Решение для удаленного мониторинга и управления для проактивного контроля устройств, сетей и приложений. Идеально подходит для поставщиков управляемых услуг (MSP) и ИТ-команд, стремящихся к автоматизации, масштабируемости и контролю в режиме реального времени.
Мощная и гибкая служба поддержки для команд поддержки и обслуживания клиентов, согласованная с процессами библиотеки инфраструктуры информационных технологий (ITIL).
Программное обеспечение для удаленного управления серверами и ОС Windows, Linux и Mac, ориентированное на системных техников и компании, предоставляющие управляемые услуги (MSP).
Augmentez la puissance de votre surveillance. Pandora FMS s’intègre aux principales plateformes et solutions cloud.
Collectez, centralisez et consolidez les données de journaux et d’événements provenant de différents systèmes, applications et appareils dans la plateforme unique qu’est Pandora FMS.
Solution de surveillance et de gestion à distance pour un contrôle proactif des appareils, des réseaux et des applications. Idéale pour les fournisseurs de services gérés (MSP) et les équipes informatiques à la recherche d’automatisation, d’évolutivité et de contrôle en temps réel.
Helpdesk puissant et flexible pour les équipes d’assistance et de service à la clientèle, aligné sur les processus de la bibliothèque d’infrastructure des technologies de l’information (ITIL).
An extensive collection from detailed guides that break down complex topics to insightful whitepapers that offer a deep dive into the technology behind our software.
Expande el poder de tu monitorización. Pandora FMS es flexible y se integra con las principales plataformas y soluciones en la nube.
Recopila, centraliza y consolida los datos de logs y eventos de diferentes sistemas, aplicaciones y dispositivos en una única plataforma. Los datos se integran de forma nativa con Pandora FMS, sin necesidad de herramientas adicionales.
Solución de supervisión y gestión remota para la supervisión proactiva de dispositivos, redes y aplicaciones. Ideal para proveedores de servicios gestionados (MSP) y equipos de TI que buscan automatización, escalabilidad y control en tiempo real.
Potente y Flexible Helpdesk para equipos de soporte y atención al cliente, alineado con los procesos de Biblioteca de Infraestructura de Tecnologías de Información (ITIL).
Expand the power of your monitoring. Pandora FMS is flexible and integrates with the main platforms and cloud solutions.
Collect, centralize, and consolidate log and event data from different systems, applications, and devices into a single platform. Data integrates natively with Pandora FMS agents, with no need for additional tools to capture key information.
Remote monitoring and management solution for proactive oversight of devices, networks, and applications. Ideal for managed service providers (MSP) and IT teams seeking automation, scalability, and real-time control.
The Congress & EXPO ASLAN2023, organized by ASLAN Association, took place last week at the Palacio de Congresos de Madrid – IFEMA, and brought together more than 7,500 professionals from the digital sector and cybersecurity in Spain.
And, after all the stuff we shared on social media surely you know that Pandora FMS was there!
Learn all about Pandora FMS’ success in ASLAN2023
The event had a whopping +100 exhibitors, each with its very own proposal of innovative solutions. In addition, the organization especially strengthened the presence of strategic vertical sectors at the exhibition.
Not to brag about it, but among the most outstanding solutions presented at the event there was MADE, a monitoring system for large amounts of data that uses Artificial Intelligence and automatically adapts to each management environment.
The tool has been developed by ourselves, in friendly collaboration with researchers from the University Carlos III of Madrid.
As we are restless minds in need of details, we had the courage to talk to Kornelia Konstantinova, CMO at Pandora FMS, and Sancho Lerena, CEO of the company.
Good afternoon, Kornelia!
Tell us, what impact do you think Pandora FMS’ participation in ASLAN2023 had and what was the response of those attending the event like?
It’s still early to talk about results in the short or medium term, but there’s something I can tell you: we exceeded our expectations in terms of the interest generated.
There was a huge flow of visitors and we were able to show our product to a wide audience. Also, to very relevant people!
We got to know some clients face to face, as well as partners with whom we usually communicate digitally.
We also came into contact with other companies in the sector, which we hope will open opportunities for collaboration and synergies.
What was the most difficult challenge to address when preparing your participation in this massive congress?
Without a doubt, the most difficult challenge, not only for us, I think for any exhibitor, is to develop an effective marketing strategy to attract the attention of visitors.
There are many exhibitors who participate and we must differentiate ourselves from the rest, whatever it takes. To that end, you have to be very creative of course and innovative, as well as develop a clear and effective message.
Then, of course, there is logistics, which is always a hustle and bustle.
What do you think is the marketing vision of Pandora FMS in terms of its role, in the long term, in the digital innovation industry in Spain and internationally?
We are the only manufacturer of Spanish Monitoring Software.
In the long term our goal is to consolidate ourselves as leaders in the industry in Spain and internationally.
To achieve this goal, our approach is based on developing and delivering advanced, customized solutions that meet the unique needs of our customers.
At Pandora FMS, we closely follow the latest trends and technologies on the market to stay always at the forefront of our sector.
Our commitment to continuous innovation. And it allows us to adapt to the changing needs of our customers, providing solutions that not only meet their current requirements, but also allow them to anticipate the future needs of their companies.
Therefore, we establish solid relationships with our customers, to understand their needs and offer customized solutions that fit their specific requirements.
We believe that close collaboration with our customers is key to our long-term success.
And now something lighter, any remarkable anecdotes of the days lived in ASLAN2023?
Actually, several. From the overflowing capacity of the first day, where many visitors had to queue to get in, to the amazement of everyone by the numerological studies of our beloved David! The mysterious magician we brought to our stand to predict, through his arts, the future of visitors.
Great, let’s go with Sancho!
How is it going, Sancho? Let’s get to the nitty gritty. We would like to know how the idea of creating the famous MADE system came about and what the development process was like.
There is a lot of techno chatter regarding Artificial Intelligence. So we wanted to offer something useful, understandable and that could be implemented right away, without having to assimilate what runs underneath.
The truth is, it is a rather complex challenge to try to make easy on the outside what is extremely complex on the inside.
And what features make MADE a unique tool on the market and what advantages does it offer to companies?
Especially the fact that we had international Artificial Intelligence researchers from the University Carlos III of Madrid to create something different from the usual solutions on the market.
Made is a practical approach to a complex problem but has a basic approach:
How to detect anomalies on data that we can not give more information about.
Well, Pandora FMS can handle dozens of thousands of numerical series, all different, because they all represent the “soul” of each connected device. Made studies each pattern separately, analyzes its behavior over time and like a data psychologist, is able to warn when something is not right.
You can’t diagnose the problem, but you know something isn’t right!
What was the collaboration like with the University Carlos III of Madrid in the development of the MADE solution and what did the university contribute to the project?
I think it was a very smooth process.
We had already tried to participate in other research projects and we really wanted to collaborate.
The university brings the state of the art of the world’s leading AI techniques.
Tell us, what impact do you think Pandora FMS’ participation in ASLAN2023 had and what was the response of those attending your presentation like?
I think Aslan is a good national showcase to show national and multinational companies who we are and the scope of our project.
In addition, thanks to the presentation, we were able to show face to face, what we do and how we can help all types of companies with Pandora FMS.
Any remarkable anecdotes of the days lived in ASLAN2023?
I met some people, senior managers from important companies, and I was pleasantly surprised (like, I really freaked out) because they had a technical profile even more geek than mine.
There is hope when large companies still look to technicians for their foundation to build business.
Thanks a lot!
What about you? Want to find out more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
No, we are not talking about a tutored Pilates session or a recipe for the best Bacalhau à Brás. Nor do we bring you the trick to get past the chieftain of the desert of Elden Ring.
But today we will see how the Event Hubs plugin works in Microsoft Azure, as well as the prerequisites that you will have to meet in your Pandora FMS environment and the configuration necessary in Azure to be able to make use of the plugin.
Azure and the plugin’s operation for Event Hubs
But before we get into the good stuff and you click on our video…
A little more about Azure, in case you are not up to speed
Microsoft Azure is a cloud computing platform that provides a wide range of services and tools for businesses of all sizes.
One of the most popular services on Azure is Azure DevOps, which is a comprehensive suite of tools for modern software development.
In this section, we will take a closer look at Azure DevOps and other related services like Azure Cloud, Azure Pricing Calculator, and Azure Status.
Azure DevOps: Streamlining Your Software Development Process
Azure DevOps is an all-in-one platform for managing the entire software development process.
It includes tools for project management, source control, continuous integration and deployment, testing, and release management.
With Azure DevOps, teams can collaborate more effectively and deliver high-quality software products with greater speed and efficiency.
Azure DevOps includes several key features, including Azure Boards, which is a project management tool for tracking and managing work items, bugs, and issues.
Azure Repos is a powerful code repository that supports multiple programming languages and integrates with popular development tools like Visual Studio and Eclipse.
Azure Pipelines provides continuous integration and deployment (CI/CD) automation, allowing teams to streamline their build and deployment processes.
Azure Cloud: Scalable, Reliable, and Secure Cloud Services
Azure Cloud is a cloud computing platform that provides scalable, reliable, and secure cloud services for businesses of all sizes.
With Azure Cloud, businesses can leverage a wide range of services and tools, including virtual machines, storage, databases, and more.
One of the key advantages of Azure Cloud is its ability to scale up or down based on demand.
This means businesses can quickly and easily provision resources as needed, without having to worry about maintaining expensive on-premises infrastructure.
Azure Cloud is also highly reliable, with built-in redundancy and failover capabilities to ensure uptime and availability.
In terms of security, Azure Cloud provides a range of security features, including multi-factor authentication, role-based access control, and encryption.
This helps businesses to protect their data and applications from unauthorized access or data breaches.
Azure Pricing Calculator: Plan and Estimate Your Azure Costs
Azure Pricing Calculator is a tool that helps businesses plan and estimate their Azure costs.
With the Azure Pricing Calculator, businesses can select the services they need and estimate the monthly cost based on usage.
The Azure Pricing Calculator includes a wide range of services and tools, including virtual machines, storage, databases, and more.
Users can select the services they need, choose the region where the resources will be deployed, and estimate the monthly cost based on usage.
Azure Status: Real-Time Service Health Information
Azure Status is a service that provides real-time information about the health of Azure services.
With Azure Status, businesses can stay up-to-date on any service issues or outages, as well as view historical information about service disruptions.
Azure Status provides a range of information, including service health status, incident updates, and historical data. Users can also subscribe to notifications to receive updates about service issues and outages.
Here at Pandora FMS blog we like to get up early, prepare a cup of pennyroyal mint and while it settles, do a couple of stretches, wash our face and start the day defining strange words worth something for our readers. Today it’s time for: Telemetry!
Do you already know what telemetry is? Today we will tell you
Shall we get straight to the point?
Straight to the point then it is!
Telemetry, roughly speaking, is what automatically measures, collects and sends data from remote sources, thanks to devices that collect data.
It then transmits that data to a central location where it is analyzed and you can then consider your remote system as supervised and controlled.
Of course telemetry data helps, while controlling security, to improve customer experience and monitor application status, quality and performance.
But let’s go further, what is the true purpose of telemetry?
As can be understood, the collection of telemetry data is essential to manage IT infrastructures.
Data is used to monitor system performance and keep actionable information on hand.
How do we measure telemetry?
Easy-peasy!
Through monitoring!
Monitoring tools measure all types of telemetry data.
They start with server performance and head towards actionable infinity.
Some types of telemetry data
It all starts with a small signal that indicates whether a server is active or inactive.
Then it tends to get complicated.
Event and metric data already includes the CPU utilization of a server, including peaks and averages over different periods.
For example, a type of telemetry data to be monitored includes server memory utilization and I/O loading over time.
*This data is particularly important when using server virtualization.
In these situations, statistics provided by virtual servers may not reveal problems with CPU or memory utilization; instead, the underlying physical server may be underutilized in terms of physical memory, virtualization, CPU, and I/O connectivity with peripherals.
Finally, user requests over time and concurrent user activity on standard deviation charts should be included in server-specific metrics.
This will reveal how your systems are being used in general, as well as information about server performance.
Telemetry Data Monitoring
Now that we’ve taken a look at servers and their telemetry, let’s dig a little deeper into some of the fundamental components of their physical application.
This includes:
Network infrastructure.
Storage infrastructure.
Capacity.
Overall bandwidth consumption.
As any experienced IT guy can warn you:
Quantifying network monitoring beyond the strictly commonplace is important.
Measuring network traffic in bits per second across LANs and sub-LANs within your application infrastructure should always be part of monitoring network utilization.
To predict when packets will be lost and when storms may take place in your network, it is essential to understand the theoretical and practical limits of these segments.
The utilization of the segment’s bandwidth over time in multiple network areas must be revealed by network monitoring.
Monitoring certain network protocols will also provide a more detailed view of application usage in real time and, perhaps, of performance issues for certain features.
Likewise, monitoring requests to certain network ports can also reveal any security gaps, as well as routing and switching delays in the relevant network components.
In addition to monitoring raw network usage, it is necessary to monitor the storage systems connected to the network.
To show storage usage, waiting times, and likely disk failures, specific telemetry is required.
Again, it is important to monitor both overuse and underuse of storage resources.
Some basic application telemetry monitoring data
It is very important to monitor the telemetry that can involve access to the database and its processing, monitor the number of open database connections, which can be triggered and affect performance.
Tracking over time allows you to spot design decisions that don’t change as application usage grows.
It is equally crucial to control the number of queries to the database, their response times, and the amount of information circulating between the database and applications.
Outliers and averages should also be taken into account.
Uncommon latency can be concealed or hidden if only averages are controlled, but these outliers could still have a negative impact and irritate users.
Your monitoring strategy should always take into account tool exceptions, database errors or warnings, application server logs looking for unusual activity…
And that’s just the beginning!
Your monitoring software
Having a solid monitoring strategy is crucial, but so is having a well-thought-out reaction strategy that incorporates:
Determining, understanding and initiating root cause analysis.
A written communication strategy that includes the names and contact details of those responsible.
Identifying easy solutions to restore the program in the short term.
A research strategy to prevent future problems.
Telemetry Monitoring Elements
Some telemetry monitoring elements that you may use:
Dashboards or other real-time system information and telemetry tools.
Technologies for analyzing records safe for use with production systems.
Business intelligence to retrieve data from records, such as usage trends or security issues during specific time periods.
Tools that automate risk detection, recovery, and mitigation to get rid of manual labor.
Using a centralized system and working with a software vendor, you may set in place a robust monitoring strategy that will be developed over time and become more comprehensive.
And there, my friend, is where we come in!
Want to know more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
You still didn’t know it? Pandora FMS gets ISO/IEC-27001
Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude.
For years we have attended international fairs and events where computer security is offered as specific products.
Many people may think that by buying products you reinforce your company’s security, but no, that is only a small part of it.
Security is about changing the way we manage the whole organization, from how we share information to how we use systems.
Pandora FMS has always been aware of that and you may see it in our security architecture guide, our GDPR compliance guide -which is also valid for regulations such as PCI/DSS- and of course, because as a company we are certified with ISO 27001.
Certification ISO 27001 provides us with important backup towards our national and international clients, many of whom request information from us about our business continuity plans, the security of our development and implementation processes, what protection measures of information privacy we have in force and how we control the information available to our suppliers.
We understand that for them it is as important or even more than for us and having a certification that strongly supports us is something to be proud of.
Many of our clients are pharmaceutical companies, financial institutions – some over a century old – and government entities.
Due to confidentiality contracts we cannot mention their names, but large and small, to a greater or lesser extent, everyone is concerned about aspects related to information security.
Today we can proudly say that not only do we also care about it, but that we have proven our commitment.
But what is ISO/IEC 27001?
ISO/IEC 27001 is a standard for information security (Information technology – Security techniques – Information security management systems – Requirements) approved and published as an international standard in October 2005 by the International Organization for Standardization and by the International Electrotechnical Commission.
It specifies the necessary requirements to set, implement, maintain and improve an information security management system (ISMS) according to what is known as the “Cycle of Deming”:
PDCA – acronym for Plan, Do, Check, Act.
It is consistent with the best practices described in ISO/IEC 27002, formerly known as ISO/IEC 17799, with origins in the BS 7799-2: 2002 standard, developed by the British standards body, the British Standards Institution (BSI).
In just a few decades, computers have gone from having few functions and filling up entire rooms to becoming portable necessities for business and leisure. However, on its own and not connected to the internet, an electronic device can only do so much.
Most things we rely on technology for require communication between multiple devices—which is where internet protocols come into play.
What does TCP/IP stand for and how is it used in practice?
From sending a simple message to streaming a film or answering transferred calls online, internet use has become so commonplace that we rarely give our actions a second thought. But for all this online activity to be possible, there’s a lot taking place behind the scenes. Let’s start by talking about TCP/IP—the framework most commonly used to transmit data over the internet and other networks.
TCP/IP stands for Transmission Control Protocol/Internet Protocol. The job of TCP/IP is to ensure all communication traveling through the network reaches the intended recipient. It does this by breaking data down into smaller units (packets), which are then reconstituted upon reaching their final destination.
Is there a difference between TCP and IP?
Originally designed by scientists Vint Cerf and Bob Kahn in the 1970s, the Transmission Control Protocol suite has since become the standard method to transfer information. As the name suggests, there are two parts to the picture, and both are equally as important.
The latter part of the TCP/IP abbreviation stands for Internet Protocol. The Transmission Control Protocol and Internet Protocol each take care of a different issue to reach a common goal—the successful transmission of data across a network.
IP operates within what’s known as the network layer, while TCP works within the transport layer. In other words, IP locates the address for delivering data, and TCP takes care of transferring it, as well as correcting errors along the way to ensure successful end-to-end delivery.
To give a real-life example, imagine you’re planning a mass email marketing campaign. You’ve collated a list of email addresses (similar to the IP addresses used by the Internet Protocol to locate intended destinations). By delivering your messages to the recipient, the software through which you send the emails functions much like Transmission Control Protocol.
Lacking either email addresses or suitable software would impede information transfer; similarly, TCP and IP have to work together to be effective.
What constitutes the TCP/IP protocol suite?
We’ve now established why TCP/IP can’t function without one another, but the closer you look, the more complex the protocol suite gets. It consists of many supporting models that are fundamental to its function, such as:
Internet Control Message Protocol (ICMP)
Whenever a problem materializes during data transmission, it’s the ICMP’s role to send out error messages and operational information.
Internet Group Management Protocol (IGMP)
IGMP allows for multicasting i.e sending out the same data to multiple devices at the same time.
Address Resolution Protocol (ARP)
As a communication protocol, ARP helps connect the internet layer address to the link-layer address.
File Transfer Protocol (FTP)
FTP allows for transferring files from a client to a server. For instance, this protocol is what enables us to access data stored in the cloud—look up ‘what is an iPaaS’ to find out more.
Hypertext Transfer Protocol (HTTP)
Commonly known as HTTPS’ ancestor—only with less data security—HTTP is what makes the interaction between the client and the webserver possible. It’s often considered the foundation for data communication.
Simple Mail Transfer Protocol (SMTP)
SMTPs allow computers and servers to exchange data so users are able to send and receive electronic mail.
What are the four layers of TCP/IP?
TCP/IP is comprised of the following four layers, each of which has a unique set of properties and functions that contribute to the optimal function of the TCP/IP system.
Network interface layer
Also called the ‘network access layer’, this part of the TCP/IP model is where a connection between a physical network and a device is formed. The network interface layer defines how data should be sent and received over the network.
In physical devices, such as routers, the network interface layer plays an extremely important role in connecting the device to other users of the network who can then transmit data packets.
In everyday use, laptops and smartphones rely on the network interface layer to connect to wireless networks and access necessary functions such as online messaging or entertainment apps.
Internet layer
The second layer, also known as the ‘network layer’, combines various protocols (such as IP, ICMP, or ARP) to effectively transfer data sequences across the internet.
In the internet layer, each device is identified through a unique IP, which allows the packets to be sent to the correct address.
For instance, when sending an email, the message is cut up into packets to be rebuilt into its original coherent form in the recipient’s inbox.
Transport layer
The transport layer maintains control over the amount of data to be sent and where it’s sent to. To eliminate errors in inter-system communication, the transport layer engages in flow control, error correction, sequencing, segmentation, and de-segmentation.
When data gets lost in transmission, the expert troubleshooter that is the transport layer requests the packet be rerouted and received correctly. It also takes care of the efficient flow of information throughout the network by breaking up data into manageable segments.
It’s important to note that all information sharing comes with safety risks—if you’re concerned about privacy, spam call blocking software could be worth looking into.
Application layer
Within the topmost application layer, the user gets to interact with other software applications ranging from file sharing to remote desktop services.
Conclusion
The world of data transfer is extremely complex, with many factors combining to ensure that information leaves and arrives in the right shape and form to the correct recipient.
Internet protocol suites, of which TCP/IP is the most commonly used, are what make online communication possible. This is comprised of four layers and relies on a variety of supporting models to transfer data across the network in a reliable and efficient manner.
The formula of teleworking, extended among many companies from the phenomenon of Confinement, caused by the pandemic, has given rise to a new model of labor relations.
A system already called “hybrid” because it combines teleworking with conventional physical presence.
Don’t feel guilty, teleworking works!
According to Microsoft studies on labor trends, it is advisable to keep flexible options for remote work.
Surveys of 30,000 workers in 32 countries show that almost 73% want to work remotely, at least 60% of their time, while 45% consider changing to jobs that allow them to alternate commuting to their offices with working from elsewhere, through coworking, working at home or in the office itself.
In a technology company, specialized in monitoring systems such as Ártica PFMS, this situation has become an opportunity to significantly improve the work environment.
We have managed to establish a flexible work system for employees, about 50, that is bearing fruit.
There has been an increase in productivity.
Rotation has decreased noticeably because no one feels overwhelmed.
It is highly valued to avoid costs and transport time.
No one is against it and most people are grateful for controlling their time and having options for conciliation and fulfilling their tasks.
Teleworking has been imposed spontaneously because employees have so desired and also because the company management has taken care to channel it and bring it to a successful conclusion.
Both interests have been combined in search of work harmony, investing in a reconfiguration of the physical space and work procedures, in which each employee manages their own responsibility with the option of teleworking and attending to the office physically when deemed necessary.
Meetings are scheduled every week and are carried out through a technological communication system that allows a telematic meeting where the company’s professionals, either as a whole or by department:
Commercial (Sales and Channel).
Development.
Testing and Quality.
Support.
Projects.
Human Resources.
Administration and finance.
R&D.
All contacts are made with a very defined agenda, thus avoiding wasted time.
Each individual knows when to intervene and what to report.
The chairman is fully involved and at each meeting sets the guidelines to be followed, answers questions and queries and makes decisions.
Another achievement that we appreciate is that everyone has adopted a greater teamwork spirit.
Schedule and workplace flexibility, along with useful training, is the perfect combination to retain talent.
Now we have noticed that in one year we have had “0” rotation due to this new system that we implemented.
Agile room
It is a room equipped with cutting-edge technology that allows combining simultaneously telematic meetings and face-to-face meetings.
Agile, short meetings can be held, no more than 15 minutes, in which there is spontaneous conversation among the attendees.
Also, there is now a space designed for online training, so that we ensure knowledge updating, keeping the same performance standard we had in face-to-face mode.
In the training room, the teacher can display screens showing the contents to be explained.
Their image is combined with screenshots in which you can read texts with higher quality than the traditional power point.
Students can interact by microphone with the teacher and other colleagues, without having to resort to written chat questions.
We took an approach to what is called “learnability”, which is the curiosity and ability to learn new skills to stay employable in the long term.
Resetting the old workplace model
We have overcome the traditional model of massive in-person workplaces, a tradition from Taylorism, in which a huge room housed a myriad of aligned employees, who worked without looking up from their affairs and where it was difficult to communicate with the rest of the colleagues.
That breadth of space has been transformed into a friendly environment.
We have invested in connectivity to have high quality and safe telecommunication.
We have overcome the idea that the private office was a privilege for bosses where there were all sorts of comforts for them.
Now the office is a large office with sofas, armchairs, large windows where you can find the privacy for a call anywhere, warm lighting and screens to connect with whoever you want.
There is a coffee room for a snack and where any professional of the company can come whenever they want it.
That change implies a whole evolution in the way to communicate with each other and improve work performance because we all feel comfortably responsible for what we must do, with no additional pressures.
We are the ideal place to work because employees can choose, according to their mood, their obligations and their tasks within the company, between teleworking or attending a nice environment.
Conclusions
All in all, this new teleworking structuring has allowed us to create a disruptive model where the employee enjoys their freedom of choice, while they allow the company to control the performance of each employee, settling down clear goals for work and measuring in real time their fulfillment.
Finally D-Day! Today we will explain, in a simple video, how you can monitor Oracle instances.
For that we are going to use our Discovery feature, which allows you to connect remotely to applications to bring information and to add it to your Pandora FMS agents.
Do you know the Oracle tasks configured in Discovery?
As you have seen, the Oracle tasks configured in Discovery allow you to connect to remote Oracle instances to monitor them and to generate module blocks with important information.
Today we focus solely on Oracle, but it is necessary to emphasize that the Discovery menu also allows you to monitor other applications.
Let’s get real. Not all metrics are useful metrics
Today we will talk about metrics in the context of an organization’s environment and goals. Therefore, measurements will always be related to:
History data.
Trends.
Usage patterns.
Typical lines.
Common bases.
Current values.
This context has always provided important and obvious benchmarks when comparing and analyzing an IT environment’s performance.
Thus you will determine “what is right”, “what is wrong” and what you just don’t care about.
Some metrics do not tell the whole truth
We know that availability is usually calculated by dividing the actual measured availability by the total possible availability of a certain interval.
0.9999 availability, for example, is considered a satisfactory result by most standards. Buuuuut, depending on when it takes place, that little downtime can be insignificant or important.
It is not the same if there’s inactivity between 2 and 3 in the morning for an online retailer or if it is at a time of great activity, near the end of the month or shortly before closing.
We are saying that the opportunity cost of each minute can range between tens of thousands of euros and hundreds of thousands of euros if it actually takes place just before holidays or during the period of greatest commercial activity.
With this we just intend to illustrate the relativism we live in and how crucial the context is to understand measures.
At a first glance we could say 99.99% is cool. However, it wouldn’t be so cool now if the 0.1% of application demand spikes and the 0.1% of downtimes match.
In this case, 99.99% uptime creates an over-optimistic image and may work against investigation of the underlying factors that may be causing potential performance issues or improper workload distribution.
In addition, a serious question arises:
(Serious voice).
Is the drop at times of absolute peaks of use a sign that the app is under-resourced, misplaced, or is it just an unfortunate coincidence?
Load spike failures have financial repercussions due to missed opportunities, but they also require a thorough examination of reliability, availability, network performance, and capacity KPIs, among others, to determine if any adjustments or fine-tuning are necessary.
*In theory, at least in theory, open tickets should be solved faster the more automation is used.
Therefore, it is important for IT organizations to track service ticket average resolution time (MTTR), as well as the amount and effectiveness of automation being used in their workflows for:
Configuration.
Provisioning.
Maintenance.
Problem solving.
In addition, a metric will be needed more than ever to determine and control the value of automation within the organization.
But we want to make clear that, in terms of automation, more doesn’t have to mean better.
Self-service portals, incidents and service requests have an inverse relationship:
The more end users discover that the self-service portal meets their needs for datasets, analytics, access to services and resources, etc., the less frequent IT service requests will be.
This goes beyond simple MTTR reduction.
It also involves employing self-service portals to allow customers to complete the most common service requests without the need to create and close a service ticket.
If installed and maintained, this should lead to a wonderful world where there are less service tickets issued, happier and more productive users, and the possibility, even, of users suggesting changes, additions and extensions of self-service portals.
Let’s evaluate the history of metrics
There are too many management tools and utilities for complex, hybrid cloud-based environments, don’t you think?
Companies tend to get the better deal if they focus their search on a single comprehensive, unified and complete management platform.
They often reduce the number of management tools they use, while streamlining the management of their IT operations by performing such a transformation.
The result?
A type of “virtuous cycle” that leverages improved automation and visibility to expand opportunities for continuous optimization and raise the level of indicators used to assess the overall health of IT infrastructure.
Conclusion
The areas that will most profit from automation and self-service access will be revealed by establishing useful cost metrics that go beyond the cost of IT acquisitions, amortization and depreciation, as well as the cost of IT consumption, including software-as-a-service solutions (SaaS), Cloud resources, usage, and permanent virtual machine assignments.
As a result, you will identify objectives for constant and continuous optimization and improvements that will keep costs in the right direction.
Want to know more about the IT world?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
Although it has been developed very quickly in recent years, thanks to technological advances, Artificial Intelligence (AI) has been around since the 50s.
Today this technology is being developed to do tasks that were previously only a matter for humans, such as programming.
What is GPT-3? Is your work as a programmer in danger?
AI is equipped with a set of tools, algorithms and techniques that allow it to learn on its own and improve its skills.
This makes it an excellent choice to replace programmers writing code in the near future.
First, AI is much more efficient than human programmers when it comes to writing code.
AI can analyze patterns and information much faster and more accurately than any human, allowing it to write code much faster.
AI is also capable of detecting and correcting errors automatically, which means the programming process is much simpler.
In addition, AI is much less expensive than human programmers to write code.
This is because AI doesn’t need to spend as much time learning programming languages, allowing it to save on working hour costs.
Well, you see? AI is not bad at all, after all, almost all the previous paragraphs have been written entirely by the ChatGPT.
Had you noticed?
Don’t worry, don’t panic!
If you really believe that AI in the near future can replace programmers writing code, re-read the previous paragraphs a little more carefully.
GPT-3, the autoregressive language model that uses deep learning to produce texts that simulate human writing, writes well, of course, probably better than me, because it doesn’t make mistakes.
But, again, read the first paragraph written by GPT-3 again to see if you find out what I’m talking about.
You get it?
I’ll come and give you a hand.
AI can write better than a human, but it will never have a purpose
If we asked AI to write us a story, it would write something with correct syntax, even with meaning, but the text would offer no greater interest than that written by a good elementary school student.
However, writing fiction literature or essays is an activity with a very large artistic and creative component.
You might think, and I do not blame you, that many bestsellers could be written by Artificial Intelligence, and it is more than likely that the authors of the future will use Artificial Intelligence tools to find flaws in their texts, to round off their style and in some cases to add some filling content.
Moreover, I would say that is already happening.
In fact, Google is updating its algorithms to detect content generated by Artificial Intelligences as the Internet begins to be full of it.
However, I guarantee you that this article contains something outside the scope of an AI today:
Acid irony.
Even more acidic sarcasm.
And why not? A certain melancholy.
*Damn it, this last paragraph was corrected by the AI, did I not tell you that it was possible?
But let’s go beyond that.
Before talking about an activity like code, let’s talk about other disciplines affected by Artificial Intelligence.
Are we talking about autonomous driving?
Soon Google, Microsoft and Apple assistants will use the new algorithms and will be much, much smarter, they will even be able to help us answer emails while driving, and give us better guidelines.
What’s more, I’m sure that in less than a decade, they will drive for us from point A (our garage) to point B (a public parking space).
But wait…
I live in Madrid…
Have you ever tried to find a car park in the center of Madrid?
Surely in Silicon Valley they do not have such hellish parking….
So, I withdraw what I said, that will still take some time, at least in Madrid.
Let’s give it 20… 30 years, but it will come.
I assure you, it will come.
The same will happen with text translation (but much, much earlier), the musical composition of the greatest hits, and with illustration, painting and graphic design.
If I ask Dall-E2 (the interface for creating OpenAI images with GPT3) to create an illustration for me under the premise “marvel-style illustration of a Hungarian family celebrating New Year’s Eve” it will draw this:
I swear I’m not kidding. It did it for me, in no time.
Is your position as a programmer in danger?
But back to the subject of code. I have no doubt that sooner or later (10 years from now) there will be tools that help developers create, debug and test code as a functional part of software development suites, such as add-ons or additional utilities.
Artificial Intelligence is/will be little by little an assistant that will add tasks to its backpack, but in the near future, the creation of full applications through a simple premise does not make sense, since as in literary, visual or musical creation AI lacks context.
Creating an application is an extremely complex process, where the code part is only one part, and it is not the most important part.
Context is much more important, and it includes answers to questions such as:
How will it be used?
Who will use it?
What data inputs and what data outputs are expected?
AI is good at giving answers, because what it does is study millions of existing questions and their answers, validating that learning process over billions of turns to the shaker we call Deep Learning, but…
Is it capable of asking new questions?
No, absolutely not.
Many will say that pure creation does not exist. That all stories have already been told, and that modern popular music does not come out of four chords repeated ad nauseam in different rhythms and melodies. They are right, but nuances are almost everything.
In the world of software development, these subtleties are a universe full of very subtle nuances that we can not “put in a shaker” and expect the mixture of previous formulas to work. It is science fiction and if I may say it, bad one.
Maybe one day Formula One drivers like Fernando Alonso will compete on a circuit hand in hand with Artificial Intelligence. But it won’t be this decade, or the next.
There are not only practical limitations, but ethical, moral, economic and legal limitations.
A commercial airliner could land on its own, but no insurance company would insure the device.
After all, who were we going to blame in the event of an accident?
The same applies to code generated by AI.
Who would patch it? Who would extend it? Who would talk to the client to understand the requirements? Who would invent the text of the “tooltips” to help in the interface? Who would design the interface (UI)?
Let’s get even more risky. Why not buy AI as a company CEO? Why not buy AI as President? Why not buy AI as a partner or lover?
AI applied to everyday life has just begun, but companies like Google already see their business model in danger, because what an AI does very well is answering questions and simplifying the process of obtaining information and delivering moderately satisfactory results.
Nowadays it is the ideal assistant, who does not stop observing and learning. And the time will come when it takes control over many activities, but as for software developing, it is still too soon.
Although we shouldn’t relax that much, everything is a matter of time.
After all, I said that this text was not fully written by AI,
At Pandora FMS we like to travel! Traveling, meeting people, bonding… And barbecues or country getaways are great, but there’s nothing we like more here than an event focused on technology!
That’s why we accepted the exceptional invitation to the latest Black Hat MEA edition held at Riyadh, Saudi Arabia last November.
There we went, to the Middle East no less, with our stand and our roll up, to present our respects, and services, to the most cutting-edge community that exists out there.
Pandora FMS visits Black Hat MEA 2022, the event of the year
For those who are not aware of all this stuff:
Black Hat MEA is a fairly iconic cybersecurity event, with year-round ethical hacking courses and offensive security classes that everyone wants to attend.
A global event that pushes the secrets of data security to the limit.
The largest information security trade show held anywhere in the world in 2022, bringing frontline and technology-loving companies together annually in a professional and festive atmosphere.
But I will explain.
We better talk to our lucky Pandora FMS colleagues who were able to attend this latest edition on behalf of our community. Alberto Sánchez, Systems Technician and Alexander Rodríguez, Salesperson.
Alexander, what would you say Black Hat MEA was like for Pandora FMS?
I think the event was a great chance!
Having a space within the booth provided by our exclusive partner in Saudi Arabia, LoopTech, was wonderful.
It allowed us several positive meetings with clients.
In addition, we had the honor to receive the visit of his Excellence Advisory Mr. Turki Alshikh. We were able to present him not only Pandora FMS, but the rest of the solutions in the field of Cybersecurity that our partner Looptech has.
We were very happy to receive a lot of positive feedback from the product.
Without a doubt, having participated in this event will help us achieve a better position in the Middle East market.
What did you learn from a place like Saudi Arabia and its people?
Saudi Arabia surprised me a lot.
It is a country that is growing very fast.
Although it still retains authenticity in the mud buildings in the middle of the desert and the spectacular sunsets on the dunes.
Its people are super friendly and are willing to help you in everything necessary to make your stay as pleasant as possible.
Most people speak English so it was very easy to communicate.
And I was hugely impressed that everything there is “go big or go home”: great plates of food, huge malls…
I would go visit the country again, without a doubt, to continue finding out more about its culture.
And you, Alberto? What do you think Pandora FMS contributed to Black Hat MEA?
I believe at least that Pandora FMS contributed to difference and originality, compared to the rest of solutions that showed up to the event.
As you already know, Black Hat MEA was focused in cybersecurity, meaning there were thousands aimed at email or mobile security, others focused in failure detection and there were those that avoid intruder access to devices.
Well Pandora FMS, among all of them, proved to be the tool that better looked after device health.
That its essential security feature is simply to prevent device malfunction thanks to monitoring, was something that stood out above the rest.
Any special memories of such an incredible journey?
It’s a tough question, because the whole trip was incredible.
The kindness and “brotherhood” of the people was shocking.
It was surprising the diversification of cultures that we experienced with people from all over the world, and the number of students who visited us asking really difficult questions to answer…
But, if you insist, I’ll tell you a very funny moment that stuck with me.
During a demo we could see that a group of students from the women’s university in Riyadh stared at us and laughed.
When we finished the demo, we invited them to ask things about Pandora FMS and we took the opportunity to ask them why they were laughing during my demo, you know, in case we had failed at something…
Their answer, while laughing, was that the word “Pandora” in Arabic is “Tomato”.
For the rest of the event we struggled, at the booth, to say Pandora FMS without a smile on our faces.
Want to find out more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
When monitoring the software components of a server, sometimes you may need to find out some additional information about the performance of the metrics you monitor.
Sending additional information in email alerts
This is all about putting data into context, because 25 is not the same if it is 25% of a CPU, or 25% of a CPU with other three more CPUs, all of them at 100%, or 25% of a CPU of a computer about to be blocked by excess of I/O transactions that has been overloaded for hours, which has risen the system’s temperature to the maximum.
Isn’t it true that “25” can mean many things? Let’s dig a little deeper into it
Continuing with the previous case, suppose that you wish to measure the CPU usage in one of the servers you manage, and where you defined thresholds that force notifications by email to computer managers.
This threshold (CRIT for CPU > 80) would be reflected in the module configuration as follows:
The alert is defined using the template“Critical condition” and I use the action of sending custom email to send to a specific mailbox.
Okay, so far it’s kind of basic.
But you may like to be able to send some additional information about the problem, something to collect only when needed, real-time information that is useful for you to find a solution automatically.
But…. Can Pandora FMS do this?
Well, you may include information from other modules in the email using alert macros that reference other modules.
moduledata_X_: It will show the data of the “X” module of the same agent as that of the module that triggers the alert.
That way, if you have a module called LoadAVG, calling the macro _moduledata_LoadAVG_ you may dump the value of the system load.
Likewise, to show a graph of the last 24 hours of that module, you should use the macro _modulegraph_LoadAVG_24_
*This last thing about the graph is still experimental, until version 772 it will not be available to everyone.
Showing procedures
Perhaps you would like to include textual information about what to do in case your module is set into CRITICAL, as some kind of instructions or procedure. To that end the macro _alert_critical_instructions_ will return the text that you configured in said module for this case.
Showing previous data
You may also be interested in showing the previous data on this monitor before the alert was triggered; to that end you may use the macro _prevdata_
Showing agent informational custom fields
Imagine that you have a field in the agent that collects data, which tells you the name of the system administrator and their phone number, as custom agent fields with ID 7 and ID 9.
To that end we would use the macro_agentcustomfield_n_ as macro_agentcustomfield_7_ and macro_agentcustomfield_9_ and thus be able to add to the email the name and phone of the person in charge of the system.
A full example, using macros in an email
Let’s now see an example!
If you wanted to send a somewhat more complete email, edit the email action you are using to add new macros:
Using dynamic information
What if you want to go further?
What if you want to execute a command every time something happens and collect the value to send it in the email?
That way, you do not need to have a constant additional metric when monitoring so as not to fill the database with information that is only useful in critical situations.
In order to submit additional information, it will be necessary to create a previous module in your software agent so that it collects the information only when necessary.
With that purpose in mind, enter the following structure within your module:
module_begin
module_name MODULE_NAME
module_type async_string
module_precondition > X COMMAND_TO_RUN_AS_CONDITION
module_exec FINAL_COMMAND_TO_BE_EXECUTED
module_end
The module will have to be asynchronous and with the type of data that you will collect.
This is due to the need for this module not to go into an unknown state, thus giving a false perception of failure, when it does not meet the module’s precondition.
A condition expression will have to be incorporated so that you may run the module normally.
For that purpose, run a previous command from which to obtain the numerical information to obtain the data. Following the example of the CPU described above (which is higher than 80%) it would be something like:
Once you create the module that will only be executed when necessary, enter this information in your email.
For that purpose use the following macro within the email:
_moduledata_TOP5_CPU_Proc_Usage_ This is only a way of using it to send the additional information, you may use it for other cases such as for example if the disk usage of a server is reaching the limit, you may show the five heaviest files saved on the server using the command “du -Sah/ | sort -rh | head -5”
Pandora FMS blog has a very clear purpose: for you to find out everything there is to know about the largest number of rare words related to computing, technology or monitoring, so you can show off among your peers (with whom the hell may you brag about this).
Today it’s “Hyperconvergence“! It may sound like something about spacecrafts going into a state close to the speed of light or psychic-type Pokémon attack, but no, it’s something else!
Do you already know what hyperconvergence is? Let us tell you about it!
Relax man! I’m not going to explain it… we better let an expert in the field speak, our dearest Chief of Systems, Mario Pulido.
Extraordinary Mario, sorry for the alliteration, could you explain to us what this hyperconvergence thing is?
Hyperconvergence is a virtualization platform in which hardware resources (CPU, RAM,..), storage, network connectivity
and pre-installed software are combined into a single manager.
This improves the scalability of the resources needed for
each of the services installed on the platform.
It also allows implementing HA, flexible, etc. environments running on virtual machines or in containers, depending on the need for resources within each environment.
Wow, and what is the structure of hyperconvergence made of or what does it include?
Well look, it is made up of a set of computer systems that provides the main hardware resources (CPU, Memory…), a storage system, networks and software.
All these resources are organized through a hypervisor, which is designed to be able to manage all the hardware and software resources necessary to establish the final service that needs to be implemented.
Is it true that there is a convergent infrastructure? What is the main difference between converged and hyperconverged infrastructure?
Yes, there is, of course they’re not the same, and the main difference between the converged infrastructure and the hyperconverged one, is that the hyperconverged one adds a top layer of software that allows to unify the management of different virtual services, containers… and to manage from that software, or device, all the resources to provide the service needed.
What would be the business benefits of hyperconvergence?
You’re one-track minded, aren’t you?
Well, above all, speed and ease of deployment, but also the ability to scale.
A unique appliance that integrates computing, storage and storage networks, everything integrated.
Process automation and higher control over the infrastructure elements, managing everything from a team of people, thus reducing personnel costs.
¿And for Pandora FMS? Our beloved company and increasingly more people.
Pandora FMS suite may require the deployment of multiple servers to obtain full infrastructure monitoring in an on-premise or Maas environment.
For that, it may be necessary to implement several VMs to install several Nodes in HA; to implement VMs to implement the Metaconsole; docker environments to start WUX or Elasticsearch containers, Satellites…
Hyperconvenience helps us in the implementation and deployment of the full Pandora FMS server environment, its possible vertical or horizontal scaling, as well as pre-production or backup environments to carry out tests and customized developments.
As with most of the services needed in a company, hyperconvergence makes it easier for us to implement Pandora FMS service.
Thank you very much Mario! It is always a pleasure to have your encyclopedic knowledge to reveal the truth to the world!
If you have any doubts, however small, do not hesitate to leave your questions in the comment box. We promise a quick, concise and loving response.
Christmas! That endearing time in which the streets are covered in lights, fallen leaves and warm couples holding hands.
Children smile and the chimneys smoke. Gingerbread, nougat and homemade almond cake become our sweet treats and, if we are lucky, a friendly family member offers to give us the Christmas bonus.
Yes! At Pandora FMS we love this time of year and we could not miss, for nothing in the world, to wish you a Merry Christmas 2022!
Merry Christmas 2022 from the whole Pandora FMS team
On these days we like to have sweets and for us there is nothing sweeter than each of the small and great achievements that we managed to unlock this year.
A sometimes difficult year, but thanks to our team, our customers and users we managed to successfully get by.
Pure product
Throughout the year, Pandora FMS has released a series of releases on a monthly and steady basis.
They have included all the evolution, innovation and fixes that Pandora FMS workers have added to our tool.
There have been so many improvements that it would be impossible to discuss them all in a single article, but we’ll leave here just a few:
Alert templates with multiple schedules
The possibility of including several schedules for both module and event alerts has been incorporated. With this new feature, different time slots can be generated within the same day or week, where alerts can be generated.
Support for MySQL8 and PHP8
We included support to be able to use MySQL8 without any type of modification or previous adjustment. We also prepared the console to work on PHP8 since the PHP7.4 support ended on 28 Nov 2022.
New report types
Custom Render
TOP-N connections
Agent/module
Agent/module status
SLA services…
LTS started being implemented
LTS versions are aimed at consolidating all changes of the RRR versions and offering maximum stability. Only two a year:
The possibility of a new service representation has been added.
This will be a centralized view where you may see the details of the tree node through a tooltip when hovering with the cursor.
Scheduled agent autoconfiguration application
Added the ability to schedule the appliance of Command Center agent auto-configuration rules automatically.
IPAM from Satellite
From Pandora FMS 764 RRR version it is possible to define IPAM network scanning from the Satellite server, indicating it in the Satellite server configuration file.
Improved network maps
Multiple changes have been made to network maps to improve the usability, performance and network map setup.
Map drawing and refreshing is automatic and dynamically reflects the changes in the network, highly improving the existing display in previous versions.
The possibility of deleting “Pandora FMS” node as well as all its relationships has been added. Usability has also been improved in manual relationship management between nodes.
Added linking between network maps. When there is a dummy node pointing to another network map, it will be possible to access that map from the dummy node options.
Report sending by mail as an alert action
A new feature has been added to Pandora FMS alert system whereby it is possible to send reports by email in PDF thanks to its incorporation as new actions/commands within Pandora FMS.
Trap history
The possibility to generate a trap history in the history database has been added to improve this feature’s performance in the console and improve the main database’s performance.
Credential store: WMI and SNMP
Although the credential store already existed in Pandora FMS, the possibility of saving them to be used in WMI and SNMP modules has been incorporated.
Forbidden password list
Added a password exclusion list so that the system does not let users enter certain weak passwords, thus strengthening the system’s security.
Pandora FMS Roadmap 2023
We want to take a qualitative leap to make Pandora FMS not only the most flexible tool on the market, but an essential part for IT management and daily operation.
That’s why we’re working on process automation thanks to powerful Artificial Intelligence, the creation of a CMDB, security monitoring and automated deployment.
For more news
But, as you know, it doesn’t end here.
Pandora FMS does not take a rest on its evolution and development and so that you do not miss any news, we leave you this link here.
Follow our change log and you’ll always be up to date!
Our headlines
Pandora FMS and drought monitoring
As you know, this summer half of Spain was on drought alert. A consequence, without a doubt, of the extreme summer heat and the scarcity of rains.
Thank heaven and science, technology experts already point out some solutions to reduce the impact of this type of phenomenon.
And we are very proud to say that among those solutions there is Pandora FMS.
Pandora FMS gets Red Hat Enterprise Linux software certification
Yeah, yeah, yeah! Thank you all!
At Pandora FMS we are in luck, we now have Pandora FMS RHEL8 software certificate.
Pandora FMS brings the Internet to 500,000 people in Brazil
We said it just like that but…
More than 500.000 inhabitants of the working-class district of Povo do Acre, located in the northwest of Brazil, have Internet connection thanks to the collaboration of our company.
What a great work!
Pandora FMS becomes an M81 partner to make IBM i system monitoring easier
Well, well, look at that! This year we became an international benchmark in system monitoring by becoming a technology partner of the French company M81.
As many of you may know, the French platform has extensive experience in the sector since its foundation in 1988 and is currently considered one of the great experts when it comes to monitoring IBM i systems.
As a brand, we will now have the opportunity to transfer these types of solutions to Spanish companies to improve IT management and the efficiency of the different work areas.
Pandora FMS receives the Emerging Favorite mention in Capterra’s Shortlist of server monitoring software and APM
Prizes! Awards! Medals! Honorary pins!
Yes!
We are proud to announce Pandora FMS as the winner of the Best Usability 2022 badge in the Network Monitoring category.
Apart from its mention as an Emerging Favorite in the 2022 Shortlist of Server Monitoring and APM Software from Capterra, the world’s leading software review platform.
Coastal municipalities monitor their beaches to measure the environmental impact of tourism
This year the Spanish tourism sector has had a record summer.
90% of foreign tourism that visited the country in 2019 was recovered this summer.
Therefore, the administrations of the main tourist centers were reinforced with the technology necessary to control capacities.
Yes, by “the technology necessary” we mean us.
We loved helping to improve the performance of public services and minimize the environmental impact this summer.
The arrival of Pandora FMS in the United States thanks to the master’s degree of Rice University
Pandora FMS is an international entity and needs activity.
And in search of that activity we set our eye on that great technological power, the United States.
In the end we managed to count on a native and capital team, with five senior professionals who helped us with their proposals and whom, in turn, we helped with their project.
Madrid improves EMT services by monitoring its bus data
The public service of buses of Madrid, the EMT, was one of the protagonists of Global Mobility Call developed between 14 and 16 June at the IFEMA.
The company from Madrid exposed its future plans tracing the route to continue transforming the capital into a smart City where sustainable mobility and independent vehicles acquire great relevance.
Nevertheless, executing this plan would be impossible without technology characterized by generating data on a steady basis.
Therefore, the city went for data control through monitoring. (That is us!)
This is the secret of the success of the EMT, who has already established a monitoring system thanks to Pandora FMS.
Pandora FMS at the top of G2
G2, a platform that currently has more than 60 million visits a year, and in which users can read and write quality reviews on 100,000 software products and other professional services.
That is why it is so important and honorable that Pandora FMS has become part of its Top 10 of the best Network Monitoring software.
Conclusions
And these are just a few small strokes of all the success we achieved throughout this 2022 thanks, we repeat, to all of our colleagues and to all our clients and followers.
That is why we will not stop repeating it over and over again:
Merry Christmas 2022!
May you have all your loved ones as close as the frozen bottle of champagne and the mix of chocolates, sweets and nougat!
Would you like to find out more about what Pandora FMS can offer you?
Pandora FMS team will be happy to help you!
And if you don’t want to miss out on any of our new features and you are into IT, releases and, by all means, monitoring, we wait for you in our blog and our different social media, from Linkedin to Twitter, not foregetting Facebook of course.
We even have a Youtube channel with the best narrator voices ever. Oh, and we also recently got our Instagram channel. Follow us! We still have a long way to go to match that of Billie Eilish!
Pandora FMS Community was first launched sixteen years ago. Today, it has more than 2.5K active members* that visit it to participate, learn, answer questions, and contribute everything they can and know.
*4.6K discussion threads and over 16K responses.
But the time for change has come!
The new Pandora FMS Community is here!!!
With the growth of the community, and the extensive scope of useful content available, we knew it was time to invest in updates to support our users and welcome new members with open arms.
We migrated to a new platform.
A platform for Pandora FMS Community that allows new user experience with categorized questions and answers as well as private and public groups. New knowledge base and integrated blog.
But don’t worry, all the previous links are redirected to your new home!
The question is: Why are we launching a new community site?
Simply put, we want to help our whole community connect, collaborate, and share knowledge in every way possible.
And this launch is our particular investment to provide you with the technologies and capabilities to enhance your experiences and increase support, education and contribution.
Restricted group for users who manage complex Pandora FMS configurations (Open or Enterprise) and want to contribute. Discuss the roadmap, usage issues… Access to unpublished material will be restricted.
Pandora FMS Beta program helps to publicize what is currently being developed in Pandora FMS, both in the Community and Enterprise versions, accessing development versions generated daily.
These versions can be used to test new features, evaluate bug fixes, and evaluate development progress in test environments.
Since the group is closed and small, it is an excellent group to propose improvements, usability failure detection or non-contemplated use cases, etc.
To join the group, which is a restricted-access one, you must request access through our community website.
In this group there are community users and Enterprise version customers alike, there is no need to give away any personal data or identify yourself in any way, all those who want to be part of the group and can contribute something are welcome.
Whether you are an IT company professional, a teacher of a technical course or an open source enthusiast, this group is geared towards helping coordinate Pandora FMS working groups and events.
Categories established with different topics
Range ranks and badges with karma system updates
Private messaging on the platform
Its main differences with the previous forum?
The previous forum was limited to questions and answers, a forum for pure and simple discussion.
The new Pandora FMS online community, in order to enhance bilateral communication between users, integrates many more options apart from the forum:
Its very own blog.
A knowledge base.
Public and private groups.
Q&A.
Resources.
Private instant messaging.
Online merchandising store.
In short, we wanted to open a wide range of information, concentrated into a single place, to make it easier for all of our users to understand so much information, instead of just using it to their advantage.
Conclusions
The new Pandora FMS Community brings together in one place everything you may need to share, expand and improve knowledge about monitoring with Pandora FMS, both for Enterprise users and those from the OpenSource version.
It is not just about bringing together people with the same interest, but about taking advantage of the knowledge of the team and the community so that members can achieve their goals in an integrated way in the same place.
Would you like to find out more about the new Pandora FMS Community?
We have talked many times about the life and miracles of Pandora FMS Enterprise version. We are very proud of it indeed! We are like the father of the kid who wins the football final of the school league or the mother of Halle Berry crying inconsolably when her girl received her Oscar.
That’s why today, in Pandora FMS blog, we wanted to stop for a second to talk, summing things up, about our Enterprise version features.
We are going to list them and, like a game, you are going to point out whether you knew each one of the features or not (sort of a test to check whether you are a valid human being or not, you know).
Every “Yes, obviously I know this feature!” will be 10 mini points.
Learn about our Enterprise version features
Let’s see how many points you get!
Services (10 points)
Root Cause Analysis and visual display of the tree of critical elements that make up a service.
At a glance you will see the source of any issue!
Policies (10 points)
They enable homogenized monitoring and deploy standard monitoring by technologies.
You may manage the configuration of hundreds of agents in a simple way, with just a few clicks. Save lots of time and efforts!
Customization and OEM (10 points)
You may modify the console’s looks, installers, and even the product name if you wish so.
We can make custom installers to make a white label for you, so that you can sell Pandora FMS as your own product with all of our help and support.
History DB (10 points)
It stores in long-term databases information for reports, graphs and raw data from all your monitoring.
You won’t have to give up any data if you don’t want to!
Delegated Authentication(10 points)
Delegate to your Active Directory all user authentication, profile-based creation, and attribute-based role assignment.
Save your time and efforts.
Distributed servers (Satellite) (10 points)
Deploy monitoring in remote locations, customer offices or isolated environments.
Use our servers as intermediate management centers.
You will have the flexibility to obtain information in every way possible.
Remote control (10 points)
Integrate the control of your servers and workstations into the monitoring console, centralizing system management.
Windows, Linux and Mac.
Remote desktop and shell, file copying, and service and process control.
Transactional User Experience Monitoring (UX) (10 points)
Learn how your apps work, step by step, screen by screen, simulating the actions of an end user.
Carry out tests from different locations.
Don’t wait for users to detect faults, get ahead of yourself!
Remote Agent Deployment (10 points)
Plan and manage agent deployment remotely centrally, defining different configurations based on IP addresses or user attributes.
Omnishell (10 points)
Programmed and distributed remote command automation and execution.
Run commands and scripts in bulk and in a centralized way.
Collections (10 points)
Distribution of tool packages, monitoring plugins, configurations or scripts to deploy complex monitoring among your systems.
Command center (Metaconsole) (10 points)
Our solution to monitor dozens of thousands of systems.
A federated console capable of centrally managing an unlimited number of items.
HA (10 points)
High availability across all major components.
An integrated system that allows database switch-over either scheduled or manually, as well as node recovery.
Log collection (10 points)
Use monitoring agents to collect native logs from applications, operating systems, or system events.
Unify all the information and have it available to find out what is happening in real time or do forensic analysis after months of data collection.
Correlated alerts (10 points)
Define logic relationships between events to detect complex casuistries.
Relate events to logs, group search results logically. Integrated event and log correlation.
Inventory alerts (10 points)
Define alerts to find out when something changes, to know if you have vulnerable software installed, or if a firmware version is faulty.
Use extensive inventory information to anticipate problems.
Discovery Cloud (10 points)
Discover and monitor systems, databases, and other resources in environments such as AWS, Azure, or Google Cloud.
Manage costs in AWS and unify all your system information, wherever they are, on a single platform.
Discovery Applications (10 points)
SAP, Oracle, DB2, SQL Server, and other applications will deliver low-level or high level data that is easily and centrally accessible.
Enterprise ACLs (10 points)
Customize console access by users, groups, and features.
Along with visual customization, it allows you to design the use you want to make of the console for your users.
TO SUM UP
To wrap up, keep your score at hand. Let’s get to the summary and result.
Now imagine the voice of your head as if it sounded like Steve Harvey reading.
If you got from 0 to 50 points:
What a mess! It’s time to check your knowledge on the tool and stop worrying about the monitoring lobby.
From 50 to 150 points:
Improvable but on the right track. We leave you here a link to our wiki so that you do not stop feeding that curious mind that God and so portentous genetics have given you.
From 150 to 190 points:
You’re awesome! You can celebrate your triumph with a little dance on your seat or throwing kisses into the air. You are the best that happened to us and we are as proud of you as of our tool! Pay us a visit at our offices to collect your gift:
Although 2020 brought us the coronavirus pandemic, in November of that same year version 8 of the PHP language also came into our lives. Two years later, Pandora FMS LTS 767 version will be the first full release with version 8.
Let’s talk about what’s new in PHP version 8
PFMS Web Console
Pandora FMS has several components and where the use of PHP language is most essential is in your Web Console.
*It also uses other technologies such as JavaScript, AJAX, etc., but the “dark horse” is undoubtedly PHP.
As an example, PHP is the connection tool with the database and the one in charge of generating the HTML code (yes, a programming language generating code for another language), as pillars of greater importance for work.
During these years, the focus has remained on providing full compatibility with PHP 8, being version 760 the first to use this version without losing compatibility with PHP 7.4, introduced in version 759 (PHP 7.2 was active from version 729 to 758).
On November 28, 2022 the life cycle of PHP 7.x ends and therefore from version 766 RRR, in new installations, by default, Pandora FMS uses PHP 8. For existing customers, both Open and Enterprise must keep in mind the upgrade to PHP 8 after obtaining, through Warp update, the 767 LTS version.
Features
The PHP language has dominated the web application market for decades (an estimated 80% presence) and, although it has many detractors, it actually has its good things and its so-not-good things.
One of its features is that it is an interpreted language, for which it takes four steps in its execution.
Although code preloading and advanced cache usage were introduced in version 7.4, in version 8 they reduced the steps to only three, resulting in speed and energy savings.
*It is much more complex than I describe it. I set out here in broad outlines and always for informative purposes.
PHP 8 features 20 new features, from simple things like the use of commas at the end of lists (trailing commas) to the “mandatory” and fully integrated use of JSON format handling.
Although all of these features are completely transparent to developers, a few will be noticeable even in end users. Such as, for example, in the processes of sorting elements, which are now completely stable.
There has been reported an improvement in WordPress of 18% in the number of requests per second able to be performed and in Laravel of 8% of improvement accordingly.
Both improvements over PHP 7.4 and 7.2.
Implementation
PHP 8 must be implemented by the local area network administrator, so you must follow the data backup (and even recovery) routines before performing a successful update.
At Pandora FMS, considering that outdated software is one of the six common computer maintenance issues, we have a basic guide for upgrading to PHP 8, depending on the operating system used to run Pandora FMS:
“PHP is as exciting as your toothbrush. You use it every day, it does the job, it’s a simple tool, so what? Who would like to read about toothbrushes?”
“PHP 8 is significantly better because it contains much less of my code.”
— Rasmus Lerdorf (Humble creator of PHP)
Note: At the time of writing these lines the current PHP version is 8.1 and they are expected to release version 8.2 on December 8, 2022. For more information visit: https://github.com/php.
Did you know that the visual console editor allows users to design the final look by dragging elements with the mouse?
You just have to choose the background and icons that represent the status of each relevant aspect you want to display.
We tell you this and much more in the video on our workshop.
Are you familiar with visual console and dashboard editing?
As you may have seen, among many other things, with dashboards you may define screens with different visual monitoring elements you created previously and share them with other users, or see them in full screen in slide mode for the whole team to see them.
If you still feel there are any issues to portray or solve, please feel free to contact us through our comment section, social media, our own website or our forum especially devoted to the community.
You know what data centers* are, we’ve told you a lot about the on this blog. Today, however, it is time to check out a particular aspect such as the singleness of their architecture**. In addition to what role they play in the present and which one they will play in the future.
* Physical facility that organizations use to host their information, applications, critical data…
**There’s a good example of alliteration, great rhetorical figure.
So let’s go!
Data center architecture, present and future
Lately with so much cataclysm and recession, it seems that the world is going backwards. However, there are things that improve. The Succession TV show is cooler every season and last summer they released a new variety of Magnum ice cream that is superior to the previous ones. For instance.
Technology is also evolving. In fact, you can see right now how all sorts of innovations take us to the next level.
Data centers are not left behind
About moving forward, I mean.
Why?
Well, because in recent years, IoT technology, the overwhelming need to accumulate data and our beloved Cloud have lovingly promoted the modernization of traditional data centers.
Otherwise these would be obsolete.
As many of you know, the design of a data center is based on a network of computing and storage resources that allows delivering shared data.
Its key components include:
Routers.
Switchgear.
Firewalls.
Storage systems.
Servers.
Etc.
This is when a number of companies are shifting to modern forms of data centers*.
*Which pose as many advantages as challenges.
More than twenty years ago, when data center architecture became a hot topic, there was debate between the CISC (Complex Instruction Set Computer) and RISC (Reduced Instruction Set Computer) architectures, and between SMPs, mainframes, and small systems.
All this happened before the surprising emergence of coprocessors, AISCs and other accelerators, to boost data access and optimize complex operations.
Currently, data centers are mostly aligned on x86 CPUs, small two-socket servers, and a general standardization of the components that make up the modern data center.
Even so, corporations continue to look for ways* to increase their efficiency and productivity by helping themselves with technological advances.
*Always at a lower cost.
Where do data centers come from and where are they headed to?
Like all technologies, from the pulley system to home ice-cream maker, data centers have also gone through a long way of transformation.
Before the 1990s, data centers were made up of large computer rooms. There, any computer error made them stand out within the system.
In the 1990s, as the Internet began to take shape and take center stage, data centers became popular among businesses.
As the new century began, folks began to become more aware of the data centers and brought to light incredible improvements. Such as data center services, outsourcing demands, shared hosting, application hosting, managed services, ISPs, ASPs, MSPs, etc.
During later years, data centers became stabilized as a concept in society. The focus, then, was on energy efficiency, refrigeration technologies and management facilities.
Is this the end of ordinary data centers?
Today, a good Intel CPU is considered the most powerful on the market. 112 cores, an incredible number of features to handle all kinds of workloads or technical machine learning activities.
Even so, companies seek, as police hounds, a new solution.
They are aware that big data analytics, machine learning, artificial intelligence, the so-called “Internet of Things” and other high-spectrum technologies are changing the approach to data centers.
Modern technologies, as they have been doing from the pulley system to home ice-cream makers, try to minimize costs.
That’s why, if we take into account the money, efficiency, power and optimization in a modern data center, you’ll find old architectures no longer work.
They consume more energy and take up more space.
Furthermore, there are already better services, more attractive ones…
GPUs are being used, for example, for specialized tasks that suppress single-core CPU performance.
In fact, GPU-enabled platforms have caused a readjustment of system designs, addressing the data-avid nature of processors.
Despite what it may seem, in recent times, cloud providers are switching to independent data centers, and, of course, large corporations are following suit.
In the immediate future, the evolution of data centers is expected to approach a new paradigm, probably because the Covid 19 pandemic has pushed the world to work in the cloud like no one imagined.
Here, in our beloved Pandora FMS blog, we have talked a big deal about computer risks. This does not mean of course that we consider ourselves to be faint-hearted or timid, but rather cautious heroes. And in order not to be alone in a battle against the evil that lurks around, today, continuing with this theme of terror and digital desolation, we bring you: some of the most dangerous computer viruses in human history!
These are the computer viruses you should fear the most!
What is a computer virus?
Before bringing on the storm, listing malicious software, we’d better explain a little what this whole thing about computer viruses is and why, although you have to be careful with them, you don’t need to use masks.
A computer virus is a malicious program or code created and conceived to truncate the operation of a computer.
Like the biological microorganism, they are also infectious, although these replicate only within computer equipment.
They propagate from one computer to another, usually attached to a legitimate document, then execute their cursed code.
Although you may think the computer virus has been with us since the first pulley system, it was Leonard M. Adleman, in 1984, the first to use the term while finding similarities between his student Fred Cohen’s college experiment and the HIV virus.
List of the most dangerous computer viruses that have ever existed
Now, let’s get down to business!
We go into it!
I LOVE YOU
Funny thing is, this virus does everything but love and appreciate you for who you are. In fact, on its own, it has devoted itself to creating chaos around the world with about 10 million dollarsin damages.
It came to be believed that 10% of all computers in the world were infected by it and it caused large institutions and governments to disable their email system for not wanting to take any risks.
You see, something not even the tiresome, stalking Linkedin publicity achieved.
I love you was created in the Philippines by Reonel Ramones and Onel de Guzman using social engineering (“A set of techniques that cybercriminals use to trick incautious users into sending them confidential data, infecting their computers with malware, or opening links to infected sites”) they sneaked it into the Philippines, to all of Asia, and in a short time to the rest of the world. Fun fact:
As the email they sent for you to click on the attachment was a declaration of love, the virus was called “I Love You”.
MELISSA
Its creator was David L. Smith and detonated in ’99 as an infected Word document that was presented to the world as the best thing ever for perverts:
“Hello, I am a list of passwords for pornographic websites.”
At that time the virus was mailed to the fifty most important people in your email and created havoc with his deceptive list of passwords. Of course, the most curious and salacious ones fell for it right away.
It also came with a sort of cover letter, a reference to the Simpsons.
Less than a week after his presentation to the public, David L. Smith was captured by the police. Oh, I’m sorry, David.
However, for his special collaboration with the authorities in trapping other perfidious virus creators, his sentence was reduced from 10 years to 20 months.
Still… His virus caused 80 million dollars in damage.
Fun fact:
If “Melissa” sounds like a sinuous and more like the name of a hurricane, it has to do with the fact that it comes from an exotic dancer from Florida.
ZEUS
A trojan (“A malware that presents itself to the user as a seemingly legitimate and harmless program, but which, when executed, gives an attacker remote access to the infected computer”) created especially to truncate computers with Windows.
It did a number of awkward things on your computer, including capturing forms. Most computers became infected due to hidden downloads or phishing (“A technique that involves sending an email from a cybercriminal to a user pretending to be a legitimate entity”).
It was used for such ominous things as stealing login credentials from social networks, emails, and bank accounts.
In the United States alone, more than one million computers were infected.
Fun fact:
It compromised corporations such as Amazon, Oracle, Bank of America, Cisco, and many more.
STUXNET
The virus is believed to have been created by the Israel Defense Forces along with the United States Government.
With these two agents involved, what do you think? That the virus was spawned as an experimental project and that it got out of hand? Or that it was done, expressly, to bring chaos upon our civilization?
Bingo!
This virus was designed for cyber warfare.
It had the goal of halting Iran’s advances in nuclear defense. And so it was, much of the infection took place in Iran.
Fun fact:
It spread through infected pen drives and altered the speed of the devices until they became damaged.
CRYPTOLOCKER
A ransomware (“A type of malicious program that restricts access to certain parts or files of the infected operating system and asks for a ransom in exchange for removing this restriction”) Trojan that uses, among other means, email to spread.
Once your computer was infected it went on to encrypt some files from the hard drive.
The thing here is that, even though it’s easy to remove as a virus, the files it encrypted stayed still encrypted, unless you paid a ransom by a deadline.
The ransom used to be $ 400, although it could increase, and the number of infected computers was 500,000.
Make the numbers yourself… With only half paying the scammers, you could afford a house in Florida!
Thank God, Evgeny Bogachev, leader of the organization that operated with this virus was arrested and forced to return all encrypted keys.
Fun fact:
In the end, only 1.3% of those infected fell into the scam… That’s about 3 million dollars. Not bad at all!
Madrid hosted on October 26th and 27th one of the major international cybersecurity summits.
The fair Cyber Security World has brought together large technology companies, public administrations and references from the IT sector to address the main topics.
Among them that of cybersecurity.
An increasingly analyzed concept that, in the midst of the Ukrainian war, has multiplied its concern among companies and governments.
What do you know about the Madrid cybersecurity summit?
Data hosting in the cloud, the adaptation of the different administrations and the emergence of new solutions are some of the issues addressed by the major players in the sector with the aim of preparing for the new digital era.
“Europe is already on alert for data to not depend on third parties.
It is a maxim both among public administrations and among companies, who may see their systems attacked by hackers or simple computer errors,”
ensures monitoring expert Sancho Lerena, CEO of the IT company Pandora FMS.
The European Commission, in fact, has already set ahead the goal of achieving technological independence by 2030.
According to the data they provided, 90% of the data of the European Union are managed by American companies.
In addition, less than 4% of major online platforms are European.
An example of this technological fragility is that the European market represents less than 10% in the microchip manufacturing sector.
“In a couple of years, more than 50% of companies should be using the Cloud,” the expert says.
The European future of cybersecurity
The challenge for 2030 is to maximize digitisation within the European Union.
The project Compass Digital, for example, includes multiple investments and objectives, but the sector agrees that many steps must be taken to achieve full cybersecurity nowadays.
“There are many companies that still have legacy, outdated systems that cannot incorporate the latest security developments,” acknowledges Lerena.
The IT company Pandora FMS is one of those that works with both digital administrations and companies through its monitoring system.
The concept of monitoring is increasingly widespread in the sector, as it allows the real-time management of all data generated within an IT structure.
“This technology not only helps improve the control of data and activity of a platform, it also strengthens security and warns about possible errors to improve reaction time.”
Explains the head of technology, whose solution is present in institutions such as Madrid Digital, relying on the Comunidad de Madrid, or the EMT.
Also, having international giants such as Rakuten or Toshiba shows the importance that this type of technology currently has.
Europe is already looking to 2030 with the intention of extending this digitisation.
Companies are incorporating monitoring systems and strengthening the cybersecurity of their companies.The objective is none other than to prevent European actors from being “well below the EU’s global economic weight” in technologically relevant areas.
Essential for Smart Cities
Cybersecurity will become increasingly important.
Especially considering that the objective of the most developed countries is to implement those known as Smart Cities where technology and data control will be fundamental for the efficient management of cities.
The concept of Smart Cities responds to those cities where, through data analysis and the use of the latest technological solutions, services are more efficient for citizens and do not generate a negative impact either in economic terms or in the environmental field.
For example, to find out in which areas more waste is generated to improve the garbage service in that area or the management of public transport through citizen accessibility.
Therefore, the proper processing of these data and their security will be a pillar for the cities of the future.
“Without the control of these data, and without technological independence, it will be very difficult to develop these Smart Cities in a stable way”, says Lerena.
Have you become curious and want to find out more about how Pandora FMS can influence your future?
“The Code Ethics of a company”sounds pretty serious right? Something like out of a philosophy masterclass or something your dad would say when scolding you.
Maybe something like a TED talk or a day of self reflection. What can we say? In this house Kant rules!… as well as morality, in addition to justice and getting along as well as we possibly can, both professionally and purely socially.
That is why we would like you to have the code of ethics of Pandora FMS at hand. Because we are that transparent and prone to letting people know the inner workings of our company.
Personally, I’ll go over it one more time.
After all, they are the rules of the best board game possible.
What’s Pandora FMS code of ethics?
Objective and scope
The group of companies behind Pandora FMS, led by Artica PFMS, seeks through this Code of Ethics and Conduct, to reflect the ethical criteria that have guided us so far.
Thus, the objective of the code is to establish general guidelines of conduct that guide the performance of the professional activity of all people related to Pandora FMS and complying at all times with current legislation.
Each of the actions and decisions must be oriented towards “doing the right thing”, to strengthen the reputation that characterizes us as a Company.
Recipients: The recipients of the code of ethics of Pandora FMS group are all its partners, employees, suppliers, partners, customers and/or any third party who maintains a relationship with Pandora FMS
Validity: This Code will enter into force the day after its approval, which includes Pandora FMS management team and the Works Council.
Its content will be reviewed periodically on an annual basis, in order to make the appropriate modifications.
With products such as Pandora FMS, the monitoring software that we market in more than 50 countries around the world.
From Pandora FMS, we seek long-term customer relationships, being able to adapt and grow at the same time as our customers.
Our mission; as monitoring experts, we know the huge potential of Pandora FMS to improve any organization that supports its business on technology.
We want to work as an early warning, warning at the right time before an unforeseen event happens.
Always working as a committed community committed to excellence and integrity.
Our approach is to be key service technology providers and be present in companies from multiple sectors worldwide.
Since its birth, the company has always stayed strong, firm and safe on six pillars.
Six pillars that surround and delimit it as well as cement and roof it. This means for us a home made of values, with which we coexist and improve looking for a prosperous tomorrow while elaborating a worthy legacy.
Honesty: Because to be sincere and consistent we should start with ourselves, and from there we can then attempt to harmonize at all times what we say and what we do.
This is something that characterizes us and to which we attach great importance, both for our own coexistence and for the perfect development of our work.
Loyalty: Because, as a basic principle, we will never turn our backs on our work, our clients, or our employees.
We are united by bonds beyond convenience and profit, as deep as the fulfillment of honor once was and will always be the treasure of gratitude.
Trust: Because we have the belief and persistent faith of suitability among us.
We do not hope, we know that we will act properly both in the ordinary morning and in the exceptional afternoon, and our confident actions reinforce this conviction day by day.
Team Spirit: Because a crushing fist is always made up of five skillful fingers that perfectly match each other.
And because one, alone, never planted battle. And if it did, whether it won or lost, it always waited for the applause or the sympathy of its companions.
Objectivity: Because despite the sensitivity or affinity that binds us to our work, we limit ourselves to indicating the observable and evident features to judge it.
And so we offer the world what we understand to be good and necessary from every point of view and sentence.
Quality: Because the only thing that can come out of this house of ours is the excellent and a hundred hours worked, the purely tested and effective, what the customer wants and aims for, even what no one expects and exceeds all expectations.
After all, it bears our signature, that of every Pandora FMS colleague who has pledged to give their best.
Ethical principles of conduct
The Code of Ethics and Conduct determines specific guidelines for action in the following content areas:
A. Compliance with legality
Compliance with the national and international laws, regulations and good practices applicable at any time in any territory or country in which Ártica PFMS SL and its affiliated companies operate will always prevail in the development of the business activity against any other consideration, without exceptions.
Company professionals must keep, in all circumstances, exemplary ethical behavior and avoid any behavior that may go against applicable regulations, damage the reputation of the organization or adversely affect its public image.
Nor will they collaborate with third parties in activities that could violate the legislation in force or damage the trust of third parties in the organization.
WORKERS
B. Equal opportunities:
Pandora FMS offers the same opportunities to any partner of the company.
This equality is expressed through dignified treatment at all levels for all people.
Ensuring the application of laws that take their chances on equality and rejecting any manifestation of physical, psychological, moral, abusive, intimidatory or offensive harassment against the rights of individuals.
In no case shall discrimination be permitted on grounds of gender, ethnic and/or racial origin, nationality, age, socio-economic status, disability, religion, sexual orientation, marital status, etc.
Pandora FMS is committed to diversity, where anyone who demonstrates commitment and good results will have the opportunity to develop themselves in the organization.
C. Reconciliation of family and professional life:
The balance between work obligations and family life is advocated, maintaining a policy that makes it possible to reconcile both vital areas.
For this, we are committed to teleworking, so it is allowed to carry out contracts in areas and cities that are not in the usual work centers.
D. Customer service:
We base our success on customer satisfaction, being a fundamental requirement for business growth.
Therefore, our goal is to provide the best possible service, always taking our chances on integrity, respect and dignity.
We declare our opposition to any type of action that may harm third parties and thus the image of the company.
E. Occupational safety and health:
At all times the preventive measures established by current legislation will be followed, in order to achieve safety in the facilities and services.
Therefore, the instructions of the external occupational risk prevention company will be followed, where the staff will obtain the resources and knowledge necessary to perform their functions in a safe environment.
Accordingly, the entire workforce will know the protection rules, to ensure their own safety and those of colleagues, customers, suppliers and/or any third party that may be affected.
We firmly believe that the people who make up our team are the most important asset of the company.
F. Fair competition as a Worker:
Commitment to compete fairly in the markets, complying at all times with competition regulations.
In the event of termination of the contract, the worker must not concur with the activity of Ártica PFMS S.L within two years following the termination of the contract, being unable to provide services directly related to Pandora FMS in another company.
G. Selection, remuneration and professional development:
Personnel selection and promotion is based on the competences and performance of professional functions, together with the skills defined in the requirements for the job, making possible flexibility regarding a change of position within the company at the request of the person concerned.
The company offers a fair remuneration, always above the Collective Agreement for consulting and market studies.
Within the company it is possible to grow professionally according to employee performance, always following the principles of equality and respecting family and work reconciliation.
CUSTOMERS, PARTNERS AND SUPPLIERS
H. Confidentiality and privacy:
All information developed by Pandora FMS group, (including personal data that we process both as Data Controllers and as data processors), is considered private and confidential.
It is forbidden to disclose any information related to specific operations, with people who are not directly related to the operation.
Likewise, it is stipulated as confidential information, and therefore, it is not allowed to share with third parties any documentation that is not provided with the category of public, avoiding to share any document including:
Sales strategies.
Financial information.
Wages.
Information on specific operations.
Nonpublic tables of prices.
Personal data.
Etc.
In any business agreement, an agreement of effective confidentiality will be signed during the whole business relationship.
I. Conflict of Interest:
All members of Pandora FMS group seek well-being and business growth.
For that reason, it is forbidden to act to seek a personal benefit at the expense of Pandora FMS.
All activities must seek the well-being of the company, avoiding improper profit or involving a problem to the performance of the organization.
The company will seek integrity at all times.
J. Non-competition agreement:
As an employer, any figure related to the activity of Pandora FMS must respect the agreement of non-competition and permanence of the company, according to Article 21 of RDLeg. 2/2015 of 23 Oct. (Consolidated text of the Workers Statute Law).
Therefore, no job offers or employment contracts will be made to workers who provide services in the company.
K. Quality of services:
Any company or person that provides a service related to our company must seek excellence and act with an adequate knowledge that allows them to perform adequate services.
It is important for all relationships to be documented in clear terms, in order to be able to determine precisely the rights and obligations arising from these relationships.
L. Transparent business practices:
Transparency is key to strengthening the relationship with Pandora FMS community. For this reason, the information will be transparent, open and two-way, creating relationships of trust where the relevant opinions that help business growth are taken into account.
M. Care of our resources and work tools:
The company’s human and technical resources are limited. For this reason, it is important to make correct and effective use of all resources.
N. Fraud prevention:
In no case will be incurred in actions that can be considered as fraud against the company.
The values of integrity and honesty will always be followed.
Within examples of fraud, we can find: entering undeclared money from a sale, making false expense reports, making incomplete deposits, fraud with licensing, among others.
O. Relationship with the authorities:
We are governed by information honesty and transparency.
For this reason, whenever an authority, regulatory body or the Public Administration requires information, it should be provided.
On no occasion shall bodies, inspection bodies or administrative supervisors be denied or prevented from acting.
P. Declination of gifts:
Seeking objectivity in the selection of third parties, The offer or delivery or acceptance of gifts or attentions that could induce one to think about possible deals of favor or counterparts, whether real or not, are not allowed.
The exceptions to this rule must refer, necessarily and exclusively, to gifts or hospitality that, having an irrelevant or symbolic economic value, fit within the usual standards of business relations and do not present any caveat from the point of view of the legislation in force in each country.
When in doubt as to whether a gift is considered inappropriate, you can check directly with HR or write to the ethical channel of Pandora FMS.
Q.Environment:
All employees are committed to taking care of the planet’s resources, making rational use of water, paper, electricity and all natural resources.
Whistleblowing
Whistleblowing channel
Within the work environment, if you are a victim or witness of any situation of injustice, abuse or any act that violates our Code of Ethics, do not hesitate to use the means that the company puts at your disposal, to communicate the incidence.
For any suggestions or complaints you may write directly to pfmsetico@pandorafms.com or address the company at direcciongeneral@pandorafms.com
In Pandora FMS we are in luck, we now have Pandora FMS RHEL8 software certification.
Some called it impossible, others the next step to take, whatever the case everyone received it with applause!
But hold on…
What is Pandora FMS RHEL8 software certification?
This certification now features a set of executable tests for partners that produce results that are then reviewed by Red Hat.
Your non-containerized software is certified when test results show successful interoperability with Red Hat Enterprise Linux 8 in a safe and supportable manner using best practices.
Once verified, you can promote your product(s) in the Red Hat Ecosystem catalog.
In addition, Red Hat will grant partners a free limited subscription to TSANet for collaborative customer case management to improve their ongoing user experiences.
Does anyone give more?
Why Red Hat Enterprise Linux 8?
Well, because Red Hat Enterprise Linux, the industry leader in enterprise Linux deployments, is the foundation of Red Hat’s open hybrid cloud portfolio, providing the underlying engine for developing and deploying complex workloads across physical, virtual, private, and public cloud environments in a more secure and controlled way.
After just a few months, Red Hat Enterprise Linux 8 is already the number one RHEL version among developers, with hundreds of thousands of downloads.
*Don’t worry, if you need to learn more about RHEL 8, visit the developer page RHEL 8.
Certification Features
This new Red Hat Enterprise Linux software certification means that:
Our executable is verified with a Red Hat seal of approval.
Our products are differentiated by being more compatible, interoperable and safe.
We get a limited TSANet membership (courtesy of Red Hat) to improve your customers’ long-term support and experiences.
We get free technical support for the certification.
Benefits for partners
The benefits that partners receive from this certification include:
As you know, this summer half of Spain has been on drought alert. A consequence, without a doubt, of the extreme summer heat and rain scarcity.
Andalusia was one of the most affected.
Therefore, companies and public administrations in the area have raised the alarm. Especially because of environmental and economic effects.
Thank heaven and science, technology experts already point out some solutions to reduce the impact of this type of phenomenon.
Pandora FMS and drought monitoring
Nowadays, many cities go for digital and technological help to improve resource management.
One of the most popular practices among companies is monitoring. It is known that this can work, without a doubt, as a defense against catastrophes such as the one that devastated Andalusia this summer.
“Monitoring systems improve the effectiveness of any workforce. And, therefore, their resource management.”
Indicates Sancho Lerena, general director of the monitoring company Pandora FMS.
“Monitoring how reservoirs are falling, the level of rainfall compared to the usual figures, or even finding out whether household water consumption is increasing significantly can help anticipate scenarios such as the current lack of water.”
This type of approach, monitoring, is increasingly used. For now public administrations are adapting, but this is already something common in the business field.
Monitoring can reduce the workload in the retail sector by 30%. In addition, it can triple the response time to citizen service. Which, frankly, would be very good for any public administration.
Andalusia and its battle against drought
Andalusia has already referred to the year 2022 as one of the driest of the last 50 years.
The Doñana National Park has been one of the most affected scenarios, along with the rest of the reference reservoirs, which are below 11% of flow.
These circumstances are also having a negative economic impact. For the time being, olive oil production in 2022 is expected to be reduced by 50%. The poorest year of the last decade, compared to over one million tons in 2021.
But initiatives to alleviate these problems have already been set in motion, many of them proving the effectiveness of monitoring.
Malaga, just as any other example, has recently started a test project to monitor the operation of the counters of 8,000 households with older residents or dependents. The administration will be able to identify strange behaviors through this method. Such as families with long periods of inactivity in water consumption or households in which an increase in consumption may be a sign of a resident accident.
And the CSIC is leading a different case focused exclusively on environmental control. A monitoring system that analyzes meteorological drought nationwide, providing experts with additional information to predict the phenomena of the coming months.
This is where Pandora FMS is proposed as the key to measure, for example, how widespread water use is in particular months and therefore predict some measures in case a drought is foreseen during the year.
Let’s check out together the features and improvements included in the new Pandora FMS release: Pandora FMS 765.
What’s new in the latest Pandora FMS release, Pandora FMS 765
NEW FEATURES AND IMPROVEMENTS
Improved network maps
Multiple changes have been made to network maps to improve the usability, performance and network map setup.
Map drawing and refreshing is automatic and dynamically reflects the changes in the network, highly improving the existing display in previous versions.
The possibility of deleting “Pandora FMS” node as well as all its relationships has been added. Usability has also been improved in manual relationship management between nodes.
Added linking between network maps. When there is a dummy node pointing to another network map, it will be possible to access that map from the options of the dummy node.
New report type: System module inventory
The new type of report “System module inventory” has been created, through which you will see an inventory of the modules generated in your Pandora FMS installation registered by module name, remarking the necessary information for those modules that have the same module name.
Sending reports by mail as an alert action
A new feature has been added to Pandora FMS alert system whereby it is possible to send reports by email in PDF thanks to its incorporation as new actions/commands within Pandora FMS.
Support for Ubuntu 22.04
Ubuntu 22.04 is officially supported by Pandora FMS server
New scheduled downtime option. Disable modules
A new feature has been added within the scheduled downtimes. Now you may choose the option to disable modules without stopping the agent itself.
History database in Metaconsole
Just as it existed in Pandora FMS nodes, there is now the possibility of having a history database within the Metaconsole.
Pandora WMIC package for ARM systems
Usage in ARM environments is growing, and we have created an ARM-supported binary for environments that use the Satellite to remotely monitor Windows environments.
IP console access control
Different users requested to control access to the console by source IP, which can be defined individually by user. We implemented it so that masks can also be defined, e.g.: 192.168.100.*
Plugin with which emails can be filtered or the number of emails of an account through a series of filters. Useful for detecting whether an alert email arrived or to look for a certain email.
Plugin with which to monitor a space of names of Event Hubs. It returns several types of metric, like SuccesfulRequests, CapturedBytes or ActiveConnections.
Plugin with which to monitor an Azure PostgreSQL data server and to receive metrics such as cpu_precent, memory_percent, storage_used or active_connections, among others.
Pandora FMS, an international benchmark in system monitoring, becomes technology partner of the French company M81.
The French platform has extensive experience in the sector since its creation in 1988 and is currently considered one of the great experts when it comes to monitoring IBM i systems.
Thanks to this agreement, Pandora FMS will transfer this type of solutions to Spanish companies to improve IT management and the efficiency of the different work areas.
Pandora FMS and the French company M81 become partners
The alliance between Pandora FMS and M81 represents a notable developing point in the Spanish technology sector, since in recent decades no national company had been able to count on monitoring solutions for IBM i systems.
Formerly known as AS400, it is widespread among big companies with IT infrastructures that deal with large amounts of data.
The M81 monitoring software for IBM i, considered a legacy or outdated system, allows to improve the efficiency of the resources of companies that are based on large IT infrastructures.
In addition to increasing the ability to manage and organize internal data, it saves time for employees, who can devote their efforts to other company areas.
M81 was founded in 1988
Since then, it has been developing solutions for IBM i to become one of the world’s leading experts in these systems.
The French company works for large insurance companies such as the American Marsh & McLennan or AXA, for banks such as the German DZ Bank or the Portuguese Caixa Geral de Depósitos; for companies in the industry such as ArcelorMittal (considered the largest steelmaker in the world) and for logistics companies such as Heppner.
In addition, it is also established in the pharmaceutical, luxury and oil sectors.
The M81 solution ranges from advanced monitoring to the recovery of failed databases.
Despite being aimed at performing very complex tasks, its implementation is characterized by its simplicity and easy handling for teams, achieving the objective of reducing the workload of the workforce and reorienting those efforts in areas most in need.
M81 and Pandora FMS
After the agreement reached with Pandora FMS, this type of technology will be available for large Spanish and international companies that continue to use the IBM i system, also known as AS400 and considered a legacy system.
“The agreement is not only good for our company, but it means ending decades of delay in the Spanish sector that works with IBM i Systems,” says Sancho Lerena, CEO of Pandora FMS.
The Spanish company, a specialist in system monitoring, has taken its solutions to international giants such as Rakuten, Toshiba or Repsol.
Also Spanish reference companies such as El Pozo or Prosegur, in addition to working for public administrations such as the EMT or the Digital Madrid area.
In total, more than 50,000 installations in 53 different countries, a figure that will continue increasing now following the agreement reached with M81.
“M81 is a reference company in the sector, so the alliance reached is a success. But, in addition, it means opening a window for opportunities for companies that have IBM i because they will be able to reduce costs and improve their management following the steps of the great international brands “, explains Lerena.
The technology company Pandora FMS, specialized in system monitoring, takes a step further towards growth becoming the first national technology capable of offering monitoring solutions, both for IBM i systems (formerly known as AS400) and for much more modern systems.
A development that, after several decades, means the full coexistence of IBM i with more recent systems.
PFMS and monitoring system integrated with IBM i
Pandora FMS, through the solution developed by the French company M81, will provide this service to multiple important customers.
*M8 developed monitoring software for IBM i.
After the agreement, Pandora FMS will be the first and only one in Spain to be able to combine solutions for both up-to-date systems and IBM i.
The agreement with M81 is a key alliance
The French company has been working in the sector since 1988, becoming one of the benchmarks both nationally and internationally.
In addition to being specialized in IBM i, they provide solutions such as database recovery after serious failures or advanced monitoring to improve IT team operations.
IBM i, also known as AS400, is a system considered as legacy or obsolete that has 34 years of history.
Its versions have been updated and improved throughout all this time. The evidence is that many multinationals keep it still in their structure.
The so-called IBM Power System and the IBM i operating system continue to be recognized, but IT managers and CEOs are choosing to work with open servers and operating systems that offer many possibilities available in the market.
Therefore, they stopped working with IBM Power System and IBM i.
Due to this legacy system status, companies that use IBM i recognize the need to develop their own verifications or buy solutions that improve their IT structure performance and optimize their costs.
Until now, they could only hire specialized monitoring systems as far as IBM is concerned.
However, after the development of Pandora FMS and M84, Spanish companies will be able to implement a single powerful monitoring system that combines the management of both newer systems and IBM i.
On a global scale
As a sign of the potential IBM i has, there are institutions such as the Government of Andorra that have this type of technology.
Although it is usually the financial and logistics sectors the ones that are managed the most through the old AS400, now known as IBM i.
Logistics giants such as Cargo Partner, banks such as DZ Bank or insurance companies such as Marsh & McLennan are some of the examples of large formations related to the world of IBM i.
Monitoring and growth
Monitoring, it should be remembered, is one of the bases of the efficient growth of any company today.
According to internal data from Pandora FMS, there are digital administrations that have improved their response time by 200%.
In the retail sector, the workload can be reduced by up to 30% thanks to resource optimization.
Percentages that translate into cost savings for large multinationals and, above all, IT resource optimization for other areas.
“From now on, Spanish companies that used IBM i will no longer have to acquire different monitoring services to be able to manage their entire infrastructure.
Thanks to the M81 software and its integration with Pandora FMS solution, a legacy system like IBM i will be easy to monitor like any other system,”
explains Sancho Lerena, CEO of Pandora FMS
“This also shows that the IT sector continues to grow in Spain.
Despite having waited for a long time, this development is a turning point for companies that still have systems, such as IBM i, which, despite being legacy, continue to have a lot of influence on IT management for the business of many companies,” highlights the chairman of the Spanish company.
Pandora FMS brings the Internet to 500,000 people in Brazil
The solution is part of the project Floresta Digital, whose objective is to bring free Internet connection to all citizens of the State.
In total, according to official calculations, there are more than 700,000 citizens distributed in 22 municipalities.
However, the first steps of the project are aimed at benefiting about half a million Brazilians.
Pandora FMS, whose global experience has led the Spanish company to work for brands such as Rakuten, Repsol or Toshiba, is responsible for developing the management and control of the network environment. That is, through the company’s solution, the Acre government can know through a single console the situation of its entire connection network.
For example, if it fails at some point or if there is some slowdown in connection speed.
“The peculiarity of this project is that the authorities of Acre have managed to develop this IT control with the free version ofPandora FMS.
The simplest but, despite this, efficient enough in fact to meet its objective”, recognizes Sancho Lerena, CEO of the Spanish company.
Pandora FMS system allows to monitor all the environment’s information.
That way, it is possible to have a broad vision of how the entire connection works, which areas are more critical and where any setback should be anticipated.
A monitoring that improves the performance both technologically and in economic terms.
The system park reaches 800 devices
The technology offered by the Spanish company allows one to see how the infrastructure is distributed and offers the ability to intervene quickly should there be any issue such as the high consumption of bandwidth in any location or the connection failure in any city.
In addition, the Brazilian administration has managed to reduce costs.
By having control and enough information about how all their technological deployment is working, it is possible to manage the workforce more efficiently.
They reduce unnecessary trips and, in turn, allowances and travel expenses to check the status of some connection point.
“The project to bring free internet to half a million people was already a challenge for Brazilian administrations.
Doing it initially with the free version of Pandora FMS added difficulty.
Despite everything, Acre’s teams have adapted to technology demonstrating that digital environments will be increasingly present in every public administration”, explains Sancho Lerena.
The work is hard and there are high expectations, but we don’t give up! The fight goes on and every day we are happier with what we achieve and what we mean to our users.
For that reason, we are proud to announce Pandora FMS as the winner of the Best Ease of Use 2022 badge in the Network Monitoring category, apart from being mentioned as Pop-up Favorite in the 2022 Server monitoring and APM Software Shortlist, a free online service that helps organizations find the right software. The world’s leading software review platform.
Pandora FMS is always among the favorites. Capterra knows this
*As many of you may already know, Capterra Shortlist is an independent assessment that evaluates user reviews and online search activity to generate a list of market leaders in the software space that offer the most popular solutions. (Have a look at the Capterra Shortlist methodology here.)
**Capterra, which together with Getapp and Software Advice is a platform owned by Gartner, once a year synthesizes reviews in a given software category to recognize the best rated products by users.
What are these mentions and badges that Capterra grants?
Best badges awarded by Capterra are a great way to show how a product competes with its rivals, based on positive reviews and feedback from users.
Reviews Badges serve as a strong element of trust for potential buyers when purchasing a product.
Best badges synthesize more than one million verified user reviews that span more than 750 software categories to recognize top-rated products.
Of course, the software companies and SaaS providers that get them often boast of these badges in social media, blogs, newsletters, press releases, websites and other marketing means. Of course that had to be our case too!:
As it could not be otherwise, our CEO and colleague Sancho Lerena has wanted to make some comments on this achievement:
“The first thing I would like to say is thank you. Sometimes it seems that one does not give enough thanks and there is much to thank, both to our coworkers and users, and even the Capterra platform itself.
Especially because there are so many contributions and because it is absolutely always a huge honor to receive this kind of mention.”
Here is a sample of our recognition in table format:
With an overall rating of 4.6 out 5, we received some stellar reviews on Capterra:
“For a long time, we were looking for a monitoring solution that could ensure the resiliency of our web applications and finally, with the help of the Pandora FMS team, we found the right tool.
Pandora FMS is an out-of-the-box monitoring solution that allows you to monitor your applications and systems and has a very intuitive interface that allows you to build your dashboards in no time. We can not wait to see what the future holds for Pandora FMS.”
The question now is, do you want to be the only one not to get on board with such a popular, effective and acclaimed product as Pandora FMS? As you see, you will hardly regret it! We’re counting on you!
Food retailers reduce the workload accumulated by their IT areas by almost 30% thanks to monitoring.
Controlling data and extensive information from the whole company, by controlling, supervising and ordering everything through the same system, allows to reduce the times of action in the face of possible errors and failures, improves resource management and organization and increases the effectiveness of the business activity.
In addition, monitoring saves costs.
IT monitoring and retailers, what you need to know
Large food distribution firms carry out continuous processes to guarantee the supply of products on the shelves, so the volume of information generated by executing these tasks throughout the day is remarkable.
If you add to that amount of data the diversity of systems in the IT structure with which retailers work on a daily basis, the route to obtain valuable, clear and practical information becomes even more complicated.
The difficulty is greater if, in order to analyze these data, there are unqualified personnel without the support of a reliable platform to make their work easier.
This situation highlights that the fact of not having a monitoring system multiplies the actions necessary to obtain information on the activity of the technological structure of the company or the state of each of its facilities:
This slows down a company’s power to act and its ability to react.
That, after all, translates into a loss of value both economically and in terms of performance, especially concerning the area of human resources.
What do we achieve with monitoring in the retail sector?
Through monitoring, it is possible to access, even remotely, the entire IT structure of a company.
That is, by means of a central console you may organize and control an entire technology park.
This, despite being able to present a heterogeneous panorama with a wide diversity of systems that sometimes do not support each other, goes under the command of a monitoring system by which it can be accessed.
Monitoring makes it possible to replace an existing system and it is also capable of coexisting with others.
The kind of flexibility that is essential in the sector, because it allows to integrate new stuff to the existing system.
This observability implies the ability to bring together all data sources and provide useful information for the company.
The more complex IT systems are, the more important it is to simplify their monitoring.
That way, servers from different operating systems can be monitored by the same controller.
And in turn, every time an error is detected anywhere in the park, the information can immediately reach those responsible, shortening the reaction time and anticipating more serious internal operating situations.
Monitoring, in addition to making control and error anticipation easier within the company’s performance, it also helps to find out aspects as simple as the state of the toner of a series of printers, or the time workers clocked in.
Monitoring companies ends up leading to cost savings and service improvement.
Thanks to appliying monitoring systems, retailers in the food sector acquire a tool that enhances the control of the technological infrastructure that guarantees the traceability of their products throughout the distribution chain; from its origin to its arrival to the final customer or to sales establishments.
In addition, the implementation of this data technology allows monitoring the status of the systems from a centralized position and anticipating breakdowns and errors, saving workload and improving delivery times.
In the food market there have already been companies that have opted for this development of their structures.
An example of this is Fripozo, belonging to the Fuertes Group, which implemented a monitoring system thanks to its agreement with the Spanish companyPandora FMS.
As a result of this adaptation, it achieved higher responsiveness to any system failure that could affect the control and distribution of deep-frozen food.
In this particular case, one of the concerns for the company was to achieve some degree of flexibility.
That is, that something specific could be monitored without this involving a large investment of time and local resources without external intervention.
Fripozo, after this association with Pandora FMS, managed to reach that goal.
In addition to Fripozo, other distributors such as Salvesen Logisticshave also confirmed operational improvements after monitoring their IT structure.
The company, which like Fripozo took its chances on the Spanish Pandora FMS, came to reveal a reduction of 24% of the workload of its IT area.
As revealed from their organization, the attention that was constantly paid to the health of the system was focused on improving services and products.
The sector, with more and more competition, is devoted to a necessary organization of the internal data that are produced throughout the same day in a company.
Any mistake can lead to a chain failure, a misuse of their own resources and a point in favor of competition in the market.
“The monitoring carried out by systems such as Pandora FMS represents clear economic savings for companies that implement it in their IT infrastructure. Reaction times to any failure are shorter and therefore have less impact on the company. But, in addition, internal processes have also been improved as different business models have been discovered“,
explains Sancho Lerena, CEO and founder of Pandora FMS.
The increasing use of new technologies by the population has increased the risk of theft. Not only on the street can one fall victim to thieves, but one can also lose sensitive information such as passwords or banking keys in the cloud.
In this case it is even easier not to realize that virtual robbers are committing a crime.
In addition, security no longer depends on you, but the security of third parties, those we shared our data with, becomes important.
What you don’t know about the security of your platforms
How can you maximize individual security on the network?
Easy-peasy.
Periodically modifying passwords and following some basic tips.
The first thing is to know whether the user has been affected by any breach in any platform. The process could be complex for someone who is not really used to all of this, but there are free and secure portals where you may just enter some identifying data of your account to find out whether the passwords are in danger.
Haveibeenpwned.com is one of the examples.
*As if it were a Google search engine, users only have to enter their email or phone number to find out whether the passwords of that profile have been leaked.
In case that leak is confirmed (a message appears in just one second and in a very intuitive red color), the procedure is simple:
Go to all those accounts and change the password.
As experts indicate, you have to set different passwords depending on the platform.
“It makes no sense to set the same password on all applications and systems.
That equals making things easier for thieves, because by taking profit from a single security breach they can take control of all your accounts for not having different passwords”, explains Sancho Lerena, CEO of the monitoring company Pandora FMS.
The fact of setting different passwords is usually a problem for the user, who risks either forgetting some of them if they do not keep them safe or losing some speed in the accessibility processes to the different applications.
Despite this, it is essential to reinforce the security barrier.
And that is because not only large entities should be protected.
One of the easiest things to verify is the strength of the passwords used, and implementing a system that monitors this may seem simple and innocent, but it is the first step to a safer system.
Security monitoring
Security monitoring is used to control key security aspects, such as backup verification, or the execution of anti-virus security programs.
The most powerful organizations on the market are a clear example of the importance of cloud security and data protection.
Until recently there was a specific department to manage all IT information and its protection, but the increase of that data bag and the increase of the danger in the cloud have turned monitoring into the most effective solution.
Monitoring the IT structure of a company means centralizing the control of all the information and, in addition, it allows to alert and anticipate each error.
“Our monitoring solution, for example, strengthens security where it is installed.
Businesses are placing increasing emphasis on the security of their IT information, and monitoring is critical to that end.
Any failure or error is reported instantly, so action is faster and losses smaller.
However, ordinary users should not forget that their information is also valuable for cyber criminals”, underlines the expert at Pandora FMS, aware of the interest of large organizations in protecting their data with systems such as monitoring.
Conclusion
Cybercrime has increased over time.
Users, given the number of processes that must be developed online, share more and more information.
A scenario that has made companies take their chances on monitoring systems such as that of Pandora FMS and that extends to individuals the need to protect their data on the network.
Let’s check out together the features and improvements included in the new Pandora FMS release: Pandora FMS 764.
What’s new in the latest Pandora FMS release, Pandora FMS 764
NEW FEATURES AND IMPROVEMENTS
New graphical interface of the sound events console
The sound events console has been modified to separate event configuration from their display. It now shows a progress bar over time until the next refresh and has improved usability in controls, filtering and selection.
New data representation in agent view
Improved display of statuses and data in the main view of an agent:
Scheduled agent autoconfiguration application
Added the ability to schedule the appliance of Command Center agent auto-configuration rules automatically.
New dashboard widget: “Color Tabs”
A new widget has been added to Dashboards. With the “Color Tabs” widget you may choose up to a maximum of 10 modules that will be represented horizontally showing its name, data and status.
New dashboard widget: “Block Histogram”
A new widget has been added to Dashboards. With the “Block Histogram” widget you may choose as many modules as you want to represent their histogram in the same table.
Pandora WMIC package for ARM systems
Available as an RPM package and DEB in our community download section , in the “Other utilities and dependencies” section.
IPAM from Satellite
From this version it is possible to define IPAM network scanning from the Satellite server, indicating it in the Satellite’s server configuration file.
Satellite Server Visual Interface (GUI)
The possibility of configuring the Satellite server remotely from the server view has been incorporated. A dynamic search has also been added within the different tokens to speed up the configuration process.
New report server
A new report server has been incorporated, which works as a reporting-only console. It allows you to create very large and numerous reports in the background and store them on disk or send them by mail.
Cisco IP SLA plugin support with snmpv3 and snmpv2c – Open Plugin
Added support for snmpv2c and snmpv3 to the plugin.Go to Library
Plugin open Cisco ironports – Plugin Open
New plugin to monitor Cisco Ironport Antispam.Go to Library
SAP HANA Database Enterprise Plugin – Enterprise Plugin
Plugin to monitor SAP HANA Database using custom queries that can be defined in a file. The plugin comes with a file with default queries but can be edited for a custom execution suitable for each case. Go to Library
The Spanish tourism sector is preparing for a record summer in which they hope to emulate the summer periods prior to the coronavirus pandemic.
The government has already advanced that 90% of the foreign tourism that visited the country in 2019 will be recovered.
That year, 84 million foreigners were received, a figure that is expected to be reached this year, taking advantage of the high temperatures and the national tourist offer.
For this reason, the administrations of the main tourist centers are being reinforced with the necessary technology to control capacity in order to improve the performance of public services and minimize the environmental impact.
Pandora FMS helps to monitor and manage our beaches
More and more municipalities are opting for the installation of monitoring systems that collect all the data in real time and allow them to be managed from a main console.
Monitoring, present in most companies to improve the management of their IT infrastructure, captures all the data that is constantly generated and manages it from this central system.
In this way, access to all the information collected is much simpler and immediate and the capacity to react to any anomaly detected is improved.
The importance of monitoring in companies has spurred the administration’s interest in improving the efficiency of their services and they are now applying this technology in the management of their beaches.
Municipalities in busy tourist areas are particularly interested in knowing the state of the busiest spots and are focusing on beaches, where systems are already being implemented to monitor the state of each sandy area and control the capacity.
Thus, in addition to measuring how many tourists visit a place in a given time slot, it is possible to minimize the environmental impact on the territory by establishing precise measures to improve the environmental protection of the beaches as well as the fauna and flora that inhabit them.
“Monitoring is a reality that is present in the private sector, and increasingly established in the public sector, which improves the control of tourist spots with large crowds of people.
With these systems it is possible to calculate how many people are on each beach at any given time.
In this way, the efficiency of health and safety services can be improved or the capacity of some of these areas can simply be restricted if the environmental damage being caused is alarming,
explains Sancho Lerena, CEO of the Spanish company Pandora FMS, which monitors systems of giants such as Rakuten or Toshiba, as well as public administrations such as Madrid Digital or hospitals.
Where can we find these monitoring systems?
These monitoring systems are being installed in various parts of the country.
For example, the Coastal Observation and Forecasting System of the Balearic Islands will be installed on the beaches of Mallorca.
With this mechanism, the administration will allow tourists to share photographs taken from the same point on the beach, allowing them to see the evolution of the landscape in order to control its pollution and to record the hourly capacity of the beach.
This same experiment based on monitoring will also be present in Galicia, specifically in Vigo, or on beaches in Valencia.
The two main objectives in all cases are to control the environmental impact and to know the approximate capacity of each beach in different time slots in order to manage public services in the most efficient way.
Gran Canaria has also invested 500,000 euros in a system to monitor very busy beaches such as Las Canteras, Alcaravanera and La Baja.
For its part, Barcelona will use drones, after investing almost 170,000 euros, to measure the capacity of each beach without the need to identify the population.
In both situations, monitoring will be essential to collect all the data and enable the authorities to act as appropriate.
“Monitoring processes are in our day-to-day life, it is normal for administrations and tourism companies to adhere to this type of systems,” acknowledges the CEO of Pandora FMS.
“Monitoring allows access to information by a single means .
In this case, a computer where all the data generated every second is concentrated and which, if the monitoring system did not exist, would have to be collected from each specific console.
Thus, if there is an alert in an area, action can be taken from the central console and the other areas can be alerted,” says Lerena.
Tourist wave
The summer of 2022 was set to be the summer of the return to full normality, also in the economic sphere.
However, the outbreak of the Russian invasion of Ukraine and the subsequent inflationary wave led to fears of a new crisis from May to the present.
Despite this, the Government has reaffirmed that the Spanish economy is “strong” and has positioned tourism as one of the driving forces in the coming months.
The forecasts of the Executive go through to recover nine out of ten foreign tourists who visited Spain in 2019, a year in which 84 million people were received in the 12 months of the fiscal year.
At the moment, more than 20 million airline seats are already estimated to be booked for these months.
In addition, domestic tourism is also likely to grow by 3%, so the economy will not only be driven by the foreign population.
There is quite a wide range of solutions offered bymonitoring as a service to any company, from performing any analysis to detect the root cause of the issue to determining the path of the failure.
Here goes…
Our opinion on monitoring as a service
One of the most important and obvious benefits it brings to the table is that it solves training problems of workers involved or just solves the shortage of talent of these workers right away.
It may sound a bit harsh… but it is what it is.
The increase in the amount of information available in companies, and the obligation to be able to manage this IT structure well means that workers must constantly be better qualified.
In addition, the increasing importance of IT means that infrastructure managers have a certain amount of work overload.
Something that with a monitoring system does not happen!
Rather the other way around, monitoring as a service establishes a theoretical bridge between technology and business, drawing a scheme where you can easily detect where the source of the problem is, saving time and actions to the operating team.
Monitoring reduces the importance of the traditional involvement of people from different areas of the organization and the work overload that managers in this process may have.
To sum up, monitoring systems control all data and allow access to information from the same platform, avoiding that those in charge of this area have to stay aware of several fronts without fully concentrating on a single one.
Also inactivity cost is reduced!
Let’s get to the point!
“You must take into account that the transformation of a given company implies that there is more software.
And, therefore, more business areas that depend on technology. A series of changes that imply the need to hire more competent profiles.
Everything with the aim for all pieces to fit perfectly, both the computer and its software as well as the network and the technician who handles it “.
Explains Sancho Lerena, CEO ofPandora FMS, as you surelyl know, an international reference in monitoring.
An example of this need is that the growth of hybrid infrastructures is 25% per year according to IDC data.
For that reason, many companies are taking their chances on taking out their IT monitoring infrastructure to save money and especially time.
This process of getting the entire IT organization under the umbrella of the same system also helps the infrastructure manager, as they have higher capacity to manage its records.
On the one hand, it collects all the data despite the fact that it is a large volume.
And, secondly, it concentrates access to all that information on a single centralized console.
In conclusion, we get over the lack of time for the worker to be aware of fundamental tasks such as security or data management.
It also gets rid of the possible lack of capacity to adapt to the different operating systems that may exist in the same company.
And, lastly, the workload involved in facing a constant data flow where any minimal error must be detected is minimized.
Systems such as Splunk, Datadog or Pandora FMS itself help in the process.
Conclusions
Through monitoring, it is possible to use information in a reactive way, anticipating problems and alerts received; preventive, since analyses are obtained that help to be prepared for any worst-case scenario; and retrospective, since the emerged crises are also studied to find out the extent of their impact and know how to take measures properly in the future.
Pandora FMS Open Source n’est pas un logiciel freemium, il n’est pas bloatware ni shareware (*Clin d’œil pour les personnes nées avant 80 ans). Pandora FMS est publié sous la licence GPL 2.0 et la première ligne de code a été écrite par l’actuel PDG de la société en 2004.
À l’époque, le logiciel libre était en pleine effervescence et MySQL était encore une entreprise indépendante, tout comme SUN Microsystems. Aujourd’hui, il y a des milliers d’utilisateurs de la version Open Source qui téléchargent, régulièrement, des mises à jour via le système que nous lui avons dédié.
Nous n’en savons pas plus sur le sujet (ni leurs noms, ni leurs sociétés…) car, surtout, nous respectons la vie privée. Nous considérons Pandora FMS comme un véritable logiciel libre. Le projet est actif chez Sourceforge depuis 2004 et nous avons tous les prix décernés par cette entité doyenne de l’OpenSource.
Tout le code est disponible sur Github en temps réel, mais le plus important est la documentation que nous avons, disponible en cinq langues (espagnol, anglais, français, japonais et russe) et avec un niveau de profondeur qui vous permet de tirer le meilleur parti sans avoir à payer des certifications, des cours ou des conseils.
Imprimé, le manuel a plus de 1 000 pages (par langue) et est maintenu par notre équipe de développement, Q&A, traducteurs et documentalistes professionnels. Nous avons également un forum public où nous résolvons des doutes, avec plus de 15 000 messages. Nous croyons que la liberté consiste à offrir à l’utilisateur des choix, et non à lui donner des pièces d’un puzzle sans instructions.
Pandora FMS Enterprise
Cependant, Pandora FMS a une partie basée sur une licence commerciale qui étend certaines des fonctionnalités présentes dans la version OpenSource de Pandora FMS. Cette licence incorpore du code source supplémentaire qui n’est pas disponible publiquement ou gratuitement.
Ces fonctionnalités sont destinées aux environnements professionnels exigeants qui nécessitent une certaine automatisation et des outils plus spécifiques déjà créés pour une utilisation en exploitation et avec un support professionnel afin que si quelque chose échoue, ils puissent demander et obtenir un patch si nécessaire. C’est pour ce type d’environnements que nous avons pensé Pandora FMS Enterprise.
Si vous souhaitez utiliser Pandora FMS Community et que vous avez des doutes quant à savoir si cela fonctionnera pour votre organisation : N’hésitez pas, ce n’est pas une question de taille, nous avons des utilisateurs de la version Open, avec des milliers d’agents, qui l’utilisent depuis des années.
Évidemment, le principal avantage de la version Enterprise est que vous aurez quelqu’un pour vous soutenir à tout moment. Soit dans un problème avec une mise à jour ou dans l’installation d’un plugin. Mais il y a beaucoup de petites différences qui peuvent être la clé pour optimiser votre gestion au jour le jour.
Nous décrivons ci-dessous quelques-unes des fonctionnalités Enterprise et leurs caractéristiques.
Si vous voulez les essayer vous-même, vous pouvez essayer une version d’essai de 30 jours, mais laissez-nous vous le montrer lors d’une réunion en ligne et vous éviterez de vous tromper avec le logiciel. Votre temps est précieux et bien que notre documentation soit exhaustive, PFMS possède de nombreuses fonctionnalités.
Les services sont la manière de montrer de manière simple et visuelle comment sont les choses dans votre organisation, classées en différentes entités qui à leur tour se composent d’autres services et/ou métriques.
De cette façon, vous pouvez effectuer une analyse de cause racine automatique et savoir quand un service est affecté, où se trouve l’origine et même le visualiser sous forme d’arbre :
Les services complètent les options de visualisation existantes dans Pandora FMS et permettent aux responsables des systèmes de définir des règles de poids qui comptent sur la redondance de leurs systèmes pour alerter uniquement en cas de besoin, et non lorsque quelque chose d’insignifiant échoue.
Le besoin est apparu chez un client qui gérait de nombreux équipements avec des objectifs et des technologies différents. Il a été constaté que la surveillance des ordinateurs Windows 2000 était différente de celle des Windows 2003 et que, bien sûr, les Redhat Linux avaient des besoins différents des Debian Linux.
En outre, il avait des environnements de base de données différenciés, tels que DB2 ou MySQL.
La surveillance de base pouvait être « compartimentée » dans différents ensembles de contrôles qui pouvaient être standardisés, de sorte que n’importe quelle machine Linux disposant d’Oracle pouvait être surveillée de la même manière.
De cette façon, nous avons fait des ensembles de contrôles qui pourraient être facilement déployés à des groupes de machines.
Grâce aux politiques, il est possible d’homogénéiser la surveillance et de déployer une surveillance standard par technologies.
Ainsi, un système peut avoir différentes politiques appliquées (par exemple : système d’exploitation de base, base de données, application X, performances réseau, etc.) et chaque fois que vous faites un changement de politique, il peut être « synchronisé » avec les systèmes qui sont souscrits à cette politique, de manière totalement automatique.
Bien sûr, des exceptions peuvent toujours être apportées aux politiques au niveau individuel, et chaque système peut avoir un nombre illimité de politiques en plus d’une supervision personnalisée.
L’utilisation de la supervision par politiques peut faire gagner un temps considérable aux administrateurs système.
Si vous avez besoin de vendre votre propre produit de monitorage, avec votre propre marque et une personnalisation totale non seulement de l’apparence, mais aussi des installateurs, du chemin de commande, des services en cours d’exécution, des images d’installation ISO, des agents Windows, des logos, des noms de fabricant et de produit, Pandora FMS Enterprise a différents niveaux de personnalisation.
Le plus basique, et inclus de série dans n’importe quelle licence Enterprise, permet de personnaliser l’apparence de la console de manière à ce qu’elle ne ressemble pas à Pandora FMS mais à votre propre produit, avec votre propre marque.
Si vous avez besoin d’aller plus loin et de générer un logiciel avec un autre nom et qui, du processus d’installation au nom de la base de données, est étranger à Pandora FMS, alors la personnalisation OEM est ce dont vous avez besoin. Nous pouvons même générer des packages de mise à jour spécifiques à votre OEM (ou vous apprendre à le faire afin que vous puissiez vous débrouiller seul).
Pandora FMS Enterprise dispose d’un système de stockage secondaire dans une base de données supplémentaire.
Le système déplace automatiquement les données de plus de X jours vers la base de données historique et, lorsque vous en avez besoin pour créer des rapports ou des graphiques, utilise les deux bases de données pour composer les informations.
Cela permet d’avoir un historique de données presque illimité (plusieurs années) sans compromettre la vitesse d’accès aux données du quotidien.
Si vous avez besoin que votre installation s’appuie sur un Active Directory pour authentifier les utilisateurs, ou pour les créer automatiquement lors de la connexion, en leur attribuant des profils spécifiques ou en les filtrant via une liste noire, cette fonctionnalité est spécialement conçue pour les environnements professionnels comme le vôtre.
Il dispose d’options avancées telles que déléguer à un serveur secondaire, exclure les administrateurs, le compléter par une double authentification via Google Auth et de nombreuses autres options.
Contrôlez et accédez à distance à vos systèmes, qu’il s’agisse de postes de travail Windows, de serveurs Linux ou Windows ou de systèmes embarqués Raspberry ou similaires.
Accédez au shell distant comme si vous étiez devant, au bureau distant ou copiez des fichiers dans les deux sens. Tout cela à partir de la même console WEB de Pandora FMS, entièrement intégrée à la gestion de vos actifs.
Dans la version Enterprise, vous pourrez disposer de votre propre infrastructure on-premise de serveurs eHorus de manière à ce que toute la communication entre vos systèmes puisse être gérée et contrôlée, avec une autonomie totale des tiers et avec la plus grande sécurité et confidentialité.
Cependant, dans la version community, vous pouvez utiliser nos serveurs dans le cloud, jusqu’à un maximum de cinq appareils, gratuitement.
Les serveurs Satellites permettent la surveillance à distance de réseaux entiers d’équipements de manière distribuée et sans connexion directement à la base de données Pandora FMS.
Installez des serveurs Satellites dans les réseaux de vos clients, ils obtiendront des métriques de toutes sortes d’appareils autour d’eux, explorant automatiquement ce qu’ils ont dans leur environnement et envoyant les informations au serveur central, où vous pourrez les gérer comme s’il s’agissait d’agents normaux.
Les serveurs Satellites sont parfaits pour le déploiement sur des sites distants, des bureaux clients ou des environnements inaccessibles. Ils peuvent être installés sur Raspberry ou tout type de conteneur.
Rien de tel que d’observer les choses en prétendant être un véritable utilisateur, si possible depuis la même chaise que le véritable utilisateur. Cela consiste à surveiller l’utilisateur, à répliquer une transaction du début à la fin, étape par étape, à calculer le temps qu’elle prend à chaque étape et à vérifier que chaque étape est correctement terminée.
De cette façon, nous saurons non seulement s’il échoue, mais nous saurons également où et combien de temps chaque étape prend. Nous pouvons même prendre une capture d’écran pour savoir à quoi ressemblait la faute. Cela peut être fait pour les applications Web (même si elles ont Java, Flash, HTML5, etc.), ainsi que pour les applications de bureau traditionnelles.
Cela peut être fait de manière centralisée (WUX) ou de manière distribuée, de sorte que les sondes effectuent les tests à partir de différents emplacements géographiques.
Nous savons que le déploiement et la configuration des agents est l’un des points les plus fastidieux du déploiement de la surveillance.
C’est pourquoi nous avons créé un outil qui permet, en fournissant des informations d’identification, de se connecter à des systèmes Windows ou Linux pour copier l’agent et l’installer sans surveillance. Il vous permet de personnaliser l’installation, par différents réseaux, environnements ou groupes de machines.
Des dizaines à des milliers de systèmes peuvent être installés ou mis à niveau à partir de la console de déploiement d’agents.
Omnishell est une fonctionnalité Enterprise de Pandora FMS utilisée pour l’orchestration (automatisation informatique). C’est un outil entièrement natif et intégré à la console, qui utilise les agents PFMS pour exécuter des blocs de commande sur les cibles sélectionnées.
Un exemple d’utilisation serait de configurer le démarrage automatique du service HTTPD sur les systèmes CentOS 6 en bloc. Un autre exemple pourrait être d’installer un correctif manuel sur les machines Windows que nous sélectionnons dans une liste.
Il peut s’agir d’une ou plusieurs centaines de machines.
Auto provisionnement et configuration automatiques des agents
Il met en œuvre un mécanisme automatique par lequel vous pouvez appliquer des politiques et des modifications aux agents nouvellement provisionnés, de sorte qu’après le déploiement, la configuration de la surveillance soit automatisée, en lui assignant un(des) groupe(s), des politiques de surveillance, des alertes, etc.
Cette personnalisation se fait sur la base de règles. Par exemple, avoir une certaine gamme d’adresses IP, une marque ou un champ personnalisé spécifique ou un nom d’hôte avec une certaine tendance. En outre, après avoir effectué le changement de configuration, une action personnalisée peut être générée.
Ceci est parfait pour intégrer n’importe quel processus de mise à disposition de systèmes dans la supervision.
Déployer des supervisions avancées nécessite d’apporter des scripts et de petites applications (les nôtres, les vôtres ou celles de tiers) aux systèmes surveillés, pour être exécutés par l’agent sous forme de plugins.
Les collections permettent de regrouper cet ensemble de fichiers et de les transporter aux agents de manière intégrée dans les politiques.
De cette façon, l’utilisation de plugins est simple et transparente pour le fonctionnement final.
Pandora FMS peut collecter des journaux à partir de n’importe quelle source compatible avec syslog ou via des agents logiciels (Windows et Linux). Ces journaux peuvent être des fichiers texte bruts ou des événements système Windows.
Ils seront collectés par l’agent de supervision Pandora FMS et envoyés au serveur avec les données de surveillance. Ainsi, si vous avez déjà des agents installés, vous pouvez collecter les journaux de ces systèmes facilement et rapidement, sans logiciel ni licence supplémentaire.
Contrairement aux données de supervision stockées dans une base de données SQL conventionnelle, les journaux sont stockés dans un système Elastic indépendant.
Vous pourrez stocker des gigaoctets de journaux et les conserver longtemps (vous n’aurez besoin que de plus de disque). Vous pouvez définir des alertes ou effectuer des recherches parmi vos sources de données. C’est le complément idéal dune surveillance exhaustive, et totalement intégrée à la console.
L’inventaire PFMS vous permet d’obtenir des données de nombreux types : packages de logiciels installés, utilisateurs ayant accès à l’ordinateur, correctifs installés, périphériques matériels, firmware et version du système de base, licence ou numéro de série, etc.
Les alertes vous permettent de générer des actions si vous trouvez ou ne trouvez pas certaines données sur un ordinateur avec des informations d’inventaire (liste blanche / liste noire).
Par exemple, que se passerait-il si vous saviez qu’une version vulnérable existe sur vos systèmes ? Vous pouvez créer une alerte qui vous avertira si quelqu’un l’utilise. Ou au contraire, si vous avez besoin qu’une application soit installée sur tous vos systèmes et que quelqu’un ne l’installe pas, vous pourrez le savoir en temps réel.
Le Command Center est le joyau de la couronne de Pandore FMS.
Il sert à contrôler de manière centralisée un nombre illimité d’instances Pandora FMS indépendantes (chacune avec son serveur, sa console et ses bases de données), de sorte que vous pouvez gérer des dizaines de milliers d’agents à partir d’un seul point, tandis que ces systèmes sont à leur tour gérés par des instances indépendantes.
Ce système de gestion fédéré garantit l’uniformité et la facilité de gestion.
C’est un système robuste où la chute d’un système n’affecte pas les autres systèmes, où la croissance est entièrement horizontale et répartit automatiquement la charge. Nous avons des clients avec plus de 40 000 agents et plus d’un million de mesures collectées.
Dans les environnements critiques et/ou à forte charge, il peut être nécessaire de répartir la charge sur plusieurs machines et de s’assurer que si un composant de Pandora FMS tombe en panne, le système reste en ligne.
PFMS a été conçu pour être modulaire, mais il est également conçu pour fonctionner en collaboration avec d’autres composants et être en mesure de prendre en charge la charge des composants qui ont échoué.
Le composant le plus critique est la base de données (MySQL/Percona) qui peut être configurée en mode actif/passif afin qu’en cas de défaillance, un nœud en lecture seule s’active automatiquement et le système continue de fonctionner sans interruption, et sans perte de données. Ce système est intégré à la console Pandora FMS.
Discovery Cloud permet, via un système entièrement préinstallé et centralisé, de configurer des connecteurs natifs (via des API) avec les fournisseurs de cloud public les plus répandus : Amazon, Azure et Google.
Vous serez en mesure de vous engager avec leurs instances et d’explorer les ressources disponibles pour leur surveillance : machines, disques, bases de données et autres éléments.
L’avantage de ce système est que vous pouvez connaître les services de manière dynamique, sans installer d’agents. De plus, si vous installez ensuite des agents, vous pouvez ajouter les deux approches de la supervision.
Grâce au système de conteneur d’informations d’identification, vous pouvez même surveiller différentes instances Amazon, par exemple.
Dans le cas d’Amazon, vous pouvez également connaître le coût des services actifs.
Comme avec les fournisseurs Cloud, Discovery permet de surveiller certaines technologies étendues out-of-the-box de manière centralisée et à distance : Oracle, SAP R3, DB2, SQL Server et virtualisation VMware (via l’API vCenter)
Outre les fonctionnalités OEM, il vous permet de personnaliser non seulement l’apparence, mais également les fonctionnalités accessibles par tous les types d’utilisateurs (y compris les administrateurs). De cette façon, vous pouvez limiter les fonctions d’une instance PFMS, même en les faisant disparaître des menus.
Pandora FMS Open Source is not a freemium software, it is not bloatware nor shareware (wink for those born before the 80s). Pandora FMS is published under GNU GPL 2.0 and the first line of code was written by the company’s current CEO in 2004. At that time, free software was in full swing and MySQL was still an independent company, as was SUN Microsystems.
There are currently several thousand open source users downloading updates through our update system and using it on a daily basis. We do not know more because we respect privacy and because we have neither their name nor the company where you work.
Pandora FMS is a real free software. The project has been active in Sourceforge since 2004 and we have all the awards granted by this entity dean of Open Source. All the code is available on Github in real time, but the most important thing is the documentation we have, available in five languages (Spanish, English, French, Japanese and Russian) and with a level of depth that allows you to get the most out of it without having to pay for certifications, training or consulting.
Printed, the manual has more than 1000 pages (per language) and is maintained by our professional development team, Q&A, translators and professional documentalists. We also have a public forum available where we solve questions, with more than 15,000 messages. We believe that freedom consists in offering users options, not just giving them part of the pieces of a puzzle without instructions.
However, Pandora FMS has another version, different from the OpenSource version that is aimed at the business world. It is not only that it extends features regarding the OpenSource version, it is conceived for another type of user. The code of this version is not public, although there is a free version, limited to 50 agents, called Pandora FMS Free at no economic cost, but with all the features of Pandora FMS ONE.
Pandora ONE features are oriented to demanding professional environments that require some automation and more specific tools already created to use them in operation and with professional support so that if something fails they may ask and get a patch if necessary. It is for these types of environments that we designed Pandora FMS ONE.
If you want to use Pandora FMS OpenSource and have doubts about whether it will work for your organization: do not hesitate, it is not a question of size, we have users of the Open version with thousands of agents and who have been using it for years.
One of the big differences between the OpenSource version and the ONE version is the time you will have to spend getting a system up and running and maintaining it over time, this is especially relevant regarding updates and patches. In the OpenSource version you will have to update yourself from code (Github) while in the One version everything is a click away with our Warp Update system. It is nothing special about Pandora, it happens in all OpenSource projects, but in monitoring, where you always have to be up to date, this time can be very relevant.
In addition to updates and access to a support team to support you at all times, there are many other functional differences that can be key to optimize your day-to-day management and save you a lot of time.
Below we describe some of the differential features of the ONE version compared to the OpenSource version. Should you wish to try them out yourself, you may try a 30-day trial version, but let us show you at an online meeting and you’ll save yourself the trouble. Your time is valuable and while our documentation is extensive, PFMS has plenty of features.
Services are the way to show in a simple and visual way what things are like in your organization, classified into different entities that in turn are made up of other services and / or metrics.
That way you may perform an automatic root cause analysis and find out when a service is affected, where the source is and even visualize it in the form of a tree:
Services complement the existing display options in Pandora FMS and allow system managers to define weight rules that have the their systems’ redundancy to alert only in case of need, not when something unimportant fails.
↑ Back to top
Security Monitoring
Pandora ONE incorporates the ability to audit each system for unsafe configuration failures, as well as vulnerabilities in the base operating system and installed applications. You may assess the security consistency of each host and generate useful technical reports so that your technicians can secure systems.
In addition, Pandora verifies in real time the security of remote access, passwords, open ports and changes to key system files. If something changes, you’ll be alerted almost in real time.
↑ Back to top
Policies
The need arose from a client who managed many computers with different purposes and technologies. They found out that monitoring Windows 2000 computers was different from monitoring Windows 2003, and that of course the Redhat Linux had different needs from the Debian Linux. It also had differentiated database environments, such as DB2 or MySQL.
Base monitoring could be “compartmentalized” into different sets of checks that could be standardized, so that any Linux machine that had Oracle could be monitored the same. That way, we made sets of checks that could be easily deployed to machine groups.
Thanks to the policies, it is possible to homogenize monitoring and to deploy a standard monitoring by technologies.
Thus a system can have different policies applied (e.g. base operating system, database, application X, network performance, etc.) and for every time you modify the policy, it can get “synchronized” with those systems that are subscribed to said policy, in a totally automatic way.
Of course, exceptions can always be made to policies at individual level, and each system can have unlimited policies in addition to custom monitoring. Using policy monitoring can save system administrators a huge amount of time.
↑ Back to top
Customization and OEM
If you need to sell your own monitoring product, with your own brand and full customization not only of its look, but also of its installers, command path, running services, ISO installation images, Windows agents, logos, manufacturer and product names, Pandora FMS Enterprise has different customizing levels.
The most basic, and included as standard in any ONE license, allows you to customize the appearance of the console, so that it does not look like Pandora FMS but your own product, with your own brand.
If what you need is to go further, and generate a software with another name and that from the installation process to the name of the database everything is alien to Pandora FMS, then OEM customization is what you need. We can even generate update packages specific to your OEM (or teach you how to do it so you can fend for yourself).
↑ Back to top
History DB
Pandora FMS One has a secondary storage system in an additional database. The system automatically transfers the data of more than X days to the history database and when it needs it to make reports or graphs, it uses both databases to gather information.
This allows you to have an almost unlimited data history (several years) without compromising the speed of access to day-to-day data.
↑ Back to top
Delegated Authentication in Active Directory
Whether you need your installation to rely on an Active Directory to authenticate users, or to automatically create them at login, assigning them specific profiles or filtering them through a blacklist, this feature is designed specifically for professional environments like yours.
It has advanced options such as delegating to a secondary server, excluding administrators, complementing it with double authentication through Google Auth and many other options.
↑ Back to top
Remote Control
Remotely control and access your systems, whether windows workstations, Linux or Windows servers, or Raspberry or similar embedded systems. Access the remote shell as if you were in front of it, the remote desktop, or copy files both ways. All this from the same Pandora FMS WEB console, fully integrated into your asset management.
In Pandora RC you may have your own on-premise infrastructure of Pandora RC servers so that all communication among your systems can be managed and controlled, with total autonomy from third parties and with maximum security and confidentiality.
In the OpenSource version, however, you may use our Cloud servers, up to a maximum of five devices for free.
In the RMM version, you will be able to use all your devices in our Pandora RC cloud to connect to them from Pandora FMS.
↑ Back to top
Satellite Servers
Satellite servers allow remote monitoring of entire computer networks in a distributed way and without direct connection to Pandora FMS database. Install Satellite servers in the networks of your clients, they will obtain metrics of all kinds of devices around them exploring what they have around them automatically and sending the information to the central server where you may manage it as if they were normal agents.
Satellite servers are perfect for making deployments in remote sites, customer offices or inaccessible environments. They can be installed on Raspberry, or any type of container.
↑ Back to top
User Experience Monitoring (UX)
Nothing like observing things pretending to be a real user, if possible from the same chair as the real user. This is what user monitoring consists of, replicating a transaction from beginning to end, step by step, calculating the time it takes in each step, and verifying that each step is completed correctly.
That way you will not only find out whether it fails, but you will also know where, and how long each step takes. You may even take a screenshot to know what the fault looked like.
This can be done for web applications (even if they have Java, Flash, HTML5, etc.), and also for traditional desktop applications. It can be done centrally (WUX) or in a distributed way so that the probes perform the tests from different geographical locations.
↑ Back to top
Remote Agent Deployment
We know that deploying agents and configuring them is one of the most burdensome points of deploying monitoring. That is why we have created a tool that allows, providing credentials, to connect to Windows or Linux systems to copy the agent and install it unattended. It allows you to customize the installation, by different networks, environments or groups of machines.
From dozens to thousands of systems can be installed or upgraded from the agent deployment console.
↑ Back to top
RMM
RMM is a Pandora FMS ONE feature that is used for orchestration (IT automation). It is a fully native tool integrated into the console that uses PFMS agents to execute command blocks on selected targets.
A use example would be to configure the auto-start of the HTTPD service on CentOS 7 systems massively. Another example could be to install a manual patch on those Windows machines that you select from a list. These types of operations can be planned on a specific system or a list of several dozens.
The RMM version of Pandora FMS also incorporates integrated remote control (Pandora RC), for Windows, Linux and Mac systems.
La solución de monitorización total para una completa observabilidad
Contacta el equipo de ventas, pide presupuesto o resuelve tus dudas sobre nuestras licencias.
Auto Provisioning and Automatic Agent Configuration
It implements an automatic mechanism by which it can apply policies and changes to newly provisioned agents, so that after deployment, monitoring configuration is automated, assigning it group(s), monitoring policies, alerts, etc.
This customization is done based on rules. For example, having a certain IP range, a specific brand or custom field, or a hostname with a certain pattern.
In addition, after you make the configuration change, you may generate a custom action. This is perfect for integrating any system provisioning process into monitoring.
↑ Back to top
Collections
Deploying advanced monitoring requires bringing scripts and small applications (ours, yours or from third parties) to the monitored systems, to be executed by the agent in the form of plugins.
Collections allow you to gather this set of files and transport them to agents in an integrated way in policies. That way, using plugins is simple and transparent for the final operation.
↑ Back to top
Log Collection
Pandora FMS can collect logs from any source that supports syslog or through software agents (Windows and Linux). Such logs can be plain text files, or Windows system events.
They will be collected by Pandora FMS monitoring agent and sent to the server along with the monitoring data. So if you already have agents installed, you may collect logs from those systems conveniently and quickly, and without additional software or licenses.
Unlike monitoring data that is stored in a conventional SQL database, logs are stored in a separate Elastic system. You will be able to store gigabytes worth of logs and keep them for a long time (you will only need more disk space). You may set up alerts or search through your data sources. It is the ideal complement to comprehensive monitoring, and fully integrated with the console.
↑ Back to top
Inventory Alerts
PFMS inventory allows you to obtain many types of data: installed software packages, users with access to the equipment, installed patches, hardware devices, firmware and version of the base system, license or serial number, etc.
Alerts allow you to generate actions in case of finding or not finding certain data on a computer with inventory information (whitelist / blacklist).
For example, what if you know that there is a vulnerable version in your systems? Well, you could create an alert that notifies you if someone is using it. Or on the contrary, if you need an application installed on all your systems and someone does not install it, you may find out in real time.
↑ Back to top
Command Center
The Command Center is the jewel in the crown of Pandora FMS.
It serves the purpose of centrally controlling an unlimited number of independent Pandora FMS instances (each with its server, its console and its databases) so that you may manage dozens of thousands of agents from a single point, while these systems are in turn managed by independent instances.
This federated management system ensures uniformity and ease of management. It is a robust system where one system failing does not affect the rest of the systems, and where growth is fully horizontal and distributes loads automatically.
We have clients with more than 40,000 agents and more than one million metrics collected.
↑ Back to top
High Availability (HA)
In critical environments and/or with lots of load, it is possible that it is necessary to distribute the load among several machines and make sure that if any Pandora FMS component fails, the system will stay online.
PFMS has been designed to be modular but it is also designed to work collaboratively with other components and to be able to take on the burden of those that failed. The most critical component is the database (MySQL/Percona) that can be configured in Active/Passive mode so that in case of failure, a read-only node is automatically activated and the system continues to operate without pause, and without data loss.
This system is integrated into Pandora FMS console.
↑ Back to top
Discovery Cloud
Discovery Cloud allows, through a fully pre-installed and centralized system, to configure native connectors (through APIs) with the most widespread public cloud providers: Amazon, Azure and Google.
You will be able to get it hooked onto your instances and explore the resources available for monitoring: machines, disks, databases and other elements.
The advantage of this system is that you may get information about the services dynamically, without installing agents. In addition, if you later install agents, you may add both monitoring approaches. Through the credential container system you may even monitor different Amazon instances, for example.
In the case of Amazon, you will also be able to find out the cost of active services.
↑ Back to top
Discovery Applications
As with cloud providers, Discovery allows out-of-the-box to monitor some extended technologies centrally and remotely: Oracle, SAP R3, DB2, SQL Server, and VmWare virtualization (through the vCenter API):
↑ Back to top
Enterprise ACL’s
Along with OEM features, it allows you to customize not only the look, but the feature accessible by all types of users (including administrators). That way you may limit the functions of a PFMS instance, even making the menus disappear.
↑ Back to top
In this workshop we will see the new unattended Cloud installation model in Red Hat 8 (supported by Rocky Linux 8), for Pandora FMS environment fast deployment.
Cloud installation. You’re not the only one who lives up there!
You will only need to have a single Red Hat 8 instance enabled and an Internet connection to run the installer.
Another point we will see will be the agent installer in Cloud format for systems based on Red Hat and Debian.
The new Cloud installer is the new official installation method we have in Pandora FMS.
We switched from an old Isos system to something more Cloud-oriented.
The idea is simple, that any instance of any provider, whether On premise or any public cloud provider, can be installed in Pandora FMS easily and quickly.
Check out our video and ask any questions if you have any left!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.