Best Practices’ Blogs

What you need to know about monitoring containers

Wednesday, May 17th, 2017

When adopting a new technology, you will always face some challenges. When it comes to container technology, one of the important questions in this regard is how to get insight in the behaviour of your applications and container environment. Which features are essential when it comes to your monitoring system? Which metrics should processes expose? And what about blackbox and whitebox monitoring? In this article, our Prometheus expert Ed Schouten talks about the monitoring of containers.

More...

Using Prometheus to monitor Postfix mail queues

Monday, February 27th, 2017

Over the last couple of months we’ve published several blog posts to announce the release of various Open Source metrics exporters for Prometheus. The development of these exporters is an on-going process at Kumina, as we’re working towards replacing our existing Nagios-based monitoring setup with Prometheus. oday we’re proud to present to you our own Prometheus metrics exporter for Postfix, written in Go.

More...

The Collectd encrypted packet format

Friday, March 21st, 2014

Yesterday, Logstash 1.4.0 was released containing many improvements, one of which was contributed by us. We’ve implemented signature verification and packet decryption in the collectd input plugin. This blogpost will give an overview of how encryption and signing is used in the collectd binary protocol. If you want to implement your own collectd receiver, this is pretty interesting.

More...

Automated monitoring? Easy!

Tuesday, February 11th, 2014

One of the things we take very serious here at Kumina is our monitoring. We’ve always done so, but even we must admit that during the starting years, we sometimes forgot to include all possible checks for a new service or host. And it sucks when you forget to setup the monitoring for a specific item, because you generally only find out about it when it’s actually down already… We like to check as much as possible (if not everything). Here’s an explanation on how we actually deploy our monitoring and trending based on the applications that are installed.

More...

Icinga check for Linux.Fokirtor

Friday, November 15th, 2013

We’ve written a check for detecting the Fokirtor backdoor.

More...

On our new DNS infrastructure (and DNSSEC)

Thursday, August 15th, 2013

Recently we’ve been busy implementing a new DNS infrastructure for both our resolvers as well as our authoritative servers.

More...

Check and detect Linux/CDorked.A infections

Wednesday, May 8th, 2013

We’ve created a simple check to detect Linux/CDorked.A infections on webservers.

More...

Checking for rogue Apache modules

Wednesday, April 3rd, 2013

An Icinga check to detect rogue Apache modules.

More...