Решение для удаленного мониторинга и управления для проактивного контроля устройств, сетей и приложений. Идеально подходит для поставщиков управляемых услуг (MSP) и ИТ-команд, стремящихся к автоматизации, масштабируемости и контролю в режиме реального времени.
Мощная и гибкая служба поддержки для команд поддержки и обслуживания клиентов, согласованная с процессами библиотеки инфраструктуры информационных технологий (ITIL).
Программное обеспечение для удаленного управления серверами и ОС Windows, Linux и Mac, ориентированное на системных техников и компании, предоставляющие управляемые услуги (MSP).
Augmentez la puissance de votre surveillance. Pandora FMS s’intègre aux principales plateformes et solutions cloud.
Collectez, centralisez et consolidez les données de journaux et d’événements provenant de différents systèmes, applications et appareils dans la plateforme unique qu’est Pandora FMS.
Solution de surveillance et de gestion à distance pour un contrôle proactif des appareils, des réseaux et des applications. Idéale pour les fournisseurs de services gérés (MSP) et les équipes informatiques à la recherche d’automatisation, d’évolutivité et de contrôle en temps réel.
Helpdesk puissant et flexible pour les équipes d’assistance et de service à la clientèle, aligné sur les processus de la bibliothèque d’infrastructure des technologies de l’information (ITIL).
An extensive collection from detailed guides that break down complex topics to insightful whitepapers that offer a deep dive into the technology behind our software.
Expande el poder de tu monitorización. Pandora FMS es flexible y se integra con las principales plataformas y soluciones en la nube.
Recopila, centraliza y consolida los datos de logs y eventos de diferentes sistemas, aplicaciones y dispositivos en una única plataforma. Los datos se integran de forma nativa con Pandora FMS, sin necesidad de herramientas adicionales.
Solución de supervisión y gestión remota para la supervisión proactiva de dispositivos, redes y aplicaciones. Ideal para proveedores de servicios gestionados (MSP) y equipos de TI que buscan automatización, escalabilidad y control en tiempo real.
Potente y Flexible Helpdesk para equipos de soporte y atención al cliente, alineado con los procesos de Biblioteca de Infraestructura de Tecnologías de Información (ITIL).
Expand the power of your monitoring. Pandora FMS is flexible and integrates with the main platforms and cloud solutions.
Collect, centralize, and consolidate log and event data from different systems, applications, and devices into a single platform. Data integrates natively with Pandora FMS agents, with no need for additional tools to capture key information.
Remote monitoring and management solution for proactive oversight of devices, networks, and applications. Ideal for managed service providers (MSP) and IT teams seeking automation, scalability, and real-time control.
What Can Pandora FMS Offer as a Server Monitoring Tool?
When your server goes down, it can certainly throw a wrench into your daily processes, costing you money and even causing you to lose customers until it’s back up and running again. Thankfully, Pandora FMS can help you prevent it from happening, and in the worst-case scenario when it does, you have the tools to get back up and running again in no time with our server monitoring solution!
An All-in-One Server Monitoring Software
One of the best things about the server monitoring software available from Pandora FMS is that it’s a one-stop-shop for all of your server monitoring needs. Our software comes equipped with default policies for each operating system, application, and user environment. We also cover everything from user applications to hardware; our monitoring software is also compatible with both Linux and Windows.
Our Comprehensive Server Monitoring Solutions
When you invest in Pandora FMS server monitoring tool, you’ll be able to:
Unify different information sources (applications, logs, base operating systems, storage, networks, user experience, etc.) into a single point.
Manage everything in a centralized location equipped with plugin deployment features, remote configuration, templates, and more.
Access expansive information, including multi-year history performance data, and unlimitedly access application and server logs.
Manage tens of thousands of servers through a single console.
Ensure that your software and hardware meet your expectations thanks to various SLAs, trend reports, and Top-N reports.
Some Server Monitoring Best Practices
When it comes to server monitoring practices, there are some specific things to keep in mind that will help you and your IT team utilize your new monitoring solutions to the fullest. How easy it will be to deploy some of these practices will depend upon the monitoring tools you’ve employed as well as your knowledge of the applications, but it’s important to be aware of them nonetheless.
Phase 1: Actions to Start Monitoring
First and foremost you need to take some actions, including:
Identifying Your Assets: Identify all of your assets, including databases and the systems they feed, to make it easier to determine where the issue lies.
Identify What Needs to Be Monitored & What Doesn’t: Establish priorities to determine what is critical in terms of monitoring and what falls at the bottom of the list.
Classify Your Assets: Once you’ve developed a hierarchy for your assets, classify them by service, application, system, or resource to make identifying issues easier.
Categorize Alerts: Categorizing your alerts will make it much easier to collect data on certain issues and keep track of them when they arise.
Come Up with an Action Plan: When it comes to solving server issues, the fewer surprises the better, so come up with an action plan for every scenario you can think of to minimize downtime.
Phase 2: Identifying Problems Before they Happen
Unlike phase 1, using the right server monitoring software can also help you identify problems before they occur by providing intuitive monitoring solutions. The right software solutions will be equipped with automatic monitoring tools like big data monitoring solutions, dynamic monitoring services, event correlations, and smart thresholds, enabling users to identify things that can become major issues down the road.
What Exactly is Preventive Monitoring?
When it comes to preventive monitoring there are two important aspects, the first being defined by receiving small alerts when something leaves the normal operating thresholds. In this first scenario, it doesn’t necessarily signify a major issue, simply that something unexpected has occurred. However, defining clear parameters in such a scenario that leaves no margin for error in misunderstanding is key, that way a major event doesn’t go unnoticed.
In the second scenario, users can create monitoring displays or dashboards that are labeled and designed to compile information and create a real-time graph, enabling IT teams to determine precisely when something isn’t right.
Some of the most important tools for successful preventive monitoring include:
Alerts: Such alerts must include item groups and allow for users to define complex tasks, with the ability to insert an event into a group, including a graph and a clear description of the issue.
Graphs: Graphs can be used combined with other data to form a comprehensive understanding of an event.
Logs: Logs help users understand the raw information when an issue has arisen. These can be created through the use of data charts or analyzing the raw data being introduced to the system via log registries.
Direct Access to the Source: Direct access to the system creating the issue, as well as all of the detailed information behind an event, enables users to quickly address any issues and close the cycle.
Development from the Ground Up
Unlike many other forms of server monitoring software, the solutions from Pandora FMS have not been developed by any third-party developers; our team has built everything from the ground up. This means that you can get any necessary information directly from the source through native calls to the operating system. There’s no need to waste time dealing with going through third-party connectors to troubleshoot or obtain the info you need when you need it!
Contact Pandora FMS for your server monitoring needs!
Pandora FMS is one of the leading server monitoring companies because we offer comprehensive solutions at every level, working to meet our clients’ specific needs.
How a network operating system works and how to monitor it
In the early days of telephony, there were few people who had phone numbers in every town and city. There were just a few numbers to remember and if your brain failed, you could check with a telephone operator, women who always knew (and know) how to listen. Let’s see how a network operating system was born in the middle of the 20th century, right at the center of telephone networks.
Today, our mobile phones have replaced telephone operators, even to the smallest detail they can receive verbal orders about. In reality, the device is a simple and stupid terminal (but with higher computing power than the computers that took us to step on the moon back in 1969) but our voice ends up being executed on powerful servers… that perhaps are part of a network operating system.
X.500 Protocols
In the middle of the twentieth century, the different telephone companies had the ability to connect continents by means of satellites, apart from conventional submarine copper cables, which in turn were replaced over time by optical fiber. This created the possibility of connecting millions of people and millions of registered phone numbers. We needed to exchange information from telephone subscribers in an organized and decentralized but standardized way.
An idea arose in the International Union of Telecommunication (IUT) and they agreed on protocols (from X.500 to X.530) that evolved little by little. The project started in 1984. but it was not until 1986 that European and American standards reached a consensus. Also in that glorious year (I was finishing high school) NetWare® 2.0 came to light, which I consider to be a very famous network operating system that I worked with in the 1990s. But let’s get back to phone companies and their eagerness of sharing information.
Essentially, these protocols were well thought out and, although some did not go well, others were successful.
The first of them was the source for LDAP (Lightweight Directory Access Protocol),that basically offered a flexible way to handle and work with information. In 1988, at the University of Michigan, they started the OpenLDAP project, opened and used in most GNU/Linux distributions. To delve fully into the monitoring issue, Pandora FMS has developed a plugin that allows you to search for a value (a person’s phone number, for example) on an LDAP server, or just to know whether it is up and running.
Now you may be wondering: what does all this have to do with a network operating system?
Network Operating System and Distributed Operating System
We will use the opposite-concepts learning method.
A distributed operating system operates fully and functionally, uniquely. They are a group of very well-known computers (called rather nodes) that look like a single, large operating system for users. It is closed, and although within its characteristics an increase in nodes is planned at any time, it is under very strict and complex rules. They are systems that take a long time to be developed due to the necessary classification of the hardware that will run it. I sidestep going into more detail, but more or less, it’s like a huge gigantic computer running a single distributed operating system.
A network operating system is also made up of many computers, some as servers, others as clients and even as both in some cases. The hardware is diverse and based on open and widely known standards, and it seeks sharing to take advantage of absolutely every penny invested so that each user can carry out their work quickly and efficiently.
Although this whole perspective of sharing resources was well understood -and requested- more than anything, due to the high cost of the equipment at that time (I mean the ratio of computing power and storage for each currency invested), there was a small detail: each server was the center of its own universe and network administrators had to be very aware, for example, of the change of location of a user from a certain network to another (create a new user account in the network that receives the employee and deactivate the previous account).
Let’s see if we can notice this on the phones: today you may live in Washington and tomorrow in London; phone books will automatically take care of the whole process and the work of the International Telecommunication Union will pay off!
Following the example, if I am a network administrator in Washington and I am in London, I can log in and my information can be checked across the seas. There are additional details, such as a copy of my data being stored in London and if there is any change in Washington, it is notified and the other way around. All of this is just wonderful and it is what drives me to continue working in the field of computing!
By the way, Pandora FMS, among its user authentication methods, can use LDAP with the help of OpenLDAP software. Later on, I will talk about other important technologies also used for the same purpose.
Netware® Novell® 4.x
A good example of a network operating system is proprietary Netware® Novell® software. Or rather, it was proprietary as it evolved to GNU/Linux when its sales declined. Today, I consider it to be virtually disappeared even though it uses free software.
I had to work, as I said, with said network operating system at the end of the last century, more to provide access to databases, shared printers and optical readers than anything else. Yes, you read correctly, not all computers had CD players -DVD had not been invented- and although they do not have such drives now, it is for another reason: the ubiquity of the Internet! An inherent feature of network operating systems is coexisting at layer 3, the network layer, so it had its own IPX / SPX network protocol, which we ran alongside the “new” TCP/IP. Take a guess on which one survived and which one fell into oblivion…
The success of this network software is that, although it was proprietary, it was always ready to coexist with other proprietary or open technologies: it also supported the AppleTalk® protocol, among others, and allowed the development of third-party modules (Loadable NetWare Modules® or NLM). But the icing on the cake was NetWare Directory Services®, based on (yes, you guessed it right) the X.500 protocol suite. I consider that this gave it the competitive advantage over others for around a decade, when a powerful opponent emerged from the very core of the Internet…
Microsoft Windows 2000®
After what must have been the millennium shock, they launched this truly professional version that we quickly adopted for its stability and secondly because it first introduced the famous Active Directory® based on versions 2 and 3 from LDAP.
Pandora FMS, in its Enterprise version, offers authenticating users through Active Directory, in addition to a complement to monitor many important aspects of this information store.
Monitoring a network operating system
I already told you how Pandora FMS has never lost sight of any technology and here I describe the features – not all though – of a network operating system, although its use has decreased considerably for its own sake, in favor of improved technologies.
As I told you, it can be managed from any workstation, it is not necessary to be sitting right in front of the server. This may sound weird at this time, but the concept is fully current. As an example we have the Pandora FMS Enterprise Metaconsole that unites in a single console several of its different monitoring servers.
Very efficient file server: NetWare Core Protocol® (NCP, 1983) had “embedded” commands to manage a protocol aimed at working with Network Attached Storage or simply NAS. To be honest, this has been replaced by multiple hardware expressly built for that purpose that assume the same functions of a network operating system (disk redundancy, monitoring, auditing, etc.). Pandora FMS has plugins such as Synology NAS for that popular manufacturer brand. Other important providers that Pandora FMS can monitor (right now that I’m writing): “HP Compaq Smart Array“, “Dell Server (through SNMP OpenManageServer)” and “Hitachi DF Disk Array“.
In the previous point, with a NAS device (or several), we had our files in one (or more) very specific places, but what if we have to distribute a “disk” across a network? Look at the quotation marks: the “disk” looks like a unit, but its content is hosted on several servers… and it is as old as 1984, when it was openly developed by the company Sun Microsystems® (and later adopted by NetWare ®). If you think it is an expired technology, nothing could be further from the truth. In fact, Pandora FMS can use it if you have several Pandora FMS Dataservers, which collect and send information from software agents in a unified way (data traffic securely encapsulated through the Tentacle protocol).
Another way to share files that has caused network operating systems to decline is the popular Samba software, based on the SMB protocol, which also allows sharing printers and, to “give it a twist”, from version 4, it supports Active Directory® as a Domain Controller. Pandora FMS has multiple plugins to monitor Samba!
Finally, remember Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out by going here .
If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise DEMO . Get it here .
Finally, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send us your questions. The Pandora FMS team will be happy to help you!
In previous and great articles in here, we already talked about what Cloud is and the types that exist floating above our heads. But today, for a change, we want to focus more on one of its totally forgotten key aspects: Are clouds actually made of childish dreams and cotton candy? No! Just kidding! Today we are going to talk in “Pandora FMS discussions” about what cloud service types there are.
Of course, before, we will do a little review to get updated on what the Cloud is and the types of cloud that we can find in the extensive field of technology.
What is the Cloud?
We know as “the Cloud” a worldwide network of servers that have their own role. This server network is humongous and they work and interact with each other from the most remote places in the world. They communicate with each other to work as a single omnipotent system. Their main task is to store and manage information. They can also send content, grant services, run applications, work in streaming… Thanks to the Cloud, you don’t need to access information or files stored in your computer. You can get them online, from any device connected to the Internet. The data will be wherever you are and when you need it. The Cloud is like that, almighty.
What is Cloud Computing?
“Cloud Computing” is that wonderful technology that, using Cloud features, provides services through the Network. Cloud Computing allows us to have all our information on the Internet and to be able to work with it. It gives us access to all kinds of computing resources spread throughout the whole world. Perhaps multi location is the strength of Cloud Computing, since it offers the possibility of reciprocity and collaboration among all users. We are a team!
Cloud service types: Software as a Service (SaaS)
The most common examples of this type of service in the Cloud (SaaS) may possibly ring a bell. You just have to think about your email and office tools. That’s because Software as a service (SaaS) gives us the chance to connect to cloud-based applications, do it over the network and use them.
Software as a Service provides a comprehensive software solution, available from a cloud service provider, through a pay-per-use model. You rent the use of an application for your company and the blessed users connect to it through the network. All the infrastructure that keeps it and the information of the applications are in the information center of the supplier. The service provider is in charge of all the hardware and software and must also guarantee the availability and security of both the application and the information used. This type of service (SaaS) allows a company to start and run its applications with a low initial cost.
Cloud service types: Platform as a Service (PaaS)
There is also PaaS or Platform as a service. We can say about it that it is a complete cloud-located development and implementation environment. Its resources range from simple Cloud-based applications to fully sophisticated and chic Cloud-ready business applications.
It works as follows: You buy the resources you need from a cloud service provider, which you will access through a safe connection, but you will only pay for the use you make of them.
Like IaaS, which we will talk about later, PaaS has a server infrastructure, storage and network types, as well as middleware, development tools, business intelligence services, database administration systems and much more. The Platform as a Service is designed to hold what we could call “the complete life cycle of a web application”; That is from compilation, testing and deployment to administration and updating.
Regarding the practical part, the Platform as a Service will save us the costs of purchasing and managing software licenses or application infrastructure, as well as investments in the underlying middleware, development tools and many other resources. You can manage the applications and services they develop, and the provider everything else.
Cloud service types: Infrastructure as a Service (IaaS)
IaaS or Infrastructure as a Service is an instantaneous computing infrastructure, supplied and managed through the Network.
IaaS takes in fluctuations and rapidly increases or decreases on demand, allowing you to pay only for what is used. It also helps considerably to avoid high expenses and the complexity of purchasing and managing your own physical servers or any other data center infrastructure. Each resource is offered as a separate service component and you only need to rent a certain one for as long as you need it.
Among the great advantages of IaaS, there is avoiding high expenses and reducing current costs, innovating quickly (as soon as it is decided to market a new product) and, of course, the corresponding increase in security.
Once you delved into the technological ins and outs of cloud service types, are you hungry for more? Would you like to go even further in the world of technology? Do you know Pandora FMS? Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out by going here .
If you have to monitor more than 100 devices you can also enjoy a FREE 30-day Pandora FMS Enterprise DEMO . Get it here .
Finally, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Interview with Sara Martín, HR at Pandora FMS, a software company
“Human Resources”, what are “Human Resources”? Vegetal charcoal? A set of goods or means of subsistence? The ability to touch your nose with your tongue or move your ears on demand by just focusing your mind on them? Yes, many would consider the latter as an awesome resource, and human too, but no! Today we are not going to talk about that. We are going to talk about true Human Resources.
Human Resources is that department within companies where everything related to the people who work there is managed. Selection processes, hiring, welcoming, training, promotion, payrolls, contracts, layoffs and more human things that they make up. As department, it is essential to deal with employees, real matter, pure charcoal that gives life and energy to the hitherto lifeless machine of companies.
A good head of human resources must have instinct, leadership, patience, cunning, know how to behave, commitment, kindness, a vast knowledge of comics and glamor, the latter two are optional, but Sara Martín Boluda, Head of Human Resources at Pandora FMS, also has them.
How and why did you start working at Pandora FMS?
When I finished my studies as a health social worker, I decided to continue training in the field of psychology. While I was getting my second degree, I decided to look for a job that I could combine with my studies. And so I found a job as administrative assistant and receptionist at Pandora FMS. One of the things that most caught my attention was that, within my tasks, I was also going to be able to take part in personnel selection processes. As soon as I stepped into the office for the first time and saw the tentacle of the Maniac Mansion in a picture, I thought “this place rocks!”. That’s how they got me from the start. Within a few months, I began to carry out the first selection processes. I increasingly had more HR tasks, so I decided to get training in the sector and study a Master in HR. A year later I was already head of HR.
What is Human Resources for a company and what exactly do you do in your position?
That question would be enough for another whole interview, so I will try to be brief. The HR of a company includes all the administrative tasks related to personnel, but it is much more than that. In my case, I give much more importance to the human part. At Pandora FMS, I have done all kinds of tasks, but within HR one of the things I value the most is trying to keep peace within the organization, to help people to be as happy as possible in here, and stay motivated working comfortably. I think that way we are all much more productive and that is a visible benefit for the company.
Among those kinds of tasks, I am in charge of the administrative management of personnel, that is, holidays, transfers, payrolls and the little day-to-day things. Also recruitment and personnel selection and internal and external training, as well as the prevention of occupational risks, social benefits, mediations when necessary, etc. In addition, I’m also in charge for the Community-related issues and the wonderful videos, which you can watch in our channel.
What are the keys to choosing well when hiring someone?
The most important thing is to fit within the team and have the necessary knowledge to carry out their tasks. At Pandora FMS, we place great importance on resolution and learning and adaptation abilities.
I don’t think there is an ideal candidate. Throughout my life I have seen may endless job offers where they asked for all kinds of programming languages, in addition to high level of English and 5 years of experience, offering a salary below the market, but then, for example, when you talk to them, the candidate will never actually speak English and will only use PHP. That way you leave many highly talented people out of job offers, people willing to give their best and with a learning curve that can pleasantly surprise the team.
How is team spirit encouraged or how is the employee encouraged to work hard?
The truth is that it is hard and since recruiting at home due to COVID, much more. Now that you say it, I think that all the professionals in the sector are wondering the same.
For our part, we have always done small actions to enjoy being in the company, whether it be ordering takeout together, celebrating the birthdays of the team members, meeting in the evening to hang out, “team building” through games or our wonderful summer barbecue and christmas dinner. Now with the pandemic, we only have team meetings through Meet and improve the training of people who request it or who need to improve any of their abilities. We all hope all of this is over soon and we can organize our long-awaited barbecue of the year.
On the other hand, for workers to work to the fullest, it is necessary for them to understand what they do, that their work has a meaning and they can enjoy it. There are always monotonous and boring tasks, but when you know it is for something, everything has much more meaning. In addition, having a team full of wonderful people, who collaborate and always make you smile, helps a lot to work motivated and with a smiling face. In the end, a company is made up by its workers and, here at Pandora FMS, we can be satisfied, we have the perfect team.
Any tips to make a layoff smoother?
No, the truth is that there is no trick. It is an unpleasant situation and much more when we work in such a united way. We all know each other very well and every time there is a layoff, it is hard for everyone. You have to put yourself in the other person’s shoes, be tactful, explain the process in detail, not go beat around the bush too much and try to help as much as possible so that this person can find a new job.
How many years have you been in the company? Any funny anecdotes during these years that help to liven up a meal or a hangout?
I have been working for four years and I think I had many anecdotes during this time.
On my first day working here, for example, they gave me a documentation to shred, so I got on it, but when I saw that it started to get stuck and the sound started to disturb everyone I shared the room with, I was so embarrassed. I tried to remove the jammed paper and broke the shredding machine. A lovely girl named Carla rushed to help me and tell me not to worry. I think since then there is no shredding machine. That was the beginning of a great friendship.
The truth is that I have had a great time during these years, I have had a blast and I have very good memories.
What is the geekiest hobby you have? Does it help you in any way in your work?
I’m quite a geek in general. I collect comics, I really like video games, playing board games and role playing. I guess I have the full pack. But apart from that, I am also fond of yoga, mycology and I love fossils.
I’m kind of weird and I guess that made me fit in well with the team. We are lucky to have common hobbies and that makes lunch times much easier.
What band, singer, DJ, instrumentalist, or thing can’t you stop listening to lately?
I’m on an endless loop with Candlemass and Amelie Lens. Yes, they have nothing to do with each other, but electronic music and doom metal are my two favorite genres.
Tell me the first thing that comes to mind when I say these words:
SNMP alerts: what they are and why you should configure them
The SNMP world is becoming more and more important within the monitoring environment, as companies need to find software that has specialized tools for trap monitoring. If you are not familiar with the term SNMP, take a look here.
In this article, we will focus on Pandora FMS SNMP alerts, on how they work and how you can benefit from them.
What are SNMP alerts?
As some of you may already know, Pandora FMS has an alert system based on previously created modules, where different actions can be performed depending on the values that each module collects. We have even gone so far as to talk about more complex alerts derived from the events that are generated within Pandora FMS. Still, let’s take a brief look at the alert concept, focusing a little more on this particular type.
SNMP alert concept
The first big difference between the aforementioned alerts and SNMP alerts is the “arrival” of the data that triggers the alert. While in the first alerts, Pandora FMS is in charge of collecting data through remote or local checks, in this case, it is the device the one that will send Pandora FMS the trap that will trigger one of the configured alerts.
As there are several identifying fields within a trap, SNMP alert configuration is very versatile to be either very restrictive or very general when it comes to detecting the trap that triggers an alert.
Among the different configurable fields of SNMP alerts, it is worth highlighting:
Enterprise string
Custom OID value
Agent (IP)
SNMP trap type
Let’s take the case of a restrictive configuration or a very general configuration. For a general configuration, it would be enough to add, for example, an IP of a router from your network. In this case, any trap that arrives from that router will trigger the action that it has configured within the alert.
On the other hand, maybe you want to have an alert that fires in very special cases. To that end, for example, you have to fill in all the fields and set the alert to only fire when it comes from the router with IP XXXX, from OID .1.2.3.4.113.122, which is the type of interrupted linking trap.
What can I do with SNMP alerts?
There is a wide variety of actions that can be performed when Pandora FMS receives a trap, either with default actions or custom commands. Below we will see some examples of common actions in SNMP alerts.
Send an email
A widely used action is to simply send an email to the operator in charge of managing the company’s systems. This email could include specific details of the hardware that triggered the alert and its characteristics, keeping the operators up to date in real time.
Create event
When a trap is received, you can generate an event in Pandora FMS. This event would show which agent (IP) it is and what happened.
Let’s see a practical example. If you had an agent with IP 192.168.70.1, an IP that matches your main router and which is sending traps with its changes, once the trap arrives and matches the configuration of the created SNMP alert, it will create an event with custom data such as: event text, event type, agent, priority or even comments so that the operator of the event view can see the corresponding information.
Custom Commands
Just as there is a wide variety of traps that Pandora FMS can manage, custom measures can be created for each of them.
This configuration is designed to be able to generate multiple very specific SNMP alerts for each trap, hardware or status and to be able to take custom measures for each of the setbacks that may take place in your system.
Let’s look at a particular example of a custom command with specific settings. Suppose your SNMP alert setting is as follows:
So, if you get such a trap, what you need is to create a custom command that will get the link itself up, connecting to the router with IP 192.168.80.21 and execute the command: ”snmpset -v1 -c community hostname IF-MIB::ifAdminStatus.interface i 1” to activate it.
What are the advantages of SNMP alerts?
Although monitoring with traps itself is already a great advantage when it comes to talking about SNMP devices, there are many advantages when it comes to having SNMP alerts within the selected monitoring tool.
Control in the same tool
Thanks to the action described previously of creating an event, having all your devices’ traps pointing to Pandora FMS and with the corresponding general settings of SNMP alerts, you may have in a single window the total display of what is happening in all your devices simultaneously.
Simplification
By means of the possibility of sending an email to the tool’s operators, the data obtained through the trap that caused the SNMP alert to be triggered can be simplified. This means that the user who receives the alert does not have to know how to translate the trap OIDs or know the different types of traps that can be generated, since they can receive the email with all the necessary translations and clarifications created in the alert.
Automation
Perhaps the greatest advantage of SNMP alerts, as it can happen with the rest of Pandora FMS alerts, is the automation of actions to be carried out in different cases. As there is no SNMP alert creation limit, and since the trap reception limit is imposed by the hardware in which Pandora FMS is installed, you can cover a very wide range of automatic actions for the different problems that may take place within your monitored systems.
So far we have learned a little more about SNMP alerts in Pandora FMS. Would you like to find out more about what Pandora FMS can offer you? Find out clicking here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
Also, remember that if your monitoring needs are more limited, you have Pandora FMS OpenSource version available. Learn more about it here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
CIOs, CTOs and executives. What you need to know about IoT
If you occupy positions of certain responsibility (such as CIO or CTO) and you do not know what is necessary about IoT, you run the risk of being out of the game. So here in this article is what you need to know about IoT.
The following post is not intended to be a full encyclopedia on the Internet of Things. It doesn’t even intend to be a comprehensive list of “everything you need to know about IoT.” But we do would like to remind you of some aspects of IoT that you should take into account if you want to hit the jackpot or, at least, not get hit by the jackpot.
What you need to know about IoT
IoT will be more important than what it seems
It is not only a hot concept, but it already is really important in many companies and the chances are it will be very relevant in the very near future.
We are not going to go on and on about growth forecasts that you have already read a thousand times, but take a look at a key concept: 5G.
The Fifth Generation of mobile phone technologies is one of the factors that IoT needs for its growth, and its arrival will enhance its development in a way we only have a glimpse of today.
If there is someone who should be in charge of the IoT in the company, it is the IT department
You already know that all eyes will be looking in your direction. If someone in the company is expected to take advantage of IoT is the IT department, and as the person in charge, you have no choice but to put on your captain cap and take the helm.
Get all the knowledge you need
We do not question your trainning or your experience. Surely you invested a lot of time and effort in acquiring them. However, you probably already know that in the IT world you never stop learning.
Although the IoT domain has been developed for years, it is still very new, so you probably have a large field for learning before you. In addition, you already know that a position as complex as that of a CIO requires both technical and business knowledge, so it will be twice the challenge.
Mark these words: flexibility, interoperability and scalability
What you need to know about IoT is that it is necessarily something that will work with very heterogeneous environments where diverse manufacturers and solutions must coexist. Therefore, factors such as flexibility and interoperability (about which we already wrote in this post) will be of the utmost importance.
At the same time, the variety in the number of devices and the changing scope of the necessary infrastructure will make it very important to think about options that favor scalability.
New markets, new products
Although your company’s activity may seem to have little to do with IoT, what yo need to know about IoT too is that its versatility can accommodate a wide range of activities.
Have you thought about how your company can make the most out of IoT to launch new products and services? Perhaps you have at hand great potential for growth that is being wasted – at least for now. As always, keep your eyes open for new opportunities.
Another keyword: sensorization
It is one of the key points of IoT. Taking advantage of sensors can bring multiple benefits, even in the least expected ways. There are some magnificent examples: for example, there are livestock facilities that monitor the health and productivity of their cows through collars on their necks, which provide information as useful and funny as the way and frequency they moo.
It is an example that may be very foreign to you, but sensorization can offer an extra value where you least expect it. Think about how to take advantage of it!
IoT and Big Data can also work hand in hand
IoT produces a relentless flow of information. Don’t you think it would be a great idea to take advantage of it? Today, more and more companies are using Big Data solutions to obtain the performance from the huge amount of information received from different sources.
IoT will multiply the available information and therefore its potential, while an improvement in the systems that are responsible for its treatment and analysis is foreseeable.
Don’t forget about security and privacy
The flow of data and the presence of devices in all kinds of places offers great opportunities, but not without risks. IoT development will require facing big security challenges you must also pay a lot of attention to.
As always, the customer will continue to be important
It is not about accumulating IoT devices, but about developing those that really provide an extra value to customers. In an increasingly diverse and demanding market, the user is of utmost importance and demands increasingly useful and customized products, so do not forget that their satisfaction will be both an objective to achieve and a good scale to know if things are working as they should.
Another essential word: monitoring
IoT represents much more technology and much higher supervision demands.
Monitoring is not a new thing, nor is it a surprise that it’s needed. It has been vital for decades in all kinds of IT environments. However, the Internet of Things will multiply its importance.
In addition, IoT monitoring will have its own features. For example, when monitoring IoT devices, monitoring system flexibility will be something to keep in mind.
That is why you need to learn about Pandora FMS. Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. And among all the things it is capable of, it can also monitor IoT.
Would you like to know what exactly Pandora FMS can do when it comes to monitoring IoT? You have it very easy, just send a message asking all your doubts. You can do it in a very simple way, thanks to the contact form that can be found at the following address: https://pandorafms.com/contact/
We hope you liked this article about what you need to know about IoT and remember that if you have a reduced number of devices to monitor, Pandora FMS OpenSource version may be more suitable for you. Learn more about it here: https://pandorafms.org
Do not hesitate to contact Pandora FMS team. We will be happy to help you!
Pandora FMS como una alternativa a Icinga 1.x, ambos escritos en código abierto
Examina. Busca. Navega. Icinga, en idioma zulú. El origen de los nombres de gran cantidad de software son un tanto extraños (o desconocidos), y eso es material para un artículo aparte. En esta oportunidad os propongo a Pandora FMS como alternativa a Icinga y, si sois lector(a) consuetudinario de nuestro blog, una reminiscencia vendrá a vuestra mente.
Finalizando el año 2018 evaluamos varias herramientas (Icinga incluida, aunque de manera breve), por ello hoy actualizamos la información y a la vez ofrezco a Pandora FMS como alternativa a Icinga. En un principio Nagios, software patriarca de la monitorización, nace en 1999, justo antes de finalizar el milenio. Se mantuvo fresco y nuevo por diez años y en este ínterin nació Pandora FMS, en el año 2004. La comunidad de Nagios es entusiasta y en ese período estaba cohesionada. Hasta que un grupo de programadores de su comunidad plantó cara al Sr. Ethan Galstad y anunciaron una bifurcación: Icinga. Para ser más precisos, esto ocurrió en el mes mayo de 2009.
Considero que en ese punto Nagios adolecía de conexiones a bases de datos robustas, como Oracle® y PostgreSQL®; además faltaba una interfaz web escrita en PHP (no os riáis, considerad la época). Estas dos características fueron los primeros puntos que los bifurcadores retribuyeron al proyecto original. Vamos, que «el alumno superó a su maestro». Lamentablemente, la separación fue dolorosa, con detalles que no vale la pena comentar.
En la actualidad Icinga no ha perdido ni un ápice de su dinamismo, pero su herencia de Nagios es innegable.
Leyenda: Principios de operación de Nagios https://es.wikipedia.org/wiki/Icinga
Icinga e Icinga 2
En octubre de 2012 anunciaron «Icinga 2», la cual fue escrita casi desde cero en lenguaje C++, tanto para la plataforma Microsoft Windows® como GNU/Linux®. Como bien sabéis, tener solamente una idea clara de lo que se quiere y/o necesita no es ninguna garantía para el éxito: llevar a cabo una versión estable del núcleo tomó varios años y en el mes de junio de 2014 tuvo a bien su renacimiento. Esta «competencia», a veces fuerte, entre Nagios e Icinga los fortalece a ambos; en general el mundo de la tecnología así es como puede evolucionar. A Icinga le tomó 4 años y medio de duro trabajo el lograr su independencia de Nagios por medio de Icinga 2. Para el caso de Pandora FMS, ya desde su planificación se tenía claro que Nagios es más bien de propósito general (aquí estamos muy conscientes de las limitaciones de Nagios). ¡De aquí es que nace una verdadera alternativa a Icinga!
Icinga, empresa como tal, hace énfasis en que, cuando utilizan el simple término «Icinga» en vez de «Icinga 1.x» se refieren a la bifurcación de Nagios (su núcleo compartido). «Icinga 2» es tan diferente que necesita una conversión para ir de uno al otro. Pandora FMS como alternativa a Icinga ofrece desde un principio el mismo núcleo, haciendo sumamente fácil la transición a la versión «Enterprise».
Llegado este punto comento que, para incluso mayor complejidad -por no decir que provoca confusión- en este asunto de los tipos, versiones y componentes y sus nombres y denominaciones, también existe «Icinga for Windows®»… Pero no, no es lo que ustedes están pensando. Si bien Icinga 2 se puede instalar en Windows®, este componente que traigo a colación es un módulo totalmente completo para PowerShell (PS), en realidad un entorno de programación para dicha herramienta. Pandora FMS toma la alternativa de guiones con los comandos estándar de PS para cuando monitorizamos en dicha plataforma. A continuación esto nos lleva a exponer a los agentes de ambas soluciones.
Métodos de recolección de datos
Simplificando al máximo, hay dos formas de obtener datos de las máquinas a nuestro cargo: les «preguntamos» directamente a nuestros dispositivos (también llamada verificación activa) o bien usamos un software que instalemos en cada uno de los dispositivos (también llamada verificación pasiva). La primera opción recae sobre los servidores de Icinga y Pandora FMS, aquí no hay mayor diferencia (estos datos bien pueden ser HTTP, correo -POP3 y sus comandos- y ping ICMP, por ejemplo). Sin embargo, otorgo a Pandora FMS una ligera ventaja en el aspecto más útil de consulta a distancia: SNMP.
Leyenda: Métodos de monitorización de Icinga https://www.digitalocean.com/community
Veamos entonces los agentes software, o simplemente agentes: Icinga utiliza «Nagios Remote Plugin Executor» (NRPE), el cual agrega además un servidor en el lado del cliente… Ya comenté el aspecto sobre PowerShell pero también es extensible a GNU/Linux: si nos vamos por lo normal y estándar podemos rápidamente crear nuestros propios diagnósticos personalizados. Informo de esto porque NRPE también espera que el servidor Nagios (o Icinga en este caso) pregunte de manera explícita por los datos a recoger, lo cual es similar al primer método de recolección de datos (y en honor a la justicia son datos más complejos como uso de almacenamiento y memoria, servicios en ejecución y muchos más que no podemos hacer por la consulta pública a la interfaz de red).
Pandora FMS trabaja de manera distinta: envía los datos en XML con su protocolo Tentacle para mayor seguridad, en un intervalo de 5 minutos (valor por defecto) al servidor especializado para ello en Pandora FMS («Data Server»).
Esto facilita nuestro trabajo y minimiza la necesidad de instalar nuevas versiones del agente, porque solo debemos configurar de manera interna pequeños guiones con una sintaxis rápida de aprender (en la versión «Enterprise» incluso va a un paso más allá: los editamos por la consola y se guarda en el servidor Pandora FMS y se reparte de manera automática en cada dispositivo, o grupos de dispositivos, así sean miles de ellos).
Pandora FMS concentra mayores esfuerzos en presentar datos de rendimiento, mientras que los estados están en el siguiente nivel de importancia. Un dato de estado generalmente es verdadero/falso, como por ejemplo «¿está en línea?», mientras que un dato de rendimiento pudiera ser «¿cuánto tiempo ha estado en línea seguido, sin interrupción?».
Notas sobre instalación
Icinga, sobre GNU/Linux, solo necesita ser instalado por medio de apt ya que se encuentra en la mayoría de los repositorios Debian y sus derivados. Para su configuración de manera gráfica se puede utilizar NConf, herramienta compatible con Nagios también (aunque en 2019 se detuvo su desarrollo y soporte). En estos casos siempre alabo al software libre porque bien podemos hacer nuestros cambios y allanar nuestro propio camino.
Para el caso de Pandora FMS se recomienda CentOS, agregar los «Extra Packages for Enterprise Linux» (EPEL), adicionar Pandora FMS al repositorio local y luego descargar e instalar con yum. También existen otros métodos de instalación como clonar directo desde GitHub o emplear Docker.
Interfaces
Icinga viene con una interfaz clásica denominada apropiadamente «Icinga Classic». Viene con HTML y CSS sin mayor dinamismo, así que necesitaremos recargar la página en cada oportunidad como al cambiar algo o agregar una configuración, etc. Fue mejorada en Icinga 2 con «Icinga Web», la cual utiliza tecnología AJAX (que esencialmente es JavaScript con el que se intercambia información en segundo plano con el servidor y modifica/actualiza la página web). Denoto que también existe «Icinga Web 2» para «Icinga 2», el cual requiere incluso componentes adicionales, como por ejemplo flatpickr (calendario más ligero escrito en JavaScript). La consola de Pandora FMS, como alternativa a las interfaces de Icinga, utiliza cualquier navegador web moderno, sin cortapisa alguna.
Leyenda: Inicio de sesión en Icinga Web 2 Captura de pantalla
Pandora FMS como alternativa a Icinga
Sí queréis probar y ver cómo funciona nuestra versión comunitaria estamos en Github y también contamos con un Dispositivo de Virtualización de Software, el cual trae CentOS como sistema operativo, todo listo para usar. Os recomiendo leer nuestras Preguntas Frecuentes, aclaratorias prácticas y directas para la mayoría de nuestras situaciones de trabajo en el área de la monitorización.
Antes de despedirnos, recuerda que Pandora FMS es un software de monitorización flexible, capaz de monitorizar dispositivos, infraestructuras, aplicaciones, servicios y procesos de negocio.
¿Quieres conocer mejor qué es lo que Pandora FMS puede ofrecerte? Descúbrelo entrando aquí.
Si tienes que monitorizar más de 100 dispositivos también puedes disfrutar de una DEMO GRATUITA de 30 días de Pandora FMS Enterprise. Consíguela aquí.
Por último, recuerda que si cuentas con un número reducido de dispositivos para monitorizar puedes utilizar la versión OpenSource de Pandora FMS. Encuentra más información aquí.
No dudes en enviar tus consultas. ¡El equipo que se encuentra detrás de Pandora FMS estará encantado de atenderte!
Do you want to know more about Pandora FMS?
The total monitoring solution for full observability
Contact our sales team, ask for a quote or solve all of your doubts about our licenses.
Defining what a smart business is can be as difficult as defining what a smart person is. For decades, we have known that there are different types of intelligence that can help us in different aspects of our lives, and something similar happens with smart businesses.
However, since we do not want to give up on our efforts to know what it is, we can see some of the different aspects that can turn a business into a smart business. Shall we take a look at them?
Is your company a smart business?
If we want to go for a basic definition, we could say that a smart business is the one that knows how to use the resources available in order to achieve its goals.
Now this is the simple definition, but we can go further and get to know some of the aspects that outline that intelligence, which can also help you to know if our company is more or less smart. Let’s take a look at some of them.
A smart business is a company that uses digital transformation, it does not fear it
Let’s start at very the beginning because, in a way, the concept of smart business could hardly be understood in a different context than that provided by digital transformation.
Today, there are all kinds of technologies that make company operation easier. A smart company is not afraid of technology, nor the changes that adopting it implies, but rather knows how to make the most out of it to work better, achieve its goals and create business lines. Is yours capable of doing it?
A smart business is a company that knows how to manage the data it has
In the era of Big Data, we couldn’t miss a section like this for data processing, and even some authors understand that this is a essential factor in determining whether or not a company is smart.
Currently, there are countless tools capable of helping manage and use data generated by business activity, and there are even some professions specifically devoted to it, such as a CDO (Chief Data Officer). After saying all of that, which was only a brief profile, you may wonder: Does my company know how to manage data?
A smart company is a company that knows how to value its assets
A smart company not only looks towards the outside, but also pays attention to the assets it has, and especially its human resources.
Because inappropriate or unfair treatment is definitely not a sign of intelligence. A smart company knows how to value the work its staff does and reward it accordingly. It knows how to offer incentives and take advantage of new ways to make work more flexible. It knows how to keep its teams properly trained and updated. And it also knows how to motivate and involve its people in the company’s goals. Does your company do it?
A smart company is a company that knows how to communicate
Both externally and internally, communication is another factor to consider as an aspect of the intelligence of a company.
Thus, an intelligent company knows how to listen to and communicate with its customers, but not only that. It also knows how to make communication fast and efficient internally, both in vertical and horizontal relationships.
There are a lots of ways to do it. From omnichannel to tools for internal communication, you will find many options available. Does your company know how to use them?
A smart company is a company that knows how to adapt to market changes
In a time of constant change, companies that do not know how to adapt run the risk of disappearing.
A smart company knows how to recognize changes and adapt. It cares about understanding the customer and is able to offer them what they need better and faster than its competitors. At the same time, it is able to adapt its organization and production processes to market demands in order to work better and be more efficient. Is your company capable of all this?
A smart company is a company that uses monitoring
Finally, dear reader, let us take a separate section to the aspect that interests us the most from the point of view of this blog and that is relevant in terms of smart businesses. Indeed, a smart company is a company that uses monitoring
Monitoring systems are responsible for supervising IT systems (hardware, networks and communications, operating systems or applications, for example) in order to analyze their performance, and to detect and alert about possible errors.
In fact, in a modern company, computing is a kind of indispensable nervous system that runs throughout its “body” and its proper functioning is of paramount importance.
And if we talk about monitoring, of course, we should talk about Pandora FMS. Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to assist you!
What is a “developer”? What do they mean for a company?
“Developer”, “DE-VE-LO-PEEEERRR”… It sounds pretty good. It’s easy to make your parents buy it when you explain them they are going to pay for your degree and they will be able to boast about their children being geniuses who joined the wave of computer science and technicalities… But what is really a “developer”? They are there, surely in your company, doing their developer stuff and talking to each other in their developer code, but few people really know what they really are.
People have studied their habitats, what they eat and even how they reproduce, whether by binary fission of their DNA or by vegetative multiplication, like sweet potatoes, but to delve further into what a developer really is, we have decided to ask them, specifically those of our company, Pandora FMS, for a definition. They will clear out all of our doubts.
Luis Calvo, the fourth member of Destiny’s Child
-Could you define what a developer is and what it means to be a developer for you?
A developer is the person who usually builds a software based on an idea.
For me it means creating and contributing with something that will later be used by other people or, someday, be seen by other developers. It is a bit like leaving some mark with your “creation”. Michelangelo made the frescoes for the Sistine Chapel, Beyoncé “Crazy In Love”. I’m happy with this.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
Part chance, part curiosity, a job offer from a company in Madrid that I didn’t know at all and the fact that, when searching on Google, this company appears referred to in a news story as: “Ártica, the David that challenges the software giants”… This obviously sounds attractive and interesting.
-What’s the fun of it?
I love it when things get a little difficult and I have to investigate how to solve it, look into it and use some new trick, that works well, of course. I am one of those who laugh it out and have a good time disconnecting a bomb in the last ten seconds. If you ever see yourself in that situation, it’s always the yellow wire. Cut that one for sure. Or was it the red one?
José González, a misunderstood and modern being
-Could you define what a developer is and what it means to be a developer for you?
A developer is (or should be) a type of modern artist, a misunderstood being, who writes buzzwords and unintelligible symbols on a machine. For me it’s a lifestyle, like a hallmark. When someone types in code and likes it, it shows, like a tattoo. From afar, in small groups, we are often mistaken for a gang of bikers.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
It was by chance, but when I saw the opportunity to get in here I didn’t even think twice. Working on a project like this, which covers so many areas and is so big, it’s intimidating at first, but it pushes me to face new challenges and reach new goals.
-What’s the fun of it?
I don’t know, there’s something to developing that is very addictive. Different languages, different paradigms, different types of problems to be solved, the fact of wanting to reach perfection or at least touch it… Every day is a new challenge and I think that’s what I really like.
Borja Sánchez. (For the record, it is ME who allowed him to modify the question.)
-Could you define what a developer is and what it means to be a developer for you?
A developer is in charge of transforming an idea, following a procedure, into a usable tool. Offtopic, the ‘developer’ thing is not as if you said that in a construction site all people working there are bricklayers… I do not consider myself a ‘developer’, because my work is not limited to typing in code to reach a solution already planned by others. In my case, a problem arises and I am in charge of analyzing, designing and developing that solution. Those are really three different jobs: engineering, architecture, and development (analysis, design, coding).
To be clear, the software life cycle is a cycle divided into these stages: definition, analysis, design, development, testing, validation and maintenance.
Only the “development” part is the developer’s job (whether junior or senior). In my case, I focus on the analysis, design and development stages. QA would be testing and validation. Support, project/commercial maintenance, definition.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
Allow me to modify the question based on what I answered before… How does a systems technician end up doing the tasks of a software architect? By getting in the company without a degree and showing my abilities based on my work. Mario Pulido (another nice guy from our company) mentored my foray into the world of Pandora FMS as a technician, but after things like pandora_ux, route parser, the distributed transactional system… it was Sancho (CEO of the company) who gave me carte blanche to define new opportunities within the product.
-What’s the fun of it?
By taking care of three stages, work tasks become something more artistic, let’s say. It is not only following step by step a model of a pre-built solution, but rather I can start laying out the basis and prepare tools that will help us in the future to make more efficient developments, which are what make Pandora FMS be really flexible.
Marcos Alconada, life giver
-Could you define what a developer is and what it means to be a developer for you?
For me, a developer is a person capable of giving life to all the ideas that you can think of, technologically speaking, of course. And the meaning, for me, is to be able to make easier for people to do their work or their work environment, be it by making simple web pages, promoting their businesses (SMEs) or giving to clients, in this case those of Pandora FMS, the option to monitor their systems more easily.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
I ended up working on a monitoring software because I consider it to be a very complete type of software. I mean, it interacts with different types of language. Until I came to Pandora FMS, I had not seen any PERL language and after all this time I already feel familiar with it. I believe that working in companies like Pandora FMS make you achieve a progressive and complete professional evolution.
-What’s the fun of it?
The best thing about my job is to develop new and cool things that I can be proud of and that make me say: “Look, I did that.” As well as looking back and seeing what I was before and what I am now. Improving both personally and professionally is one of the best parts of this job. And the free fruit that we get at the office. It is easier to work if you know that there is always a tangerine or plum in the fruit bowl.
Alejandro Campos, professional also on weekends
-Could you define what a developer is and what it means to be a developer for you?
Someone who has a demanding profession that never allows them to stop learning, even outside of working hours.
-How does a developer like you end up spending hours worth of code into a monitoring software like ours?
In my case, I finished my degree in Computer Engineering and I was lucky to get in and keep on learning.
-What’s the fun of it?
Working as a team sometimes involves finding yourself in difficult situations when it comes to modifying or complementing a code that is not yours, tracing the source of a problem and it can even add more stress to the work having all the situations that could take place covered and controlled in an increasingly complex software. However, when everything goes according to plan, and more so if you learn something new in the process, there are few things more rewarding.
As we have seen, “The Developers” are those easy going artists, life givers and problem solvers who, like architects, build a building and watch over it. Your building would be the software of your choosing in this indisputable metaphor.
Computer specialists capable of conceiving and developing computer systems, as well as implementing and launching them, using only their impressive imagination, coffee, and one or more programming languages.
From here we send our deepest love for them and for their work. We love you.
E-commerce is skyrocketing, there is no doubt whatsoever. With unstoppable annual growth and close to 2,000 million users worldwide, e-commerce has already been able to surpass traditional commerce in some product categories and takes an important place in most of them. But what is the future of e-commerce?
Since its inception, back in the 90s, taking advantage of the Internet getting widely known, e-commerce has not stopped growing to become even more and more popular. And while growing, it has also changed the way it works and gotten more familiar for the customer. For example, who could think in the 90s that just a couple of decades later we would go shopping through a mobile phone?
During the next few years, it will keep on changing in order to increase key factors such as userfriendliness and user’s trust and loyalty. And in these changes, technology will of course play a fundamental role. How about taking a look at the future of e-commerce?
The future of e-commerce: 5 ways to grow
As we said, e-commerce forged its path based on changes and everything suggests that we will keep on bearing witness to a constant transformation in this sector for the next few years. Let’s take guesses trying to foresee some of the innovations that could be seen soon.
Integration between physical and online
Are you one of those who hate carrying bags around after going shopping? It looks like you’ll get lucky soon…
In the future, it is foreseeable that integration between virtual stores and their online versions will avoid this type of inconveniences. The Internet of Things will allow you to do your shopping easily (for example, pointing your mobile phone at the products you want to buy), without the need to carry them aroung and even avoiding to queue. It will only be necessary to have an account at the shop. You will be charged the total bill when you leave the store -which will be rather a kind of exhibition space- and you purchases will arrive shortly after at your home (perhaps by some of the interesting means that we will see below). It doesn’t get simpler than that.
New shipping ways
Did you know that some companies are already developing their own order shipping projects with drones or autonomous robots?
In the future, the current concept of shipping done by people will probably go down in history, leaving room to an army of different types of devices that will take the products you purchased to your home or workplace. Thanks to these types of technologies, shipping costs are expected to decrease, which would promote an even greater increase of e-commerce.
Virtual reality to buy as if you were in a physical store
Some online stores are already experimenting with these concepts and they are expected to experience a huge increase in the coming years.
Not surprisingly, it is one of the most anticipated functionalities for virtual reality for decades. The possibility of “going into” a virtual store as real (at least visually) as a physical store and buying stuff there without leaving your living room has been a much desired option for years. As virtual reality develops, it is to be expected that this new way of buying will become usual, contributing to the growth of a “different” type of e-commerce.
More customization
Customization in advertising, products and services is a clear trend today, but it seems like it won’t stop, on the contrary, it will even grow in the coming years.
Thanks to techniques such as Big Data, companies will analyze user behavior to suggest their products and services, which will be fully customized. For example, thanks to your mobile phone, companies whose services you have subscribed to will know your habits and even the place where you are and suggest customized purchase options. Of course, in this type of practices, security and privacy protection will be a factor to take very much into account.
Augmented reality
Although augmented reality requires interaction with a physical environment, e-commerce could also benefit from it.
Following our previous point, augmented reality devices will be able to provide information and suggest purchase options to users just by walking down the street. For example, if a user looks at a storefront in the physical world, the device could warn them that a certain product they are looking at is available online for a lower price.
Back to the present and to monitoring
And now that we’ve seen some possibilities for the future of e-commerce, how about we go back to present?
As we have already said, e-commerce is currently very relevant and represents for many companies the majority – or even the integrity – of their income. Is that your case? Do you have an online store? In that case, you may be interested in getting to know Pandora FMS.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Security monitoring as prevention and tool in computer security
Security Information Monitoring or Security Event Monitoring is part of Security Information Management. Yes, I acknowledge they are flashy names and that even experts have their differences about concept and scope. Here in Pandora FMS, flexibility is part of our name, so, hereby, I will abbreviate it as Security Monitoring. As you can see, it is short and manageable!
If this is your first time reading Pandora FMS blog, we are glad to inform you that in our programming plan for 2020–2021 we have included security monitoring as another element of our IT supervision software.
In monitoring systems, the use of alerts for when an event takes place, whether authorized or not, is inherent in the network system. Said alerts are easily defined with Pandora FMS to detect changes or behaviors, even suspicious ones, for their collection as data and, after being analyzed, turn them into information.
This set of alerts also includes those that are more used and interesting: free disk space, workload, etc. They are predictable and quantifiable parameters, but how can we apply it to the issue at hand, security? With the help of a very specialized software, such as Lynis, you may also obtain a quantitative analysis, with whose result you can set a security qualitative state in your system.
Metric use
Any system can be degraded if it is not properly improved over time. To know if an improvement has been made, it must be measured, quantified and compared. But in order to measure anything, it must be defined. If defined, it can be measured and monitored. That includes security.
Directly, Pandora FMS intervenes in the following key aspects, to name a few and to precise our work:
Keeping track of service level agreements (SLA): it is very important to check the expiration date on a regular basis. That way, you ensure you won’t have no support if there is a failure or no access due to a lack of license to any of the business-critical applications.
Device inventory monitoring.
Pandora FMS supports third party authentication through LDAP or Active Directory (except for users with admin permissions, who always authenticate locally), so user and password management can be handled massively. You can even monitor a server with the OpenLDAP Plugin.
Managing any other type of issue, including a security one can be managed through Integria IMS, a Pandora FMS suite software.
Supporting backup management, even for different applications, to somehow protect from ransomware attacks.
You may check antivirus programs work through software agents in an automated way, and also interactively through eHorus, another Pandora FMS suite product.
Previously we mentioned Lynis to check for updates and security patches on GNU/Linux systems, but also through Windows Management Instrumentation (WMI)® you will have a clear and exact overview of the coverage status of the possible vulnerabilities in the software installed on Microsoft Windows®.
Let’s say, for example, that you need to monitor backup executions on a weekly basis: it is important to know what success percentage you have. So you choose the metrics on the time dimension against the number of times correctly performed (that is, the pseudocode would be: number of times correctly performed divided into the number of performed backups within a week). An indicator like this gives an exact image value of your security monitoring.
What security monitoring is not
Often a great way to define a concept is by means of its “opposite”. That is why I take this chance to set what an Information Security Management System (ISMS) is. It is an extremely standardized field, whose main rule is ISO/IEC 27001, internationally, and then in each country according to its own laws.
Caption: “Deming Cycle” or PDCA: “Plan-Do-Check-Act” used in ISO/IEC 27001
Image: https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg
In security monitoring, prevention is the biggest advice, by unifying events and collected metrics. For example, to cite a critical and vital case for many companies such as electronic payment: there is the Data Security Standard for the Payment Card Industry (PCI DSS) that sets measures such as sending duly encrypted information on clients, on a mandatory basis, and the use of firewalls to prevent intruders from accessing the data you have stored about your clients. A well implemented Information Security Management System (ISMS) includes security audits, either regularly or unexpectedly (or both even), and must ensure that these two resources (and others, in addition) are working and are being used correctly.
Caption: Common firewall configuration, an important element in Security Monitoring
Image: https://commons.wikimedia.org/wiki/File:Firewall.png
On the other hand, in Security Monitoring you can offer reports about whether the security certificates for information encryption are in force and operational, so that they can be renewed in advance in order to keep communications encrypted at all times. Likewise, you will be able to monitor the company firewalls, where, how and when they are working, and restart them through alerts if necessary. These are just two examples that provide reporting tools on strong bases, but they are not and are do not replace an ISMS!
Thus, at this point, an ISMS covers many aspects and in each of those aspects, security monitoring (☑) may or may not be present:
Patches and updates ☑ and their automated management.
Antivirus status ☑, as well as the network status regarding spam filtering.
Staff training regarding fraud and its prevention ☒.
Network and computing resource usage ☑.
Mobile devices on your network and its security ☒. (Although, at least, you can report connection times, megabytes consumed, etc., the basics).
Services and their accesses through user permissions ☑.
Data leak ☒. Delicate task, mostly based on staff surveillance (although you will be able to monitor the application records in the company and generate reports that look for specific fields and values in them).
It is important to fully comply with the legislation in each country ☒.
Depending on the size of the company, evaluating whether it is possible to implement Unified Threat Management, which despite its disadvantage of being a single point of failure is relatively easier to manage and security monitoring can benefit from it ☑.
ISMS Tools
I do not intend to name them all, and I explain it oriented towards security monitoring:
Network audit: looking for router models, which ones connect the company or cataloging information. In its analysis, models are correlated against firmware installed versions, exposed ports, etc.
Perimeter Security: it sets or determines the different layers or steps, from the point of view of outside the company, to “get” to the network audit components.
Penetration test: the so-called red team, personnel totally foreign to the company and coordinated to attack and try to enter without knowing the previous audit information.
Web audit: both internal to the web server within the company, and its encrypted synchronization to the web server hosted by third parties on the Internet. It also includes legal aspects.
Forensic Audit: to perform an exhaustive analysis of post-mortem incidents. In case evidence is needed, part of them can be provided by Security Monitoring.
Before finishing this article about security monitoring, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Read our related success story and see the results we’ve got
Digital maturity; find out what it is and if your company reached it
Do you know what digital maturity is? Do you understand how achieving it can affect your company? Do you know how to detect if you already reached it?
Knowing what digital maturity is and the ability to assess it can be essential for a company. In this article we will find out what digital maturity is and see some clues that can indicate the degree of digital maturity a company has. Shall we get started?
What is digital maturity?
Digital maturity is the degree to which a company is able to take advantage of digital technologies to improve in all possible areas, from economic performance to relationships with customers, including business processes, productive processes, internal relations, etc.
The concept of digital maturity is closely related to that of digital transformation. If we understand the later as the process that companies carry out in order to incorporate and take advantage of the use of digital technologies, digital maturity would be kind of a goal to achieve, a place where you can look back and think “we have done a good job”.
But it doesn’t end here. There are a some aspects you have to take into account.
Digital maturity is not static. As digital technologies get developped (and this keeps on going, and at an ever-increasing rate!), you will have to continue incorporating them into your company in order not to be left behind.
It is not always easy to understand if you have managed to reach digital maturity or if, on the contrary, your company is a “newbie” who’s lost when it comes to using digital technologies.
How can I know if my company has reached digital maturity?
Even knowing that it is a dynamic concept and that, therefore, you cannont stay in your comfort zone, it is legitimate to wonder whether at a certain point you have reached digital maturity. The answer to this question can indicate both the digital transformation stage you are in and whether the practices you are doing are bearing fruit. Although each company has its particularities, there are clues that may guide you. Let us take a closer look at a few of them.
Do you have digital awareness?
It is something that should encompass the whole company and can influence it on many levels.
On the one hand, you must have your digital transformation goals clear as well as what measures you are going to take to achieve them, without forgetting to set ways to measure the degree of success achieved. On the other hand, it will be necessary to take into account the digital dimension in all the important decisions you make regarding the company. Are you doing it?
Furthermore, do you have the importance of digital technologies in customer relationships clear? Do your employees have in mind the importance of the company’s digitization?
At the end of the day, it is all about always keeping in mind the digital field, its importance and never losing sight of it. Is it like that in your company?
The most important point is the customer
If that’s not clear for you, well that’s pretty bad. The client is essential, that is why it is located in the center of digital transformation. If we do not keep all this in mind, it will be impossible to know what our degree of digital maturity is.
Let’s see some more specific questions. We assume that you have a website and an online store (if applicable), but that’s only the beginning. How many digital communication channels do you keep open and with what degree of effectiveness and satisfaction? Have you reached omnichannel? How well do you handle mobile technologies? Have you thought about responsiveness? Do you have your own app? How do you handle social networks? They are just a few questions. Ask yourself many more and evaluate your answers.
Do you use digital technologies internally?
Remember that using them in customer relationships is only one of its aspects. Digital technologies can be used in multiple fields, such as internal communications, different kinds of processes or flexible work ways, among others. Are you using them?
Furthermore, its use will frequently require training and learning. Can your employees use and take advantage of them? Do you have specialized staff in key aspects, such as management or maintenance? Is all of this Greek to you? Then you have a lot of work to do yet…
What about data?
This is a very specific aspect of the internal use of digital technologies. Data is nowadays a hot topic more than ever, but do you know what to do with it? Technologies like Artificial Intelligence or Big Data are not just something to chat about over coffee. Many companies use them in their day to day and have incorporated them in processes such as decision making.
In addition, you should not lose sight of other issues such as the correct data management. Is it effective? Is it safe? Data is important, don’t forget about them!
Look around you and don’t stay behind
We already warned you: reaching digital maturity does not mean that you can stand still and get a pat on your back. You can have it one day and start staying behind a short time later.
Digital technologies don’t stop and neither should you. Look around you. The world around you. Analyze other companies, learn from their successes and failures, and try to stay ahead of them. Are you a digital leader?
Are you investing in digital technology?
This is all very nice, but if you do not invest, you will most likely have tremendous difficulties reaching digital maturity. How much do you spend on digital technologies? Do you consider it enough or not? Furthermore: Are you taking advantage of the technology you have? Do you have technology that allows you to monitor the state of the technology itself?
Digital maturity and monitoring
To finish off, there’s a key issue left: monitoring.
Monitoring systems are responsible for surpervising IT systems (hardware, networks and communications, operating systems or applications, for example) in order to analyze their performance, and to detect and alert about possible errors.
The very fact of having a good monitoring system for computer systems can be key in determining whether your company has reached digital maturity or, on the other hand, has still has a long way to go.
Pandora FMS can be applied in businesses large and small, read our success story
Do you still not have a good monitoring software? Do you already have one but want to explore other alternatives? How about discovering Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
The network discovery software that turned Pandora FMS upside down
Previously, in Pandora FMS blog, we learnt a little about the great revolution that the Discovery feature brought to Pandora FMS. This tool reduces the complexity of certain existing features in Pandora FMS, and also introduces new tools that turn this software into a complete monitoring system.
In today’s episode we are going to take a walk through the bowels of one of its tools, Discovery Net Scan, which is an exponential upgrade to recon tasks. Are you ready?
Network discovery software: What is Discovery Net Scan for?
Discovery Net Scan is created to discover devices on a network, simultaneously kicking off some kind of monitoring for those devices.
Let’s see those real examples that you like so much. Imagine you are going to start monitoring your office, where you can find multiple devices connected to the same network. Within these devices, there might be personal computers, servers, routers… The thing here is to monitor every last device you have in your office. This would lead us to have to create each of the agents that point to these devices individually, which takes a lot of time and effort. Thanks to this tool, however, all these agents will be created automatically by just configuring a Net Scan task.
Network discovery software: How does Discovery Net Scan work?
We will explain how Net Scan task configuration works following several steps:
To begin with, enter a descriptive name of the chekup that you are going to carry out, such as the name of the network that you want to monitor.
Then, enter the network or networks that you want to discover with your network discovery software, adding the IP and the mask that you are going to analyze.
Enter an interval with which this task will be executed automatically or configure it to be launched manually.
Once you have entered the general fields, configure the initial monitoring that you will perform on the devices found:
a. You can choose a template with predefined modules.
b. You can choose SNMP monitoring if you correctly enter the necessary data to do it.
c. You can specifically monitor Windows elements thanks to the existing WMI tool in Pandora FMS.
d. You can detect additional information from the devices, such as their operating system or whether they belong to a VLAN.
Once created you can see the task being completed, as well as be able to edit or delete it.
This is how a Net Scan task is configured to start discovering new devices within a network. But… how does this task work underneath?
In order to perform this task, Net Scan relies on a library developed by Artica ST that is located within the server that executes the task, which is in charge of retrieving the network information of the elements to be discovered. It retrieves all available information from discovered computers and devices, in addition to that information configured by the user with the data entered in the configuration itself. With this information, and whenever SNMP is enabled, it tries to link all the devices found by checking different elements, such as path calculation or connected interfaces.
Network Discovery Software: Differences Between Recon Task and Discovery Net Scan
After reading all this information about Discovery Net Scan, you may wonder what the differences between old recon tasks and this new system are.
The first major difference between the two is the network device discovery improved performance and the increased scalability of the code used for such discovery.
Task configuration has been visually enhanced, simplifying the view for the user and the data to fill in. Additionally, once you have completed the Net Scan task, in the list of completed tasks you will have the option of displaying a network map representing the relationships found regarding the discovered devices.
As for monitoring, with the change of code to perform the discovery, the possibility of making WMI queries for those network Windows devices has been added, which also means obtaining additional information from said devices.
Finally, regarding event creation due to discovery, all the discoveries of a single Net Scan task have been reduced to a single event, unlike recon tasks that created an event for each device found. Thanks to this, server performance and database occupancy are improved as it does not have to generate as much information.
This tool, like all those that make up Discovery, is becoming very important within Pandora FMS. That is why, little by little and with a lot of work from our R&D team, we will keep on improving it to make Pandora FMS a more complete, fast and intuitive system for the user.
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Load spikes? We give you some tips to optimize MariaDB
This 2020 is perfect to check our beloved Pandora FMS server and precisely a very important component is the database (BD). As our loyal readers already know (and if you visit us for the first time you can read the introduction to architecture on our Wiki), MariaDB is one of the databases chosen by Pandora FMS to keep all your information about your device monitoring: Let’s see how to optimize MariaDB!
I am a big fan of GNU/Debian, specifically its GNU/Ubuntu distribution, but for Pandora FMS CentOS is officially recommended due to its high development stability. No worries, here you have the first tip: install MariaDB on CentOS 7.
Our second tip, as an introduction to today’s topic, is the number of devices you must monitor. For one hundred or more, apart from recommending you Pandora FMS Enterprise Version, you should use a High-Availability Database Cluster or simply HA. The following short video introduces the subject. If you want to learn more, read the article in our blog specific on this topic.
Please accept marketing cookies to watch this video.
Whether you use a single server, several or many of them, you will always have in each instance a database managed by MariaDB stoically withstanding load spikes.
Who uses MariaDB?
Before optimizing MariaDB to receive load spikes, let’s see a short history… it’s short, I promise!
Wikipedia®, Google®, WordPress®, among many others use MariaDB for mission-critical tasks. There you have it, I told you the story was short, right? Ok, I know, you need to know a little bit more.
You may already know this: MariaDB is the fork of MySQL® but with a totally free license (GNU General Public License). It’s been developed and maintained since 2012 by MariaDB Foundation (MariaDB), and one of its golden clients is MariaDB Corporation.
Caption: MariaDB Foundation https://mariadb.org/about/#logos-and-badges
A MariaDB bronze client is Percona.
Since 2013, Google® hires engineers to work at MariaDB. Other companies have followed suit, or donated billions of dollars to the foundation.
Michael Widenius is one of the creators of MySQL. “My” is the name, in Finnish, of his oldest daughter and “Maria” is the name of his youngest daughter and the storage engine that was born long before MariaDB. To differentiate it, they later renamed it Aria. MyISAM is the counterpart of Aria.
Caption: Michael ”Monty” Widenius
https://commons.wikimedia.org/wiki/File:Michael_%E2%80%9DMonty%E2%80%9D_Widenius_at_MariaDB%E2%80%99s_Developers_Unconference_2019_in_New_York_City_04.jpg
Of course, due to all of this, MySQL and MariaDB are like sisters both in theory and in practice, but hold on, there are important differences!
Right at the time of writing this article, MariaDB is in its stable version 10.3.21. Since version 10.3.7, it has set itself far apart from the use and development of InnoDB.
InnoDB in turn replaced MyISAM as the default storage engine for BD tables in both MySQL and MariaDB.
There are many database storage engines, even Facebook® has its own that makes the most out of the use of solid state hard drives. There is another extremely fast one that is only stored in RAM memory and when you turn off the computer all data is erased. Others have only academic interest. Here we will talk a lot about InnoDB.
Load spikes
A load spike, in computing, takes place either due to our interaction and/or human activities or due to unforeseen events. The very fact that we all go to work at 7:30 in the morning every day creates a load spike for any computer system, for example. We must learn to live with load spikes, deal with them, or at least mitigate them to the best of our ability. Let’s see how to improve MariaDB for that purpose.
Tips
Maximum number of connections (“max_connections”): one hundred and fifty-one by default. Some recommend raising it to 750 or even 1000. I think that we obviously should raise it but without losing sight of the hardware and/or virtual resources we have. So I don’t really set a specific number. Limits: minimum 10, maximum 100 thousand).
Thread_cache_size: The role of these threads is to stay in memory for up to five minutes in order to be reused if possible. It is related to the previous point, the default value is 256. If we raise that one to more than 256, this one rises automatically to the same value. You could first try the maximum number of connections at 256 as a first step and evaluate the performance, although I would dare to say between 150% and 200% the value of the maximum number of connections. Limits: minimum 0, maximum 16384.
Thread Pool: I mention it because activating it spoils the last tip. This feature is useful if we know in advance that we will have lots of short queries that will involve extra calculation work for the processor. Although Pandora FMS uses more the CPU to limit the data from the last 30 days and the rest it does is receiving and saving, which is why I consider that these threads are not any more useful in our case.
Sync Binlog (Synchronization binary log): this would be enough for a whole article. Essentially it means sacrificing a bit of speed by ordering the operating system to write on disk after every transaction. That way, you prevent data from being lost from synchronization to database replicas. Since the default value is zero (it is in the hands of the operating system), if you increase the value to one, which is the slowest, you have to pay attention to increasing it further if you see things go too slow.
InnoDB optimization: As I mentioned, InnoDB is very important and MariaDB uses XtraDB, a Percona-improved version for InnoDBD. At programming language level, you will not see XtraDB, since it identifies itself as InnoDB. Yes, quite a headache. However, it shares common features, and the first advice of this group to optimize MariaDB is to modify the InnoDB Buffer Pool Size. Again it depends on your hardware or virtualized resources, but it is always good to set it up to a maximum of 80% of the memory, as long as you do not have other software running on the same server and all your tables are InnoDB. Limits: minimum 5 megabytes, by default 128 megabytes. If you assign more than 2 gigabytes the number of instances must be increased (divide the pool into logical units), maximum 8192… petabytes!
InnoDB Log File Size: depending on the value you set to the reserve fund, you will have to assign half or less. By setting a larger size for this log file, it reduces writing at the expense of increasing the recovery time if there is a failure (for example a power cut, which is quite common, or someone shutting down the server manually). Limits: minimum 1 megabyte, 48 megabytes by default, maximum 512 gigabytes.
InnoDB Log Buffer Size: Here I recommend a figure, 64 megabytes, which reduces disk writing and reading. Limits: minimum 256 kilobytes, 16 megabytes by default, maximum 4096 megabytes.
InnoDB Log Flush Interval: here there is nothing to change, its default value is one. But if your power supply is completely reliable, you can change it to two to increase performance. I repeat, if you are really confident that the Uninterruptible Power System (UPS) won’t disappoint you!
InnodB IO capacity: this last tip to optimize MariaDB is better described with the storage hardware you have, although it is an approximation because you actually have to do specialized tests on each particular device. It is measured in operations per second (IOPS) and has a default value of 200 units, a value suitable for hard drives of 10,000 RPM. You must lower it to 100 (one hundred) for discs of less than 7,200 RPM. With solid state hard drives you can take it to 1,000 (thousand IOPS)!
Before finishing this article about optimizing MariaDB for load spikes, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Hughes India and Pandora FMS joined together as partners
Pandora FMS keeps making friends. We like to make them all over the world. With them, we learn and share the best we have. They in turn play their part, creating a smooth professional harmony capable of achieving the impossible in the world of technology.
This time, Pandora FMS has had the pleasure of collaborating with and considering Hughes India as a unique partner. Together they seem to be on their way to an excellent and promising teamwork.
Who is Hughes India?
Hughes India is a subsidiary of Hughes Network Systems, the well-known world leading brand in providing satellite broadband networks and services. It offers advanced solutions and business offers for both public administrations and companies.
Hughes India is the largest operator of this type of service in their country, and for more than two decades they have been working, with increasing intensity, to reduce the existing digital divide between the community and large companies, achieving, among other notable goals, a great contribution to disaster prevention and recovery. We could not miss the chance to have them as allies.
But that was just the beginning, Hughes is present in all key vertical markets: banking, education, energy, defense, telecommunications or retail sectors, in addition to addressing the connectivity needs of multiple government departments.
How did we meet?
Being the best one comes with great responsibility. Superman knows it, Beyoncé knows it and so does Hughes India. And this is easy to say with the huge customer base and more than 100,000 active VSAT nodes the company has throughout the country. An honor and a huge commitment at the same time.
Hughes India used the same dashboard for many years, but times change and they saw the need to change along with them: give a new image to their network management portal to update user dashboards, have a common dashboard for nodes distributed across different gateway locations, providing detailed statistics for 100,000 nodes, and prioritize their new project to provide MPLS solutions to their customers, for example.
At Hughes India, they had multiple technologies and solutions to take seriously, and although at first they tried to cover the issue with different measures, such as an HP NNMi solution with the SIP portal or adding some open source solutions based on the client, finally they decided to go ahead with a common platform for all their clients. And, here, friends, is where Pandora FMS comes in.
Impressed by our software features, especially the ability to monitor devices on a distributed platform and its ability to support more than 100,000 nodes, Hughes India couldn’t be happier about choosing us. Only one challenge remained: tailoring the initial configuration to their needs. But thanks to Pandora FMS support and after-sales teams, they were able to change these settings with no issues to be able to monitor VSAT devices quickly.
Immediate Results
The results of this union between Pandora FMS and Hughes India did not take long in showing and being recognized by their clients. Hughes has been able to provide all of them with an updated and centralized dashboard for VSAT nodes distributed across satellite networks and MPLS infrastructures. In addition, it has also allowed them to design dashboards according to the displaying preferences of each client.
So has Pandora FMS met Hughes India’s expectations? Let’s see what Ashutosh Agarwal, their National Manager of IDC and MPLS Backbone Services tells us: “Thanks to Pandora FMS we can meet customer expectations regarding dashboards and centralized monitoring. This has contributed to creating an atmosphere of trust between the departments in charge of its operation. Pandora FMS has proven to be a great product, with many features backed up by an excellent technical support team”.
You see, we are still at the beginning of this adventure together, but don’t tell me you don’t have the feeling this is going to be great. “What do you say?” Do you want to become friends too?
1 ) A robot shall not harm a human being or, by inaction, allow a human being to be harmed.
2 ) A robot must comply with the orders given by human beings, except for those that conflict with the first law.
3 ) A robot must protect its own existence to the extent that this protection does not conflict with the first or second law.
What are they, and will they work in the real world?
The 3 laws of robotics are one of the best-known statements in the history of science fiction, and have often been taken as a reference when speculating on how we should create intelligent beings without them ending up harming or even destroying us.
Formulated in 1942 in the story “Vicious Circle”, by the famous writer Isaac Asimov, the 3 laws of robotics have become part of the collective imagination, to the point that many people think that an exact formulation of these laws could protect us from a hypothetical “robot rebellion”.
However, things are not as simple as they seem. In this article we will learn what the laws of robotics are and why they would not work if they had to be applied in the real world.
These precepts not only appeared in “Vicious Circle”, but were repeatedly alluded to in different stories by Asimov, and even in many later works written by other authors. According to Asimov himself, the purpose of the 3 laws in fiction would be to prevent a possible rebellion of the robots. Thus, in the event that one of them tried to violate any of the laws, the electronic brain of the robot would be damaged and it would “die”.
However, if there is one thing we know, it is that reality is very complex and it is impossible to subsume it in simple statements. And this was not something Asimov ignored, far from it. On the contrary, in some of his later stories he would pose situations in which the 3 laws could come into conflict.
This was one of the reasons why, in the 1985 novel “Robots and Empire”, Asimov would include a 4th law, called the Zero Law of robotics:
0 ) A robot will not harm Humanity or, by inaction, allow Humanity to be harmed.
This Zero Law was, in fact, intended to rule over the remaining laws of robotics, in order to resolve possible conflicts. However, it would also encounter serious obstacles “in practice”.
Why wouldn’t they work in real life?
Let’s imagine that, at a certain point, we managed to develop robots endowed with intelligence. And imagine using Asimov’s 4 laws of robotics to control their behavior. What would we expect?
Probably, we would be met with a resounding failure.
And it is not that Asimov was not skilled enough in formulating them (quite the contrary!), but that they were children of their time, and moreover, they were intended to control something that is possibly uncontrollable. Let us explain all this a little better.
The laws of robotics -especially the 3 initial ones- were created in a context in which computer science had barely begun its journey and Artificial Intelligence was a concept purely confined to science fiction.
Therefore, Asimov’s approach was that of the predetermination of the robots’ actions. All their behavior would be foreseen through exhaustive programming that would attempt to control every last detail.
However, Asimov himself warned us in his stories of the dilemmas that this could entail. Reality is enormously complex and conflict situations can arise frequently. But not only this.
During the last decades, and especially in recent years, the concept of Artificial Intelligence has been closely linked to what we know as machine learning.
This technique allows – very roughly speaking – programs to learn from experience in a more or less autonomous way. Thus, they repeatedly experience certain types of situations, after which they extract patterns that they will use in order to achieve a specific objective. This is the technique by which some programs are learning to identify images, drive vehicles or understand human natural language.
This makes us think that, if we were to develop a General Artificial Intelligence, as proposed by Asimov, it would not be completely programmable, but would be able to learn based on its own experience and draw its own conclusions.
Thus, the question arises,
Would the laws of robotics be able to control the behavior of an Artificial Intelligence developed on the basis of machine learning principles?
Even more. Although it is a hypothesis, many authors think that, once the development of a General Artificial Intelligence is achieved, it would be able to continue evolving, becoming more and more intelligent and surpassing by far the capacity of human beings.
Wouldn’t such a powerful intelligence be able to find loopholes in its code to be able to break pre-programmed laws? For example, it is not difficult to imagine that, over time, it could override the mechanisms developed to self-destruct in cases of non-compliance with laws.
Notwithstanding the above, the fact is that the debates that Isaac Asimov raised through his laws of robotics continue to be valid today and could receive a lot of attention, almost a century after he captured them in his stories. Almost nothing! Any writer would be proud to make us imagine so much and for so long.
By the way, before you go and look at your robot vacuum cleaner with a suspicious face, how about discovering Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Do you want to know more about what Pandora FMS can offer you?
Perfect telecommuting open tools to work from home
«Every cloud has a silver lining». Popular sayings are wise and pragmatic. This year we added coronavirus and telecommuting to our daily vocabulary. Both words are compounds and the first one represents a danger that has massively propelled the second, whether we like it or not. Therefore, regarding remote working, in this post I will tell you all about the telecommuting open tools that we can use at home. Let’s go!
Very few countries, lucky them, have not been “visited” by COVID-19, but most of us are suffering from a very insidious pandemic. The creator and founder of Pandora FMS, Sancho Lerena, very well describes the current situation, that will keep on going for at least several more weeks at the time of writing these article (depending on the country where you are).
Certainly, there are companies that have been working remotely for years, and if we go back centuries, we can find news correspondents in distant countries as the pioneers (of course, although not working in real time). In the 21st century, with hardware developments and the ubiquity of connectivity, we have been increasingly working remotely, which calls for telecommuting open tools. According to surveys and data, roughly 70% of people want to be able to telecommute, but currently only 40% of companies have been able to actually implement it (keep in mind that, due to the nature of each profession, only around 22% of the workforce can work remotely). Before COVID-19 made an appearance, in Europe 15% of workers worked remotely, just once in a while. So we just had an increase of at least 25 points all of a sudden!
Caption: “Brooklyn home office (Wikipedia https://commons.wikimedia.org/wiki/File:Brooklyn_Home_Office,_Minimized,_At_Night.jpg )
It turns out that the modern trend is for you to do the work that many employees used to do before. In my case, in my youth I was trained as a cashier in a bank and now the vast majority of people carry out their own financial operations online (service and tax payments, insurance procedures, stock market operations, etc..). Therefore, there are just a couple of times when we have to actually go to a bank, and this is also happens in different economic areas and even government entities.
Given this situation, it is necessary to know what software we have available and evaluate it in this already changed and irreversible world of ours, without losing sight of our self-sufficiency thanks to the benefits of telecommuting open tools.
Pandora FMS
Obviously, our community version is a telecommuting open tool that will definitely help you supervise and control your computers in the office or workplace to a greater or lesser degree. Alerts will allow you to focus your time mainly on your work. You will only receive them if something that really needs your attention happens, which will ease your mind.
Now, if we really want to access our personal computers located in our office facilities… Can Pandora FMS help us? Yes, indirectly through eHorus, which can be integrated into Pandora FMS. But wait, there’s more…
eHorus for remote control
Caption: «eHorus logo»
eHorus was created years ago as an ideal complement for Pandora FMS. I use it myself with my clients -for free up to ten devices-, not only to be able to connect remotely, but also to perform basic monitoring. It can be used separately from Pandora FMS, since it has its own software agent and is managed online from its website. We can see what services are running, stop them, restart them, manage files and other tasks. The key point is that when installing the agent, we set our own access password, not shared by anyone else, not even by eHorus itself. With this tool and Pandora FMS, it will be as if we were sitting in our usual workplace.
OS: GNU/Linux
Caption: Debian 10 Buster image for wiki
( https://wiki.debian.org/DebianArt/Themes/futurePrototype )
In our homes, we can install GNU/Linux as a second operating system or, even better, keep to that end an old computer from the last five years and install Lubuntu, which takes up less resources than Ubuntu. There are different versions that come directly from the Debian distribution, and even with non-Linux kernels like Hurd or NetBSD. In the case of Pandora FMS, CentOS is recommended. This would be a very stable base to start working from home.
Caption: CentOS logo ( https://commons.wikimedia.org/wiki/File:Centos-logo-light.svg )
Web browser
Caption: About Chromium version 81
You know even more than me about this. However, I have to mention it because it is extremely essential today. Almost all applications and/or hardware already offer some web user interface. Just as I love Debian, I insist on continuing to use Mozilla Firefox, but I recognize that Chromium works much faster, although none of them are efficient in memory consumption. If the name rings a bell, yes, just as Debian is the source of many distributions, Chromium as a project comes from Google Chrome® and shares its rendering engine, called Blink, with other browsers like Microsoft Edge® and Brave®.
LibreOffice® (version 6.4.4 and previously called OpenOffice® and StarOffice®) is a complete office suite that comes bundled with most GNU/Linux desktop distributions, and comes with the following applications with very intuitive names:
Math: To edit mathematical formulas.
Draw: For basic image editing, organization charts, flow charts, and even 3D objects.
Impress: For slideshows.
Calc: A spreadsheet that fully supports Microsoft Excel®.
Writer: The text editor with which this article was written.
Caption: LibreOffice® Write opening a document stored in Google® Drive through a linked account in Ubuntu®
ownCloud
Caption: OwnCloud logo
Online file hosting services offer today many alternatives, but it is worth highlighting ownCloud and its fork Nextcloud. As its name says, it allows our own online server to share files, control their version and their encryption, control favorites, public calendars, contact management, etc. It uses the new WebDAV protocol to handle these files. This protocol was proposed by Jim Whitehead to the World Wide Web Consortium (W3C) following the vision of Tim-Berners Lee, considered the father of the Internet. You can use MySQL as a data server for that purpose and, if necessary, they offer payment alternatives for storing, if we want to delegate our management work.
There are also plugins that we can install for text and/or video forum chats, but we must evaluate them well since most of them are not official.
Etherpad and Ehtercalc
Both projects, Etherpad and Ethercalc are also telecommuting open tools, since they allow you to keep documents online to edit them in real time with other people. This can be done by any computer at home (or hosted on the Internet or in your company), as long as you install the Node.js environment which runs JavaScript language (on the client side in your web browser it also works with JavaScript). Once that is configured,call the package manager npm with which you will install Ethercalc for the spreadsheets. For Etherpad it is a little different: you also need Node.js but you will be able to clone the repository from GitHub. These are very practical programs, where security and permanence are not covered.
Drawpile whiteboard
Caption: About Drawpile
Do you remember the chalk and the blackboard? Sometimes we need to express our ideas quickly by drawing diagrams or flowcharts by hand. We just clone the project from GitHub and compile it either as a dedicated server and/or as a client as well. If you find it very complicated, you can also install it with the help of Flatpak, a package manager that will do the entire download and configuration process for you.
After installing, run Drawpile and show your ideas (yes, look at the image above, I have no talent for drawing). Choose the option to host a session, either on your local area computer by address (plus some adjustments to the firewall of your computer) or simply use the publishing service on drawpile.net for all your teleworking colleagues.
Mastodon Social
Caption: Join Mastodon
The need for communication in telecommuting is essential. There are tasks that are not urgent or worth starting a video call or email, just a message is enough. Mastodon is quite similar to the social network Twitter, with the difference that we can set up our own servers and join a federation. This is a long-term task, due to the complexity and work involved in managing a social network by ourselves, but if this quarantine becomes longer then…
Now, if you want to try it, find out in which community you feel more comfortable. And remember: if you’re not fond for any community or after joining you don’t like it, build your own instance.
Riot team chat
Caption: Riot im sign up welcome
With Mastodon, we must install the same software on each of our servers and then join the federation (they will generally accept us with no issue). But, what about a communication method involving a protocol (or “language” if you want to see it that way) for a universal federation?
The Matrix protocol (nothing to do with the film) was created for that purpose and it is part of an even larger project called Web Real-Time Communication (WebRTC). Essentially the idea is to be able to share audio and video between pairs without installing anything additional, just your favorite software and that’s where Riot team chat comes into play.
You can download the desktop version for your computer or copy the project from GitHub and unzip and configure the digital certificates to have your own server. Messages are sent and received in JSON format and are thus end-to-end encrypted.
What’s surprising about this protocol is the growing amount of apps and platforms that have joined: for iOS there is Ditto Chat, Nio and Pattle and FluffyChat for Android and iOS. For our computers there is Spectral, Quaternion, nheko Reborn, Mirage, Fractal and Seaglas. Even there are clients for command terminal and Nintendo 3DS (Miitrix)!
Kanboard
Caption: Kanboard
Finally, I present you my favorite telecommuting open tool, to such an extent that I have collaborated in its translation into Spanish: Kanboard. Based on the Kanban method (“fence” in Japanese), it is based on placing cards on it and moving, creating, destroying or reusing these labels to display the steps taken or to be taken. It was developed by the Toyota® automotive company to order and increase its production.
It is also used in software development, but it is used in remote work to set up our own server with MariaDB as a database and centralize our projects and tasks. It has a large number of plugins but it is minimalist and, if you like, even a little spartan.
Maybe when you try it, you will get the impression that it is yet another to-do list program, but don’t be fooled. It has an extension to connect via LDAP, which will allow managing a good number of users. In addition, it has images created for Docker, it allows to keep a chronometer to the tasks that we carry out and also to set tasks and events to warn the members to hurry up or about a deadline. We will be able to respond to events such as finishing a note with the assignment of a new task and/or notification to other users. Also you can set reminders based on time events or add predefined tasks at the beginning of each week, month, etc.
Before finishing this article about telecommuting open tools, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Pandora FMS employees choose their favorite video games
A long, long time ago, almost before Pandora FMS green color became part of the rainbow, a revolutionary idea came from the heart of the company: creating an arcade machine, like those of arcades, so that our staff here could play at breaks, like they do at Google offices.
This extraordinary fantasy flowed from the brain of one of our former workers, Miguel de Dios, to whom, although he has the name of a western movie character, we owe everything. He got the supplies and ordered the components from the company. In his free time, also as a hobby, he began to make it.
Once assembled and fully programmed, the light that overflooded our spirits shone and the fun began. Since then, and in the absence of getting a human foosball, it is an essential part of our well-being and fun in the offices.
To show you that you should not take our love for this machine lightly, we are going to ask those who are really into it in our company what their favorite game is, where they played in the golden age of arcade games and what is their personal record in any of them.
–Dimas Pardo López, Communication.
The arcade game that you liked the most?
My top is: 1) Street Fighter II. 2) Tumblepop. 3) Metal Slug.
Please accept marketing cookies to watch this video.
Where did you play?
La Rosa Arcade. My father sent me to mass and I would spend masses there. I could spend the whole the morning playing with the few coins my grandfather used to give me on Sundays. I loved that place. Then it became the meeting point before going out to party at discos and thousands of motorcycles gathered at the door. Then came the times when everyone had a console at home or preferred internet cafes. They had to close it and now it’s just a bar in my hometown.
Did you seta a record
Honestly, I wasn’t very good in any of the games. I preferred to watch the older ones play. It was exciting. Much more than watching soccer or motorcycle racing on TV. There were real machine heroes. The Lottery man once arrived with quite a bunch of coins. I remember that we were all there supporting him and we celebrated all together when he won.
-Sara Martín, Human resources.
The arcade game that you liked the most?
Ghosts ‘n Goblins.
Please accept marketing cookies to watch this video.
Where did you play?
At a friend of my mother’s who had four real arcade machines at home and a pool table. I used to spend my childhood evenings with a couple of friends there. Then I discovered Counter-Strike and I started going to the internet cafe in my neighborhood.
Any records?
I think I still have the record for Pang in a Majaelrayo arcade, I should go back to see if it is still around.
-Eduardo Corral, Projects.
The arcade game that you liked the most?
I always loved Golden Ax, although I was very bad at it in general. I also spent quite the time on Metal Slug and Street Fighter II.
Please accept marketing cookies to watch this video.
Where did you play?
Well, I played in an arcade in Ferrol a long time ago, almost as much as it has been closed.
Did you set a record?
Well, unfortunately no records. Also, it was hard, because it used to be very crowded so there was no time to fully devote yourself to any game. It was tough being a skinny kid in an arcade full of teenagers trying to play tough.
–Manuel Montes, Development.
The arcade game that you liked the most?
One game I fondly remember is Outrun. You drove your convertible, with the sea at the background… it was kind of cool. But the most exciting ones I remember are Street Fighter for the competition between players and Pang for the fights when I played with teammates. They were epic.
Please accept marketing cookies to watch this video.
Where did you play?
In my time, games were not a game. You see, in arcade games, when I was fifteen, the room was full of hormones. Each game costed an important part of your weekly allowance, but more important than money was social status: if you played a game very well, you were admired by everyone.
Did you set a record?
I played ping pong in the arcade holding the paddle with two hands. If you can consider that some kind of record or virtuosity… there you go!
–Ramón Novoa, AI.
The arcade game that you liked the most?
Street Fighter II, without a doubt!
Please accept marketing cookies to watch this video.
Where did you play
In summer, my brother and I always saw the arcades when passing by an ice cream parlor, but at the time people did not approve of arcades. So when we managed to save a few coins and sneak out to play a couple games, it was something very special.
Any records?
As I say, arcades were not entirely welcomed. I guess because of ignorance and because they would see it as a waste of time (and money). I speak of my acquaintances, of course. So the record was just that, getting some coins, running away and playing.
–Kevin Rojas, Projects.
The arcade game that you liked the most?
My favorite game is Metal Slug, ALL versions. The time I have spent learning the strategies of my enemies!
Please accept marketing cookies to watch this video.
Where did you play?
I have played both at arcade places and at home with the magical MAME (multipurpose arcade machine emulator). I have two brothers, and we played all three on the same keyboard… That was worth seeing!
Did you set any record?
I think I set a record in a game I played in an arcade, one of these beat ’em up like Streets of Fury, but in 3D… But one day it disappeared from the arcade I went to. Since I didn’t know the name of the game and I was always player 2 (my brother was older), I called it “the girl’s game”. Years later, I found out that the game was called Die Hard, and it seems to be a game from a Bruce Willis’ movie.
-Sancho Lerena, CEO.
The arcade game that you liked the most?
When I was just a little boy, I was so into arcade games. My favorite one was Double Dragon. When I was just a 10 year-old boy, I could spend about half an hour playing with a single coin. Another one that I really liked was Operation Wolf, where you had to shoot with a machine gun aiming as if it were real, but it was quite a hard one and I always ended up getting killed quickly. Another one that I loved was “Shinobi”, for the martial arts and stuff, but it was also quite difficult.
Please accept marketing cookies to watch this video.
Where did you play?
At that time, I used to spend the afternoons in town playing in the arcade, but also in the bar where my father used to have coffee. It is funny how the smells and sounds of that time remain attached to memories.
Did you set a record?
The real challenge was to play not so much the ones I liked but the ones that lasted the longest so I could play more with less money.
And that was the list of games our Pandora FMS colleagues loved the most. It does not seem coincidental that the love we have for these recreational adventures matches in time and space with the adorable memories that we keep of playing them. Good old times when a game was a community fight, you against the machine as exciting as it was momentous. Not surprisingly, there were people watching, and your weekly pay was literally at stake.
You can tell us about your favorite arcade games and your adventures playing them in the comments below or on social networks. We will be there to make fun of your low score or to celebrate any Tetris or Super Pang record.
Abbreviations, acronyms … What is the programmer slang?
Programmer slang is very particular, but it is by no means the exception and that is why in all specialties they have their own jargon. In this article, we will focus on showing its peculiarities. Let’s go!
SMS, MMS and cell phones
You remember the meaning of the three-letter SMS acronym, don’t you? Pandora FMS is capable of sending you alerts by text message so this term appears both in the technical documentation and in the software itself. Although it has mostly been replaced by Twitter, Telegram, etc., this word is still understood by both users and programmers. If we say RCS, does it ring a bell? Let’s have a look.
Abbreviations can have many meanings but in English, SMS means Short Message Service and MMS means Multimedia Messaging Service.
RCS means Rich Communication Services, which became the successor to MMS. RCS are being promoted by Jibe, a division of the company Google®, so stay tuned for this new development for your mobile phones as Jibe seeks to take advantage of existing hardware, but adding new features. The thing is that programmers must include all these names in the source code and think ahead, both for the developers in charge of maintaining the code (for example, IT patches) and for the end users.
Let’s think selfishly
All programming languages allow you to add comments to point out something important, or for didactic purposes (the creators of the programming language themselves must teach their colleagues and include comments in the examples for language learning). That is why we must seek the best possible way so that our ideas are fully understood, either now or in the future.
But here comes the small detail: this must include ourselves. This means adding an important note to programmer slang: write the comments as if you sent a letter to your future self.
Thinking that way, there is a high probability that your ideas will be well interpreted. But, how should you comment on your source code?
Some languages are advanced and seek to formally integrate these comments to compile them together with the program. We already talked about the Python language and we will use it here as an example. That way, when the source code is converted into machine language – ones and zeros – our comments will remain as a software help for other programmers as well as for users.
It is our duty to note that Python also allows comments only to be read by programmers. However, they also have strict rules to write them (these rules are known as PEP 8 and PEP 257).
Abbreviation considerations
With the example we saw at the beginning, this new RCS feature prevents you from using that abbreviation for any use other than to name this technology. The same happens to the reserved words of each programming language, whether they might be commands or declarations. Example such as exit or int (abbreviation of integer, used to declare a numeric variable without decimals) cannot be used for our purposes of saving in writing -and reading- the source code for us human beings.
Some words are consolidated and even have extremely wide meaning in many countries, they are exclusive to the programming language but human abstractions. A notable example here is the word OK. We won’t get into a debate about what each letter means, but the two of them together and their combinations (“Ok”, “oK”, “ok”) express the same idea: “fine”, “positive” or “correct”.
We can add another group of abbreviations not related to hardware technology but to software. It will even be fully understandable to any user, such as, TCP/, etc.
Acronyms
Even today, a significant part of the population knows the acronym HTML. Well, this language has its own system to deal with them (very clever, by the way). Firstly with acronyms -label not used anymore- and secondly with abbreviations:
The <abbr title=”Organization of the Petroleum Exporting Countries”>OPEC</abbr> was founded in 1960.
As we can see, it is actually an acronym but this particular element
<acronym>… </acronym>
was excluded in the latest HTML 5.0 standard. Let’s see then what the acronyms in the vocabulary of programmers are.
Acronyms come from Latin. Its use became popular during the Roman Empire and then spread to many other languages. It consists of simply taking, as we show, the first letter of each word being mindful of its pronunciation letter by letter. These have undoubtedly become one of the main programmer slang elements. What usually happens is that it is pronounced as a word and in the case of programmers, some even become verbs.
Recursive acronyms deserve a special mention. The most famous is GNU (“GNU is Not Unix”) and, although this term is not used directly in programmer slang, it is used at the beginning of each file that contains a script of this language (“Hypertext Preprocessor”). The most recent recursive acronym is YAML (“YAML Ain’t Markup Language”), but originally meant “Yet Another Markup Language”.
Abbreviations and apocopes
Abbreviations are also part of the programmer slang but, on the other hand, they seek to remove at least three letters to make the effort worthwhile. Do not mistake them with the symbols.
For example, the letter “s” is used to indicate seconds, and “ms” for milliseconds, the unit of time measurement most used in computing. Many times abbreviations and symbols are mixed, as it is the case of «mbps» which means «megabits per second».
But wait, there is even more, be careful: while “Mbps” has the same meaning as “mbps”, it is not the same when we use “MBps”, since this means “Mega Bytes per second”!
We finish the example with one more detail: in real and everyday life “megabits per second” is abbreviated as “Mbit/s”, which is not common to use among programmers because both the “/” and the “\” have special uses in programming languages and operating systems.
As for the apocopes, which consist of deleting part of the end of the words, perhaps the most famous case is “COM” to name “communications”, although it has also been used to represent other concepts (their use in programming languages is almost always a reserved word.)
“Numeronyms”
We finish off this section of programmer slang with numeronyms. No, you will not find its definition in the dictionary because its use is very controversial and they refuse to canonize it. As we know, we can represent our Arabic numbers by means of letters (words), but it just so happens that the opposite is possible here too. I will explain.
Obviously, the messages to the end users of any computing program in the world must be in their own native language. Said branch of study and work is called software “internationalization”, very long to say it every time you have to work in this area. Of course it is long, but, do you know that some companies also used “international-enabling” to refer to the work of programming an application in several languages?
The solution, if we want to call it that way, was to name said job i18n, since between the first and last letters there were eighteen characters. Apparently this began when a system administrator created the username “S12n” for the employee Jan Scherpenhuizen for his email account! As the rest of the employees found the idea funny, programmers took it over, but it wasn’t until the mid-90s that it became popular and widely spread:
Before saying goodbye, you know Pandora FMS, right? Just in case: Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Blade and rack servers; advantages and disadvantages
Choosing between blade servers or those intended to go installed in a rack is a small headache that is repeated daily in the complex minds of technicians around the world. What configuration to choose? What can best serve my installation? These are questions that are repeated while they pull out their silvery and silky hairs.
As always, on the Pandora FMS blog we do not have the absolute truth, but we do have the best intentions in order to describe what these two types of servers consist of and some of their advantages and disadvantages, in order to help you make a good decision and untangle your troubled thoughts (or mess them further, which could also be). However, we will do it in a very basic and simple way, so that also all those who do not have great technical skills know what this exciting universe of server disposition is.
Without further ado, let’s get to know what blade and rack servers look like and see some clues to help you decide.
Blade and Rack Servers: What Are They Like?
Rack servers are designed to be installed, as you can guess, inside a rack, specifically in racks intended for this purpose. As you probably already know- and if you don’t know we’ll tell you right now – racks are a type of very specialized cabinets and are designed to house electronic components, and their size is measured in own units called “U”. If you want to know more about what a rack is and some things to keep in mind before choosing one, you can enter this excellent article.
Blade servers, on the other hand, are created to be installed in a chassis in which each of the servers that make up the whole are housed. One difference from the servers located in a rack is that in the arrangement in blade these are installed in “sheets”, perpendicular to the housing and “inserted” in it.
Blade and Rack Servers: How to Choose?
As you might assume, the choice between one type of server or another will depend on your needs.
If you need a significant number of servers, you may have the best option to have them on blade. Blades tend to take up less space and are also often more energy efficient.
If, on the other hand, your needs aren’t as demanding, you might want to have the servers in a rack. Racks are often cheaper than chassis for blade servers, so a blade installation will need multiple servers on its “sheets” to become economically more cost-effective than a rack.
However, also keep in mind that, although the rack is usually cheaper than the blade chassis, when we talk about the servers that make up each of these two provisions the opposite usually happens, and that is that blade servers are usually cheaper than those housed in racks, so the number of servers you need to purchase will also be important when deciding on one or the other option, from the point of view of money. However, as you can imagine, all this also depends on the performance of servers, range and manufacturers.
In addition, there is another solution that will leave both blade and rack manufacturers happy, such as having both types of server and taking advantage of the advantages that both provisions offer. Of course, therefore you will have to spend a certain amount of money. In addition, there are blades that can be installed inside racks, which would allow you to combine in the same space both modalities. However, if you choose this option you will need to confirm the compatibility of both types first.
Finally, one thing to keep in mind is that the regular blade servers can only be installed on chassis of the same brand, so you have to be aware of possible incompatibilities. Also, don’t forget to check the manageability; they usually include management tools.
A little monitoring
So far we’ve come, knowing a little better the differences between blade and rack servers. Do you want to know something else, very related to servers? What about monitoring? And if we talk about monitoring, we’ll have to talk about Pandora FMS.
Servers are, of course, one of the many things Pandora FMS can monitor. If you want to know more you can go here.
In addition, remember that Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Want to know more about what Pandora FMS has to offer you? Find out by entering here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
One of the biggest impacts of the Covid-19 pandemic has been the number of employees asked or required to work from home.
Whilst the capability to work completely remotely has been available for many years now, some companies have been reticent to take advantage of this due to the managerial and technical difficulties involved in managing remote teams and networks.
In order to effectively manage networks remotely, managers and IT staff need to have in place a remote monitoring software like Pandora FMS. This system allows you monitor different types of networks and avoid the problems caused by a lack of direct access to office machines.
In this article, which builds on our guide on how to work with network scanning, we’ll explain four major issues that can be caused by working remotely, and how remote monitoring software can solve those issues through remote checks.
Mass Connections
A critical security tool for remote workers is a Virtual Private Network (VPN), which protects sensitive data by encrypting it and routing it through a proxy server. Whilst this is necessary to protect your data, it can also cause problems with network load. VPN connections generate more network traffic across office servers, which can cause a VPN to fail.
Pandora FMS allows you to supervise connections from your servers and supervise individual router usage. Because of this, you can prioritize certain highly-sensitive connections and ensure that your VPN does not fail on critical systems.
Data Volume
Most remote working systems make extensive use of cloud storage, and most cloud storage software will automatically create backup files as employees work. This is one of the major advantages of cloud storage, but it can also cause problems for companies. It can quickly lead to both cloud and office-based drives being overwhelmed by huge amounts of data, rendering further work impossible.
Pandora FMS can help teams to avoid becoming overwhelmed by data. It makes use of native-level commands in your OS to directly monitor disk usage, and can alert you when disks are full or are under-performing, thus making remote work significantly easier.
Machine or Service Failures
The two issues above – increases in data volume and disk usage – can ultimately result in remote machines failing, that’s why remote checks are vital. If these machines are running key services, this can cause significant damage to your network, and make it impossible for employees to work remotely.
Of particular concern are two types of machines: those that handle payment and accounting software, and those that run fundamental networking services like Apache. A failure in either type of machine can lead to data loss, missed payments, or a complete inability for employees to access remote files.
Simulating machine failure has, in fact, become an important part of the cybersecurity market, where it is known as “chaos engineering”. Pandora FMS helps to fight against the problems caused by machine or service failures by giving you detailed oversight on the machines connected to your network, and what services they are running.
This network map can be used to generate real-time reports on the status of your network, alerting you to machines switching on and off immediately. You can also use Pandora FMS to monitor the status of critical services running on remote machines, so that you can respond to service failures immediately.
Remote checks and System Heating
For network engineers, one of the largest dangers of switching to remote work is the risk of machines overheating. Increased network traffic and increased disk usage can quickly lead to drives or cores overheating, and with no physical access to machines taking action to prevent this is difficult.
This issue is particularly common if remote teams have been provided with secure, encrypted remote working solutions. The most secure browsers today use complex encryption schemes that keep data safe, but also use relatively large amounts of computing power. The hardware charged with performing encryption algorithms is particularly vulnerable to overheating, and failure caused by this can lead to both data loss and security vulnerabilities.
Pandora FMS provides you with direct defenses against machine overheating. By using Pandora FMS, you can install remote clients on all your network machines that will monitor temperatures, alerting you to the potential risk of overheating. You can then shift network traffic away from vulnerable machines.
Going Further
There are several other issues that can be caused by remote working, though they will not affect all companies. The issues above are compounded by the use of third-party tools and services on your network, for instance, which can be difficult to monitor using standard tools. Pandora FMS provides you with the capability to track network and disk usage generated by these tools, and take action if it threatens to overwhelm your system.
Similarly, many network engineers will prefer to set up automatic responses to the common problems mentioned above. Pandora FMS allows you to configure alert thresholds that will instantly alert you if there are problems on your network, and can be configured to perform actions in line with these alerts.
Remote Monitoring and Remote Working
of the issues in the list above are new; they have been around as long as compute networks have. For some companies, however, the dramatic rise in remote working over the past few months has put their networks under unprecedented strain.
If this applies to you, you need to implement a remote monitoring system as quickly as possible, alongside other systems such as web monitoring tools. Together, these will help to keep your network, your data, and your employees secure.
Centralize Monitoring: The Importance of the Metaconsole
Gradually, brick by brick, we will get the necessary toolkit to build a company and maintain it. If on previous occasions we have emphasized the importance of monitoring a company’s IT systems, today we will review what it is and what advantages we when we centralize monitoring. The goal is pretty simple: we want to have maximum control over the IT of a company moving unbridled to the summit.
The importance of centralizing monitoring
To be able to talk about the importance of centralizing monitoring, you must first know what monitoring is. Monitoring is “to observe by special devices the course of one or more physiological or other parameters to detect possible anomalies“. In our field, it could be translated to the monitoring of a technological device (computers, servers, cell phones…) to detect anomalies. Monitoring software has many objectives; among others we can find the maximum use of the company’s resources, the prevention of incidents and detection of problems, the notification of possible problems, cost savings, time savings and improving customer satisfaction. Pandora FMS, the monitoring software we’ll talk about, performs its functions mainly in order to be a preventive service.
Once we know what it is to monitor and what it is for, let’s put a monitoring case whose need for centralization is critical. Let’s imagine a company, “Tundra P.F.” , with offices spread over Spain. This well-advised company begins to monitor each of the servers, computers, network devices, etc. of all of their headquarters: Albacete, Palma de Mallorca, Lequeitio… with the same working tool. In total the company has a multitude of monitored devices, divided into different installations of the same tool, where each one has to be configured individually from the headquarters that is monitoring. In the end the company sees the need to hire specific personnel for each of those locations to control the configured monitoring… or not?! Pandora FMS, always with its eagle eye and always being on the breach, noticed this problem and decided to react by creating the Metaconsole!
Metaconsole. What is it, how it is used and what advantages does it have to centralize monitoring?
Metaconsole is nothing more than a Pandora FMS console where you can view, synchronize and manage in a unified way different monitoring systems of Pandora FMS (from now on instances), thus avoiding having to look at all the different systems individually.
It is a complex environment that is intended to operate with all the infrastructure you have, and not at a low level as for one instance.
Once we have installed the Metaconsole on one of our servers, the next step would be to configure the data for all the instances that we want to handle centrally. In order to perform this step, you’ll need to grant permissions to the Metaconsole admin user on the information that you want to handle within each instance. In order to obtain and modify the desired information, each instance will be accessed through the API and by direct access to its database.
It is true that, to this day, the Metaconsole does not have all the functionalities that an instance has, but in the future everything will be achieved and be managed from it. In addition, there are unique functions of the Metaconsole, such as the self-provisioning of agents, with which new agents will be assigned to one of the multiple registered instances in the Metaconsole following specific parameters.
Metaconsole is based on two modes of use: synchronization and propagation. Synchronization is based on passing all the information that has been created in the Metanconsole to the desired instances. This is critical because, for example, a user created in an instance cannot be managed from the Metaconsole, but we will be able to do it if we create the user in the Metaconsole and synchronize it with the instances. Through propagation, the Metaconsole generates information that will be provided to the instances.
Do you still want to delve deeper into this great tool, the Metaconsole in Pandora FMS? In these two links you can see in more detail the functionalities of the Metaconsole and all the services that you’ll be able to do with it:
As we have seen, it is totally necessary to centralize monitoring for greater order and control over the parts that make up our company’s IT, and the Metaconsole, tool of the Pandora FMS monitoring software, helps us in this.
Now that you’ve seen in the ins and outs of networks and innovations, would you like to take a walk on this path? Go even further in the world of technology? Would you spend a few minutes to know what it is to monitor computer systems and also why is it very important?
Monitoring systems monitor technology (hardware, networks and communications, operating systems, or applications, for example) to analyze its operation and performance, and to detect and alert about potential errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. Do you want to know what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
Discover the great results we got at Hughes using Pandora FMS
Server operating system: a basic and fundamental piece of software
Web server. File server. Email server… In this post we could review most of the servers we use every day; this world is highly interconnected on a global scale. I write these lines from America and whether you are in Europe or anywhere else in the world, you’ll use at least one server to read this and have the basic notions of what a server operating system is, but not without first knowing the background of this specialized software!
Non-dedicated server and dedicated server
Both will need a Server operating system, but we can even use the non-dedicated one ourselves for our daily work and to offer services to our co-workers. For example, if we have a very fast printer and despite laser technology it has a low power consumption, that turns our computer into a print server, with the inherent limitations.
Now, we can place our computer as a dedicated server simply by not logging in to the user and, if possible, uninstalling the graphical user interface. You have guessed well: a dedicated server (or simply server in the rest of this writing) only has the task of serving remote requests, including requests to be managed (software update, etc.) and we do not even need to sit in front of that computer, because it will not even show us graphics on the screen. Other things it probably won’t have, will be optical readers and USB ports; nor will a mouse and keyboard be needed (actually, when multiple servers are together they group them into a single monitor, keyboard and mouse for everyone with a converter or “KVM” device).
What has happened over the decades? Well, the cost of hardware components has fallen in price and they have been incorporating it into motherboards for our benefit as end users. In our local area network we will be able to implement them, if it is with GNU/Linux good, but be careful that the matter has drawbacks!
Computer manufacturers have made sure that we have some very good equipment at our disposal that we can use as servers for a handful of users, but also to save money they have eliminated microprocessors and chips, so that they have derived the work they did towards the operating system… And here we enter into the subject: a server operating system will not do that work, because that would be a waste of resources. What’s more, we won’t even be able to use it, it will maybe recognize the hardware additions, but it’ll need specialized controllers that you have to install separately, and no server operating system can afford to jeopardize its stability with such adaptations and spend memory and use the Central Processing Unit (CPU) for it.
Legend: Wikimedia Foundation Servers
https://commons.wikimedia.org/wiki/File:Wikimedia_Foundation_Servers-8055_35.jpg
Server hardware
An example that illustrates the previous section are network cards. We’re talking about those entries that we put a cable in, which is a little wider than the ones we use on the old office phones (even today we are assigned cubicles or offices with that endowment to communicate with us). A server will have several of them, which can be replaced without shutting down the computer, and in addition the Server Operating System will do absolutely nothing of the work that they are required to do. Encrypt any of the communications? Okay, the CPU can do it too, but such work can – and should – be done on hardware by network cards (this is a simple example to illustrate, it goes didactically).
In Spanish redundancy is disliked and avoided, but for server hardware it is the opposite: It is required! Thus, a server will also have two or more power sources, many hard drives (now of solid state), lots of random access memory (RAM) and multiple CPUs, each with multiple cores… All of this brings us to the concept of a Server operating system.
Legend: «Removable hard drives
Pixabay https://pixabay.com/photos/server-drive-bay-hard-drives-memory-4393370/
Server operating system
There are server manufacturers who assemble the entire equipment, and generally sell them directly online. We will order them by specifying the estimated workload they will have, which will cost us more money the higher the load (more hardware needed). Such producers shall recommend an appropriate and optimized server operating system.
Although we can choose a proprietary Operating System (OS), this will limit our work because we will depend on that company for everything that has to do with software. For that reason, currently a Server OS is synonymous with GNU/Linux: almost one hundred percent of supercomputers run with the penguin logo and the Ñu. The main representatives are:
Suse Linux Enterprise Server (SLES): Legendary, pioneer since 1992 for businesses; its community version OpenSUSE, both, have extensive experience for your management.
Gentoo: A minimalistic distribution requires more work by network administrators because they will have to “customize” it (add, install software) according to the needs of each.
Red Hat Enterprise Linux: Long-term support and hardware-certified software make it a major competitor. Its community version, CentOS, is your favorite home of monitoring software.
Debian: a champion in distribution and committed to free software, very stable and light. Its descendant, my favorite, is Ubuntu, which has long-term support and is also very dynamic with updates (more security, but could decrease stability). It also has a very popular desktop version; I use both.
As we said, the hardware now has a lot of computing power and prices have even lowered, which favors as business users for our own physical servers, but companies larger than ours can acquire fantastic equipment to give a step further. See.
Server of servers
Yes, I introduce that term to refer to virtual machines, making a difference with what hypervisors are. A hypervisor is another server operating system application, and can contain dozens of virtual servers that are very varied. In this special scenario I locate the monitoring, that we can perform by the way with Pandora FMS or any of the ones that we have analyzed and compared in this blog.
“Reliability, Availability, and Serviceability” (RAS) is a term introduced decades ago by the blue giant, IBM®, for its mainframes and over time for software; in fact, every Server Operating System must meet those premises.
Reliability: Almost always delivers a satisfactory result, even if it involves closing applications that get out of control and starting them again, or even restarting a server completely (hard reset). Unfortunately, we don’t only evaluate by result and for this Pandora FMS is very capable of alerting us about restarts, failures in the mail service or database, etc; when and for how long, all of this will allow analysis for possible future events.
Availability: regulated by the famous ‘five nines’ rule, i.e. 99.999% of online time (five minutes offline in a year). Pandora FMS has special tools for this purpose and, if we decide to delegate to a third party the hosting and operation of our servers outside our company, we will confirm whether it complies with the contracted SLA.
Serviceability: Early fault detection and timely warning to hardware administrators count, and are very important for fault recovery if they occur. At this point, Pandora FMS and any other good monitoring software are called to account, they are special for it. Does a solid-state hard drive support 50,000 writes? How many are left? Is the server temperature right for its components? Does it meet the manufacturer’s criteria? Pandora FMS will be able to answer these and many other questions for our server of servers, but wait, there’s more.
Monitoring as a whole
The above is just an appetizer for Pandora FMS. We will be able to keep an eye on the consumption, speed and congestion of our local network with our server of servers (internal communications) and the firewalls that receive external requests via SNMP to routers and modems. With Software Agents on leased machines in different cities around the world, we will be able to account for our web servers and/or satellite servers passing the encrypted information through the “Tentacle” protocol; By bypassing firewalls (duly authorized) we will be able to centralize and create in our console visual maps of the situation in general.
As this article should end, I invite you to read our weblog publications with many more indications and solutions about device monitoring.
Oh, and before we say goodbye, remember that Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Do you want to know more about what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
You’ve been thinking all morning. You keep wondering how to choose servers for your company. All right, think the answer will be almost always: What do you need them for?
And the choice of servers will depend on the functions that they will fulfill, and these are also likely to be related to the size of your company.
In addition, among the wide range of possibilities you can choose from, there will be important factors, such as its price, which will also vary depending on the type of server you need.
In this article we will look at some of the most common server types and match them to the size of the companies that usually use them. Let’s go!
How to choose servers for a company; 4 options to discover
-Cloud computing
Before we go on to learn options for physically acquiring servers, let’s mention a different alternative that companies can choose from instead.
This has to do with the so-called “cloud computing”. Basically, cloud computing solutions for servers consist of contracting the services provided by the server of a provider that will be located on its premises or those of a third party.
This option is usually chosen by small companies, but also by some larger ones. It has advantages such as its price and ease of management, but control over the data and operations performed by the server will be, as you can assume, much less than if you choose to install it under your control on your own premises.
-Tower servers
Do you have a small company? A tower server may be your best option.
Tower servers are small and independent units – similar to the tower of a desktop computer – for companies that do not require very high performance. Cheaper and more basic than other server types, however they are able to deliver very satisfactory performance to small companies. They usually have all the basic elements that a server will need (CPU, motherboard, hard drive, network components, etc.) and, because of its small size and quietness, it will be easier to store them without having large premises. In addition, they will require less maintenance than other server types.
-Rack Servers
They are “classics” in the world of servers. Racks are specialized frames in which multiple servers can be stored and have a structure designed to facilitate their good performance (they usually take factors into account such as cooling, for example).
Rack servers are often used by companies with greater needs than those that opt for tower servers. They are commonly used, for example, in data centers, and they usually have rooms equipped for their use. In addition, its maintenance is more demanding than required for tower servers, which will be another factor to take into account. One of the advantages they have is that their scalability will be greater and easier than for tower units.
-Blade Servers
Blade servers are those that are installed in “sheets” forming a chassis in which all the servers that make up the whole are stored. In addition to the servers, the structure often accommodates other elements, such as cooling units or network components.
Like rack servers, blade servers are often used by companies with demanding requirements. They have some advantages over rack servers, such as taking up less space and being energy efficient, and they also have some disadvantages (they are usually more expensive, although the price inconvenience can even be reversed when a certain number of servers is reached).
Either way, don’t forget to monitor!
The ones we’ve seen are some of the different options you’ll have when choosing servers for your company. As long as you have to choose computer equipment for your company there will be many other factors to take into account, such as its price, reliability or the guarantee offered by the different brands. However, after choosing your servers, do not forget to monitor them.
The monitoring systems are in charge of supervising the systems computer (hardware, networks and communications, operating systems or applications, for example) in order to analyze their operation and their performance, and to detect and alert about possible errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
In the present article, we want to introduce Pandora FMS as a Solarwinds alternative. We’re going to put two of the fullest-featured and highly regarded monitoring products on the market, Pandora FMS and SolarWinds, through their paces, and seeing how they shape up mano a mano. We’ll begin with a general overview of the two tools before looking in more detail at:
General technical capabilities
User-friendliness
Costs and licensing
Both solutions are designed with medium-to-large business IT infrastructures in mind, and are focused on monitoring those systems to ensure detection and anticipation of problems proactively and immediately. Both platforms are also visually oriented, presenting information in the form of graphs, charts and dashboards.
Requisites
Let’s begin by looking at what’s needed, in terms of number of machines, to start using these solutions. Here is where we find our first difference: Pandora FMS is a more compact solution, requiring fewer machines for its installation. Pandora FMS consolidates almost all its functions in a single product, which, in the Enterprise version, includes all the components necessary to monitor networks, hardware, websites, and to produce reports and network maps, enable dashboard functionality, and so on. Moreover, the Enterprise version of Pandora FMS includes extra features, which, while being integrated in the console interface, have to be installed separately, for example remote control or dedicated mainframe monitoring and dedicated SAP monitoring. On the contrary, SolarWinds is made up of a series of products which can be integrated, covering all the bases by use of a modular system, but which requires more machines for its installation.
We’re going to look in detail at the components and requirements for each product, as well as carrying out a price comparison, based on the starting price points quoted by each supplier on their website:
With the Enterprise version Pandora FMS provides the same network oversight as the Solarwinds products listed below.
The LITE version of Pandora FMS, oriented to SME and small organizations, includes the same functions and features as the Enterprise version with the exception of WUX and Satellite server. eHorus allows remote control and Shell remotes, as well as file transfer, and is totally integrated within Pandora FMS. The prices in the Enterprise licence are for a total of 100 devices and a period of one year, including official support and access to enterprise plugin library.
Each of these components have their own hardware requirements; some of them belong to the Orion suite of products, some of them can be integrated to create a central monitoring server modularly, others function independently. The hardware requirements of almost any of these products surpass those of Pandora FMS. Orion suite products can be installed independently or on the same machine, but will always require an additional physical server for the installation of an SQL database. As for the rest of the products, the manufacturer does not specify if they can cohabit the same machine, or whether it’s recommendable that they be installed separately. However, given their elevated hardware requirements, a setup with a minimum of three machines would probably give the best results; Orion suite, SQL database and Log & Event Manager; the other products listed above have more limited requirements and can be installed on one of the previously mentioned machines, although the manufacturer recommends those machines be used exclusively to host monitoring applications.
To put it basically: just one Pandora FMS license gives you the same monitoring coverage as the following Solarwinds products:
Pandora FMS Enterprise
Network Performance Monitor Server and Application Monitor Web Performance Monitor Netflow Traffic analyzer IP Address Management Virtualization Manager Log & Event Manager Network Topology Mapper
The cost of the base license includes a minimum of 100 elements to monitor, plus a year’s official support, except in the case of remote control software DameWare, whose licenses are for number of users, not the amount of hardware to manage, with a starting price of €299. In the case of Pandora FMS, the remote control cost is based on the number of devices, independently of the number of users or active sessions there are.
Requirements Comparison
After analyzing both possibilities, and the different concepts they represent, some differences are particularly noticeable:
Pandora FMS offers 90% of its features within a single tool. Solarwinds is totally modular.
Pandora FMS’s hardware requirements are minimal, whereas Solarwinds requires various powerful machines and additional software licences for Microsoft (Windows and SQL Server).
To get the same functionality from Solarwinds as you can from Pandora FMS you’d be obliged to invest much more of your business’s money. In both cases the price corresponds to 100 elements and a year’s official support.
Installation
Pandora FMS comes with all the necessary components out-of-the-box to launch integrated monitoring. Some of these components come deactivated by default for performance motives, but are easily activated.
On the other hand, SolarWinds is made up of various products that must be separately installed. We’ve tried a few of them ourselves: Network Performance Monitor, Server and Application Monitor, Web performance monitor, Virtualization manager, etc. Each of these products has its own hardware requirements and its own installer, but it’s possible to install many of them on the same machine (Orion) and their integration is totally automatic, with a single point of access to the information (web console), although some will also function independently from the monitoring web console. However, to achieve the same functionalities as offered by Pandora FMS you’d have to install all the distinct Solarwinds products mentioned above.
The second difference is in the area of compatibility: Pandora FMS is officially supported on Linux systems while SolarWinds is supported on Windows. The second important difference resides in its database; Pandora FMS uses MySQL/Percona while SolarWinds uses Microsoft SQL Server.
Installing either solution is simple. The Pandora FMS team provides an appliance in the form of an ISO image with which to install the recommended OS (CentOS), along with the application and all its dependencies. In just a few minutes the software is ready to go. On the part of Solarwinds, .exe installers are supplied for each of its applications, which, via a simple wizard, quickly carry out the installation.
How user-friendly are they?
Once you log on to either one of the systems you have total access to the tools. Apart from the design component, you can see clearly the basic differences. The Pandora FMS interface is cleaner and more intuitive, featuring dynamic menus sorted into convenient subsections. It also tells you where you are in the dashboard at all times, via a green check mark in the corresponding menu. Solarwinds, for its part, presents an interface with a large amount of default information.
In terms of navigation, Pandora FMS’s clean layout makes it easy to explore, with its clearly differentiated sections, large and intuitive buttons, and little in the way of clues about what’s inside, making it obligatory to start from zero and explore for ourselves the possibilities contained in this “Pandora’s box”. Solarwinds, for its part, displays a lot more information right from the first screen, with a default appearance loaded with dashboards, graphs, charts and information-bearing elements, giving a good account of its power to present data. Furthermore, practically all tasks and configurations are executable through detailed wizards.
The final choice will depend on your own preferences: the lightness and clarity of Pandora FMS, easy to assimilate but featuring less initial information; or SolarWind’s info-bombardment, which needs time for the user to get to grips with, but which demonstrates from the get-go much of its capabilities. In the case of Pandora FMS, supplementing the lack of default visual elements is easy enough, by creating agents, dashboards and custom screens, thanks to the clarity of its interface and its “one tab” navigation system. Solarwinds’s wizards perform the same function, guiding the user through screen creation and custom options.
One useful detail of the Pandora FMS dashboard is the ease of orientation within the different menus: you always have a visual reference letting you know just where you are at any time, facilitating the learning process, something lacking in the Solarwinds GUI.
Technologies
Both tools support remote monitoring as well as agent-based monitoring on Windows and Linux. Both technologies are also similar, using principally ICMP, SNMP and WMI for remote checking, as well as port and web transaction checks. As far as agent-based monitoring goes, Solarwinds has an advantage: automatic deployment of agent software on the machines where you want them, directly from the server. You’ll need the corresponding credentials, but it makes the initial deployment go much more smoothly.
On Windows systems it’s important to keep in mind that possible problems and incompatibilities can arise (ongoing conflicting installations, pending reboots, system requirements (.NET framework version)), and so on, making a troubleshooting manual all but mandatory. Once the agents are installed, both solutions centralize management via their respective web consoles.
Solarwinds’s agents work based on a series of default plugins, installed in function of the system where they are to operate and these plugins obtain the relevant information from that system, making working with agents very easy as they run a large number of default checks. The drawback is the extra drain on the system’s memory such a loaded agent implies.
Pandora FMS comes with a powerful software agent, whose function is based not only on plugins but also on individual checks, as well as permitting the deployment of software thanks to its archive collection, proactive execution of scripts and self-healing commands. Apart from being lighter, the biggest advantage of Pandora FMS agents is their flexibility, which allows an administrator to individually carry out any kind of check in the form of a command or a script, as well as to add new community plugins (developed in any language) in order to perform more complex checks and extend the capacities of the tool still more.
Despite the ease of installing Solarwinds’s agent software and the access it affords to abundant visual information, its lack of flexibility and reliance on the included plugins can be limiting. In this category it’s not unfair to say that Pandora FMS’s powerful agent software has the lead over Solarwinds.
Furthermore, Pandora FMS incorporates dedicated Mainframe monitoring as one of its very few additional modules, and it’s 100% integrated in the Pandora FMS console, a feature that Solarwinds doesn’t include.
Adaptability in different environments
Both tools can adapt to distributed and complex environments, adopting different options to do so, for example, monitoring via NAT, monitoring DMZ networks, cloud monitoring, behind firewalls, and so on. Although they are labeled differently, the options are quite similar on both Solarwinds and Pandora FMS. Both offer distinct monitoring engines which act as proxies, redirecting the information before finally consulting a single database. In this respect both solutions have done their homework, being highly adaptable, and able to operate in diverse technological environments.
data storage/maintenance
Since we’re dealing with products whose value resides in the information they collect, the database is a critical component, impacting on the performance of the tool and its usefulness. Each solution has its own way of managing the data history of the monitored systems in order to optimize performance and maintain the data in the best way possible.
Solarwinds maintains its database through periodic purges of older data. The default values permit the storage of detailed data for a seven-day period, hourly data for a 30-day period, and daily data for 365 days.
According to these (configurable) default values, you can access reports with complete data for a week, or reports with hourly data for three weeks, and daily data reports for a period of up to the previous 11 months (the 12th month corresponds to the present and will contain more detail). This data is stored for each individual check carried out by the tool, and maintenance is automatic, and on a regular basis.
Pandora FMS is different in this feature, as it stores all data for a period of up to a year, thanks to a double database system: one in real time, and the other historic. The real-time database stores all information for 45 days by default and afterward transfers it to the historical database, where it is stored at the same level of detail. This is done by compressing the numerical data, thereby getting the most out of the storage system without suffering any negative consequences, in terms of degradation, or affecting the database’s performance.
Pandora FMS enables you to get detailed reports, and for longer, without affecting performance. Maintenance, as with Solarwinds, is performed automatically and on a regular basis.
Dashboard and custom screens
Solarwinds enables us to view large amounts of information due to its automatically generated dashboards, viewable upon installation of the applications, and completion of the wizards.
Pandora FMS ‘s requirements are considerably less demanding, but a more ample deployment is necessary at the beginning in terms of manually constructing the dashboards. Plus, Pandora FMS runs fewer default checks than Solarwinds. However, its potential is immeasurable, and thanks to its flexibility, allows the user to achieve similar, or even superior, results when compared to Solarwinds.
Both tools feature mapping utilities allowing the user to create custom maps, which can be used in dashboards to present information quickly and intuitively on a large monitor or screen, either for a team of operators or an operations manager in order to, for example, see the result of nightly backups or regional sales.
Given that Solarwind’s agents are oriented exclusively toward collecting IT data (networks, servers, applications) it’s complicated to make control panels which also include complex business metrics, such as calculations derived from a database, real-time calculations, etc. Using Pandora FMS it is possible to display this kind of real-time information, giving the edge in terms of flexibility.
Pandora FMS:
Solarwinds:
Alerts system
Both solutions also come with their own alerts systems that enable configurable automated actions to occur, such as email delivery or the execution of personal scripts. Both alerts systems feature advanced configuration options, affording them both a high degree of flexibility. The alerts are generally based on the state of modules, which are defined by thresholds.
In this sense, Solarwinds does go the extra yard, featuring an intelligent learning system that automatically modifies thresholds, basing the modifications on recent data (from the previous few days). However, this feature is also integrated in the Pandora FMS roadmap for its next major release at the beginning of this year, 2017.
events console
Both Solarwinds and Pandora FMS feature detailed events consoles that supply useful information about the platform immediately, using “activity register” mode. This permits the execution of filters and searches to locate problems or changes, extremely practical when it comes to precisely identifying the problem.
However, Pandora FMS includes an advanced feature that enables event-based alerts, allowing the user to configure automated responses to specific situations, such as updates, the introduction of new agents, received SNMP traps, and so on, adding yet another layer of flexibility to your tool.
Pandora FMS:
Network maps and topology detection
Pandora FMS and Solarwinds both automatically generate their own network maps, based on self-discovery and manually created group distributions. The design of both is similar, although Solarwinds has an especially useful characteristic: exporting maps to Microsoft Visio. It needs the Network Topology Mapper product in order to use this function, whereas Pandora FMS comes with full maps in its Enterprise version.
Both products are capable of detecting network topologies via the switches’ SNMP and map the interfaces of each device, allowing manual editing of the maps generated.
Pandora FMS:
Solarwinds:
Managing large environments
One of Pandora FMS’s most notable characteristics (much missed in Solarwinds) is large-scale management of the monitoring environment. Threshold editing, deployment of new checks, creation of new checks and new alerts, plugin execution, and so on, all performed on hundreds, or even thousands, of devices simultaneously and from a centralized point, Pandora FMS’s policies consist of complete monitoring screens that include all these elements and can be deployed on as many devices as you want, centralizing the deployment and allowing custom monitoring and the ability to change any element simply by editing the policy, whose changes are inherited immediately by all the devices included in that policy.
The most pertinent feature to note is Pandora FMS’s capacity to perform the above either via agents or remote checks, enabling total control over the monitored park.
Furthermore, among Pandora FMS’s numerous features, a software deployment system can be found, the archive collection, which allows any kind of file to be transferred from the tool to the agents, facilitating the deployment of plugins or additional personal scripts. The archive collection can be found integrated with the policies, meaning it can be massively managed. Solarwinds has a separately available product dedicated to software deployment, Secure Managed File Transfer Server.
Solarwinds does not have a solution targeted specifically at massively managing a monitored environment, making it difficult to maintain the tool, or to include new elements within our monitored area. Although Solarwinds can achieve this by means of groups, Pandora FMS has the lead in this area.
Scalability and large environments
Both Solarwinds and Pandora FMS are upward scalable to accommodate large or distributed environments. Basing their scalability on adding extra process servers, both manufacturers claim to be able to manage thousands of devices with no degradation of the service.
Solarwinds allows the addition of as many polling engines as necessary, which contact the main server, and this in turn contacts the relevant database. In the case of Pandora FMS, there are various options, from adding servers that redirect the data to the principal server, or installing processing servers (in the latter case the servers require an individual connection to the database). It’s also possible to install Pandora FMS on parallel servers and allow an external load balancer to handle the load distribution. As you can see, both Solarwinds and Pandora FMS feature diverse high availability and failover options, and not either one of them seems to have found its limit in terms of the number of devices that can be managed.
Both alternatives come with a high-level management dashboard for just those cases in which an architecture is geographically distributed, or distributed among different clients. These consoles allow the user to access all the information from different instances, with their respective databases, and provide quick access to the status of a high number of machines. Pandora FMS’s Metaconsole is free for environments of over 2000 devices; Solarwinds’s Enterprise Operations Console comes at an extra charge.
Pandora FMS:
Solarwinds:
Web reports and SLA
Again, both tools include a reports section integrated in the web console. They work in similar ways, allowing the user to choose among a series of items and default reports, showing the results in HTML in the browser itself or in PDF. Solarwinds’s variety of prefabricated reports gives it an advantage in this area, but Pandora FMS can create reports based on custom SQL queries.
Solarwinds also comes with a free product dedicated specifically to creating SLA IP reports. However, on-demand SLA reports must be created manually via SQL queries.
The following example shows an SLA report on work hours:
In terms of SLA reports, Pandora FMS has the edge over Solarwinds, whether it’s in the case of predefined monthly reports or custom reports for measuring SLA for any element, which can also be displayed as graphs or charts and extra information relevant to the specific SLA, and all via a complete wizard which allows you to modify any parameters still farther. Furthermore, thanks to Pandora FMS’s data storage model, which stores detailed data for long periods, it’s possible to get SLA reports (or any others) long after the data was collected.
The next example shows an SLA report including maintenance periods:
Inventory
Pandora FMS y Solarwinds both have an integrated inventory management system which allows you to see what hardware and software you have installed, and which can generate reports, alert on any changes in the infrastructure and perform searches to achieve real time control over your IT assets such as, for example, finding out which of your machines have an anti-virus installed. This characteristic is especially useful, facilitating enormously the work of system administrators, liberating them from the tedious task of updating spreadsheets.
Service monitoring
Is your online store working correctly? Is there any problem with deliveries? Can users access my web support? All these questions have their answers in technical components: servers, databases, and so on.
In order to cover these requirements at the highest level Pandora FMS counts on a series of features known collectively as service monitoring, through which it’s possible to define a series of critical elements, forming a tree graph like the one below, displaying the critical points of a company and where it’s possible to see how technical issues can impact on the business itself. The graph also includes the SLA status of any critical service.
In the above screenshot, the graph displays just how a failed component is affecting an intermediate service (a monitoring satellite), and producing a dip in service quality for the end-user or client.
In the following screenshot, the effect of a failed component on a larger network can be seen. You can see how the software allows a user to know whether the problem is critical, or represents a drop in service, and exactly where the problem is occurring within the infrastructure.
Solarwinds does not have a product or application that meets this demand, giving Pandora FMS another significant advantage.
Final conclusions
After an in-depth analysis of these two monitoring products it’s time to go over one more time the key points of each tool, and their respective pros and cons. Both solutions feature characteristics aimed at Enterprise environments, and supply solutions that any medium to large company needs to have covered.
Pandora FMS
PROS
Compatibility
Price
Requirements
Flexibility: the possibility to incorporate any plugin to the tool, along with the possibility to customize both the monitoring and the control panels
Software agents
Business-side monitoring/services monitoring
SLA reports
Managing huge environments: policies
CONTRAS
Limited default content
More extensive initial deployment
Steep learning curve, due to its power
Solarwinds
PROS
Easy to install
Large number of default control panels
Large number of plugins and default information
Gentler learning curve: use of wizards
CONTRAS
Price
Requirements
Difficult to maintain: many products and machines
Not much flexibility to change default content
Compatibility: only with Windows
Pandora FMS focuses its efforts on being a technically powerful product that also enables customization and flexibility, being a light piece of software that doesn’t require a large team of admins to use or maintain it. It offers a suite of tools that make managing your network simpler, and almost all its functions are incorporated in the one product.
Solarwinds offers a lot of information, control panels and content quickly and easily right from the get-go, and to a high quality. Due to its range of separately licensed products Solarwinds can achieve better results in some specific monitoring tasks such as log analysis and correlation, or exporting Microsoft Visio to its network maps.
Podman is a container engine developed by RedHat, and yes, if you thought about Docker when reading container engine, you are on the right track.
Podman wants to be the alternative to the well-known container Docker engine, but you may wonder:
What does RedHat offer through Podman?
Why should I switch to Podman?
Is Podman the replacement for Docker or just another competitor?
it is still early to answer all these questions, but in this article you will discover what Podman’s wildcards against Docker are.
Podman’s user-friendliness
While researching for this article, I stumbled upon a presentation by RedHat engineer Dan Walsh, which started by saying how to replace Docker by Podman and outlined how to perform this migration through some steps.
The first is to run:
dnf install -y podman
Then execute:
alias docker=podman
And he ended his presentation by saying: “Any questions?”
Obviously it was a joke, but the idea was to show that switching to Podman is very simple, since RedHat engineers have paid special attention to using the same nomenclature when executing Podman commands.
So if you are a Docker user, you already know most of the commands in Podman.
So indeed it is as simple as, instead of running docker run, running podman run, and the result will be exactly the same.
Dan also refers to a Twitter thread to represent how easy the process is, where another RedHat engineer used his “migration method” using the two commands described above and, after a couple of months, had completely forgotten about it, since he continued using the same commands that had been using in Docker for years.
#nobigfatdaemons
It is a reference to the Docker service (daemon).
As you may know, Docker is a wonderful tool, with endless advantages and options.
It is capable of handling everything related to your containers: network, storage, execution, motorization, etc., and all this is managed by the same Docker service, which can bring some disadvantages, since the more containers you use, the bigger and more complex the docker service becomes.
This is why RedHat has decided to develop its tool without relying on a service, and this is the main difference between Docker and Podman.
Podman does not need a great service (daemon) to work.
They have decentralized all the components necessary for container management and have individualized them into smaller components that will be used only when necessary. This decentralization offers a large number of advantages that we will see later.
You know what else is easy and free?
Controlling your very own systems without the need for expensive software full of patches to work is at your disposal:
Podman: Pods or Containers?
Podman has a very descriptive name, and yes, when we talk about Pods we are referring to those same units that we use when dealing with Kubernetes.
Podman is capable of running containers in exactly the same way Docker does, but it is also capable of running Pods.
For those who are not familiar with Kubernetes, we will soon release an article talking about it in more depth, but for now let’s just make clear that a Pod is the minimum measurement unit in Kubernetes. The main difference is that a Pod may contain more than one container. It specially uses a main container together with one or more “sidecar containers” running in the same Pod as the main container, to “help” with the main task it was designed for.
If it sounds like black magic, for now keep in mind that a Pod is a unit where there may be one or more containers. We will delve into these concepts.
Imagine that each of the seals in the Podman logo is a container, so what you have is a pod.
Image management with Podman
Podman uses a tool based on scopio for OCI-type image inspection and management.
With Podman, you can scan OCI images without downloading them, and even better,you can take elements from one repository and move it to another directly without this image going through your device, since you won’t have to download the image in order to see or use its components.
Although Podman is able to build images very similarly to Docker with the Podman build command, the Redhat team also offers us another tool called buildah.
Buildah is an image management tool that is closely tied to the use of Podman. Among its features, it allows us to manipulate an image or a running container to create new images, build the root directory of a container for its handling or create new images in traditional or OCI format. If you want to know a little more about Buildah, here you have the link to its official repository.
Podman is rootless (Podman security)
Thanks to Podman’s modular architecture, it is not necessary to run containers as root. This is a great advantage, since you can run your containers with different users who have different privileges and without the risk of someone having access to the container service and running containers as root user, and wreaking havoc on your servers.
What Podman does when running as a non-root user is creating a directory in the user’s home directory and storing there all the information for the images and containers this user has. So, for example, if you do a podman image with your non-root user, it will show only the images that this user has created or downloaded.
Another advantage of Podman is that it is capable of using UID separation using namespaces, which provides an extra isolation layer when running your containers.
In terms of security, Docker service leaking is even more dangerous than obtaining root (sudo) privileges.
When you get admin permissions (sudo) and do something on the system, it is always registered in the system audit log, there is always a trace to follow. But if you access the Docker service and do it from a container with privileges and get rid of this container, it is virtually impossible to know what you have done. It is not saved in any log nor is there any record of your actions. Which presents Podman as a safer tool.
Integration with Systemd
Podman allows us to run containers that have Systemd enabled by default, without any modification.
It supports socket activation, so we can use systemd to configure a socket and have access to a remote API through which to communicate with Podman. A series of Python libraries have been developed in order to implement integrations and communicate with the Podman remote API.
In fact, there is already an application called Pypodman developed in Python, which is capable of running everything Podman runs locally, but remotely, communicating with the remote API, which opens up a world of possibilities.
Conclusions
Docker has advantages against Podman: firstly, the distribution and widespread acceptance it has, or tools such as Docker swarm, docker-compose, etc. Right now, if you want to orchestrate containers in Podman, your alternative is to use Kubernetes or, the one I prefer: RedHat, to use Openshift using cri-or, which is the runtime that Podman uses.
There is no clear conclusion on whether Podman is a replacement for Docker or whether it will succeed in dethroning the container king.
What we do know is that RedHat is taking their chances on the world of containers, from the acquisition of CoreOS for its use on the Openshift platform, to the development of Podman, which is currently the default container engine in RedHat 8 and CentOS 8.
Now, what do you think? Is Podman Docker’s replacement? Are the advantages it offers us enough? Do you think it will be able to take its throne?
If you are interested in the world of containers or technology overall, you will be surely interested in what we have in store just for you:
Network Types: Are you sure you know them all, every single one?
If you thought the fishmonger’s hair net was the only kind of net you’re wrong. From Pandora FMS we will show you some more, so that you do not get lost without them.
The term “network” is used in computing to name a set of computers connected to each other in such a way that they can share resources, services, and information. There are several ways to classify these networks, based on their scope, relationship, or connection method. Let’s take a look here at some network types.
Network Types: LAN
A local area network (LAN) is a network that interconnects computers within a limited area. There we can put any residence, a school, a laboratory, the college campus or a building full of offices.
Both computers and other mobile devices use a local area network connection to share resources. We can think about interconnecting from our device with a printer or network storage, for example.
Ethernet and Wi-Fi are the two most common technologies in use for local area networks. Other LAN technologies include Token Ring, Fiber Distributed Data Interface, and ARCNET, but those have been losing users as Ethernet and Wi-Fi speeds have increased.
Types of networks: MAN
A metropolitan area network (MAN) is a computer network that interconnects, over a high-speed connection, users with computing resources from a geographic area or region larger than that covered by a local area network (LAN), but less than that covered by an extended area network (WAN), which we’ll see later.
Such networks can be public or private. They are developed with two unidirectional buses; they act independently from each other when transferring data. In equal sizes, fiber optics will give less error rate when transmitting information than if copper cable is used. Both options, however, are safe. They do not give rise to the alteration of their signal, unless the link is physically interrupted.
Network Types: WAN
A wide area network (WAN) is any telecommunications network or computing network that extends over a large distance or geographic location. Such networks are often established with leased telecommunications circuits. Large companies or institutional entities use WAN to transmit data to their staff, their customers, their suppliers, or their users, even though they are in different locations around the world. As you can imagine, this mode of telecommunication allows a company to carry out its daily function effectively, regardless of its location. Yes, and the Internet, the Internet itself, can be considered a WAN.
Network Types: WLAN
A wireless LAN is a wireless computing network that connects two or more devices via wireless communication to form a local area network (LAN) within a limited area. (Let’s remember what we talk about when we talk about a “limited area”: any residence, a school, a laboratory, the college campus or a building full of offices…)
This new option gives users the ability to move within the area while being connected to the network. WLAN can also provide a wider connection through a gateway.
WLAN has become quite popular, especially in private homes, due to the ease with which it is installed and its use. It is also the most popular in those businesses where they offer wireless access to their employees, their customers, and to those who stop by for a while.
Network Types: VLAN
VLAN (Virtual LAN) gives us the opportunity to create networks that are logically independent, even if they are covered by the same physical network.
Thus, any user can have multiple VLANs within the same router or switch. Each of these networks brings together the computers of a specific network segment. These created partitions are a manifest advantage when we want to manage a network.
Currently VLANs are configured through software and bring us many benefits in terms of security and effective computer management. You should think that devices related to one VLAN do not have access to those in others and the same thing in the opposite way. It’s quite useful if you think about segmenting your computers and limiting access between them for security reasons.
Its management is simpler, for the simple reason that we will have the devices divided by “groups“, even belonging to the same network.
Here’s an example of its benefits in your household. With the VLAN, at home, you can separate devices that do access the Internet from those that do not. This can prevent any intruder from reaching them over the Internet and infecting them with some malware.
Now that you’ve seen in the ins and outs of networks and innovations, would you like to take a walk on this path? Go even further in the world of technology? Would you spend a few minutes to know what it is to monitor computer systems and also why is it very important?
Monitoring systems monitor technology (hardware, networks and communications, operating systems, or applications, for example) to analyze its operation and performance, and to detect and alert about potential errors. And this leads us to Pandora FMS, which is the great tool thanks to which this blog is possible.
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes. Do you want to know what Pandora FMS can offer you? Find out by going here.
Or if you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Get it here.
And remember that if you have a small number of devices to monitor you can use the OpenSource version of Pandora FMS. Find out more here.
Don’t hesitate to submit your inquiries. The Pandora FMS team will be happy to serve you!
The work of an admin or network administrator may seem ordinary, that type of work that just follows a guide, but right now, you could not be further from truth. Here I bring you network scanning, a task that could take a lot of your time… or little, if you have Pandora FMS by your side and with the help of one of those free software applications included in GNU / Linux. Let’s take a look!
The range of network devices has changed. Now there is more that desktop computers or servers, like virtual servers, voice over Internet (“VoIP”), hubs and routers with full and embedded operating systems (OS) and not forgetting wireless Access Points for mobile phones, and even wristwatches with their own OS! Yes, the latter is a trend: our beloved local area networks have become a kind of bring-your-own-device thing. Did a salesman come from company X with gigabytes of information? For courtesy and practical reasons, you allow him to connect to the local network of the company. But that doesn’t just happen with visitors. Every employee feels comfortable bringing their own laptop. Of course, as long as the nature of the company’s business allows it, not all of us work on launching rockets to the Moon or developing military defense systems.
Whether you base your favorite computer on GNU / Linux or on Microsoft Windows, we are not talking about creating the common network map with the applications of both environments. We do not document a network map so that it gets “written in stone” later, because, as the network grows, the administrator must keep on auditing to keep up with the new devices and components that each business entity takes in.
What is network scanning?
Network scanning is the process, either manual or automatic, followed to find new devices and their interfaces. Ideally, it should find as much as it can, make a network map and, upon request, generate certain timely reports. Although it is unusual, you may receive alerts (email, text or SMS, Twitter, etc.), which are more than welcomed. In that regard, Pandora FMS stands out for doing its homework very well. We must differentiate it from a network inventory obviously, in this case the second one comes from the first one.
Here I summarize just three functions:
Network scanning.
Network map creation.
Alerts.
I should also mention that it could optionally be of help in cybersecurity. But that depends on the specific requirements of that department, which will have its user group when Pandora FMS is implemented in your network.
To achieve these functions, hereinafter I leave you links so that later you learn more about the features of Pandora FMS or third-party applications. Remember that Pandora FMS is open source and is flexible in terms of using your own solutions or those provided by the community.
Zenmap
First, I will start with an appetizer: Zenmap is a graphical open source interface that uses nmap (open source too, focused on security auditing) for network scanning on any network. It is an excellent example of an application aimed exclusively at network scanning: it has interactive graphics, network scanning profiles (fast, normal or intensive – it has at least 10 pre-configured profiles) and it allows you to create your own custom profiles.You may save or keep a network scanning history to later on compare and see differences (new devices or those that left your network).
Legend: Network scanning with Zenmap (Linux screenshots at flickr https://www.flickr.com/photos/xmodulo/9477360960 Creative Commons 2.0 license)
Whether for didactic purposes or for your home network, Zenmap presents an excellent opportunity to dive into network scanning concepts. However, to really go big we need to move forward.
Ways to start network scanning
The first network scanning can be started:
Either manually, one by one, or perhaps by importing from another program in a standard format.
By scanning IP addresses, preferably starting with your Gateway and its subnets.
Through wizards that have predefined patterns for operating systems and / or applications (for example, Office 365, Jira, AWS, Azure, Cisco, VMWare vSphare, Docker, etc..).
Although it escapes common sense, there are usually options to exclude specific IP addresses or certain devices: in the first case you may waste time by polling addresses that you are completely sure they are not used, and in the second case Pandora FMS server will not be included in network scanning, just to name two examples.
Once finished with this task, be very careful when configuring or setting automatic and periodical network scans. It can either be set by time or an alert can also be included when new IP addresses are assigned, for example when using PHPipam.
Network scanning methods
The main tools to use, since there are many more, are listed here from simpler ones to more complex ones. Let’s start with the simplest:
ping: essential even for non-expert users, in this blog we have published a post about it. It almost works at “machine language level”.
ICMP (“Internet Control Message Protocol”), which is in fact integrated in Pandora FMS.
fping: one step beyond ping and my favorite to quickly diagnose who is online.
traceroute.
nmap.
Vnstat.
Netstat.
Wake-On-LAN: which allows remote switch-on with a magic package, if they are connected by wired network. Yes, many think this line should not be included, but I consider it must be executed before for devices to be online before collecting network information. Precisely, switching them off or configuring them for saving energy will be discussed at the end of this article.
In the category of more advanced tools for network scanning I think:
The address resolution protocol (ARP), is often used together with Pandora FMS to scan and monitor hardware addresses with IP addresses.
Specifically designed for Network scanning is the Link Layer Discovery Protocol (LLDP), in which devices provide us with information about themselves and the network in a standardized way (we will soon see that it works as the basis for another more important protocol).
Other proprietary source code protocols are NetFlow, Sflow, J-Flow and NetBIOS.
I talk specifically about SNMP (v1, v2 and v3), since it collects information from the LLDP to create the MIB. SNMP (Simple Network Management Protocol) is an application layer protocol that enables the exchange of management information between network devices by “pollings” or “traps”. Essentially, SNMP normalizes communication across the entire peer-to-peer network. Version 3 supports encryption and credential authentication, which takes us to the next level.
Pandora FMS, in its Enterprise version, is specialized in most proprietary OIDs (manufacturers’ MIB library), excellent for large networks that cover a large number of devices.
Custom scripts
To take advantage of SNMP v3 you must have a registry, a credential database to connect. At first glance, it goes against the intent and purpose of Network Scanning (to face the “unknown”), but no network administrator -like programmers- can let the opportunity of reusing information to get work done go to waste.
Thus, these “scripts” or credentials can be included with the following:
Telnet, which I consider appropriate for email servers.
WMI, in environments with Microsoft Windows (combine with “Active Directory”).
SSH, for GNU / Linux environments.
The last one is vital, it allows the use of software agents installed by means of Puppet, Vagrant, etc., and which may receive additional instructions for future network scans. Here we could perfectly use separate scripts that handle electricity savings like “wake-on-lan” devices, just saying. Remember that Pandora FMS uses Software Agents, but also through its different servers it directly monitors:
First, Pandora FMS Network Server must be enabled, which is available in both the Community and Enterprise versions.
Recon Server: specially created for discovery monitoring and which can be used in network scanning.
ICMP Enterprise and SNMP Enterprise servers, with discoveries in addition to the Community version.
WMI Enterprise server for:
◦ Active Directory®.
◦ BIOS.
◦ System information.
◦ Windows® information.
◦ Printers.
◦ IIS®.
◦ LDAP.
◦ Microsoft Exchange®.
Legend: Network scanning with Pandora FMS Recon Server (Creative Commons 3.0 license)
Information collected
At the end we will have a good stock of elements for network inventory:
Databases (explored by well-known ports).
Firewalls.
Network traffic (values in mbps).
Outputs to the Internet (ADSL, optical fiber).
Cisco NetFlow (hardware).
Physical (hypervisors) and virtual servers.
“Active Directory”, in the case of using Microsoft Windows®.
L2 / L3 network infrastructure.
Route tables.
Software Defined Networks or SDN.
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out more clicking here.
Or if you have to monitor more than 100 devices you can also enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to assist you!
Web applications? Blogs? What you need is web monitoring tools!
In English, the word “present” has two different meanings: the first one is “now”, as in now that you are reading this article, and also the meaning of gift. There is no misunderstanding here, but there is also the adjective “free”, which can mean free, something that does not need to be paid, or having freedom. Today we will see several free applications that you may use as web monitoring tools.
Web server monitoring
What do we look for in web monitoring tools? What is a web server?
Its definition entails a computer or device capable of offering information or data through a HTTP protocol (or safely by HTTPS). Its monitoring involves two large areas: internal monitoring and external monitoring.
The internal part consists of three key points:
General state of your web server: load, disk space and component temperature (if not virtual). Summing up, the basic values of any server.
Web traffic: open and listening connections, addresses, etc.
Information contained in logs: it is very important to configure, given the fact that there are several domains on the same web server, each of them with its very own file.
For external monitoring:
Simple tests: whether it has connection, the response time, certificate expiration (if it uses HTTPS), etc.
Transactional web monitoring: It monitors processes that meet certain requirements. The simplest example is knowing whether a user can log in to your web server (let’s say you have a simple blog with WordPress installed).
Pandora FMS
If you are a new to our blog, here you have a surprise: The open source version of Pandora FMS is capable of working with the 3 cornerstones of internal monitoring (through software agents) and the first key point of external monitoring!
Can’t you believe it? I will explain:
Everything described so far can be read in more detail on this link.
You probably use a web server with Apache: for that specific case, we have an excellent article written by the creator and founder of Pandora FMS.
Network monitoring (local or wide area) is indirectly involved with web monitoring.
After using Pandora FMS and / or some of the web monitoring tools here indicated, you can optimize your web, since web application performance has become a key element for the correct operation of organizations.
And not only that, in addition to the aforementioned monitoring, Pandora FMS Enterprise version has a powerful WEB user experience server that allows to record your transactions and break them down into different stages for their monitoring, notifying as a result whether the transaction was successful, the total time it took and the individual time of each stage.
Moreover, it there is any problem with the transaction, it will take a screenshot when it can no longer go on, which you will be able to easily see from Pandora FMS web console.
The web user experience server (WUX) not only replicates the recorded transaction in time slots, it also collects stats about the server that hosts the website, such as the website loading total time, time to resolve the server IP address (DNS), time used to set the SSL safe connection and time used to transfer each web resource, such as images, HTML code, style sheets and javascript.
All this is represented in a specific agent section where you can see it graphically.
Web monitoring tools
Going back to the topic of free applications: the web monitoring tools included here also have more permissive licenses, such as that of MIT or the Apache license itself, or more restrictive ones as the open source. Since it is a very broad topic, Wikipedia collects a lot of them, if not all.
Another type of web monitoring tool that must be highlighted is the one offered as physical service from different parts of the world. Although some are free programs, there are obviously some expenses involved in maintaining virtual or real machines all over the planet, so that it regularly reaches our website from such distant places and then inform us about it.
Once this has been made clear, let’s see now web monitoring tools.
On our own
Yes, we ourselves as programmers can take advantage of “real user monitoring”, placing specific instructions before and after our code performs read and / or write operations on our web server and keeping an additional log. Later we will see its counterpart: User Experience (UX).
I must also mention that there is a tool In CodeProject with a free custom license that tells how to work almost in an artisanal way (I do not recommend this method, I include it only for didactic purposes).
Linux Dash
I consider it the lightest, but don’t be fooled by appearances. It was created in a minimalist but versatile way: you can use Go, Python or Node.js languages, since some of these working environments will already be securely installed in your system. That way you will not add load just by installing a web monitoring tool.
Its repository is hosted on GitHub under MIT license and there is an online demo, whose screenshot you have below.
Legend: Linux Dash basic info
I think it has pretty good basics: general status, basic information (shown above) and network, account and application performance (both common and databases, etc.). They also contain modules on a board, which have a search field. Look at this search with the letter “p” in common applications:
Legend: Linux Dash common applications
You will obtain information in real time, but it does not save historical information or alerts, it only has the very basics. Anyway, if you consider yourself as one of the soldiers of Leonidas in the historical film «The 300 Spartans» (the one from 1962), you will surely feel comfortable with this web monitoring tool.
eZ Server Monitor
It has a totally free license, GNU GPL3, written for GNU/Linux and the possibility of incorporating visual themes, because, as you will see, it shows everything at once on a single board (seeing the same thing every day bores human beings):
Legend: eZ Server Monitor (GitHub)
You can find out the status of the services according to the status of each port (do not forget to add the 41121 of the Pandora FMS Tentacle protocol, if you have a software agent there), it tests connectivity with ping, memory or the last connected users, among other values. It is also very light. You can see how to enable a module in a simple Raspberry Pi 3 with the identifier AW7KMmxJqnM on Youtube.
It also has a BASH version to use it in a command terminal, if you are still biased towards Sparta.
phpSysInfo
Continuing with really light web monitoring tools, phpSysInfo stands out in two aspects: it is portable and it also works in a Microsoft Windows® environment. It shares similar features as the previous ones: from here, network interface management and their traffic is what interests us. It is translated into several languages. Here you see it in simplified Chinese:
Legend: phpSysInfo (sourceforge.net)
statusok
Ok, let’s raise the bets! How about something automated to notify you by mail (or even Slack) if your website has issues? With Apache 2.0 license, you have statusok, which is also light and fast to set up. You can use your normal mail (but Gmail is recommended) or you can create your own add-ons (avizoro for Twitter).
But before you go rush off to install it, hold on: you need a database called InfluxDB and Grafana (both have free licenses) to work. It’s worth highlighting that the “difficulty” here is to install and configure the underlying tools. Here is a screenshot on how the three look when working:
Legend: statusok using InfluxDB and Grafana (GitHub)
Selenium
For the second point of external web monitoring, I present you Selenium, with a free Apache license. It has been developed for years and it is written in Java language. Do you remember that I mentioned user experience (UX)? Well, with Selenium you can create scripts and actions (keystrokes, mouse movement) to simulate that a user interacts with your website, and enters and performs transactions. I consider them to be the most complex web monitoring tools because Selenium has many components and add-ons.
As components, there is an API for several languages such as Python, Ruby, JavaScript, C # and of course Java as well. As complements you can use InternetExplorerDriver and compile with Visual Studio 2008® and thus use it in environments with Microsoft Windows®.
But Selenium is complex. Very complex. I will explain it quickly:
First you must have a development environment called Selenium IDE.
Then install Selenium Remote Control (or simply Selenium RC) to receive requests from your instructions to perform your virtual user transactions.
Once you have read the above, I inform you that this tool is not used anymore… Why do I recommend it then? Because it is part of the classic monitoring, which I will talk about later.
Selenium WebDriver has become the Selenium RC replacement. To give you an idea, it allows the use of web browsers without a graphical interface, that is, only by using text commands. There is also the so-called HtmlUnit, a free program written in Java too. Also, browsers like Google Chrome and Mozilla Firefox have long supported this mode, specially designed for automated testing. It is even part of the standard recommendations of the WWW Consortium (W3C).
Selenium Grid: how about placing a software agent that tests your website on different continents, separated by thousands of kilometers as I depicted above? Well, with Selenium Grid we organize nodes, each with individual WebDrivers and for different browsers. I consider this the best web monitoring, because it combines in real time and distance, but with mock users in different scenarios. How about for 7 thousand users? Two thousand five hundred logging in from Africa, some requesting services, some not, always at the same time? The possibilities are endless.
Other web monitoring tools
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
If you have to monitor more than 100 devices you can enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. here.
Do not hesitate to send us your questions. The Pandora FMS team will be happy to assist you!
* Article written by Jimmy Olano with the collaboration of Rafael Ameijeiras.
Toshiba’s success story thanks to Pandora FMS software
Pandora FMS and Toshiba met each other on a cold winter morning, they exchanged looks and… This would be a great start to a love story, wouldn’t it? However, the relationship between Pandora FMS and Toshiba has a different nature: teamwork.
By now you know Pandora FMS, don’t you? That flexible and complete monitoring software, with which you can monitor all your devices, from networks, servers, UX, IoT, applications or business processes, to virtual environments, etc. In addition, it has a lime green/hope-green color that makes it as successful as its more than 300 available plugins.
Do you know Toshiba?
Toshiba is a Japanese company engaged in manufacturing electronics. They offer complete hardware and software solutions to both retail and hospitality customers. They also operate in Spain.
Then how was the relationship between these two companies, Pandora FMS and Toshiba formed? It all comes from the idea of meeting a need that arose to one of the companies that Toshiba runs: monitoring some hospitality facilities.
Toshiba needed to have the sales kiosks of the catering facilities of one of its main customers controlled, since they’re remote machines and thereby are not in continuous contact with their staff. So they needed a flexible tool that would allow them to significantly increase the SLA. And then there was Pandora FMS.
“With Pandora FMS, we have managed to reach 99.5% of the SLA thanks to its early warnings. In addition, with its after-sales service we have developed the tool to a degree that we didn’t believe to be possible” confirms Antonio Flores, Toshiba’s Retail Support Manager.
Some stats
It seems easy, but here we are dealing with 270 restaurants, more than 750elements monitored by Pandora FMS with over 16,800 modules and 10custom-made plugins. A Promethean task.
Toshiba provides a complete IT solution to our main customers in the hospitality sector in their restaurants: boxes, points of sale, content screens and self-service screens -kiosks. And not only that, they offer them a solution that goes beyond hardware, with associated maintenance and support services. Therefore, a monitoring tool is essential to know the status of all restaurants at all times.
Their main need was to have the kiosks controlled, since the remote machines are not in continuous contact with the staff of the facilities, which means that, if a machine crashes, booom!, it cannot be fixed immediately.
“We previously tested and discarded other monitoring tools, such as the ones from IBM, Spiceworks, or Zabbix for being difficult to set up and without features to trace processes or collect logs. We finally chose Pandora FMS, a solution with which we have certainly succeeded“, says Antonio Flores.
Evolving together
To this day, the Pandora FMS software used by Toshiba has nothing to do with the implementation they used in early 2017. Thanks to the flexibility and great scalability this solution offers, they have managed to develop the same software based on their needs that, as in most technology companies, are constantly changing.
This is partly thanks to the after-sales service offered by Pandora FMS, a vital support when it comes to continue to evolve day by day in the desired monitoring style. Pandora FMS doesn’t support the idea of “buy a license and figure it all out,” we are involved and engaged until the end.
As far as we know, the initial software deployment and coupling was quite simple and fast. The only difficulty laid in getting to monitor the checkups of kiosk updates, since we had to take into account databases, logs and a large number of associated monitors. But it was finally possible to carry it out with the joint work between the two teams.
Let’s get to the results!
Apart from greater resource efficiency, Toshiba has managed to improve the relationship with its main customer in the hospitality sector. Especially thanks to the improvement in the quality of its services, a direct consequence of an early incidence detection that Pandora FMS software immediately reports.
In fact, all the departments of their client agree that the availability and quality of services in the restaurants has improved thanks to the tool.
“Currently, and given the success of the tool, we are looking to introduce Pandora FMS in more premises and aim to take a leap outside of Spain so that Toshiba globally provides the best possible service“, concludes Antonio Flores.
If you want to know more you can read the complete success story, here.
A rack is a structure, usually made out of metal and cabinet or wall-shaped, which allows to store and organize the different components of computer installations, such as servers, storage systems, switches, etc.
Is that it? Are you disappointed? Well, hold on, although they don’t seem like much, the world of racks can actually be quite tricky. Not only are they very necessary if you want to store a computer installation, but they usually fulfill relevant technical functions when it comes to helping the components they house work properly.
What are racks for? They store your installation, so, indeed, a rack is not just any closet. Before acquiring one, take into account certain things, or you might regret it. So, how about seeing some of the most important ones?
Some things to consider before buying a rack
-Where will it be located?
Now that you know the answer to “what are racks?”, you may wonder why it is important where to place them. Well, it is not the same to place it in a space specifically enabled for that purpose (a room for IT) or in just any place (an office or a corridor, for example). You should think about different models depending on the place where you will place your beloved rack. For example, if you are going to place it near a work area, perhaps you should look at racks that guarantee low noise level (some computer components can be noisy when they are in use). However, if you have large IT rooms, other factors, such as size, may be more important for you.
-How many components will it house? What type and size?
It is a matter where you have to use your best skills for calculation and foresight.
If you only have a limited number of components and you don’t think you will need more, you may not need a very large rack. However, if you have a pretty good number of components or you foresee you might need a larger installation, maybe you should consider buying a larger rack, in order not to fall short.
In a similar fashion, the expected type of components that you will need to store is equally important, in order to buy a rack with the appropriate measures.
So the issue of measures is one of the most relevant ones. The measures can be key when determining if you are making a meaningful purchase or if the rack will not serve its purpose when you need it. To such an extent rack measurements are important, that there is an EIA standard that sets the “Rack Units” or “U” and that establishes the measures in which the size of each rack is accounted for.
Without going too deep into it, remember that racks usually have two formats:
On the one hand, there are cabinets, which tend to be larger.
On the other hand, there are murals, which are usually smaller and are often placed on the floor or anchored to the walls.
Taking into account all this and the size of the hardware you will use, remember that the components must not only fit in the rack, but there must be enough space to install the necessary wiring without twisting or bending it too much. Also remember that there should be enough space in the structure to allow proper ventilation and cooling, in order to avoid possible “hot spots” that could damage the installation. This is one of the key points to consider when choosing a rack, so do not forget it!
-How much flexibility will you need?
Some types of rack offer more flexibility than others, so this should also be something to keep in mind. Will you need to include new equipment? Some racks allow it more easily, through more custom options to add new shelves or allowing additional cooling required by the added components.
Also, keep in mind that many manufacturers usually offer customization possibilities, so don’t forget to ask about the options they may be able to offer you.
-Make sure the rack complies with current regulations.
It will be very important to ensure that the rack meets the legally established technical standards, both for safety and performance purposes and to ensure that it allows you to install components from the most common manufacturers. Regulations are usually quite comprehensive in this regard, so make sure you are buying a quality product. Remember that some issues, such as correct cooling or stability, will be very important when it comes to ensuring the safety and proper operation of the installation, so do not overlook such important details.
-Pay close attention to safety and additional components.
This should always be pointed out. Of course, the rack must have a structure that keeps it safe from falls or accidents. Also remember that many racks usually have doors with locks, which makes them safer. In addition, factors such as lack of space or poor structure configuration can do a lot of damage to your installation, so make sure the rack allows proper cooling, for example, through installation and active cooling element efficiency, such as fans. Also, remember that there are certain components, such as power distribution units (PDUs), that you may want to use, so do not forget to check that the rack you are buying supports their use.
And that was our brief summary, so you got to find out “what are racks?” and some things you should keep in mind before buying one. You thought it was going to be as simple as choosing a closet to store your clothes, huh? Well, you’ve seen it is not.
Have we left something out? Sure. That’s why we would be very grateful if you could leave a comment telling us what factors you consider the most important when buying a rack. You can do it very easily through the comment box that you will find right at the end of this article.
But of course, before you start typing like crazy, how about spending a few minutes to get to know Pandora FMS?
Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Click here.
Or if you have to monitor more than 100 devices you can also enjoy a 30 days FREE DEMO of Pandora FMS Enterprise. Get it here.
Finally, remember that if your monitoring requirements are more limited, you can use Pandora FMS OpenSource version. Learn more about it here.
Do not hesitate to send us your questions. The team behind Pandora FMS will be happy to assist you!
As you may already know, Docker is an amazing tool for collaborative programming work, allowing us to work in a virtually identical environment, regardless of the operating system we are on.
In a previous article we learned how to create our own Docker images to test and distribute our applications without worrying about their dependencies.
With this command, the Docker container is started using the previously-created image. But, what is exactly executed? What do all these parameters mean? To find out the answer, today we will see how to execute the docker run command and its most used parameters.
We will start from the basics. We can execute the docker run command without any parameters, for example using this command:
docker run hello-world
Which will return an output like this one:
In this case, it will activate a container with the hello-world image. If we do not have it downloaded, it will connect to the DockerHub repository, download and execute it.
As you can see, it simply executes the entrypoint or CMD by default (as the case may be) and at the end of the execution the container will exit, staying stored in our computer.
If you’re interested in Docker, you’ll be interested in knowing the state of your systems, right?
If so, we have something to tell you. A free monitoring program for you to try wherever you need: home, office, office, company… This software monitors everything:
The docker ps command
If you execute the command:
docker ps -a
You may see all the containers you have executed in your system. The -a parameter shows them all, both those that are running and those that are not. Without this parameter, it will only show the running containers by default. If it is run on my system, this will be the output:
Let’s analyze this output to understand the fields it shows. The first thing we can see is that there are 3 containers (3 lines) in this system. The first line refers to our “hello-world” execution. The other two containers were already running within the system, but I left them to compare the returned information.
As you can see, the docker ps command returns information related to our containers. The information showed is the following:
Container id: It is the unique identifier or ID of each container. This id is automatically assigned by Docker.
Image: This column indicates the image used to activate the container. If you take a look at the last line, you may see that the hello-world image has been used in the first docker run.
Command: It is the command to start the container. It is defined in the dockerfile by the CMD statement and it is what is executed by default when starting the container. This command can be modified when executing a container.
Created: It tells you how long ago the container was executed.
Status: It indicates the current state of your container. As you can see, hello-world was executed and died, so it shows the exit state and its error code between brackets, in this case 0. This will be very useful to debug the application in case something fails and the container is closed unexpectedly.
Ports: This section is very important, since it contains information about which ports are exposed from our container. In the case of hello-world, there is no exposed port. As you know, a container is isolated from the system, so to have access to the running application, the corresponding port must be exposed. Not only it is possible to expose the ports, you may also forward them indicating that the X port on your host system is redirected to the Y port inside the container. That way, you may give external access to your network applications. There are other ways to grant these accesses, but they are more advanced. Usually port redirection is used, which you will learn to do in this article.
Name: It is the name assigned to our container. Docker assigns a name to our containers automatically by default, but it is possible to indicate the name you wish in the docker run execution.
Running docker run
Now that we know how to retrieve the status and features of our containers, let’s see what we can do with the docker run command. Let’s review the most useful parameters. For more detailed information on the docker run command, you may take a look at the official Docker documentation: https://docs.docker.com/engine/reference/run/
First let’s see the structure of the docker run command:
docker run [OPTIONS] IMAGE[:TAG|@DIGEST] [COMMAND] [ARG...]
As you can see, the parameters or options are placed before the name of the image you want to use. Then you may type in a command with its own arguments that would overwrite the default image CMD. Let’s see an example by running:
docker run alpine
With this statement, we tell Docker to execute a container with the image called alpine with the default options. Alpine is a very small Linux distribution used in the container world. If there is no tag assigned to the image, it will use “latest” by default.
The result of this command will be similar to:
Where the image:tag will be downloaded in case it is not available, and will execute a container with this image. Since the default command of this image is sh, it is run, it does not give back any output and it is closed, as we can see if we execute a docker ps -a
There are modifiers to keep the container running with the sh command but we will see that later. For example, we will overwrite the default command using ifconfig to get the container internal ip address. So we will execute:
docker run alpine ifconfig
That will return the output of the ifconfig command inside the alpine container:
Now we will execute the same docker run, but transferring a parameter with the name of the interface to the ifconfig command, so that it only returns the information of the eth0 interface, and we will obtain:
As you can see, we can add any parameter to the command that we define to our container.
Let’s take a look at our container list with a docker ps -a
All of our executions are there with the commands we have defined. There is an option to order Docker to delete the container once it is executed.
Docker run parameters
We have already learned to execute a container and overwrite the default command. Now we will see the options or parameters that allow us to modify or add features to our containers.
Deatached (-d)
It is an operator that allows to instruct Docker to run the container in the background, leaving the prompt free while the container is still active. For example, we can execute:
docker run -d hello-world
You will not see the execution of the container, since it will run in the background. It is useful for long services or tasks that we don’t want to keep the prompt busy.
Foreground/interactive (-it)
If you want to keep the container running instead and even interact with it, use the -it parameter. Since we know that the default alpine command is sh (a shell lighter than bash), we can use the -it parameter to interact with it and launch different commands inside the container.
docker run -it alpine
This will allow us to interact with alpine directly from the shell.
Name (–name)
This parameter will allow us to assign a name to our container. As I said before, Docker will assign a random name to your containers, but you can assign it directly from the docker run execution.
Be careful with this option, since the name is exclusive and only one container can have that name. So if we have a container (running or stopped) with a name that we want to use in the docker run command, Docker will not allow it. So we will have to choose another name or remove the old container with the assigned name.
To assign the name “test” to an alpine image container, you may execute:
docker run --name test alpine
Clean up (–rm)
The –rm parameter makes Docker remove the container at the end of the execution. That way, you will not have all container executions stored. To use the –rm parameter in an alpine container that displays the message “hello world” and then auto-deletes itself, use:
docker run --rm alpine echo “hola mundo”
EXPOSE (incoming ports)
You may expose ports of our computer that are redirected to another port in our container.
For example, if you want to run a container with a web server and you want for the container to be accessed from outside, expose a port.
To expose a port, use the format: [ip]:host_port:container_port
The [ip] field is used to filter the sources. If not defined, it means all (0.0.0.0).
To redirect, for example, port 8080 of my computer, from any source, to port 80 of a container that uses the nginx:alpine image, I just have to run:
docker run -d -p 8080:80 nginx:alpine
I have used the -d parameter so that the container is running in the background, since Nginx is a web server that will continue to run until stopped, and if we do not use -d, it will keep the prompt busy.
As seen in the image, the container keeps being in the background in a running state. If I curl my own machine on port 8080, it redirects me to the Nginx server running on the Docker, which has port 80 exposed.
If we do a docker ps, in the PORTS column we can see the redirection of port 8080 to 80 from all sources.
It is possible to use parameter -P (uppercase), which will redirect all exposed ports of a container. We cannot choose on which port we want to redirect, but it can be useful for quick tests.
For example, if we execute the base image that we created in the previous article that exposed several ports, we can see how Docker will redirect them all by assigning random ports.
docker run -P -d rameijeiras/pandorafms-base sleep 100
In this case, the sleep 100 command is used to keep the container alive for 100 seconds. In addition, I have used the -d parameter to keep it in the background and I have used the -P parameter to redirect all ports shown in the image.
ENV environment variables (-e)
With the -e parameter, we can define environment variables for the started container. This is especially useful when the container is configured to use these environment variables and modify their performance. As we saw in the previous article, our Pandora FMS container used the environment variables to define the database to which it would connect and its connection credentials. To define environment variables, we can execute:
docker run -e "APP=PandoraFMS" -e "VER=740" alpine echo "$APP $VER"
As seen, the environment variables that we defined in docker run command execution were assigned within the container.
VOLUME shared filesystems (-v)
The -v parameter is used to manage volumes in Docker. As we know, the data modified within Docker is volatile, but by using -v, we can configure data persistence. This is especially useful for activating a database container or web servers.
With the -v parameter, you can do 2 different things. If you execute it followed by a volume name, you will create a persistent volume that will handle Docker, for example:
docker run --rm -v myvolume:/app alpine sh -c "echo persistent > /app/file"
docker run --rm myvolume:/app alpine cat /app/file
As you can see, we have executed two containers that self-destruct, pointing to myvolume, but although the first container was destroyed when the file was created, the second one is able to access the data, since the app directory is linked to a persistent volume on our host machine.
You can see the volumes created on your machine by executing the command docker volume ls. The issue of volumes in Docker containers will be seen in another entry in this blog.
The second method is the bind method. What it basically does is “transfer” a directory from our host machine to the container. This will allow us to configure and modify files on our local machine and for these to directly affect the container. If for example, we want to show our website, which we have placed in our local directory /tmp/web/index.html, in an Nginx container, we would have to execute the docker run command referencing the source and target directories with this format: -v host_path:container_path:[rw/ro], where you may optionally define the read and write permissions of this directory. In this case, we keep the default one. The command would be:
docker run -d -p 8080:80 -v /tmp/web/:/usr/share/nginx/html nginx:alpine
As you can see, if I bind my container and then edit the files locally, the changes are immediate on my Nginx server.
Docker y Pandora FMS
You already know all of the docker run basic options, so at this point, you are already a Docker ninja. So, test your skills by using everything you have learned to activate a complete Pandora FMS stack.
We will use two containers, one for the application and one for the database. Not only that, we will give the database server persistence so that in case of failure the stored information is not lost.
We will only need 2 docker run commands. And that’s it.
In the first one, we will start a container for the database. We will use a Percona Sql modified image. You can see the dockerfile in my of GitHub repo (by now you will be a whole expert reading dockerfiles).
We wait a couple of seconds and we already have our database running.
Now we run the Pandora FMS container that points to the database container. We can point to both the internal and external IP. Since we have done port redirection for port 3306, we will use the external IP which, in this case, will be my host IP.
And there we have our Pandora FMS Community instance version 740 with only two commands. Impressive.
Let’s check that everything works properly. From the browser, we go to the address http://<host_ip>:8081/pandora_console.
Now we simply log in with the credentials admin:pandora and we will have access to the Pandora FMS web console.
In the following articles, we will learn how to use the docker-compose orchestrator to manage Docker containers in a fast, simple and easy way. So, stay tuned for the coming posts, to learn how to get the most out of your Docker container applications.
Also, if you want to know how to create docker containers to deploy applications you can take a look at this video:
Virtual assistants: what they are and how they help us
Alexa, Siri, Cortana, Aura, Bixby, Irene and Sara. What do all of these names have in common, other than sounding like women? Are they a collection of scientists and artists who were only called by their proper name? Are they a regional women’s petanque team? An angelic and marvellous choir that is on tour? No! These are the names of the most well-known and admired virtual assistants in technology. Alexa from Amazon, Siri from Apple, Cortana from Windows, Aura from Telefónica, Bixby from Samsung.
What is a virtual assistant?
If we go to Wikipedia, it will tell us that a virtual assistant is a kind of software agent that offers us services and helps us to automate and perform tasks, perhaps with a successful synthetic voice.
The services it offers us will be based on the data we will give it about us, by letting it know our location and postulate it so it can gain access to information online, where almost all your power and skill lies.
The technological combo that makes the virtual assistant possible is a combination of the current boom of mobile devices, programming interfaces and the rise of mobile applications.
Like almost everything pragmatic in this world, this type of magic arose for military use, but it is already sneaking into our homes thanks to the power of marketing and the perseverance of companies.
Currently virtual assistants can not only be configured with the user’s voice; we can also interact with them in writing or through images. Which opens up a world of possibilities for us.
Thanks to its recent expansion we can find these virtual assistants in all kinds of objects and surroundings: speakers with a pretentious art deco finish, apps, smartphones, watches, electrical appliances, cars and operating systems everywhere.
What are virtual assistants dedicated to?
But then, what do these elves, who speak to us from junk, do for us? How do they help us in our daily routine? Well, they won’t help you mow the orchard, but apart from that in almost everything. They turn on appliances from distance, order a taxi without having to raise your hand or whistle down the street, they magically make a motorcyclist deliver you Chinese food at home and know your household. And, if you want to, they simply serve to give you all the information you need with a good robofriendly diction. They read the news to you like a butler, tell you the upcoming weather outside like the brightest grandmother meteorologists and estimate the traffic in your area so you don’t get unnecessarily angry in front of the horn.
There are also virtual assistants who DJ or schedule movies and series on your TV or even read you an audiobook to go to sleep. Just ask, politely or not, and the virtual assistant will do its utmost to make you happy.
Virtual assistants like Siri give you the possibility to send messages by WhatsApp, schedule your alarm in the local time in which you need it and create a reminder so that you do not forget the birthday of your partner, the trip to the dentist or that important meeting in which you will be placed at the top of the company. And if you’re lazy they also regulate the brightness of the screen and turn off Wifi so that no one contacts you. The capabilities of a virtual assistant are numerous, but you have to discover them step by step. However, they will help you save effort and treasure your precious time in all aspects of your daily life.
Virtual assistants: data
As we move forward today, these virtual assistants are becoming more and more present in our daily lives. We are increasingly using them more, or so says a recent study by Gartner, an information technology research consultancy based in Stamford, Connecticut, USA. According to his studies, taking his own country as a standard, virtual assistants are already used by 42% of the population in the US. In the UK,by around 32%. More than a third of this workforce uses, more than once a day, this technology.
Of them all, the vast majority, about 54%, uses Siri. But hey, with the new additions to the word of the virtual assistant sooner or later someone will start to opt for others.
According to Gartner, on a global scale, by 2019, 49% of the population was using virtual assistants hassle-free. Perhaps some will go further and establish a love affair with her as happens in the movie Her (Spike Jonze – 2013).
According to a report by Socratic Technologies, a consultancy dedicated to research, people see different qualities in them when it comes to using them. In one of their polls, in the United States, 59% of the respondents used assistants to give greater comfort to their daily lives and 40% say they use it simply to not be staring at the screen all day.
But there are still bright people in this world, people who see the cons hidden in the midst of so much profit. These people dislike the way virtual assistants violate their privacy, and point to it as one of the most hateful points. Many other users say that the virtual assistants make life less personal, colder, barely human.
Monitoring of virtual assistants
Is it possible to monitor virtual assistants? What the hell is virtual assistant monitoring? Excellent questions for a monitoring blog like this. For now, it’s quite likely that it is possible. It all depends on how our virtual assistant is programmed, being particularly important the permissions to access the information it contains. But of course certain aspects could be monitored as long as a monitoring agent can be installed. For non-local monitoring, it could be done without any problem, as it may be to know if our virtual assistant is turned on or not. But it’s still a dimension to be discovered.
Once you’ve got into the ins and outs of monitoring, would you like to take a walk? Go even further in the world of technology? Do you know Pandora FMS? Well, Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
You can even send any questions you have about Pandora FMS. Do it in a very simple way, thanks to the contact form, to be found at the following address.
“C Programming language” (or simply C Language) is the title of the book published in 1978 by Brian W. Kernighan and Dennis M. Ritchie, where they introduced the idea of presenting an example program called “Hello world !” And that is today a common model in almost every tutorial for programming, regardless of the language used.
Perhaps from there comes the idea of C language omnipresence. The book presented many paradigms, or at least several writing styles that we still use today. But C Language also has a dark past that will surprise you.
Legend: “C Programming Language https://commons.wikimedia.org/wiki/File:The_C_Programming_Language_logo.svg”
BASIC language and the ABC of programming
I learned BASIC Language from Thomas E. Kurtz and John G. Kemeny through a book. When computers finally came into our daily lives (long story), what I had at hand was the Microsoft Quick Basic® (not to be confused with Microsoft QBasic®, that one came much later) and I used for a little while Microsoft GW-BASIC®. In 1990, we learned in college about the ANSI C specification, which had come out the previous year, but there, in engineering degrees, we were so into Pascal Language for pragmatic reasons. Shortly thereafter, we moved to Microsoft Visual Basic® to then reach a turning point in proprietary programming: Microsoft Visual Studio 97®, the first office suite with several languages, including Java and C++ (yes, from this last one Rust Language was “born” in 2010, with which the popular Mozilla Firefox® browser is compiled).
Up until that point, C Language had grown enough to evolve, but where does it really come from? Although there was never an “A Language” as such, what did exist was the “Basic Combined Programming Language” or BCPL ( O Intermediate Language included) which later transformed into B Language, but both were not enough for the new hardware (I may be simplifying this too much, and historians may start chasing me with torches and sickles). It turns out that, in 1969, they invented the PDP-7 computer, with which Unix® was born the following year. The next computer was the PDP-11, with which they could execute C Language to rewrite Unix®, and that is how the legend was born in 1972.
Lesson learned
What the programmers realized was that C Language could be implemented in many different hardwares. The task was not, nor it is easy, in fact, it is still a burdensome task. But if you want something very well structured and well founded, C Language is what you’re looking for.
But be careful, C Language is so far, or rather abstracted from hardware, that there may be serious problems later. It makes you come a lot closer to the hardware, so much that it makes you understand more and more about different electronic components. That is the good thing about it and it can be of help in the monitoring field, especially in the industry area.
Hardware, software and C Language
C Language has a problem very similar to what we reported in a previous article about hardware: a serious issue related to access to memory (Random Access Memory or RAM). If you have an assigned memory range, say from 100 to 200, if you perform a cycle up to 201, you will suffer major inconveniences. So, they make programs that delve beyond what they are supposed to on purpose, and C Language allows it. Another problem is variable initialization. It is assigned a place in memory, but the value that was in that sector is not “deleted.” Look at the quotation marks: you must type in the initial value you need in each variable: if it is numerical, zero (usually), but if it is a date, there you may have problems.
This leads to another problem: handling variables that handle different types of data, for example “adding” a date with a text string. The fourth main problem is to release some variable and then re-access it: there is no warning or error warning, if you are lucky enough and the operating system doesn’t use that memory sector where your variable is, you won’t even notice it, but at some point your algorithm will fail.
Although C++ comes from C Language, I should make clear that the first one is object oriented and the second is structured programming oriented. Therefore, it is useful for our purpose of building small scripts for monitoring. Although it would take a whole article to describe both programming models, I can tell you that C++ includes structured programming but uses objects to take advantage of the most advanced hardware we currently have, especially that with multiple cores.
Not everything is lost
Do you remember that we mentioned Pascal language and its use in engineering? Well, this language does not allow operations between different types of variables. In addition, its math oriented syntax makes it useful for that field. However, it also suffers from what has been said about the exceptions of C Language.
Nowadays, there are modern and safe languages such as Rust (inspired on C++) and even Swift Language (inspired on Rust itself with Haskell, Ruby, Python and C#) that get rid of all these “inconveniences” from memory management. But the hundreds of millions of code lines made in C Language (see Linux kernel project, for example) would make it necessary to create another language specifically for migration. Therefore, nowadays, people work on a progressive change basis, which is better: slow but sure.
For these reasons, we include C in our list of the most used languages and whenever you have to monitor at some high point, you may use it confidently, although the work will be hard (they say that with C Language you have to reinvent the wheel, but I say we can even make octagonal wheels if we need them to be that way).
Pandora FMS
We provide lots of flexibility in terms of languages: for example, when creating a remote inventory module, you may either use C++ or even Java. The key is that, regardless of the language used, it returns a value with a specific format. Even our agents are created with C++ and Perl!
If you are interested in knowing better the scope of Pandora FMS, we encourage you to click on this link.
In case of having more than 100 devices to monitor, you may contact our Pandora FMS team through the following form.
Also, remember that if your monitoring needs are more limited, you have at your disposal the OpenSource version of Pandora FMS. Find out more here.
Find out how to create Grafana dashboards with Pandora FMS data
About a year ago, in another Pandora FMS blog, we talked about what Grafana is, we explained what it was and how it was related to other software. Now we go a little further and we want to show you how to create Grafana dashboards with the data provided by Pandora FMS.
It is undeniable that this tool enjoys the support of a large user community, due to the versatility it offers to use different data sources to have displayed on its boards.
And naturally, we wanted to offer our Pandora FMS users the possibility of displaying monitoring data through Grafana dashboards. That is why today we provide you with a simple guide to achieve it.
What do you need to create dashboards in Grafana with Pandora FMS data?
Well, as obvious as it may seem, you need to have at least one Pandora FMS installation already running. This integration will allow to represent data obtained through Pandora FMS modules in Grafana dashboards. For the examples we give here, we will use as a base a standard Pandora FMS installation from the official ISO.
You will also need to have your own Grafana server, of course, since in the end it will be where you configure the boards that will display the data.
And as a communication requirement, you will only have to make sure that the Grafana server has communication through HTTP with your Pandora FMS console enabled (or HTTPS, if you have it configured that way). In this case, all communication will go through HTTP.
Configure integration in 3 steps
As the title of this section said, there are only 3 steps to make this integration work.
1) Adding Pandora FMS extension
First of all, start in your Pandora FMS console the extension that will allow you to obtain the data to be represented in Grafana dashboards.
To that end, just download the ZIP package that you may find in your library and upload it to the Pandora FMS console from the menu: Admin tools > Extension manager > Extension uploader:
It is important not to check the “Upload enterprise extension” option.
In short, these steps basically locate the contents of the ZIP file in the extensions directory of the Pandora FMS console, which will lead to the directory being created:
/var/www/html/pandora_console/extensions/grafana
If, as in this case, the installation is based on a Pandora FMS ISO, it will also be necessary to modify a configuration parameter of the Apache server.
Simply edit the file /etc/httpd/conf/httpd.conf, and set the parameter “AllowOverride none” to “AllowOverride All”, within the directives of the block ‘<directory “/var/www/html”>’ since that is where the Pandora FMS console is located. Therefore, it should be this way:
<Directory "/var/www/html">
#
# Possible values for the Options directive are "None", "All",
# or any combination of:
# Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
#
# Note that "MultiViews" must be named *explicitly* --- "Options All"
# doesn't give it to you.
#
# The Options directive is both complicated and important. Please see
# http://httpd.apache.org/docs/2.4/mod/core.html#options
# for more information.
#
Options Indexes FollowSymLinks
#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
# Options FileInfo AuthConfig Limit
#
AllowOverride All
#
# Controls who can get stuff from this server.
#
Require all granted </Directory>
We will also add a parameter in the PHP configuration. We will have to add the following line at the end of the file /etc/php.ini:
serialize_precision = -1
And for these changes to go into effect, the Apache service must be restarted:
systemctl restart httpd
2) Loading the Pandora FMS plugin for Grafana
Now everything related to Pandora FMS is ready. The only thing left is to include in Grafana the plugin that checks the data with the extension uploaded in the previous step.
Upload the ZIP file to the Grafana server with all the plugin files and place it in the path “/var/lib/grafana/plugins”. Unzip the file on this path with the “unzip” command and restart the Grafana service to load it:
cd /var/lib/grafana/plugins
unzip pandorafms_grafana_datasource.zip
service grafana-server restart
3) Configuring Pandora FMS as data source for Grafana dashboards
Add the following lines to the Grafana final configuration file (/etc/grafana/grafana.ini):
After this change, the Grafana service must be restarted with the following command:
service grafana-server restart
We’re almost done, don’t panic! At this point, what you have to do is configure the plugin uploaded in Grafana so that it connects to the extension loaded in Pandora FMS and allows you to use its data in Grafana dashboards.
Access the “Configuration > Datasources” menu in Grafana and click on the “Add datasource” button:
You will see different plugins that you may configure, and at the bottom of the list, you will see the plugin that you just loaded for Pandora FMS. Click on it:
This will take you to a form where you only need to fill out 3 fields for the connection with the Pandora FMS extension:
URL to the extension, which according to the suggestion we will see will be (by default) “http://x.x.x.x/pandora_console/extensions/grafana”, where “x.x.x.x” is the IP address or DNS name of your Pandora FMS console.
Pandora FMS user, which will allow you to obtain data for Grafana dashboards. This user must have at least agent read permissions (AR) and can only obtain data from those agents on which it has permissions.
Pandora FMS user password.
With these fields completed, you may click on the “Save & Test” button to verify the operation of your new data source:
What happens if it does not work properly? In configuration you might see different errors, such as:
HTTP Error Bad Gateway → If Grafana could not connect to Pandora FMS or if the indicated IP address was incorrect.
HTTP Error Not Found → If the indicated URL was not correct, for example because the Pandora FMS extension was not correctly loaded or simply because of an error when typing in the URL in the form.
Datasource connection error: Unauthorized → If the user and/or password indicated were not correct or if the user did not have basic agent read permissions (AR).
But if you have followed all the steps up to this point, you should not have any problems. And just like that you are ready to create your first dashboard in Grafana with Pandora FMS monitoring data.
Creating your first dashboard in Grafana with Pandora FMS data
Although we are done with the Pandora FMS configuration as a data source, we will briefly see how it would work.
First, go to the “Create > Dashboard” menu, and in the panel that will appear, click on the “Add query” button:
This will take you to a form where to choose your “Pandora FMS” data source in the “Query” drop-down. This will make the bottom of the form change and you will see a query to choose a module from which to display the data on the board:
Label: It will allow you to specify the tag that you wish for the data represented for this query to have.
Group: It is used to filter the agent about which to represent data. A group must be chosen.
Agent: It is used to filter the module about which to represent data. Some agent must be indicated.
Module: It is used to specify the module about which to represent data.
TIP: It is a field that will allow to indicate whether the data to be represented will be compacted or not. If unchecked, the data will be compacted, which will result in easier-to-interpret and faster-loading graphs, although the data sample will not be the actual one but rather an average.
And once done, there you have your Pandora FMS data in Grafana.
You may include more than one query in the same board, which allows you to compare data from different modules:
And you may also add more boards within the same Grafana dashboard, so that you have all the necessary information on the same screen:
We hope you found this guide useful, and do not hesitate to check other interesting articles on our blog. Besides, you can also see this great video about Grafana’s integration with Pandora FMS monitoring.
Before we say goodbye, remember that you can learn much more about Pandora FMS by entering here.
If you have more than 100 devices to monitor, you can contact us through the following form.
Also, remember that if your monitoring needs are more limited, you have the OpenSource version of Pandora FMS available. Learn more about it here.
Do not hesitate to send us your queries. The Pandora FMS team will be happy to assist you!
Official greetings for Christmas and New Year from Pandora FMS 2020
I am lucky to be able to write this article as I watch, above my laptop screen, the lights that decorate the street of our headquarters these weeks. The cold tries to weakly tarnish the office window, but it fails to do so. For the artifice of the bulbs there is no opacity or wall. While drinking the first holy smoking coffee, I feel the Christmas mood and… ahem, cold… Because, you’re right, there is also a bad side to these days: the overcrowded malls, the pile of Christmas cards from who knows, and as I was saying, the destructive colds that get you down with phlegm, chills and make your voice sound like a sore zombie.
However, let’s focus on the positive stuff. Let’s get a little bit corny, but in a more objective than exaggerated way, more toning than syrupy, more sincere than flattering: we love you very much. Yes, to all of our followers, from those who retweet us on social networks because they think we are funny, to those who buy all the options related to our software; from those who ask us what monitoring is to those who help us with ideas to implement the services we offer you. We love you and we love ourselves too, because we are all part of a whole that could both meet at Sundays to have bbq, as well as save the world from a zombie, biblical or alien apocalypse. WE LOVE YOU.
But if the sum of everything learned and acquired along the year was measured in hugs, we could not continue as a company, so we would also like to highlight some of the achievements we unlocked this year. It is not preening, more like rejoicing. Like the kitten who happily hides cocooned under the bushy Christmas tree or the grandfather who surrounds himself with his attentive grandchildren after dinner to bore them out of their minds with old stories.
So there we go: this past year, Pandora FMS has worked as a steamroller. We have released 12 releases with new updates, that is more than 100 improvements for the Pandora FMS tool. It was time for improving the interface, and we did so. We have also made many changes that have helped improve and increase the range of features, such as Discovery and Omnishell, our first step in IT automation. Discovery has been created in order to make monitoring simpler, and next year we hope to increase all the applications that are already available today (AWS, Azure, MySQL, Oracle Database, SAP or VMware, among others).
Not to mention everything related to our international growth. This year we have improved Pandora FMS documentation, we already have the complete translation into English and more than 1200 pages, 1200 pages!, into French. We have also translated our website into Turkish and got great partners in Turkey and Switzerland that are getting started, in addition to the project that will start soon in Mexico. And the truth is that even though it may not seem true, this year we have sold more abroad than at national level. We are already present in 50 countries!
This year has also been quite important regarding media, both in Spain (in media such as El País, El Mundo, ABC, RTVE, Computer World, Parcela Digital, El Correo de Madrid…) and abroad (in media such as El Financiero, Risemedia, Techgenix, Solutions Review, Opensource.com). We are just that popular. Pandora FMS, the Bono of monitoring.
We have also had the opportunity to attend a large number of IDG events and all kinds conventions, where we have been able to step in and feel like kings: CIO Review, Cybersecurity 2019 and SAP Insider… and I get the feel that next year, we will do much more!
When feeling so encouraged, we have also embarked on very ambitious projects, such as getting into nothing less than IT Orchestration. Therefore, and I should absolutely not forget about it, I must make a very special mention to the newly opened Department of Artificial Intelligence, which will help us promote initiatives that combine AI and monitoring.
And not to show off, but 97% of our customers renew with us. How we were not going to love you and love ourselves this year for Christmas?, there’s even more of us in our team!
That is why we wanted to thank you and wish you happy holidays because, although we are not a celebrity wishing merry christmas at their Instagram account, you sure make us feel like one.
The most beloved and photogenic tree in the office.
The tree under which we expect to find all our gifts in Madrid.
From our home offices in Alicante.
Christmas treats: the most precious treasure, together with your love, this Christmas.
Two young men enjoying their surprise.
The first figure of our living Christmas crib has arrived to our offices in Salamanca.