Forgot your password?
typodupeerror

+ - Remote server support and monitoring solution

Submitted by Crizzam
Crizzam (749336) writes "I have about 500 clients which have my servers installed in their data centers as a hosted solution for time & attendance (employee attendance / vacation / etc). I want to actively monitor all the client servers from my desktop, so know when a server failure has occurred. I am thinking I need to trap SNMP data and collect it in a dashboard. I'd also like to have each client connect to my server via HTTP tunnel using something like OpenVPN. In this way I maintain a site-site tunnel open so if I need to access my server remotely, I can. Any suggestions as to the technology stack I should put together to pull off this task? I was looking at Zabbix / Nagios for SNMP monitoring and OpenVPN for the other part. What else should I include? How does one put together a good remote monitoring / access solution that clients can live with and will still allow me to offer great proactive service to my servers located on-site?"

Comment: It's the wrong question. (Score 1) 448

by Crizzam (#47827271) Attached to: Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us?
HMMWV's don't have keys, you think a soldier wants a key to turn on / off the weapon that could save his life? Technical options simply aren't feasible. That equipment was already "lost" as the cost to take it back to the US exceeded the value of the equipment. The decision was made to leave it. When it began to fall in to enemy hands, it should have been immediately destroyed.

Comment: Standards (Score 3, Insightful) 152

by Crizzam (#47817193) Attached to: Can ISO 29119 Software Testing "Standard" Really Be a Standard?
Are rules for some and suggestions for the rest of us. The IEEE can put a standard on cleaning the toilet. If your company wants to follow it to the letter, or just use it as another reference, that's your call. I think the organization of conceptually difficult concepts is a good thing, overall. What we do with that is a whole other thing.

Comment: Chile + Microsoft = Cray Cray (Score 1) 159

by Crizzam (#47730073) Attached to: Microsoft Lobby Denies the State of Chile Access To Free Software
I live in Chile and am amazed by the deathgrip that Microsoft has here. It's amazing. When you use Microsoft software in Chile, according to the terms of use, you unconditionally agree to an inspection, in your business, by Microsoft, without warning. What happens is that a Microsoft representative arrives WITH POLICE and they are prepared to file criminal charges against END USERS and MANAGERS for the discovery of unlicensed software. They perform a scan of the network with their tools and require proof that each copy is licensed. To me, this is simple crazy corporate control.

Comment: courses not degrees (Score 1) 433

by eagl (#42420269) Attached to: Ask Slashdot: CS Degree While Working Full Time?

If you want to rise in your current company, you might consider finding out what skills you need to rise to the next level on the corporate ladder and then target those skills with individual courses. For example, my Mom was a "senior programming analyst" for about 20 years. She was told that she needed personnel and project management skills to rise to the next level of project or group leader. She decided she was having fun where she was, so her continuing education focused on a couple of courses that let her broaden her personal approach to her tasks. Her decision worked in the sense that since she was at the top of the pay scale for her job, she got the max annual bonus for many years in a row, and the company did not fire her through 3 complete corporate mergers. She did have a bachelors degree in math, but her focus was programming and the courses she took were programming courses.

UCSD has extension courses that may be available for open enrollment. That's where she went. She was a Berkeley alum but I'm not sure that was a pre-req for admission to the extension courses.

For you personally I suggest courses in software engineering, rather than "pure" computer science which will touch on a wide variety of topics that may not apply. Or pick/choose courses from the CS degree program at the university of your choice, on the theory that you can learn stuff that applies to you now and can later on be applied to a degree program. But if you're already a programmer, your next step up may be software engineering and project management.

Comment: Yes and no (Score 1) 601

by eagl (#38430082) Attached to: Do Slashdotters Encrypt Their Email?

I encrypt work email whenever it includes private or sensitive information. But that is only because my company has a global email address book and every single user has published encryption certificates. My company has also mandated that every email gets digitally signed, whether it is encrypted or not.

Which brings me to my no answer, my personal email. I would encrypt all personal email if I could, but the problem is that it is unlikely I could get all of my email recipients (or even most of them) to bother to deal with keys and making sure their email client could decrypt as required. Not only that, I use webmail a lot and it's not easy to get everyone onboard the same scheme that would allow encrypted email via webmail.

If everyone did it, then heck yes I'd encrypt all of my personal email too. If it was as easy as microsoft putting a big button "enable encryption", along with another button "send public key to email correspondent", then everyone would be using encrypted email. But they won't, so I'm pretty much out of luck.

Comment: Yes and no (Score 1) 3

by eagl (#38420868) Attached to: Do Slashdotters encrypt their email?

I encrypt work email whenever it includes private or sensitive information. But that is only because my company has a global email address book and every single user has published encryption certificates.

Which brings me to my no answer, my personal email. I would encrypt all personal email if I could, but the problem is that it is unlikely I could get all of my email recipients (or even most of them) to bother to deal with keys and making sure their email client could decrypt as required. Not only that, I use webmail a lot and it's not easy to get everyone onboard the same scheme that would allow encrypted email via webmail.

If everyone did it, then heck yes I'd encrypt all of my personal email too. If it was as easy as microsoft putting a big button "enable encryption", along with another button "send public key to email correspondent", then everyone would be using encrypted email. But they won't, so I'm pretty much out of luck.

Comment: Ditch the HP and run more drops (Score 1) 237

by Crizzam (#38121904) Attached to: Ask Slashdot: Updating a Difficult Campground Wi-Fi Design?
As a person with first hand experience on Cisco and HP Access Points, I have some disappointing news for you. There is no comparison between the Cisco and HP wireless gear. The HP stuff is repackaged Calubris Netowrk gear and it is kludgy, at best. I really, really, really have a shudder of fear when client select the HP stuff. It simply doesn't work well. The Cisco gear using a WLC (Wireless LAN Controller) is the absolute best I;ve ever seen. It's a breeze to install and performance is great. Keep in mind that when using a mesh, the bandwidth goed down 50% at each hop. So, if you have 54Mbps at the first access point, the next access points are limites to 27Mbps and the next at down to 13.5. This is under PERFECT conditions. Your distance of 300 feet is too far. I would recommend a mesh being no more than 150 feet outdoors. Preferably 100 ft. There are limitations to wireless LANS and in the end, your best bet is to create multiple meshes, each with a hard drop back to a switch. You can get underground CAT5 pretty cheap. Rather than running the whole mesh off one drop... have 3 or four of them out to the field and set up your access groups accordingly. But seriously... I would just lose the HP gear. It's so bad. I even yelled at the HP rep... just my $0.02.

Comment: In other news... (Score 1) 627

by eagl (#37388238) Attached to: "Wi-Fi Refugees" Shelter in West Virginia Mountains

In other tech news, crazy (technophobes,technophiles) found a way to (avoid,misuse) technology found in (your favorite tech here), conducting activities that resulted in (isolating them,harming people) in a surprisingly (ignorant,creepy) fashion.

The world responded with (shock,anger,compassion) for (1,2,5,30) minutes and then returned to their (pathetic lives,regularly scheduled programming).

Passwords are implemented as a result of insecurity.

Working...