An IT organization today needs to have all the hardware, software and licenses information in order to negotiate with suppliers through a target strategy or to perform timely updates. A complete inventory system is therefore a must.
As you may already know, NetEye provides the Inventory and Asset Management modules through the integration of GLPI and OCS Inventory. With the system you can create and maintain a database for all your technical resources such as computers, software or devices in your company. In addition, the solution archives all the data history and records all the changes in your infrastructure.
Perhaps if you are using GLPI and OCS Inventory you also had the necessity to put into the inventory not only the physical infrastructure but also the virtual one. Well, OCS Inventory and GLPI Inventory can meet your needs.
By setting specific OCS Inventory parameters it is possible to trace automatically all virtual machines information, and not only… In fact, GLPI will save virtual systems data associating them to the physical machines on which they are installed. If the virtual machine, in addition, have the OCS agent installed, in OCSNG they are not only listed as vm in the ESX host in which they are recognized, but if there is a UUID match a link will be created to the real vm in the inventory.
Virtual machine discovery with OCS inventory
GLPI displays virtual machine information associated with the physical machine
If you need any additional information on how to implement this solution in your infrastructure please feel free to contact me.
Synopsis Important: Icinga2 security update Type/Severity Security Advisory: Critical Topic An update for the package icinga2 is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More
Synopsis Important: GLPI security update Type/Severity Security Advisory: Critical Topic An update for the package glpi is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More
Hello everyone! As you may remember, a topic I like to discuss a lot on this blog is the Proof of Concept (POC) about how we could enhance search within our online NetEye User Guide. Well, we're happy to share Read More
In the ever-evolving landscape of IT monitoring and management, the ability to efficiently handle multi-dimensional namespaces is crucial. Within NetEye, Log-SIEM (Elastic), provides a comprehensive solution for managing the single namespace dimension with the namespace of a data_stream. This blog Read More
Hey everyone! We played around a bit last time with our radar data to build a model that we could train outside Elasticsearch, loading it through Eland and then applying it using an ingest pipeline. But since our data is Read More