SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Proactieve Monitoring 
Open ICT infrastructuur monitoring solutions 
Gentbrugge, 22 october 2014 
Jan Guldentops ( j@ba.be ) 
BA N.V. ( http://www.ba.be )
Who am I? 
● Jan Guldentops (° 1973) 
● Historian by education, ICT Infrastructure builder by vocation, 
Security guy by accident 
● Open Source fundamentalist after houres (LPI, RHCE, RHCSA, 
VSP, VTSP, ...) 
● Focus on planning, building, security and maintening network, 
storage,server and cloud infrastructures 
● Hands on guy with 20 years of practical experience 
– Testlab 
– MacGuyver Projects 
● Founding Partner of Better access (°1996) and BA (°2003)
Brave new world
Why monitor ? 
● Permanently keeping an eye on all aspects of your infrastructure 
● network, storage, security, servers, applications, power, etc. 
● Seeing the status questionis in one blink of the eye 
● being able to alert the right people in case of problems 
● Work proactively 
● Detecting problems before they become critical 
● knowing somethings wrong before the phone rings... 
● Historical reporting 
● knowing when, where and what problems arrive can help you locate typical 
problems and resolve them 
● Did we keep our SLA ? Did our supplier keep his SLA ? 
● The numbers tell the tale ! ( Meten is weten / Le mètre à ruban )
Lots of monitoring solutions 
Open Source 
Netsaint, Big Brother, OpenNms 
Nagios / Icinga 
Commercial Open Source 
Zabbix, Centreon, Groundworks 
Closed source solutions 
PRTG, Whatsupgold, Intermapper 
Scom ( Yes even Microsoft enters this space!) 
“Enterprise” 
HP, Tivoli, BMC, Netiq, etc. 
Cloud oplossingen aka Monitoring as a service 
Cloudprovider, Telco, etc.
Gartner
Funny but true
Why nagios ? 
● OPEN !!!!!!!! 
● Mature: almost 12 years of development went into it 
● It has a big, living community and ecosystem 
● Nagiosexchange 
● Nagios plugin community 
● Easy to adapt to specialized needs and monitoring possibilities 
● e.g. I have a customer who uses it to monitor all the aspects of his automated 
carwash setup. 
● It scales to pretty big infrastructures 
● Multi monitoring nodes 
● Failover, etc. 
● Last but not least: it works !
Problem with nagios ? 
● Nagios is like linux -> Everybody can built his own version of it 
● Core Nagios ( version 2.0 or 3.0 ) 
● Enterprise version : Nagios XI 
● Open Monitoring Distribution / Check_mk 
● Groundwork 
● Op5 
● Centreon 
● Forking: ICINGA 
● Big collection of loose development / packages 
● Steep learning curve
BA Monitoring Distro 
● BA decided to standardise to our own distro 
● 100% open source 
● Delivered as a physical or virtual appliance 
(Ready2run) 
● Treasure chest of all the available tools, checks, 
templates, example configs 
● Based on Check_MK / OMD 
● Updatable / supportable
How does it work ?
Checks: Server-, storage 
and virtual infrastructure 
● SNMP ( e.g. for HP-servers ) 
● Agents : 
● check_mk 
● NRPE ( Nagios Remote Plugin Executor ) 
● NCSA 
● NSClient++ 
● remote ssh commands 
● specific custom built scripts 
● Blacklisting check 
● Backup check 
● Etc.
Check_MK
Checks : Network 
infrastructure 
● ICMP / UDP 
● Latency 
● package loss 
● bandwith 
● Active monitoring by snmp 
● Pulls 
● Traps 
● RMON / Nflows / Rflows
Checks : analysing central 
logfiles 
● Logging all system messages to a central 
syslog 
● Analyse the logfiles and create alerts 
● custom scripts 
● Look for anomalies 
● Splunk... 
● Check backuplogs 
● Etc.
Checks : virtual machines 
● Compatible with most virtualisation products 
● Can monitor the vms through 
– hypervisor / vcenter 
● SNMP 
● Same way as you check bare metal servers : 
– Check_mk 
– Nrpe / NCSA 
– Remote ssh
Checks: services 
● Check if a service is still running 
● Through check plugins 
● There are quite a number of checks available 
● Use the community : http://nagiosplugins.org 
● Write them yourself in perl, python or another 
interpreter language
Checks: Infrastructure 
● Power / UPS 
● SNMP 
● Serial cable 
● custom software from supplier 
● Environmental: Temperature / humidity-sensors 
● Lots of check sensors available 
● Work usually by SNMP 
● Videosecurity 
● Access control systems
Checks: special projects 
● Security: Hostbased IDS 
● Scans of your network and the connected hosts 
( NMAP / MACtable / etc. ) 
● What's new in the network ? 
● Spam blacklist check 
● Check certificates 
● Rogue snapshot check 
● Licentiemanagement
Visualisation 
● DASHBOARD 
● Techies and non-techies 
● Webinterface 
● Mobile 
– Mobile HTML5 
– Jnag mobile apps for Android, Iphone, Ipad 
● Nagvis 
– allows you to project status on custom images 
– Full customization possible!
Cool nagvis examples
Cool Nagvis examples
Cool Nagvis Examples
Mobile App
Visualisation
Alarming 
● Once something goes wrong you want to alert the right people 
● Alertgroups 
● Alertgroups can be combined with the right timings 
● Alerts can be given by : 
● E-mail 
● SMS 
● Semadigit 
● Social media ( twitter ) 
● Jabber ( Instant Messaging ) 
● RSS 
● Special stuff : 
● Integrate in ticketingsystem 
● webservices 
● hardware ( IO, lights, etc. ) 
● Automated stuff ( run scripts )
Reporting 
● Historical data of what happened 
● Every checks has a status than can be kept 
for later analysis 
● Can be used for : 
● SLA 
● Resource planning 
● Troubleshooting
Use it as a tool 
● Modus operandi : 
● Acknowledge problems 
● Shedule downtime 
● Put the right relations between monitored entities 
● Don't alert for everything and all the time ! 
● Integrate with other tools : 
● Ticketingsystem 
– OTRS, Omnitracker, Topdesk ( Work-in-progres) 
● Dispatch 
● Integrate documentation systems 
● Inventory
Monitoring isn't always right 
● Check is only so intelligent as you make it! 
● False positives or negatives 
● Problems with : 
● Network Latency 
● Load on the monitoringserver 
● Load on the monitored appliance 
● Monitoring infrastructure is a great target for 
hackers!
New possibilities 
● SIEM – Security Incident and Event Management 
● Aanval integration with Nagios is under development 
● Devops 
● DevOps is the practice of operations and development engineers 
participating together in the entire service lifecycle, from design 
through the development process to production support. 
● DevOps is also characterized by operations staff making use many 
of the same techniques as developers for their systems work. 
● Application Performance Monitoring 
● Automonitoring 
● Automagically privisioning monitoring in yiour systems
Demotime!
Thank You 
Contact us 
http://be.linkedin.com/in/janguldentops/ 
Twitter: JanGuldentops 
www.ba.be / Twitter: batweets 
info@ba.be 
016/29.80.45 
016/29.80.46 
Remy Toren 
Vaartdijk 3/501 
B-3018 Wijgmaal

Contenu connexe

Tendances

Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityDevOps.com
 
Enforce compliance policy with model-driven automation
Enforce compliance policy with model-driven automationEnforce compliance policy with model-driven automation
Enforce compliance policy with model-driven automationPuppet
 
DevSecOps - Security in DevOps
DevSecOps - Security in DevOpsDevSecOps - Security in DevOps
DevSecOps - Security in DevOpsAarno Aukia
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios
 
Building observable infrastructure and code
Building observable infrastructure and codeBuilding observable infrastructure and code
Building observable infrastructure and codeGDG Cloud Bengaluru
 
Managing AWS Costs with Anomaly Detection and Root Cause Analysis
Managing AWS Costs with Anomaly Detection and Root Cause AnalysisManaging AWS Costs with Anomaly Detection and Root Cause Analysis
Managing AWS Costs with Anomaly Detection and Root Cause AnalysisYotascale
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale
NGINX Controller: Configuration, Management, and Troubleshooting at Scale NGINX Controller: Configuration, Management, and Troubleshooting at Scale
NGINX Controller: Configuration, Management, and Troubleshooting at Scale NGINX, Inc.
 
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16AppDynamics
 
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...Continuous Delivery Amsterdam - Microservices in action at the Dutch National...
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...Bert Jan Schrijver
 
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?Tom Paseka
 
Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!Sasha Kolomiichuk
 
J-Spring 2017 - Microservices in action at the Dutch National Police
J-Spring 2017 - Microservices in action at the Dutch National PoliceJ-Spring 2017 - Microservices in action at the Dutch National Police
J-Spring 2017 - Microservices in action at the Dutch National PoliceBert Jan Schrijver
 
Dances with bits - industrial data analytics made easy!
Dances with bits - industrial data analytics made easy!Dances with bits - industrial data analytics made easy!
Dances with bits - industrial data analytics made easy!Julian Feinauer
 
Achieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX ControllerAchieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX ControllerNGINX, Inc.
 
Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Site24x7
 
Under the hood of the particular service platform
Under the hood of the particular service platformUnder the hood of the particular service platform
Under the hood of the particular service platformParticular Software
 
Simplify Microservices with the NGINX Application Platform - EMEA
Simplify Microservices with the NGINX Application Platform - EMEASimplify Microservices with the NGINX Application Platform - EMEA
Simplify Microservices with the NGINX Application Platform - EMEANGINX, Inc.
 
Deep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed MicroservicesDeep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed MicroservicesAaronLieberman5
 
Basic authentication with lambda@edge, Juho Rautio, Webscale Oy
Basic authentication with lambda@edge, Juho Rautio, Webscale OyBasic authentication with lambda@edge, Juho Rautio, Webscale Oy
Basic authentication with lambda@edge, Juho Rautio, Webscale OyJuho Rautio
 

Tendances (20)

Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and Reliability
 
Enforce compliance policy with model-driven automation
Enforce compliance policy with model-driven automationEnforce compliance policy with model-driven automation
Enforce compliance policy with model-driven automation
 
DevSecOps - Security in DevOps
DevSecOps - Security in DevOpsDevSecOps - Security in DevOps
DevSecOps - Security in DevOps
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
 
Building observable infrastructure and code
Building observable infrastructure and codeBuilding observable infrastructure and code
Building observable infrastructure and code
 
Managing AWS Costs with Anomaly Detection and Root Cause Analysis
Managing AWS Costs with Anomaly Detection and Root Cause AnalysisManaging AWS Costs with Anomaly Detection and Root Cause Analysis
Managing AWS Costs with Anomaly Detection and Root Cause Analysis
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale
NGINX Controller: Configuration, Management, and Troubleshooting at Scale NGINX Controller: Configuration, Management, and Troubleshooting at Scale
NGINX Controller: Configuration, Management, and Troubleshooting at Scale
 
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
 
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...Continuous Delivery Amsterdam - Microservices in action at the Dutch National...
Continuous Delivery Amsterdam - Microservices in action at the Dutch National...
 
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
HKNOG 6.0 Next Generation Networks - will automation put us out of jobs?
 
Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!
 
J-Spring 2017 - Microservices in action at the Dutch National Police
J-Spring 2017 - Microservices in action at the Dutch National PoliceJ-Spring 2017 - Microservices in action at the Dutch National Police
J-Spring 2017 - Microservices in action at the Dutch National Police
 
Dances with bits - industrial data analytics made easy!
Dances with bits - industrial data analytics made easy!Dances with bits - industrial data analytics made easy!
Dances with bits - industrial data analytics made easy!
 
Achieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX ControllerAchieve Full API Lifecycle Management Using NGINX Controller
Achieve Full API Lifecycle Management Using NGINX Controller
 
Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Application Performance Monitoring (APM)
Application Performance Monitoring (APM)
 
Under the hood of the particular service platform
Under the hood of the particular service platformUnder the hood of the particular service platform
Under the hood of the particular service platform
 
Simplify Microservices with the NGINX Application Platform - EMEA
Simplify Microservices with the NGINX Application Platform - EMEASimplify Microservices with the NGINX Application Platform - EMEA
Simplify Microservices with the NGINX Application Platform - EMEA
 
Deep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed MicroservicesDeep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed Microservices
 
Dynatrace
DynatraceDynatrace
Dynatrace
 
Basic authentication with lambda@edge, Juho Rautio, Webscale Oy
Basic authentication with lambda@edge, Juho Rautio, Webscale OyBasic authentication with lambda@edge, Juho Rautio, Webscale Oy
Basic authentication with lambda@edge, Juho Rautio, Webscale Oy
 

En vedette

Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
NagiosXI - Astiostech NagiosXI Event with NTT MSC Cyberjaya
NagiosXI - Astiostech NagiosXI Event with NTT MSC CyberjayaNagiosXI - Astiostech NagiosXI Event with NTT MSC Cyberjaya
NagiosXI - Astiostech NagiosXI Event with NTT MSC CyberjayaSanjay Willie
 
The devops approach to monitoring, Open Source and Infrastructure as Code Style
The devops approach to monitoring, Open Source and Infrastructure as Code StyleThe devops approach to monitoring, Open Source and Infrastructure as Code Style
The devops approach to monitoring, Open Source and Infrastructure as Code StyleJulien Pivotto
 
Monitoring the Enterprise: Examples and Best Practices
Monitoring the Enterprise: Examples and Best PracticesMonitoring the Enterprise: Examples and Best Practices
Monitoring the Enterprise: Examples and Best PracticesCody Eding
 
Open Source Monitoring with Icinga at Fossasia 2015
Open Source Monitoring with Icinga at Fossasia 2015Open Source Monitoring with Icinga at Fossasia 2015
Open Source Monitoring with Icinga at Fossasia 2015Icinga
 
What is Nagios XI and how is it different from Nagios Core
What is Nagios XI and how is it different from Nagios CoreWhat is Nagios XI and how is it different from Nagios Core
What is Nagios XI and how is it different from Nagios CoreSanjay Willie
 
Monitoring As a Service
Monitoring As a ServiceMonitoring As a Service
Monitoring As a ServiceJames Turnbull
 
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...AppDynamics
 
Nagios XI Best Practices
Nagios XI Best PracticesNagios XI Best Practices
Nagios XI Best PracticesNagios
 
Prometheus (Monitorama 2016)
Prometheus (Monitorama 2016)Prometheus (Monitorama 2016)
Prometheus (Monitorama 2016)Brian Brazil
 
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...AppDynamics
 
Monitoring with Nagios and Ganglia
Monitoring with Nagios and GangliaMonitoring with Nagios and Ganglia
Monitoring with Nagios and GangliaMaciej Lasyk
 
Stop using Nagios (so it can die peacefully)
Stop using Nagios (so it can die peacefully)Stop using Nagios (so it can die peacefully)
Stop using Nagios (so it can die peacefully)Andy Sykes
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionAxios Systems
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6mnihsanmz
 
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönä
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönäJärvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönä
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönäKouluterveyskysely
 
Play decide: Malaria (english)
Play decide: Malaria (english)Play decide: Malaria (english)
Play decide: Malaria (english)Xplore Health
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementJyotpreet Kaur
 

En vedette (20)

Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
NagiosXI - Astiostech NagiosXI Event with NTT MSC Cyberjaya
NagiosXI - Astiostech NagiosXI Event with NTT MSC CyberjayaNagiosXI - Astiostech NagiosXI Event with NTT MSC Cyberjaya
NagiosXI - Astiostech NagiosXI Event with NTT MSC Cyberjaya
 
The devops approach to monitoring, Open Source and Infrastructure as Code Style
The devops approach to monitoring, Open Source and Infrastructure as Code StyleThe devops approach to monitoring, Open Source and Infrastructure as Code Style
The devops approach to monitoring, Open Source and Infrastructure as Code Style
 
Monitoring the Enterprise: Examples and Best Practices
Monitoring the Enterprise: Examples and Best PracticesMonitoring the Enterprise: Examples and Best Practices
Monitoring the Enterprise: Examples and Best Practices
 
Open Source Monitoring with Icinga at Fossasia 2015
Open Source Monitoring with Icinga at Fossasia 2015Open Source Monitoring with Icinga at Fossasia 2015
Open Source Monitoring with Icinga at Fossasia 2015
 
What is Nagios XI and how is it different from Nagios Core
What is Nagios XI and how is it different from Nagios CoreWhat is Nagios XI and how is it different from Nagios Core
What is Nagios XI and how is it different from Nagios Core
 
Monitoring As a Service
Monitoring As a ServiceMonitoring As a Service
Monitoring As a Service
 
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...
Guerilla Marketing: How United Airlines Achieved Enterprise-wide Adoption of ...
 
Nagios XI Best Practices
Nagios XI Best PracticesNagios XI Best Practices
Nagios XI Best Practices
 
Nagios
NagiosNagios
Nagios
 
Prometheus (Monitorama 2016)
Prometheus (Monitorama 2016)Prometheus (Monitorama 2016)
Prometheus (Monitorama 2016)
 
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...
IoT in the Enterprise: Why Your Monitoring Strategy Should Include Connected ...
 
Monitoring with Nagios and Ganglia
Monitoring with Nagios and GangliaMonitoring with Nagios and Ganglia
Monitoring with Nagios and Ganglia
 
Stop using Nagios (so it can die peacefully)
Stop using Nagios (so it can die peacefully)Stop using Nagios (so it can die peacefully)
Stop using Nagios (so it can die peacefully)
 
ITIL Practical Guide - Service Transition
ITIL Practical Guide - Service TransitionITIL Practical Guide - Service Transition
ITIL Practical Guide - Service Transition
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6
 
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönä
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönäJärvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönä
Järvinen: Koululaisten suunhoito-oppaat moniammatillisena yhteistyönä
 
Play decide: Malaria (english)
Play decide: Malaria (english)Play decide: Malaria (english)
Play decide: Malaria (english)
 
Pemodelan Data 1
Pemodelan Data 1Pemodelan Data 1
Pemodelan Data 1
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute Management
 

Similaire à Proactive monitoring tools or services - Open Source

Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper diveRobert Kubiś
 
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)Ron Munitz
 
Netflix Open Source: Building a Distributed and Automated Open Source Program
Netflix Open Source:  Building a Distributed and Automated Open Source ProgramNetflix Open Source:  Building a Distributed and Automated Open Source Program
Netflix Open Source: Building a Distributed and Automated Open Source Programaspyker
 
Building a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at NetflixBuilding a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at NetflixAll Things Open
 
The Science of Compliance - Early Code to Secure your Node (11/6/19)
The Science of Compliance - Early Code to Secure your Node (11/6/19)The Science of Compliance - Early Code to Secure your Node (11/6/19)
The Science of Compliance - Early Code to Secure your Node (11/6/19)judy (fink) johnson
 
Not my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureNot my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureYshay Yaacobi
 
OSMC 2014: Naemon 1, 2, 3, N | Andreas Ericsson
OSMC 2014: Naemon 1, 2, 3, N | Andreas EricssonOSMC 2014: Naemon 1, 2, 3, N | Andreas Ericsson
OSMC 2014: Naemon 1, 2, 3, N | Andreas EricssonNETWAYS
 
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris Buytaert
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris BuytaertOSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris Buytaert
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris BuytaertNETWAYS
 
Open source monitoring systems
Open source monitoring systemsOpen source monitoring systems
Open source monitoring systemsForthscale
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN securityDavid Jorm
 
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanOSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanNETWAYS
 
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Logging : How much is too much? Network Security Monitoring Talk @ hasgeekLogging : How much is too much? Network Security Monitoring Talk @ hasgeek
Logging : How much is too much? Network Security Monitoring Talk @ hasgeekvivekrajan
 
OSMC 2014 | Naemon 1, 2, 3, N by Andreas Ericsson
OSMC 2014 | Naemon 1, 2, 3, N by Andreas EricssonOSMC 2014 | Naemon 1, 2, 3, N by Andreas Ericsson
OSMC 2014 | Naemon 1, 2, 3, N by Andreas EricssonNETWAYS
 
OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriOSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriNETWAYS
 
Thinking DevOps in the era of the Cloud - Demi Ben-Ari
Thinking DevOps in the era of the Cloud - Demi Ben-AriThinking DevOps in the era of the Cloud - Demi Ben-Ari
Thinking DevOps in the era of the Cloud - Demi Ben-AriDemi Ben-Ari
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Amazon Web Services
 
QueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksQueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksClarotech_Events
 
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris Buytaert
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris BuytaertOSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris Buytaert
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris BuytaertNETWAYS
 

Similaire à Proactive monitoring tools or services - Open Source (20)

Monitoring - deeper dive
Monitoring  - deeper diveMonitoring  - deeper dive
Monitoring - deeper dive
 
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
 
Netflix Open Source: Building a Distributed and Automated Open Source Program
Netflix Open Source:  Building a Distributed and Automated Open Source ProgramNetflix Open Source:  Building a Distributed and Automated Open Source Program
Netflix Open Source: Building a Distributed and Automated Open Source Program
 
Building a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at NetflixBuilding a Distributed & Automated Open Source Program at Netflix
Building a Distributed & Automated Open Source Program at Netflix
 
The Science of Compliance - Early Code to Secure your Node (11/6/19)
The Science of Compliance - Early Code to Secure your Node (11/6/19)The Science of Compliance - Early Code to Secure your Node (11/6/19)
The Science of Compliance - Early Code to Secure your Node (11/6/19)
 
Not my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructureNot my problem - Delegating responsibility to infrastructure
Not my problem - Delegating responsibility to infrastructure
 
OSMC 2014: Naemon 1, 2, 3, N | Andreas Ericsson
OSMC 2014: Naemon 1, 2, 3, N | Andreas EricssonOSMC 2014: Naemon 1, 2, 3, N | Andreas Ericsson
OSMC 2014: Naemon 1, 2, 3, N | Andreas Ericsson
 
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris Buytaert
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris BuytaertOSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris Buytaert
OSMC 2014: From monitoringsucks to monitoringlove (and back) | Kris Buytaert
 
Open source monitoring systems
Open source monitoring systemsOpen source monitoring systems
Open source monitoring systems
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security
 
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanOSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
 
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Logging : How much is too much? Network Security Monitoring Talk @ hasgeekLogging : How much is too much? Network Security Monitoring Talk @ hasgeek
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
 
OSMC 2014 | Naemon 1, 2, 3, N by Andreas Ericsson
OSMC 2014 | Naemon 1, 2, 3, N by Andreas EricssonOSMC 2014 | Naemon 1, 2, 3, N by Andreas Ericsson
OSMC 2014 | Naemon 1, 2, 3, N by Andreas Ericsson
 
OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriOSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
 
Thinking DevOps in the era of the Cloud - Demi Ben-Ari
Thinking DevOps in the era of the Cloud - Demi Ben-AriThinking DevOps in the era of the Cloud - Demi Ben-Ari
Thinking DevOps in the era of the Cloud - Demi Ben-Ari
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
 
QueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksQueueMetrics - Tips and Tricks
QueueMetrics - Tips and Tricks
 
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris Buytaert
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris BuytaertOSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris Buytaert
OSMC 2014 | From monitoringsucks to monitoringlove, and back by Kris Buytaert
 

Plus de B.A.

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: ObservationsB.A.
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurB.A.
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? B.A.
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyB.A.
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA'sB.A.
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenB.A.
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenB.A.
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefB.A.
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersB.A.
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurB.A.
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieB.A.
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )B.A.
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsB.A.
 
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesDe verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesB.A.
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on securityB.A.
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/CommerceB.A.
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"B.A.
 
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...B.A.
 

Plus de B.A. (20)

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: Observations
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuur
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ?
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacy
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA's
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgraven
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseur
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductie
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveats
 
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en DevicesDe verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
De verschillende beveiligingsrisico’s van mobiele toepassingen en Devices
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"
 
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
 

Dernier

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Dernier (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Proactive monitoring tools or services - Open Source

  • 1. Proactieve Monitoring Open ICT infrastructuur monitoring solutions Gentbrugge, 22 october 2014 Jan Guldentops ( j@ba.be ) BA N.V. ( http://www.ba.be )
  • 2. Who am I? ● Jan Guldentops (° 1973) ● Historian by education, ICT Infrastructure builder by vocation, Security guy by accident ● Open Source fundamentalist after houres (LPI, RHCE, RHCSA, VSP, VTSP, ...) ● Focus on planning, building, security and maintening network, storage,server and cloud infrastructures ● Hands on guy with 20 years of practical experience – Testlab – MacGuyver Projects ● Founding Partner of Better access (°1996) and BA (°2003)
  • 3.
  • 5. Why monitor ? ● Permanently keeping an eye on all aspects of your infrastructure ● network, storage, security, servers, applications, power, etc. ● Seeing the status questionis in one blink of the eye ● being able to alert the right people in case of problems ● Work proactively ● Detecting problems before they become critical ● knowing somethings wrong before the phone rings... ● Historical reporting ● knowing when, where and what problems arrive can help you locate typical problems and resolve them ● Did we keep our SLA ? Did our supplier keep his SLA ? ● The numbers tell the tale ! ( Meten is weten / Le mètre à ruban )
  • 6. Lots of monitoring solutions Open Source Netsaint, Big Brother, OpenNms Nagios / Icinga Commercial Open Source Zabbix, Centreon, Groundworks Closed source solutions PRTG, Whatsupgold, Intermapper Scom ( Yes even Microsoft enters this space!) “Enterprise” HP, Tivoli, BMC, Netiq, etc. Cloud oplossingen aka Monitoring as a service Cloudprovider, Telco, etc.
  • 9. Why nagios ? ● OPEN !!!!!!!! ● Mature: almost 12 years of development went into it ● It has a big, living community and ecosystem ● Nagiosexchange ● Nagios plugin community ● Easy to adapt to specialized needs and monitoring possibilities ● e.g. I have a customer who uses it to monitor all the aspects of his automated carwash setup. ● It scales to pretty big infrastructures ● Multi monitoring nodes ● Failover, etc. ● Last but not least: it works !
  • 10. Problem with nagios ? ● Nagios is like linux -> Everybody can built his own version of it ● Core Nagios ( version 2.0 or 3.0 ) ● Enterprise version : Nagios XI ● Open Monitoring Distribution / Check_mk ● Groundwork ● Op5 ● Centreon ● Forking: ICINGA ● Big collection of loose development / packages ● Steep learning curve
  • 11. BA Monitoring Distro ● BA decided to standardise to our own distro ● 100% open source ● Delivered as a physical or virtual appliance (Ready2run) ● Treasure chest of all the available tools, checks, templates, example configs ● Based on Check_MK / OMD ● Updatable / supportable
  • 12. How does it work ?
  • 13. Checks: Server-, storage and virtual infrastructure ● SNMP ( e.g. for HP-servers ) ● Agents : ● check_mk ● NRPE ( Nagios Remote Plugin Executor ) ● NCSA ● NSClient++ ● remote ssh commands ● specific custom built scripts ● Blacklisting check ● Backup check ● Etc.
  • 15. Checks : Network infrastructure ● ICMP / UDP ● Latency ● package loss ● bandwith ● Active monitoring by snmp ● Pulls ● Traps ● RMON / Nflows / Rflows
  • 16. Checks : analysing central logfiles ● Logging all system messages to a central syslog ● Analyse the logfiles and create alerts ● custom scripts ● Look for anomalies ● Splunk... ● Check backuplogs ● Etc.
  • 17. Checks : virtual machines ● Compatible with most virtualisation products ● Can monitor the vms through – hypervisor / vcenter ● SNMP ● Same way as you check bare metal servers : – Check_mk – Nrpe / NCSA – Remote ssh
  • 18. Checks: services ● Check if a service is still running ● Through check plugins ● There are quite a number of checks available ● Use the community : http://nagiosplugins.org ● Write them yourself in perl, python or another interpreter language
  • 19. Checks: Infrastructure ● Power / UPS ● SNMP ● Serial cable ● custom software from supplier ● Environmental: Temperature / humidity-sensors ● Lots of check sensors available ● Work usually by SNMP ● Videosecurity ● Access control systems
  • 20. Checks: special projects ● Security: Hostbased IDS ● Scans of your network and the connected hosts ( NMAP / MACtable / etc. ) ● What's new in the network ? ● Spam blacklist check ● Check certificates ● Rogue snapshot check ● Licentiemanagement
  • 21. Visualisation ● DASHBOARD ● Techies and non-techies ● Webinterface ● Mobile – Mobile HTML5 – Jnag mobile apps for Android, Iphone, Ipad ● Nagvis – allows you to project status on custom images – Full customization possible!
  • 27. Alarming ● Once something goes wrong you want to alert the right people ● Alertgroups ● Alertgroups can be combined with the right timings ● Alerts can be given by : ● E-mail ● SMS ● Semadigit ● Social media ( twitter ) ● Jabber ( Instant Messaging ) ● RSS ● Special stuff : ● Integrate in ticketingsystem ● webservices ● hardware ( IO, lights, etc. ) ● Automated stuff ( run scripts )
  • 28. Reporting ● Historical data of what happened ● Every checks has a status than can be kept for later analysis ● Can be used for : ● SLA ● Resource planning ● Troubleshooting
  • 29. Use it as a tool ● Modus operandi : ● Acknowledge problems ● Shedule downtime ● Put the right relations between monitored entities ● Don't alert for everything and all the time ! ● Integrate with other tools : ● Ticketingsystem – OTRS, Omnitracker, Topdesk ( Work-in-progres) ● Dispatch ● Integrate documentation systems ● Inventory
  • 30. Monitoring isn't always right ● Check is only so intelligent as you make it! ● False positives or negatives ● Problems with : ● Network Latency ● Load on the monitoringserver ● Load on the monitored appliance ● Monitoring infrastructure is a great target for hackers!
  • 31. New possibilities ● SIEM – Security Incident and Event Management ● Aanval integration with Nagios is under development ● Devops ● DevOps is the practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support. ● DevOps is also characterized by operations staff making use many of the same techniques as developers for their systems work. ● Application Performance Monitoring ● Automonitoring ● Automagically privisioning monitoring in yiour systems
  • 33. Thank You Contact us http://be.linkedin.com/in/janguldentops/ Twitter: JanGuldentops www.ba.be / Twitter: batweets info@ba.be 016/29.80.45 016/29.80.46 Remy Toren Vaartdijk 3/501 B-3018 Wijgmaal