Panopta

panopta

Monitoring a VMware vCenter cluster with the Panopta OnSight

We have recently finished updating the so that it can natively integrate with a vCenter cluster, making monitoring a VMware vCenter cluster simple and easy. Now, by providing some basic information to the OnSight, Panopta can discover all the hosts, clusters, datastores, and virtual machines you have running in that environment and immediately begin pulling default metrics for those instances.

panopta

Monitoring Kubernetes with Panopta

Kubernetes, Google’s open-source container management platform, offers one of the most robust toolsets for facilitating container configuration and automation. However, the level of abstraction that is native to Kubernetes presents a lot of challenges to monitoring and, while the level of abstraction and auto-scaling Kubernetes offers is incredibly powerful, without proper monitoring, it can create even larger pain points for your team and customers.

panopta

Using the Panopta Monitoring Policy Framework for monitoring configuration

The Panopta Monitoring Policy Framework is a tool meant to help manage your monitoring configuration, and quickly onboard new instances to an existing environment, or rapidly setup monitoring in a new environment. By bringing all of your configuration into one place, monitoring policies can help you automate adding templates, tags, manifest files, APIs, and other essential monitoring features to your infrastructure, getting you one step closer to fully-automated configuration.

panopta

Monitoring Docker Containers with the Panopta Agent

One of our newest integrations adds native Docker monitoring to the Panopta Agent. Using the Linux Agent, which is included in our monitoring agent, customers can monitor their Docker containers by installing the Panopta Agent on the Docker host, allowing it to discover and represent each container individually as other instances would be represented. This means easier access and exposing important application metrics.

panopta

Container Monitoring Guide: How to maintain visibility when moving to containers

With the growing adoption of container and microservice-driven environments, it’s important not to get too excited and potentially throw yourself into a transition that leads to a disaster. While both Docker and containers have carved out a significant space in the industry, moving to containers is tricky and requires significant planning. In addition, there are still quite a few concerns about maintaining visibility on applications, and some teams hesitate because of them.

panopta

An Introduction to Monitoring Hybrid Clouds

Containerization is more than just a trendy topic nowadays. With the rise of hybrid cloud environments and the ever-expanding adoption of containers, it’s important to start thinking about how to maintain visibility in these environments. Monitoring hybrid clouds presents many of the same challenges any hybrid environment would, but with the many moving parts that come with containers, there are additional challenges to take on as you begin a transition.

panopta

DNSSEC Basics and How to Set Up DNS Security Extensions

We’ve mentioned security and DNSSEC in a few different places in this series, but we wanted to give DNSSEC basics proper attention as we put together our final post on DNS. Due to the nature of DNS, it’s just not secure on its own. When the DNS protocol was first written, the internet was much smaller, and users were less concerned with security. Since then that’s changed significantly, and while DNSSEC has been around for almost 10 years adoption is far from universal.

panopta

How to avoid these common DNS Mistakes

Now that we’ve laid out some best practices, this week we wanted to talk about some common DNS mistakes we see many companies make when it comes to their hostname and authoritative DNS. Some of them may seem obvious because they ignore many of the best practices we’ve discussed previously, but we still want to touch on them so we can offer solutions for as many use cases as possible.