Operations | Monitoring | ITSM | DevOps | Cloud

Pandora FMS

Pandora FMS Enterprise in High Availability

Pandora FMS is a proactive, advanced, flexible and easy-to-configure monitoring tool according to each business. It gets integrated into all the needs of servers, network computers, terminals and whatever needs to be monitored. This article applies exclusively to Pandora FMS Enterprise and what is exposed cannot be used in Pandora FMS Community.

8 ideas on how to boost your team's productivity

IT teams are essential for many companies to work. And, although due to the nature of their work they have certain features, you should not forget that, after all, they are human teams, so they have similar characteristics to those of any other group. The sensible thing, then, is to remember that if you want your IT team to work to the fullest, you must be able to optimize several of the aspects involved in its performance, both the characteristics of the IT field and more general ones.

Dashboards and visual consoles Workshop | Pandora FMS

We will design customized screens offering specific information in a fully customized format, using Pandora FMS online editor: Graphs and data combined, perfect to share with your team. With the dashboards, you will be able to define screens for monitoring and share them with others, or show them in full screen for the whole team to see.

What are logs and why monitor them?

What are logs? In computing, when generally speaking of “log”, we refer to information belonging to a more or less low level reported by the operating system or a specific application that helps identify what is being done, including errors, problems or minor warnings, and when that happens, it indicates the date and time. In some cases, the source, the user, the IP address and other interesting fields from the point of view of what has happened can be identified.

What is bandwidth and how does it affect your connections?

What is bandwidth? Over the last few years, and at the dawn of the very celebrated arrival of the Internet into our homes and our beloved cell phones, concepts such as bandwidth, previously restricted to more technical contexts, have come into our lives hand in hand with waves of experts who recommend this or that connection based on criteria that usually fits your brother-in-law’s wisdom.

What is VPN? The acronyms that could save your life

What is VPN? You know that in IT we absolutely love acronyms, right? Specifying and summing things up is our thing. Digital Video Disc? DVD. Central Processing Unit? CPU. Asymmetric Digital Subscriber Line? Yes, you guessed it right: ADSL. In fact, tell me a word, no matter how long… What the heck! let’s take one of the longest words, with no more and no less than 23 characters: electroencephalographer. Well, how would we find this word in a hypothetical technoglossary?

Common and Disastrous Network Monitoring Mistakes and How to Avoid Them

If you run a sizable enterprise, your network is probably sprawling. You also probably have a network management or IT security team on the payroll to handle monitoring. Their job is to check the network for potential security intrusions, make sure resources aren’t overloaded in one area, and otherwise ensure that things run smoothly.

Managing Network Configuration Changes Five Best Practices

Do you know what the most common cause of network outages and performance problems is? Misconfiguration. For as much time and energy as people spend talking about issues such as infrastructure and cybercrime, the truth is that basic low-level configuration challenges are still the biggest “threat” to properly-functioning networks.