Pandora FMS

Features Map

Data Pandora
Data Pandora

Network monitoring

Network monitoring

Traffic monitoring

Through sFlow, NetFlow or JFlow method.

IPv4 and IPv6 compatibility

Supports IP versions IPv4 and IPv6.

Traffic information detail

The information shows a history with a minimum granularity of one minute and a history of several years. The graphics zoom in and keep the highest level of detail.

Communication link performance

Monitoring network interfaces, bandwidth, consumption, maximum occupancy, availability, errors, discards, packet losses, real speed, etc.

Map and network diagram creation

Presentations in active network diagrams. These network diagrams will be updated automatically with the new network nodes, identifying new elements.

Discovered equipment features

Brand, model and firmware are automatically specified.

Equipment usage

CPU, memory, disk and communication equipment buffer usage.

Compatibility with SNMP

Compatibility with the SNMP and ICMP standard for obtaining information from devices, for versions 1, 2, 2c and 3.

Use of physical and logical ports

Open and in-use physical and logical ports are shown for routers and switches.

Log and event collection

Log collection parallel to monitoring. No megabyte limit. Log collection via syslog (remote) and local agents (Linux and Windows).

Relationship between network devices at network and link level

If the information is available, Pandora FMS is able to show the relationships at network level and the link level between the different ports of the routers/switches and the connected equipment.

Detection of active devices to monitor

It scans and generates monitoring information of physical and virtual equipment, servers, workstations, routers, switches, firewalls, bandwidth administrators, load balancers, access point and printers.

Remote connection to network equipment

It allows remote connection to communications equipment centrally in the solution itself, through SSH or Telnet.

Distribution of intermediate probes for information collection

It allows the use of intermediate probes to be able to monitor the network in a distributed way.

Possibility of high frequency polling

It rates network monitoring times at intervals of minimum frequency up to five seconds.

Custom remote queries

It allows the tool administrator to define their own complex (multi-step) remote checks based on dialogue / response over a TCP port.

Self-increase of test retries in case of failure

It increases checking attempts intervals in case of failure.

Scheduled monitoring

It schedules check-ups on specific dates and times.

WMI remote queries

It checks Windows computers remotely, using a WMI interface to add your own WML statements.

SSH Remote Queries

It queries Linux and Unix computers remotely, using remote commands on SSH.

SNMP trap reception

Trap collecting and alert allocation to these values. It collects numerical and/or alphanumeric values too to enrich the alerts with data obtained from traps : critical system temperature, name of the down interface, filesystem alert, critical-state memory/CPU, etc.

Packet loss

It monitors network interface packet loss.

Real-time geographic maps (GIS)

They show the exact position of each device (GPS) and, if it is updated, that movement is shown on the map. A movement history of each element can be saved and seen on the map.

Remote execution queries in Windows

Running a command and getting the result, providing username/password.

Heat maps

To see Wi-Fi coverage areas, packet loss, or other numerical parameters.

Automation

Automation

Network equipment remote configuration

That allows to upload and download full or partial configurations of network equipment through SSH or Telnet. (NCM).

Firmware update for network equipment

By uploading firmwares through SFTP/FTP from network devices such as routers, switches, AP’s, firewalls, etc. (NCM).

Remote commands and script execution on servers and workstations

It allows to deploy script or custom command execution to servers and workstations, without direct communication from the console to the agents, which allows to execute scripts in remote stations, without direct connection (OmniShell).

Integrated reports

Integrated reports

BAM monitoring (Tree Services)

It monitors business processes in real time in a single console (dashboard).

Reports

Report scheduling allows filtering information in time periods, reporting equipment failures (failures), warnings as well as displaying descriptive problem statistics and simple or combined graphs (multiseries).

SLA Reports

Daily, weekly and monthly SLA reports, in addition to global reports (by time periods).

Availability reports

They indicate, in a given period, the total number of tests performed, the success and failure percentages in that time for each test performed.

Top-N type custom reports

The operator can define a set of data that the application shows according to the applied filters.

Planned stops and exclusion

It excludes from all types of reports the periods defined as maintenance windows.

Report templates

End users can easily create reports from templates defined by the administrator.

Sending scheduled reports

The administrator can define report scheduled sending by email (in PDF).

Graphic views

They allow the operator to create their own graphic panels where to include monitoring data: graphics, status icons and real-time values. These screens can relate to each other.

Real-time data

Graphs and reports show real-time data at all times, not pre-calculated data.

Information availability

Pandora FMS is managed in real time from a web application for modern standard browsers (Edge, Firefox, Safari, Chrome).

Information presentation – Visual consoles

Information is centralized in a single interface as a board, where you may add elements of a library and customize the look and contents, in addition to being clickable and working as custom operation screens.

Information presentation – Dashboard

Information is centralized in a single interface as a board, where you may add elements of a library and customize the look and contents, in addition to being clickable and working as custom operation screens.

SLA reporting accuracy

Up to 4 decimals.

Later result adjustment by scheduled downtime

Reports are recalculated if scheduled downtimes are added afterwards (for the impact of SLA reports, availability, etc.).

Report customization

Covers, footer and custom indexe creation.

Freeform reports

Possibility to define reports based on your own HTML format, including custom SQL queries in table and/or graph format.

Alert system

Alert system

Alarm generation and sending

Alarm generation and sending are available as on-screen alerts and allow immediate sending by text message to mobile phones or email.

Alarm filtering and scaling

It filters the alarm sending by maximum number of repetitions, minimum number of repetitions and consecutive failure concurrency.

Time-based scaling

It allows criticality scaling based on time spent in an intermediate state (warning towards critical).

Event auto-validation

Recovered events will allow auto-validation when the problem that triggered them is solved.

Manual corrective actions

It allows performing manual actions on the events using the information available to launch diagnostic tools, open incidents, add notes or leave the event in work mode.

Alarm correlation

Sets of logical rules (AND, OR, NOT) that allow to refine alarms based on the events collected in the monitored systems can be set.

Programmable alarm sending format

Alarm forwarding is definable by the user, so that it allows its integration with new platforms, such as Telegram,MSTeams, Slack, Mattermost, Discord, Google Chat…

Sound warning console

It allows audible messages to be received by an operator, based on filters by origin and severity. This system is complementary to the others.

Mobile application for receiving messages

It enables notice reception and their real-time checking for Android and iOS.

Special days calendar

Where exceptions to the execution of alerts can be defined.

Transactional WEB monitoring

Transactional WEB monitoring

Application and web server software

It scans and generates information on Java application (OAS-Oracle, JBoss-Redhat, WebLogic), IIS web servers and Apache monitoring.

Transactional monitoring and user experience

It verifies the proper operation of each step of an application from the user’s point of view, being able to replicate each one, measuring success and total time.

Access via authentication

It checks application availability through user login and password.

Application traceability

It checks the availability of a request in the application following a navigation flow (trace); each independent request is monitored individually, in addition to the entire transaction.

Application availability

It scans application services to evaluate operation by URL and IP.

Transaction time breakdown

It breaks down in time periods each of the key transaction steps (server connection time, first iteration response time, application downloading time, etc.).

Navigation with distributed probes

Remote web application monitoring is possible from different geographically distributed points, synchronized by a central manager.

Screenshots

It takes screenshots to use them as report in case of failure and thus to analyze the problem as it looks like for a real user.

Database monitoring

Database monitoring

Commercial relational database engines supported

It supports Oracle, Sybase, Informix, DB2, Microsoft SQL Server, MySQL and PostgreSQL.

Commercial NoSQL database engines supported

Support for MongoDB, RavenDB, HBase and Cassandra engines.

Storage system monitoring

Physical storage on hard disk, disk groups, tablespace – datafiles -.

Availability

It reports availability by opening and closing a connection and services at operating system level.

Transactions

It reports database locks, number of open sessions, number of open cursors.

Relation of event logs and warning

It logs errors, warnings, user and session status, checks replication processes; updates data outside applications; generates and verifies backups.

CPU usage

It identifies the database usage percentage on the server that contains it.

Cache usage

It shows cache usage by the database.

Total number of connections and their status

It shows connection real-time movement.

Job failures

It reports any errors in job execution.

Fragmentation

It identifies fragmentation level in data stores.

Backup errors

It generates manual and scheduled backup failure alarms.

Custom SQL queries

It monitors the result of custom SQL queries (or equivalent).

Servers

Servers

Monitoring with agents

It has the local agents feature, so that equipment can be monitored in a very detailed way with minimal impact on the system.

Agentless monitoring

Through remote WMI queries, SSH or remote windows executions.

Remote agent installation

It allows distributing and installing agents in an unattended way from the administration console; Windows and Linux systems.

Automatic agent provision

Agents are configured when contacting for the first time the central server, and a configuration determined by a set of rules is applied.

Support to different platforms

In 32-bit and 64-bit architectures, information is obtained from Windows, Linux and Unix operating systems (Solaris, HP-UX, AIX), Mac OS X and BSD systems.

Server hardware operation

CPU, RAM, physical memory, virtual memory, cache and paging are monitored. Open processes, zombies, swap, access to the environment, etc.

Operation information

Fans and internal temperature.

Storage

Availability, available space per partition and building points.

New storage system hot detection

Monitoring new building points automatically.

Network card

Availability and charging by network card.

Operating System and general configuration

It describes operating systems and equipment configuration.

Conditional monitoring

It allows monitoring based on whether certain criteria are met, evaluating it in each execution.

Local corrective actions

They run on agents, based on a given condition.

Screen monitoring

It allows taking “screenshots” of the output of certain commands.

Service and Process Watchdog

It allows restarting in case of failure, and monitors it automatically (Windows).

Use of intermediate proxies to send information

If agents cannot contact the central server.

Local data collection in case of disconnection

Information will be stored locally if the network falls down, so that, when it can connect again with the central server, it sends the information for that period.

Execution of agents with users without privileges

So that they cannot access classified information.

Cluster monitoring

Valid for any manufacturer and any cluster model, A/P or A/A, and also for application or network clusters.

Remote agent configuration

Individually or collectively for configuration bulk changes.

Virtual environments

VMware, HyperV, HPVM, RHEL VM, Nutanix, OpenNebula, IBM, HMC, LPAR, KVM and XenServer monitoring.

Application server monitoring

It verifies OAS, JBoss, Tomcat, WebSphere, GlassFish services and equivalents.

Platforms monitored

Platforms monitored

Linux

Linux (all distributions, x86, x86_64, arm).

Windows

From Windows 2000 onwards.

Android

Versions since 2019.

IBM-i (as400)

IBM Supported Versions.

Unix

Solaris (8.x and above), AIX (5.x and above), HPUX (11.x and above) and multiple versions of NetBSD and FreeBSD.

Mainframe

IBM os/390 (zSeries).

Cloud monitoring

Cloud monitoring

Google Cloud

Auto-discovery and monitoring.

Amazon AWS

Auto-discovery and monitoring.

Microsoft AZURE

Auto-discovery and monitoring.

SAP

Cloud or onPremise (SAP R3, R4, SAP HANA, etc.)

Environment monitoring

Environment monitoring

UPS

Compatibility with the main manufacturers.

Air conditioning

History of use and air conditioning sensors, report and alarm generation.

Access control

Historical of access control to the computer center, reports and alarm generation.

IoT / Sensors

Possibility of integration with different IoT systems through direct connection (SNMP) or Rest API.

Inventory

Inventory

Obtaining the inventory

Inventory is obtained both by remote network probes or agents.

Inventory systems

Network equipment (routers, switches), as well as Linux or Windows servers.

Network equipment remote configuration

It periodically collects remote configurations of network equipment and stores their different versions over time.

Detection of inventory changes

It allows the operator to be notified in case of detecting changes from one inventory review to another.

Display of equipment configuration differences

It visually displays configuration changes on remote computers from which your configuration is collected as part of the inventory.

Inventory alerts

Inventory alerts can be configured from the data received.

Custom fields

Monitored assets can be customized, to include details such as serial number, asset manager, physical location on a data center, etc.

CPU

It collects information about CPUs.

Video

It collects information about PC-installed video cards.

Hard drives

It collects information about computer-installed hard drives.

Partitions

It collects information about each of the partitions on each computer.

NIC

It collects information about installed network cards and drivers.

Patches

It collects information about computer-installed patches.

Software

It collects information about computer-installed software.

Processes

It collects information on computer-running processes.

RAM

It collects information about computer-installed memory modules.

Users

It collects the number of administrator users or guests on each computer.

IP addressing management

IP addressing management

Automatic discovery

The tool has IP detection in a subnet, IP reponse checkout, resolving hostname and operating system.

IP Administration (IPAM)

The tool can configure, enable and disable each IP manually, add events in the IP, comments for each IP, reserve IPs and monitor dynamically the use of network IPs by network, subnet and supernet.

Customizing IP views

The tool can filter and view different IP groups.

Integrated IP with Microsoft DHCP Server management

The IPAM system can be integrated with Microsoft server through local real-time data collection to refresh and update IP status, including their reservation, lease and each IP lease time.

Subnet calculator compatible with IPv4 and IPV6

It allows the following data: network (address and bit mask), network mask, network wildcard, network address, broadcast address, first valid IP, last valid IP and network IP number.

VLAN management

It allows to manage network VLANs from the discovered networks.

CSV import and export

Networks and vlan can be imported by CSV as well as export in CSV information on the detected networks.

Remote control

Remote control

Computer Remote Desktop

Integrated into the software, without calling a third tool. Integrated in the interface. Compatible with Windows, Linux and Mac systems.

Remote Shell

Integrated in the tool Interactive access by shell to Linux and Windows computers.

Copy of bidirectional files

Integrated in the tool’s main console, it allows the user to access the remote filesystem to download, delete and upload files from the PC.

Process and service control

It allows starting, stopping and restarting remote processes and services of the managed machine.

Issue management

Issue management

Creating manual tickets from an event or alert

It allows the operator to create an issue associated with an event on an active problem to closely monitor the issue.

Creation / Update of automatic tickets

It allows to create tickets as an automatic response to a problem detected by monitoring.

Custom Workflow

It allows to define a lifecycle for each ticket based on the creator, dates, criticality, work group, etc. This lifecycle incorporates flow change notifications by email, automatic scaling and issue closure validation through external users.

Security

Security

Multitenant

With the same solution you may offer services to different clients or groups without them seeing each other.

Profiling system according to groups and accesses

Different users from the same group can perform different functions.

Internal audit

It reflects what operations each user has performed and when, including failed access attempts.

Password Policy

It allows forcing a policy of password change, with minimum length passwords, special characters and history of old passwords.

Password Recovery System

A solution is provided so that users can recover forgotten passwords.

Centralized authentication with LDAP

It has its own system of users, profiles and roles, and supports Active Directory, LDAP and SAML.

Centralized authentication with AD

It has its own system of users, profiles and roles, and supports Active Directory, LDAP and SAML.

Centralized authentication with SAML

It has its own system of users, profiles and roles, and supports Active Directory, LDAP and SAML.

Authentication with fallback

Double AD/LDAP server in case the primary one does not respond.

Dual authentication system (2FA)

Through Google Auth or equivalent, it uses a mobile or external hardware device to perform double authentication to enter the system.

Credential store system

It allows you to reuse combinations of credentials (eg: username and password) in controls without really knowing their content (to delegate the configuration to users without permission to said passwords).

Architecture

Architecture

Problem scaling system and root cause analysis

It allows analizing the information based on the service as a whole, by grouping information. This makes the analysis of the problem root cause easier.

Automatic provisioning system

It distributes the load in case of new node registrations on the corresponding servers, or by load or custom rules.

Long-term data storage

It is able to keep all data history at full resolution for at least three years Data, events and SNMP traps.

Communication via standard ports

Communication between the different components of the architecture is done through official ports, listed by the IANA.

Isolated envirnoment monitoring

A system is provided by which an isolated network can be monitored through a component that does not have direct connectivity to the central monitoring infrastructure.

Integrated Backup

It includes an integrated backup system.

Policies / Templates

It can creates monitoring, correlation and inventory policies. These policies can be applied by specific groups or users, so that similar machine sets can be managed easily, quickly and evenly.

Single console in distributed environments (different instances)

A single console is available, regardless of the final scaling of the implementation The same user will work for all the tool features (network, applications, logs, reports) without logging in to different screens.

Horizontal scalability (involves distributed storage)

There is an unlimited chance of growth by adding new servers.

High Availability

HA is integrated into Pandora FMS. All system components support high availability without requiring external elements.

High Availability in different geographical locations

It allows to implement a fool-proof HA, in which each portion of the system can survive isolated, using IPs in different subnets and geographically distributed.

Distributed elements

It allows each architecture element to be in physical locations (different servers).

API/CLI

It offers a REST API and command line tools to manage the solution.

Open SQL Database

The data model of the entire platform is open and documented, in order to use external queries to retrieve data.

Rebranding / OEM

It allows full product rebranding, hiding the name of the manufacturer, the name of the product and changing colors and icons by the administrator.

Remote agent installation

It allows you to deploy monitoring agents remotely, automatically and centrally.

Licensing type

It is licensed based on the total number of devices, regardless of the total number of metrics collected on each device.

Integrated update system

No intervention in the system by means of shell, totally centralized in the console.

Training and support

Training and support

Official training

Standard training for technicians on the basic knowledge indicated. Said training includes all usage levels and tool implementation.

Official certifications

Accreditation, by means of an official certification, of the knowledge of technicians.

Online training platform

To make training easier, it has an online eLearning platform to get the tool and certifications knowledge.

8/5 or 24/7 support

Unlimited ticketing support for Enterprise users (NON-LITE). 24/7 support possibility.

Data Pandora

Doubts, suggestions or comments?