Augmentez la puissance de votre surveillance. Pandora FMS s’intègre aux principales plateformes et solutions cloud.
Helpdesk puissant et flexible pour les équipes d’assistance et de service à la clientèle, aligné sur les processus de la bibliothèque d’infrastructure des technologies de l’information (ITIL).
An extensive collection from detailed guides that break down complex topics to insightful whitepapers that offer a deep dive into the technology behind our software.
Expande el poder de tu monitorización. Pandora FMS es flexible y se integra con las principales plataformas y soluciones en la nube.
Potente y Flexible Helpdesk para equipos de soporte y atención al cliente, alineado con los procesos de Biblioteca de Infraestructura de Tecnologías de Información (ITIL).
SNMP alerts: what they are and why you should configure them
The SNMP world is becoming more and more important within the monitoring environment, as companies need to find software that has specialized tools for trap monitoring. If you are not familiar with the term SNMP, take a look here.
In this article, we will focus on Pandora FMS SNMP alerts, on how they work and how you can benefit from them.
What are SNMP alerts?
As some of you may already know, Pandora FMS has an alert system based on previously created modules, where different actions can be performed depending on the values that each module collects. We have even gone so far as to talk about more complex alerts derived from the events that are generated within Pandora FMS. Still, let’s take a brief look at the alert concept, focusing a little more on this particular type.
SNMP alert concept
The first big difference between the aforementioned alerts and SNMP alerts is the “arrival” of the data that triggers the alert. While in the first alerts, Pandora FMS is in charge of collecting data through remote or local checks, in this case, it is the device the one that will send Pandora FMS the trap that will trigger one of the configured alerts.
As there are several identifying fields within a trap, SNMP alert configuration is very versatile to be either very restrictive or very general when it comes to detecting the trap that triggers an alert.
Among the different configurable fields of SNMP alerts, it is worth highlighting:
Enterprise string
Custom OID value
Agent (IP)
SNMP trap type
Let’s take the case of a restrictive configuration or a very general configuration. For a general configuration, it would be enough to add, for example, an IP of a router from your network. In this case, any trap that arrives from that router will trigger the action that it has configured within the alert.
On the other hand, maybe you want to have an alert that fires in very special cases. To that end, for example, you have to fill in all the fields and set the alert to only fire when it comes from the router with IP XXXX, from OID .1.2.3.4.113.122, which is the type of interrupted linking trap.
What can I do with SNMP alerts?
There is a wide variety of actions that can be performed when Pandora FMS receives a trap, either with default actions or custom commands. Below we will see some examples of common actions in SNMP alerts.
Send an email
A widely used action is to simply send an email to the operator in charge of managing the company’s systems. This email could include specific details of the hardware that triggered the alert and its characteristics, keeping the operators up to date in real time.
Create event
When a trap is received, you can generate an event in Pandora FMS. This event would show which agent (IP) it is and what happened.
Let’s see a practical example. If you had an agent with IP 192.168.70.1, an IP that matches your main router and which is sending traps with its changes, once the trap arrives and matches the configuration of the created SNMP alert, it will create an event with custom data such as: event text, event type, agent, priority or even comments so that the operator of the event view can see the corresponding information.
Custom Commands
Just as there is a wide variety of traps that Pandora FMS can manage, custom measures can be created for each of them.
This configuration is designed to be able to generate multiple very specific SNMP alerts for each trap, hardware or status and to be able to take custom measures for each of the setbacks that may take place in your system.
Let’s look at a particular example of a custom command with specific settings. Suppose your SNMP alert setting is as follows:
So, if you get such a trap, what you need is to create a custom command that will get the link itself up, connecting to the router with IP 192.168.80.21 and execute the command: ”snmpset -v1 -c community hostname IF-MIB::ifAdminStatus.interface i 1” to activate it.
What are the advantages of SNMP alerts?
Although monitoring with traps itself is already a great advantage when it comes to talking about SNMP devices, there are many advantages when it comes to having SNMP alerts within the selected monitoring tool.
Control in the same tool
Thanks to the action described previously of creating an event, having all your devices’ traps pointing to Pandora FMS and with the corresponding general settings of SNMP alerts, you may have in a single window the total display of what is happening in all your devices simultaneously.
Simplification
By means of the possibility of sending an email to the tool’s operators, the data obtained through the trap that caused the SNMP alert to be triggered can be simplified. This means that the user who receives the alert does not have to know how to translate the trap OIDs or know the different types of traps that can be generated, since they can receive the email with all the necessary translations and clarifications created in the alert.
Automation
Perhaps the greatest advantage of SNMP alerts, as it can happen with the rest of Pandora FMS alerts, is the automation of actions to be carried out in different cases. As there is no SNMP alert creation limit, and since the trap reception limit is imposed by the hardware in which Pandora FMS is installed, you can cover a very wide range of automatic actions for the different problems that may take place within your monitored systems.
So far we have learned a little more about SNMP alerts in Pandora FMS. Would you like to find out more about what Pandora FMS can offer you? Find out clicking here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
Also, remember that if your monitoring needs are more limited, you have Pandora FMS OpenSource version available. Learn more about it here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
CIOs, CTOs and executives. What you need to know about IoT
If you occupy positions of certain responsibility (such as CIO or CTO) and you do not know what is necessary about IoT, you run the risk of being out of the game. So here in this article is what you need to know about IoT.
The following post is not intended to be a full encyclopedia on the Internet of Things. It doesn’t even intend to be a comprehensive list of “everything you need to know about IoT.” But we do would like to remind you of some aspects of IoT that you should take into account if you want to hit the jackpot or, at least, not get hit by the jackpot.
What you need to know about IoT
IoT will be more important than what it seems
It is not only a hot concept, but it already is really important in many companies and the chances are it will be very relevant in the very near future.
We are not going to go on and on about growth forecasts that you have already read a thousand times, but take a look at a key concept: 5G.
The Fifth Generation of mobile phone technologies is one of the factors that IoT needs for its growth, and its arrival will enhance its development in a way we only have a glimpse of today.
If there is someone who should be in charge of the IoT in the company, it is the IT department
You already know that all eyes will be looking in your direction. If someone in the company is expected to take advantage of IoT is the IT department, and as the person in charge, you have no choice but to put on your captain cap and take the helm.
Get all the knowledge you need
We do not question your trainning or your experience. Surely you invested a lot of time and effort in acquiring them. However, you probably already know that in the IT world you never stop learning.
Although the IoT domain has been developed for years, it is still very new, so you probably have a large field for learning before you. In addition, you already know that a position as complex as that of a CIO requires both technical and business knowledge, so it will be twice the challenge.
Mark these words: flexibility, interoperability and scalability
What you need to know about IoT is that it is necessarily something that will work with very heterogeneous environments where diverse manufacturers and solutions must coexist. Therefore, factors such as flexibility and interoperability (about which we already wrote in this post) will be of the utmost importance.
At the same time, the variety in the number of devices and the changing scope of the necessary infrastructure will make it very important to think about options that favor scalability.
New markets, new products
Although your company’s activity may seem to have little to do with IoT, what yo need to know about IoT too is that its versatility can accommodate a wide range of activities.
Have you thought about how your company can make the most out of IoT to launch new products and services? Perhaps you have at hand great potential for growth that is being wasted – at least for now. As always, keep your eyes open for new opportunities.
Another keyword: sensorization
It is one of the key points of IoT. Taking advantage of sensors can bring multiple benefits, even in the least expected ways. There are some magnificent examples: for example, there are livestock facilities that monitor the health and productivity of their cows through collars on their necks, which provide information as useful and funny as the way and frequency they moo.
It is an example that may be very foreign to you, but sensorization can offer an extra value where you least expect it. Think about how to take advantage of it!
IoT and Big Data can also work hand in hand
IoT produces a relentless flow of information. Don’t you think it would be a great idea to take advantage of it? Today, more and more companies are using Big Data solutions to obtain the performance from the huge amount of information received from different sources.
IoT will multiply the available information and therefore its potential, while an improvement in the systems that are responsible for its treatment and analysis is foreseeable.
Don’t forget about security and privacy
The flow of data and the presence of devices in all kinds of places offers great opportunities, but not without risks. IoT development will require facing big security challenges you must also pay a lot of attention to.
As always, the customer will continue to be important
It is not about accumulating IoT devices, but about developing those that really provide an extra value to customers. In an increasingly diverse and demanding market, the user is of utmost importance and demands increasingly useful and customized products, so do not forget that their satisfaction will be both an objective to achieve and a good scale to know if things are working as they should.
Another essential word: monitoring
IoT represents much more technology and much higher supervision demands.
Monitoring is not a new thing, nor is it a surprise that it’s needed. It has been vital for decades in all kinds of IT environments. However, the Internet of Things will multiply its importance.
In addition, IoT monitoring will have its own features. For example, when monitoring IoT devices, monitoring system flexibility will be something to keep in mind.
That is why you need to learn about Pandora FMS. Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. And among all the things it is capable of, it can also monitor IoT.
Would you like to know what exactly Pandora FMS can do when it comes to monitoring IoT? You have it very easy, just send a message asking all your doubts. You can do it in a very simple way, thanks to the contact form that can be found at the following address: https://pandorafms.com/contact/
We hope you liked this article about what you need to know about IoT and remember that if you have a reduced number of devices to monitor, Pandora FMS OpenSource version may be more suitable for you. Learn more about it here: https://pandorafms.org
Do not hesitate to contact Pandora FMS team. We will be happy to help you!
Pandora FMS como una alternativa a Icinga 1.x, ambos escritos en código abierto
Examina. Busca. Navega. Icinga, en idioma zulú. El origen de los nombres de gran cantidad de software son un tanto extraños (o desconocidos), y eso es material para un artículo aparte. En esta oportunidad os propongo a Pandora FMS como alternativa a Icinga y, si sois lector(a) consuetudinario de nuestro blog, una reminiscencia vendrá a vuestra mente.
Finalizando el año 2018 evaluamos varias herramientas (Icinga incluida, aunque de manera breve), por ello hoy actualizamos la información y a la vez ofrezco a Pandora FMS como alternativa a Icinga. En un principio Nagios, software patriarca de la monitorización, nace en 1999, justo antes de finalizar el milenio. Se mantuvo fresco y nuevo por diez años y en este ínterin nació Pandora FMS, en el año 2004. La comunidad de Nagios es entusiasta y en ese período estaba cohesionada. Hasta que un grupo de programadores de su comunidad plantó cara al Sr. Ethan Galstad y anunciaron una bifurcación: Icinga. Para ser más precisos, esto ocurrió en el mes mayo de 2009.
Considero que en ese punto Nagios adolecía de conexiones a bases de datos robustas, como Oracle® y PostgreSQL®; además faltaba una interfaz web escrita en PHP (no os riáis, considerad la época). Estas dos características fueron los primeros puntos que los bifurcadores retribuyeron al proyecto original. Vamos, que «el alumno superó a su maestro». Lamentablemente, la separación fue dolorosa, con detalles que no vale la pena comentar.
En la actualidad Icinga no ha perdido ni un ápice de su dinamismo, pero su herencia de Nagios es innegable.
Leyenda: Principios de operación de Nagios https://es.wikipedia.org/wiki/Icinga
Icinga e Icinga 2
En octubre de 2012 anunciaron «Icinga 2», la cual fue escrita casi desde cero en lenguaje C++, tanto para la plataforma Microsoft Windows® como GNU/Linux®. Como bien sabéis, tener solamente una idea clara de lo que se quiere y/o necesita no es ninguna garantía para el éxito: llevar a cabo una versión estable del núcleo tomó varios años y en el mes de junio de 2014 tuvo a bien su renacimiento. Esta «competencia», a veces fuerte, entre Nagios e Icinga los fortalece a ambos; en general el mundo de la tecnología así es como puede evolucionar. A Icinga le tomó 4 años y medio de duro trabajo el lograr su independencia de Nagios por medio de Icinga 2. Para el caso de Pandora FMS, ya desde su planificación se tenía claro que Nagios es más bien de propósito general (aquí estamos muy conscientes de las limitaciones de Nagios). ¡De aquí es que nace una verdadera alternativa a Icinga!
Icinga, empresa como tal, hace énfasis en que, cuando utilizan el simple término «Icinga» en vez de «Icinga 1.x» se refieren a la bifurcación de Nagios (su núcleo compartido). «Icinga 2» es tan diferente que necesita una conversión para ir de uno al otro. Pandora FMS como alternativa a Icinga ofrece desde un principio el mismo núcleo, haciendo sumamente fácil la transición a la versión «Enterprise».
Llegado este punto comento que, para incluso mayor complejidad -por no decir que provoca confusión- en este asunto de los tipos, versiones y componentes y sus nombres y denominaciones, también existe «Icinga for Windows®»… Pero no, no es lo que ustedes están pensando. Si bien Icinga 2 se puede instalar en Windows®, este componente que traigo a colación es un módulo totalmente completo para PowerShell (PS), en realidad un entorno de programación para dicha herramienta. Pandora FMS toma la alternativa de guiones con los comandos estándar de PS para cuando monitorizamos en dicha plataforma. A continuación esto nos lleva a exponer a los agentes de ambas soluciones.
Métodos de recolección de datos
Simplificando al máximo, hay dos formas de obtener datos de las máquinas a nuestro cargo: les «preguntamos» directamente a nuestros dispositivos (también llamada verificación activa) o bien usamos un software que instalemos en cada uno de los dispositivos (también llamada verificación pasiva). La primera opción recae sobre los servidores de Icinga y Pandora FMS, aquí no hay mayor diferencia (estos datos bien pueden ser HTTP, correo -POP3 y sus comandos- y ping ICMP, por ejemplo). Sin embargo, otorgo a Pandora FMS una ligera ventaja en el aspecto más útil de consulta a distancia: SNMP.
Leyenda: Métodos de monitorización de Icinga https://www.digitalocean.com/community
Veamos entonces los agentes software, o simplemente agentes: Icinga utiliza «Nagios Remote Plugin Executor» (NRPE), el cual agrega además un servidor en el lado del cliente… Ya comenté el aspecto sobre PowerShell pero también es extensible a GNU/Linux: si nos vamos por lo normal y estándar podemos rápidamente crear nuestros propios diagnósticos personalizados. Informo de esto porque NRPE también espera que el servidor Nagios (o Icinga en este caso) pregunte de manera explícita por los datos a recoger, lo cual es similar al primer método de recolección de datos (y en honor a la justicia son datos más complejos como uso de almacenamiento y memoria, servicios en ejecución y muchos más que no podemos hacer por la consulta pública a la interfaz de red).
Pandora FMS trabaja de manera distinta: envía los datos en XML con su protocolo Tentacle para mayor seguridad, en un intervalo de 5 minutos (valor por defecto) al servidor especializado para ello en Pandora FMS («Data Server»).
Esto facilita nuestro trabajo y minimiza la necesidad de instalar nuevas versiones del agente, porque solo debemos configurar de manera interna pequeños guiones con una sintaxis rápida de aprender (en la versión «Enterprise» incluso va a un paso más allá: los editamos por la consola y se guarda en el servidor Pandora FMS y se reparte de manera automática en cada dispositivo, o grupos de dispositivos, así sean miles de ellos).
Pandora FMS concentra mayores esfuerzos en presentar datos de rendimiento, mientras que los estados están en el siguiente nivel de importancia. Un dato de estado generalmente es verdadero/falso, como por ejemplo «¿está en línea?», mientras que un dato de rendimiento pudiera ser «¿cuánto tiempo ha estado en línea seguido, sin interrupción?».
Notas sobre instalación
Icinga, sobre GNU/Linux, solo necesita ser instalado por medio de apt ya que se encuentra en la mayoría de los repositorios Debian y sus derivados. Para su configuración de manera gráfica se puede utilizar NConf, herramienta compatible con Nagios también (aunque en 2019 se detuvo su desarrollo y soporte). En estos casos siempre alabo al software libre porque bien podemos hacer nuestros cambios y allanar nuestro propio camino.
Para el caso de Pandora FMS se recomienda CentOS, agregar los «Extra Packages for Enterprise Linux» (EPEL), adicionar Pandora FMS al repositorio local y luego descargar e instalar con yum. También existen otros métodos de instalación como clonar directo desde GitHub o emplear Docker.
Interfaces
Icinga viene con una interfaz clásica denominada apropiadamente «Icinga Classic». Viene con HTML y CSS sin mayor dinamismo, así que necesitaremos recargar la página en cada oportunidad como al cambiar algo o agregar una configuración, etc. Fue mejorada en Icinga 2 con «Icinga Web», la cual utiliza tecnología AJAX (que esencialmente es JavaScript con el que se intercambia información en segundo plano con el servidor y modifica/actualiza la página web). Denoto que también existe «Icinga Web 2» para «Icinga 2», el cual requiere incluso componentes adicionales, como por ejemplo flatpickr (calendario más ligero escrito en JavaScript). La consola de Pandora FMS, como alternativa a las interfaces de Icinga, utiliza cualquier navegador web moderno, sin cortapisa alguna.
Leyenda: Inicio de sesión en Icinga Web 2 Captura de pantalla
Pandora FMS como alternativa a Icinga
Sí queréis probar y ver cómo funciona nuestra versión comunitaria estamos en Github y también contamos con un Dispositivo de Virtualización de Software, el cual trae CentOS como sistema operativo, todo listo para usar. Os recomiendo leer nuestras Preguntas Frecuentes, aclaratorias prácticas y directas para la mayoría de nuestras situaciones de trabajo en el área de la monitorización.
Antes de despedirnos, recuerda que Pandora FMS es un software de monitorización flexible, capaz de monitorizar dispositivos, infraestructuras, aplicaciones, servicios y procesos de negocio.
¿Quieres conocer mejor qué es lo que Pandora FMS puede ofrecerte? Descúbrelo entrando aquí.
Si tienes que monitorizar más de 100 dispositivos también puedes disfrutar de una DEMO GRATUITA de 30 días de Pandora FMS Enterprise. Consíguela aquí.
Por último, recuerda que si cuentas con un número reducido de dispositivos para monitorizar puedes utilizar la versión OpenSource de Pandora FMS. Encuentra más información aquí.
No dudes en enviar tus consultas. ¡El equipo que se encuentra detrás de Pandora FMS estará encantado de atenderte!
Do you want to know more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
Defining what a smart business is can be as difficult as defining what a smart person is. For decades, we have known that there are different types of intelligence that can help us in different aspects of our lives, and something similar happens with smart businesses.
However, since we do not want to give up on our efforts to know what it is, we can see some of the different aspects that can turn a business into a smart business. Shall we take a look at them?
Is your company a smart business?
If we want to go for a basic definition, we could say that a smart business is the one that knows how to use the resources available in order to achieve its goals.
Now this is the simple definition, but we can go further and get to know some of the aspects that outline that intelligence, which can also help you to know if our company is more or less smart. Let’s take a look at some of them.
A smart business is a company that uses digital transformation, it does not fear it
Let’s start at very the beginning because, in a way, the concept of smart business could hardly be understood in a different context than that provided by digital transformation.
Today, there are all kinds of technologies that make company operation easier. A smart company is not afraid of technology, nor the changes that adopting it implies, but rather knows how to make the most out of it to work better, achieve its goals and create business lines. Is yours capable of doing it?
A smart business is a company that knows how to manage the data it has
In the era of Big Data, we couldn’t miss a section like this for data processing, and even some authors understand that this is a essential factor in determining whether or not a company is smart.
Currently, there are countless tools capable of helping manage and use data generated by business activity, and there are even some professions specifically devoted to it, such as a CDO (Chief Data Officer). After saying all of that, which was only a brief profile, you may wonder: Does my company know how to manage data?
A smart company is a company that knows how to value its assets
A smart company not only looks towards the outside, but also pays attention to the assets it has, and especially its human resources.
Because inappropriate or unfair treatment is definitely not a sign of intelligence. A smart company knows how to value the work its staff does and reward it accordingly. It knows how to offer incentives and take advantage of new ways to make work more flexible. It knows how to keep its teams properly trained and updated. And it also knows how to motivate and involve its people in the company’s goals. Does your company do it?
A smart company is a company that knows how to communicate
Both externally and internally, communication is another factor to consider as an aspect of the intelligence of a company.
Thus, an intelligent company knows how to listen to and communicate with its customers, but not only that. It also knows how to make communication fast and efficient internally, both in vertical and horizontal relationships.
There are a lots of ways to do it. From omnichannel to tools for internal communication, you will find many options available. Does your company know how to use them?
A smart company is a company that knows how to adapt to market changes
In a time of constant change, companies that do not know how to adapt run the risk of disappearing.
A smart company knows how to recognize changes and adapt. It cares about understanding the customer and is able to offer them what they need better and faster than its competitors. At the same time, it is able to adapt its organization and production processes to market demands in order to work better and be more efficient. Is your company capable of all this?
A smart company is a company that uses monitoring
Finally, dear reader, let us take a separate section to the aspect that interests us the most from the point of view of this blog and that is relevant in terms of smart businesses. Indeed, a smart company is a company that uses monitoring
Monitoring systems are responsible for supervising IT systems (hardware, networks and communications, operating systems or applications, for example) in order to analyze their performance, and to detect and alert about possible errors.
In fact, in a modern company, computing is a kind of indispensable nervous system that runs throughout its “body” and its proper functioning is of paramount importance.
And if we talk about monitoring, of course, we should talk about Pandora FMS. Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to assist you!
What is a “developer”? What do they mean for a company?
“Developer”, “DE-VE-LO-PEEEERRR”… It sounds pretty good. It’s easy to make your parents buy it when you explain them they are going to pay for your degree and they will be able to boast about their children being geniuses who joined the wave of computer science and technicalities… But what is really a “developer”? They are there, surely in your company, doing their developer stuff and talking to each other in their developer code, but few people really know what they really are.
People have studied their habitats, what they eat and even how they reproduce, whether by binary fission of their DNA or by vegetative multiplication, like sweet potatoes, but to delve further into what a developer really is, we have decided to ask them, specifically those of our company, Pandora FMS, for a definition. They will clear out all of our doubts.
Luis Calvo, the fourth member of Destiny’s Child
-Could you define what a developer is and what it means to be a developer for you?
A developer is the person who usually builds a software based on an idea.
For me it means creating and contributing with something that will later be used by other people or, someday, be seen by other developers. It is a bit like leaving some mark with your “creation”. Michelangelo made the frescoes for the Sistine Chapel, Beyoncé “Crazy In Love”. I’m happy with this.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
Part chance, part curiosity, a job offer from a company in Madrid that I didn’t know at all and the fact that, when searching on Google, this company appears referred to in a news story as: “Ártica, the David that challenges the software giants”… This obviously sounds attractive and interesting.
-What’s the fun of it?
I love it when things get a little difficult and I have to investigate how to solve it, look into it and use some new trick, that works well, of course. I am one of those who laugh it out and have a good time disconnecting a bomb in the last ten seconds. If you ever see yourself in that situation, it’s always the yellow wire. Cut that one for sure. Or was it the red one?
José González, a misunderstood and modern being
-Could you define what a developer is and what it means to be a developer for you?
A developer is (or should be) a type of modern artist, a misunderstood being, who writes buzzwords and unintelligible symbols on a machine. For me it’s a lifestyle, like a hallmark. When someone types in code and likes it, it shows, like a tattoo. From afar, in small groups, we are often mistaken for a gang of bikers.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
It was by chance, but when I saw the opportunity to get in here I didn’t even think twice. Working on a project like this, which covers so many areas and is so big, it’s intimidating at first, but it pushes me to face new challenges and reach new goals.
-What’s the fun of it?
I don’t know, there’s something to developing that is very addictive. Different languages, different paradigms, different types of problems to be solved, the fact of wanting to reach perfection or at least touch it… Every day is a new challenge and I think that’s what I really like.
Borja Sánchez. (For the record, it is ME who allowed him to modify the question.)
-Could you define what a developer is and what it means to be a developer for you?
A developer is in charge of transforming an idea, following a procedure, into a usable tool. Offtopic, the ‘developer’ thing is not as if you said that in a construction site all people working there are bricklayers… I do not consider myself a ‘developer’, because my work is not limited to typing in code to reach a solution already planned by others. In my case, a problem arises and I am in charge of analyzing, designing and developing that solution. Those are really three different jobs: engineering, architecture, and development (analysis, design, coding).
To be clear, the software life cycle is a cycle divided into these stages: definition, analysis, design, development, testing, validation and maintenance.
Only the “development” part is the developer’s job (whether junior or senior). In my case, I focus on the analysis, design and development stages. QA would be testing and validation. Support, project/commercial maintenance, definition.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
Allow me to modify the question based on what I answered before… How does a systems technician end up doing the tasks of a software architect? By getting in the company without a degree and showing my abilities based on my work. Mario Pulido (another nice guy from our company) mentored my foray into the world of Pandora FMS as a technician, but after things like pandora_ux, route parser, the distributed transactional system… it was Sancho (CEO of the company) who gave me carte blanche to define new opportunities within the product.
-What’s the fun of it?
By taking care of three stages, work tasks become something more artistic, let’s say. It is not only following step by step a model of a pre-built solution, but rather I can start laying out the basis and prepare tools that will help us in the future to make more efficient developments, which are what make Pandora FMS be really flexible.
Marcos Alconada, life giver
-Could you define what a developer is and what it means to be a developer for you?
For me, a developer is a person capable of giving life to all the ideas that you can think of, technologically speaking, of course. And the meaning, for me, is to be able to make easier for people to do their work or their work environment, be it by making simple web pages, promoting their businesses (SMEs) or giving to clients, in this case those of Pandora FMS, the option to monitor their systems more easily.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
I ended up working on a monitoring software because I consider it to be a very complete type of software. I mean, it interacts with different types of language. Until I came to Pandora FMS, I had not seen any PERL language and after all this time I already feel familiar with it. I believe that working in companies like Pandora FMS make you achieve a progressive and complete professional evolution.
-What’s the fun of it?
The best thing about my job is to develop new and cool things that I can be proud of and that make me say: “Look, I did that.” As well as looking back and seeing what I was before and what I am now. Improving both personally and professionally is one of the best parts of this job. And the free fruit that we get at the office. It is easier to work if you know that there is always a tangerine or plum in the fruit bowl.
Alejandro Campos, professional also on weekends
-Could you define what a developer is and what it means to be a developer for you?
Someone who has a demanding profession that never allows them to stop learning, even outside of working hours.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
In my case, I finished my degree in Computer Engineering and I was lucky to get in and keep on learning.
-What’s the fun of it?
Working as a team sometimes involves finding yourself in difficult situations when it comes to modifying or complementing a code that is not yours, tracing the source of a problem and it can even add more stress to the work having all the situations that could take place covered and controlled in an increasingly complex software. However, when everything goes according to plan, and more so if you learn something new in the process, there are few things more rewarding.
As we have seen, “The Developers” are those easy going artists, life givers and problem solvers who, like architects, build a building and watch over it. Your building would be the software of your choosing in this indisputable metaphor.
Computer specialists capable of conceiving and developing computer systems, as well as implementing and launching them, using only their impressive imagination, coffee, and one or more programming languages.
From here we send our deepest love for them and for their work. We love you.
E-commerce is skyrocketing, there is no doubt whatsoever. With unstoppable annual growth and close to 2,000 million users worldwide, e-commerce has already been able to surpass traditional commerce in some product categories and takes an important place in most of them. But what is the future of e-commerce?
Since its inception, back in the 90s, taking advantage of the Internet getting widely known, e-commerce has not stopped growing to become even more and more popular. And while growing, it has also changed the way it works and gotten more familiar for the customer. For example, who could think in the 90s that just a couple of decades later we would go shopping through a mobile phone?
During the next few years, it will keep on changing in order to increase key factors such as userfriendliness and user’s trust and loyalty. And in these changes, technology will of course play a fundamental role. How about taking a look at the future of e-commerce?
The future of e-commerce: 5 ways to grow
As we said, e-commerce forged its path based on changes and everything suggests that we will keep on bearing witness to a constant transformation in this sector for the next few years. Let’s take guesses trying to foresee some of the innovations that could be seen soon.
Integration between physical and online
Are you one of those who hate carrying bags around after going shopping? It looks like you’ll get lucky soon…
In the future, it is foreseeable that integration between virtual stores and their online versions will avoid this type of inconveniences. The Internet of Things will allow you to do your shopping easily (for example, pointing your mobile phone at the products you want to buy), without the need to carry them aroung and even avoiding to queue. It will only be necessary to have an account at the shop. You will be charged the total bill when you leave the store -which will be rather a kind of exhibition space- and you purchases will arrive shortly after at your home (perhaps by some of the interesting means that we will see below). It doesn’t get simpler than that.
New shipping ways
Did you know that some companies are already developing their own order shipping projects with drones or autonomous robots?
In the future, the current concept of shipping done by people will probably go down in history, leaving room to an army of different types of devices that will take the products you purchased to your home or workplace. Thanks to these types of technologies, shipping costs are expected to decrease, which would promote an even greater increase of e-commerce.
Virtual reality to buy as if you were in a physical store
Some online stores are already experimenting with these concepts and they are expected to experience a huge increase in the coming years.
Not surprisingly, it is one of the most anticipated functionalities for virtual reality for decades. The possibility of “going into” a virtual store as real (at least visually) as a physical store and buying stuff there without leaving your living room has been a much desired option for years. As virtual reality develops, it is to be expected that this new way of buying will become usual, contributing to the growth of a “different” type of e-commerce.
More customization
Customization in advertising, products and services is a clear trend today, but it seems like it won’t stop, on the contrary, it will even grow in the coming years.
Thanks to techniques such as Big Data, companies will analyze user behavior to suggest their products and services, which will be fully customized. For example, thanks to your mobile phone, companies whose services you have subscribed to will know your habits and even the place where you are and suggest customized purchase options. Of course, in this type of practices, security and privacy protection will be a factor to take very much into account.
Augmented reality
Although augmented reality requires interaction with a physical environment, e-commerce could also benefit from it.
Following our previous point, augmented reality devices will be able to provide information and suggest purchase options to users just by walking down the street. For example, if a user looks at a storefront in the physical world, the device could warn them that a certain product they are looking at is available online for a lower price.
Back to the present and to monitoring
And now that we’ve seen some possibilities for the future of e-commerce, how about we go back to present?
As we have already said, e-commerce is currently very relevant and represents for many companies the majority – or even the integrity – of their income. Is that your case? Do you have an online store? In that case, you may be interested in getting to know Pandora FMS.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Security monitoring as prevention and tool in computer security
Security Information Monitoring or Security Event Monitoring is part of Security Information Management. Yes, I acknowledge they are flashy names and that even experts have their differences about concept and scope. Here in Pandora FMS, flexibility is part of our name, so, hereby, I will abbreviate it as Security Monitoring. As you can see, it is short and manageable!
If this is your first time reading Pandora FMS blog, we are glad to inform you that in our programming plan for 2020–2021 we have included security monitoring as another element of our IT supervision software.
In monitoring systems, the use of alerts for when an event takes place, whether authorized or not, is inherent in the network system. Said alerts are easily defined with Pandora FMS to detect changes or behaviors, even suspicious ones, for their collection as data and, after being analyzed, turn them into information.
This set of alerts also includes those that are more used and interesting: free disk space, workload, etc. They are predictable and quantifiable parameters, but how can we apply it to the issue at hand, security? With the help of a very specialized software, such as Lynis, you may also obtain a quantitative analysis, with whose result you can set a security qualitative state in your system.
Metric use
Any system can be degraded if it is not properly improved over time. To know if an improvement has been made, it must be measured, quantified and compared. But in order to measure anything, it must be defined. If defined, it can be measured and monitored. That includes security.
Directly, Pandora FMS intervenes in the following key aspects, to name a few and to precise our work:
Keeping track of service level agreements (SLA): it is very important to check the expiration date on a regular basis. That way, you ensure you won’t have no support if there is a failure or no access due to a lack of license to any of the business-critical applications.
Device inventory monitoring.
Pandora FMS supports third party authentication through LDAP or Active Directory (except for users with admin permissions, who always authenticate locally), so user and password management can be handled massively. You can even monitor a server with the OpenLDAP Plugin.
Managing any other type of issue, including a security one can be managed through Integria IMS, a Pandora FMS suite software.
Supporting backup management, even for different applications, to somehow protect from ransomware attacks.
You may check antivirus programs work through software agents in an automated way, and also interactively through eHorus, another Pandora FMS suite product.
Previously we mentioned Lynis to check for updates and security patches on GNU/Linux systems, but also through Windows Management Instrumentation (WMI)® you will have a clear and exact overview of the coverage status of the possible vulnerabilities in the software installed on Microsoft Windows®.
Let’s say, for example, that you need to monitor backup executions on a weekly basis: it is important to know what success percentage you have. So you choose the metrics on the time dimension against the number of times correctly performed (that is, the pseudocode would be: number of times correctly performed divided into the number of performed backups within a week). An indicator like this gives an exact image value of your security monitoring.
What security monitoring is not
Often a great way to define a concept is by means of its “opposite”. That is why I take this chance to set what an Information Security Management System (ISMS) is. It is an extremely standardized field, whose main rule is ISO/IEC 27001, internationally, and then in each country according to its own laws.
Caption: “Deming Cycle” or PDCA: “Plan-Do-Check-Act” used in ISO/IEC 27001
Image: https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg
In security monitoring, prevention is the biggest advice, by unifying events and collected metrics. For example, to cite a critical and vital case for many companies such as electronic payment: there is the Data Security Standard for the Payment Card Industry (PCI DSS) that sets measures such as sending duly encrypted information on clients, on a mandatory basis, and the use of firewalls to prevent intruders from accessing the data you have stored about your clients. A well implemented Information Security Management System (ISMS) includes security audits, either regularly or unexpectedly (or both even), and must ensure that these two resources (and others, in addition) are working and are being used correctly.
Caption: Common firewall configuration, an important element in Security Monitoring
Image: https://commons.wikimedia.org/wiki/File:Firewall.png
On the other hand, in Security Monitoring you can offer reports about whether the security certificates for information encryption are in force and operational, so that they can be renewed in advance in order to keep communications encrypted at all times. Likewise, you will be able to monitor the company firewalls, where, how and when they are working, and restart them through alerts if necessary. These are just two examples that provide reporting tools on strong bases, but they are not and are do not replace an ISMS!
Thus, at this point, an ISMS covers many aspects and in each of those aspects, security monitoring (☑) may or may not be present:
Patches and updates ☑ and their automated management.
Antivirus status ☑, as well as the network status regarding spam filtering.
Staff training regarding fraud and its prevention ☒.
Network and computing resource usage ☑.
Mobile devices on your network and its security ☒. (Although, at least, you can report connection times, megabytes consumed, etc., the basics).
Services and their accesses through user permissions ☑.
Data leak ☒. Delicate task, mostly based on staff surveillance (although you will be able to monitor the application records in the company and generate reports that look for specific fields and values in them).
It is important to fully comply with the legislation in each country ☒.
Depending on the size of the company, evaluating whether it is possible to implement Unified Threat Management, which despite its disadvantage of being a single point of failure is relatively easier to manage and security monitoring can benefit from it ☑.
ISMS Tools
I do not intend to name them all, and I explain it oriented towards security monitoring:
Network audit: looking for router models, which ones connect the company or cataloging information. In its analysis, models are correlated against firmware installed versions, exposed ports, etc.
Perimeter Security: it sets or determines the different layers or steps, from the point of view of outside the company, to “get” to the network audit components.
Penetration test: the so-called red team, personnel totally foreign to the company and coordinated to attack and try to enter without knowing the previous audit information.
Web audit: both internal to the web server within the company, and its encrypted synchronization to the web server hosted by third parties on the Internet. It also includes legal aspects.
Forensic Audit: to perform an exhaustive analysis of post-mortem incidents. In case evidence is needed, part of them can be provided by Security Monitoring.
Before finishing this article about security monitoring, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Read our related success story and see the results we’ve got
Digital maturity; find out what it is and if your company reached it
Do you know what digital maturity is? Do you understand how achieving it can affect your company? Do you know how to detect if you already reached it?
Knowing what digital maturity is and the ability to assess it can be essential for a company. In this article we will find out what digital maturity is and see some clues that can indicate the degree of digital maturity a company has. Shall we get started?
What is digital maturity?
Digital maturity is the degree to which a company is able to take advantage of digital technologies to improve in all possible areas, from economic performance to relationships with customers, including business processes, productive processes, internal relations, etc.
The concept of digital maturity is closely related to that of digital transformation. If we understand the later as the process that companies carry out in order to incorporate and take advantage of the use of digital technologies, digital maturity would be kind of a goal to achieve, a place where you can look back and think “we have done a good job”.
But it doesn’t end here. There are a some aspects you have to take into account.
Digital maturity is not static. As digital technologies get developped (and this keeps on going, and at an ever-increasing rate!), you will have to continue incorporating them into your company in order not to be left behind.
It is not always easy to understand if you have managed to reach digital maturity or if, on the contrary, your company is a “newbie” who’s lost when it comes to using digital technologies.
How can I know if my company has reached digital maturity?
Even knowing that it is a dynamic concept and that, therefore, you cannont stay in your comfort zone, it is legitimate to wonder whether at a certain point you have reached digital maturity. The answer to this question can indicate both the digital transformation stage you are in and whether the practices you are doing are bearing fruit. Although each company has its particularities, there are clues that may guide you. Let us take a closer look at a few of them.
Do you have digital awareness?
It is something that should encompass the whole company and can influence it on many levels.
On the one hand, you must have your digital transformation goals clear as well as what measures you are going to take to achieve them, without forgetting to set ways to measure the degree of success achieved. On the other hand, it will be necessary to take into account the digital dimension in all the important decisions you make regarding the company. Are you doing it?
Furthermore, do you have the importance of digital technologies in customer relationships clear? Do your employees have in mind the importance of the company’s digitization?
At the end of the day, it is all about always keeping in mind the digital field, its importance and never losing sight of it. Is it like that in your company?
The most important point is the customer
If that’s not clear for you, well that’s pretty bad. The client is essential, that is why it is located in the center of digital transformation. If we do not keep all this in mind, it will be impossible to know what our degree of digital maturity is.
Let’s see some more specific questions. We assume that you have a website and an online store (if applicable), but that’s only the beginning. How many digital communication channels do you keep open and with what degree of effectiveness and satisfaction? Have you reached omnichannel? How well do you handle mobile technologies? Have you thought about responsiveness? Do you have your own app? How do you handle social networks? They are just a few questions. Ask yourself many more and evaluate your answers.
Do you use digital technologies internally?
Remember that using them in customer relationships is only one of its aspects. Digital technologies can be used in multiple fields, such as internal communications, different kinds of processes or flexible work ways, among others. Are you using them?
Furthermore, its use will frequently require training and learning. Can your employees use and take advantage of them? Do you have specialized staff in key aspects, such as management or maintenance? Is all of this Greek to you? Then you have a lot of work to do yet…
What about data?
This is a very specific aspect of the internal use of digital technologies. Data is nowadays a hot topic more than ever, but do you know what to do with it? Technologies like Artificial Intelligence or Big Data are not just something to chat about over coffee. Many companies use them in their day to day and have incorporated them in processes such as decision making.
In addition, you should not lose sight of other issues such as the correct data management. Is it effective? Is it safe? Data is important, don’t forget about them!
Look around you and don’t stay behind
We already warned you: reaching digital maturity does not mean that you can stand still and get a pat on your back. You can have it one day and start staying behind a short time later.
Digital technologies don’t stop and neither should you. Look around you. The world around you. Analyze other companies, learn from their successes and failures, and try to stay ahead of them. Are you a digital leader?
Are you investing in digital technology?
This is all very nice, but if you do not invest, you will most likely have tremendous difficulties reaching digital maturity. How much do you spend on digital technologies? Do you consider it enough or not? Furthermore: Are you taking advantage of the technology you have? Do you have technology that allows you to monitor the state of the technology itself?
Digital maturity and monitoring
To finish off, there’s a key issue left: monitoring.
Monitoring systems are responsible for surpervising IT systems (hardware, networks and communications, operating systems or applications, for example) in order to analyze their performance, and to detect and alert about possible errors.
The very fact of having a good monitoring system for computer systems can be key in determining whether your company has reached digital maturity or, on the other hand, has still has a long way to go.
Pandora FMS can be applied in businesses large and small, read our success story
Do you still not have a good monitoring software? Do you already have one but want to explore other alternatives? How about discovering Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
The network discovery software that turned Pandora FMS upside down
Previously, in Pandora FMS blog, we learnt a little about the great revolution that the Discovery feature brought to Pandora FMS. This tool reduces the complexity of certain existing features in Pandora FMS, and also introduces new tools that turn this software into a complete monitoring system.
In today’s episode we are going to take a walk through the bowels of one of its tools, Discovery Net Scan, which is an exponential upgrade to recon tasks. Are you ready?
Network discovery software: What is Discovery Net Scan for?
Discovery Net Scan is created to discover devices on a network, simultaneously kicking off some kind of monitoring for those devices.
Let’s see those real examples that you like so much. Imagine you are going to start monitoring your office, where you can find multiple devices connected to the same network. Within these devices, there might be personal computers, servers, routers… The thing here is to monitor every last device you have in your office. This would lead us to have to create each of the agents that point to these devices individually, which takes a lot of time and effort. Thanks to this tool, however, all these agents will be created automatically by just configuring a Net Scan task.
Network discovery software: How does Discovery Net Scan work?
We will explain how Net Scan task configuration works following several steps:
To begin with, enter a descriptive name of the chekup that you are going to carry out, such as the name of the network that you want to monitor.
Then, enter the network or networks that you want to discover with your network discovery software, adding the IP and the mask that you are going to analyze.
Enter an interval with which this task will be executed automatically or configure it to be launched manually.
Once you have entered the general fields, configure the initial monitoring that you will perform on the devices found:
a. You can choose a template with predefined modules.
b. You can choose SNMP monitoring if you correctly enter the necessary data to do it.
c. You can specifically monitor Windows elements thanks to the existing WMI tool in Pandora FMS.
d. You can detect additional information from the devices, such as their operating system or whether they belong to a VLAN.
Once created you can see the task being completed, as well as be able to edit or delete it.
This is how a Net Scan task is configured to start discovering new devices within a network. But… how does this task work underneath?
In order to perform this task, Net Scan relies on a library developed by Artica ST that is located within the server that executes the task, which is in charge of retrieving the network information of the elements to be discovered. It retrieves all available information from discovered computers and devices, in addition to that information configured by the user with the data entered in the configuration itself. With this information, and whenever SNMP is enabled, it tries to link all the devices found by checking different elements, such as path calculation or connected interfaces.
Network Discovery Software: Differences Between Recon Task and Discovery Net Scan
After reading all this information about Discovery Net Scan, you may wonder what the differences between old recon tasks and this new system are.
The first major difference between the two is the network device discovery improved performance and the increased scalability of the code used for such discovery.
Task configuration has been visually enhanced, simplifying the view for the user and the data to fill in. Additionally, once you have completed the Net Scan task, in the list of completed tasks you will have the option of displaying a network map representing the relationships found regarding the discovered devices.
As for monitoring, with the change of code to perform the discovery, the possibility of making WMI queries for those network Windows devices has been added, which also means obtaining additional information from said devices.
Finally, regarding event creation due to discovery, all the discoveries of a single Net Scan task have been reduced to a single event, unlike recon tasks that created an event for each device found. Thanks to this, server performance and database occupancy are improved as it does not have to generate as much information.
This tool, like all those that make up Discovery, is becoming very important within Pandora FMS. That is why, little by little and with a lot of work from our R&D team, we will keep on improving it to make Pandora FMS a more complete, fast and intuitive system for the user.
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
What is SIEM? The help that you need to keep your business safe
SIEM (Security Information and Event Management) is a kind of software whose purpose is to provide organizations and corporations with useful information. “About what?” you may wonder. Well, about potential security threats related to your business networks. SIEM does this through data collation and by prioritizing all kinds of dangers or threats.
In general, we already answered the question “what is SIEM?”, but how does it do it? The answer is that it does it by means of studying security data that was previously centralized and obtained from several systems, including antivirus applications, firewalls or any type of intrusion prevention.
With SIEM working, you can proactively manage and join in investigating potential failures or vulnerabilities in your system, circumspectly forewarning your company and your customers. Nobody wants data leaks and with SIEM you can avoid them. If you’re a nerd like me, you can think of SIEM as a benign Eye of Sauron fixing its fiery pupil on your overall system situation, in order to help you focus efforts where more help is needed.
What is SIEM? Where does it come from?
Where does the term “SIEM” come from? Well, you can find it already in a 2005 article, called “Improve IT Security with Vulnerability Management”. The term is the sum of concepts such as “Security Event Management (SEM)” and “Security Information Management (SIM)”. SIEM is made up by the best of both doctrines.
If you know SEM, you will know that it is in charge of covering monitoring and event relation in real time. At the same time, it warns of configuration and console views related to undertaken activities. SIM, on the other hand, is responsible for collecting those data and taking them to the next level. It includes the storage, study and production of reports on the results.
What is SIEM? Why is it important?
Well, we all know that no one is free from evil because, my friend, evil never rests. That is not a secret. Superman knows it. And we would all be shaking under our beds at home, going nuts with those security threats that continually increase and that can come from anywhere, if it were not for such blessed arrangements like SIEM.
One of the obsessions we have seen grow is that, accidentally, a not very skilled employee misconfigures security settings, exposing data that may be vulnerable to an attack by someone more skilled. So that this does not happen and the unskilled employee can breathe easy without jeopardizing his position, IT experts have developed different systems to defend us against intrusions and the whirlwind of multiple leaks that threaten us. Bravo for IT experts! The bad thing is that this type of protection systems can generate such a necessary amount of information from monitoring that IT teams cannot cope with it. They have to take in all this data, analyze it and interpret it, in order to recognize problems strictly speaking. This is not feasible for under-staffed IT Security teams. A core volume of security data that must be analyzed and filtered to reach actionable alerts, all quickly and effectively… how to say… not compute.
And this is where our good friend SIEM appears, the most awaited software by IT security teams in the world. With SIEM, IT experts are provided with an effective method that automates processes and centralizes security efforts. An ideal way to help simplify the immeasurable task of protecting sensitive information. SIEM is the advantage that helps professionals distinguish between a low or low risk threat and one that can end up setting your business on fire, worst case scenario.
What is SIEM? Its key features
The SIEMs available in the market have in common certain points, the most important for your goals. Among these, you may find:
The ability to centralize and expose potential and most urgent threats.
Distinguishing between threats that need to be deal with and those that are only a pleasing background noise.
Escalate and report threats to the appropriate security engineers so you don’t waste time addressing the issue.
Contextualize security events and thus provide an option for an adapted and well-argued resolution.
Document in a log each event that took place and how it was handled until solved.
After getting into the technological ins and outs, are you hungry for more? Would you like to go even further in the world of technology? What about spending a couple of minutes to know what computing system monitoring is and why it is also very important?
Monitoring systems – do not mistake them with SIEMs, because they are another different type of software– are in charge of supervising technology (hardware, networks and communications, operating systems or applications, for example) in order to analyze their operation and performance, and to detect and alert about possible errors. And this leads us to Pandora FMS, that wonderful tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Load spikes? We give you some tips to optimize MariaDB
This 2020 is perfect to check our beloved Pandora FMS server and precisely a very important component is the database (BD). As our loyal readers already know (and if you visit us for the first time you can read the introduction to architecture on our Wiki), MariaDB is one of the databases chosen by Pandora FMS to keep all your information about your device monitoring: Let’s see how to optimize MariaDB!
I am a big fan of GNU/Debian, specifically its GNU/Ubuntu distribution, but for Pandora FMS CentOS is officially recommended due to its high development stability. No worries, here you have the first tip: install MariaDB on CentOS 7.
Our second tip, as an introduction to today’s topic, is the number of devices you must monitor. For one hundred or more, apart from recommending you Pandora FMS Enterprise Version, you should use a High-Availability Database Cluster or simply HA. The following short video introduces the subject. If you want to learn more, read the article in our blog specific on this topic.
Please accept marketing cookies to watch this video.
Whether you use a single server, several or many of them, you will always have in each instance a database managed by MariaDB stoically withstanding load spikes.
Who uses MariaDB?
Before optimizing MariaDB to receive load spikes, let’s see a short history… it’s short, I promise!
Wikipedia®, Google®, WordPress®, among many others use MariaDB for mission-critical tasks. There you have it, I told you the story was short, right? Ok, I know, you need to know a little bit more.
You may already know this: MariaDB is the fork of MySQL® but with a totally free license (GNU General Public License). It’s been developed and maintained since 2012 by MariaDB Foundation (MariaDB), and one of its golden clients is MariaDB Corporation.
Caption: MariaDB Foundation https://mariadb.org/about/#logos-and-badges
A MariaDB bronze client is Percona.
Since 2013, Google® hires engineers to work at MariaDB. Other companies have followed suit, or donated billions of dollars to the foundation.
Michael Widenius is one of the creators of MySQL. “My” is the name, in Finnish, of his oldest daughter and “Maria” is the name of his youngest daughter and the storage engine that was born long before MariaDB. To differentiate it, they later renamed it Aria. MyISAM is the counterpart of Aria.
Caption: Michael ”Monty” Widenius
https://commons.wikimedia.org/wiki/File:Michael_%E2%80%9DMonty%E2%80%9D_Widenius_at_MariaDB%E2%80%99s_Developers_Unconference_2019_in_New_York_City_04.jpg
Of course, due to all of this, MySQL and MariaDB are like sisters both in theory and in practice, but hold on, there are important differences!
Right at the time of writing this article, MariaDB is in its stable version 10.3.21. Since version 10.3.7, it has set itself far apart from the use and development of InnoDB.
InnoDB in turn replaced MyISAM as the default storage engine for BD tables in both MySQL and MariaDB.
There are many database storage engines, even Facebook® has its own that makes the most out of the use of solid state hard drives. There is another extremely fast one that is only stored in RAM memory and when you turn off the computer all data is erased. Others have only academic interest. Here we will talk a lot about InnoDB.
Load spikes
A load spike, in computing, takes place either due to our interaction and/or human activities or due to unforeseen events. The very fact that we all go to work at 7:30 in the morning every day creates a load spike for any computer system, for example. We must learn to live with load spikes, deal with them, or at least mitigate them to the best of our ability. Let’s see how to improve MariaDB for that purpose.
Tips
Maximum number of connections (“max_connections”): one hundred and fifty-one by default. Some recommend raising it to 750 or even 1000. I think that we obviously should raise it but without losing sight of the hardware and/or virtual resources we have. So I don’t really set a specific number. Limits: minimum 10, maximum 100 thousand).
Thread_cache_size: The role of these threads is to stay in memory for up to five minutes in order to be reused if possible. It is related to the previous point, the default value is 256. If we raise that one to more than 256, this one rises automatically to the same value. You could first try the maximum number of connections at 256 as a first step and evaluate the performance, although I would dare to say between 150% and 200% the value of the maximum number of connections. Limits: minimum 0, maximum 16384.
Thread Pool: I mention it because activating it spoils the last tip. This feature is useful if we know in advance that we will have lots of short queries that will involve extra calculation work for the processor. Although Pandora FMS uses more the CPU to limit the data from the last 30 days and the rest it does is receiving and saving, which is why I consider that these threads are not any more useful in our case.
Sync Binlog (Synchronization binary log): this would be enough for a whole article. Essentially it means sacrificing a bit of speed by ordering the operating system to write on disk after every transaction. That way, you prevent data from being lost from synchronization to database replicas. Since the default value is zero (it is in the hands of the operating system), if you increase the value to one, which is the slowest, you have to pay attention to increasing it further if you see things go too slow.
InnoDB optimization: As I mentioned, InnoDB is very important and MariaDB uses XtraDB, a Percona-improved version for InnoDBD. At programming language level, you will not see XtraDB, since it identifies itself as InnoDB. Yes, quite a headache. However, it shares common features, and the first advice of this group to optimize MariaDB is to modify the InnoDB Buffer Pool Size. Again it depends on your hardware or virtualized resources, but it is always good to set it up to a maximum of 80% of the memory, as long as you do not have other software running on the same server and all your tables are InnoDB. Limits: minimum 5 megabytes, by default 128 megabytes. If you assign more than 2 gigabytes the number of instances must be increased (divide the pool into logical units), maximum 8192… petabytes!
InnoDB Log File Size: depending on the value you set to the reserve fund, you will have to assign half or less. By setting a larger size for this log file, it reduces writing at the expense of increasing the recovery time if there is a failure (for example a power cut, which is quite common, or someone shutting down the server manually). Limits: minimum 1 megabyte, 48 megabytes by default, maximum 512 gigabytes.
InnoDB Log Buffer Size: Here I recommend a figure, 64 megabytes, which reduces disk writing and reading. Limits: minimum 256 kilobytes, 16 megabytes by default, maximum 4096 megabytes.
InnoDB Log Flush Interval: here there is nothing to change, its default value is one. But if your power supply is completely reliable, you can change it to two to increase performance. I repeat, if you are really confident that the Uninterruptible Power System (UPS) won’t disappoint you!
InnodB IO capacity: this last tip to optimize MariaDB is better described with the storage hardware you have, although it is an approximation because you actually have to do specialized tests on each particular device. It is measured in operations per second (IOPS) and has a default value of 200 units, a value suitable for hard drives of 10,000 RPM. You must lower it to 100 (one hundred) for discs of less than 7,200 RPM. With solid state hard drives you can take it to 1,000 (thousand IOPS)!
Before finishing this article about optimizing MariaDB for load spikes, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Hughes India and Pandora FMS joined together as partners
Pandora FMS keeps making friends. We like to make them all over the world. With them, we learn and share the best we have. They in turn play their part, creating a smooth professional harmony capable of achieving the impossible in the world of technology.
This time, Pandora FMS has had the pleasure of collaborating with and considering Hughes India as a unique partner. Together they seem to be on their way to an excellent and promising teamwork.
Who is Hughes India?
Hughes India is a subsidiary of Hughes Network Systems, the well-known world leading brand in providing satellite broadband networks and services. It offers advanced solutions and business offers for both public administrations and companies.
Hughes India is the largest operator of this type of service in their country, and for more than two decades they have been working, with increasing intensity, to reduce the existing digital divide between the community and large companies, achieving, among other notable goals, a great contribution to disaster prevention and recovery. We could not miss the chance to have them as allies.
But that was just the beginning, Hughes is present in all key vertical markets: banking, education, energy, defense, telecommunications or retail sectors, in addition to addressing the connectivity needs of multiple government departments.
How did we meet?
Being the best one comes with great responsibility. Superman knows it, Beyoncé knows it and so does Hughes India. And this is easy to say with the huge customer base and more than 100,000 active VSAT nodes the company has throughout the country. An honor and a huge commitment at the same time.
Hughes India used the same dashboard for many years, but times change and they saw the need to change along with them: give a new image to their network management portal to update user dashboards, have a common dashboard for nodes distributed across different gateway locations, providing detailed statistics for 100,000 nodes, and prioritize their new project to provide MPLS solutions to their customers, for example.
At Hughes India, they had multiple technologies and solutions to take seriously, and although at first they tried to cover the issue with different measures, such as an HP NNMi solution with the SIP portal or adding some open source solutions based on the client, finally they decided to go ahead with a common platform for all their clients. And, here, friends, is where Pandora FMS comes in.
Impressed by our software features, especially the ability to monitor devices on a distributed platform and its ability to support more than 100,000 nodes, Hughes India couldn’t be happier about choosing us. Only one challenge remained: tailoring the initial configuration to their needs. But thanks to Pandora FMS support and after-sales teams, they were able to change these settings with no issues to be able to monitor VSAT devices quickly.
Immediate Results
The results of this union between Pandora FMS and Hughes India did not take long in showing and being recognized by their clients. Hughes has been able to provide all of them with an updated and centralized dashboard for VSAT nodes distributed across satellite networks and MPLS infrastructures. In addition, it has also allowed them to design dashboards according to the displaying preferences of each client.
So has Pandora FMS met Hughes India’s expectations? Let’s see what Ashutosh Agarwal, their National Manager of IDC and MPLS Backbone Services tells us: “Thanks to Pandora FMS we can meet customer expectations regarding dashboards and centralized monitoring. This has contributed to creating an atmosphere of trust between the departments in charge of its operation. Pandora FMS has proven to be a great product, with many features backed up by an excellent technical support team”.
You see, we are still at the beginning of this adventure together, but don’t tell me you don’t have the feeling this is going to be great. “What do you say?” Do you want to become friends too?
1 ) A robot shall not harm a human being or, by inaction, allow a human being to be harmed.
2 ) A robot must comply with the orders given by human beings, except for those that conflict with the first law.
3 ) A robot must protect its own existence to the extent that this protection does not conflict with the first or second law.
What are they, and will they work in the real world?
The 3 laws of robotics are one of the best-known statements in the history of science fiction, and have often been taken as a reference when speculating on how we should create intelligent beings without them ending up harming or even destroying us.
Formulated in 1942 in the story “Vicious Circle”, by the famous writer Isaac Asimov, the 3 laws of robotics have become part of the collective imagination, to the point that many people think that an exact formulation of these laws could protect us from a hypothetical “robot rebellion”.
However, things are not as simple as they seem. In this article we will learn what the laws of robotics are and why they would not work if they had to be applied in the real world.
These precepts not only appeared in “Vicious Circle”, but were repeatedly alluded to in different stories by Asimov, and even in many later works written by other authors. According to Asimov himself, the purpose of the 3 laws in fiction would be to prevent a possible rebellion of the robots. Thus, in the event that one of them tried to violate any of the laws, the electronic brain of the robot would be damaged and it would “die”.
However, if there is one thing we know, it is that reality is very complex and it is impossible to subsume it in simple statements. And this was not something Asimov ignored, far from it. On the contrary, in some of his later stories he would pose situations in which the 3 laws could come into conflict.
This was one of the reasons why, in the 1985 novel “Robots and Empire”, Asimov would include a 4th law, called the Zero Law of robotics:
0 ) A robot will not harm Humanity or, by inaction, allow Humanity to be harmed.
This Zero Law was, in fact, intended to rule over the remaining laws of robotics, in order to resolve possible conflicts. However, it would also encounter serious obstacles “in practice”.
Why wouldn’t they work in real life?
Let’s imagine that, at a certain point, we managed to develop robots endowed with intelligence. And imagine using Asimov’s 4 laws of robotics to control their behavior. What would we expect?
Probably, we would be met with a resounding failure.
And it is not that Asimov was not skilled enough in formulating them (quite the contrary!), but that they were children of their time, and moreover, they were intended to control something that is possibly uncontrollable. Let us explain all this a little better.
The laws of robotics -especially the 3 initial ones- were created in a context in which computer science had barely begun its journey and Artificial Intelligence was a concept purely confined to science fiction.
Therefore, Asimov’s approach was that of the predetermination of the robots’ actions. All their behavior would be foreseen through exhaustive programming that would attempt to control every last detail.
However, Asimov himself warned us in his stories of the dilemmas that this could entail. Reality is enormously complex and conflict situations can arise frequently. But not only this.
During the last decades, and especially in recent years, the concept of Artificial Intelligence has been closely linked to what we know as machine learning.
This technique allows – very roughly speaking – programs to learn from experience in a more or less autonomous way. Thus, they repeatedly experience certain types of situations, after which they extract patterns that they will use in order to achieve a specific objective. This is the technique by which some programs are learning to identify images, drive vehicles or understand human natural language.
This makes us think that, if we were to develop a General Artificial Intelligence, as proposed by Asimov, it would not be completely programmable, but would be able to learn based on its own experience and draw its own conclusions.
Thus, the question arises,
Would the laws of robotics be able to control the behavior of an Artificial Intelligence developed on the basis of machine learning principles?
Even more. Although it is a hypothesis, many authors think that, once the development of a General Artificial Intelligence is achieved, it would be able to continue evolving, becoming more and more intelligent and surpassing by far the capacity of human beings.
Wouldn’t such a powerful intelligence be able to find loopholes in its code to be able to break pre-programmed laws? For example, it is not difficult to imagine that, over time, it could override the mechanisms developed to self-destruct in cases of non-compliance with laws.
Notwithstanding the above, the fact is that the debates that Isaac Asimov raised through his laws of robotics continue to be valid today and could receive a lot of attention, almost a century after he captured them in his stories. Almost nothing! Any writer would be proud to make us imagine so much and for so long.
By the way, before you go and look at your robot vacuum cleaner with a suspicious face, how about discovering Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Do you want to know more about what Pandora FMS can offer you?
Perfect telecommuting open tools to work from home
«Every cloud has a silver lining». Popular sayings are wise and pragmatic. This year we added coronavirus and telecommuting to our daily vocabulary. Both words are compounds and the first one represents a danger that has massively propelled the second, whether we like it or not. Therefore, regarding remote working, in this post I will tell you all about the telecommuting open tools that we can use at home. Let’s go!
Very few countries, lucky them, have not been “visited” by COVID-19, but most of us are suffering from a very insidious pandemic. The creator and founder of Pandora FMS, Sancho Lerena, very well describes the current situation, that will keep on going for at least several more weeks at the time of writing these article (depending on the country where you are).
Certainly, there are companies that have been working remotely for years, and if we go back centuries, we can find news correspondents in distant countries as the pioneers (of course, although not working in real time). In the 21st century, with hardware developments and the ubiquity of connectivity, we have been increasingly working remotely, which calls for telecommuting open tools. According to surveys and data, roughly 70% of people want to be able to telecommute, but currently only 40% of companies have been able to actually implement it (keep in mind that, due to the nature of each profession, only around 22% of the workforce can work remotely). Before COVID-19 made an appearance, in Europe 15% of workers worked remotely, just once in a while. So we just had an increase of at least 25 points all of a sudden!
Caption: “Brooklyn home office (Wikipedia https://commons.wikimedia.org/wiki/File:Brooklyn_Home_Office,_Minimized,_At_Night.jpg )
It turns out that the modern trend is for you to do the work that many employees used to do before. In my case, in my youth I was trained as a cashier in a bank and now the vast majority of people carry out their own financial operations online (service and tax payments, insurance procedures, stock market operations, etc..). Therefore, there are just a couple of times when we have to actually go to a bank, and this is also happens in different economic areas and even government entities.
Given this situation, it is necessary to know what software we have available and evaluate it in this already changed and irreversible world of ours, without losing sight of our self-sufficiency thanks to the benefits of telecommuting open tools.
Pandora FMS
Obviously, our community version is a telecommuting open tool that will definitely help you supervise and control your computers in the office or workplace to a greater or lesser degree. Alerts will allow you to focus your time mainly on your work. You will only receive them if something that really needs your attention happens, which will ease your mind.
Now, if we really want to access our personal computers located in our office facilities… Can Pandora FMS help us? Yes, indirectly through eHorus, which can be integrated into Pandora FMS. But wait, there’s more…
eHorus for remote control
Caption: «eHorus logo»
eHorus was created years ago as an ideal complement for Pandora FMS. I use it myself with my clients -for free up to ten devices-, not only to be able to connect remotely, but also to perform basic monitoring. It can be used separately from Pandora FMS, since it has its own software agent and is managed online from its website. We can see what services are running, stop them, restart them, manage files and other tasks. The key point is that when installing the agent, we set our own access password, not shared by anyone else, not even by eHorus itself. With this tool and Pandora FMS, it will be as if we were sitting in our usual workplace.
OS: GNU/Linux
Caption: Debian 10 Buster image for wiki
( https://wiki.debian.org/DebianArt/Themes/futurePrototype )
In our homes, we can install GNU/Linux as a second operating system or, even better, keep to that end an old computer from the last five years and install Lubuntu, which takes up less resources than Ubuntu. There are different versions that come directly from the Debian distribution, and even with non-Linux kernels like Hurd or NetBSD. In the case of Pandora FMS, CentOS is recommended. This would be a very stable base to start working from home.
Caption: CentOS logo ( https://commons.wikimedia.org/wiki/File:Centos-logo-light.svg )
Web browser
Caption: About Chromium version 81
You know even more than me about this. However, I have to mention it because it is extremely essential today. Almost all applications and/or hardware already offer some web user interface. Just as I love Debian, I insist on continuing to use Mozilla Firefox, but I recognize that Chromium works much faster, although none of them are efficient in memory consumption. If the name rings a bell, yes, just as Debian is the source of many distributions, Chromium as a project comes from Google Chrome® and shares its rendering engine, called Blink, with other browsers like Microsoft Edge® and Brave®.
LibreOffice® (version 6.4.4 and previously called OpenOffice® and StarOffice®) is a complete office suite that comes bundled with most GNU/Linux desktop distributions, and comes with the following applications with very intuitive names:
Math: To edit mathematical formulas.
Draw: For basic image editing, organization charts, flow charts, and even 3D objects.
Impress: For slideshows.
Calc: A spreadsheet that fully supports Microsoft Excel®.
Writer: The text editor with which this article was written.
Caption: LibreOffice® Write opening a document stored in Google® Drive through a linked account in Ubuntu®
ownCloud
Caption: OwnCloud logo
Online file hosting services offer today many alternatives, but it is worth highlighting ownCloud and its fork Nextcloud. As its name says, it allows our own online server to share files, control their version and their encryption, control favorites, public calendars, contact management, etc. It uses the new WebDAV protocol to handle these files. This protocol was proposed by Jim Whitehead to the World Wide Web Consortium (W3C) following the vision of Tim-Berners Lee, considered the father of the Internet. You can use MySQL as a data server for that purpose and, if necessary, they offer payment alternatives for storing, if we want to delegate our management work.
There are also plugins that we can install for text and/or video forum chats, but we must evaluate them well since most of them are not official.
Etherpad and Ehtercalc
Both projects, Etherpad and Ethercalc are also telecommuting open tools, since they allow you to keep documents online to edit them in real time with other people. This can be done by any computer at home (or hosted on the Internet or in your company), as long as you install the Node.js environment which runs JavaScript language (on the client side in your web browser it also works with JavaScript). Once that is configured,call the package manager npm with which you will install Ethercalc for the spreadsheets. For Etherpad it is a little different: you also need Node.js but you will be able to clone the repository from GitHub. These are very practical programs, where security and permanence are not covered.
Drawpile whiteboard
Caption: About Drawpile
Do you remember the chalk and the blackboard? Sometimes we need to express our ideas quickly by drawing diagrams or flowcharts by hand. We just clone the project from GitHub and compile it either as a dedicated server and/or as a client as well. If you find it very complicated, you can also install it with the help of Flatpak, a package manager that will do the entire download and configuration process for you.
After installing, run Drawpile and show your ideas (yes, look at the image above, I have no talent for drawing). Choose the option to host a session, either on your local area computer by address (plus some adjustments to the firewall of your computer) or simply use the publishing service on drawpile.net for all your teleworking colleagues.
Mastodon Social
Caption: Join Mastodon
The need for communication in telecommuting is essential. There are tasks that are not urgent or worth starting a video call or email, just a message is enough. Mastodon is quite similar to the social network Twitter, with the difference that we can set up our own servers and join a federation. This is a long-term task, due to the complexity and work involved in managing a social network by ourselves, but if this quarantine becomes longer then…
Now, if you want to try it, find out in which community you feel more comfortable. And remember: if you’re not fond for any community or after joining you don’t like it, build your own instance.
Riot team chat
Caption: Riot im sign up welcome
With Mastodon, we must install the same software on each of our servers and then join the federation (they will generally accept us with no issue). But, what about a communication method involving a protocol (or “language” if you want to see it that way) for a universal federation?
The Matrix protocol (nothing to do with the film) was created for that purpose and it is part of an even larger project called Web Real-Time Communication (WebRTC). Essentially the idea is to be able to share audio and video between pairs without installing anything additional, just your favorite software and that’s where Riot team chat comes into play.
You can download the desktop version for your computer or copy the project from GitHub and unzip and configure the digital certificates to have your own server. Messages are sent and received in JSON format and are thus end-to-end encrypted.
What’s surprising about this protocol is the growing amount of apps and platforms that have joined: for iOS there is Ditto Chat, Nio and Pattle and FluffyChat for Android and iOS. For our computers there is Spectral, Quaternion, nheko Reborn, Mirage, Fractal and Seaglas. Even there are clients for command terminal and Nintendo 3DS (Miitrix)!
Kanboard
Caption: Kanboard
Finally, I present you my favorite telecommuting open tool, to such an extent that I have collaborated in its translation into Spanish: Kanboard. Based on the Kanban method (“fence” in Japanese), it is based on placing cards on it and moving, creating, destroying or reusing these labels to display the steps taken or to be taken. It was developed by the Toyota® automotive company to order and increase its production.
It is also used in software development, but it is used in remote work to set up our own server with MariaDB as a database and centralize our projects and tasks. It has a large number of plugins but it is minimalist and, if you like, even a little spartan.
Maybe when you try it, you will get the impression that it is yet another to-do list program, but don’t be fooled. It has an extension to connect via LDAP, which will allow managing a good number of users. In addition, it has images created for Docker, it allows to keep a chronometer to the tasks that we carry out and also to set tasks and events to warn the members to hurry up or about a deadline. We will be able to respond to events such as finishing a note with the assignment of a new task and/or notification to other users. Also you can set reminders based on time events or add predefined tasks at the beginning of each week, month, etc.
Before finishing this article about telecommuting open tools, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Pandora FMS employees choose their favorite video games
A long, long time ago, almost before Pandora FMS green color became part of the rainbow, a revolutionary idea came from the heart of the company: creating an arcade machine, like those of arcades, so that our staff here could play at breaks, like they do at Google offices.
This extraordinary fantasy flowed from the brain of one of our former workers, Miguel de Dios, to whom, although he has the name of a western movie character, we owe everything. He got the supplies and ordered the components from the company. In his free time, also as a hobby, he began to make it.
Once assembled and fully programmed, the light that overflooded our spirits shone and the fun began. Since then, and in the absence of getting a human foosball, it is an essential part of our well-being and fun in the offices.
To show you that you should not take our love for this machine lightly, we are going to ask those who are really into it in our company what their favorite game is, where they played in the golden age of arcade games and what is their personal record in any of them.
–Dimas Pardo López, Communication.
The arcade game that you liked the most?
My top is: 1) Street Fighter II. 2) Tumblepop. 3) Metal Slug.
Please accept marketing cookies to watch this video.
Where did you play?
La Rosa Arcade. My father sent me to mass and I would spend masses there. I could spend the whole the morning playing with the few coins my grandfather used to give me on Sundays. I loved that place. Then it became the meeting point before going out to party at discos and thousands of motorcycles gathered at the door. Then came the times when everyone had a console at home or preferred internet cafes. They had to close it and now it’s just a bar in my hometown.
Did you seta a record
Honestly, I wasn’t very good in any of the games. I preferred to watch the older ones play. It was exciting. Much more than watching soccer or motorcycle racing on TV. There were real machine heroes. The Lottery man once arrived with quite a bunch of coins. I remember that we were all there supporting him and we celebrated all together when he won.
-Sara Martín, Human resources.
The arcade game that you liked the most?
Ghosts ‘n Goblins.
Please accept marketing cookies to watch this video.
Where did you play?
At a friend of my mother’s who had four real arcade machines at home and a pool table. I used to spend my childhood evenings with a couple of friends there. Then I discovered Counter-Strike and I started going to the internet cafe in my neighborhood.
Any records?
I think I still have the record for Pang in a Majaelrayo arcade, I should go back to see if it is still around.
-Eduardo Corral, Projects.
The arcade game that you liked the most?
I always loved Golden Ax, although I was very bad at it in general. I also spent quite the time on Metal Slug and Street Fighter II.
Please accept marketing cookies to watch this video.
Where did you play?
Well, I played in an arcade in Ferrol a long time ago, almost as much as it has been closed.
Did you set a record?
Well, unfortunately no records. Also, it was hard, because it used to be very crowded so there was no time to fully devote yourself to any game. It was tough being a skinny kid in an arcade full of teenagers trying to play tough.
–Manuel Montes, Development.
The arcade game that you liked the most?
One game I fondly remember is Outrun. You drove your convertible, with the sea at the background… it was kind of cool. But the most exciting ones I remember are Street Fighter for the competition between players and Pang for the fights when I played with teammates. They were epic.
Please accept marketing cookies to watch this video.
Where did you play?
In my time, games were not a game. You see, in arcade games, when I was fifteen, the room was full of hormones. Each game costed an important part of your weekly allowance, but more important than money was social status: if you played a game very well, you were admired by everyone.
Did you set a record?
I played ping pong in the arcade holding the paddle with two hands. If you can consider that some kind of record or virtuosity… there you go!
–Ramón Novoa, AI.
The arcade game that you liked the most?
Street Fighter II, without a doubt!
Please accept marketing cookies to watch this video.
Where did you play
In summer, my brother and I always saw the arcades when passing by an ice cream parlor, but at the time people did not approve of arcades. So when we managed to save a few coins and sneak out to play a couple games, it was something very special.
Any records?
As I say, arcades were not entirely welcomed. I guess because of ignorance and because they would see it as a waste of time (and money). I speak of my acquaintances, of course. So the record was just that, getting some coins, running away and playing.
–Kevin Rojas, Projects.
The arcade game that you liked the most?
My favorite game is Metal Slug, ALL versions. The time I have spent learning the strategies of my enemies!
Please accept marketing cookies to watch this video.
Where did you play?
I have played both at arcade places and at home with the magical MAME (multipurpose arcade machine emulator). I have two brothers, and we played all three on the same keyboard… That was worth seeing!
Did you set any record?
I think I set a record in a game I played in an arcade, one of these beat ’em up like Streets of Fury, but in 3D… But one day it disappeared from the arcade I went to. Since I didn’t know the name of the game and I was always player 2 (my brother was older), I called it “the girl’s game”. Years later, I found out that the game was called Die Hard, and it seems to be a game from a Bruce Willis’ movie.
-Sancho Lerena, CEO.
The arcade game that you liked the most?
When I was just a little boy, I was so into arcade games. My favorite one was Double Dragon. When I was just a 10 year-old boy, I could spend about half an hour playing with a single coin. Another one that I really liked was Operation Wolf, where you had to shoot with a machine gun aiming as if it were real, but it was quite a hard one and I always ended up getting killed quickly. Another one that I loved was “Shinobi”, for the martial arts and stuff, but it was also quite difficult.
Please accept marketing cookies to watch this video.
Where did you play?
At that time, I used to spend the afternoons in town playing in the arcade, but also in the bar where my father used to have coffee. It is funny how the smells and sounds of that time remain attached to memories.
Did you set a record?
The real challenge was to play not so much the ones I liked but the ones that lasted the longest so I could play more with less money.
And that was the list of games our Pandora FMS colleagues loved the most. It does not seem coincidental that the love we have for these recreational adventures matches in time and space with the adorable memories that we keep of playing them. Good old times when a game was a community fight, you against the machine as exciting as it was momentous. Not surprisingly, there were people watching, and your weekly pay was literally at stake.
You can tell us about your favorite arcade games and your adventures playing them in the comments below or on social networks. We will be there to make fun of your low score or to celebrate any Tetris or Super Pang record.
Abbreviations, acronyms … What is the programmer slang?
Programmer slang is very particular, but it is by no means the exception and that is why in all specialties they have their own jargon. In this article, we will focus on showing its peculiarities. Let’s go!
SMS, MMS and cell phones
You remember the meaning of the three-letter SMS acronym, don’t you? Pandora FMS is capable of sending you alerts by text message so this term appears both in the technical documentation and in the software itself. Although it has mostly been replaced by Twitter, Telegram, etc., this word is still understood by both users and programmers. If we say RCS, does it ring a bell? Let’s have a look.
Abbreviations can have many meanings but in English, SMS means Short Message Service and MMS means Multimedia Messaging Service.
RCS means Rich Communication Services, which became the successor to MMS. RCS are being promoted by Jibe, a division of the company Google®, so stay tuned for this new development for your mobile phones as Jibe seeks to take advantage of existing hardware, but adding new features. The thing is that programmers must include all these names in the source code and think ahead, both for the developers in charge of maintaining the code (for example, IT patches) and for the end users.
Let’s think selfishly
All programming languages allow you to add comments to point out something important, or for didactic purposes (the creators of the programming language themselves must teach their colleagues and include comments in the examples for language learning). That is why we must seek the best possible way so that our ideas are fully understood, either now or in the future.
But here comes the small detail: this must include ourselves. This means adding an important note to programmer slang: write the comments as if you sent a letter to your future self.
Thinking that way, there is a high probability that your ideas will be well interpreted. But, how should you comment on your source code?
Some languages are advanced and seek to formally integrate these comments to compile them together with the program. We already talked about the Python language and we will use it here as an example. That way, when the source code is converted into machine language – ones and zeros – our comments will remain as a software help for other programmers as well as for users.
It is our duty to note that Python also allows comments only to be read by programmers. However, they also have strict rules to write them (these rules are known as PEP 8 and PEP 257).
Abbreviation considerations
With the example we saw at the beginning, this new RCS feature prevents you from using that abbreviation for any use other than to name this technology. The same happens to the reserved words of each programming language, whether they might be commands or declarations. Example such as exit or int (abbreviation of integer, used to declare a numeric variable without decimals) cannot be used for our purposes of saving in writing -and reading- the source code for us human beings.
Some words are consolidated and even have extremely wide meaning in many countries, they are exclusive to the programming language but human abstractions. A notable example here is the word OK. We won’t get into a debate about what each letter means, but the two of them together and their combinations (“Ok”, “oK”, “ok”) express the same idea: “fine”, “positive” or “correct”.
We can add another group of abbreviations not related to hardware technology but to software. It will even be fully understandable to any user, such as, TCP/, etc.
Acronyms
Even today, a significant part of the population knows the acronym HTML. Well, this language has its own system to deal with them (very clever, by the way). Firstly with acronyms -label not used anymore- and secondly with abbreviations:
The <abbr title=”Organization of the Petroleum Exporting Countries”>OPEC</abbr> was founded in 1960.
As we can see, it is actually an acronym but this particular element
<acronym>… </acronym>
was excluded in the latest HTML 5.0 standard. Let’s see then what the acronyms in the vocabulary of programmers are.
Acronyms come from Latin. Its use became popular during the Roman Empire and then spread to many other languages. It consists of simply taking, as we show, the first letter of each word being mindful of its pronunciation letter by letter. These have undoubtedly become one of the main programmer slang elements. What usually happens is that it is pronounced as a word and in the case of programmers, some even become verbs.
Recursive acronyms deserve a special mention. The most famous is GNU (“GNU is Not Unix”) and, although this term is not used directly in programmer slang, it is used at the beginning of each file that contains a script of this language (“Hypertext Preprocessor”). The most recent recursive acronym is YAML (“YAML Ain’t Markup Language”), but originally meant “Yet Another Markup Language”.
Abbreviations and apocopes
Abbreviations are also part of the programmer slang but, on the other hand, they seek to remove at least three letters to make the effort worthwhile. Do not mistake them with the symbols.
For example, the letter “s” is used to indicate seconds, and “ms” for milliseconds, the unit of time measurement most used in computing. Many times abbreviations and symbols are mixed, as it is the case of «mbps» which means «megabits per second».
But wait, there is even more, be careful: while “Mbps” has the same meaning as “mbps”, it is not the same when we use “MBps”, since this means “Mega Bytes per second”!
We finish the example with one more detail: in real and everyday life “megabits per second” is abbreviated as “Mbit/s”, which is not common to use among programmers because both the “/” and the “\” have special uses in programming languages and operating systems.
As for the apocopes, which consist of deleting part of the end of the words, perhaps the most famous case is “COM” to name “communications”, although it has also been used to represent other concepts (their use in programming languages is almost always a reserved word.)
“Numeronyms”
We finish off this section of programmer slang with numeronyms. No, you will not find its definition in the dictionary because its use is very controversial and they refuse to canonize it. As we know, we can represent our Arabic numbers by means of letters (words), but it just so happens that the opposite is possible here too. I will explain.
Obviously, the messages to the end users of any computing program in the world must be in their own native language. Said branch of study and work is called software “internationalization”, very long to say it every time you have to work in this area. Of course it is long, but, do you know that some companies also used “international-enabling” to refer to the work of programming an application in several languages?
The solution, if we want to call it that way, was to name said job i18n, since between the first and last letters there were eighteen characters. Apparently this began when a system administrator created the username “S12n” for the employee Jan Scherpenhuizen for his email account! As the rest of the employees found the idea funny, programmers took it over, but it wasn’t until the mid-90s that it became popular and widely spread:
Before saying goodbye, you know Pandora FMS, right? Just in case: Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Blade and rack servers; advantages and disadvantages
Choosing between blade servers or those intended to go installed in a rack is a small headache that is repeated daily in the complex minds of technicians around the world. What configuration to choose? What can best serve my installation? These are questions that are repeated while they pull out their silvery and silky hairs.
As always, on the Pandora FMS blog we do not have the absolute truth, but we do have the best intentions in order to describe what these two types of servers consist of and some of their advantages and disadvantages, in order to help you make a good decision and untangle your troubled thoughts (or mess them further, which could also be). However, we will do it in a very basic and simple way, so that also all those who do not have great technical skills know what this exciting universe of server disposition is.
Without further ado, let’s get to know what blade and rack servers look like and see some clues to help you decide.
Blade and Rack Servers: What Are They Like?
Rack servers are designed to be installed, as you can guess, inside a rack, specifically in racks intended for this purpose. As you probably already know- and if you don’t know we’ll tell you right now – racks are a type of very specialized cabinets and are designed to house electronic components, and their size is measured in own units called “U”. If you want to know more about what a rack is and some things to keep in mind before choosing one, you can enter this excellent article.
Blade servers, on the other hand, are created to be installed in a chassis in which each of the servers that make up the whole are housed. One difference from the servers located in a rack is that in the arrangement in blade these are installed in “sheets”, perpendicular to the housing and “inserted” in it.
Blade and Rack Servers: How to Choose?
As you might assume, the choice between one type of server or another will depend on your needs.
If you need a significant number of servers, you may have the best option to have them on blade. Blades tend to take up less space and are also often more energy efficient.
If, on the other hand, your needs aren’t as demanding, you might want to have the servers in a rack. Racks are often cheaper than chassis for blade servers, so a blade installation will need multiple servers on its “sheets” to become economically more cost-effective than a rack.
However, also keep in mind that, although the rack is usually cheaper than the blade chassis, when we talk about the servers that make up each of these two provisions the opposite usually happens, and that is that blade servers are usually cheaper than those housed in racks, so the number of servers you need to purchase will also be important when deciding on one or the other option, from the point of view of money. However, as you can imagine, all this also depends on the performance of servers, range and manufacturers.
In addition, there is another solution that will leave both blade and rack manufacturers happy, such as having both types of server and taking advantage of the advantages that both provisions offer. Of course, therefore you will have to spend a certain amount of money. In addition, there are blades that can be installed inside racks, which would allow you to combine in the same space both modalities. However, if you choose this option you will need to confirm the compatibility of both types first.
Finally, one thing to keep in mind is that the regular blade servers can only be installed on chassis of the same brand, so you have to be aware of possible incompatibilities. Also, don’t forget to check the manageability; they usually include management tools.
A little monitoring
So far we’ve come, knowing a little better the differences between blade and rack servers. Do you want to know something else, very related to servers? What about monitoring? And if we talk about monitoring, we’ll have to talk about Pandora FMS.
Servers are, of course, one of the many things Pandora FMS can monitor. If you want to know more you can go here.
In addition, remember that Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
One of the biggest impacts of the Covid-19 pandemic has been the number of employees asked or required to work from home.
Whilst the capability to work completely remotely has been available for many years now, some companies have been reticent to take advantage of this due to the managerial and technical difficulties involved in managing remote teams and networks.
In order to effectively manage networks remotely, managers and IT staff need to have in place a remote monitoring software like Pandora FMS. This system allows you monitor different types of networks and avoid the problems caused by a lack of direct access to office machines.
In this article, which builds on our guide on how to work with network scanning, we’ll explain four major issues that can be caused by working remotely, and how remote monitoring software can solve those issues through remote checks.
Mass Connections
A critical security tool for remote workers is a Virtual Private Network (VPN), which protects sensitive data by encrypting it and routing it through a proxy server. Whilst this is necessary to protect your data, it can also cause problems with network load. VPN connections generate more network traffic across office servers, which can cause a VPN to fail.
Pandora FMS allows you to supervise connections from your servers and supervise individual router usage. Because of this, you can prioritize certain highly-sensitive connections and ensure that your VPN does not fail on critical systems.
Data Volume
Most remote working systems make extensive use of cloud storage, and most cloud storage software will automatically create backup files as employees work. This is one of the major advantages of cloud storage, but it can also cause problems for companies. It can quickly lead to both cloud and office-based drives being overwhelmed by huge amounts of data, rendering further work impossible.
Pandora FMS can help teams to avoid becoming overwhelmed by data. It makes use of native-level commands in your OS to directly monitor disk usage, and can alert you when disks are full or are under-performing, thus making remote work significantly easier.
Machine or Service Failures
The two issues above – increases in data volume and disk usage – can ultimately result in remote machines failing, that’s why remote checks are vital. If these machines are running key services, this can cause significant damage to your network, and make it impossible for employees to work remotely.
Of particular concern are two types of machines: those that handle payment and accounting software, and those that run fundamental networking services like Apache. A failure in either type of machine can lead to data loss, missed payments, or a complete inability for employees to access remote files.
Simulating machine failure has, in fact, become an important part of the cybersecurity market, where it is known as “chaos engineering”. Pandora FMS helps to fight against the problems caused by machine or service failures by giving you detailed oversight on the machines connected to your network, and what services they are running.
This network map can be used to generate real-time reports on the status of your network, alerting you to machines switching on and off immediately. You can also use Pandora FMS to monitor the status of critical services running on remote machines, so that you can respond to service failures immediately.
Remote checks and System Heating
For network engineers, one of the largest dangers of switching to remote work is the risk of machines overheating. Increased network traffic and increased disk usage can quickly lead to drives or cores overheating, and with no physical access to machines taking action to prevent this is difficult.
This issue is particularly common if remote teams have been provided with secure, encrypted remote working solutions. The most secure browsers today use complex encryption schemes that keep data safe, but also use relatively large amounts of computing power. The hardware charged with performing encryption algorithms is particularly vulnerable to overheating, and failure caused by this can lead to both data loss and security vulnerabilities.
Pandora FMS provides you with direct defenses against machine overheating. By using Pandora FMS, you can install remote clients on all your network machines that will monitor temperatures, alerting you to the potential risk of overheating. You can then shift network traffic away from vulnerable machines.
Going Further
There are several other issues that can be caused by remote working, though they will not affect all companies. The issues above are compounded by the use of third-party tools and services on your network, for instance, which can be difficult to monitor using standard tools. Pandora FMS provides you with the capability to track network and disk usage generated by these tools, and take action if it threatens to overwhelm your system.
Similarly, many network engineers will prefer to set up automatic responses to the common problems mentioned above. Pandora FMS allows you to configure alert thresholds that will instantly alert you if there are problems on your network, and can be configured to perform actions in line with these alerts.
Remote Monitoring and Remote Working
of the issues in the list above are new; they have been around as long as compute networks have. For some companies, however, the dramatic rise in remote working over the past few months has put their networks under unprecedented strain.
If this applies to you, you need to implement a remote monitoring system as quickly as possible, alongside other systems such as web monitoring tools. Together, these will help to keep your network, your data, and your employees secure.
Centralize Monitoring: The Importance of the Metaconsole
Gradually, brick by brick, we will get the necessary toolkit to build a company and maintain it. If on previous occasions we have emphasized the importance of monitoring a company’s IT systems, today we will review what it is and what advantages we when we centralize monitoring. The goal is pretty simple: we want to have maximum control over the IT of a company moving unbridled to the summit.
The importance of centralizing monitoring
To be able to talk about the importance of centralizing monitoring, you must first know what monitoring is. Monitoring is “to observe by special devices the course of one or more physiological or other parameters to detect possible anomalies“. In our field, it could be translated to the monitoring of a technological device (computers, servers, cell phones…) to detect anomalies. Monitoring software has many objectives; among others we can find the maximum use of the company’s resources, the prevention of incidents and detection of problems, the notification of possible problems, cost savings, time savings and improving customer satisfaction. Pandora FMS, the monitoring software we’ll talk about, performs its functions mainly in order to be a preventive service.
Once we know what it is to monitor and what it is for, let’s put a monitoring case whose need for centralization is critical. Let’s imagine a company, “Tundra P.F.” , with offices spread over Spain. This well-advised company begins to monitor each of the servers, computers, network devices, etc. of all of their headquarters: Albacete, Palma de Mallorca, Lequeitio… with the same working tool. In total the company has a multitude of monitored devices, divided into different installations of the same tool, where each one has to be configured individually from the headquarters that is monitoring. In the end the company sees the need to hire specific personnel for each of those locations to control the configured monitoring… or not?! Pandora FMS, always with its eagle eye and always being on the breach, noticed this problem and decided to react by creating the Metaconsole!
Metaconsole. What is it, how it is used and what advantages does it have to centralize monitoring?
Metaconsole is nothing more than a Pandora FMS console where you can view, synchronize and manage in a unified way different monitoring systems of Pandora FMS (from now on instances), thus avoiding having to look at all the different systems individually.
It is a complex environment that is intended to operate with all the infrastructure you have, and not at a low level as for one instance.
Once we have installed the Metaconsole on one of our servers, the next step would be to configure the data for all the instances that we want to handle centrally. In order to perform this step, you’ll need to grant permissions to the Metaconsole admin user on the information that you want to handle within each instance. In order to obtain and modify the desired information, each instance will be accessed through the API and by direct access to its database.
It is true that, to this day, the Metaconsole does not have all the functionalities that an instance has, but in the future everything will be achieved and be managed from it. In addition, there are unique functions of the Metaconsole, such as the self-provisioning of agents, with which new agents will be assigned to one of the multiple registered instances in the Metaconsole following specific parameters.
Metaconsole is based on two modes of use: synchronization and propagation. Synchronization is based on passing all the information that has been created in the Metanconsole to the desired instances. This is critical because, for example, a user created in an instance cannot be managed from the Metaconsole, but we will be able to do it if we create the user in the Metaconsole and synchronize it with the instances. Through propagation, the Metaconsole generates information that will be provided to the instances.
Do you still want to delve deeper into this great tool, the Metaconsole in Pandora FMS? In these two links you can see in more detail the functionalities of the Metaconsole and all the services that you’ll be able to do with it:
As we have seen, it is totally necessary to centralize monitoring for greater order and control over the parts that make up our company’s IT, and the Metaconsole, tool of the Pandora FMS monitoring software, helps us in this.
Now that you’ve seen in the ins and outs of networks and innovations, would you like to take a walk on this path? Go even further in the world of technology? Would you spend a few minutes to know what it is to monitor computer systems and also why is it very important?
Monitoring systems monitor technology (hardware, networks and communications, operating systems, or applications, for example) to analyze its operation and performance, and to detect and alert about potential errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. Do you want to know what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Discover the great results we got at Hughes using Pandora FMS
Server operating system: a basic and fundamental piece of software
Web server. File server. Email server… In this post we could review most of the servers we use every day; this world is highly interconnected on a global scale. I write these lines from America and whether you are in Europe or anywhere else in the world, you’ll use at least one server to read this and have the basic notions of what a server operating system is, but not without first knowing the background of this specialized software!
Non-dedicated server and dedicated server
Both will need a Server operating system, but we can even use the non-dedicated one ourselves for our daily work and to offer services to our co-workers. For example, if we have a very fast printer and despite laser technology it has a low power consumption, that turns our computer into a print server, with the inherent limitations.
Now, we can place our computer as a dedicated server simply by not logging in to the user and, if possible, uninstalling the graphical user interface. You have guessed well: a dedicated server (or simply server in the rest of this writing) only has the task of serving remote requests, including requests to be managed (software update, etc.) and we do not even need to sit in front of that computer, because it will not even show us graphics on the screen. Other things it probably won’t have, will be optical readers and USB ports; nor will a mouse and keyboard be needed (actually, when multiple servers are together they group them into a single monitor, keyboard and mouse for everyone with a converter or “KVM” device).
What has happened over the decades? Well, the cost of hardware components has fallen in price and they have been incorporating it into motherboards for our benefit as end users. In our local area network we will be able to implement them, if it is with GNU/Linux good, but be careful that the matter has drawbacks!
Computer manufacturers have made sure that we have some very good equipment at our disposal that we can use as servers for a handful of users, but also to save money they have eliminated microprocessors and chips, so that they have derived the work they did towards the operating system… And here we enter into the subject: a server operating system will not do that work, because that would be a waste of resources. What’s more, we won’t even be able to use it, it will maybe recognize the hardware additions, but it’ll need specialized controllers that you have to install separately, and no server operating system can afford to jeopardize its stability with such adaptations and spend memory and use the Central Processing Unit (CPU) for it.
Legend: Wikimedia Foundation Servers
https://commons.wikimedia.org/wiki/File:Wikimedia_Foundation_Servers-8055_35.jpg
Server hardware
An example that illustrates the previous section are network cards. We’re talking about those entries that we put a cable in, which is a little wider than the ones we use on the old office phones (even today we are assigned cubicles or offices with that endowment to communicate with us). A server will have several of them, which can be replaced without shutting down the computer, and in addition the Server Operating System will do absolutely nothing of the work that they are required to do. Encrypt any of the communications? Okay, the CPU can do it too, but such work can – and should – be done on hardware by network cards (this is a simple example to illustrate, it goes didactically).
In Spanish redundancy is disliked and avoided, but for server hardware it is the opposite: It is required! Thus, a server will also have two or more power sources, many hard drives (now of solid state), lots of random access memory (RAM) and multiple CPUs, each with multiple cores… All of this brings us to the concept of a Server operating system.
Legend: «Removable hard drives
Pixabay https://pixabay.com/photos/server-drive-bay-hard-drives-memory-4393370/
Server operating system
There are server manufacturers who assemble the entire equipment, and generally sell them directly online. We will order them by specifying the estimated workload they will have, which will cost us more money the higher the load (more hardware needed). Such producers shall recommend an appropriate and optimized server operating system.
Although we can choose a proprietary Operating System (OS), this will limit our work because we will depend on that company for everything that has to do with software. For that reason, currently a Server OS is synonymous with GNU/Linux: almost one hundred percent of supercomputers run with the penguin logo and the Ñu. The main representatives are:
Suse Linux Enterprise Server (SLES): Legendary, pioneer since 1992 for businesses; its community version OpenSUSE, both, have extensive experience for your management.
Gentoo: A minimalistic distribution requires more work by network administrators because they will have to “customize” it (add, install software) according to the needs of each.
Red Hat Enterprise Linux: Long-term support and hardware-certified software make it a major competitor. Its community version, CentOS, is your favorite home of monitoring software.
Debian: a champion in distribution and committed to free software, very stable and light. Its descendant, my favorite, is Ubuntu, which has long-term support and is also very dynamic with updates (more security, but could decrease stability). It also has a very popular desktop version; I use both.
As we said, the hardware now has a lot of computing power and prices have even lowered, which favors as business users for our own physical servers, but companies larger than ours can acquire fantastic equipment to give a step further. See.
Server of servers
Yes, I introduce that term to refer to virtual machines, making a difference with what hypervisors are. A hypervisor is another server operating system application, and can contain dozens of virtual servers that are very varied. In this special scenario I locate the monitoring, that we can perform by the way with Pandora FMS or any of the ones that we have analyzed and compared in this blog.
“Reliability, Availability, and Serviceability” (RAS) is a term introduced decades ago by the blue giant, IBM®, for its mainframes and over time for software; in fact, every Server Operating System must meet those premises.
Reliability: Almost always delivers a satisfactory result, even if it involves closing applications that get out of control and starting them again, or even restarting a server completely (hard reset). Unfortunately, we don’t only evaluate by result and for this Pandora FMS is very capable of alerting us about restarts, failures in the mail service or database, etc; when and for how long, all of this will allow analysis for possible future events.
Availability: regulated by the famous ‘five nines’ rule, i.e. 99.999% of online time (five minutes offline in a year). Pandora FMS has special tools for this purpose and, if we decide to delegate to a third party the hosting and operation of our servers outside our company, we will confirm whether it complies with the contracted SLA.
Serviceability: Early fault detection and timely warning to hardware administrators count, and are very important for fault recovery if they occur. At this point, Pandora FMS and any other good monitoring software are called to account, they are special for it. Does a solid-state hard drive support 50,000 writes? How many are left? Is the server temperature right for its components? Does it meet the manufacturer’s criteria? Pandora FMS will be able to answer these and many other questions for our server of servers, but wait, there’s more.
Monitoring as a whole
The above is just an appetizer for Pandora FMS. We will be able to keep an eye on the consumption, speed and congestion of our local network with our server of servers (internal communications) and the firewalls that receive external requests via SNMP to routers and modems. With Software Agents on leased machines in different cities around the world, we will be able to account for our web servers and/or satellite servers passing the encrypted information through the “Tentacle” protocol; By bypassing firewalls (duly authorized) we will be able to centralize and create in our console visual maps of the situation in general.
As this article should end, I invite you to read our weblog publications with many more indications and solutions about device monitoring.
Oh, and before we say goodbye, remember that Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Do you want to know more about what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
You’ve been thinking all morning. You keep wondering how to choose servers for your company. All right, think the answer will be almost always: What do you need them for?
And the choice of servers will depend on the functions that they will fulfill, and these are also likely to be related to the size of your company.
In addition, among the wide range of possibilities you can choose from, there will be important factors, such as its price, which will also vary depending on the type of server you need.
In this article we will look at some of the most common server types and match them to the size of the companies that usually use them. Let’s go!
How to choose servers for a company; 4 options to discover
-Cloud computing
Before we go on to learn options for physically acquiring servers, let’s mention a different alternative that companies can choose from instead.
This has to do with the so-called “cloud computing”. Basically, cloud computing solutions for servers consist of contracting the services provided by the server of a provider that will be located on its premises or those of a third party.
This option is usually chosen by small companies, but also by some larger ones. It has advantages such as its price and ease of management, but control over the data and operations performed by the server will be, as you can assume, much less than if you choose to install it under your control on your own premises.
-Tower servers
Do you have a small company? A tower server may be your best option.
Tower servers are small and independent units – similar to the tower of a desktop computer – for companies that do not require very high performance. Cheaper and more basic than other server types, however they are able to deliver very satisfactory performance to small companies. They usually have all the basic elements that a server will need (CPU, motherboard, hard drive, network components, etc.) and, because of its small size and quietness, it will be easier to store them without having large premises. In addition, they will require less maintenance than other server types.
-Rack Servers
They are “classics” in the world of servers. Racks are specialized frames in which multiple servers can be stored and have a structure designed to facilitate their good performance (they usually take factors into account such as cooling, for example).
Rack servers are often used by companies with greater needs than those that opt for tower servers. They are commonly used, for example, in data centers, and they usually have rooms equipped for their use. In addition, its maintenance is more demanding than required for tower servers, which will be another factor to take into account. One of the advantages they have is that their scalability will be greater and easier than for tower units.
-Blade Servers
Blade servers are those that are installed in “sheets” forming a chassis in which all the servers that make up the whole are stored. In addition to the servers, the structure often accommodates other elements, such as cooling units or network components.
Like rack servers, blade servers are often used by companies with demanding requirements. They have some advantages over rack servers, such as taking up less space and being energy efficient, and they also have some disadvantages (they are usually more expensive, although the price inconvenience can even be reversed when a certain number of servers is reached).
Either way, don’t forget to monitor!
The ones we’ve seen are some of the different options you’ll have when choosing servers for your company. As long as you have to choose computer equipment for your company there will be many other factors to take into account, such as its price, reliability or the guarantee offered by the different brands. However, after choosing your servers, do not forget to monitor them.
The monitoring systems are in charge of supervising the systems computer (hardware, networks and communications, operating systems or applications, for example) in order to analyze their operation and their performance, and to detect and alert about possible errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
In the present article, we want to introduce Pandora FMS as a Solarwinds alternative. We’re going to put two of the fullest-featured and highly regarded monitoring products on the market, Pandora FMS and SolarWinds, through their paces, and seeing how they shape up mano a mano. We’ll begin with a general overview of the two tools before looking in more detail at:
General technical capabilities
User-friendliness
Costs and licensing
Both solutions are designed with medium-to-large business IT infrastructures in mind, and are focused on monitoring those systems to ensure detection and anticipation of problems proactively and immediately. Both platforms are also visually oriented, presenting information in the form of graphs, charts and dashboards.
Requisites
Let’s begin by looking at what’s needed, in terms of number of machines, to start using these solutions. Here is where we find our first difference: Pandora FMS is a more compact solution, requiring fewer machines for its installation. Pandora FMS consolidates almost all its functions in a single product, which, in the Enterprise version, includes all the components necessary to monitor networks, hardware, websites, and to produce reports and network maps, enable dashboard functionality, and so on. Moreover, the Enterprise version of Pandora FMS includes extra features, which, while being integrated in the console interface, have to be installed separately, for example remote control or dedicated mainframe monitoring and dedicated SAP monitoring. On the contrary, SolarWinds is made up of a series of products which can be integrated, covering all the bases by use of a modular system, but which requires more machines for its installation.
We’re going to look in detail at the components and requirements for each product, as well as carrying out a price comparison, based on the starting price points quoted by each supplier on their website:
With the Enterprise version Pandora FMS provides the same network oversight as the Solarwinds products listed below.
The LITE version of Pandora FMS, oriented to SME and small organizations, includes the same functions and features as the Enterprise version with the exception of WUX and Satellite server. eHorus allows remote control and Shell remotes, as well as file transfer, and is totally integrated within Pandora FMS. The prices in the Enterprise licence are for a total of 100 devices and a period of one year, including official support and access to enterprise plugin library.
Each of these components have their own hardware requirements; some of them belong to the Orion suite of products, some of them can be integrated to create a central monitoring server modularly, others function independently. The hardware requirements of almost any of these products surpass those of Pandora FMS. Orion suite products can be installed independently or on the same machine, but will always require an additional physical server for the installation of an SQL database. As for the rest of the products, the manufacturer does not specify if they can cohabit the same machine, or whether it’s recommendable that they be installed separately. However, given their elevated hardware requirements, a setup with a minimum of three machines would probably give the best results; Orion suite, SQL database and Log & Event Manager; the other products listed above have more limited requirements and can be installed on one of the previously mentioned machines, although the manufacturer recommends those machines be used exclusively to host monitoring applications.
To put it basically: just one Pandora FMS license gives you the same monitoring coverage as the following Solarwinds products:
Pandora FMS Enterprise
Network Performance Monitor Server and Application Monitor Web Performance Monitor Netflow Traffic analyzer IP Address Management Virtualization Manager Log & Event Manager Network Topology Mapper
The cost of the base license includes a minimum of 100 elements to monitor, plus a year’s official support, except in the case of remote control software DameWare, whose licenses are for number of users, not the amount of hardware to manage, with a starting price of €299. In the case of Pandora FMS, the remote control cost is based on the number of devices, independently of the number of users or active sessions there are.
Requirements Comparison
After analyzing both possibilities, and the different concepts they represent, some differences are particularly noticeable:
Pandora FMS offers 90% of its features within a single tool. Solarwinds is totally modular.
Pandora FMS’s hardware requirements are minimal, whereas Solarwinds requires various powerful machines and additional software licences for Microsoft (Windows and SQL Server).
To get the same functionality from Solarwinds as you can from Pandora FMS you’d be obliged to invest much more of your business’s money. In both cases the price corresponds to 100 elements and a year’s official support.
Installation
Pandora FMS comes with all the necessary components out-of-the-box to launch integrated monitoring. Some of these components come deactivated by default for performance motives, but are easily activated.
On the other hand, SolarWinds is made up of various products that must be separately installed. We’ve tried a few of them ourselves: Network Performance Monitor, Server and Application Monitor, Web performance monitor, Virtualization manager, etc. Each of these products has its own hardware requirements and its own installer, but it’s possible to install many of them on the same machine (Orion) and their integration is totally automatic, with a single point of access to the information (web console), although some will also function independently from the monitoring web console. However, to achieve the same functionalities as offered by Pandora FMS you’d have to install all the distinct Solarwinds products mentioned above.
The second difference is in the area of compatibility: Pandora FMS is officially supported on Linux systems while SolarWinds is supported on Windows. The second important difference resides in its database; Pandora FMS uses MySQL/Percona while SolarWinds uses Microsoft SQL Server.
Installing either solution is simple. The Pandora FMS team provides an appliance in the form of an ISO image with which to install the recommended OS (CentOS), along with the application and all its dependencies. In just a few minutes the software is ready to go. On the part of Solarwinds, .exe installers are supplied for each of its applications, which, via a simple wizard, quickly carry out the installation.
How user-friendly are they?
Once you log on to either one of the systems you have total access to the tools. Apart from the design component, you can see clearly the basic differences. The Pandora FMS interface is cleaner and more intuitive, featuring dynamic menus sorted into convenient subsections. It also tells you where you are in the dashboard at all times, via a green check mark in the corresponding menu. Solarwinds, for its part, presents an interface with a large amount of default information.
In terms of navigation, Pandora FMS’s clean layout makes it easy to explore, with its clearly differentiated sections, large and intuitive buttons, and little in the way of clues about what’s inside, making it obligatory to start from zero and explore for ourselves the possibilities contained in this “Pandora’s box”. Solarwinds, for its part, displays a lot more information right from the first screen, with a default appearance loaded with dashboards, graphs, charts and information-bearing elements, giving a good account of its power to present data. Furthermore, practically all tasks and configurations are executable through detailed wizards.
The final choice will depend on your own preferences: the lightness and clarity of Pandora FMS, easy to assimilate but featuring less initial information; or SolarWind’s info-bombardment, which needs time for the user to get to grips with, but which demonstrates from the get-go much of its capabilities. In the case of Pandora FMS, supplementing the lack of default visual elements is easy enough, by creating agents, dashboards and custom screens, thanks to the clarity of its interface and its “one tab” navigation system. Solarwinds’s wizards perform the same function, guiding the user through screen creation and custom options.
One useful detail of the Pandora FMS dashboard is the ease of orientation within the different menus: you always have a visual reference letting you know just where you are at any time, facilitating the learning process, something lacking in the Solarwinds GUI.
Technologies
Both tools support remote monitoring as well as agent-based monitoring on Windows and Linux. Both technologies are also similar, using principally ICMP, SNMP and WMI for remote checking, as well as port and web transaction checks. As far as agent-based monitoring goes, Solarwinds has an advantage: automatic deployment of agent software on the machines where you want them, directly from the server. You’ll need the corresponding credentials, but it makes the initial deployment go much more smoothly.
On Windows systems it’s important to keep in mind that possible problems and incompatibilities can arise (ongoing conflicting installations, pending reboots, system requirements (.NET framework version)), and so on, making a troubleshooting manual all but mandatory. Once the agents are installed, both solutions centralize management via their respective web consoles.
Solarwinds’s agents work based on a series of default plugins, installed in function of the system where they are to operate and these plugins obtain the relevant information from that system, making working with agents very easy as they run a large number of default checks. The drawback is the extra drain on the system’s memory such a loaded agent implies.
Pandora FMS comes with a powerful software agent, whose function is based not only on plugins but also on individual checks, as well as permitting the deployment of software thanks to its archive collection, proactive execution of scripts and self-healing commands. Apart from being lighter, the biggest advantage of Pandora FMS agents is their flexibility, which allows an administrator to individually carry out any kind of check in the form of a command or a script, as well as to add new community plugins (developed in any language) in order to perform more complex checks and extend the capacities of the tool still more.
Despite the ease of installing Solarwinds’s agent software and the access it affords to abundant visual information, its lack of flexibility and reliance on the included plugins can be limiting. In this category it’s not unfair to say that Pandora FMS’s powerful agent software has the lead over Solarwinds.
Furthermore, Pandora FMS incorporates dedicated Mainframe monitoring as one of its very few additional modules, and it’s 100% integrated in the Pandora FMS console, a feature that Solarwinds doesn’t include.
Adaptability in different environments
Both tools can adapt to distributed and complex environments, adopting different options to do so, for example, monitoring via NAT, monitoring DMZ networks, cloud monitoring, behind firewalls, and so on. Although they are labeled differently, the options are quite similar on both Solarwinds and Pandora FMS. Both offer distinct monitoring engines which act as proxies, redirecting the information before finally consulting a single database. In this respect both solutions have done their homework, being highly adaptable, and able to operate in diverse technological environments.
data storage/maintenance
Since we’re dealing with products whose value resides in the information they collect, the database is a critical component, impacting on the performance of the tool and its usefulness. Each solution has its own way of managing the data history of the monitored systems in order to optimize performance and maintain the data in the best way possible.
Solarwinds maintains its database through periodic purges of older data. The default values permit the storage of detailed data for a seven-day period, hourly data for a 30-day period, and daily data for 365 days.
According to these (configurable) default values, you can access reports with complete data for a week, or reports with hourly data for three weeks, and daily data reports for a period of up to the previous 11 months (the 12th month corresponds to the present and will contain more detail). This data is stored for each individual check carried out by the tool, and maintenance is automatic, and on a regular basis.
Pandora FMS is different in this feature, as it stores all data for a period of up to a year, thanks to a double database system: one in real time, and the other historic. The real-time database stores all information for 45 days by default and afterward transfers it to the historical database, where it is stored at the same level of detail. This is done by compressing the numerical data, thereby getting the most out of the storage system without suffering any negative consequences, in terms of degradation, or affecting the database’s performance.
Pandora FMS enables you to get detailed reports, and for longer, without affecting performance. Maintenance, as with Solarwinds, is performed automatically and on a regular basis.
Dashboard and custom screens
Solarwinds enables us to view large amounts of information due to its automatically generated dashboards, viewable upon installation of the applications, and completion of the wizards.
Pandora FMS ‘s requirements are considerably less demanding, but a more ample deployment is necessary at the beginning in terms of manually constructing the dashboards. Plus, Pandora FMS runs fewer default checks than Solarwinds. However, its potential is immeasurable, and thanks to its flexibility, allows the user to achieve similar, or even superior, results when compared to Solarwinds.
Both tools feature mapping utilities allowing the user to create custom maps, which can be used in dashboards to present information quickly and intuitively on a large monitor or screen, either for a team of operators or an operations manager in order to, for example, see the result of nightly backups or regional sales.
Given that Solarwind’s agents are oriented exclusively toward collecting IT data (networks, servers, applications) it’s complicated to make control panels which also include complex business metrics, such as calculations derived from a database, real-time calculations, etc. Using Pandora FMS it is possible to display this kind of real-time information, giving the edge in terms of flexibility.
Pandora FMS:
Solarwinds:
Alerts system
Both solutions also come with their own alerts systems that enable configurable automated actions to occur, such as email delivery or the execution of personal scripts. Both alerts systems feature advanced configuration options, affording them both a high degree of flexibility. The alerts are generally based on the state of modules, which are defined by thresholds.
In this sense, Solarwinds does go the extra yard, featuring an intelligent learning system that automatically modifies thresholds, basing the modifications on recent data (from the previous few days). However, this feature is also integrated in the Pandora FMS roadmap for its next major release at the beginning of this year, 2017.
events console
Both Solarwinds and Pandora FMS feature detailed events consoles that supply useful information about the platform immediately, using “activity register” mode. This permits the execution of filters and searches to locate problems or changes, extremely practical when it comes to precisely identifying the problem.
However, Pandora FMS includes an advanced feature that enables event-based alerts, allowing the user to configure automated responses to specific situations, such as updates, the introduction of new agents, received SNMP traps, and so on, adding yet another layer of flexibility to your tool.
Pandora FMS:
Network maps and topology detection
Pandora FMS and Solarwinds both automatically generate their own network maps, based on self-discovery and manually created group distributions. The design of both is similar, although Solarwinds has an especially useful characteristic: exporting maps to Microsoft Visio. It needs the Network Topology Mapper product in order to use this function, whereas Pandora FMS comes with full maps in its Enterprise version.
Both products are capable of detecting network topologies via the switches’ SNMP and map the interfaces of each device, allowing manual editing of the maps generated.
Pandora FMS:
Solarwinds:
Managing large environments
One of Pandora FMS’s most notable characteristics (much missed in Solarwinds) is large-scale management of the monitoring environment. Threshold editing, deployment of new checks, creation of new checks and new alerts, plugin execution, and so on, all performed on hundreds, or even thousands, of devices simultaneously and from a centralized point, Pandora FMS’s policies consist of complete monitoring screens that include all these elements and can be deployed on as many devices as you want, centralizing the deployment and allowing custom monitoring and the ability to change any element simply by editing the policy, whose changes are inherited immediately by all the devices included in that policy.
The most pertinent feature to note is Pandora FMS’s capacity to perform the above either via agents or remote checks, enabling total control over the monitored park.
Furthermore, among Pandora FMS’s numerous features, a software deployment system can be found, the archive collection, which allows any kind of file to be transferred from the tool to the agents, facilitating the deployment of plugins or additional personal scripts. The archive collection can be found integrated with the policies, meaning it can be massively managed. Solarwinds has a separately available product dedicated to software deployment, Secure Managed File Transfer Server.
Solarwinds does not have a solution targeted specifically at massively managing a monitored environment, making it difficult to maintain the tool, or to include new elements within our monitored area. Although Solarwinds can achieve this by means of groups, Pandora FMS has the lead in this area.
Scalability and large environments
Both Solarwinds and Pandora FMS are upward scalable to accommodate large or distributed environments. Basing their scalability on adding extra process servers, both manufacturers claim to be able to manage thousands of devices with no degradation of the service.
Solarwinds allows the addition of as many polling engines as necessary, which contact the main server, and this in turn contacts the relevant database. In the case of Pandora FMS, there are various options, from adding servers that redirect the data to the principal server, or installing processing servers (in the latter case the servers require an individual connection to the database). It’s also possible to install Pandora FMS on parallel servers and allow an external load balancer to handle the load distribution. As you can see, both Solarwinds and Pandora FMS feature diverse high availability and failover options, and not either one of them seems to have found its limit in terms of the number of devices that can be managed.
Both alternatives come with a high-level management dashboard for just those cases in which an architecture is geographically distributed, or distributed among different clients. These consoles allow the user to access all the information from different instances, with their respective databases, and provide quick access to the status of a high number of machines. Pandora FMS’s Metaconsole is free for environments of over 2000 devices; Solarwinds’s Enterprise Operations Console comes at an extra charge.
Pandora FMS:
Solarwinds:
Web reports and SLA
Again, both tools include a reports section integrated in the web console. They work in similar ways, allowing the user to choose among a series of items and default reports, showing the results in HTML in the browser itself or in PDF. Solarwinds’s variety of prefabricated reports gives it an advantage in this area, but Pandora FMS can create reports based on custom SQL queries.
Solarwinds also comes with a free product dedicated specifically to creating SLA IP reports. However, on-demand SLA reports must be created manually via SQL queries.
The following example shows an SLA report on work hours:
In terms of SLA reports, Pandora FMS has the edge over Solarwinds, whether it’s in the case of predefined monthly reports or custom reports for measuring SLA for any element, which can also be displayed as graphs or charts and extra information relevant to the specific SLA, and all via a complete wizard which allows you to modify any parameters still farther. Furthermore, thanks to Pandora FMS’s data storage model, which stores detailed data for long periods, it’s possible to get SLA reports (or any others) long after the data was collected.
The next example shows an SLA report including maintenance periods:
Inventory
Pandora FMS y Solarwinds both have an integrated inventory management system which allows you to see what hardware and software you have installed, and which can generate reports, alert on any changes in the infrastructure and perform searches to achieve real time control over your IT assets such as, for example, finding out which of your machines have an anti-virus installed. This characteristic is especially useful, facilitating enormously the work of system administrators, liberating them from the tedious task of updating spreadsheets.
Service monitoring
Is your online store working correctly? Is there any problem with deliveries? Can users access my web support? All these questions have their answers in technical components: servers, databases, and so on.
In order to cover these requirements at the highest level Pandora FMS counts on a series of features known collectively as service monitoring, through which it’s possible to define a series of critical elements, forming a tree graph like the one below, displaying the critical points of a company and where it’s possible to see how technical issues can impact on the business itself. The graph also includes the SLA status of any critical service.
In the above screenshot, the graph displays just how a failed component is affecting an intermediate service (a monitoring satellite), and producing a dip in service quality for the end-user or client.
In the following screenshot, the effect of a failed component on a larger network can be seen. You can see how the software allows a user to know whether the problem is critical, or represents a drop in service, and exactly where the problem is occurring within the infrastructure.
Solarwinds does not have a product or application that meets this demand, giving Pandora FMS another significant advantage.
Final conclusions
After an in-depth analysis of these two monitoring products it’s time to go over one more time the key points of each tool, and their respective pros and cons. Both solutions feature characteristics aimed at Enterprise environments, and supply solutions that any medium to large company needs to have covered.
Pandora FMS
PROS
Compatibility
Price
Requirements
Flexibility: the possibility to incorporate any plugin to the tool, along with the possibility to customize both the monitoring and the control panels
Software agents
Business-side monitoring/services monitoring
SLA reports
Managing huge environments: policies
CONTRAS
Limited default content
More extensive initial deployment
Steep learning curve, due to its power
Solarwinds
PROS
Easy to install
Large number of default control panels
Large number of plugins and default information
Gentler learning curve: use of wizards
CONTRAS
Price
Requirements
Difficult to maintain: many products and machines
Not much flexibility to change default content
Compatibility: only with Windows
Pandora FMS focuses its efforts on being a technically powerful product that also enables customization and flexibility, being a light piece of software that doesn’t require a large team of admins to use or maintain it. It offers a suite of tools that make managing your network simpler, and almost all its functions are incorporated in the one product.
Solarwinds offers a lot of information, control panels and content quickly and easily right from the get-go, and to a high quality. Due to its range of separately licensed products Solarwinds can achieve better results in some specific monitoring tasks such as log analysis and correlation, or exporting Microsoft Visio to its network maps.
Podman is a container engine developed by RedHat, and yes, if you thought about Docker when reading container engine, you are on the right track.
Podman wants to be the alternative to the well-known container Docker engine, but you may wonder:
What does RedHat offer through Podman?
Why should I switch to Podman?
Is Podman the replacement for Docker or just another competitor?
it is still early to answer all these questions, but in this article you will discover what Podman’s wildcards against Docker are.
Podman’s user-friendliness
While researching for this article, I stumbled upon a presentation by RedHat engineer Dan Walsh, which started by saying how to replace Docker by Podman and outlined how to perform this migration through some steps.
The first is to run:
dnf install -y podman
Then execute:
alias docker=podman
And he ended his presentation by saying: “Any questions?”
Obviously it was a joke, but the idea was to show that switching to Podman is very simple, since RedHat engineers have paid special attention to using the same nomenclature when executing Podman commands.
So if you are a Docker user, you already know most of the commands in Podman.
So indeed it is as simple as, instead of running docker run, running podman run, and the result will be exactly the same.
Dan also refers to a Twitter thread to represent how easy the process is, where another RedHat engineer used his “migration method” using the two commands described above and, after a couple of months, had completely forgotten about it, since he continued using the same commands that had been using in Docker for years.
#nobigfatdaemons
It is a reference to the Docker service (daemon).
As you may know, Docker is a wonderful tool, with endless advantages and options.
It is capable of handling everything related to your containers: network, storage, execution, motorization, etc., and all this is managed by the same Docker service, which can bring some disadvantages, since the more containers you use, the bigger and more complex the docker service becomes.
This is why RedHat has decided to develop its tool without relying on a service, and this is the main difference between Docker and Podman.
Podman does not need a great service (daemon) to work.
They have decentralized all the components necessary for container management and have individualized them into smaller components that will be used only when necessary. This decentralization offers a large number of advantages that we will see later.
You know what else is easy and free?
Controlling your very own systems without the need for expensive software full of patches to work is at your disposal:
Podman: Pods or Containers?
Podman has a very descriptive name, and yes, when we talk about Pods we are referring to those same units that we use when dealing with Kubernetes.
Podman is capable of running containers in exactly the same way Docker does, but it is also capable of running Pods.
For those who are not familiar with Kubernetes, we will soon release an article talking about it in more depth, but for now let’s just make clear that a Pod is the minimum measurement unit in Kubernetes. The main difference is that a Pod may contain more than one container. It specially uses a main container together with one or more “sidecar containers” running in the same Pod as the main container, to “help” with the main task it was designed for.
If it sounds like black magic, for now keep in mind that a Pod is a unit where there may be one or more containers. We will delve into these concepts.
Imagine that each of the seals in the Podman logo is a container, so what you have is a pod.
Image management with Podman
Podman uses a tool based on scopio for OCI-type image inspection and management.
With Podman, you can scan OCI images without downloading them, and even better,you can take elements from one repository and move it to another directly without this image going through your device, since you won’t have to download the image in order to see or use its components.
Although Podman is able to build images very similarly to Docker with the Podman build command, the Redhat team also offers us another tool called buildah.
Buildah is an image management tool that is closely tied to the use of Podman. Among its features, it allows us to manipulate an image or a running container to create new images, build the root directory of a container for its handling or create new images in traditional or OCI format. If you want to know a little more about Buildah, here you have the link to its official repository.
Podman is rootless (Podman security)
Thanks to Podman’s modular architecture, it is not necessary to run containers as root. This is a great advantage, since you can run your containers with different users who have different privileges and without the risk of someone having access to the container service and running containers as root user, and wreaking havoc on your servers.
What Podman does when running as a non-root user is creating a directory in the user’s home directory and storing there all the information for the images and containers this user has. So, for example, if you do a podman image with your non-root user, it will show only the images that this user has created or downloaded.
Another advantage of Podman is that it is capable of using UID separation using namespaces, which provides an extra isolation layer when running your containers.
In terms of security, Docker service leaking is even more dangerous than obtaining root (sudo) privileges.
When you get admin permissions (sudo) and do something on the system, it is always registered in the system audit log, there is always a trace to follow. But if you access the Docker service and do it from a container with privileges and get rid of this container, it is virtually impossible to know what you have done. It is not saved in any log nor is there any record of your actions. Which presents Podman as a safer tool.
Integration with Systemd
Podman allows us to run containers that have Systemd enabled by default, without any modification.
It supports socket activation, so we can use systemd to configure a socket and have access to a remote API through which to communicate with Podman. A series of Python libraries have been developed in order to implement integrations and communicate with the Podman remote API.
In fact, there is already an application called Pypodman developed in Python, which is capable of running everything Podman runs locally, but remotely, communicating with the remote API, which opens up a world of possibilities.
Conclusions
Docker has advantages against Podman: firstly, the distribution and widespread acceptance it has, or tools such as Docker swarm, docker-compose, etc. Right now, if you want to orchestrate containers in Podman, your alternative is to use Kubernetes or, the one I prefer: RedHat, to use Openshift using cri-or, which is the runtime that Podman uses.
There is no clear conclusion on whether Podman is a replacement for Docker or whether it will succeed in dethroning the container king.
What we do know is that RedHat is taking their chances on the world of containers, from the acquisition of CoreOS for its use on the Openshift platform, to the development of Podman, which is currently the default container engine in RedHat 8 and CentOS 8.
Now, what do you think? Is Podman Docker’s replacement? Are the advantages it offers us enough? Do you think it will be able to take its throne?
If you are interested in the world of containers or technology overall, you will be surely interested in what we have in store just for you:
Network Types: Are you sure you know them all, every single one?
If you thought the fishmonger’s hair net was the only kind of net you’re wrong. From Pandora FMS we will show you some more, so that you do not get lost without them.
The term “network” is used in computing to name a set of computers connected to each other in such a way that they can share resources, services, and information. There are several ways to classify these networks, based on their scope, relationship, or connection method. Let’s take a look here at some network types.
Network Types: LAN
A local area network (LAN) is a network that interconnects computers within a limited area. There we can put any residence, a school, a laboratory, the college campus or a building full of offices.
Both computers and other mobile devices use a local area network connection to share resources. We can think about interconnecting from our device with a printer or network storage, for example.
Ethernet and Wi-Fi are the two most common technologies in use for local area networks. Other LAN technologies include Token Ring, Fiber Distributed Data Interface, and ARCNET, but those have been losing users as Ethernet and Wi-Fi speeds have increased.
Types of networks: MAN
A metropolitan area network (MAN) is a computer network that interconnects, over a high-speed connection, users with computing resources from a geographic area or region larger than that covered by a local area network (LAN), but less than that covered by an extended area network (WAN), which we’ll see later.
Such networks can be public or private. They are developed with two unidirectional buses; they act independently from each other when transferring data. In equal sizes, fiber optics will give less error rate when transmitting information than if copper cable is used. Both options, however, are safe. They do not give rise to the alteration of their signal, unless the link is physically interrupted.
Network Types: WAN
A wide area network (WAN) is any telecommunications network or computing network that extends over a large distance or geographic location. Such networks are often established with leased telecommunications circuits. Large companies or institutional entities use WAN to transmit data to their staff, their customers, their suppliers, or their users, even though they are in different locations around the world. As you can imagine, this mode of telecommunication allows a company to carry out its daily function effectively, regardless of its location. Yes, and the Internet, the Internet itself, can be considered a WAN.
Network Types: WLAN
A wireless LAN is a wireless computing network that connects two or more devices via wireless communication to form a local area network (LAN) within a limited area. (Let’s remember what we talk about when we talk about a “limited area”: any residence, a school, a laboratory, the college campus or a building full of offices…)
This new option gives users the ability to move within the area while being connected to the network. WLAN can also provide a wider connection through a gateway.
WLAN has become quite popular, especially in private homes, due to the ease with which it is installed and its use. It is also the most popular in those businesses where they offer wireless access to their employees, their customers, and to those who stop by for a while.
Network Types: VLAN
VLAN (Virtual LAN) gives us the opportunity to create networks that are logically independent, even if they are covered by the same physical network.
Thus, any user can have multiple VLANs within the same router or switch. Each of these networks brings together the computers of a specific network segment. These created partitions are a manifest advantage when we want to manage a network.
Currently VLANs are configured through software and bring us many benefits in terms of security and effective computer management. You should think that devices related to one VLAN do not have access to those in others and the same thing in the opposite way. It’s quite useful if you think about segmenting your computers and limiting access between them for security reasons.
Its management is simpler, for the simple reason that we will have the devices divided by “groups“, even belonging to the same network.
Here’s an example of its benefits in your household. With the VLAN, at home, you can separate devices that do access the Internet from those that do not. This can prevent any intruder from reaching them over the Internet and infecting them with some malware.
Now that you’ve seen in the ins and outs of networks and innovations, would you like to take a walk on this path? Go even further in the world of technology? Would you spend a few minutes to know what it is to monitor computer systems and also why is it very important?
Monitoring systems monitor technology (hardware, networks and communications, operating systems, or applications, for example) to analyze its operation and performance, and to detect and alert about potential errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. Do you want to know what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
The work of an admin or network administrator may seem ordinary, that type of work that just follows a guide, but right now, you could not be further from truth. Here I bring you network scanning, a task that could take a lot of your time… or little, if you have Pandora FMS by your side and with the help of one of those free software applications included in GNU / Linux. Let’s take a look!
The range of network devices has changed. Now there is more that desktop computers or servers, like virtual servers, voice over Internet (“VoIP”), hubs and routers with full and embedded operating systems (OS) and not forgetting wireless Access Points for mobile phones, and even wristwatches with their own OS! Yes, the latter is a trend: our beloved local area networks have become a kind of bring-your-own-device thing. Did a salesman come from company X with gigabytes of information? For courtesy and practical reasons, you allow him to connect to the local network of the company. But that doesn’t just happen with visitors. Every employee feels comfortable bringing their own laptop. Of course, as long as the nature of the company’s business allows it, not all of us work on launching rockets to the Moon or developing military defense systems.
Whether you base your favorite computer on GNU / Linux or on Microsoft Windows, we are not talking about creating the common network map with the applications of both environments. We do not document a network map so that it gets “written in stone” later, because, as the network grows, the administrator must keep on auditing to keep up with the new devices and components that each business entity takes in.
What is network scanning?
Network scanning is the process, either manual or automatic, followed to find new devices and their interfaces. Ideally, it should find as much as it can, make a network map and, upon request, generate certain timely reports. Although it is unusual, you may receive alerts (email, text or SMS, Twitter, etc.), which are more than welcomed. In that regard, Pandora FMS stands out for doing its homework very well. We must differentiate it from a network inventory obviously, in this case the second one comes from the first one.
Here I summarize just three functions:
Network scanning.
Network map creation.
Alerts.
I should also mention that it could optionally be of help in cybersecurity. But that depends on the specific requirements of that department, which will have its user group when Pandora FMS is implemented in your network.
To achieve these functions, hereinafter I leave you links so that later you learn more about the features of Pandora FMS or third-party applications. Remember that Pandora FMS is open source and is flexible in terms of using your own solutions or those provided by the community.
Zenmap
First, I will start with an appetizer: Zenmap is a graphical open source interface that uses nmap (open source too, focused on security auditing) for network scanning on any network. It is an excellent example of an application aimed exclusively at network scanning: it has interactive graphics, network scanning profiles (fast, normal or intensive – it has at least 10 pre-configured profiles) and it allows you to create your own custom profiles.You may save or keep a network scanning history to later on compare and see differences (new devices or those that left your network).
Legend: Network scanning with Zenmap (Linux screenshots at flickr https://www.flickr.com/photos/xmodulo/9477360960 Creative Commons 2.0 license)
Whether for didactic purposes or for your home network, Zenmap presents an excellent opportunity to dive into network scanning concepts. However, to really go big we need to move forward.
Ways to start network scanning
The first network scanning can be started:
Either manually, one by one, or perhaps by importing from another program in a standard format.
By scanning IP addresses, preferably starting with your Gateway and its subnets.
Through wizards that have predefined patterns for operating systems and / or applications (for example, Office 365, Jira, AWS, Azure, Cisco, VMWare vSphare, Docker, etc..).
Although it escapes common sense, there are usually options to exclude specific IP addresses or certain devices: in the first case you may waste time by polling addresses that you are completely sure they are not used, and in the second case Pandora FMS server will not be included in network scanning, just to name two examples.
Once finished with this task, be very careful when configuring or setting automatic and periodical network scans. It can either be set by time or an alert can also be included when new IP addresses are assigned, for example when using PHPipam.
Network scanning methods
The main tools to use, since there are many more, are listed here from simpler ones to more complex ones. Let’s start with the simplest:
ping: essential even for non-expert users, in this blog we have published a post about it. It almost works at “machine language level”.
ICMP (“Internet Control Message Protocol”), which is in fact integrated in Pandora FMS.
fping: one step beyond ping and my favorite to quickly diagnose who is online.
traceroute.
nmap.
Vnstat.
Netstat.
Wake-On-LAN: which allows remote switch-on with a magic package, if they are connected by wired network. Yes, many think this line should not be included, but I consider it must be executed before for devices to be online before collecting network information. Precisely, switching them off or configuring them for saving energy will be discussed at the end of this article.
In the category of more advanced tools for network scanning I think:
The address resolution protocol (ARP), is often used together with Pandora FMS to scan and monitor hardware addresses with IP addresses.
Specifically designed for Network scanning is the Link Layer Discovery Protocol (LLDP), in which devices provide us with information about themselves and the network in a standardized way (we will soon see that it works as the basis for another more important protocol).
Other proprietary source code protocols are NetFlow, Sflow, J-Flow and NetBIOS.
I talk specifically about SNMP (v1, v2 and v3), since it collects information from the LLDP to create the MIB. SNMP (Simple Network Management Protocol) is an application layer protocol that enables the exchange of management information between network devices by “pollings” or “traps”. Essentially, SNMP normalizes communication across the entire peer-to-peer network. Version 3 supports encryption and credential authentication, which takes us to the next level.
Pandora FMS, in its Enterprise version, is specialized in most proprietary OIDs (manufacturers’ MIB library), excellent for large networks that cover a large number of devices.
Custom scripts
To take advantage of SNMP v3 you must have a registry, a credential database to connect. At first glance, it goes against the intent and purpose of Network Scanning (to face the “unknown”), but no network administrator -like programmers- can let the opportunity of reusing information to get work done go to waste.
Thus, these “scripts” or credentials can be included with the following:
Telnet, which I consider appropriate for email servers.
WMI, in environments with Microsoft Windows (combine with “Active Directory”).
SSH, for GNU / Linux environments.
The last one is vital, it allows the use of software agents installed by means of Puppet, Vagrant, etc., and which may receive additional instructions for future network scans. Here we could perfectly use separate scripts that handle electricity savings like “wake-on-lan” devices, just saying. Remember that Pandora FMS uses Software Agents, but also through its different servers it directly monitors:
First, Pandora FMS Network Server must be enabled, which is available in both the Community and Enterprise versions.
Recon Server: specially created for discovery monitoring and which can be used in network scanning.
ICMP Enterprise and SNMP Enterprise servers, with discoveries in addition to the Community version.
WMI Enterprise server for:
◦ Active Directory®.
◦ BIOS.
◦ System information.
◦ Windows® information.
◦ Printers.
◦ IIS®.
◦ LDAP.
◦ Microsoft Exchange®.
Legend: Network scanning with Pandora FMS Recon Server (Creative Commons 3.0 license)
Information collected
At the end we will have a good stock of elements for network inventory:
Databases (explored by well-known ports).
Firewalls.
Network traffic (values in mbps).
Outputs to the Internet (ADSL, optical fiber).
Cisco NetFlow (hardware).
Physical (hypervisors) and virtual servers.
“Active Directory”, in the case of using Microsoft Windows®.
L2 / L3 network infrastructure.
Route tables.
Software Defined Networks or SDN.
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out more clicking here.
Or if you have to monitor more than 100 devices you can also enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to assist you!
Web applications? Blogs? What you need is web monitoring tools!
In English, the word “present” has two different meanings: the first one is “now”, as in now that you are reading this article, and also the meaning of gift. There is no misunderstanding here, but there is also the adjective “free”, which can mean free, something that does not need to be paid, or having freedom. Today we will see several free applications that you may use as web monitoring tools.
Web server monitoring
What do we look for in web monitoring tools? What is a web server?
Its definition entails a computer or device capable of offering information or data through a HTTP protocol (or safely by HTTPS). Its monitoring involves two large areas: internal monitoring and external monitoring.
The internal part consists of three key points:
General state of your web server: load, disk space and component temperature (if not virtual). Summing up, the basic values of any server.
Web traffic: open and listening connections, addresses, etc.
Information contained in logs: it is very important to configure, given the fact that there are several domains on the same web server, each of them with its very own file.
For external monitoring:
Simple tests: whether it has connection, the response time, certificate expiration (if it uses HTTPS), etc.
Transactional web monitoring: It monitors processes that meet certain requirements. The simplest example is knowing whether a user can log in to your web server (let’s say you have a simple blog with WordPress installed).
Pandora FMS
If you are a new to our blog, here you have a surprise: The open source version of Pandora FMS is capable of working with the 3 cornerstones of internal monitoring (through software agents) and the first key point of external monitoring!
Can’t you believe it? I will explain:
Everything described so far can be read in more detail on this link.
You probably use a web server with Apache: for that specific case, we have an excellent article written by the creator and founder of Pandora FMS.
Network monitoring (local or wide area) is indirectly involved with web monitoring.
After using Pandora FMS and / or some of the web monitoring tools here indicated, you can optimize your web, since web application performance has become a key element for the correct operation of organizations.
And not only that, in addition to the aforementioned monitoring, Pandora FMS Enterprise version has a powerful WEB user experience server that allows to record your transactions and break them down into different stages for their monitoring, notifying as a result whether the transaction was successful, the total time it took and the individual time of each stage.
Moreover, it there is any problem with the transaction, it will take a screenshot when it can no longer go on, which you will be able to easily see from Pandora FMS web console.
The web user experience server (WUX) not only replicates the recorded transaction in time slots, it also collects stats about the server that hosts the website, such as the website loading total time, time to resolve the server IP address (DNS), time used to set the SSL safe connection and time used to transfer each web resource, such as images, HTML code, style sheets and javascript.
All this is represented in a specific agent section where you can see it graphically.
Web monitoring tools
Going back to the topic of free applications: the web monitoring tools included here also have more permissive licenses, such as that of MIT or the Apache license itself, or more restrictive ones as the open source. Since it is a very broad topic, Wikipedia collects a lot of them, if not all.
Another type of web monitoring tool that must be highlighted is the one offered as physical service from different parts of the world. Although some are free programs, there are obviously some expenses involved in maintaining virtual or real machines all over the planet, so that it regularly reaches our website from such distant places and then inform us about it.
Once this has been made clear, let’s see now web monitoring tools.
On our own
Yes, we ourselves as programmers can take advantage of “real user monitoring”, placing specific instructions before and after our code performs read and / or write operations on our web server and keeping an additional log. Later we will see its counterpart: User Experience (UX).
I must also mention that there is a tool In CodeProject with a free custom license that tells how to work almost in an artisanal way (I do not recommend this method, I include it only for didactic purposes).
Linux Dash
I consider it the lightest, but don’t be fooled by appearances. It was created in a minimalist but versatile way: you can use Go, Python or Node.js languages, since some of these working environments will already be securely installed in your system. That way you will not add load just by installing a web monitoring tool.
Its repository is hosted on GitHub under MIT license and there is an online demo, whose screenshot you have below.
Legend: Linux Dash basic info
I think it has pretty good basics: general status, basic information (shown above) and network, account and application performance (both common and databases, etc.). They also contain modules on a board, which have a search field. Look at this search with the letter “p” in common applications:
Legend: Linux Dash common applications
You will obtain information in real time, but it does not save historical information or alerts, it only has the very basics. Anyway, if you consider yourself as one of the soldiers of Leonidas in the historical film «The 300 Spartans» (the one from 1962), you will surely feel comfortable with this web monitoring tool.
eZ Server Monitor
It has a totally free license, GNU GPL3, written for GNU/Linux and the possibility of incorporating visual themes, because, as you will see, it shows everything at once on a single board (seeing the same thing every day bores human beings):
Legend: eZ Server Monitor (GitHub)
You can find out the status of the services according to the status of each port (do not forget to add the 41121 of the Pandora FMS Tentacle protocol, if you have a software agent there), it tests connectivity with ping, memory or the last connected users, among other values. It is also very light. You can see how to enable a module in a simple Raspberry Pi 3 with the identifier AW7KMmxJqnM on Youtube.
It also has a BASH version to use it in a command terminal, if you are still biased towards Sparta.
phpSysInfo
Continuing with really light web monitoring tools, phpSysInfo stands out in two aspects: it is portable and it also works in a Microsoft Windows® environment. It shares similar features as the previous ones: from here, network interface management and their traffic is what interests us. It is translated into several languages. Here you see it in simplified Chinese:
Legend: phpSysInfo (sourceforge.net)
statusok
Ok, let’s raise the bets! How about something automated to notify you by mail (or even Slack) if your website has issues? With Apache 2.0 license, you have statusok, which is also light and fast to set up. You can use your normal mail (but Gmail is recommended) or you can create your own add-ons (avizoro for Twitter).
But before you go rush off to install it, hold on: you need a database called InfluxDB and Grafana (both have free licenses) to work. It’s worth highlighting that the “difficulty” here is to install and configure the underlying tools. Here is a screenshot on how the three look when working:
Legend: statusok using InfluxDB and Grafana (GitHub)
Selenium
For the second point of external web monitoring, I present you Selenium, with a free Apache license. It has been developed for years and it is written in Java language. Do you remember that I mentioned user experience (UX)? Well, with Selenium you can create scripts and actions (keystrokes, mouse movement) to simulate that a user interacts with your website, and enters and performs transactions. I consider them to be the most complex web monitoring tools because Selenium has many components and add-ons.
As components, there is an API for several languages such as Python, Ruby, JavaScript, C # and of course Java as well. As complements you can use InternetExplorerDriver and compile with Visual Studio 2008® and thus use it in environments with Microsoft Windows®.
But Selenium is complex. Very complex. I will explain it quickly:
First you must have a development environment called Selenium IDE.
Then install Selenium Remote Control (or simply Selenium RC) to receive requests from your instructions to perform your virtual user transactions.
Once you have read the above, I inform you that this tool is not used anymore… Why do I recommend it then? Because it is part of the classic monitoring, which I will talk about later.
Selenium WebDriver has become the Selenium RC replacement. To give you an idea, it allows the use of web browsers without a graphical interface, that is, only by using text commands. There is also the so-called HtmlUnit, a free program written in Java too. Also, browsers like Google Chrome and Mozilla Firefox have long supported this mode, specially designed for automated testing. It is even part of the standard recommendations of the WWW Consortium (W3C).
Selenium Grid: how about placing a software agent that tests your website on different continents, separated by thousands of kilometers as I depicted above? Well, with Selenium Grid we organize nodes, each with individual WebDrivers and for different browsers. I consider this the best web monitoring, because it combines in real time and distance, but with mock users in different scenarios. How about for 7 thousand users? Two thousand five hundred logging in from Africa, some requesting services, some not, always at the same time? The possibilities are endless.
Other web monitoring tools
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
If you have to monitor more than 100 devices you can enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. here.
Do not hesitate to send us your questions. The Pandora FMS team will be happy to assist you!
* Article written by Jimmy Olano with the collaboration of Rafael Ameijeiras.
Toshiba’s success story thanks to Pandora FMS software
Pandora FMS and Toshiba met each other on a cold winter morning, they exchanged looks and… This would be a great start to a love story, wouldn’t it? However, the relationship between Pandora FMS and Toshiba has a different nature: teamwork.
By now you know Pandora FMS, don’t you? That flexible and complete monitoring software, with which you can monitor all your devices, from networks, servers, UX, IoT, applications or business processes, to virtual environments, etc. In addition, it has a lime green/hope-green color that makes it as successful as its more than 300 available plugins.
Do you know Toshiba?
Toshiba is a Japanese company engaged in manufacturing electronics. They offer complete hardware and software solutions to both retail and hospitality customers. They also operate in Spain.
Then how was the relationship between these two companies, Pandora FMS and Toshiba formed? It all comes from the idea of meeting a need that arose to one of the companies that Toshiba runs: monitoring some hospitality facilities.
Toshiba needed to have the sales kiosks of the catering facilities of one of its main customers controlled, since they’re remote machines and thereby are not in continuous contact with their staff. So they needed a flexible tool that would allow them to significantly increase the SLA. And then there was Pandora FMS.
“With Pandora FMS, we have managed to reach 99.5% of the SLA thanks to its early warnings. In addition, with its after-sales service we have developed the tool to a degree that we didn’t believe to be possible” confirms Antonio Flores, Toshiba’s Retail Support Manager.
Some stats
It seems easy, but here we are dealing with 270 restaurants, more than 750elements monitored by Pandora FMS with over 16,800 modules and 10custom-made plugins. A Promethean task.
Toshiba provides a complete IT solution to our main customers in the hospitality sector in their restaurants: boxes, points of sale, content screens and self-service screens -kiosks. And not only that, they offer them a solution that goes beyond hardware, with associated maintenance and support services. Therefore, a monitoring tool is essential to know the status of all restaurants at all times.
Their main need was to have the kiosks controlled, since the remote machines are not in continuous contact with the staff of the facilities, which means that, if a machine crashes, booom!, it cannot be fixed immediately.
“We previously tested and discarded other monitoring tools, such as the ones from IBM, Spiceworks, or Zabbix for being difficult to set up and without features to trace processes or collect logs. We finally chose Pandora FMS, a solution with which we have certainly succeeded“, says Antonio Flores.
Evolving together
To this day, the Pandora FMS software used by Toshiba has nothing to do with the implementation they used in early 2017. Thanks to the flexibility and great scalability this solution offers, they have managed to develop the same software based on their needs that, as in most technology companies, are constantly changing.
This is partly thanks to the after-sales service offered by Pandora FMS, a vital support when it comes to continue to evolve day by day in the desired monitoring style. Pandora FMS doesn’t support the idea of “buy a license and figure it all out,” we are involved and engaged until the end.
As far as we know, the initial software deployment and coupling was quite simple and fast. The only difficulty laid in getting to monitor the checkups of kiosk updates, since we had to take into account databases, logs and a large number of associated monitors. But it was finally possible to carry it out with the joint work between the two teams.
Let’s get to the results!
Apart from greater resource efficiency, Toshiba has managed to improve the relationship with its main customer in the hospitality sector. Especially thanks to the improvement in the quality of its services, a direct consequence of an early incidence detection that Pandora FMS software immediately reports.
In fact, all the departments of their client agree that the availability and quality of services in the restaurants has improved thanks to the tool.
“Currently, and given the success of the tool, we are looking to introduce Pandora FMS in more premises and aim to take a leap outside of Spain so that Toshiba globally provides the best possible service“, concludes Antonio Flores.
If you want to know more you can read the complete success story, here.
A rack is a structure, usually made out of metal and cabinet or wall-shaped, which allows to store and organize the different components of computer installations, such as servers, storage systems, switches, etc.
Is that it? Are you disappointed? Well, hold on, although they don’t seem like much, the world of racks can actually be quite tricky. Not only are they very necessary if you want to store a computer installation, but they usually fulfill relevant technical functions when it comes to helping the components they house work properly.
What are racks for? They store your installation, so, indeed, a rack is not just any closet. Before acquiring one, take into account certain things, or you might regret it. So, how about seeing some of the most important ones?
Some things to consider before buying a rack
-Where will it be located?
Now that you know the answer to “what are racks?”, you may wonder why it is important where to place them. Well, it is not the same to place it in a space specifically enabled for that purpose (a room for IT) or in just any place (an office or a corridor, for example). You should think about different models depending on the place where you will place your beloved rack. For example, if you are going to place it near a work area, perhaps you should look at racks that guarantee low noise level (some computer components can be noisy when they are in use). However, if you have large IT rooms, other factors, such as size, may be more important for you.
-How many components will it house? What type and size?
It is a matter where you have to use your best skills for calculation and foresight.
If you only have a limited number of components and you don’t think you will need more, you may not need a very large rack. However, if you have a pretty good number of components or you foresee you might need a larger installation, maybe you should consider buying a larger rack, in order not to fall short.
In a similar fashion, the expected type of components that you will need to store is equally important, in order to buy a rack with the appropriate measures.
So the issue of measures is one of the most relevant ones. The measures can be key when determining if you are making a meaningful purchase or if the rack will not serve its purpose when you need it. To such an extent rack measurements are important, that there is an EIA standard that sets the “Rack Units” or “U” and that establishes the measures in which the size of each rack is accounted for.
Without going too deep into it, remember that racks usually have two formats:
On the one hand, there are cabinets, which tend to be larger.
On the other hand, there are murals, which are usually smaller and are often placed on the floor or anchored to the walls.
Taking into account all this and the size of the hardware you will use, remember that the components must not only fit in the rack, but there must be enough space to install the necessary wiring without twisting or bending it too much. Also remember that there should be enough space in the structure to allow proper ventilation and cooling, in order to avoid possible “hot spots” that could damage the installation. This is one of the key points to consider when choosing a rack, so do not forget it!
-How much flexibility will you need?
Some types of rack offer more flexibility than others, so this should also be something to keep in mind. Will you need to include new equipment? Some racks allow it more easily, through more custom options to add new shelves or allowing additional cooling required by the added components.
Also, keep in mind that many manufacturers usually offer customization possibilities, so don’t forget to ask about the options they may be able to offer you.
-Make sure the rack complies with current regulations.
It will be very important to ensure that the rack meets the legally established technical standards, both for safety and performance purposes and to ensure that it allows you to install components from the most common manufacturers. Regulations are usually quite comprehensive in this regard, so make sure you are buying a quality product. Remember that some issues, such as correct cooling or stability, will be very important when it comes to ensuring the safety and proper operation of the installation, so do not overlook such important details.
-Pay close attention to safety and additional components.
This should always be pointed out. Of course, the rack must have a structure that keeps it safe from falls or accidents. Also remember that many racks usually have doors with locks, which makes them safer. In addition, factors such as lack of space or poor structure configuration can do a lot of damage to your installation, so make sure the rack allows proper cooling, for example, through installation and active cooling element efficiency, such as fans. Also, remember that there are certain components, such as power distribution units (PDUs), that you may want to use, so do not forget to check that the rack you are buying supports their use.
And that was our brief summary, so you got to find out “what are racks?” and some things you should keep in mind before buying one. You thought it was going to be as simple as choosing a closet to store your clothes, huh? Well, you’ve seen it is not.
Have we left something out? Sure. That’s why we would be very grateful if you could leave a comment telling us what factors you consider the most important when buying a rack. You can do it very easily through the comment box that you will find right at the end of this article.
But of course, before you start typing like crazy, how about spending a few minutes to get to know Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Click here.
Or if you have to monitor more than 100 devices you can also enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. Get it here.
Finally, remember that if your monitoring requirements are more limited, you can use Pandora FMS OpenSource version. Learn more about it here.
Do not hesitate to send us your questions. The team behind Pandora FMS will be happy to assist you!
As you may already know, Docker is an amazing tool for collaborative programming work, allowing us to work in a virtually identical environment, regardless of the operating system we are on.
In a previous article we learned how to create our own Docker images to test and distribute our applications without worrying about their dependencies.
With this command, the Docker container is started using the previously-created image. But, what is exactly executed? What do all these parameters mean? To find out the answer, today we will see how to execute the docker run command and its most used parameters.
We will start from the basics. We can execute the docker run command without any parameters, for example using this command:
docker run hello-world
Which will return an output like this one:
In this case, it will activate a container with the hello-world image. If we do not have it downloaded, it will connect to the DockerHub repository, download and execute it.
As you can see, it simply executes the entrypoint or CMD by default (as the case may be) and at the end of the execution the container will exit, staying stored in our computer.
If you’re interested in Docker, you’ll be interested in knowing the state of your systems, right?
If so, we have something to tell you. A free monitoring program for you to try wherever you need: home, office, office, company… This software monitors everything:
The docker ps command
If you execute the command:
docker ps -a
You may see all the containers you have executed in your system. The -a parameter shows them all, both those that are running and those that are not. Without this parameter, it will only show the running containers by default. If it is run on my system, this will be the output:
Let’s analyze this output to understand the fields it shows. The first thing we can see is that there are 3 containers (3 lines) in this system. The first line refers to our “hello-world” execution. The other two containers were already running within the system, but I left them to compare the returned information.
As you can see, the docker ps command returns information related to our containers. The information showed is the following:
Container id: It is the unique identifier or ID of each container. This id is automatically assigned by Docker.
Image: This column indicates the image used to activate the container. If you take a look at the last line, you may see that the hello-world image has been used in the first docker run.
Command: It is the command to start the container. It is defined in the dockerfile by the CMD statement and it is what is executed by default when starting the container. This command can be modified when executing a container.
Created: It tells you how long ago the container was executed.
Status: It indicates the current state of your container. As you can see, hello-world was executed and died, so it shows the exit state and its error code between brackets, in this case 0. This will be very useful to debug the application in case something fails and the container is closed unexpectedly.
Ports: This section is very important, since it contains information about which ports are exposed from our container. In the case of hello-world, there is no exposed port. As you know, a container is isolated from the system, so to have access to the running application, the corresponding port must be exposed. Not only it is possible to expose the ports, you may also forward them indicating that the X port on your host system is redirected to the Y port inside the container. That way, you may give external access to your network applications. There are other ways to grant these accesses, but they are more advanced. Usually port redirection is used, which you will learn to do in this article.
Name: It is the name assigned to our container. Docker assigns a name to our containers automatically by default, but it is possible to indicate the name you wish in the docker run execution.
Running docker run
Now that we know how to retrieve the status and features of our containers, let’s see what we can do with the docker run command. Let’s review the most useful parameters. For more detailed information on the docker run command, you may take a look at the official Docker documentation: https://docs.docker.com/engine/reference/run/
First let’s see the structure of the docker run command:
docker run [OPTIONS] IMAGE[:TAG|@DIGEST] [COMMAND] [ARG...]
As you can see, the parameters or options are placed before the name of the image you want to use. Then you may type in a command with its own arguments that would overwrite the default image CMD. Let’s see an example by running:
docker run alpine
With this statement, we tell Docker to execute a container with the image called alpine with the default options. Alpine is a very small Linux distribution used in the container world. If there is no tag assigned to the image, it will use “latest” by default.
The result of this command will be similar to:
Where the image:tag will be downloaded in case it is not available, and will execute a container with this image. Since the default command of this image is sh, it is run, it does not give back any output and it is closed, as we can see if we execute a docker ps -a
There are modifiers to keep the container running with the sh command but we will see that later. For example, we will overwrite the default command using ifconfig to get the container internal ip address. So we will execute:
docker run alpine ifconfig
That will return the output of the ifconfig command inside the alpine container:
Now we will execute the same docker run, but transferring a parameter with the name of the interface to the ifconfig command, so that it only returns the information of the eth0 interface, and we will obtain:
As you can see, we can add any parameter to the command that we define to our container.
Let’s take a look at our container list with a docker ps -a
All of our executions are there with the commands we have defined. There is an option to order Docker to delete the container once it is executed.
Docker run parameters
We have already learned to execute a container and overwrite the default command. Now we will see the options or parameters that allow us to modify or add features to our containers.
Deatached (-d)
It is an operator that allows to instruct Docker to run the container in the background, leaving the prompt free while the container is still active. For example, we can execute:
docker run -d hello-world
You will not see the execution of the container, since it will run in the background. It is useful for long services or tasks that we don’t want to keep the prompt busy.
Foreground/interactive (-it)
If you want to keep the container running instead and even interact with it, use the -it parameter. Since we know that the default alpine command is sh (a shell lighter than bash), we can use the -it parameter to interact with it and launch different commands inside the container.
docker run -it alpine
This will allow us to interact with alpine directly from the shell.
Name (–name)
This parameter will allow us to assign a name to our container. As I said before, Docker will assign a random name to your containers, but you can assign it directly from the docker run execution.
Be careful with this option, since the name is exclusive and only one container can have that name. So if we have a container (running or stopped) with a name that we want to use in the docker run command, Docker will not allow it. So we will have to choose another name or remove the old container with the assigned name.
To assign the name “test” to an alpine image container, you may execute:
docker run --name test alpine
Clean up (–rm)
The –rm parameter makes Docker remove the container at the end of the execution. That way, you will not have all container executions stored. To use the –rm parameter in an alpine container that displays the message “hello world” and then auto-deletes itself, use:
docker run --rm alpine echo “hola mundo”
EXPOSE (incoming ports)
You may expose ports of our computer that are redirected to another port in our container.
For example, if you want to run a container with a web server and you want for the container to be accessed from outside, expose a port.
To expose a port, use the format: [ip]:host_port:container_port
The [ip] field is used to filter the sources. If not defined, it means all (0.0.0.0).
To redirect, for example, port 8080 of my computer, from any source, to port 80 of a container that uses the nginx:alpine image, I just have to run:
docker run -d -p 8080:80 nginx:alpine
I have used the -d parameter so that the container is running in the background, since Nginx is a web server that will continue to run until stopped, and if we do not use -d, it will keep the prompt busy.
As seen in the image, the container keeps being in the background in a running state. If I curl my own machine on port 8080, it redirects me to the Nginx server running on the Docker, which has port 80 exposed.
If we do a docker ps, in the PORTS column we can see the redirection of port 8080 to 80 from all sources.
It is possible to use parameter -P (uppercase), which will redirect all exposed ports of a container. We cannot choose on which port we want to redirect, but it can be useful for quick tests.
For example, if we execute the base image that we created in the previous article that exposed several ports, we can see how Docker will redirect them all by assigning random ports.
docker run -P -d rameijeiras/pandorafms-base sleep 100
In this case, the sleep 100 command is used to keep the container alive for 100 seconds. In addition, I have used the -d parameter to keep it in the background and I have used the -P parameter to redirect all ports shown in the image.
ENV environment variables (-e)
With the -e parameter, we can define environment variables for the started container. This is especially useful when the container is configured to use these environment variables and modify their performance. As we saw in the previous article, our Pandora FMS container used the environment variables to define the database to which it would connect and its connection credentials. To define environment variables, we can execute:
docker run -e "APP=PandoraFMS" -e "VER=740" alpine echo "$APP $VER"
As seen, the environment variables that we defined in docker run command execution were assigned within the container.
VOLUME shared filesystems (-v)
The -v parameter is used to manage volumes in Docker. As we know, the data modified within Docker is volatile, but by using -v, we can configure data persistence. This is especially useful for activating a database container or web servers.
With the -v parameter, you can do 2 different things. If you execute it followed by a volume name, you will create a persistent volume that will handle Docker, for example:
docker run --rm -v myvolume:/app alpine sh -c "echo persistent > /app/file"
docker run --rm myvolume:/app alpine cat /app/file
As you can see, we have executed two containers that self-destruct, pointing to myvolume, but although the first container was destroyed when the file was created, the second one is able to access the data, since the app directory is linked to a persistent volume on our host machine.
You can see the volumes created on your machine by executing the command docker volume ls. The issue of volumes in Docker containers will be seen in another entry in this blog.
The second method is the bind method. What it basically does is “transfer” a directory from our host machine to the container. This will allow us to configure and modify files on our local machine and for these to directly affect the container. If for example, we want to show our website, which we have placed in our local directory /tmp/web/index.html, in an Nginx container, we would have to execute the docker run command referencing the source and target directories with this format: -v host_path:container_path:[rw/ro], where you may optionally define the read and write permissions of this directory. In this case, we keep the default one. The command would be:
docker run -d -p 8080:80 -v /tmp/web/:/usr/share/nginx/html nginx:alpine
As you can see, if I bind my container and then edit the files locally, the changes are immediate on my Nginx server.
Docker y Pandora FMS
You already know all of the docker run basic options, so at this point, you are already a Docker ninja. So, test your skills by using everything you have learned to activate a complete Pandora FMS stack.
We will use two containers, one for the application and one for the database. Not only that, we will give the database server persistence so that in case of failure the stored information is not lost.
We will only need 2 docker run commands. And that’s it.
In the first one, we will start a container for the database. We will use a Percona Sql modified image. You can see the dockerfile in my of GitHub repo (by now you will be a whole expert reading dockerfiles).
We wait a couple of seconds and we already have our database running.
Now we run the Pandora FMS container that points to the database container. We can point to both the internal and external IP. Since we have done port redirection for port 3306, we will use the external IP which, in this case, will be my host IP.
And there we have our Pandora FMS Community instance version 740 with only two commands. Impressive.
Let’s check that everything works properly. From the browser, we go to the address http://<host_ip>:8081/pandora_console.
Now we simply log in with the credentials admin:pandora and we will have access to the Pandora FMS web console.
In the following articles, we will learn how to use the docker-compose orchestrator to manage Docker containers in a fast, simple and easy way. So, stay tuned for the coming posts, to learn how to get the most out of your Docker container applications.
Also, if you want to know how to create docker containers to deploy applications you can take a look at this video:
Finally, remember that you can learn much more about Pandora FMS by visiting our home page.
Or if you have to monitor more than 100 devices you can also enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. Get it here.
Virtual assistants: what they are and how they help us
Alexa, Siri, Cortana, Aura, Bixby, Irene and Sara. What do all of these names have in common, other than sounding like women? Are they a collection of scientists and artists who were only called by their proper name? Are they a regional women’s petanque team? An angelic and marvellous choir that is on tour? No! These are the names of the most well-known and admired virtual assistants in technology. Alexa from Amazon, Siri from Apple, Cortana from Windows, Aura from Telefónica, Bixby from Samsung.
What is a virtual assistant?
If we go to Wikipedia, it will tell us that a virtual assistant is a kind of software agent that offers us services and helps us to automate and perform tasks, perhaps with a successful synthetic voice.
The services it offers us will be based on the data we will give it about us, by letting it know our location and postulate it so it can gain access to information online, where almost all your power and skill lies.
The technological combo that makes the virtual assistant possible is a combination of the current boom of mobile devices, programming interfaces and the rise of mobile applications.
Like almost everything pragmatic in this world, this type of magic arose for military use, but it is already sneaking into our homes thanks to the power of marketing and the perseverance of companies.
Currently virtual assistants can not only be configured with the user’s voice; we can also interact with them in writing or through images. Which opens up a world of possibilities for us.
Thanks to its recent expansion we can find these virtual assistants in all kinds of objects and surroundings: speakers with a pretentious art deco finish, apps, smartphones, watches, electrical appliances, cars and operating systems everywhere.
What are virtual assistants dedicated to?
But then, what do these elves, who speak to us from junk, do for us? How do they help us in our daily routine? Well, they won’t help you mow the orchard, but apart from that in almost everything. They turn on appliances from distance, order a taxi without having to raise your hand or whistle down the street, they magically make a motorcyclist deliver you Chinese food at home and know your household. And, if you want to, they simply serve to give you all the information you need with a good robofriendly diction. They read the news to you like a butler, tell you the upcoming weather outside like the brightest grandmother meteorologists and estimate the traffic in your area so you don’t get unnecessarily angry in front of the horn.
There are also virtual assistants who DJ or schedule movies and series on your TV or even read you an audiobook to go to sleep. Just ask, politely or not, and the virtual assistant will do its utmost to make you happy.
Virtual assistants like Siri give you the possibility to send messages by WhatsApp, schedule your alarm in the local time in which you need it and create a reminder so that you do not forget the birthday of your partner, the trip to the dentist or that important meeting in which you will be placed at the top of the company. And if you’re lazy they also regulate the brightness of the screen and turn off Wifi so that no one contacts you. The capabilities of a virtual assistant are numerous, but you have to discover them step by step. However, they will help you save effort and treasure your precious time in all aspects of your daily life.
Virtual assistants: data
As we move forward today, these virtual assistants are becoming more and more present in our daily lives. We are increasingly using them more, or so says a recent study by Gartner, an information technology research consultancy based in Stamford, Connecticut, USA. According to his studies, taking his own country as a standard, virtual assistants are already used by 42% of the population in the US. In the UK,by around 32%. More than a third of this workforce uses, more than once a day, this technology.
Of them all, the vast majority, about 54%, uses Siri. But hey, with the new additions to the word of the virtual assistant sooner or later someone will start to opt for others.
According to Gartner, on a global scale, by 2019, 49% of the population was using virtual assistants hassle-free. Perhaps some will go further and establish a love affair with her as happens in the movie Her (Spike Jonze – 2013).
According to a report by Socratic Technologies, a consultancy dedicated to research, people see different qualities in them when it comes to using them. In one of their polls, in the United States, 59% of the respondents used assistants to give greater comfort to their daily lives and 40% say they use it simply to not be staring at the screen all day.
But there are still bright people in this world, people who see the cons hidden in the midst of so much profit. These people dislike the way virtual assistants violate their privacy, and point to it as one of the most hateful points. Many other users say that the virtual assistants make life less personal, colder, barely human.
Monitoring of virtual assistants
Is it possible to monitor virtual assistants? What the hell is virtual assistant monitoring? Excellent questions for a monitoring blog like this. For now, it’s quite likely that it is possible. It all depends on how our virtual assistant is programmed, being particularly important the permissions to access the information it contains. But of course certain aspects could be monitored as long as a monitoring agent can be installed. For non-local monitoring, it could be done without any problem, as it may be to know if our virtual assistant is turned on or not. But it’s still a dimension to be discovered.
Once you’ve got into the ins and outs of monitoring, would you like to take a walk? Go even further in the world of technology? Do you know Pandora FMS? Well, Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
You can even send any questions you have about Pandora FMS. Do it in a very simple way, thanks to the contact form, to be found at the following address.
“C Programming language” (or simply C Language) is the title of the book published in 1978 by Brian W. Kernighan and Dennis M. Ritchie, where they introduced the idea of presenting an example program called “Hello world !” And that is today a common model in almost every tutorial for programming, regardless of the language used.
Perhaps from there comes the idea of C language omnipresence. The book presented many paradigms, or at least several writing styles that we still use today. But C Language also has a dark past that will surprise you.
Legend: “C Programming Language https://commons.wikimedia.org/wiki/File:The_C_Programming_Language_logo.svg”
BASIC language and the ABC of programming
I learned BASIC Language from Thomas E. Kurtz and John G. Kemeny through a book. When computers finally came into our daily lives (long story), what I had at hand was the Microsoft Quick Basic® (not to be confused with Microsoft QBasic®, that one came much later) and I used for a little while Microsoft GW-BASIC®. In 1990, we learned in college about the ANSI C specification, which had come out the previous year, but there, in engineering degrees, we were so into Pascal Language for pragmatic reasons. Shortly thereafter, we moved to Microsoft Visual Basic® to then reach a turning point in proprietary programming: Microsoft Visual Studio 97®, the first office suite with several languages, including Java and C++ (yes, from this last one Rust Language was “born” in 2010, with which the popular Mozilla Firefox® browser is compiled).
Up until that point, C Language had grown enough to evolve, but where does it really come from? Although there was never an “A Language” as such, what did exist was the “Basic Combined Programming Language” or BCPL ( O Intermediate Language included) which later transformed into B Language, but both were not enough for the new hardware (I may be simplifying this too much, and historians may start chasing me with torches and sickles). It turns out that, in 1969, they invented the PDP-7 computer, with which Unix® was born the following year. The next computer was the PDP-11, with which they could execute C Language to rewrite Unix®, and that is how the legend was born in 1972.
Lesson learned
What the programmers realized was that C Language could be implemented in many different hardwares. The task was not, nor it is easy, in fact, it is still a burdensome task. But if you want something very well structured and well founded, C Language is what you’re looking for.
But be careful, C Language is so far, or rather abstracted from hardware, that there may be serious problems later. It makes you come a lot closer to the hardware, so much that it makes you understand more and more about different electronic components. That is the good thing about it and it can be of help in the monitoring field, especially in the industry area.
Hardware, software and C Language
C Language has a problem very similar to what we reported in a previous article about hardware: a serious issue related to access to memory (Random Access Memory or RAM). If you have an assigned memory range, say from 100 to 200, if you perform a cycle up to 201, you will suffer major inconveniences. So, they make programs that delve beyond what they are supposed to on purpose, and C Language allows it. Another problem is variable initialization. It is assigned a place in memory, but the value that was in that sector is not “deleted.” Look at the quotation marks: you must type in the initial value you need in each variable: if it is numerical, zero (usually), but if it is a date, there you may have problems.
This leads to another problem: handling variables that handle different types of data, for example “adding” a date with a text string. The fourth main problem is to release some variable and then re-access it: there is no warning or error warning, if you are lucky enough and the operating system doesn’t use that memory sector where your variable is, you won’t even notice it, but at some point your algorithm will fail.
Although C++ comes from C Language, I should make clear that the first one is object oriented and the second is structured programming oriented. Therefore, it is useful for our purpose of building small scripts for monitoring. Although it would take a whole article to describe both programming models, I can tell you that C++ includes structured programming but uses objects to take advantage of the most advanced hardware we currently have, especially that with multiple cores.
Not everything is lost
Do you remember that we mentioned Pascal language and its use in engineering? Well, this language does not allow operations between different types of variables. In addition, its math oriented syntax makes it useful for that field. However, it also suffers from what has been said about the exceptions of C Language.
Nowadays, there are modern and safe languages such as Rust (inspired on C++) and even Swift Language (inspired on Rust itself with Haskell, Ruby, Python and C#) that get rid of all these “inconveniences” from memory management. But the hundreds of millions of code lines made in C Language (see Linux kernel project, for example) would make it necessary to create another language specifically for migration. Therefore, nowadays, people work on a progressive change basis, which is better: slow but sure.
For these reasons, we include C in our list of the most used languages and whenever you have to monitor at some high point, you may use it confidently, although the work will be hard (they say that with C Language you have to reinvent the wheel, but I say we can even make octagonal wheels if we need them to be that way).
Pandora FMS
We provide lots of flexibility in terms of languages: for example, when creating a remote inventory module, you may either use C++ or even Java. The key is that, regardless of the language used, it returns a value with a specific format. Even our agents are created with C++ and Perl!
If you are interested in knowing better the scope of Pandora FMS, we encourage you to click on this link.
In case of having more than 100 devices to monitor, you may contact our Pandora FMS team through the following form.
Also, remember that if your monitoring needs are more limited, you have at your disposal the OpenSource version of Pandora FMS. Find out more here.
Find out how to create Grafana dashboards with Pandora FMS data
About a year ago, in another Pandora FMS blog, we talked about what Grafana is, we explained what it was and how it was related to other software. Now we go a little further and we want to show you how to create Grafana dashboards with the data provided by Pandora FMS.
It is undeniable that this tool enjoys the support of a large user community, due to the versatility it offers to use different data sources to have displayed on its boards.
And naturally, we wanted to offer our Pandora FMS users the possibility of displaying monitoring data through Grafana dashboards. That is why today we provide you with a simple guide to achieve it.
What do you need to create dashboards in Grafana with Pandora FMS data?
Well, as obvious as it may seem, you need to have at least one Pandora FMS installation already running. This integration will allow to represent data obtained through Pandora FMS modules in Grafana dashboards. For the examples we give here, we will use as a base a standard Pandora FMS installation from the official ISO.
You will also need to have your own Grafana server, of course, since in the end it will be where you configure the boards that will display the data.
And as a communication requirement, you will only have to make sure that the Grafana server has communication through HTTP with your Pandora FMS console enabled (or HTTPS, if you have it configured that way). In this case, all communication will go through HTTP.
Configure integration in 3 steps
As the title of this section said, there are only 3 steps to make this integration work.
1) Adding Pandora FMS extension
First of all, start in your Pandora FMS console the extension that will allow you to obtain the data to be represented in Grafana dashboards.
To that end, just download the ZIP package that you may find in your library and upload it to the Pandora FMS console from the menu: Admin tools > Extension manager > Extension uploader:
It is important not to check the “Upload enterprise extension” option.
In short, these steps basically locate the contents of the ZIP file in the extensions directory of the Pandora FMS console, which will lead to the directory being created:
/var/www/html/pandora_console/extensions/grafana
If, as in this case, the installation is based on a Pandora FMS ISO, it will also be necessary to modify a configuration parameter of the Apache server.
Simply edit the file /etc/httpd/conf/httpd.conf, and set the parameter “AllowOverride none” to “AllowOverride All”, within the directives of the block ‘<directory “/var/www/html”>’ since that is where the Pandora FMS console is located. Therefore, it should be this way:
<Directory "/var/www/html">
#
# Possible values for the Options directive are "None", "All",
# or any combination of:
# Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
#
# Note that "MultiViews" must be named *explicitly* --- "Options All"
# doesn't give it to you.
#
# The Options directive is both complicated and important. Please see
# http://httpd.apache.org/docs/2.4/mod/core.html#options
# for more information.
#
Options Indexes FollowSymLinks
#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
# Options FileInfo AuthConfig Limit
#
AllowOverride All
#
# Controls who can get stuff from this server.
#
Require all granted </Directory>
We will also add a parameter in the PHP configuration. We will have to add the following line at the end of the file /etc/php.ini:
serialize_precision = -1
And for these changes to go into effect, the Apache service must be restarted:
systemctl restart httpd
2) Loading the Pandora FMS plugin for Grafana
Now everything related to Pandora FMS is ready. The only thing left is to include in Grafana the plugin that checks the data with the extension uploaded in the previous step.
Upload the ZIP file to the Grafana server with all the plugin files and place it in the path “/var/lib/grafana/plugins”. Unzip the file on this path with the “unzip” command and restart the Grafana service to load it:
cd /var/lib/grafana/plugins
unzip pandorafms_grafana_datasource.zip
service grafana-server restart
3) Configuring Pandora FMS as data source for Grafana dashboards
Add the following lines to the Grafana final configuration file (/etc/grafana/grafana.ini):
After this change, the Grafana service must be restarted with the following command:
service grafana-server restart
We’re almost done, don’t panic! At this point, what you have to do is configure the plugin uploaded in Grafana so that it connects to the extension loaded in Pandora FMS and allows you to use its data in Grafana dashboards.
Access the “Configuration > Datasources” menu in Grafana and click on the “Add datasource” button:
You will see different plugins that you may configure, and at the bottom of the list, you will see the plugin that you just loaded for Pandora FMS. Click on it:
This will take you to a form where you only need to fill out 3 fields for the connection with the Pandora FMS extension:
URL to the extension, which according to the suggestion we will see will be (by default) “http://x.x.x.x/pandora_console/extensions/grafana”, where “x.x.x.x” is the IP address or DNS name of your Pandora FMS console.
Pandora FMS user, which will allow you to obtain data for Grafana dashboards. This user must have at least agent read permissions (AR) and can only obtain data from those agents on which it has permissions.
Pandora FMS user password.
With these fields completed, you may click on the “Save & Test” button to verify the operation of your new data source:
What happens if it does not work properly? In configuration you might see different errors, such as:
HTTP Error Bad Gateway → If Grafana could not connect to Pandora FMS or if the indicated IP address was incorrect.
HTTP Error Not Found → If the indicated URL was not correct, for example because the Pandora FMS extension was not correctly loaded or simply because of an error when typing in the URL in the form.
Datasource connection error: Unauthorized → If the user and/or password indicated were not correct or if the user did not have basic agent read permissions (AR).
But if you have followed all the steps up to this point, you should not have any problems. And just like that you are ready to create your first dashboard in Grafana with Pandora FMS monitoring data.
Creating your first dashboard in Grafana with Pandora FMS data
Although we are done with the Pandora FMS configuration as a data source, we will briefly see how it would work.
First, go to the “Create > Dashboard” menu, and in the panel that will appear, click on the “Add query” button:
This will take you to a form where to choose your “Pandora FMS” data source in the “Query” drop-down. This will make the bottom of the form change and you will see a query to choose a module from which to display the data on the board:
Label: It will allow you to specify the tag that you wish for the data represented for this query to have.
Group: It is used to filter the agent about which to represent data. A group must be chosen.
Agent: It is used to filter the module about which to represent data. Some agent must be indicated.
Module: It is used to specify the module about which to represent data.
TIP: It is a field that will allow to indicate whether the data to be represented will be compacted or not. If unchecked, the data will be compacted, which will result in easier-to-interpret and faster-loading graphs, although the data sample will not be the actual one but rather an average.
And once done, there you have your Pandora FMS data in Grafana.
You may include more than one query in the same board, which allows you to compare data from different modules:
And you may also add more boards within the same Grafana dashboard, so that you have all the necessary information on the same screen:
We hope you found this guide useful, and do not hesitate to check other interesting articles on our blog. Besides, you can also see this great video about Grafana’s integration with Pandora FMS monitoring.
Before we say goodbye, remember that you can learn much more about Pandora FMS by entering here.
If you have more than 100 devices to monitor, you can contact us through the following form.
Also, remember that if your monitoring needs are more limited, you have the OpenSource version of Pandora FMS available. Learn more about it here.
Do not hesitate to send us your queries. The Pandora FMS team will be happy to assist you!
Official greetings for Christmas and New Year from Pandora FMS 2020
I am lucky to be able to write this article as I watch, above my laptop screen, the lights that decorate the street of our headquarters these weeks. The cold tries to weakly tarnish the office window, but it fails to do so. For the artifice of the bulbs there is no opacity or wall. While drinking the first holy smoking coffee, I feel the Christmas mood and… ahem, cold… Because, you’re right, there is also a bad side to these days: the overcrowded malls, the pile of Christmas cards from who knows, and as I was saying, the destructive colds that get you down with phlegm, chills and make your voice sound like a sore zombie.
However, let’s focus on the positive stuff. Let’s get a little bit corny, but in a more objective than exaggerated way, more toning than syrupy, more sincere than flattering: we love you very much. Yes, to all of our followers, from those who retweet us on social networks because they think we are funny, to those who buy all the options related to our software; from those who ask us what monitoring is to those who help us with ideas to implement the services we offer you. We love you and we love ourselves too, because we are all part of a whole that could both meet at Sundays to have bbq, as well as save the world from a zombie, biblical or alien apocalypse. WE LOVE YOU.
But if the sum of everything learned and acquired along the year was measured in hugs, we could not continue as a company, so we would also like to highlight some of the achievements we unlocked this year. It is not preening, more like rejoicing. Like the kitten who happily hides cocooned under the bushy Christmas tree or the grandfather who surrounds himself with his attentive grandchildren after dinner to bore them out of their minds with old stories.
So there we go: this past year, Pandora FMS has worked as a steamroller. We have released 12 releases with new updates, that is more than 100 improvements for the Pandora FMS tool. It was time for improving the interface, and we did so. We have also made many changes that have helped improve and increase the range of features, such as Discovery and Omnishell, our first step in IT automation. Discovery has been created in order to make monitoring simpler, and next year we hope to increase all the applications that are already available today (AWS, Azure, MySQL, Oracle Database, SAP or VMware, among others).
Not to mention everything related to our international growth. This year we have improved Pandora FMS documentation, we already have the complete translation into English and more than 1200 pages, 1200 pages!, into French. We have also translated our website into Turkish and got great partners in Turkey and Switzerland that are getting started, in addition to the project that will start soon in Mexico. And the truth is that even though it may not seem true, this year we have sold more abroad than at national level. We are already present in 50 countries!
This year has also been quite important regarding media, both in Spain (in media such as El País, El Mundo, ABC, RTVE, Computer World, Parcela Digital, El Correo de Madrid…) and abroad (in media such as El Financiero, Risemedia, Techgenix, Solutions Review, Opensource.com). We are just that popular. Pandora FMS, the Bono of monitoring.
We have also had the opportunity to attend a large number of IDG events and all kinds conventions, where we have been able to step in and feel like kings: CIO Review, Cybersecurity 2019 and SAP Insider… and I get the feel that next year, we will do much more!
When feeling so encouraged, we have also embarked on very ambitious projects, such as getting into nothing less than IT Orchestration. Therefore, and I should absolutely not forget about it, I must make a very special mention to the newly opened Department of Artificial Intelligence, which will help us promote initiatives that combine AI and monitoring.
And not to show off, but 97% of our customers renew with us. How we were not going to love you and love ourselves this year for Christmas?, there’s even more of us in our team!
That is why we wanted to thank you and wish you happy holidays because, although we are not a celebrity wishing merry christmas at their Instagram account, you sure make us feel like one.
The most beloved and photogenic tree in the office.
The tree under which we expect to find all our gifts in Madrid.
From our home offices in Alicante.
Christmas treats: the most precious treasure, together with your love, this Christmas.
Two young men enjoying their surprise.
The first figure of our living Christmas crib has arrived to our offices in Salamanca.
How to create Docker containers in order to deploy applications
If you are a developer, a systems administrator, you work in the information technology sector or you are simply a technology enthusiast who has ever deployed some type of application, surely you will have faced the same problem we all ran into. If you are thinking of dependencies, bingo!
When programming an application, the developer has a very specific environment, with lots of libraries, a specific kernel version, specific programming language versions with which he works, etc. Therefore, when sharing this application with other programmers, collaborators or even with an end customer, this application needs a series of dependencies, specific software that the application requires in order to work properly. Fortunately, the code can be compiled for the end customer in many cases, packaging it in a self-contained file that does not need external dependencies. Flatpak or Snap are good examples. Someday we will talk about these formats that are quite trendy nowadays.
Unfortunately, compiling is not always a viable solution, especially in the web world where we use pages developed, for example, in PHP, which rely on a web server.
It is quite common for a development team to be working on the same application, on different computers, and a Q/A team to be testing that same application. In those cases, dependency management can be very burdensome if we want to use that application on different machines, operating systems, etc., since we would have to define a long list of dependencies, which in many cases are not available on all systems.
In these cases, we would have to look for alternatives, compile libraries or test the application with different versions of the library with which it was designed. All of this requires a lot of time and effort when working in teams or deploying in production.
Fortunately, these headaches are a thing of the past. Today, we can develop and deploy Docker containers that are prepared with the libraries we need. Regardless of the machine they run on, they will always have the same libraries, the same configuration and will run exactly the same as on the developer’s machine. Wonderful, right? You might think: “Yes, but I could do that before with a virtual machine.” And that is true, but managing and maintaining virtual machines is much more difficult than maintaining a container. Not to mention the deployment time, in the case of a container, just a few seconds in most cases.
That is why we will teach you to create your own Docker containers to test and deploy your applications. You can also watch the video we’ve uploaded to our Youtube channel:
Please accept marketing cookies to watch this video.
Why use Docker containers?
For this tutorial, we will use Docker as our container manager. Why?
The answer is quite simple: it is a very widespread tool, well documented, with great compatibility and, above all, it is very easy to use.
Once installed, you can follow the steps exactly the same regardless of what platform (OS) you use.
To check whether Docker works, open a terminal in your system and execute this simple command:
docker run hello-world
You should get a result similar to:
In case you see a screen similar to ours, you may start.
Dockerfiles
For the purposes of this tutorial, I will use an application that I know very well, so it will be very easy to identify the necessary dependencies and the dynamics of the application. And yes, you hit the spot, we will use Pandora FMS in its Community version so that all of us can follow the steps, since the code of this application is fully open source.
You may get all the files that will be used in this tutorial in my GitHub repository: https://github.com/rafaelameijeiras/PandoraFMS. And in case you do not want to go through the creation process and you just want to simply try the Docker images we created, you can download them from my DockerHub repository: https://hub.docker.com/u/rameijeiras
To start off, I will divide my application into 2 different Docker images, one for the dependencies – which is not too different, but it is slower to build – and another for the application itself, in this case Pandora FMS, which will start from the base dependencies image and will add some extra packages. Particularly here, we will only apply the code installation packages, so it will be a much faster process. So if I need to create an image with another version of the application or with any modification, we will simply start from the base image that is not altered and we will add the package or altered code to this second image, without adding all the dependencies again in each generated image.
Base image
For the base image, we will start from the following Dockerfile file that we will analyze next. If you have cloned or downloaded the GitHub repository, you will find this file in the path PandoraFMS/pandorafms_community/base_image/
As you can see, we have started with a commented line. This line is not necessary of course, it is only a help so that when creating the image you may know which is the correct command. We will see it later, so our first effective line will always be FROM.
Docker images always start from a prior image. In this case, we start from CentOS version 7 with the line:
FROM centos:7
CentOS is the name of the image and what is after the colon (:) is the tag. In general, the tag is usually associated with the version, as it is the case with CentOS, but as it is not always the case, you have to pay attention to the image we use as base.
A good practice is always defining a version of the base image, since if we do not define anything, it will use the latest available version and we may have image inconsistency problems in the future. Remember that the idea is that in all devices where we use our container it must be identical.
The following line is a RUN. Running a run tells the Docker the commands to execute to configure the image. In this case we have 6 RUN definitions, to create the artica_pandorafms repository and install the corresponding packages.
For example, the line:
RUN yum-config-manager --enable remi-php72
It executes the “yum-config-manager –enable remi-php72” command that enables the remi repository for installing PHP7 on CentOS.
Each of the executions will create a layer in the Docker image, so it is a good practice to first execute the commands that will change the least over time.
Finally, we see the line:
EXPOSE 80 443 41121 162/udp
It shows the ports that we defined in the container. In this case, 80 for HTTP, 443 for HTTPS, 41121 for Pandora FMS Tentacle protocol and finally 162 UDP for receiving SNMP traps.
All right, now we have a Dockerfile to create our base image that contains all the necessary dependencies. We only need to execute the docker build command to start creating the Docker image.
The docker build command has several optional parameters, but for the purposes of this tutorial, we will execute it in a very simple way. To do this, we have to go to the same directory as that of our Dockerfile file and execute:
docker build -t rameijeiras/pandorafms-base .
This will start an execution process where, if everything goes well, the image we have declared will be created. In my case with the name rameijeiras/pandorafms-base but you can set the label you wish. Remember it because with this label we reference this image when creating the following image, that will be that of the Pandora FMS application. Remember that this first image will serve as a dependency base to avoid following these steps all over again with the different tests or versions of the final application.
Pandora FMS Image
To define the Dockerfile of the Pandora FMS image, the first thing to do is create a directory from which to work. If you have made a clone of my git repository, that directory will be: PandoraFMS/pandorafms_community/pandorafms
Once you are in this directory, create the Dockerfile file, which will contain:
FROM rameijeiras/pandorafms-base
ENV DBNAME=pandora
ENV DBUSER=pandora
ENV DBPASS=pandora
ENV DBHOST=pandora
ENV DBPORT=3306
ENV PASSPAN=P@ndora_2018
ENV SLEEP=5
ENV RETRIES=1
workdir /tmp
# Install the Pandora server
RUN rm -rf /etc/localtime ; ln -s /usr/share/zoneinfo/Europe/Madrid /etc/localtime
RUN wget https://downloads.sourceforge.net/project/pandora/Tools%20and%20dependencies%20%28All%20versions%29/DEB%20Debian%2C%20Ubuntu/phantomjs ; \
chmod +x phantomjs; \
ln -s phantomjs /usr/bin/
COPY sources/ /tmp
# Install phantomjs
RUN chmod +x /tmp/run_pandora.sh
RUN yum install -y https://downloads.sourceforge.net/project/pandora/Pandora%20FMS%207.0NG/740/RHEL_CentOS/pandorafms_console-7.0NG.740-1.noarch.rpm?r=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fpandora%2Ffiles%2FPandora%2520FMS%25207.0NG%2F740%2FRHEL_CentOS%2Fpandorafms_console-7.0NG.740-1.noarch.rpm; \
yum install -y https://downloads.sourceforge.net/project/pandora/Pandora%20FMS%207.0NG/740/RHEL_CentOS/pandorafms_server-7.0NG.740-1.noarch.rpm; \
yum clean all
EXPOSE 80 443 41121 162/udp
CMD sh /tmp/run_pandora.sh
As you can see, this file is slightly different from that of the creation of the base image. We will analyze this file in more depth, since it is the one that will generate the image of our application in a Docker container.
To start off, as always, a Dockerfile must start as basis of another image. In this case, the one we created earlier, which I have called rameijeiras/pandorafms-base
FROM rameijeiras/pandorafms-base
Following the FROM statement we have several sentences of the ENV type, which assign environment variables that will be available in the image to be created and therefore in the Docker container that we activate from this image. An advantage of the environment variables is that they can be overwritten at the time of the container execution, which will allow us to modify its performance (we will see it in depth when activating our Docker container).
But, what good are these variables? Well, in general, Docker containers have an entrypoint or cmd, which is what is executed by default when activating the container. In this case, and quite usually, this entrypont or cmd is an script that makes use of the environment variables to configure certain aspects of the application. We will use environment variables to define which database our container will connect to and other self-provisioning aspects. We will see it in detail when we reach the CMD sentence.
The following sentence is WORKDIR. This sentence is closely related to the RUN statement and it works very simply. Basically, everything we execute from defining a workdir will be executed in this directory. It is similar to Docker making a cd to this directory and from there continuing with the execution of all the following steps.
Next, we declare a RUN that we already know and that executes a wget command to download the binary of the phantomjs (an application that needs the Pandora FMS console to generate reports) and assigns the corresponding permissions with the command chmod. Then it creates a symbolic link of the file in the current directory to /usr/bin/ which is where the console expects to find it by default, and so we do not have to worry about changing the configuration once the console is accessible.
The following statement is a COPY which, as the name implies, will copy the files we declare from our directory defined on the computer into the image. In this case, you will copy the contents of the source folder to the /tmp directory of the generated image. In this folder you may put the resources that the container will need to start. For this image, you can find the resources in my GitHub repository, in the sources directory, which contains the Pandora FMS startup and self-provisioning script (run_pandora.sh) and the script that will be activated by the Apache web server (run-httpd.sh).
Continue with another RUN statement for the installation of pandora_console and pandora_server packages, in this case version 740, from our sourceforge repository: https://sourceforge.net/projects/pandora/
And almost finally, the EXPOSE statement, which, like the previous image, declares the necessary ports for Pandora FMS.
To conclude the file, we have the CMD statement, that defines what the Docker container will execute by default when we start it. Note that the previous image does not have this sentence and it is correct, since that image was designed as a starting image and we had no interest in executing anything upon initialization. However, the CMD statement can be overwritten when starting the Docker container if required.
In this case, the execution of the CMD is a script that uses the environment variables that we defined at the beginning of the Dockerfile with the tag ENV to connect to the database server, create the database in case it does not exist and auto configure to connect to it. If on the contrary, the defined database already exists and has a valid schema for Pandora FMS, it will be connected to this database automatically using it.
At this point, we can see how useful overwriting environment variables is, since by using the image that we will build, we can enable infinite instances connected to different databases, without needing to modify anything or regenerate the image, only by declaring it in the execution.
Now that you have our Dockerfile full and your source directory that contains the scripts in the same directory as that of our Dockerfile, go to that one. In case of cloning the github repository, the directory would be, PandoraFMS/pandorafms_community/pandorafms, and execute:
In my case, I called my image rameijeiras/pandorafms-community and assigned the tag (tag) 740 with the colon symbol (:) after the name, since I am using version 740 of the application. In the future, when I generate images of new versions, I will label them with the corresponding version.
If everything went well, you will have your Pandora FMS Community Edition version 740 Docker image and you can run it on any computer that has Docker, exactly the same, without dependency problems, packaged in a container that will always run the same. But how do we execute it? Well, with a not so simple command.
For this Pandora FMS image, the first thing we need is a database to connect to, either Docker or physical, and then run:
With the execution of this command you will enable a Docker container called pandora_community, where it will connect to my database server mysqlhost.local on port 3306 and to the database pandora (which I have created but empty), with the user pandora and password pandora. We will call the instance pandora_community and define the RETRIES and SLEEP options, which will be the number of times it tries to connect to the database in case of failure and how long it will wait before each retry.
You will see an output similar to this:
In this command, we have declared with parameter -p the redirection of port 8085 of our computer or Docker server to port 80 of the container, and ports 41121 and 162 of our computer directly to the homonymous ones in the container, so if you access the url (no space before ip): < ip_host>:8085/pandora_console you will see the Pandora FMS login screen, which you can access with the credentials admin:pandora
So here we have created our image to run Docker containers with Pandora FMS quickly and evenly in any environment. The concepts you learned may also be applied to create containers of any own or third-party application.
The execution of the docker run command can be a bit complex to understand if it is the first time you use it, especially if you add more parameters and environment variables.
In future entries, I will teach you how to manage your Docker containers easily using Docker Compose to create a Pandora FMS + Database stack in a single command that will start the entire environment in a few seconds. So stay tuned for the coming posts, to learn how to get the most out of your Docker container applications.
Finally, remember that if you have more than 100 devices to monitor you can contact us through the following form.
Also, if your monitoring needs are more limited you have at your disposal the OpenSource version of Pandora FMS. Find more information here.
Don’t hesitate to send your questions. Pandora FMS team will be delighted to help you!
Linux vulnerability is measurable through Lynis security
But does this mean that Pandora FMS is also into Lynis security? Well, its specialty is different… but yes, of course, it reaches everything covered by monitoring. In fact, flexibility is inherent to its name: FMS means Flexible Monitoring System and it is a tool with which you can save yourself many headaches, as well as tailor it to your needs!
Plugins in Pandora FMS
For those who do not follow our blog, Pandora FMS offers, broadly speaking, two types of add-ons: server and software agent.
But what does Safety have to do with Lynis and Pandora FMS? Well, you can develop a plugin that runs on the machine that you need to monitor to obtain a score, out of one hundred, which will be obtained by means of Lynis.
You are then faced with security monitoring, based on discrete values related to questions such as: What security level do you have in a server cluster?
With Lynis and Pandora FMS, in this article we do not claim to be the blue team -in the cybersecurity world the red team is the external one, which attacks your systems on purpose-, but we can answer with an exact figure when we can go to safety tests for both teams. For example, let us say Lynis gives an average score of 71 for the entire system: the red team will have to check whether that is true and the blue team will take note of the tips and warnings to improve the security level.
Lynis security: installation
Pandora FMS will allow to configure an overview in your console about the average level obtained, but if you want – or rather you have to – raise that score, you must pay attention to Lynis messages.
To that end, start by installing Lynis. It supports Unix substituting operating systems, such as FreeBSD, Linux, macOS, OpenBSD and Solaris. In fact, it is part of the solid Kali Linux distribution, used by security professionals and hackers. Us, heavy Debians, use a virtual server with Ubuntu 18 that has tasks to perform MySQL database replications.
For this case, Lynis is available in Canonical® repositories, a company that develops Ubuntu; but if your distribution has not included it yet, you can always copy the source code from GitHub.
Legend: «sudo apt install lynis»
In this last case, there is absolutely nothing to compile! Lynis does not need specialized libraries, BASH is enough to use it. However, do not underestimate Lynis, as it complies with the ISO 27001 specifications that normalize information security, as well as other standards such as “Data Security Standard for the Card Payment Industry”, in order to fully comply with the “Vulnerability Management Program” point.
Lynis security: First security report
Similar to how Docker Bench does it, you will obtain a long document where, at the end in the «Hardening index» section (strength index). In the example it gave back a value of 56.
Legend: «sudo lynis audit system»
The Lynis version we tested is for a maximum of 100 devices. The Enterprise Lynis version allows the –upload parameter which sends a copy of the results to the CISOfy software house, company that develops the application.
This evaluation made with Lynis is the Debian complement with 222 standard tests.
Lynis security: Overview
It is impossible to address all aspects because, as we repeat,you are just monitoring security and in no case are you implementing it. You are just a thermometer that reports a value to your Pandora FMS server. However, we can list the basics:
Directories and files related to registration and auditing.
Software packages installed and yet to be installed.
Configuration files.
Files that load boot mechanisms.
In points one and two, you have, just to name a few, the verification that you have installed, apt-listchanges or debian-goodies for tracking installed packages, as well as needrestart to obtain the services («daemons») that need to be restarted after some update or fail2ban to control brute force attacks. Lynis also checks that your repository list includes one devoted to security, which is the most important in order to deal against “zero-day attacks“.
In point four, remember to protect Grub2 by password, in order to prevent that, in the event of a person’s physical irruption to your equipment, it is not possible to take advantage of restarting the equipment and executing recovery options, for later opening entrance doors. In the field of partition and disk encryption, it will also present many suggestions, while in the firewall section, it will show a warning of uncreated rules, even if it is working at that moment (that is, it is installed with the default settings).
Where also close attention must be paid -due to the large number of suggestions- is the SSH support section, no wonder since this is vital to manage your equipment remotely. It checks the support for SNMP, LDAP services, if you have PHP installed and some web server (Apache and Nginx by default) and that is it.
Lynis security: Security reinforcement
If you have reached this point, we must confess that the easy part was our constant monitoring task. We have already published how to retrieve the value that interests you: you can configure Pandora FMS if this score falls below a certain value (this can happen when you have not frequently updated the software, or if several security important programs are uninstalled for some reason).
To be able to see the suggestions of the last report, just execute:
And then take note of the descriptions and structured codes. In any case, the work is upon your blue team who will be in charge of the whole task of raising that score: with constant practice and determination the time will come when they ask you what else you can do to improve. Faced with such a possible – and rather likely – request and without being security analysts, some of us will indicate the option of the Lynis security development set.
This set of development tools are very clear in GitHub and there they structure its scope in three steps that I consider very logical:
Contributing to Lynis by sending them your feedback (I call this “retribution”: here it is very important to note that you should always use “Bourne shell” instead of BASH to ensure that what your contribution supports all Unix platforms).
Make sure that evaluation quality is kept.
And the most important part: start using custom tests and then evolve to create your own plugins.
Once you reach this last stage, as a monitoring team, review and, if necessary, reconfigure the monitoring tasks. If you are still not sure why monitoring covers so many fields of automated computing, we recommend you to read our article about development, operations and security equipment where any doubt about it will be clarified.
Satisfied with Lynis security but still want to know more about system monitoring? Luckily, you are at the right place to find out more. In this blog, there are dozens of articles that can get you in this exciting world. Here you have a link to our home page.
Or you may also contact Pandora FMS directly if you have more than 100 devices to monitor. Click here.
If you have a small number of machines to monitor, you can download the Pandora FMS OpenSource versionhere.
Pandora FMS como excelente alternativa a Splunk: aquí sus evaluaciones
La revista estadounidense “Fortune” está especializada en banca, negocios y finanzas a nivel mundial… ¿Qué tiene que ver con la monitorización? Pues que en una de sus listas anuales, la Fortune 100 (mayores empresas del planeta), se observa que 92 compañías utilizan el software Splunk… Si comparamos por volumen de dinero, sí, Splunk sería el mejor software y allí acabaría este artículo.
Pero si vuestra empresa u organización se encuentra en camino a aparecer en Fortune, entonces, ¡venid y dedicad unos pocos minutos a descubrir nuestra alternativa a Splunk!
Breve historia de Splunk
Splunk es un software especializado en macrodatos (Big Data) desarrollado por una casa de software homónima. Dicha empresa tiene clientes en 74 países y alberga su sede principal en la ciudad de San Francisco, California, EE.UU. Salió al mercado público de valores en 2012 y en 2018 ya tenía una capitalización bursátil de más de 14 millardos de dólares estadounidenses… ¡Y esa es una muy grande y enorme cantidad de dinero!
Pero aquí viene la pregunta que ronda vuestro cerebro… ¿Cómo puede Pandora FMS ser alternativa a Splunk? Para poder responder a esta interrogante debemos analizar qué hace Splunk; lo que hace Pandora FMS os lo dejaremos en enlaces web para que luego ampliéis en cada característica.
Decir exactamente qué trabajo realiza Splunk es un tanto difícil porque en realidad Splunk es el servidor, un producto, y su asociado uberAgent, como su nombre sugiere, se instala del lado del cliente y es otro producto aparte. A su vez estos dos productos permiten gran cantidad de aplicaciones de terceros agrupados bajo el nombre Splunkbase. Desde mi punto de vista yo veo esto como una confederación de aplicaciones y empresas, así que deberemos adquirir primero Splunk, luego uberAgent, y después adquirir y/o desarrollar aplicaciones especializadas (de ser necesario).
Tecnologías
uberAgent para Microsoft Windows fue lanzado en el año 2013 y para MacOS en el año 2018, y constituyen las dos grandes plataformas para este agente software. Recordemos que un agente software son pequeñas piezas de software que se instalan en los sistemas operativos y permanecen ejecutándose en ellos para extraer información de monitorización y enviarla al servidor correspondiente de manera regular.
En el caso de Splunk necesita de uberAgent Software, que cumple una función importante: el subsistema Unix dentro de la máquina a monitorizar. Comunica directamente con el servidor Splunk y tiene muy limitadas funciones de recolección.
El siguiente paso es descargar, previo registro de nuestros datos personales, el uberAgent Universal Forwarder, que se encarga de administrar todas las comunicaciones, y luego podremos instalar el complemento para Microsoft Windows® para recoger los eventos de actualizaciones del SO, uso de disco duro, tráfico de red, inicios de sesión de usuarios (exitosas, fallidas), tiempo de trabajo del equipo, etc. Pandora FMS se erige como alternativa a Splunk porque posee un servidor WMI (Windows Management Instrumentation) solamente para este propósito, el cual incluso podemos ejecutar en una máquina aparte si tenemos una gran cantidad de dispositivos con este sistema operativo. El servidor WMI es solo uno de los catorce (algunos de ellos solo en la versión Enterprise) que componen un servidor Pandora FMS; no necesariamente deben correr todos en un mismo equipo, por eso hablo ya de una “centralización” que no es tal.
Splunk ofrece una versión demostrativa, que en la Wikipedia identifican como gratuita pero que en realidad está limitada a 500 megabytes para un solo dispositivo por día. Hace 10 o 15 años esa era una cantidad apreciable, pero hoy en día dudo que alcance si incluimos muchas métricas al uberAgent. Aquí, Pandora FMS también se impone como alternativa a Splunk, porque su versión comunitaria es totalmente funcional y tiene muchos complementos básicos desarrollados por la comunidad en software libre y en código abierto: salvo un identificador digital con propósitos puramente estadísticos y de actualización de versiones, corre completamente independiente (“standalone”), sin ninguna otra limitación.
El manejo de archivos de registros (logfiles o simplemente logs) tiene sus particularidades de estudio sobre las que aquí, en el blog de Pandora FMS, han escrito mis colegas. Para que Pandora FMS sea una alternativa a Splunk debemos ubicar los puntos comunes entre ambos y luego realizar comparaciones.
Arquitecturas
Pandora FMS destaca por su flexibilidad; además, posee una arquitectura modular dividida en dos componentes: servidor y consola, y cuenta con módulos que podremos instalar según nuestras necesidades. Si bien reconozco que Splunk tiene una arquitectura bastante simplificada, apoyada por aplicaciones que se pueden ejecutar independientemente, no refleja el mundo real con su gran cantidad de topologías de red.
Por ejemplo, el uberAgent Universal Forwarder cumple casi la misma función que un agente broker de Pandora FMS para muchos dispositivos, mientras que el uberAgent Universal Forwarder es solo para el dispositivo donde está instalado. Leí que se puede configurar para que este último acepte datos de direcciones específicas, pero allí hago notar otro punto donde Pandora FMS logra ser alternativa a Splunk: el protocolo seguro Tentacle, tecnología desarrollada de manera propia para asegurar la privacidad de nuestros datos mientras van de un sitio a otro.
Leyenda: Arquitectura de Splunk, licencia Creative Commons
Además, la versión empresarial de Pandora FMS cuenta con el servidor satellite, que permite monitorizar redes inaccesibles desde el servidor “central” y que además puede funcionar sin agentes software; incluye también protocolos como SNMP para concentradores, enrutadores, etc.
Instalación
Ambas aplicaciones utilizan métodos comunes: ambos servidores “centralizados” por un administrador de red y los agentes software de manera independiente o por medio de su correspondiente servidor. Recordemos que ahora existen muchas tecnologías de terceras empresas u organizaciones que permiten desplegar masivamente tanto servidores como aplicaciones, e incluso sistemas operativos completos (caso de Docker, por ejemplo).
Monitorización de logs
Y desembocamos en lo que acoté en la “Breve historia de Splunk”. He de reconocer que es asombrosa la capacidad de este software: ¡Absorbe terabytes de datos sin problema alguno! Si disponéis de dinero suficiente en hardware no veo problema alguno en ello. Pienso que el enfoque de Splunk es recoger todo de manera masiva, colocando el filtrado y clasificación ya sea del lado del cliente o del servidor. Repito, si tenemos infraestructura suficiente, ¡ea, vamos ya! Como la realidad es otra, Splunk ofrece el servicio de almacenamiento en Internet, lo que representa un coste adicional, pero que es lógico dada la naturaleza de Splunk.
Mientras que Splunk va de mayor a menor,
Pandora FMS va de menor a mayor.
¿Cómo Pandora FMS supera este gran reto para poder ser alternativa a Splunk? Se ve como una lucha entre David y Goliat… Sí, hay un «arma» pequeña pero poderosa, y os explico.
El equipo de Pandora FMS ha hecho a cabalidad sus deberes en todos estos años. Desde la versión 7.0 NG 712 (septiembre de 2017), el sistema de almacenamiento y visualización de logs dejó de ser basado en ficheros. Para ello, emplea una tecnología combinada de LogStash con ElasticSearch, pero para ello yo recomiendo dos servidores físicos distintos y bien equipados (en el enlace están los valores); como os dije, a mayor volumen de datos mayor cantidad de equipos necesarios. Por lo anterior, afirmo que Pandora FMS presenta alternativa a Splunk porque, aparte de equiparar en la recolección de logs, presenta la ventaja de un solo producto a ser instalado y configurado, con el consecuente ahorro de dinero, ¡y tiempo!
En lo que respecta al resto de las métricas (por ejemplo Goliat, el servidor enterprise de verificaciones web o el servidor de predicción, pequeño componente de inteligencia artificial), pueden ser configurados en un ambiente de alta disponibilidad, temor siempre presente en los administradores de redes al depender de pocos servidores; esto es posible gracias al diseño modular y flexibilidad de Pandora FMS.
Antes de despedirnos, recuerda que Pandora FMS es un software de monitorización flexible, capaz de monitorizar dispositivos, infraestructuras, aplicaciones, servicios y procesos de negocio.
¿Quieres conocer mejor qué es lo que Pandora FMS puede ofrecerte? Descúbrelo entrando aquí.
Si cuentas con más de 100 dispositivos para monitorizar puedes contactar con el equipo de Pandora FMS a través del siguiente formulario.
Además, recuerda que si tus necesidades de monitorización son más limitadas tienes a tu disposición la versión OpenSource de Pandora FMS. Encuentra más información aquí.
No dudes en enviar tus consultas. ¡El equipazo de Pandora FMS estará encantado de atenderte!
Do you want to know more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.