Blog Entries

20. 12. 2024 Davide Sbetti Automation, Development, NetEye

When Less is More: NetEye Update and Upgrade Checkpoints

Hello everyone! Today, I’d like to briefly discuss an improvement to the update and upgrade procedures that we’ve started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the update or upgrade procedure stopped, even for legitimate reasons such as rpmnew or rpmsave files,…

Read More
19. 12. 2024 Attilio Broglio Unified Monitoring

How to Monitor MSSQL in a Synchronized, High-availability Setup

This article describes an ad-hoc monitoring solution for MSSQL within a synchronized high-availability setup. Due to the circumstances surrounding the request from a customers’ request, with this setup we couldn’t use the standard command/check that’ are’s commonly used, but an additional layer was required to manage the resources involved. Use Case The behavior of MSSQL…

Read More
19. 12. 2024 Gabriele Bocchi Automation, Development, NetEye

NetEye Install and Upgrades: Moving to a Parallel Architecture

Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive to make NetEye not only powerful but also highly efficient and reliable for our users….

Read More
19. 12. 2024 Balawal Sultan NetEye

Find Applied Notification Rules with the Notification Matcher Module

When you’re monitoring complex IT system infrastructure, and have over one hundred notification rules configured that make use of many custom variables, finding out exactly what notification rule is applied on a Host/Service can quickly become tricky. The Notification Matcher module allows you to find out exactly which notification rule is applied on a Host/Service….

Read More
19. 12. 2024 Luigi Miazzo Automation, Development, DevOps

Embracing Idempotency: Writing Your Own Ansible Collection – From Code to Tests

Ansible is a powerful automation tool that simplifies the configuration, deployment, and management of systems. At its heart lies the concept of idempotency — the guarantee that applying the same operation any number of times will yield the same result. Writing your own Ansible collection can unlock a new level of customization and control for…

Read More
18. 12. 2024 Csaba Remenar DevOps, ITOA

Introduction to Container Resource Management and What We Can Learn for Monitoring

Recently, I’ve been deeply involved in OpenShift monitoring tasks, including configuring Grafana dashboards and creating Prometheus alerts. During this time, I’ve focused on effectively monitoring container resources such as CPU and memory. Container orchestration platforms like Kubernetes and OpenShift require efficient resource utilization and precise resource management in order to optimize performance and ensure application…

Read More
18. 12. 2024 Charles Callaway Documentation

Explaining Your Content with Complex Animations, Part 2

Hi again! At the end of my last blog I left you hanging. I promised some concrete examples of useful animations you could do in-house, using just math. And here I am, examples in hand! Although they could be finished animations in specific situations, they’re more likely to be parts of a larger picture, so…

Read More
18. 12. 2024 Mattia Codato Automation, Development, DevOps

GitOps: Push vs Pull? Choosing the Right Approach for Production Deployments

Starting a new project is often an opportunity to reevaluate established practices. In our case, deploying a containerized application to production with OpenShift led us to revisit our GitOps strategy. Using ArgoCD as our GitOps tool raised a fundamental question: What is the best way to move changes into production—push or pull? Understanding Push and…

Read More
18. 12. 2024 Fabiana Pittalis Artificial Intelligence, Atlassian

Atlassian AI and Data Security: A Delicate Balance

The integration of artificial intelligence (AI) into Atlassian tools, such as Jira and Confluence, undoubtedly offers countless benefits but has raised many concerns about data security. Why is data security so important for Atlassian? Atlassian tools often contain sensitive information, such as development plans, customer data, and project details. Imagine entrusting this information to a…

Read More
18. 12. 2024 Alessandro Paoli NetEye

SAP Monitoring: A Journey to Comprehensive Visibility on NetEye – Part 1

Monitoring SAP systems has always been a major hurdle in every job I’ve held. SAP has its own monitoring tools, primarily CCMS, but extracting metrics and configurations from the SAP world has always been a challenge. In the past, I used SNMP traps configured in CCMS to send alerts when thresholds were exceeded. However, this…

Read More
18. 12. 2024 Elena Valgoi AI, Atlassian

We Were all Wrong

Why Generalists Will Rule the World (Even with AI) November 30, 2022 marked a turning point. The release of OpenAI’s ChatGPT started a new era of AI-powered productivity, but also brought widespread uncertainty into the work environment. One of the most asked questions about AI is: …and we all got there. All of us, at…

Read More
16. 12. 2024 Alessandro Valentini Development, DevOps

NetEye and RHUI Repositories

Recently we had to provision a couple of NetEye machines on Azure for production purposes. Our procedure essentially creates a RedHat 8.10 VM starting with an official RedHat image, and adds the NetEye repositories to install the required software. This procedure is what we usually follow to create training environments, but these machines are usually…

Read More
16. 12. 2024 Mirko Morandini Asset Management

GUI-based GLPI Network Inventory Setup with the “GLPI Inventory” Plugin

GLPI agents not only perform a local inventory of the computer where they were installed, but also include several tools for discovering and inventorying other devices in their network: Of course, you’ll need to install and execute these tasks on only a few selected servers that reach the network sections you want. My colleague presented…

Read More
12. 12. 2024 Reinhold Trocker Log Management, Log-SIEM

Sample osquery Investigations for a Security Incident

osquery

Note: This description of a security analyst’s daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Elastic Security system. The alert indicated suspicious activity on host HOST-1234, suggesting potential malware execution. The…

Read More
10. 12. 2024 Elena Valgoi Atlassian, Service Management

Atlassian News ~ End of the Year Edition

Welcome, everyone to our ‘End of the Year’ Atlassian News! A lot has happened this year in the Atlassian world, and staying up to date is a big challenge 😵 So… I’m here to do the dirty work for you, and summarize all the latest features and news from the Atlassian ecosystem (you’re welcome😂). So…

Read More

Archive