As you all know, NetEye 4 is offered as an appliance or virtual machine. But today I want to talk about cloud and managed IT services using NetEye 4.
As a foreword I would just like to briefly explain what managed IT services are: A managed IT service is a solution that is delivered by an IT service provider, combining flat-rate, unlimited IT support for a fixed monthly fee with proactive monitoring of IT workstations and infrastructure.
Given this definition, let me present an application example that I have implemented in NetEye 4.
First the customer request: The internet connection for all sites needs to be monitored for availability, latency, jitter and capacity.
Our solution was to place a NetEye 4 instance in the cloud, which will actively monitor the lines to the various locations in terms of those requirements.
All data is collected on the central NetEye 4 instance and is presented to the customer through prepared dashboards. Thus the customer can access his or her data from anywhere and evaluate the monitored components in real time.
At the remote sites, we positioned satellite systems to serve as endpoint monitoring for the central NetEye 4 server in the cloud. These endpoint systems can also monitor the infrastructure at each site. This information, in turn, flows into the central system, from where the information is displayed and alarms can be triggered.
The interesting thing for customers is that they do not have to worry about the entire monitoring infrastructure, as this is offered as a managed IT service. The satellites are also pre-installed and sent to the customer, who only needs to place them in the defined network segment at the location.
After a satellite has been activated, the monitoring dashboards can be accessed immediately and the first results evaluated. The functionality of the satellites and the provision of the central monitoring system will be monitored by Würth Phoenix, and any errors that occur in the monitored environment will be proactively resolved until we replace the satellite systems. So there’s the solution for you, all wrapped up with a bow.
I started my professional career as a system administrator.
Over the years, my area of responsibility changed from administrative work to the architectural planning of systems.
During my activities at Würth Phoenix, the focus of my area of responsibility changed to the installation and consulting of the IT system management solution WÜRTHPHOENIX NetEye.
In the meantime, I take care of the implementation and planning of customer projects in the area of our unified monitoring solution.
Author
Tobias Goller
I started my professional career as a system administrator.
Over the years, my area of responsibility changed from administrative work to the architectural planning of systems.
During my activities at Würth Phoenix, the focus of my area of responsibility changed to the installation and consulting of the IT system management solution WÜRTHPHOENIX NetEye.
In the meantime, I take care of the implementation and planning of customer projects in the area of our unified monitoring solution.
In some test or development environments, there may be a need to simulate the presence of GSM modems without having physical devices. This can be useful, for example, to test monitoring checks, SMS management systems, or to create new notification Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More
In a previous post we went through the configuration of Elastic Universal Profiling in NetEye, seeing how we can profile applications written in programming languages that do not compile to native code (for example Python, PHP, Perl, etc.) But what Read More