" \/><strong>Increased focus on security limits the applicability of agentless monitoring<\/strong>: Firstly, these days, IT environments are constantly being scrutinized for how they handle security. Agentless monitoring requires remote access to the servers and applications being monitored from one location. Communication from the agentless monitoring appliance to the target servers and applications is possible only if a number of TCP ports are enabled. This is often a challenge particularly in security conscious environments. Also, the agentless monitoring appliance is a single point of vulnerability \u2013 if this appliance is compromised, a hacker could access all the servers and applications being monitored.<\/li>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12307\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/increased-security.png\" alt=\"increased-security\" width=\"101\" height=\"101\" border=\"0\" \/><strong>Increased security in modern operating systems<\/strong>: Every new version of an operating system has additional security. This means that deploying just an agentless monitoring appliance is no longer sufficient. Therefore, configuration of agentless monitoring is not a breeze anymore. Additional configurations must be performed on all the monitored servers to enable the agentless monitoring appliance to connect to them.<\/li>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12301\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-monitoring-overhead.png\" alt=\"Agentless monitoring does not have zero overhead.\" width=\"101\" height=\"101\" border=\"0\" \/><strong>Agentless monitoring does not have zero overhead: <\/strong>It is now well understood that agentless monitoring also has overheads. Most often, the same interfaces\/APIs\/commands used by an agent are also used for agentless monitoring. Therefore, the data collection overhead of agentless monitoring is not negligible. At the same time, with agentless monitoring, the raw data from monitoring is transmitted from the server being monitored to the agentless monitoring appliance. This can result in significant bandwidth overhead when using an agentless monitoring approach. \u00a0Consider the example of a log file being monitored. An agent installed on a server can track the new additions to the log easily whereas an agentless monitoring appliance will need to get the entire log each time and review the recent changes in it. This results in a significant network overhead.<\/li>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12303\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-monitoring-troubleshooting.png\" alt=\"There are challenges to troubleshooting problems with Agentless Monitoring\" width=\"101\" height=\"101\" border=\"0\" \/><strong>Challenges in troubleshooting problems due to agentless monitoring<\/strong>: With an agent-based monitoring approach, it is possible to quantify the overhead of monitoring: one can track the resources used by the agent and any executables it spawns. With an agentless monitoring approach, as there is no single process that performs monitoring on a server, it is not straightforward to quantify the monitoring overhead. Hence, troubleshooting of any performance issues caused by the monitoring system is harder to track.<\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/depth-of-monitoring.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12304\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/depth-of-monitoring.png\" alt=\"depth of monitoring\" width=\"101\" height=\"101\" border=\"0\" \/><\/a><strong>Depth of monitoring is severely reduced with agentless monitoring<\/strong>: Agents running on a server, or one integrated with an application, can collect a lot of metrics. For instance, it is possible to snoop on all requests to an application using an agent installed on the application\u2019s server. Agentless monitoring cannot support this capability. Hence, the depth of monitoring is severely reduced in many cases when an agentless monitoring approach is used. Also, many operating systems and applications do not expose many remote APIs. This also makes agentless monitoring difficult.<\/li>\n<\/ul>\n<p>Because of all the above reasons, it is no longer feasible to have a monitoring system that is 100% agentless.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/white-paper\/it-key-considerations\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12305 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/01\/Key-Considerations-Whitepapers.jpg\" alt=\"How to choose an IT monitoring system - free whitepaper\" width=\"850\" height=\"200\" border=\"0\" \/><\/a><\/p>\n<table class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h3>When is Agentless Monitoring Preferred?<\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-12318\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/word-cloud-300x170.png\" alt=\"\" width=\"300\" height=\"170\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/word-cloud.png 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/word-cloud-140x79.png 140w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"margin-bottom: 15px;\">The above arguments are made only to highlight the challenges in adopting agentless monitoring. It does not mean that all monitoring must be agent-based. There are several scenarios where agentless monitoring is still required:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/network-monitoring\"><strong>Monitoring of network devices <\/strong><\/a>(routers, switches, firewalls, etc.) must be predominantly agentless \u2013 using SNMP polling, SNMP traps, flow data, etc.<\/li>\n<li><strong><a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/storage-monitoring\">Monitoring of storage platforms<\/a>: <\/strong>It is not possible to install agents on storage devices. Command line interfaces, SNMP, and <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/documentation\/Dell-Compellent\/Configuring-the-Dell-Compellent.htm\">SMI-S<\/a> are some of the ways in which storage platforms can be monitored in an agentless manner.<\/li>\n<li><strong>Monitoring of advanced networking platforms: <\/strong>Devices like Citrix NetScaler, F5 BigIP, etc., perform a wide range of functions. These devices act as network accelerators, <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/documentation\/Cisco-VPN-Concentrators\/Introduction-to-Cisco-VPN-Concentrators-Monitoring.htm\">VPN concentrators,<\/a> load balancers, protocol proxies, etc. These devices run as appliances and administrators will not be able to install agents on them. Hence, an agentless monitoring approach is preferred.<\/li>\n<li><strong>Monitoring of virtualization platforms <\/strong>(<a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/vmware-monitoring\">VMware vSphere<\/a>, <a href=\"https:\/\/www.eginnovations.com\/documentation\/Citrix-Hypervisor\/Introduction-to-Citrix-XenServer-Monitoring.htm\">Citrix Hypervisor<\/a>, <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/nutanix-monitoring\">Nutanix Acropolis<\/a>, etc.) is also agentless. Most virtualization vendors do not recommend installing agents on their server platforms. REST\/Web service APIs provide a great degree of detail about the performance of the hypervisors and VMs running on them.<\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/product\/cloud-monitoring\"><strong>Monitoring of cloud platforms <\/strong><\/a>(<a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/aws-monitoring\">AWS<\/a>, <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/azure-monitoring\">Azure<\/a>, Google Cloud, <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/documentation\/Alibaba\/What-is-Alibaba-Cloud.htm\">Alibaba Cloud,<\/a> etc.) must be agentless. Customers do not have direct access to the cloud infrastructure. So, agent-based monitoring is not an option. APIs such as CloudWatch are used to monitor the cloud platforms.<\/li>\n<li><strong>Monitoring of SaaS applications <\/strong>(Salesforce, <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/office-365-monitoring\">Microsoft 365<\/a>, etc.) also must be agentless. APIs from the respective SaaS platform vendors must be used.<\/li>\n<li><strong><a href=\"https:\/\/www.eginnovations.com\/real-user-monitoring\">Monitoring of real user experience<\/a> for web applications: <\/strong>Real User Monitoring for web applications is based on Javascript injection techniques. This is done in an agentless manner: the Javascript executes on client browsers, performance metrics are sent to a RUM collector, which then aggregates metrics and reports performance data to the management server.<\/li>\n<\/ul>\n<table class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h3>A Combination of Agent and Agentless Monitoring is Required<\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-12299 size-medium\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-agent-monitoring-requrements.jpg\" alt=\"A combination of Agentless and Agent based monitoring is usually required for most infrastructures.\" width=\"300\" height=\"200\" border=\"0\" \/>Legacy operating systems, such as Windows and Unix, do not support the type of APIs that new-age technologies like virtualization, containers, and cloud platforms have. Hence, an agent-based approach is preferred to monitor Windows and Unix platforms and applications running on them. An agent running on a system offers other benefits as well. For instance, remote actions on a server are more effectively performed using an agent on the system. Accurate auto-discovery of applications and application instances running on a server is only possible using an agent on the system (the agent can access application configuration files, registry entries, etc., locally).<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-agent-monitoring-architecture-view.jpg\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12317 size-large\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/agentless-agent-monitoring-architecture.jpg\" alt=\"eG Enterprise uses a combination of agent based and agentless monitoring for complete performance management.\" width=\"600\" height=\"470\" border=\"0\" \/><\/a><\/p>\n<p><center class=\"caption_block\" style=\"font-size: 14px;\"><em>eG Enterprise uses a combination of agent-based and agentless monitoring<\/em><\/center><\/p>\n<p style=\"margin-bottom: 15px;\">The above discussion highlights why eG Enterprise relies on a combination of agent and agentless monitoring. To overcome the typical challenges faced by administrators in deploying agents, eG Enterprise includes several capabilities:<\/p>\n<ul>\n<li>eG Enterprise <strong>agents are auto-upgradable<\/strong> from the management console. Administrators do not have to spend time manually upgrading agents.<\/li>\n<li>It uses a <strong><a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/unified-monitoring\">universal monitoring<\/a> architecture<\/strong>. One agent on a server monitors all the applications running on it. The same agent can be deployed on all servers in the infrastructure. Therefore, administrators do not have to worry about deploying one management pack on one server and another on a second server.<\/li>\n<li>In the case of cloud-hosted monitoring, for organizations that need the monitoring data to be transmitted out of their network through a single point, the agents can be configured to <strong>communicate through a web proxy server<\/strong>.<\/li>\n<li>The agents can be <strong>controlled remotely<\/strong> from the management server itself.<\/li>\n<li>The agents perform <strong>auto-discovery.<\/strong> So, the target infrastructure can be managed automatically with minimal manual intervention.<\/li>\n<\/ul>\n<h4>Concluding Remarks<\/h4>\n<p>In conclusion, it is not about agent vs. agentless monitoring anymore. Organizations must judiciously use a combination of agent and agentless monitoring, focusing on what to monitor and how to analyze the metrics collected, rather than worrying about whether they will use agent-based or agentless monitoring.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/white-paper\/it-key-considerations\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12305 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/01\/Key-Considerations-Whitepapers.jpg\" alt=\"How to choose an IT monitoring solution - free whitepaper\" width=\"850\" height=\"200\" border=\"0\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Talk about performance monitoring to any system admin or IT manager and one of the first questions they will ask is whether you are using agent or agentless monitoring. The moment you hear that agent vs agentless monitoring question, you know that they are interested in an agentless monitoring solution. This is usually driven by [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":12310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[371,366],"tags":[1067,1071,1069,1075,1066,1070,1068,1074,1073,539,1076,613,194,196,562,1072],"class_list":["post-12289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-performance-monitoring-apm","category-end-to-end-monitoring-e2e","tag-agent-monitoring","tag-agent-on-server","tag-agent-or-agentless","tag-agent-software","tag-agent-vs-agentless","tag-agentless","tag-agentless-monitoring","tag-cloud-agent","tag-desktop-agent","tag-logicmonitor","tag-managed-service","tag-monitoring-agent","tag-monitoring-software","tag-monitoring-tool","tag-msp-monitoring","tag-server-agent"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agent vs. Agentless Monitoring | eG Innovations<\/title>\n<meta name=\"description\" content=\"Overheads of agents has led to Agentless Monitoring approaches being used. Learn whether agent or agentless monitoring is right for you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agentless Monitoring vs. Agent Based | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"Problems with agents on critical infrastructure and servers has led to the development of Agentless Monitoring solutions. Learn which solution is right for you!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-24T13:34:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T12:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/fb1.jpg\" \/>\n<meta name=\"author\" content=\"Keren Emil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Agentless Monitoring vs. Agent Based | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"Problems with agents on critical infrastructure and servers has led to the development of Agentless Monitoring solutions. Learn which solution is right for you!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/fb1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keren Emil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agent vs. Agentless Monitoring | eG Innovations","description":"Overheads of agents has led to Agentless Monitoring approaches being used. Learn whether agent or agentless monitoring is right for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Agentless Monitoring vs. Agent Based | eG Innovations","og_description":"Problems with agents on critical infrastructure and servers has led to the development of Agentless Monitoring solutions. Learn which solution is right for you!","og_url":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2020-07-24T13:34:50+00:00","article_modified_time":"2024-05-07T12:27:04+00:00","og_image":[{"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/fb1.jpg","type":"","width":"","height":""}],"author":"Keren Emil","twitter_card":"summary_large_image","twitter_title":"Agentless Monitoring vs. Agent Based | eG Innovations","twitter_description":"Problems with agents on critical infrastructure and servers has led to the development of Agentless Monitoring solutions. Learn which solution is right for you!","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/fb1.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Keren Emil","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/"},"author":{"name":"Keren Emil","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/6e6a6382a7491a6c5da334e912adb508"},"headline":"Agent vs Agentless Monitoring Pros and Cons","datePublished":"2020-07-24T13:34:50+00:00","dateModified":"2024-05-07T12:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/"},"wordCount":1519,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/thumbnail1.jpg","keywords":["agent monitoring","agent on server","agent or agentless","agent software","Agent vs agentless","agentless","agentless monitoring","cloud agent","desktop agent","LogicMonitor","managed service","monitoring agent","Monitoring Software","Monitoring tool","MSP monitoring","server agent"],"articleSection":["Application Performance Monitoring (APM)","End-to-End Monitoring (E2E)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/","url":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/","name":"Agent vs. Agentless Monitoring | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/thumbnail1.jpg","datePublished":"2020-07-24T13:34:50+00:00","dateModified":"2024-05-07T12:27:04+00:00","description":"Overheads of agents has led to Agentless Monitoring approaches being used. Learn whether agent or agentless monitoring is right for you.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/thumbnail1.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/thumbnail1.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/agentless-vs-agent-based-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Agent vs Agentless Monitoring Pros and Cons"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/6e6a6382a7491a6c5da334e912adb508","name":"Keren Emil","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d5e57d310e83b565706d96dd2cac1cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d5e57d310e83b565706d96dd2cac1cd?s=96&d=mm&r=g","caption":"Keren Emil"},"sameAs":["eguser"],"url":"https:\/\/www.eginnovations.com\/blog\/author\/keren\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/12289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=12289"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/12289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/12310"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=12289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=12289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=12289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}