Regression tests, your type of test

Regression tests, your type of test

Has it happened to you that with the release of a new version of your favorite application some feature disappeared? Or it works but unexpected things happen when you execute it? Or does it just crash?

Today we will see what the possible tests that guarantee to avoid all of this are: regression tests.

You still don’t know what regression testing is?

There are many rules for testing software, and you may be surprised to learn that there’s even the documentation job of testing software. 

*I leave you here a few seconds to surprise you…

And not only that, my friend, there are international organizations that are devoted to studying and making general recommendations. 

*For example, standards ISO/IEC 29119 roughly state what software testing processes should be. 

For several decades I have been fascinated by all these processes, including monitoring industrial devices, to such an extent that I stick so much to them that they always call me a perfectionist, me! 

I will remind you that the design and construction of any machinery, even today, is carried out by human beings whose lives depend on their proper functioning!

Cars, air conditioners, power plants that cool homes in hot summer…

For that reason software tests must be adapted to the work itself that these programs will carry out:

  • A program to automatically fly an airplane? Rest assured that you will be subjected to very thorough testing.
  • A banking software? It will be tested and will have a special section for testing the corresponding audit software.
  • A video game software? No one will die if something goes wrong, worst case scenario players will buy the game from the competition, but who wants that, gamer fella’?

That is why I would like to explain to you, in the simplest possible way, what these processes and tests are all about.

Unit tests, re-approval and reanalysis

Let’s quickly see some key concepts:

  • Unit tests:

Unlike the last century, we have better hardware at our disposal, which allows for automated, full and fast tests, which can be reused again and again (and run independently) for the source code itself.

A comma, a pair of parentheses may be misplaced or well placed depending on the version of the programming language used (for example, see in Python the command print). For this, unit tests are performed.

  • Process of reapproval:

When a software is modified, whatever the reason, each and every one of the points that have been worked on must be reapproved.

Said tests are always done manually.

  • Reanalysis process:

If the previous point is suspended, the software will be returned to the development department specifying what its malfunctions are.

Once they have been corrected and delivered, they will be reanalyzed and, if everything’s correct, they will be reapproved.

No more preambles! What is a regression test?

Regression tests are totally different from the previous tests. 

They are called that way because they come from the principle that if a software works as expected, and is altered either internally or externally, then you have to make sure that it returns to its previous stability state.

*When we say that a software is stable and works as designed, we are talking about everything as a whole, overall. 

Therefore, a regression test must be applied to each and every component. 

As you can imagine, this is a titanic task, but if done well, it will help improve user experience and gain customer confidence.

When to perform a regression test?

When a new feature is added to a software, the reapproval and reanalysis tests are performed, a regression test must be performed before delivering it to the customer. 

And also when:

  • The requirement changes or was misunderstood by developers and then a feature has to be “repaired”.
  • The software has passed a regression test, is delivered and works very well until something changes. 

*For example, the user has upgraded the operating system or migrated to a newer version: the program suffers a bug that needs to be fixed.

  • The software does its job but over time data accumulates and it takes more and more time to execute the same tasks. 

Optimizing the source code is then required and the entire test cycle is repeated again.

  • Depending on each country there will be new legislation and the software will have to comply with the extremes of law. In this case the software is refurbished and a regression test will be necessary before being re-legalized.
  • You need to port the software to a different operating system (e.g. GNU/Linux® to MS Windows®) in order to sell it to more customers. Here the same regression tests will also be copied and adapted to the new environment.

Some disadvantages of this type of regression test

Not everything was going to be good news:

  • The slightest change has to be tested in a regression test.

Even without any changes in the source code of the software. 

  • As monitoring works, there will be simple and some more complex features, which can be a problem if you have a time limit.

For example, monitoring a web page can take milliseconds if it is about doing a ping or getting a specific value, but in the case of user experience monitoring you will have to record each of the tests to be performed.

  • Once you have automated regression testing you may need to perform a manual test, this will result in more time and money being spent.

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Our Trial

The arrival of Pandora FMS in the United States thanks to the master’s degree from Rice University

The arrival of Pandora FMS in the United States thanks to the master’s degree from Rice University

Pandora FMS is an international entity and needs activity. And seeking that activity we set our eye on that great technological power, the United States.

How does one approach the United States?

Well, in multiple ways… 

Among them: having a team from that capital nation, with five senior professionals who are doing their MBA final project. 

The University of Rice from Texas contacts you. You sign up for their program and then wait for them to choose you as their project. 

And bingo! 

To date we have had several meetings with this team of five professionals. We already explained who we are, in what we work, our product strategies, marketing, sales…

And they answered us: 

“We are going to help you get into the USA market with our project, a specific marketing plan for the US market that includes, above all, communication strategies.” 

Things have gone so well between us that after a month and a half working remotely, we have met here, in our offices in Madrid, to finish clearing out issues and see the presentation of their final proposal

In addition, one of them, Sean Siegfried, has granted us an interview for untiring fans of this blog who love to follow every little detail of our trajectory. 

Here we go!

Pandora FMS and the U.S.A.: the Interview

 Could you tell us briefly about you: from where you come, what you do?

I was born in Brazil and I grew up in Portugal. I completed my degree in London before beginning my career in the industry of oil services. During the last 12 years I have moved between South America, North America and now the Middle East.  At the moment I am the Managing director of a private company in Saudi Arabia that lends manifold services to the greatest world companies, Saudi Aramco.

What brought you to Pandora FMS?

Rice University connected us with Pandora FMS for our last masters project. 

It was a consulting project of four weeks in which we studied how we could help Pandora FMS to get their way around and to obtain more market quota in the USA.

Could you describe what your project consists of?

The project consisted of understanding the business of Pandora FMS and how it could expand its operation and market participation in the USA market. 

The main motivation was to research and create a possible action plan for Pandora FMS to use in the future.

In addition to providing sufficient tools that make management understand the multiple opportunities that are available with the research that was conducted during the eight-week period.

What were the biggest challenges during the project?

The biggest challenge for the team was to understand the capabilities and advantages that Pandora FMS could bring to the US market. 

Once the team understood the applications, they had no difficulty identifying specific segments or specific areas where Pandora FMS could really make a difference when trying to get into the IT monitoring market.

What surprised you the most about our business?

The amount of competition that Pandora FMS has all over the world, and that even despite this, it still has such a strong customer base with large corporations

What do you think are the essential features that would make it possible for Pandora FMS to succeed in the United States?

Especially the cost structure and ability to scale slowly if necessary.

What is the most relevant lesson you have learned from this experience?

Meeting a small but dynamic team with amazing features. 

There is no doubt that the company can slowly grow with the cost base it has now. 

How would you recommend Pandora FMS to technology experts?

With this motto: “The best technology, reliable and affordable, to better monitor your organization.”

Here comes a difficult question: Can technology touch the heart?

I’m not sure how to respond to this, but if technology solves a problem, then it will have a positive effect on the customer. 

In my honest opinion, I believe that technology can touch the heart on the side of the creator/investor.

Is there anything else you would like to comment or say about Pandora FMS or the business?

I think more money should be spent on marketing and branding. 

And make the effort to participate in global forums to better understand what the needs of the market are. 

And, of course, more importantly, expand the brand footprint across multiple segments.

Finally, what do you think of our country?

After spending my life in Portugal, I was lucky enough to visit Spain multiple times. 

I really enjoy the food and walking through the streets of Madrid! 

In general, it was a great experience to share with my classmates!

Madrid improves the services of the EMT monitoring the data of its buses

Madrid improves the services of the EMT monitoring the data of its buses

The public service of buses of Madrid, the EMT, was one of the protagonists of Global Mobility Call that took place the 14th and 16th of June in IFEMA. The company from Madrid exposed its future plans tracing the route to continue transforming the capital into a Smart City where sustainable mobility and independent vehicles acquire great relevance.

Nevertheless, executing this plan would be impossible without a technology characterized by generating data on a steady basis. 

That’s why the city has taken its chances on data control through monitoring. This is the secret for the success of the EMT, that already has established a monitoring system thanks to Pandora FMS.

Pandora FMS, the great secret for Madrid’s EMT success

The EMT counted on a system based on a central HOST, that is to say, a computer or a set of computers around where all the information circulated and to which others connected.

But, after a remarkable enterprise growth, this system became ineffective before an activity that seemed uncoverable, the reason why they were forced to change their IT infrastructure management.

The public transport company confronted a remarkable technological growth of buses and users, and they set the goal of having a trustworthy control over the whole system, both the hardware and the processes that take place.

And it was there where monitoring came up, that is to say, the reception and analysis of data and their management by means of a central console.

In other words, the EMT needed a system that canalized all the information to a single computer from which to access all the interconnected technology, and the agreement with the Spanish company Pandora FMS made such a solution available to them.

Through the alliance, the regional public giant managed to reduce costs and improve its service until becoming a reference in public transport for the smart cities of the future, as it has been shown in the Global Mobility Call.

“The EMT needed to remarkably improve the management of all the information. 

It must be taken into account that its fleet is made up of more than 2,000 buses and that tens of thousands of users use this type of transport daily. 

To satisfy this high demand they leaned on evolution to implement a monitoring system able to adapt to the systems the EMT already had in motion, but that could be able to coexist with future developments”, 

explains Sancho Lerena, CEO of Pandora FMS

This monitoring system allows, among other things, to improve the process of checking bus availability through applications, thanks to which the user can see how much is left before the bus arrives from their phones. 

It also makes it easy for maintainers to manage with real-time information on each machine, its performance, and its status.

By means of Pandora FMS technological solution, not only does it increase the control that exists over the fleet, but it also achieves better response to any incident apart from preventing possible breakdowns, which reduces the impact on the end user and maximizes the benefits.

When this monitoring system is implemented in the EMT, a watchdog agent is also established that reduces workload. 

What is achieved with this mechanism is that there is no need to carry out periodic checkouts to see that the system is working correctly and that, in the event of an error, it can be alerted in time to act and prevent similar ones”, 

highlights the head of Pandora FMS.

EMT Madrid now has control of each bus, which by means of LAN networks constantly dump information to the central. 

A step that in just a few years will be left behind, since they intend to improve data management until knowing in real time the capacity in each bus or even establish some that are completely autonomous. 

A series of innovations that are framed within the goal of smart cities, where the use of technology for the efficient development of services is the fundamental pillar.

The power of real-time data

Investment in technological development has only just begun. 

In the coming years, the use of 5G will end up being established, which allows higher connectivity and higher speed in the use of this type of networks. 

In turn, this scenario will increase the ability of systems to obtain data in real time. And, therefore, service management itself may be more efficient by having the option of adjusting to the behavior of users with a correct monitoring system. 

Madrid, which has reaffirmed in the Global Mobility Call its image of smart city, is already working on creating a digital twin (a virtual recreation of the city) that allows us to find out the movement that takes place in the distribution of its logistic microhub

That way, as with the other services, circulation can be anticipated and improved and, therefore, more efficient and sustainable mobility is achieved. 

What’s New Pandora FMS 763 RRR

What’s New Pandora FMS 763 RRR

Let’s check out together the new features and improvements included in the newest Pandora FMS release: Pandora FMS 763.

What’s new in the latest Pandora FMS release, Pandora FMS 763

NEW FEATURES AND IMPROVEMENTS

New service evaluation option

A new token has been added to be able to choose which services are recursively calculated and which ones are uniquely evaluated with a separate interval to improve the thread load of the service status calculation.

OS Quick Report

A new widget has been added to the dashboards, “OS Quick Report”.

Through this widget you may get a table that will perform counting by the different operating systems that you’re monitoring

Sunburst, new service representation

The possibility of a new service representation has been added.

This will be a centralized view where you may see the details of the tree node through a tooltip when hovering with the cursor.

 New Azure Storage plugin – Enterprise plugin

With this plugin you may monitor a storage account and retrieve data from it such as the number of transactions, capacity or latency used by Azure to process a successful request.

It will retrieve data both at the general account level and from blobs, tables, files, and queues.

Link to the library.

 New Azure SQL plugin – Enterprise plugin

With this plugin you can retrieve performance and connectivity data from any Azure SQL database. Such as the CPU used, failed or successful connections or firewall blocks.

Link to the library.

Nuevo plugin Gluster fs – Open

With this plugin you may get the statistics of each volume and the bricks of a gluster fs environment. Some of the data that you may see are the total disk, Ordblks or Smblks.

Link to the library.

Resources

Download the release note!  

Pandora FMS plugin library

 Pandora FMS official forum 

I want to learn more! 

Our Trial

Prometheus vs Nagios vs Pandora FMS: Never before has such combat been seen!

Prometheus vs Nagios vs Pandora FMS: Never before has such combat been seen!

You already know that in this house we love comparisons. Somehow you have to elucidate which is the best monitoring tool on the market, right?

Well, this time we bring you the final battle between three great ones.  Prometheus vs Nagios vs Pandora FMS. Nothing like that had ever been seen before in the ring!

Let the bell ring!

Prometheus vs Nagios vs Pandora FMS, the final battle

What is Prometheus?

Prometheus seeks to be a new generation within open source monitoring tools. 

A different approach with no legacies from the past.

*You know, for years, many monitoring tools have been related to Nagios by its architecture and philosophy or directly for being an total fork (CheckMk, Centreon, OpsView, Icinga, Naemon, Shinken, Vigilo NMS, NetXMS, OP5 and others).

Prometheus however, is true to the “Open” spirit: if you want to use it, you will have to put together several pieces.

Somehow, we can say that like Nagios, it is a kind of Ikea of monitoring. You’ll be able to do lots of things with it, but you’ll need to put the pieces together yourself and devote lots of time to it.

Prometheus is a data collection tool that works with time series data. 

Many companies that need to integrate a tool into their developments and operations choose Prometheus as their primary source of monitoring data because it easily adapts to most software architectures, quickly integrates with most modern technologies, and becomes a kind of data acquisition and management middleware standard.

It is usually integrated with Grafana to display data, as the Prometheus user interface is quite basic.

What is Nagios?

Nagios is a classic reference in IT monitoring. You can already see some previous comparisons of ours, with this tool.

What is Pandora FMS?

Pandora FMS is an all-in-one monitoring software used for both IT monitoring and integrating monitoring processes of all kinds, from IoT projects to business tracking projects.

Features

Prometheus and Nagios/Pandora FMS on the other hand offer many different features. 

The type of data Nagios works with is very closed and focuses on states, being able to collect numerical metrics. 

Prometheus in raw data

Pandora FMS manages both with flexibility, although Prometheus is undoubtedly the most flexible when it comes to managing open data.

Prometheus collects data from applications that send metrics to their API endpoints (or exporters). 

Nagios uses agents that are installed on servers and through SNMP checks. It has a large and heterogeneous plugin system to collect data from other sources. One of its great virtues is this ecosystem (Nagios Exchange).

Pandora FMS has a more centralized system for remote polling (SSH, WMI, SNMP, web transactions, etc.) and is much more convenient to manage by its unified web interface. 

It also allows, like Nagios, to collect logs and process Netflow data streams, which Morpheus does not even contemplate.

Reports and control boards

As we said before, the charts and dashboards provided by Prometheus do not meet the current needs of DevOps that are very focused on creating their own dashboards, charts with combined data, and generating screens that serve to show other people. 

Many Prometheus users use other visualization tools to display metrics collected by Prometheus, often Grafana.

Nagios comes with a set of dashboards that conform to the monitoring requirements of networks and infrastructure components. 

However, it lags far behind in this area. Although it has visual screens and other third-party plugins for reporting, it is perhaps one of its weakest points.


Pandora FMS, however, has excellent graphics, custom dashboards (dashboards) and visual screens (Visual Console) that allow you to customize the appearance of the collected data. 

On the other hand, its system of templates and reports is extremely powerful and flexible, especially regarding Top-N type reports, different SLAs and all kinds and examples of charts, lists and summary tables.

Nagios XI

Grafana + Prometheus


Pandora FMS

Management, configuration, operation, installation and update

Perhaps this is the big difference between Pandora FMS on the one hand and Prometheus and Nagios on the other. 

While in Pandora FMS 99% of the configuration is through a graphical interface, with Prometheus and Nagios you will have to deal with configuration files and constant reboots. 

The same happens when you want to update, it is a process that requires Linux knowledge and managing with the shell

In Pandora FMS, it is fully automatic. 

As for Pandora FMS initial installation, it can be done using a docker or an online installation with a single command. 

In Prometheus and Nagios the installation can be tedious although preconfigured images already exist with Docker. 

None of the three tools is click & play anyway. None is a toy that can be simplified since all three are powerful multipurpose and extremely versatile tools.

Community

Prometheus has been growing in recent years, and has more and more extensions. 

However, the leader in this category is Nagios, who remains the reference of the community and has the largest library of extensions.
Although Pandora FMS already has a large library of plugins (mostly Enterprise applications), it is behind that of Nagios.

What will you miss in Prometheus?

Particularly, reports, dashboards and a centralized configuration management system

An interface that allows observing and monitoring grouped information in services / hosts. 

Actually, in order to do something you will have to install Prometheus and a set of applications to integrate them together.

What will you miss in Nagios?

A centralized management interface. Wizards, customizable reports and above all, unified management of agent configuration.

What are the great disadvantages of Prometheus over Nagios or Pandora FMS?

Prometheus is designed to work with data. 

It has no statuses, no service groupings, and you will not have a view that respects a hierarchy of elements that you can associate with your organization (networks, system groups, hosts).


Prometheus is a data processing ecosystem, not a common IT monitoring system. 

Its power in data processing is far superior than that of Nagios, but the use of that data for day-to-day use makes it extremely complex to manage, as it requires many configuration files, many external commands distributed and everything must be maintained manually.

The graphical interface also does not help, as it is excessively simple and does not allow you to configure anything.

We can say that like Nagios, it is a kind of monitoring Ikea, and that Nagios is much more limited in terms of its data processing power, but much more specific when it comes to using that data for something useful and visible.

Conclusion

Comparing Prometheus with Nagios is not fair as they have different approaches, Nagios is much more prepared for traditional IT monitoring, in less time, with less complexity and with more understandable results, even though it is older technology and with a much more rigid architecture that becomes difficult to integrate with the requirements of today’s hybrid environments.

Nagios and Pandora FMS have more resemblance to each other than either of the other two. 

However, Pandora FMS integrates better than Nagios with external development processes, since like Prometheus, it also works with raw data as a source of information. 

Unlike Prometheus, Pandora FMS uses an SQL backend allowing easier integration. 

On the other hand, like Prometheus, Nagios has many “additional” interfaces that are ultimately needed to display maps, graphs, and other types of reporting. 

In Pandora FMS everything is “included” as standard: reports, dashboards, dashboards, graphics, etc.

Prometheus has two main advantages over Pandora FMS and Nagios: the fact that it is designed to be part of an integration and its ease of use by having far fewer features.

Its main disadvantage is its poor scalability and the fact that many of the features of Nagios and Pandora FMS just do not exist in Prometheus, especially in network monitoring or in reporting.

Radar-type graph

Pandora FMS boosts its cloud solution. Safer, easier and faster IT monitoring

Pandora FMS boosts its cloud solution. Safer, easier and faster IT monitoring

For their MaaS Solution (monitoring as a service), Pandora FMS   partners with OVHcloud to ensure data sovereignty, European technological independence and top quality service with datacenters in Europe, America and Asia.

Learn all about Monitoring as a Service (MaaS)

Pandora FMS, the renowned Spanish technology company, launches its SaaS solution on the market: MaaS, Monitoring as a Service, a flexible subscription model, easy to understand and that covers all the monitoring needs of companies of all sizes.

The MaaS Solution complies with easy integration with business processes, permanent security and 24/7 availability, to be accessed anytime and anywhere.

A crucial weapon to safeguard companies from the growing demand for the Cloud, and the difficulties of finding personnel to manage the ever-increasing technological complexity. 

Particularly, since it is well known that the use of heterogeneous tools and the lack of use of AI in multi-cloud environments prolongs and delays innovation, forcing IT teams to devote almost half of their time to maintenance tasks.

In collaboration with OVHcloud

Since 1999, the year of its foundation, OVHcloud has had a single objective: to offer their customers a complete range of innovative Cloud products and bare metal with a marked European accent.

Since then, the group has provided world-class infrastructures to more than 1.6 million customers worldwide, and has an ecosystem of partners who bring in their added value to accompany the digital transformation of  different companies. 

Pandora FMS is incorporated as Advance Partner from OVHcloud, combining its extensive experience in IT monitoring software with the sovereign infrastructures of OVHcloud, and includes its ready-to-use solutions in the Marketplace of the European Cloud leader.

At the moment, OVHcloud’s powerful high-end dedicated servers are helping Pandora FMS provide its customers with its MaaS service: a service with very high standards by offering 24/7 operation. 

Thanks to the smooth operation and reliability of this product, they can also comply with the SLA of the services offered hosted on these servers.

“The ease of provision, the transparency and the wide range of options that OVHcloud now has to choose, not to mention the possibility of having servers in Europe or America, is key to deploying our solutions,” tells us Sancho Lerena, CEO and founder of Pandora FMS.
“In addition, it is a pleasure to be part of the OVHcloud ecosystem, and contribute jointly to the promotion of innovative, interoperable and trusted solutions. One more way to try in face of all the range of possibilities of our MaaS Solution,” concludes.

Pandora FMS

Pandora FMS, as many of you know, is the total monitoring solution, which allows you to observe and measure all kinds of technologies regardless of where they are located: Cloud, SaaS, virtualization or on-premise: a flexible solution that unifies data visualization for full observability of the entire organization.

With more than 50 thousand facilities in 53 countries, among its customers there are companies such as:

  • Salvensen
  • Prosegur
  • Repsol
  • CLH
  • Euskaltel
  • Adif 
  • Santalucía
  • Cofares 
  • AON
  • El Pozo 
  • The EMT 

And other foreign companies such as:

  • Rakuten
  • Nazareth University in New York 
  • Ottawa’s main hospital 

Also, public administrations such as:

  • La Junta de Castilla-La Mancha 
  • Community of Madrid
  • La Diputación de Barcelona 
  • And numerous municipalities in France, Portugal and Spain

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Our Trial

You don’t know anything about Google Cloud monitoring

You don’t know anything about Google Cloud monitoring

The fact that data centers have evolved a lot is undeniable. This has enabled storage evolution and the execution of online applications.

Now we often talk about hybrid clouds

*Yes, we don’t even take the time to explain what digital clouds are anymore and we even assume that everyone has their own, small but they have them.But when it comes to doing things big, it’s unavoidable to mention the giant Google Cloud®!

Pandora FMS and the famous Google Cloud monitoring

Pandora FMS® (PFMS) during the year 2020, in the midst of the pandemic, walked slowly but without any pause, their team did not stop at all

And there were great improvements in quality of use in 2020!

As it happens, that’s when we introduced Google Cloud monitoring. 

Let’s look at everything in that term!

Google Cloud Platform

Known simply as Google Cloud, this platform encompasses more than one hundred components (digital products). 

It is obvious that I will name only a few, since Pandora FMS does not monitor them all

yet.

We will classify them in several main sections:

  1. Compute Engine: To run applications and virtual machines, Kubernetes, functions as services, among others.
  2. Storage & Databases: For file storage and execution of database engines, all this integrated with the previous point.
  3. Networking: For server load balancing (CDN, DNS, etc.).
  4. Big Data: Overly speaking, analysis of large, gigantic volumes of data that are then converted into usable information.
  5. Identity & Security: Everything related to online identification for own or third parties.
  6. IoT: For the Internet of Things.
  7. API Platform: Everything necessary for third party companies to communicate with all the paraphernalia of Google services and applications. *If you don’t know what an API is, here’s what you need to know.
  8. Cloud AI: The artificial intelligence cloud with lots of resources, limited only by your wallet.

*The latter is important, your wallet, not artificial intelligence. Because it is necessary to direct debit a bank account,  or a good credit card, the payments of all these services.

**At the time of writing, I do not know if the new Google Pay (formerly called Google Wallet) is accepted as a means of payment (most likely, because it is from the same company).

In the case of Pandora FMS monitoring of Google Cloud it is only available for the Enterprise version.

But erase those sad faces because you can request a 30-day free trial by accessing this link!

Again the change

If there’s one thing that characterizes Google since I saw it born, it’s the constant change.

As well as the number of products and services they have is immense, no  less small is the number of them that have been discontinued or withdrawn from the catalog. 

While I still keep my Hotmail email account (not available to new users), Google at most has come to offer some product similar to the one they withdraw, accompanied by a package of instructions for us to do the data migrations. 

When they say it’s over, it’s over.

Therefore, dear readers of the future, if this has happened again, please write it down in the comments below.

 *We read them all.

Monitoring Google Cloud

Pandora FMS is able to monitor Amazon Web Services (AWS) and Microsoft Azure, so Google Cloud monitoring shares certain similarities.

Broadly speaking, the procedure is as follows:

  1. We activated the encryption of PFMS database.
  2. If the cloud component is not installed, you may download it from PFMS Enterprise library.
  3. Now you have to manage the credentials at Google level.
  4. Generate a service user in Google Cloud, and download a file in JSON format.
  5. With this JSON file you will create the authentication account in Pandora FMS.
  6. Once this is done, go back to Discovery Cloud and use the new credentials to access Google.
  7. Select the monitoring you need and click accept and wait for all connections to be made. This link contains the metrics available from Compute Engine.
  8. You will then have the main Google Cloud agent, one for each zone in which you have machines, and another agent for each virtual machine.

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Our Trial

Something IT professionals need to know and miss

Something IT professionals need to know and miss

At PAndora FMS we have IT professionals on an altar. Literally, one next to the water dispenser in the office. I’m serious! It even has its blessed liturgical cloth, its flattering parsley, its candles and the incense! But there are still things that these people miss. Here’s a hint: it’s related to ITOM.

IT Operations Management (ITOM) and automation

We all agree in the industry that IT professionals waste too much time every day, struggling with minor tasks within IT Operations Management (ITOM). 

And it is that ITOM covers everything necessary to support the network infrastructure that provides IT services. 

This includes both the hardware (switches, servers, data center firewalls…) as well as the company’s network and the tools needed to make sure everything works properly.

According to the latest surveys, 78% of IT professionals say they spend at least 10% of their time proactively optimizing their environments. 

This extra time spent on maintenance and conservation obviously takes time from proactive optimization. 

And this is where automation comes in. 

Automation is that miracle from heaven that sets IT professionals free to stop wasting time and focus on things that really matter, and not on boring tasks!

Of course, most IT professionals know firsthand the value of automation. 

That’s why they have their altar. *Visitable during working hours, and donations are accepted

But automation has not yet reached ubiquity regarding ITOM. 

And it’s time for that to change!

That’s why we want you to start considering automating the following types of tasks:

  • Complex tasks with multiple steps
  • Repetitive routine tasks or tasks triggered by a recurring event
  • Tasks where a large amount of data needs to be filtered based on specific, predefined criteria

As we said, in these cases, automation can help the incredible intellects of IT professionals, and their almost intrinsic creativity to focus on other needs.
Perhaps, even with automation, you will minimize the possibility of human error in tasks.

What is the next step?

Certainly the next step is to consider which are the most relevant ITOM tools. 

If your megalomaniac goal is, for example, to optimize a large government network, look for the products best designed to scale and then make sure the vendor and product are approved for use in government networks. 

Here, for example, the most relevant ITOM tools could be:

  • Performance monitoring
  • Configuration management
  • Security and intrusion detection and prevention
  • Troubleshooting

If you then relax and have a tea and take enough time to consider specific processes that can benefit from automation, such as automating network configurations, you may help out your IT professionals do more efficiently tasks like: 

Meeting compliance requirements, implementing configuration changes quickly and efficiently, or reducing downtime caused by faulty devices.

And network configuration automation is only one area from among them all. 

Think about the possibility of automating workflows and your IT staff crying dramatically when finally getting their lives back! 

Or automating tasks initiated by mobile devices, etc.

Prepare for change!

Naturally, automation leads us to the development of a new type of skills within IT staff. 

The more tasks are automated, the more IT professionals become automation supervisors instead of performing those tasks themselves.

That is, while before more specialized staff needed to understand perfectly what the inner workings of each piece of hardware were like, with automation, these people need to be much more aware of how the software works. 

They need to understand application programming interfaces and how they can dictate things like policies, rules, and user access.

Conclusions

ITOM and automation together are virtually the panacea for IT professionals. 

The secret of a successful transition is to go little by little, in a gradual and logical progression. 

Securing tasks, processes, and skill sets so that they move together toward a better future filled with altars in the office for IT professionals!

Resources

Pandora FMS plugin library

Foro oficial Pandora FMS

I want to learn more!

Our Trial

Why does Pandora FMS Open Source exist?

Why does Pandora FMS Open Source exist?

My name is Sancho and I am the person who started developing Pandora FMS in 2004. I want to tell you why Pandora FMS Open Source exists and why the community is so important to me.

We tell you why Pandora FMS Open Source exists

I always liked computers, I started with a ZX Spectrum and my first game was a hacked one. 

I had to teach myself how to peel a cable to plug the RCA video output into my father’s little TV. In fact, I think I’ve spent more time learning how to solder cables, copy games, and trick them than playing them themselves. 

In the 80s, technical knowledge was what someone could teach you, there was no Internet. And, as a child, I also didn’t have the resources to talk to expert adults. 

When the BBS (Bulletin Board Systems) arrived in Europe I was 14 years old. I still remember, with pristine clarity, the article from a computer magazine that filled my head with wonders: 

“Thousands of apps and games, access to information around the globe, messaging with users around the world…” 

I could learn anything!

And there were even many softwares that I could use without having to hack them!

When I connected to Fidonet in 1990 a world of possibilities opened up. 

I started talking to university students, set up a Fidonet node at home and had the need to do my first programs for my own BBS. It used RemoteAccess and FrontDoor, applications to give access to users and to connect to Fidonet through a modem over the telephone line.

I learned TurboPascal by reading documentation online and with photocopied books in English that other users lent me. 

A student at the University of Zaragoza lent me his credentials and I accessed the Internet for the first time through a RAS built on an HP-UX. 

I didn’t know what Unix was, but I had some commands written down to download things through FTP and then through Kermit to my computer. 

Along the way I had to stick with the AT commands and run head-on with the problem of being a 15-year-old boy who hires two phone lines for a BBS in a room of five square meters.

Antes de Pandora FMS Open Source

Thanks to other users I learned how to connect with the pair of tests in the phonebox of my house to call the US for free and download the McAfee antivirus updates, which I made available to everyone. 

I later learned how to connect to the internet through Compuserve using trial accounts that lasted 15 days. 

In short, I had an insatiable craving for knowledge

I loved to try, combine and dig

I used a lot of software that is now forgotten, such as Desqview or OS/2 Warp, to try to make my PC, made with second-hand parts, have the power to work in what became one of the largest BBS in Madrid (Edison BBS).  

All the software I developed (online games, time banks and things like that) I shared with other BBS Sysop, although my code was terrible. 

*Although no one cared much about the code because everything was to be done and the important thing was that it worked. 

Most of the programs I used had to be compiled by other people with more powerful PCs, my machine took days to compile and link the binaries.

Open Source Software Time

When I was in college, the Internet and ADSL came, as well as stacks of photocopied books. 

I tried programming video games and then my first job came. 

There I discovered that the Internet was a much, much bigger world than I had thought. Where there were servers and networks full of computers that people plugged into the web without notifying anyone, and lots of other stuff that appeared little by little… 

That’s when I discovered that it was necessary to bring order to so much chaos

I needed to know what was happening around me and monitor it. 

In each new work, that sense of chaos and lack of control grew. 

There did not seem to be a universal system to collect information and unify it, each had its applications, incompatible with the rest. Unlike the world of Star Trek where everything was compatible and universal.

That craving for knowledge and that habit of sharing at that time was not circumscribed to a philosophy, it did not have a name. It was a pure necessity: to share, learn, test, copy and modify.  

Some years later I discovered what the term Open Source meant. 

But it was just a name, the habit has been in me since I copied my first Game of Spectrum. 

*I once met in an interview an English developer older than me who had programmed one of those games, but that’s another story.

I spent many years learning thanks to others

Now I have to give back everything I have learned since my childhood. 

For me Open Source is not a license, it is not a political doctrine, it is not a fashion, it is a way of understanding life.

Sharing knowledge makes us better as individuals, as a society, and as professionals.

That is why Pandora FMS Open Source is not a “limited” version of the Enterprise version, no, the Open Source version has infinite documentation, in several languages, a changing documentation that includes everything, without secrets. 

The Open Source version not only has code, it has people who answer questions, guides and tutorials and has no limitations. 

It is made for that purpose, to bring order to chaos and allow anyone, programmer or not, to expand and improve it. Without having to share what you do, just let them use it however they want and for whatever they see fit.

There are many users, and companies, that like me when I was younger, cannot afford what an Enterprise license costs. 

I encourage them to use the Open Source version of Pandora FMS, not because it is free, but because you can learn without limit and can make Pandora FMS go far beyond what you think. 

Moreover, if they want, they can share their knowledge back and improve Pandora FMS. 

A code patch has the same value as a collection of icons or a Russian translation.

Where do we get the money?

Easy, not everyone has that craving for knowledge, to learn, to share. 

There are people who have their focus on managing problems, quickly and with professional help. 

They prefer an out-of-the-box tool that solves problems in hypercomplex and very specific environments. 

They still really want to learn and try, but they don’t have the time. Literally, their time is worth much more to their companies than Pandora FMS’s Enterprise license. 

Some Pandora FMS tools, such as policies, can be easily implemented using additional tools (or even your own scripts), but it takes time and knowledge. 

In the Enterprise version it is solved with a couple of mouse clicks.

The same goes for scalability. 

In the Enterprise version we support an active/passive HA system based on MySQL, any user can implement the same system as us, they can also build a Galley cluster to have almost infinite scalability, without the need to mount a Metaconsole (Enterprise). 

In fact we have some users who have been using Pandora FMS for many years with much larger environments than most of our Enterprise customers. 

I encourage you to see for yourself that the free spirit is still there! 

Call it OpenSource, free software, enter the license (GPL2), but above all: 

Learn, share and enjoy the process!

What’s new Pandora FMS NG LTS Akira

What’s new Pandora FMS NG LTS Akira

Let’s check out together the features and improvements related to Pandora FMS new release: Pandora FMS 762. Remember that this is an LTS, we only have two of them a year, they are stable.

What’s new in Pandora FMS latest release, Pandora FMS 762

CHANGES AND IMPROVEMENTS

Improved the PostgreSQL plugin to be able to be executed as a server plugin

Enterprise plugin

Through this plugin you may monitor postgreSQL databases through custom queries remotely

Go to the library 

New OpenShift plugin

Enterprise plugin

With this plugin you may monitor your openshift nodes and pods. Which can be useful to analyze their performance.

Go to the library

New WebSphere plugin

Enterprise plugin

Thanks to this plugin you may monitor each websphere application server, being able to see data from the threadpool or free memory for example.

Go to the library

New Veeam Backup plugin

Open plugin

Through this plugin you may see data from your Veeam Backup environment such as the last backup made or the jobs.

Go to the library

New InfluxDB plugin

Enterprise plugin

With this plugin you may monitor InfluxDB databases to see their performance.

Go to the library

New Redmine plugin

Enterprise plugin

By means of this plugin you can create, edit or delete tickets in Redmine with Pandora FMS.

Go to the library

New Zammad plugin

Enterprise plugin

With this plugin you can create, edit or delete tickets in Zammad with Pandora FMS.

Go to the library

Resources

Download the release note

Pandora FMS plugin library

Foro oficial Pandora FMS

I want to learn more!

Our Trial

Thanks to you, our LTS Release finally has a name!

Thanks to you, our LTS Release finally has a name!

A few days ago we gave you the opportunity in social media and through email to choose, by means of a simple survey, the upcoming names of our LTS Release (Long Term Support).

Participation has been a success! More than two hundred participants! Making it clear that you love both our releases and Star Trek of course.

* Let’s not forget that our repertoire of possible names, from which we gave you a choice and vote, was an extensive list of Star Trek spaceships.

Well…

We finally have a winning name for our LTS Release!

Are you ready?

And the winner is… AKIRA.

Our new LTS Release (Long Term Support) will be called Pandora FMS NG LTS Akira.

We already know that with “Akira” you can think of the famous and award-winning manga by Katsuhiro Otomo or his animated film with the same name. At Pandora FMS we love him too!

*Hence our little homage in the above illustration. Give it up for Tetsuo!

But it actually refers to the spaceship Class Akira. A Starfleet heavy cruiser in Star Trek that was specially designed for combat.

3,055,000 tons and a cruising speed of Warp 9.2

As much a boss and as much a geek as we are.

El-autentico-Pandora-FMS-NG-LTS-Akira

And that’s not all!

Our next LTS Releases will be named after the most voted ships that have followed Akira.

  • Hope
  • Renaissance
  • Andromeda
  • Defiant
  • Excelsior
  • Tachyon
  • Stellaris
  • Antares
  • Apollo
  • Chimera

It only remains to say that THANK YOU VERY MUCH for your participation and long life and prosperity to all of you!

Which name sounds like Pandora FMS?

Which name sounds like Pandora FMS?

Hello!

Your time has come! If you have always wanted to put an epic name to a pet or a child, to your most personal book or album, or for those geek among us to a sword or your faithful steed, here we give you a chance!

Not for any of these things exactly. We’re not so irresponsible that you’ll baptize a poor kid with the alias of your favorite Lord of the Rings character, but we are irresponsible enough for you to vote for the next names of our LTS Release (Long Term Support).

And yes, enough to be a list of Star Trek ships our repertoire of possible names from which you will have to choose and vote.

So let’s go! which one do you stick with?

*Don’t be afraid. The voting system is much more reliable than that of Eurovision. #ChanelNº1

Vote now!

The all-seeing eye can’t wear a patch

The all-seeing eye can’t wear a patch

The expert technologists around you, that digital magazine, your mother and your horoscope have already warned you more than once: 

IT monitoring is a prerequisite for your company’s health!

Visibility. Not a blind spot in your monitoring

But, of course, as much as you strive to be inclusive when it comes to keeping a close eye on the parts that make up your network, some systems end up escaping your attention.

The so-called blind spots

But instead of accepting this as an inevitable heavy cross (which, in addition, entails a great cost for your business), consider getting down to work and:

At the very least, avoid what you don’t see from damaging your IT infrastructure and the business processes that depend on it.

Remove the patch! Trace and perfect high visibility

Of course, you might be wondering:

What should a monitoring strategy include?

It is a very frequent question, which requires some zeal and work.

The determination of your monitoring strategy, in favor of greater IT visibility, must begin with creating an outline or index with the relevant information of the systems from all your platforms.

This will make it easier for the individual aspects of each system to be delivered and broken down. You will have before you the parts that interest you, the most appropriate ones, for a deeper evaluation level.

Take this outline, collaborate with the cool IT team of your organization, now actually help to define and implement monitoring with full visibility of all your IT assets.

You can take it as a high school group project!

These renewed aspects to be monitored will include:

  • Observation of specialized hardware devices.
  • The cloud-based networks you are using.
  • Traffic paths across all systems, including hybrid cloud configurations.
  • That long et cetera that remains to be defined.

And yet, there will still be that possibility that some systems will remain hidden. 

It will then be necessary to resort to the use of more comprehensive monitoring tools to help their discovery.

Is perfect monitoring possible?

I’m afraid perfect monitoring coverage is just an illusion.

Even if you have all the award-winning or top-notch monitoring tools at your disposal, it will never be enough to guarantee a coverage of perfect monitoring.

We tell you from experience:

Many monitoring tools create the false illusion of seeing absolutely everything within your infrastructure. 

It is so that you have a certain sense of security.

Sometimes it is noticeable when some data packets, which contain sensitive information, disappear from view for a while, appearing, as if by magic, within another system from your network.

Here’s solid proof of a blind spot in your monitoring.

And this test only sheds light on the current capacity of monitoring tools.

So it may sound tempting to get hold of all the monitoring tools on the market so you don’t miss anything, but, come on, this will only lead to a system hypertrophy that will provide you with a false sense of security.

Now what? Is there a technological miracle that escapes us? A definitive monitoring tool that works over good and evil and provides true security and visibility at the height of Sauron’s own igneous eye?

Go further: Machine learning

Clarity is the essence of a successful IT department

That’s right, security protocols and configurations must be very clear, such as for example, the knowledge of which servers host each application.

It is also more than advisable to find out the status of all the organization’s assets.

Clarity is the root with which to reach, by pulling, the hows and whys of the system’s blind spots.

To achieve this clarity/enlightening you must, of course, have the right tools. Tools with which to perform advanced analysis, with which to cross the different levels and layers of your network.

Your monitoring tool should, at the most fundamental level, bring together the complex layers of monitoring data from the multiple platforms you monitor, as well as employ intuitive levels of machine learning to help uncover hidden computing assets.

If you use monitoring tools based on machine learning you reduce the time you spend on executing the root cause analyses, while obtaining a full picture of the IT assets.

Machine learning will also help you eliminate monitoring silos, which, as many of you know, tend to become an burdensome manual task that takes too much time from our precious IT administrators.

Pure and high visibility on a single screen

I’ve scared you very much. But actually, identifying the isolated pieces of technology in your stack and centralizing them for effective monitoring and management is an achievable goal.

Monitoring configurations in a single screen give you an advantage.

Mainly thanks to their capacity to represent data from multiple infrastructure sources and to display them in a single view.

These configurations provide a unique vision of the internal operation of a network and help to identify the misled IT assets that must return to the fold.

With this type of solution, you obtain peace of mind and the capacity to operate effectively in the most complex and accelerated IT environments, while you automate the most concise tasks, for true full monitoring.

Conclusions

Obtaining full visibility of your environment by means of monitoring seems like an impossible task, buuut things can be different!

If you try it at least, you will see in a moment how you obtain higher security levels and higher response capacity in the face of incidents.

But you know, before running the 100 meters you have to learn to walk.

And to end the visibility gap you must do some soul-searching of your systems, identify each point to be monitored, and release the silos, so that comprehensive management and monitoring of your systems is possible.

From here, where else, we advise that if you are truly looking for a solution to get rid of blind spots from your monitoring, take a look at what Pandora FMS can offer you!

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Nuestro Trial

What is WMIC and why will it be discontinued?

What is WMIC and why will it be discontinued?

As we already explained on one occasion in this blog, Windows Management Instrumentation, WMI, is a technology owned by the company Microsoft®.

But there’s even more!

Things have changed and we are going to tell you all about it!

Do you already know what WMI is and why it will be discontinued?

WMIC was the WMI command-line utility, which provided an interface for the  Distributed Component Object Model (DCOM) Remote Protocol.

This protocol, in turn, allows remote procedure calls (RPC) with a set of extensions overlaid on Microsoft Remote Procedure Call Extensions.

DCOM is used for communication between software components such as Pandora FMS and networked devices.

The benefits of monitoring are unavoidable and this type of technology (communication and connection protocols) are used to work, prevent problems and progress.

However, it all depends on the use it is given:

In January 2021, the MITRE corporation registered the CVE-2021-26414 vulnerability, which recognizes that there was a possibility to access the privileges of a normal user, a non-MS Windows® system administrator user.

*Common Vulnerabilities and Exposures is a list of registered U.S. government information about known security vulnerabilities, in which each reference has a CVE-ID identification number.

The exploitation of this weakness  is not given by fortuitous conditions.

Never, right at first, an attacker who manages to gain access, stays only as a normal user, no, they usually become system administrators.

Thus, time and commitment are required to study the victim and achieve the task.

The company Microsoft®, concerned about the peace of mind of their customers, decided to publish and distribute the security patch called KB5004442 (February 2022), which increases user authentication.

Therefore, WMIC is not able to connect despite being a product from that same software brand.

However, that’s actually a side effect, not the main reason why the WMIC software was discontinued.

For some time now, Microsoft, progressively, has been updating, deleting and improving each of its components, and has even created new utilities.

This is the case of PowerShell, which will bear the new responsibilities inherited from WMIC from now on.

At Pandora FMS, always respecting our security architecture, we presented PandoraWMIC. Improved software for the new WMI connection requirements, which avoids this type of inconvenience, both in the Open version and in the Enterprise version.

Absolutely no one is safe from security attacks. This is only a small edge from the whole picture.

You may check our official documentation on this topic:

https://pandorafms.com/manual/en/documentation/07_technical_annexes/15_security_architecture

What’s New Pandora FMS 761

What’s New Pandora FMS 761

Let’s check out together the features and improvements related to the new Pandora FMS release: Pandora FMS 761.

What’s new in the latest Pandora FMS release, Pandora FMS 761

NEW FEATURES AND IMPROVEMENTS

New “Custom Render” Report

A new item has been included in Pandora FMS reports, Custom Render. With this report you can manage in a more customized way with SQL queries, module graphs and HTML output customization. It allows users to create fully customized reports visually, including graphs.

 

New TOP-N connections report

A new item has been included in Pandora FMS reports, TOP-N connections. With this report you will have a summary table with the total data from connections and with connections of the interval by port pairs.

New Agent/Module Report 

A new item has been included in Pandora FMS reports, Agents/modules status. With this report you will be able to have in a table the state of agents/modules with the last data and the timestamp of this last-received data.

New Agent/Module status Report

It allows users to show a list of agents/modules along with their state, filtering previously by group. 

New SLA services Report

A new item has been included in Pandora FMS reports, SLA services. With this report you will be able to see the SLA of the services that you wish to configure, combining data from different nodes in a single report.

New alert templates

If you want to use the new group, you have it available in our module library:

New Heatmap view

A new view has been added, that of Heatmap. In this view you can see all Pandora FMS information organized by groups and module or agent groups. It is a view that is permanently refreshed and that allows you to see at a glance all the monitored information.

Resources

Download the release note

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Our Trial

Pandora FMS at the very top of G2

Pandora FMS at the very top of G2

Bring it on Pandora FMS! If we have previously told you about our success at the Open Source Awards 2022 and the Peer Awards 2021, today we are here to tell you that we are at it once again!

We are at the top of G2 of Monitoring Software!

“Why is it easier to get unbiased information about a hotel room than about software?”

In 2012, five entrepreneurs asked themselves this question. The next day, they founded G2.

Una plataforma que en la actualidadA platform that currently has more than 60 million visits per year, and on which users can read and write quality reviews on 100,000 software products and other professional services.

More than 1,500,000 reviews have already been published, which help companies around the world make better decisions about how to reach their full potential.

That is why it is so important and honorable that Pandora FMS has become part of its Top 10 of the best Network Monitoring software.

  1. Ninja One
  2. Atera
  3. Logic Monitor
  4. Auvic
  5. Solar Winds
  6. Domotz
  7. Progress WhatsUp Gold
  8. Pandora FMS

Above many other already recognized companies. Such as Microsoft, Datadog, Zabbix, Nagios, Dynatrace, Catchpoint, Entuity, PRTG, Checkmk, Wireshark, Smokeping, OPManager, Netreo, Munin, Cacti and many more.

A badge that appoints Pandora FMS once again as the total monitoring solution:

  • Cost-effective, scalable and able to cover most infrastructure deployment options.
  • Find and solve problems quickly, whether you come from on-premise, multi cloud or a mix of both of them.
  • In hybrid environments where technologies, management processes and data are intertwined, a flexible tool capable of reaching everywhere and unifying data display is needed to make its management easier.

That’s Pandora FMS

You knew it, and now all G2 users know it too!

How did we get into the Top 10 of the G2 platform?

For now, to be included in the category of Network Monitoring, a product must, among other things:

  • Constantly monitor the performance of an entire computer network.
  • Create a baseline for network performance metrics.
  • Alert administrators if the network crashes, or varies, from the baseline.
  • Suggest solutions to performance issues when they arise.
  • Provide network performance data display.

Then comes the usability score of a product, which is calculated using their own algorithm that takes into account the satisfaction ratings of real users.

This rating is also often used by buyers to quickly compare and identify on the page the top-rated products.

The number of reviews received at G2 is also important, buyers rely more on products with more reviews.

Higher number of reviews = Higher representativeness and accuracy of the customer experience

In turn, G2, apart from rating the products based on the reviews collected in its user community, also does so with the aggregated data from online sources and social networks.

And then, participate in the different categories where you can earn badges like the ones we have won:

  • Best Usability. 
  • Easiest to Use.
  • Easiest Admin.
  • Best Meets Requirements.

And as they say over there:

That would be it!

Today we have reached this milestone, and since 2020 we have been winning these categories, all seasons! Let the Himalaya tremble in fear, we continue climbing to the very top!

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Nuestro Trial

Events in MS Windows and Pandora FMS, does anyone give more?

Events in MS Windows and Pandora FMS, does anyone give more?

If the spreadsheet was the essential application for accounting and massification of personal computers, MS Windows® operating system was the graphical interface that turned work into something more pleasant and paved the way for web browsers for the Internet as we know it today.

Today, in Pandora FMS blog, we discuss:

Windows Event Monitoring and Pandora FMS 

Decades ae gone by but there is always a joke, among us computer scientists, that prevails in time:

“This is the year of Linux on our desktops”.

I actually think that, in the end, it is a statement that comes with a flaw from the very beginning:

The kernel (Linux in this case) has little to do with the graphical interface, the actual thing is that the applications that go along with Linux, such as GNU/Linux, are the combinations that should take their place in hundreds of millions of computers in our homes and jobs.

The MS Windows® operating system (OS), despite losing ground with Android/Linux on our mobile phones, still has it still going on on desktop computers and in the field of video games it keeps its position, faring pretty well.

Many say that desktop personal computers will disappear. I personally think that we will connect the monitor, keyboard and mouse to our cell phones at home and at the office.

But today MS Windows has a stronghold in its market position and for Pandora FMS it has implied a series of very special considerations for its monitoring.

The  overview

Monitoring with Pandora FMS can be done both remotely and locally and the MS Windows® OS is no exception. Remote monitoring can be performed through SNMP and  through WMI.

*If you are new to monitoring, I recommend you to take a few minutes to learn about Pandora FMS Basics.

For local monitoring install a small program, which is called Pandora FMS Software Agent.

Once installed in MS Windows®, the modules to collect the most relevant information (disk usage, RAM consumption, etc.) will already be installed by default.

If what you need to monitor is the basics of MS Windows® the Open version of Pandora FMS is more than enough for the task.

Windows® event monitoring

The amount of applications for MS Windows® is humongous but in a way it is easy to monitor applications and even processes, since we have a special instruction for the Software Agent called module_Proc. 

This instruction is able to tell us, either immediately or every certain period of time whether a program or process is running.

*If you want to find out more about this Pandora FMS feature, visit our video tutorial Monitor processes or applications in Windows.

So far all this is the basics for monitoring MS Windows®.

And in the case of Pandora FMS Enterprise version you can “transfer” normal events to events in Pandora FMS, which can generate alerts and warnings for us to take the necessary actions, or let Pandora FMS restart the software vital to our work or business.

* The latter is known as Watchdog: if an application for any reason stops in MS Windows®, it is re-launched and executed.

Analyzing the causes

Simplifying as much as possible:
So far we can say that we are working on true and false, on ones and zeros.

But often it is called on to us to analyze under what conditions an application collapses or find out why it does not start.

If all that related information had to be seen on your screen you simply would not be able to work with so many interruptions. For that reason there are event registries and working with them implies more specialization on Pandora FMS behalf.

MS Windows® presents an advantage as a privative software for its monitoring and it is that its events and corresponding logs are centralized after a certain routine or standard way.

Monitoring an individual event

Pandora FMS offers the instruction module_logevent that uses Windows® API and offers better performance than data collection by means of WMI.

You will obtain data from the event logs from Windows itself.

Along with additional instructions, it offers the ability to monitor very specific events identified by the fields Log Name, Source, Event ID and Level.

Remember I told you they’re standardized?

Well, in Log name they are well defined by:

  • Application.
  • Security.
  • Installation.
  • System.
  • Forwarded events.

And you must use one of them for the instruction module_source, which is mandatory in the module to be created in Pandora FMS Software Agent.

Up to this point we have only discussed simple modules of Pandora FMS agents but, depending on your needs all the above can also be done as a complement or Pandora FMS plugin.

The difference is to place module_type async_string when it is a data module and module_type log when it is a plugin.

Plugins offer flexibility as they can return multiple data at the same time, unlike Pandora FMS modules that only return a specific, normalized data type in Pandora FMS.

This is important for what we will see below:
The instruction module_regexp which has as a parameter an event log file (.log) on which you will search for keywords with the instruction module_pattern.

This is necessary because there are old applications that keep their own separate event log, although in other regards they do not escape the Windows log. 

*We explained this in detail in our tutorial video « Windows modules logevent and regexp ».

Monitoring an event channel

En MS Windows® algunos log que no están en el registro de eventos del propio Windows, pueden ser recogidos mediante los canales de registros de eventos (Windows Event Log channel  o simplemente log channels) con una instrucción especial lla

In MS Windows®, some logs that are not in Windows event log can be collected using the Windows event log channels with a special instruction called module_logchannel that does not carry any parameters but then uses module_source<channel_name> together with module_eventtype (event type), module_eventcode (event code) and even module_pattern to search by keyword. 

*For more details, our video tutorial «Windows modules: Logchannel |Pandora FMS|» quickly explains this feature.

However, I said that we are looking for or investigating the cause of some problem or inconvenience in an application that runs on MS Windows®, but the examples I have given are specific and go directly to monitor a particular point.

Alright so…

How do we do it if we don’t know exactly what we’re looking for?

Elasticsearch and log mass collection

What I needed to explain is that if you use a plugin to collect logs you must install, together with Pandora FMS, a powerful tool called Elasticsearch.

Which uses a non-relational database capable of storing and classifying all this large amount of information.

*It is well explained, again, in another tutorial video called “ Log Collector in Pandora FMS “)

But don’t think Pandora FMS just delegates the work, no:

From Elasticsearch you may go back to Pandora FMS to generate alerts and reports that you scheme and then create in Pandora FMS to finally understand what the conditions and precise values are when an application fails (or has peak workload values, or is “doing nothing”, etc.).

Conclusions

He resI have summed it up as much as possible and I recommend that you watch the tutorials over and over again until you fully understand and are able to put it into practice installing both Pandora FMS and Elasticsearch. If you have any problems, check the official documentation, which is extensive on the topic “Log monitoring and collection.”

Resources

Pandora FMS plugin library

Pandora FMS official forum

I want to learn more!

Our Trial

Two-factor authentication in Pandora FMS

Two-factor authentication in Pandora FMS

I have been a regular user of Pandora FMS for years and the best I can say about them is that they always have something new to add to my learning. Today, for example, I rediscovered the Two-Factor authentication in Pandora FMS!

*And I did it, in part, through this article already published on their blog

Although I devote myself to programming (and it is what I like to do the most), I am more of a Web 2.0 person than a Web 3.0 person because I consider that the latter has been abused too much. 

In 2.0, communication is bidirectional and at the same level, while in 3.0, when one inquires something they answer:

And who’s asking?”   

Having already taken advantage, of course, of unnoticeably checking our geolocation by means of your IP address.

No contentos con eso, en fin, nos pegan unNot happy with that, anyway, they stick a label on us as if we were digital livestock… 

*And no, I’m not paranoid, several countries globally are amending their national privacy laws! (That’s why I mainly use the DuckDuckGo search engine).

But I wouldn’t ever go back to stay on the Web 1.0; at that time, the 1970s and 1980s (my youth), we were too innocent. 

*For example, for many years the password to launch American mass destruction weapons was simply zero repeated eight times

Obviously we need more robust authentication systems. And one of them came, not from a programmer but from a far-sighted entrepreneur, Kenneth P. Weiss

Their input was essential to the world and to the issue we are discussing here today. 

Since talking about encryption and security gives us enough material to write a whole book, let’s dive into it then!

Get to know the Two-Factor authentication in Pandora FMS

It is important to distinguish what is a Two-Factor authentication and two-step authentication.

Many banks force us to add several security questions that they use after entering our password. They randomly choose one or more of them and we must respond. The point is that they’re always things we know.

A second authentication factor is more about “what you have’‘.

There’s Mr. Weiss’s genius. How to authenticate that “something we have”

Well, to put it simply: by means of public keys and private keys. Just like we have been doing on our computer for years.

However, Two-Factor authentication technology has evolved and now it also includes, quite frequently, biometric identifications. That’s basically, “what you are”.

My mobile phone, for example, includes fingerprint reading. But it would also be worth an infrared-based facial identification to detect by heat the veins and arteries of our face. 

*Not even identical twins in the same egg have equal blood distribution.

More recently, another category has been added: what you do

The way you sing or make a gesture. Even the speed of your typing, pauses included, and much more.

En todos eIn all these cases it is an additional security layer. To be considered as a Two-Factor authentication, at least two of them must be used. 

The acronym MFA is used when three or four of the aforementioned methods are used.

Finally, it is important to point out the case of hardware devices as a second authentication factor: YubiKeyor the trendy Trusted Platform Module version 2.0 (TPM 2.0).

Operating mechanism

Like I said, it’s all about the private and public key pair. 

In short, a private key is generated, which is shared with us users and when the time comes to use it, the date and time are taken and a public key is calculated.

That key is only valid for a period of time, say a minute, and it will be the one we give to identify ourselves.

In the site where we are going to enter, where said private key was generated, the same is done, the public key is calculated also for that period of time and is compared with the one that was delivered to the user at that moment.

Of course, this is much more complex than what I am describing, but as Leonardo da Vinci rightly said: Simplicity is the ultimate sophistication.

Pandora FMS and Google Authenticator

At Pandora FMS, Google Authenticator has been chosen, which is not surprising, because this company Alphabet Inc. has been in our lives for more than twenty years already and has become “the elephant in the room”.

Of course, there are also many others like LastPass Authenticator or Microsoft Authenticator.

segundo factor de autenticación

The official Pandora FMS documentation explains very well how to configure the second authentication factor, however, I have something to add.

segundo factor

Two-Factor authentication is not a strong password backup itself. We must use strong passwords so that we have a time period of at least one month (and we should change them monthly).

*If there is a leak of the hash of our password, as it is robust, the thieves will take more than a month to decipher it and before that happens we will have already changed it ourselves.

• Both authenticators I tried can work offline without any problem because they depend on the time and date as I explained.

*However, if any unlikely problem occurs with the time and date on our mobile, Google Authenticator has the option to synchronize online without affecting the time and date of the device at all.

But not everything was going to be good news: I also print backup codes that I store in a safe place for gmail emails.

*To download Google Authenticator, they will ask to implement the second authentication factor for mail.

Once you wish to log in to a new device, you may use the “Try other methods” option and enter one of the 8-digit backup codes. Remember to cross this code out of the list because they can only be used once.

• From your user profile in Pandora FMS, right next to the button to deactivate the second authentication factor, there is the “Show information” button, which will allow you to show the private code again to add it to an additional backup device.

*Let’s say that the battery of your main mobile has been completely discharged: you save time to enter Pandora FMS with the backup device.

autenticacion

•  Time is precisely one of the most frequent complaints in the use of the second authentication factor, since it takes longer to enter.

*But, calm down, I’ll say goodbye with the comforting fact you expected:

80% of attempts to force our accounts can be avoided with the use of a second authentication factor!

Resources

Pandora FMS plugin library

 Pandora FMS official forum

I want to learn more!

Our Trial

Active Directory, what you need to know

Active Directory, what you need to know

The history of this blog explaining what is what in the world of technology is long, we admit. Maybe one day we’ll release a compilation episode, sort of a cabaret musical thing, with all the info and even some special guests, why not! Meanwhile we also tell you what Active Directory is.

Do you already know what Active Directory is? We’ll tell you!

Both the LAN networks in general and Active Directory particularly, in a world as interconnected as this, are essential.

Private corporations, public institutions, private users like you… We all want to connect our computers and get the best Internet access we possibly can. And for this there is nothing like Active Directory. We ourselves use it!   

Active Directory (AD or Active Directory) is a very useful tool (by Microsoft) that gives us directory services on a LAN.

Among its many virtues, we find that it provides us with a service, located on one or more servers, with the possibility of creating objects such as users, computers or groups to manage credentials.

A su vez nos ayuda a administrar las políticas de toda la red In turn, it helps us manage the policies of the entire network on which the server is located.

(User access management, customized mailboxes…)

Active Directory is a tool designed and redesigned by Microsoft for the working environment. That is, it works better in the professional field with great computer experts and ample technological resources.

(To manage multiple equipment, updates, installations of new and complex programs, centralized files, remote work …)

However, how does it work?

Ya We already know what it is, but how does Active Directory work?

The first we need to know are the network protocols that Active Directory uses:

  • LDAP. 
  • DHCP. 
  • KERBEROS. 
  • DNS. 

The second? Well, roughly, we will have before us some kind of database. A database where the information of the authentication credentials of the users of a network will be stored, in real time!

That way you will have all the teams joined together under a central element.

If you enter the Active Directory server, you’ll find a user made up by the common fields (Name, Surname, Email…).

This user corresponds to a specific group, which has certain advantages.

When users try to login, they will find a lock screen, and that will be the time to enter their credentials. On the other hand, the client will request the credentials from the Active Directory server, where they have been entered by the user, to be verified. That’s when the user will be able to log in normally and will have access to the files and resources that are allowed.

Hay al menos una cosa buena de todo esto, y esa es que si el There is at least one good thing about all of this, and that is that if the computer where you are working breaks down, because of the classic overturned coffee or the confusing lightning that comes through the window and attacks your PC, with Active Directory, all you would have to do is change to another computer connected to the network. Away, of course, from any window or unstable coffee.

Conclusions

Active Directory is an active directory created by Microsoft as a directory service on a distributed computer network. It uses several protocols.

These include LDAP, DNS, DHCP, and Kerberos.

Es un servicio establecido enIt is a service established on one or more servers, where you may create users, computers or groups, in order to manage logins on computers connected to the network. Also the administration of policies throughout the network.

And that’s it!

Nothing too complex, as you can read!

What is remote network monitoring?

What is remote network monitoring?

Remote network moniRemote network monitoring is a technical specialty that was born almost at the same time as networks themselves. Since then, many strategies have emerged when it comes to monitoring network elements.

In this article we will talk about the current techniques based on SNMP polling and network statistic collection through Netflow, and we will also mention outdated systems such as RMON.

Most techniques are purpose-oriented, so they are especially useful. Some more modern ones use combined techniques to offer greater control and knowledge of the network.

What advantages does each one of them offer?

What is remote network monitoring?

Remote network monitoring consists of detecting and being aware of the status of any device connected to the network.

It can be network-specific hardware (such as a router, server, printer) or a specialized device (such as a probe or IoT element).

Simple, right?

Then let’s talk about the different techniques you have to monitor a network remotely.

Basic network remote monitoring techniques

Often this monitoring takes place through basic techniques.

With basic techniques we mean something as well known as pinging and checking whether the computer responds to the network.

What is pinging? It is a communication mechanism that allows you to find out whether a computer is connected and responds when you “knock” on its door.

To use it you just have to know its IP address.

Other basic techniques include measuring latency times, network lagging, or network packet loss.

Advanced network remote monitoring techniques – Netflow

The most common and already much more network-specific techniques include the use of the SNMP (Simple Network Monitoring Protocol) protocol for obtaining specific information from devices connected to the network: number of connections, incoming traffic through its network interface, firmware version, CPU temperature, etc.

Something that, if we use technical language, is known as SNMP polling.

Other tools use protocols from the Netflow family (JFlow, SFlow, Netflow) to obtain statistical information about network usage.

This statistical information is incredibly useful to be able to analyze the use of the network, detect bottlenecks and, above all, to have a clear vision of what the communication flows between the different elements of a network are.

Advanced network remote monitoring techniques – RMON

There is an almost obsolete protocol called RMON. However, it is worth mentioning, because we can still find it in some installations.

This protocol used a network monitoring technology that listened to the wire to obtain statistical information using a specific SNMP agent. Something like what Netflow does.

Advanced Network Remote Monitoring Techniques – SNMP Traps

On the other hand, most devices still use SNMP TRAPS to report incidents in asynchronous mode.

Although it is a very old method, it is still used today as a monitoring method on almost all network devices.

Not to be mistaken with the SNMP Polling that we discussed at the beginning!

 If you are interested in remote network monitoring, we have something to tell you

Pandora FMS is an Open Source software that has the same features of its paid version. You can monitor whatever you want, for as long as you want, for free!

Sounds good?

Sign up and we’ll tell you how to get Pandora FMS Open version:

Advantages of remote network monitoring

The most important and simple advantage is to find out the status of the network:

  • Whether it is active
  • Whether it is overloaded
  • Which devices have the most traffic
  • What kind of traffic is circulating over the network
  • Bottlenecks
  • Jams

An example of a traffic flow diagram captured with Pandora FMS could be the following:

Remote network monitoring tools

Remote network monitoring tools

Most network management and monitoring tools automatically detect connected systems and draw a network map representing the network.

The most advanced tools allow you to update that map in real time and see even the physical connections between interfaces (known as a link-level topology or Layer 2).

For example, like this automatic network map generated with Pandora FMS:

Remote monitoring in network management

Remote monitoring in network management

Some systems incorporate what is known as IPAM (IP Address Management) and, at the same time, monitor network status, allowing IP addressing to be mapped and controlled so that you know which networks are free and how they are used.

How does a network remote monitoring tool work?

Generally, a tool like this one has a central server that allows you to detect systems and launch network tests (ping, icmp, snmp) to find out the status of each device. 

To know the network in detail through its network flows in real time, you will need to configure the network routers and switches with the Netflow protocol and send that information to a Netflow collector. Although only professional medium/top-range network equipment supports the use of Netflow.

If you use an advanced monitoring tool, it will have its own Netflow collector.

Sometimes it is necessary to monitor devices that are in inaccessible networks, so intermediate polling servers, called proxies or satellites, are used.

These secondary servers perform network scans and monitor the devices nearby, and then send the collected data to a central system.

But what do we do with all these numerical data?

It is essential for the monitoring tool you use to have graphs, reports and visual screens to display those data.

If we dive into top-of-the-range tools, those visual network maps will allow you to manually correct and add the details you need to manage those networks.

What is the best remote network monitoring software?

The professional tools that cover SNMP, Netflow, network maps and IPAM that work best today are:

  • SolarWinds
  • Whatsup Gold
  • Pandora FMS

Although they differ from each other in several respects, you may cover all your monitoring needs with any of them.

Would you like to learn more about remote network monitoring tools? Then this will no doubt interest you!:

Best network monitoring systems

Not all market tools cover these areas.

Some only support basic SNMP, but do not support Netflow. Others do not offer good discovery or map editing capabilities and most of them do not have IPAM features either. 

The basic features a good network monitoring tool should have are:

  • SNMP v1, v2 and v3 capabilities
  • Be able to use proxy servers
  • SNMP Trap Collection
  • Device Discovery
  • Map drawing

 And Pandora covers them all!

Even in its Open version.

We’ll tell you more:

You want to know whether a dangerous stranger has your passwords?

You want to know whether a dangerous stranger has your passwords?

We already live in a post-apocalyptic future that has nothing to envy to great franchises like Mad Max or Blade Runner.

Proof of this are pollution, pandemics and the fact that your most intimate secrets can be violated because your most impenetrable slogans are in a database of leaked passwords.

Do you feel that pinch? It’s fear and cruel reality knocking at your door at the same time.

But, well, let’s stand by. Just as Mel Gibson or Harrison Ford would do in their sci-fi plots. Let a hard guy grimace get drawn on your face, adjust your pistol grip and put on comfortable shoes. Help us and help yourself answer this question:

Are you in a database of leaked passwords?

You already know that periodically, the security of large companies that store hundreds of data, including your passwords, is violated with total impunity.

We have repeated it countless times: No one is free from evil because, friends, evil never rests. And on top of that, there are no superheroes for these things.

That is why we will try to guide you to check, in a simple way, whether you and your passwords are in a database of leaked passwords.

That way you will find out whether you are safe or you already have to start thinking about coming up with new and original passwords.

*Remember

No matter how far-fetched and armored it may seem, from time to time you will have to check if it has been leaked. We do not want anyone with bad intentions to use them and take advantage of some of the services you have hired or, directly, steal your information. 

To guide you in this search what we will do is start by checking your emails. We will check whether they are included in some of these databases of leaked passwords. That way we will not only reveal if these have been filtered, but also the rest of the accounts in which you repeat the same username and password over and over again.

Is all this necessary?

Between you and me, it’s easier to memorize a password than to try it with hundreds. That’s why you repeat the same one since your teenage days! Damn it… maybe even since you met messenger and Terra chat. 

But this is a very dangerous thing! If someone has already obtained your old hotmail email and the password you used in it, and that you may continue to use, what they will do is, apart from appropriating your email, is to use that information to enter other platforms or services where you continue to use the same username and password as in that hotmail. 

Once you know whether any of the credentials that you usually repeat have been leaked, you will have in your hand the option to change them both on the site that has been violated and in the rest of the places where you use them. 

How do we do it?

To find out whether the passwords of any of the websites in which you have registered have been violated and filtered, you just have to go to:

haveibeenpwned.com

A portal that is responsible for collecting information from password databases filtered throughout the Internet.

*The page is quite intuitive. It works as a search engine. As the main Google page. So calm down.

Let’s go with a small list of steps to follow:

  1. Enter haveibeenpwned.com.
  2. Go to the main text box. In there type the email account you want to verify. You will be immediately shown the accounts or platforms, linked to it, that have been breached.
  3. If after typing your email and pressing enter, the screen turns green, you are in luck, your email has not been involved in any massive leak.
  4. However, if the screen turns to a maroon shade… Shit! The password linked to that email has been leaked! What’s more, the very attentive page will tell you where. Below you will see a list of websites where you used to enter with that email and where the passwords have been stolen.
  5. Go change passwords! Both from your email and from all the pages that appeared to you. Well, and the rest where you may be using the same username and password that you used with the compromised accounts.

Conclusions

We know it’s a hassle to change passwords every once in a while, but so is it to have your account stolen and impersonate you by putting a horrible profile picture. This among many other unmentionable bad deeds that can be done. Now that you can check whether you’re in one of those leaked password databases, we leave it to you.

Do you know these IP Scanners?

Do you know these IP Scanners?

Close your eyes. Imagine that, instead of being a good person reading this article at home, you are a newbie network administrator who must manage the IP addresses of thousands of devices networked on the extensive networks of a large company. 

At first you use your spreadsheet…, but it’s not enough! 

The tension increases and the temptation to jump out the window of the office may be too much sometimes, but thanks to the Blessed Sacrament, this text comes to mind (and to Google) where Pandora FMS blog tells you about…

Best IP Scanners, IP Scanner Tools

Listen to us, as so many times you did before. The IP Scanner or IP scanner tools are the way to save you an unattainable job on the fast track. 
So let yourself be carried away by the scroll of your trusted mouse, read carefully and select the option that best suits you.

Advanced IP Scanner

At the controls of this ipscan we find Famatech, a world leader in software development for remote control and network management. 

In case you have any doubts, this company has already been endorsed by millions of IT professionals around the world.

Almost all of us use Famatech’s award-winning software products.

In the distant 2002, they launched Advanced IP Scanner (which continues to be developed and improved every day) and this tool proves to be of the most integral and effective to manage LAN networks and carry out all kinds of network tasks. 

One of the unquestionable strongpoints of Advanced IP Scanner is that Famatech takes user recommendations on the improvement of the product seriously and gets down to work quickly.

In addition, Advanced IP Scanner integrates with Radmin, another one of the most popular Famatech products to create remote technical support.

This technological Megazord expands the capacities of the IP Scanner and can simplify your work as system administrator.
IBM, Sony, Nokia, HP, Siemens and Samsung, have already joined in, surely you can’t be left behind!

Free IP Scanner

Perhaps the fastest in the wild-west scanning IP ranges, in addition to ports geared primarily for administrators and users who want to monitor their networks.

Free IP Scanner has the unique ability to scan a hundred computers per second, and it does so with ease due to its recursive process technology that greatly increases scanning speed.

It even gives you the possibility to find out the busy IP addresses within the same network and shows you the NetBIOS data of each machine. 

These data, from the name to the group, including the MAC address, can be exported to a plain text file.

With Free IP Scanner you may also define scanning by IP address range, simultaneous maximum processes or ports.

All of this for free.  

IP Range Scanner

Lansweeper offers us this tool for free. How much we like free stuff, huh? 

If Stone City had an ad that read “Free stones”, we would be able to take a car full of stones home. 

We’d do something with them!  

IP Range Scanner is able to scan your network and provide all that information you are looking forward to knowing about devices connected to your network.

You may also schedule a network scan and run it when prompted.

#IPRangeScannerYourNewButler

OpUtils

Some consider “OpUtils” to be a supervillain’s name. However, nothing further from the truth. 

It’s a super software for IP address management and switching port that rescues IT administrators from trees and helps them manage switches and IP address space with ease. 
In its belt we find more than 30 network tools, which help us perform network monitoring tasks. Including:

  • The super intrusion detector of fraudulent devices.
  • The bandwidth usage supercontroller.
  • Supervisor of the availability of critical devices.
  • The Cisco Configuration File Backup Superrunner.

Network Scanner

Network Scanner, almost the panacea

The IP Scanner they use to scan both large corporate networks with thousands of devices and small businesses with a few computers.

The number of computers and subnets is unlimited.

And it can scan a list of IP addresses, computers, and IP address ranges and show you all the resources shared.

Including: 

  • System shared resources. 
  • NetBIOS Hidden (Samba) 
  • FTP and web resources.

Ideal for auditing network computers or using it to search for available network resources.

Both network administrators and regular users can use Network Scanner.
And Network Scanner will not only find network computers and shares, it will also check their access rights so that the user can build them as a network drive or open them in their browser.

Conclusions

Here are just a few examples of the top of the best IP Scanners on the market. We know you’ll have a hard time deciding. 

It’s like when they put a tray of assorted sushi in front of you. 

There’s no way to decree which one’s best while you’re still salivating. 

Anyway, let’s name a couple more options for you to burst into uncertainty. We’re that good!

  • IP Address Manager
  • PRTG Network Monitor
  • Angry IP Scanner
  • IP Scanner by Spiceworks
  • NMAP
What is a network monitoring system?

What is a network monitoring system?

Network monitoring is a set of automatic processes that help to detect the status of each element of your network infrastructure.

We are talking about routers, switches, access points, specific servers, intermediate network elements, and other related systems or applications (such as web servers, web applications, or database servers).In other words, network monitoring can be understood as taking a look at all the connected elements that are relevant to you or your organization.

What is a network monitoring system?

A network monitoring system is that set of software tools that allows you to program those automatic polls.

That way you may constantly monitor your network infrastructure, doing systematic tests so that, if they find a problem, they notify you.

These systems makes monitoring the network easy, as they also allow you to see all the information in dashboards, generate reports on demand, see alerts and, of course, see graphs with the monitoring data relevant to you.

How does network monitoring work?

Network monitoring can be as simple as seeing devices respond to a simple command like ping. So you will see whether they are connected, switched on and “alive”.

If you do that every five minutes, you’ll be actively monitoring those machines.

We don’t care if they’re servers or routers. We’ll know that, at least, they’re there and they’re responding. When one stops responding, you’ll know something happened to it.

It can also be as basic as periodically interrogating a router for the number of bytes it has transferred, both up and down.

With that you may create network traffic graphs.

We could even add more data to it, like the number of lost packets, latency times…

These data can be combined in graphs that visually compare some values with others and even set thresholds that warn you whether a data exceeds a certain value, for example, if packet loss exceeds 10%.

If you apply that same philosophy to monitoring other data, such as the temperature in a power supply, the process will be the same: obtain the data every X time, draw it on a graph and set thresholds to generate alerts.

This is network monitoring and, as it is evident, it can be easily extended to server, application or database monitoring.

Usually network monitoring is done using remote methods, so that from one place, you may scan the network and get information from your devices.

What is a network monitoring protocol?

In order to perform these network surveys, you need what are known as network monitoring protocols. They define how communication inside a network (in order to monitor systems and devices) can be done.

There are several different monitoring protocols that allow these types of surveys to be carried out.

1. SNMP Protocol

The best known monitoring protocol is SNMP (Simple Network Management Protocol) which allows you to probe a computer and ask for different values. For example, the number of bytes you have transmitted or the temperature of your power supply.

These values are identified by a numeric code, called an OID.

For example, the OID for obtaining the temperature of a power supply on a CISCO computer is as follows: 1.3.6.1.4.1.9.9.13.1.3.1.3

2. ICMP Protocol

Another basic protocol is the ICMP, which allows to know whether the machine responds (commonly known as “pinging” or ping test).

This protocol can also be used to calculate latency times (find out how long it takes for a packet to arrive from one machine to another).

Certain network applications, such as IMAP, DNS or SMTP have their specific ports and finding out whether a service is working properly is directly related to protocol design, so more complex testing is needed.

Generally any service that is offered over the network exposes a TCP port, so monitoring that those ports are active and responsive can already be basic monitoring.

Network Monitor Basics

We could say that, in addition to the aforementioned pings, there are three methods for monitoring a network.

1. Bandwidth Monitoring

Network bandwidth is the amount of information that circulates through a network link at any given time.

This information is usually measured in bits per second and allows you to know how overloaded or underutilized your networks are.

In order to measure it, there are several tools that analyze the network bandwidth, the communication protocols used, and so on.

2. TRAP Monitoring

TRAPS are urgent notices that circulate through the network, thanks to a protocol that allows it and an emitter/collector that generates and/or collects them.

Virtually all network devices allow these urgent warnings to be sent to a trap collector.Be careful! The SNMP survey should not be mistaken with the SNMP traps.

The first is a server that asks the device regularly, using SNMP, and in the second case, it is the device that occasionally, when something happens, sends a trap to the server. Both devices can be seen as network monitors, as they perform monitoring tasks using network monitoring protocols.

3. Syslog monitoring

Another method used is log or report collection (usually via syslog).

For this, as with the traps, you must set in motion a syslog collection server that will collect logs from all the devices that you configured for this purpose.

What are the benefits of a network monitoring system?

Knowing the status of all equipment at a glance allows you to know if there are any problems and anticipate as much as possible their impact.

If something goes wrong, you’d better be the one to warn your clients or bosses, not the other way around.

If something goes wrong, in addition to knowing what went wrong, you will be able to answer questions such as:

  • Since when does it fail?
  • What other things are failing?
  • What was the normal performance?

What network monitoring tools are there?

From Pandora FMS we have done an analysis of the best network monitoring tools there are. We have compared them and here are our conclusions:

Best network monitoring tools

Prometheus monitoring: a new open source generation

Prometheus monitoring: a new open source generation

Prometheus seeks to be a new generation within open source monitoring tools. A different approach with no legacies from the past.

For years, many monitoring tools have been linked to Nagios for its architecture and philosophy or just for being a total fork (CheckMk, Centreon, OpsView, Icinga, Naemon, Shinken, Vigilo NMS, NetXMS, OP5 and others).

Prometheus software however, is true to the “Open” spirit: if you want to use it, you will have to put together several different parts.Somehow, like Nagios, we can say that it is a kind of monitoring Ikea: you will be able to do many things with it, but you will need to put the pieces together yourself and devote lots of time to it.

Prometheus monitoring architecture

Prometheus, written in the go programming language, has an architecture based on the integration of third-party free technologies:

Prometheus kubernetes monitoring

Unlike other well-known systems, which also have many plugins and parts to present maps, Prometheus needs third parties to, for example, display data (Grafana) or execute notifications (Pagerduty).

All those high-level elements can be replaced by other pieces, but Prometheus is part of an ecosystem, not a single tool. That’s why it has exporters and key pieces that in the background are other Opensource projects:

  • HAProxy
  • StatsD
  • Graphite
  • Grafana
  • Pagerduty
  • OpsGenie
  • and we could go on and on.

Would you like to monitor your systems for free with one of the best monitoring software out there?

Pandora FMS, in its Open Source version, is free forever and for whatever number of devices you want.

Let us tell you all about it here:

Prometheus and data series

If you’re familiar with RRD, you guessed it right!

Prometheus is conceived as a framework for collecting data of undefined structure (key value), rather than as a monitoring tool. This allows you to define a syntax for your evaluation and thus store it only in case of a change event. 

Prometheus does not store data in an SQL database.

Like Graphite, which does something similar, like other systems from another generation that store numerical series in RRD files, Prometheus stores each data series in a special file. 

If you are looking for a Time series database information gathering tool, you should take a look at OpenTSBD, InfluxDB or Graphite.

What to use Prometheus for

Or rather, what to NOT use Prometheus for.

They themselves say it on their website: if you are going to use this tool to collect logs, DO NOT DO it, they propose ELK instead.

If you want to use Prometheus to monitor applications, servers or remote computers using SNMP, you may do so and generate beautiful graphics with Grafana, but before that… 

Prometheus settings

All the configuration of the Prometheus software is done in YAML text files, with a rather complex syntax. In addition, each employed exporter has its own independent configuration file.

In the event of a configuration change, you will need to restart the service to make sure it takes the changes.

Reports in Prometheus

By default, Prometheus monitoring has no report type.

You will have to program them yourself using their API to retrieve data.

Of course, there are some independent projects to achieve this.

Dashboards and visual displays

To have a dashboard in Prometheus, you’ll need to integrate it with Grafana.

There is documentation on how to do this, as Grafana and Prometheus coexist amicably.

Scalability in Prometheus

If you need to process more data sources in Prometheus, you may always add more servers.

Each server processes its own workload, because each Prometheus server is independent and can work even if its peers fail. 

Of course, you will have to “divide” the servers by functional areas to be able to differentiate them, e.g.: “service A, service B”. So that each server is independent. 

It does not seem like a way to “scale” as we understand it, since there is no way to synchronize, recover data and it does not have high availability or a common access framework to information on different independent servers.

But as we warned at the beginning, this is not a “closed” solution but a framework for designing your own final solution.

Of course, there is no doubt that Prometheus is able to absorb a lot of information, following another order of magnitude than other better known tools.

Monitoring systems with Prometheus: exporters and collectors

Somehow, each different “way” of obtaining information with this tool, needs a piece of software that they call “exporter”.

It is still a binary with its own YAML configuration file that must be managed independently (with its own daemon, configuration file, etc.).

It would be the equivalent of a “plugin” in Nagios.

So, for example, Prometheus has exporters for SNMP (snmp_exporter), log monitoring (grok_exporter), and so on.

Example of configuring a snmp exporter as a service:

Prometheus monitoring exporter SNMP
Prometheus monitoring exporter SNMP

To get information from a host, you may install a “node_exporter” that works as a conventional agent, similar to those of Nagios.

These “node_exporters” collect metrics of different types, in what they call “collectors”.

By default, Prometheus has activated dozens of these collectors. You can check them all by going to Annex 1: active collectors.

And, in addition, there are multiple “exporters” or plugins, to obtain information from different hardware and software systems.

Although the number of exporters is relevant (about 200), it does not reach the level of plugins available for Nagios (more than 2000).

Here is an example of an Oracle exporter.

Conclusion

Prometheus’ approach for modern monitoring is much more flexible than that of older tools. Thanks to its philosophy, you may integrate it into hybrid environments more easily.

However, you will miss reports, dashboards and a centralized configuration management system.

That is, an interface that allows seeing and monitoring grouped information in services / hosts.

Because Prometheus is a data processing ecosystem, not a common IT monitoring system.

Its power in data processing is far superior, but the use of that data for day-to-day use makes it extremely complex to manage, as it requires many configuration files, many external commands distributed and everything must be maintained manually.

Annex 1: Active collectors in Prometheus

Here are the collectors that Prometheus has active by default:

These “node_exporter” collect metrics of different types, in what they call “collectors”, these are the serial collectors that are activated:

arpExposes ARP statistics from /proc/net/arp.
bcacheExposes bcache statistics from /sys/fs/bcache/.
bondingExposes the number of configured and active slaves of Linux bonding interfaces.
btrfsExposes btrfs statistics
boottimeExposes system boot time derived from the kern.boottime sysctl.
conntrackShows conntrack statistics (does nothing if no /proc/sys/net/netfilter/ present).
cpuExposes CPU statistics
cpufreqExposes CPU frequency statistics
diskstatsExposes disk I/O statistics.
dmiExpose Desktop Management Interface (DMI) info from /sys/class/dmi/id/
edacExposes error detection and correction statistics.
entropyExposes available entropy.
execExposes execution statistics.
fibrechannelExposes fibre channel information and statistics from /sys/class/fc_host/.
filefdExposes file descriptor statistics from /proc/sys/fs/file-nr.
filesystemExposes filesystem statistics, such as disk space used.
hwmonExpose hardware monitoring and sensor data from /sys/class/hwmon/.
infinibandExposes network statistics specific to InfiniBand and Intel OmniPath configurations.
ipvsExposes IPVS status from /proc/net/ip_vs and stats from /proc/net/ip_vs_stats.
loadavgExposes load average.
mdadmExposes statistics about devices in /proc/mdstat (does nothing if no /proc/mdstat present).
meminfoExposes memory statistics.
netclassExposes network interface info from /sys/class/net/
netdevExposes network interface statistics such as bytes transferred.
netstatExposes network statistics from /proc/net/netstat. This is the same information as netstat -s.
nfsExposes NFS client statistics from /proc/net/rpc/nfs. This is the same information as nfsstat -c.
nfsdExposes NFS kernel server statistics from /proc/net/rpc/nfsd. This is the same information as nfsstat -s.
nvmeExposes NVMe info from /sys/class/nvme/
osExpose OS release info from /etc/os-release or /usr/lib/os-release
powersupplyclassExposes Power Supply statistics from /sys/class/power_supply
pressureExposes pressure stall statistics from /proc/pressure/.
raplExposes various statistics from /sys/class/powercap.
schedstatExposes task scheduler statistics from /proc/schedstat.
sockstatExposes various statistics from /proc/net/sockstat.
softnetExposes statistics from /proc/net/softnet_stat.
statExposes various statistics from /proc/stat. This includes boot time, forks and interrupts.
tapestatsExposes statistics from /sys/class/scsi_tape.
textfileExposes statistics read from local disk. The –collector.textfile.directory flag must be set.
thermalExposes thermal statistics like pmset -g therm.
thermal_zoneExposes thermal zone & cooling device statistics from /sys/class/thermal.
timeExposes the current system time.
timexExposes selected adjtimex(2) system call stats.
udp_queuesExposes UDP total lengths of the rx_queue and tx_queue from /proc/net/udp and /proc/net/udp6.
unameExposes system information as provided by the uname system call.
vmstatExposes statistics from /proc/vmstat.
xfsExposes XFS runtime statistics.
zfsExposes ZFS performance statistics.
Active collectors by default in Prometheus

Annex 2: Oracle exporter example

This is an example of the type of information that an Oracle exporter returns, which is invoked by configuring a file and a set of environment variables that define credentials and SID:

  • oracledb_exporter_last_scrape_duration_seconds
  • oracledb_exporter_last_scrape_error
  • oracledb_exporter_scrapes_total
  • oracledb_up
  • oracledb_activity_execute_count
  • oracledb_activity_parse_count_total
  • oracledb_activity_user_commits
  • oracledb_activity_user_rollbacks
  • oracledb_sessions_activity
  • oracledb_wait_time_application
  • oracledb_wait_time_commit
  • oracledb_wait_time_concurrency
  • oracledb_wait_time_configuration
  • oracledb_wait_time_network
  • oracledb_wait_time_other
  • oracledb_wait_time_scheduler
  • oracledb_wait_time_system_io
  • oracledb_wait_time_user_io
  • oracledb_tablespace_bytes
  • oracledb_tablespace_max_bytes
  • oracledb_tablespace_free
  • oracledb_tablespace_used_percent
  • oracledb_process_count
  • oracledb_resource_current_utilization
  • oracledb_resource_limit_value

To get an idea of how an exporter is configured, let’s look at an example, with an JMX exporter configuration file:

startDelaySeconds: 0
hostPort: 127.0.0.1:1234
username: 
password: 
jmxUrl: service:jmx:rmi:///jndi/rmi://127.0.0.1:1234/jmxrmi
ssl: false
lowercaseOutputName: false
lowercaseOutputLabelNames: false
whitelistObjectNames: ["org.apache.cassandra.metrics:*"]
blacklistObjectNames: ["org.apache.cassandra.metrics:type=ColumnFamily,*"]
rules:
  - pattern: 'org.apache.cassandra.metrics<type=(\w+), name=(\w+)><>Value: (\d+)'
    name: cassandra_$1_$2
    value: $3
    valueFactor: 0.001
    labels: {}
    help: "Cassandra metric $1 $2"
    cache: false
    type: GAUGE
    attrNameSnakeCase: false

Find that IT job you were aiming for

Find that IT job you were aiming for

When you leave the faculty with a smile on your face and after the undertow of the graduation celebration, you hope that the great multinationals approach you with hundreds and varied jobs. “Take this huge sum of money and work on what you always dreamed of”…

But nothing could be further from the truth.

For that reason, today in Pandora FMS blog, we give you our sincere condolences for facing that load of hunting for a job related to “your stuff” and a couple of pages totally necessary to find an IT job.

*We know that there are millions of specialized people that look for an article like this, from water stocker in IT to those who prepare a megalomaniac IA in their garage, but this time we have wanted to focus on looking for an IT job

** Even so, these pages are very versatile and are helpful for many more specialties. Look among them for a job that suits your specialties.

Do you know where you have to look for an IT job?

Ticjob

Good stuff: Ticjob. We dive right into it with one of the most valued portals of IT jobs in Spain

Go in, thread between the offers with enough precision, since you can choose among role categories, development, system, business… Choose and forget about it. Soon you will find something!

If I were you, I would sign up immediately, because you may find companies that usually do not appear in other more well-known platforms. 

TalentHackers

Talent Hackers. We already explained to you why you don’t have to fear the word “hacker”, because it can have positive connotations and, of course, it has them here.

We face here a very singular platform for job hunting

Its aim is to catch talents within the technological scope through one distributed network. That is, by means of searching and picking up professionals through references later repaid. 

What does this mean?
It means that if the candidate which you recommend for a position is the selected one you can take up to 3,000 bucks.

Manfred

Manfred: “We manage talent, not selection processes”. With this quote, the company makes clear that it is not a common portal.

Rather, Manfred claims to be a platform that offers “IT recruitment” and gives the candidate an experience totally different from that we are used to with the rest of this type of services.

Manfred takes less into account the necessities of the companies and worries more about the programmers that look for a job.

  1. You sign up.
  2. You are assigned a person that will be in charge of you, who will inform you about the most interesting opportunities that comply with the profile which you previously detailed.
  3. You are advised with the utmost respect.
  4. You realize everything is for free for IT profiles and they only charge companies that hire them.

TekkieFinder

“We are the ONLY job portal that PAYS you whenever a company contacts you.” This is what TekkieFinder promises. Do you like the idea?

Is very easy: You register, fill in your profile happily, they get you in their database and, here’s the good stuff, when a company is interested in you, it buys your profile from TekkieFinder to be able contact you, and whether you are interested in the offer or not, you get paid!

There is such a shortage of IT professionals that it is changing the way to take control over them. They are like exotic legendary pokemon hidden behind an ancient glitch. What IT professional wouldn’t be thrilled with this platform?

Circular

Looking for something truly individualized and round? Get in Circular

Circular is similar to the previous employment portal mentioned: Manfred. Although it gives you a less personal feeling than Manfred, among the Spanish platforms, it is the best one in this feature.

Circular, like the dating application Tinder, it gathers companies and applicants all together. 

First, you sign up, then a friend of yours/contact within the platform recommends you, since if they do not do it, you will not be able to contact the companies, and that’s it!

GeeksHubs

GeeksHubs is without a doubt one of the best options if you look for an IT job in Spain. 

Systems/DevOps, Back-end, Front-end, Mobile, FullStack,… These are some of the categories that you will be able to find in your sector. In addition to enough information on each vacancy, so that it becomes clear whether it interests you or not. 

And, in addition, they say how much they are willing to pay you, which is the most interesting part and it is what many hide. 

Growara

 Growara gets in your shoes and it never offers to its users a project in which they themselves would not work. In fact, it seems that they only work with companies that are actually worth it.

They never ghost you, since they seem to feed on the feedback that you can offer them.

The best thing? They don’t bother spamming you with thousands of offers that do not have anything to do with your professional development. They look for precise and elegant matches that meet your values and capacities.

Tecnoempleo

Tecnoempleo is that portal specialized in computer science, telecommunications and technology that you’re looking for.

More than half a million candidates and 27 thousand companies guarantee its 20 years of professional expertise in the sector.

Although just for having its own mobile app, and specific sections for working abroad or remotely, or looking for your first job, I would choose it hands down.

Primer Empleo

If you are a newbie this is your site, Primer Empleo.

A job portal founded in 2002 and directed specifically to students and recent graduates without labor experience.

So if you have a junior profile and you want to check it out, go ahead. Even if you have not even finished your grade and you are only looking for an internship, it is quite interesting.

Jooble 

Jooble and Jooble Mexico are websites that take you to many and a wide range of existing job offers in other pages.  Perhaps you lose some time signing up to each one of them, but it may be worth it if you end up getting your way. 

It is worth pointing out that, if you get a job thanks to this article, you should treat us to something, even if it’s just a coffee. Always depending on the job you got and its consequent remuneration, of course!

Conclusions

Looking for a job is a task that is already too ungrateful for you to not accept our help through this article and these links. After all, we have been there and we know how lost and frustrated one can feel.

Good luck and take courage in your job hunting!

DMaaS gives you more!

DMaaS gives you more!

In our blog we have posted a few articles about data centers. We like them. They have grown on us. It is a branch of technology that interests us as much as bitcoin interests brothers-in-law or neighborhood projects interest retirees. For that reason, today, in our blog, we will deal with data management as a service or DMaaS.

Do you already know what DMaaS is and why you need it in your life?

We have talked about it in countless after-dinner conversations with cigars in hand: Data centers are centralized physical facilities used by companies to host their information and applications. Although data centers help us meet the requirements of sending data in real time, there can be problems with outages, and these are an expensive business for companies. On the other hand, the Data center infrastructure management (DCIM) is in charge of monitoring and giving us information about the IT components and facilities of our structure. That includes servers and storage to power distribution units or cooling equipment. The goal of a DCIM initiative is to provide managers with a comprehensive view of data center performance so that power, equipment, and space are used as efficiently as possible. Well, so far we knew everything and we had no rival until the desserts arrived. 

However, one might add (while stirring a cup of tea) that today’s data centers are becoming increasingly complex and sophisticated, and as they evolve, they ask for features in DCIM solutions to increase. For that reason, DCIM has to transcend the well-known Cloud and bring its capabilities. So, in order to improve the way data centers operate, Data Management-as-a-Service or DMaaS emerged.

DMaaS, definition and advantages

DMaaS is a type of cloud service that provides companies with centralized storage for different data sources. It enables the optimization of the IT layer by simplifying, monitoring and servicing the physical data center infrastructure for the company.

*Data of vital importance: DMaaS is not DCIM nor a SaaS version of DCIM.

Thanks to the DMaaS service you may analyze large sets of anonymous customer data and improve with machine learning. In no case, I give you my word, will a company using DCIM receive better information than it can get with a DMaaS approach. Not to mention cost savings, downtime reduction and overall performance improvement.

Easy to use and low cost, DMaaS makes it easy for IT professionals to increasingly monitor their data center infrastructure, receiving information in real time and with the additional ability to prevent possible failures as a seer octopus.

Still, in the midst of so much profit, it is very likely that if you were to do a worldwide survey of professionals and entrepreneurs, you would find that cost savings is the most important chosen feature of DMaaS. And it is that, thanks to DMaaS, companies only have to ask their users to register, while informing providers about the specific needs of the organization and the number of registered users. So the provider indeed provides, and manages the infrastructure based on what you have requested.  

In a somewhat modest third position among the advantages we would find the protection of a company’s data assets and the additional value obtained from them. As an example, for the data center, DMaaS allows you to maximize hardware security through smart alarms and remote troubleshooting.

One of the main differences to highlight with DCIM is that it is limited to a single data center, while DMaas can help analyze a much larger set, thus providing a more complete view. Furthermore, aside from providing us with analytical insights, the service continually learns and improves based on data collected from users. 

Conclusion

Although it is true that we could judge that DMaaS is still in an early stage, work is already being done to solve the main challenges it faces: data encryption, data management functions, data center reduction or performance increase.

Resources

Monitoring as a Service (MaaS)

Distributed Systems and the 21st century

Distributed Systems and the 21st century

At the end of the last century I had the opportunity to help in a very ambitious computer project: the search for radio messages emitted by extraterrestrial civilizations… And what the hell does it have to do with Distributed Systems?

Recently my colleagues wrote an interesting article on distributed network visibility, which I really liked and I came up with the idea of taking it to the next level. If this post tries to offer full knowledge of the different components in operation within our network, Distributed Systems go “further”; they reach where we lack control over the devices that comprise it.

I am going to exemplify both at the social science level, comparing a union versus a confederation (as a central of workers and unioI am going to exemplify both at the social science level, comparing a union versus a confederation (as a central of workers and unions and not from a political point of view).

*Confederacy

According to Merriam-Webster

1. A group of people, countries, organizations, etc. joined together for a common purpose or by a common interest: LEAGUE, ALLIANCE

Distributed computing, distributed systems, are they the same?

Distributed Systems

If you look for the concept of Distributed Systems on Wikipedia (that magical place), you will be redirected to the article called Distributed Computing and, I quote:

“Distributed computing also refers to the use of distributed systems to solve computational problems. In distributed computing, a problem is divided into many tasks, each of which is solved by one or more computers, which communicate with each other via message passing.”

Without going any further: Wikipedia, if we consider ourselves as computers, it is a very high-level Distributed System, since we comply with its intrinsic characteristics… And what are they?

Features of Distributed Systems

A Distributed System (or Distributed Computing) has:

•   Concurrence: Which in the case of computers is a distributed program and in Wikipedia they are people… who use specialized software distributed by web browsers.

•   Asynchronous: Each computer (or Wikipedian) works independently without waiting for a result from the other, when it finishes its batch of work, it delivers it and it is taken in and saved.

•   Resilience: A computer device that breaks down or loses connection, or a person who dies, withdraws or is expelled from Wikipedia, in both environments does not mean stopping the work or global task. There will always be new resources, machines or humans, ready to join the Distributed System.

The aliens

Right, I started this article talking about them. In today’s -unfortunately- destroyed radio telescope in Arecibo, Puerto Rico, astronomers Carl Sagan and Frank Drake sent a message to the Hercules cluster, a group of galaxies 25,000 light years away from our planet.

“Hercules Globular Cluster (https://commons.wikimedia.org/wiki/File:Hercules_Globular_Cluster,_EVscope-20211008.jpg) ”

That means that it will take 50 thousand years to get an answer, if there is life out there, but what if it is us who were already sent messages thousands or millions of years ago?

Well, this was the program Seti@home  about: it collected radio signals and chopped them into two-minute pieces that were sent to each person who wanted to collaborate in the analysis with their own computer. At the end of the calculation according to a special algorithm, the result was sent and a new piece of code was requested. If a computer after a reasonable time did not return an answer, then the same piece was sent to another computer that wanted to collaborate: the “prize” consisted in publicly recognizing the collaborator as a discoverer of life and intelligence outside this world.

I installed the program and put it as a screensaver, so I calculated while I was working on something else or resting.

“Seti@home (imagen de setiathome.berkeley.edu) ”

There you have it! A distributed system for analyzing the radio signals of the universe!

Distributed monitoring

Distributed monitoring depends on the network topology used, and I bring it up as an introduction or approach to monitoring a distributed system. If you are new to Pandora FMS, I recommend you take some time to read this post.

Essentially it is about distributed environments that give service to a company or organization but do not execute a common software and have very different areas or purposes between departments, supported in communication with a distributed network topology accompanied by a well planned security architecture in monitoring.

Pandora FMS offers in this field service monitoring, very well described in the official documentation.

Observability

It would be an attribute of a system, and the topic is worth a full blog post, but, in summary, I expose observability as a global concept that includes more alert monitoring and alert management activities, visualization and trace analysis for distributed systems, and log analysis.

Companies like Twitter have taken observability very seriously and, as you may have guessed, that addictive social network is a distributed system but with a diffuse end product (increase our knowledge and facts about the real world).

Transaction monitoring

How can we monitor a distributed system if it consists of very heterogeneous components and, as we saw, can reach any part of our known universe?

Pandora FMS has Business Transactional Monitoring, a tool that I consider the most appropriate for distributed systems since we can configure transactions, as many as we need, and then use the necessary transactional agents to do so.

It is a difficult topic to take in but our documentation starts with a simple and practical example, with which, as you experiment, you may add “blocks” of more complex transactions until you reach a point where you can have a panorama of the distributed system.

All this is possible with Pandora FMS since it has standard monitoring, remote checks, transaction synthetic monitoring and the Satellite server for distributed environments that can be used with transactional monitoring for distributed systems.

Present and future

The question is no longer whether we need distributed systems. That is a fact. Today people use distributed systems in computing services in the cloud or in data centers and the Internet.

Distributed systems can offer impossible functions in monolithic systems or take advantage of computer processes, such as performing restorations from backups by asking other systems for chunks that are missing or have deteriorated in the local system.

For all these cases, and in any case, the flexibility of Pandora FMS will always be useful and adaptable for current or future challenges.

Observability, monitoring and supervision

Observability, monitoring and supervision

There are different positions on whether observability and monitoring are two sides of the same coin.

We will analyze and explain what the observability of a system is, what it has to do with monitoring and why it is important to understand the differences between the two.

What is observability?

Following the exact definition of the concept of observability, observability is nothing more than the measure that determines how internal states can be inferred through external outputs.

That is, you may guess the status of the system at a given time if you only know the outputs of that system.

But let’s look at it better with an example.

Observability vs monitoring: a practical example

Some say that monitoring provides situational awareness and the capacity for observation (observability) helps determine what is happening and what needs to be done about it.

So what about the root cause analysis that has been provided by monitoring systems for more than a decade?

What about the event correlation that gave us so many headaches?

Both concepts were essentially what observability promises, which is nothing more than adding dimensions to our understanding of the environment. Be able to see (or observe) its complexity as a whole and understand what is happening.

Let’s look at it with an example:

Suppose our business depends on an apple tree. We sell apples, and our tree needs to be healthy.

We can measure the soil pH, humidity, tree temperature and even the existence of bad insects for the plant.

Measuring each of these parameters is monitoring the health of the tree, but individually they are only data, without context, at most with thresholds that delimit what is right or what is wrong.

When we look at that tree, and we also see those metrics on paper, we know that it’s healthy because we have that picture of what a healthy tree is like and we compare it with things that we don’t see.

That is the difference between observing and monitoring.

You may have blood tests, but you will only see a few specific metrics of your blood.

If you have doubts about your health, you will go to a doctor to look at you and help you with the analysis data, do more tests or send you home with a pat on your back.

Monitoring is what nourishes observation.

We’re not talking about a new concept, we’re rediscovering gunpowder.

Although being fair, gunpowder can be a powerful weapon or just used for fireworks.

The path to observability

One of the endemic problems with monitoring is verticality.

Have isolated “silos” of knowledge and technology that barely have contact with each other.

Networks, applications, servers, storage.

Not only do they not have much to do with each other, but sometimes the tools and equipment that handle them are independent. 

Returning to our example, it is as if our apple tree were dying and we asked each expert separately:

  • Our soil expert would tell us it’s okay.
  • Our insect expert would tell us it’s okay.
  • Our expert meteorologist would tell us that everything is fine.

Perhaps the worm eating the tree reflected a strange spike in soil pH and it all happened on a day of subtropical storm.

By themselves the data did not trigger the alarms, or if they did, they corrected themselves, but the ensemble of all the signals should have portended something worse.

The first step to achieving observability is to be able to put together metrics from different domains/environments in one place. So you may analyze them, compare them, mix them and interpret them.

Basically what we’ve been saying at Pandora FMS for almost a decade: a single monitoring tool to see it all.

But it’s only the first step, let’s move on.

Is Doctor House wrong when he says everyone is lying?

Or rather, everyone tells what they think they know.

If you ask a server at network level if it’s okay, it will say yes.

If there is no network connectivity and the application is in perfect condition, and you ask at application level whether it is OK, it will tell you that it is OK.

In both cases, no service is provided.

And we’ll say, but how is it okay? it doesn’t work!

Therein lies the reason that observability and monitoring are not the same.

It is processing all the signals what produces a diagnosis and a diagnosis is something that brings much more value than data.

Is it better to observe or monitor?

Wrong.

If you’re asking yourself that question, we haven’t been able to understand each other.

Is it better to go to the doctor or just have an analysis?

It depends on what you’re risking.

If it is important, you should observe with all available data.

If what you’re worried about is something very specific and you know well what you’re talking about, it might be worthwhile to monitor a group of isolated data.Although, are you sure you can afford only to monitor?

Finding the needle in the haystack

Among so many data, with thousands of metrics, the question is how to get relevant information among so many shrouds. Right?

AIOPS, correlation, Big Data, root cause analysis…

Are we looking at another concocted word to sell us more of the same?

It may, but deep down it is a deeper and more meaningful reflection:

What is the use of so much data (Big Data) if I don’t have the capacity for its analysis to be useful to me for something practical?

What good is technology like AIOPS if we can’t have all the data together from all our systems, together and accessible?

Before developing black magic, the ingredients must first be obtained, if not, everything remains in promises and expensive investments that entail wasting time and the unpleasant feeling of having been deceived.

From monitoring to observability

In order to elevate monitoring to the new observability paradigm, we must gather all possible data for analysis.

But how do we get them?

With a monitoring tool.

Yes, a tool like Pandora FMS that can gather all the information together, in one piece, without different parts that make up a Frankenstein that we do not know either what it costs or how it is assembled.

And we’re not talking about a monitoring IKEA, made up of hundreds of pieces that require time and… a lot of time.

This is not new.

Nor is it new that we need a monitoring tool that can collect data from any domain.

For example, switch data, crossed with SAP concurrent user data.

Latency data with session times of a web transaction. 

Temperature in Kelvin dancing next to euro cents, positive heartbeats looking closely at the number of slots waiting in a message queue.

LThe only thing that matters is business.

Just the final view.

Observe, understand and above all, resolve that everything is okay, and if it is wrong, know exactly who to call.

What is real observability?

We call it service views.

It is not difficult, we provide tools so that you, who know your business, can identify the critical elements and form a service map that gets feedback from the available information, wherever it comes from.

FMS means for us FLEXIBLE Monitoring System, and it was designed to get information from any system, in any situation, however complex it was and store it to be able to do things with it.

Today our best customers are those who have such a large amount of information that other manufacturers do not know what to do with it.

We don’t know what to do with it either, I won’t fool you, but our customers with our simple technology do.

We help them process it and make sense of it. Make it observable

We would like to say that we have a kind of magic that others do not, but the truth is that we have no secret.

We take the information from wherever it comes from, whatever it is, and make it available to design service maps.

Some are semi-automatic, but customers who know what to do with it prefer to define very well how to implement them. I insist, they do it themselves, they don’t even ask us for help.

If you want to observe, you need to monitor everything first. 

And there we can help you.

What’s New Pandora FMS 760

What’s New Pandora FMS 760

Let’s check out together the features and improvements related to the new Pandora FMS release: Pandora FMS 760.

What’s new in the latest Pandora FMS release, Pandora FMS 760

NEW FEATURES AND IMPROVEMENTS

New histogram graph in modules

Added the ability to display a histogram graph for modules. This graph is exclusive for Boolean modules or for modules that have their criticality thresholds defined, it is very useful to see crash periods.

Alert templates with multiple schedules

The possibility of including several schedules for the execution of both module alerts and events is incorporated. With this new feature, different time slots can be generated within the same day or week, where alerts can be generated.

New Zendesk integration plugin

A Zendesk integration plugin has been added to the module library. Thanks to this plugin you may create, update and delete tickets from this system from the terminal or from Pandora FMS.

New inventory plugin for Mac OS X

Just as there were inventory tools for Linux and Windows, you may use this tool to obtain inventory in Mac OS X. You may get information on CPU, Memory, Disks and Software installed on machines of that OS.

New mass deletion section in the Metaconsole

With the latest changes in the process of combination and centralization in the Metaconsole, it was necessary to start including mass operations in it. For now, deleting and editing agents from the Metaconsole have been included.

New internal audit view in the Metaconsole

As part of the continuous improvements to Pandora FMS Metaconsole, the internal audit feature that already existed in the node has been added to supervise the accesses to the Metaconsole, as well as some of the actions carried out from it.

Forcing remote checks on Visual Consoles

In order to carry out a real-time monitoring control in the visual consoles, a button has been generated to be able to force the remote checks that are included in the visual consoles, just as it can be done from the detailed view of a node.

New alert macros

The following alert macros have been added to be able to include more details in the notices:

  • _time_down_seconds_
  • _time_down_human_
  • _warning_threshold_min_
  • _warning_threshold_max_
  • _critical_threshold_min_
  • _critical_threshold_max_

Support for MySQL8 and PHP8

We have included support to be able to use MySQL8 without any type of modification or previous adjustment. We are also preparing the console to work on PHP8 due to the PHP7.4 support time ending on 28th Nov 2022. 

Support for OS RHEL 8.x, RockyLinux 8.x, AlmaLinux 8.x 

Due to recent changes to what was our base system so far (CentOS), we have decided to use RockyLinux 8 and AlmaLinux 8, as well as continue to support RHEL8 as the base OS. We recommend to all our users who have to migrate from other unsupported Linux versions (such as Centos6) to do so to one of these systems. However, we will continue to provide installers in RPM and Tarball format that can be used to run Pandora FMS on such systems.

KNOWN CHANGES AND LIMITATIONS

  • New installations using ISO have been removed. From now on, the default installer will be the online installer, which, by means of a single command, prepares and installs the entire system from a Linux RHEL8, Rocky Linux or Alma Linux OS.
  • Pandora FMS integration with the new plugin library has been improved, in order to use the new plugin library you need to be updated to version 760.

Resources

Download the release note 

Pandora FMS plugin library

Pandora FMS Online Community

I want to learn more!

Our Trial

Pandora FMS wins the Open Source Excellence 2022 award along with four other SourceForge awards

Pandora FMS wins the Open Source Excellence 2022 award along with four other SourceForge awards

We love uploading this kind of post to our blog. Articles in which we boast about our work and where all the effort of our team throughout the year comes to light. Because yes, we are rewarded once more, Pandora FMS is proclaimed winner in several categories in the SourceForge Awards.

  • Award in the Community Leader category
  • Award in the Community Choice category
  • Award in the Open Source Excellence category
  • Award in the category Users Love us
  • SourceForge Favorite

No more and no less than five awards, including the Open Source Excellence 2022 award, possibly one of the most desired and disputed in the industry in this specific sector. 

Pandora FMS wins the Open Source Excellence 2022 award

As a message to the world from this podium, we want to make clear that it is an honor to know that these awards are only given to selected projects that have reached significant milestones in terms of downloads and participation within the SourceForge user community.

A great achievement to keep in mind, since Pandora FMS, one of the most complete monitoring software on the market, has been considered for these awards from more than 500,000 open source projects throughout the whole SourceForge platform. 

“We are very proud of what our team at Pandora FMS is achieving.  An effort of our entire workforce, users and customers that makes Pandora FMS better every day. This award is a recognition of our entire career and shows that Opensource is still alive and that we are one of the leading and pioneering projects in Europe, states with satisfaction, Sancho Lerena, founder and CEO of Pandora FMS.

SourceForge is an open source software community devoted especially to helping open source projects be as successful as possible. Currently the platform has about 502,000 Open Source projects in progress, more than 2.6 million downloads per day and a community of 30 million monthly users, who search and develop open source software, and who, from now on, will be able to find the badges achieved by Pandora FMS within its projects page in SourceForge. 

As many of you already know, Pandora FMS is a very comprehensive monitoring solution: cost-effective, scalable and covering most infrastructure deployment options. Find and solve problems quickly, no matter if you come from on-premise, multi cloud or a mix of both. A flexible solution that can unify data display for full observability of your organization. With more than 500 plugins available you may control and manage any application and technology, such as SAP, Oracle, Lotus, Citrix, Jboss, VMware, AWS, SQL Server, Redhat, Websphere and a long etc. A flexible tool able to reach everywhere and unify data display to make management easier. Ideal for hybrid environments where technologies, management processes and data are intertwined. And now, moreover, backed and rewarded by the wide expert community of SourceForge.

How have we come so far?

Let’s go back a little. Pandora FMS is licensed under GNU GPL 2.0 and the first line of code was written in 2004 by Sancho Lerena, the company’s current CEO. At that time, free software was in full swing and the Free Software Foundation in Spain had an active group of which Sancho was a part.

In those days there was no Github, but there was something that united us all: SourceForge. From the beginning of the current century this platform served to unify and enhance thousands of developers who wanted to share their creations with users around the world. Pandora FMS was there from its inception in 2004, although initially it was not called that, but Pandoramon.” 

*If you are curious about our beginnings, you may read this article about our history.

As of this date, there are several thousand free version users who download Pandora FMS updates through their update system and use it daily. 

Pandora FMS has been uploading every release with its corresponding source file for over 18 years, every day to its Sourceforge project and we are very proud to say that not only do we continue to believe in it, but we have not stopped doing so in almost twenty years of history.

Beyond code, we believe in the power of community, sharing, and growing together. That is why we maintain a very extensive documentation of more than 1000 pages in four languages: Spanish, English, French and Russian. 

Our community website includes a system of forums, an extensive knowledge base with more than 500 articles and a blog with more than 1,900 articles translated into four languages.

Of course, we also offer a wide range of professional services and commercial versions of our software. But, as Stallman himself said:

“Free software” means software that respects users’ freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer.” 

Now yes, after all that has been said, we invite you to check that freedom is much more than a slogan. Thank you again for this award. And don’t take too long, join us!

QA, the acronym that can save your life (or your company)

QA, the acronym that can save your life (or your company)

Do you already know what tasks the QA department performs? Would you like to discover what each QA tester does on a daily basis? You don’t know what the hell we’re talking about but you’re intrigued and can’t stop reading because my prose is enigmatic and addictive? Well, you’ve come to the right place! We’ll tell you how our QA department manages so you can learn what yours does without having to ask. Read on and don’t forget to propose me for the Nobel Prize for literature when the time comes!

Do you already know what tasks the QA department performs?

Starting with the functions of the department, QA is in charge of testing Pandora FMS and making sure that we offer the best possible quality to our clients and the community. It is an extremely complex task because Pandora FMS is very large and it could be said that chaos theory is well applied, since inserting an “&” character in a form field can cause a report that had nothing to do with it to fail. So be careful, any day your building could burn for the wrong character! From Pandora FMS we recommend hiring only professionals

Currently, our QA team is made up of Daniel Ródriguez, Manuel Montes and Diego Muñoz, although from time to time, colleagues from other departments support them to carry out specific tests. They are thick as thieves. They always sit together at company dinners and share a bottle of Beefeater after dinner.

QA Tester Team 

Daniel Rodríguez, “The beast (QA) of Metal”

Works together with the Support and Development Departments. He is devoted to testing new features and finding possible bugs to help improve the product. He loves sci-fi movies and metal:

My duties as department head are mainly to manage and supervise the work of the department, design and improve test plans, carry out manual tests and coordinate communication with the rest of the departments.

Manuel Montes

is from Madrid and began as part of the Development department, although he later joined the QA team. He loves cycling when the weather allows it, watching movies, reading and going for a walk with his family

In addition to manual tests, we carry out automatic tests with technologies such as Selenium Webdriver and Java to interact with the browser, Cucumber with Gherkin language so that the tests to be carried out are somewhat more understandable for less technical colleagues and, in turn, serve as documentation, and Allure to generate reports with the results of said tests.

Diego Muñoz, “The Gamer Alchemist”

is a QA tester, although he also helps the Support team, solving different problems for customers. He is from Huelva and although he has lived there all his life, he has no accent, which he boasts about. His hobbies range from watching movies, to video games, listening to music and watching series:

Every piece of code that is implemented in Pandora FMS goes through my hands or through those of one of my colleagues, who judge if the changes work correctly or have any errors. We also sometimes suggest alternative ways to present features to developers or to solve the bugs that we have been able to find. In addition, in the days prior to the product release, we review the whole console in all its Metaconsole, Node and Open variants, once again making sure that the code introduced in the new version works as well as possible.

The importance of the QA department

From the QA department, an average of 180 tickets are generated per release and, as you know, we present 10 releases a year. This adds up to more than 1,800 tickets annually, how cool is that? Sometimes it is a heinous job, because it involves throwing back the work of a Development colleague, and also difficult because it is impossible to see everything, and when a problem explodes in a client’s environment, it attracts all eyes. Although QA work has little visibility and can be very thankless, it is fundamental to the success of everyone’s work and the final product.

If you want to find out more about our departments out of curiosity or for the simple fact that this way you can find out more about yours, you can request it in the comments box, one of our busy social networks or by post, which is a little bit outdated but should totally come back. Scented letters and vermilion sealing wax. There can’t be anything more romantic!

Move away, Pandora FMS WP is coming!

Move away, Pandora FMS WP is coming!

Three funny facts that you may not have known: 1) Elvis Presley and Johnny Cash were colleagues. 2) Jean-Claude Van Damme was Chuck Norris’s security staff. 3) Pandora FMS has a plugin for WordPress. That’s right! Pandora FMS has a monitoring plugin for WordPress that has been totally renewed and prepared for you! Get to know Pandora FMS WP!

Get to know Pandora FMS WP, our plugin for WordPress

100% free and OpenSource Pandora FMS WP arrives, a monitoring plugin for WordPress. What is it for? Collect basic information from your WordPress and allow Pandora FMS to retrieve it remotely through a REST API.

Some examples of basic information you might collect: new posts, comments from followers, or user logins in the last hour. At the same time, it also monitors whether new plugins or themes have been installed, if a new user has been created or if a login attempt has been made by brute force. 

Also, if desired, it can be easily extended by defining custom SQL queries to monitor other plugins or create your own SQL to collect information and send it to Pandora FMS.

This plugin has been developed by the laborious and specialized hands of Pandora FMS team and the source code is available at https://github.com/articaST/pandorafms-wp/

Pandora FMS WP sections

Dashboard

This is where you may see a detailed summary of the monitored elements. You know, updated plugins, WP version and whether they need to be updated, total number of users, new posts in the last 24 hours, new answers also in the last 24 hours… and other similar checks.

Audit records

Here a table will be displayed before you with the access data of the users, IP, whether the login has been correct or incorrect and how many times, the date of the last access… You will also be able to check whether new plugins or themes have been installed, and the date these changes took place.

General Setup

Here you may configure the general options:

  • Configuration of the API
  • List of IPs with access to the API
  • Set the time to display new data in the API
  • Log deletion time
  • Clean fields of table filesystem with deleted status on data older than X days
  • Delete the status “new” from the filesystem table fields in data older than X days
  • Custom SQL queries

Prerequisites

  1. Pandora FMS WP optionally requires a plugin for the REST API, called “JSON REST API”. It is only necessary if you want to integrate the monitoring/status information of the WP in a central management console with Pandora FMS. As we have already pointed out, this is an optional feature, you may manage all the information from WordPress itself.
  1. If your WordPress version is below 4.7, you must have the WP REST API (v2) plugin installed in order to use the API.

Some limitations

  • WP Multisite is not supported in this version.
  • To use WordPress REST API, you need version 4.6 or higher.

Some cool screenshots

So that you may get an idea of the brand new aspect of the plugin, we leave you a couple of screenshots as an appetizer.

Resources:

Pandora FMS WP

Pandora FMS plugin library

Distributed network visibility, the ultimate weapon against chaos

Distributed network visibility, the ultimate weapon against chaos

2022, the world is the technological paradise you always dreamed of. Space mining, smart cities, 3D printers to make your own Darth Vader mask… Just a little problem, society is based on digitization and communications and you have no idea about the visibility of distributed networks. Something of vital importance considering the rise of cybercrime. Well, don’t worry, we’ll help you.

 Do you know everything about distributed network visibility?

Well, the first thing you need to be aware of is the importance of this distributed network visibility. After all, companies around the globe say that the biggest blind spots in their security come from the network, so all their efforts are focused on safeguarding their data by reinforcing this trench. That’s why visibility is key. Even more so if we talk about Managed Service Providers (MSP), the professionals in charge of protecting customer data.

But, what is distributed network visibility? 

To put it simply, distributed network visibility supposes having full knowledge of the different components running within your network to be able to analyze, at will, aspects such as traffic, performance, applications, managed resources and many more, which will depend on the capabilities offered by your monitoring tool. In addition to increasing visibility into your customers’ networks, a comprehensive solution can give you more leverage to strategize based on the metrics you’re monitoring.

For example, MSPs can, with a good visibility solution, help improve the security of their customers by revealing signs of network danger or, through better analytics, make more informed and rigorous decisions about data protection.

As we have warned before, cybercrime is our daily bread in this almost science fiction future that we have earned, and blind spots in network security, along with what will become of the cd, is one of our great concerns.

Monitor traffic, look for performance bottlenecks, provide visibility thanks to a good monitoring tool and alert on irregular performance… That’s what we need. In addition, these super important alerts draw attention and notify technicians and system administrators, who will immediately take the appropriate measures to solve our problem.

If you are an MSP in this post-apocalyptic future that we are living in, it is very likely that you use several applications as part of your services, well, another of the obvious advantages of improved visibility is the ability to participate in application supervision. So, for example, when granular network visibility is set, you may get unquestionable insight into how applications are affecting performance and connectivity. Once you are aware of this, you may choose to filter critical app traffic to the right tools and monitor who is using which app and when. You may even make application performance more practical, reducing processor and bandwidth work by ensuring, for example, that email traffic is not sent to non-email gateways. 

Some challenges to consider

Not everything is having fun and joking around, rolling on the carpet and having crises saved by your expertise, there are several challenges for MSPs associated with network visibility.

Cloud computing has increased and mobile traffic has increased too, this only adds, to our inconvenience capacity, more blind spots to watch out for as MSP. The end has come for the magnanimous and bucolic days of lying on the grass simply monitoring traffic over MPLS links. We are in the future, and WANs are a deadlock for Internet-based VPNs, Cloud services, MPLS, and mobile users. Something complex that many rudimentary monitoring tools cannot offer full visibility of. There are many components to address. To deal with this Gordian knot and its dense complexity, MSPs must be demanding and rigorous when choosing a monitoring tool to work with.

Another of the great challenges that MSPs may face in this field is the fact that the most traditional monitoring methods are closely linked to on-premise devices. This means that all WAN locations need their own set of applications, and these must have their own sources and be properly maintained. Optionally, all traffic can be retrieved and inspected from a WAN location. This inefficient method can have a performance impact.

Due to this inefficiency, it becomes difficult to apply the traditional approach to distributed network visibility. For enterprises with many applications, networking becomes too obtuse and convoluted, with a variety of individual configurations and policies difficult to support. Additionally, there is the capacity restrictions of the devices, which limit the amount of traffic that can be analyzed without the need to update the hardware. This without noticing that at some point the devices will have to be completely patched or replaced. Damn, even if your company grows, which is what we want, network visibility will quickly be constrained and more security vulnerabilities will go unnoticed.

Conclusions and good wishes


I gave you a very bad prospect. But don’t worry, it was only an adverse in crescendo until reaching the great catharsis: While there are many traditional monitoring tools that cannot address distributed network visibility challenges, there are, thank heavens, other monitoring tools that can.  This is the example of Pandora FMS, a monitoring software that is up to the challenges such as those raised and that helps technicians manage complex networks and much more. Pandora FMS allows you to control, manage and customize the tool through a centralized interface. Thanks to its scalability you will be able to manage networks with hundreds of devices and give IT providers what they need to increase security and maximize efficiency. You don’t believe it? Try it now for 30 days for free. You see, not everything was going to be bad in this post apocalyptic future!

Are Network Problems Hard to Find? Not for you!

Are Network Problems Hard to Find? Not for you!

In our daily life we can face different difficulties. From spilling coffee on our clean shirt just before leaving home to not finding an emoji that satisfies us to answer that someone we like. Stupid little things compared to how difficult it is sometimes to identify network problems for an external IT provider.

Steps to identify network problems

As we pointed out, finding network problems is, due to its transient nature, a hassle. And IT vendors often have to stay on site to monitor firsthand for signs that often signal network problems. This is not cool at all. Being able to monitor network devices or cloud services from a remote location should be part of our rights, something fundamental in the life of someone who wants to be a good Managed Service Provider (MSP). For this reason, we wanted, from our blog, to help these poor people with a list of steps to identify network problems. We are that kind and philanthropic. Take note!

One: Supervise, supervise and supervise

Today we know that there are many tools that help MSPs to monitor servers and others, but today’s networks are something much more complex and difficult to deal with. In the past, you had to make do with simple routers or switches, but now you can monitor with the help of all kinds of IoT devices, cameras, VoIP phones/systems, etc. There is no reason to complain. Make use of all of them to carry out your supervision work. Manage with a good monitoring tool from routine ping tests to the most complicated SNMP queries. With the right weapons, professionals can do their job remotely, taking advantage of the information provided by network devices.

Two: Pay attention to the Cloud

We have mentioned it more than once in this blog, the Cloud has become of key importance for companies, whether they are small or large.  Adopting more services based on the cloud for the functions that are vital to your business. The bad thing? Sometimes the Internet speed is not the ideal one we would like, and there are even interruptions in our services. Usually the IT provider is advised to diagnose and bring the problem to light. However, without accurate historical data to verify what was happening at the time the outage occurred, it is very difficult for the technician to make a good diagnosis.

With Pandora FMS, for example, by constantly monitoring the connection between your clients’ devices and your services in the Cloud and creating, in turn, a collection of historical data that you could return to in the event of a failure, you wouldn’t have that problem.

And three:  Go for the unusual

You should investigate any unusual activity on your devices like a police sleuth, because it could mean a potential security risk, even when segmented into your own VLAN or physical network.

Network monitoring is an indispensable part of any IT provider tool. Troubleshooting, proactive monitoring, security… Efficiency and responsibility can help you earn money, or at least help you save it, thanks to this additional service.

It will never be “We have to keep an eye on this until it happens again”. With a good monitoring tool, you will have the data at hand to determine what happened, why it happened and what the steps should be now so that it does not happen again. Because as we’ve seen, network problems can be harder to find than a sober intern at a company dinner, but with the right tools, you can get enough help to get by on your feet.

Conclusions:

If there are any conclusions to be drawn from this article, they are:

  1. Change your shirt, quickly, by one that has not been stained with coffee before leaving the house.
  2. All emojis are good if she, or he, likes you too. Well, except for the one with the poo. That emoji is hideous!
  3. Incorporating Pandora FMS to your team can help you do your job more efficiently and for your clients’ networks to be always safe. Take a look at our website or enjoy right away a FREE TRIAL for 30 days of Pandora FMS Enterprise. Get it here!
You can judge your monitoring by the tools you use

You can judge your monitoring by the tools you use

Whether you are a DIY ace or a master at roast beef, a decorated luthier or the best seamstress in the neighborhood, we all love to work with good tools, right? This includes, of course, good IT professionals. Because IT monitoring tools are fundamental when it comes to supervising a network infrastructure and applying the corresponding policies and security measures. Even so, not every monitoring tool is perfect, in fact some could even get to the point of harming us. Let’s take a look!

Better monitoring tools, better monitoring

It’s instinctively basic: you have to find the right monitoring tool for each job. Indeed, although it may seem unheard of, it is quite difficult for IT teams to find comprehensive and outstanding monitoring tools. Some of them are too specialized or do not support all applications because they might lack certain features. This dilemma can lead IT teams to use hundreds of disparate monitoring tools, due to the need to attend to all monitoring tasks. I know what you are thinking: “That must be expensive”. Yes, it is, plus it slows down the working pace due to the huge amount of reports, each with their own features, to be inspected and checked.

That is why we must avoid tool proliferation, as we avoid the proliferation of gremlins or herniated discs.  Preventing it through individual monitoring solutions, even if this requires significant changes, such as the implementation of integrated tools, conceived to support multiple applications, or special network configurations.

The most efficient thing would be to go for IT monitoring tools that include updates to support today’s most respected applications and provide IT administrators with a single management board.

Simplifying is the key

If you have to choose a monitoring platform, you should be aware beforehand that different IT sectors require different types of solutions. Try, with a single solution, to address as many sections as possible, thus adding further depth to monitoring activities. Such a single solution will give you a greater ability to automate responses and locate irregular events in any system you are monitoring.

For this reason, IT departments often look for a suite of fully integrated IT tools offered by centralized system management and monitoring companies. These companies often promise to reduce the license and maintenance costs of their software, as well as the use of their monitoring tool integrated in the corresponding environment to help manage the company.

The IT department will reduce costs thanks to these integrated tools, among other things because they already have a strong response to any problem that may arise. In fact, one of the direct benefits is the reduction of incidents that require the action of the support teams. Also general performance visibility and system availability, thus increasing the total productivity of the company.

But hold on there, before you go running to look for a monitoring tool that suits your company’s requirements and even your zodiac sign, it is TOTALLY NECESSARY to define what justifies monitoring in your company. Remember that each piece of your IT department will have something to say and contribute, there are different features regarding each function, information flow and security clauses. Once you have a full and clear idea of what you and your company need, you may start with a good monitoring strategy.

Application monitoring tools

Application monitoring is, broadly speaking, monitoring activity logs to see how applications are being used. You know, looking at the access roles of the users, the data that is accessed, how this data is used… If your monitoring tool is good, it even shows a window to the log data and an exhaustive view of all the data elements that make up a healthy application: response times, data traces…

Any self-respecting application monitoring tool has to offer these kinds of features, as well as being integrated with database and network monitoring. Thus, together, they will be able to improve application response times through active and immediate solutions to performance problems that arise.

Network monitoring tools

DNS host monitoring, IP address management, packet tracking… This is more or less what all network monitoring tools usually offer. They usually fall short, however, when it comes to supervising everything related to network traffic, whether internally or externally. What they should always provide, under oath, is full surveillance of all devices connected to the network.

Compliance control monitoring

Don’t worry, if you haven’t yet managed to justify implementing a full monitoring tool, compliance monitoring will make up your mind.

Compliance monitoring solutions will provide you with templates based on types of regulations, allowing you to conveniently design and implement a comprehensive compliance monitoring strategy, including the ability to monitor log data, in real time, from any type of device connected to your network, including routers and switches.

Thanks to compliance control monitoring tools you will be able to collect, correlate and export any necessary registration information for the IT team. Report templates will be able to align with formats common to regulatory agencies. In addition to providing exhaustive analysis in the case of internal audits.

Conclusions

If we have made something clear today, it is that the system management and monitoring solution you choose must meet a small series of requirements: be integrated into several systems, be accessible to the IT team through an intuitive interface based on a control panel, be scalable, and stay constantly evolving so that its ability to help you maintain your services can go forward and transcend when you need it.  

If doubt and anxiety overcome you, do not worry, what you are looking for is not far away. Pandora FMS is capable of monitoring all these IT areas that we talked about and much more. Thanks to its more than 16 features and more than 500 Enterprise plugins available. Also, if you are not very knowledgeable in this matter, do not worry, we manage it for you   with our MaaS solution. Try it now, for 30 days, for free!


Resources:

Pandora FMS plugin library

 Pandora FMS official forum 

I want to learn more!

 Our Trial

Advice on camera and microphone in WSL2 Ubuntu

Advice on camera and microphone in WSL2 Ubuntu

Al momento de escribir estas líneas, prácticamente todo lo que conectamos a nuestros dispositivos es mediante el llamado Universal Serial Bus (USB): cámaras, micrófonos, almacenamiento externo… ¡Es la manera más rápida y segura de sincronizar y respaldar información entre nuestro teléfono móvil y ordenador! ¿Pero qué tiene todo esto que ver con el Windows Subsystem for Linux (WSL2 Ubuntu)? Veamos.

Estudio en WSL2 con Ubuntu: software privativo y libre

De entrada, os dejo un enlace a un artículo publicado en este blog, para así facilitar el conocimiento de la tecnología que iré nombrando. Agregaré más de ellos a lo largo del texto. Tenemos bastante tela que cortar, así que recomiendo una buena y humeante taza de café negro en vuestras manos antes de empezar.

*Las pruebas que he realizado han sido sobre máquinas virtuales (VirtualBox®: se pueden crear, borrar, modificar, etcétera sobre Solid State Drive). 

Breve retrospectiva

Siempre afirmo que «para saber a dónde vamos, necesitamos saber de dónde venimos». Desde 1989 yo he trabajado con los productos que vende la empresa Microsoft Corporation: primero el sistema operativo MS-DOS y su única forma de interacción por línea de comandos y, luego, Microsoft Windows, el cual utiliza, además, el entorno gráfico. Sí, lo sé bien, el MS-DOS® como tal fue eliminado, pero aún quedan sus comandos. Fue sustituido con Powershell®, del cual ya hemos hemos hablado, y es importante para el tema de hoy.

Acabando 2016, Microsoft nos sorprendió con la noticia de que su SQL Server® podía ser ejecutado sobre GNU/Linux. Para mí, que durante muchos años trabajé instalando y manteniendo servidores de datos para mis clientes, fue una noticia impactante. Pero esperad, aún hay más, en mi periplo, descubrí que el BASHware puede afectar a un sistema Windows por medio del WSL. Lo que nos lleva al artículo de hoy, donde  entraremos en el manejo de los dispositivos USB, con particular atención a micrófonos y cámaras web, bajo WSL2 con Ubuntu 20.04.

WSL y WSL2

Recomiendo, de nuevo, el excelente artículo sobre WSL2. Aunque el tiempo ha transcurrido y existen algunos cambios significativos. En aquella oportunidad el WSL2 se instalaba por medio de comandos. Ahora, y quiero recalcarlo, noto que por el Panel de Control de MS Windows, «Programas y características», podemos agregar los dos componentes claves que son Virtual Machine Platform y, obviamente, Windows Subsystem for Linux en el apartado de «Activar o desactivar características de Windows»:

Después de esto se debe reiniciar el sistema operativo, ¡esto es ya idiosincrasia de la casa de Redmond! (Después vendrán muchos reinicios más que dejaré fuera. Estarán implícitos). 

Otro aspecto que fue agregado en julio de 2021 es la posibilidad de agregar las distribuciones Linux que uno desee, directamente, por la línea de comandos en Powershell (dependiendo de la versión y tipo de MS Windows que tengáis instalado).

Para ver las distribuciones disponibles:

wsl --list --online

Para instalar Ubuntu 20.04:

wsl --install -d Ubuntu-20.04

Después de cierto tiempo, dependiendo de la velocidad de descarga de Internet, preguntará por nombre de usuario y contraseña. Inmediatamente mostrará el estado de las actualizaciones para Ubuntu. 

Para configurar WSL2 como predeterminada:

wsl --set-default-version 2

La opción de descargar y usar desde  la Microsoft Store sigue siendo válida y disponible, para Ubuntu 20.04 ocupa casi medio gigabyte de espacio.

La diferencia fundamental entre WSL y WSL2 es que la última descarga es un kernel completo de Linux, pero no un kernel cualquiera, es uno especialmente diseñado para que se acople con el kernel de Windows. Esto quiere decir que las aplicaciones ejecutadas en WSL2 siempre deberán ser «pasadas» -mas no interpretadas, como era en WSL- antes de interactuar con cualquier hardware, USB incluído.

En lo único que WSL supera a WSL2 es el intercambio de ficheros entre los dos sistemas operativos. El resto son todo ventajas y mejoras en WSL2.

Podman en WSL2

Para que os hagáis una idea de lo útil que es incluir un kernel completo de Linux en MS Windows, el software Podman (sucesor de Docker), puede ser ejecutado sobre WSL2. Si aún no sabéis lo que es Podman, haced más café y visitad otro de nuestros artículos.

Modo de desarrollador

Una característica que ofrece Powershell y que podemos usar a nuestro favor, una vez hayamos instalado y configurado WSL2, es el modo de desarrollador. Se accede pulsando la tecla de inicio de Windows, tecleando «Powershell» y escogiendo la configuración de desarrollador. Lo primero es activar el modo de desarrollador y esperar a que se termine de instalar el software necesario.

Este consta de dos componentes principales: 

  • Device Portal.
  • Device Discovery.

El Device Portal abrirá el puerto 50080 (recordad configurar debidamente el Windows Defender Firewall), y desde cualquier navegador web podremos introducir las credenciales configuradas y acceder a una variedad de aspectos que podréis observar en la siguiente imagen.


*Hay un tutorial para establecer conexiones seguras con HTTPS pero no viene al caso para este artículo: 

Guardando las distancias, esto es parecido a lo que ofrece eHorus para una monitorización tanto básica como avanzada, si es utilizado en conjunto con Pandora FMS. He incluído esta característica porque las credenciales configuradas son necesarias para el siguiente punto.

El segundo componente es el Device Discovery que, entre otros aspectos, abrirá un servidor SSH para realizar conexión. 

Esto permite abrir una terminal con la línea de comandos de Windows y, una vez allí, podremos utilizar directamente WSL2 para cualquier tarea que necesitemos desarrollar de manera remota desde otro equipo. En este caso, de ejemplo he utilizado el software PuTTY para conectar desde la máquina real a la máquina virtual Windows 10 con WSL2 instalado y configurado: 

Como veis, una vez se ha establecido la configuración por defecto, solo con escribir el comando wsl estaremos listos en un ambiente Linux, no GNU/Linux sino MSW/Linux.

USB en WSL2

Llegamos al propósito de esta entrada en el blog: el manejo de USB en WSL2. Al momento de redactar estas líneas, hay dos noticias, una mala y otra buena.

  • La mala noticia es que no, por ahora WSL2 es incapaz de ofrecer soporte para USB, así que, por ejemplo, vuestras cámaras y micrófonos conectados por esta vía no estarán disponibles para ser utilizados desde WSL2.
  • La buena noticia es que podemos compilar nuestro propio kernel Linux para WSL2 y tener acceso a algún que otro micrófono o cámara web desde nuestra distribución Linux elegida. ¿Pero qué aplicaciones podríamos usar para ello?

Compilando kernel Linux para WSL2

Antes de hacer cualquier cosa, primero debemos actualizar Ubuntu WSL2 con los comandos de siempre:

$ sudo apt update

$ sudo apt upgrade

Y si creían que con esto era suficiente descarga de software… pues no, ahora se debe instalar lo que yo llamo el entorno de programación (dependencias):

$ sudo apt install build-essential flex bison libssl-dev libelf-dev

Y ahora sí se puede descargar el código fuente del kernel base para Ubuntu en WSL2:

$ sudo git clone https://github.com/microsoft/WSL2-Linux-Kernel.git

Son tres gigabytes a descargar. El código fuente. Brutal. Aunque siempre se puede usar el parámetro git clone -depth=1 <repositorio> , esa opción no la utilicé. Recomiendo al menos 100 gigabytes libres en almacenamiento antes de entrar a la carpeta descargada (repositorio clonado) y ejecutar:

$ make -d KCONFIG_CONFIG=Microsoft/config-wsl

En este punto debo aclarar que encontré muchas opciones de configuración para compilar. Por ejemplo, para instalar el software de manejo de paquetes Snap sobre Debian. Ahora bien, todo esto está excluido del soporte de Microsoft, nada podréis reclamar a esta empresa si algo sale mal en el proceso de compilación.

Para finalizar deberemos apagar WSL2 con el comando wsl –shutdown y copiar el kernel recién compilado en la siguiente vía no sin antes respaldar el kernel original:

C:\Windows\System32\lxss\tools\kernel

A esta altura ya deberíamos poder conectar cualquier micrófono o cámara web y tener acceso desde WSL2… Pero va a ser que no. Resulta que primero debemos conseguir los controladores de hardware para MS Windows, obvio, y luego los de Linux, meterlos en el código fuente estos últimos y volver a compilar de nuevo. Además a eso le sumamos instalar en Ubuntu WSL2:

sudo apt install linux-tools-5.4.0-77-generic hwdata

sudo update-alternatives --install /usr/local/bin/usbip usbip /usr/lib/linux-tools/5.4.0-77-generic/usbip 20

Y de paso también se debe instalar del lado de Windows, con un paquete instalador MSI, el proyecto USBIPD-WIN…

Como podemos observar, ya que nos hemos mal acostumbrado a la sencillez gráfica de Windows, si deshabilitamos el USB por el Administrador de dispositivos ningún hardware podrá conectarse con o sin nuestro consentimiento, ya que estará bloqueado a nivel de sistema operativo.

Instalando aplicaciones gráficas en WSL2

Para finalizar, aunque en el caso del instalador de paquetes snap está explícitamente sin soporte alguno en Ubuntu sobre WSL2, otras aplicaciones que interactúan con hardware (como el sonido, por ejemplo), podrán ser instaladas, pero cuando intenten acceder a los ficheros de hardware (recordar que en Linux todo es un fichero) pues sencillamente no encontrarán tales recursos. Es el caso del software espeak:

En teoría, en el blog de Ubuntu se indica que por medio de X Window System Architecture se puede «pasar» la interfaz gráfica de las aplicaciones instaladas en WLS2. Oficialmente Microsoft anunció justo antes de terminar el año 2021 que las siguientes aplicaciones gráficas se pueden ejecutar:

  • Gedit (mi editor de texto GNU gráfico favorito).
  • GIMP (potente para diseño gráfico).
  • Nautilus (explorador de archivos).
  • VLC (reproductor de audio y vídeo).
  • Aplicaciones basadas en X11 (calculadora, reloj, etcétera).
  • Google Chrome (bajo vuestro propio riesgo debido a su gran consumo de RAM y recursos).
  • Microsoft Teams (por cierto, Pandora FMS tiene un conector especial).
  • ¡Incluso Microsoft Edge web browser para Linux!

Pero esto tiene algunos inconvenientes. Primero, se debe tener Windows 11 Build 22000.  Segundo, tener instalados los controladores de hardware de vídeo para WSL2. Tercero, estar inscrito en el programa Windows Insider. ¡Espero os haya gustado la información!


Recursos:

Librería de plugins Pandora FMS

Foro oficial Pandora FMS

Quiero saber MaaS

Nuestro Trial