begin Scott Prater quotation of Tue, Dec 04, 2001 at 10:08:40AM +0100: > > I'm one of the recent converts from BB to mon. We use mon purely as a > backend, way, way at the back -- there are several wrappers of other > programs that mon alarms pass through before finally being displayed in an > in-jhouse java-based interface.
I think it's entirely on-topic to discuss monitoring architectures we've built upon Mon. Scott, without giving away trade secrets, etc, etc, could you give us a little info on how you've built yours? I have strange ideas in my head about different ways I could use Mon as a "backend" as you've alluded to, so I'm interested in what others have done. -- Nate Campi http://www.campin.net GnuPG key: 0xC17AEF79 Key fingerprint = BF12 722F 8799 E614 33CC FAB7 5A90 C464 C17A EF79 The Strong Lusethropic Principle states: "The more idiot proof the software, the more it encourages the user to be careless and not think. Therefore, idiot-proof software actually encourages, contributes, and actually CAUSES lusers to be stupid." . The Weak Lusethropic Principle states: "As more idiot-proof software becomes available, more idiots are able to use computers. Idiot-proof software did not make or cause computer lusers; it simple allowed lusers to use computers where they could not before."
