Changelog 1.7.6
– Signature check module: Parse of signature creation date fix. Adaptation to month string case leading to misinterpretation of signature creation date
– Update of included database dump to vers. 1.7.6
Changelog 1.7.5
– restartSafed(): Get method header bux fix
– fix:log recovery tolerance setting included also for logCheck section
– fix: setup.sh db alters of statistics tables
Changelog 1.7.4
– Syslog Log integrity check: updates and implementation example in documentation for:
+ Integrity check
+ The log recovery process with recovery result check
– setup.sh : warning of grant check piped correctly to dev/null- Eventlog Template Server 2008: Duplicate ID definition in Logon/Logoff correction
Changelog 1.7.3
– specific password encryption logic for safed linux and unix/solaris/aix
Changelog 1.7.2
– fix: duplicate logfile indexing section in ryslog_store.sh
– fix: duplicate eventlog objective. Adaptation to the introduction of priority levels
– SAFED agent check: introduce flexible logic to check modified agent port setting
Changelog 1.7.1
– crontab with check for cluster node, fix in setup.sh
Changelog 1.7.0
– Support to collect virtual or additional IP address sources within a single host
– Statistics: Aggregation of log information in case of hostname or DNS changes. Aggregation for IP and/or host name
– harmonize log paths: syslogview, statistics, search log into /var/log/neteye/nesyslogview/
– Host description in view and editable
– discover IP on “clone host”
– Priority sequence of EventID objects and LogFile filters within SAFED configuration
– Support to create SAFED templates for Solaris, Unix and Aix
After my graduation in Applied Computer Science at the Free University of Bolzano I decided to start my professional career outside the province. With a bit of good timing and good luck I went into the booming IT-Dept. of Geox in the shoe district of Montebelluna, where I realized how a big IT infrastructure has to grow and adapt to quickly changing requirements. During this experience I had also the nice possibility to travel the world, while setting up the various production and retail areas of this company. Arrived at Würth Phoenix I started developing on our monitoring solution NetEye. Today, in my position as Consulting an Project Manager I am continuously heading to implement our solutions to meet the expectation of your enterprise customers.
Author
Patrick Zambelli
After my graduation in Applied Computer Science at the Free University of Bolzano I decided to start my professional career outside the province. With a bit of good timing and good luck I went into the booming IT-Dept. of Geox in the shoe district of Montebelluna, where I realized how a big IT infrastructure has to grow and adapt to quickly changing requirements. During this experience I had also the nice possibility to travel the world, while setting up the various production and retail areas of this company. Arrived at Würth Phoenix I started developing on our monitoring solution NetEye. Today, in my position as Consulting an Project Manager I am continuously heading to implement our solutions to meet the expectation of your enterprise customers.
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, SMS management systems, or creating new notification rules. Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More