Operations | Monitoring | ITSM | DevOps | Cloud

Pandora FMS

What is a post mortem incident? How can we monitor this?

In particular, I liked very much the article that our colleague Sara Martin wrote in Pandora FMS blog about crisis management in information technology, these are the steps: Legend: “Jack’s Lantern (https://commons.wikimedia.org/wiki/File:Jack-o-lantern.svg) This article starts from point number five: when after a certain time of recovery the crisis has been solved and becomes a post mortem incident. This word comes from the Latin language and it means “after death”.

Hybrid Cloud Monitoring: Defining a Strategy

When we are faced with the challenge of hybrid cloud monitoring, the golden dream of a single monitoring platform is reawakened in us. It would be ideal to have a tool that would allow us to see in a single screenshot what is happening throughout our platform, including those resources that we have decided to establish in the cloud, in other words, it should not discriminate between private and public networks.

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?

CentOS 8: a clone that reinvents itself

It has taken much longer than usual for the CentOS team to provide us with a new version of their operating system; however, the wait is over. The new CentOS 8 is here. CentOS, or Community ENTerprise Operating System, is a binary-level clone of the RHEL (Red Hat Enterprise Linux) distribution that can be accessed for free. For those unfamiliar with Red Hat, Red Hat offers open source, enterprise-oriented software solutions with enterprise-level support.

What is File Transfer Protocol (FTP)?

Our day to day is a constant investigation. When you were little, very small, you discovered the different names of the colors or the taste of the fruits; then, the pain of acne and your favorite rock bands; and later on, I don’t know, more complex things like the Inland Revenue and the File Transfer Protocol.

What is RAID? What types of RAID are out there?

What is raid? Do you want to find out? The term RAID is related mostly to those components of our computers that allow us to store information and get our computer up and running properly.. What would we do without hard drives? Well… In this article we are going to learn what a RAID is and some of the types of RAID that exist. Let’s go!

Let's talk about the BGP protocol and its monitoring

The BGP protocol has become a fundamental part of the operation and performance of the Internet. Therefore, it is obvious that we should undertake the BGP monitoring process when monitoring applications or those services that are offered being Internet the basis of its communication.

What's New in Pandora FMS 7.0 NG 738

In this release 738, mass alerts have been incorporated into policies to make their creation process easier. In addition, different visual consoles have been added in this update, which will appear by default and can be customized according to the user’s needs. Several bugs concerning Metaconsole events and agents have been fixed – we remind you that it is available from 2 000 devices and for the Enterprise version.