Blog Entries

09. 01. 2023 William Calliari Development

Static Field Validation in Serde

I recently had to parse the JSON-RPC 2.0 standard and ran into the following problem: The standard requires the field “jsonrpc”: “2.0” in the JSON itself, and I wanted to validate that with Serde to ensure the message conforms to the standard. On the other hand I don’t need the field in the actual struct,…

Read More
05. 01. 2023 Gabriele Cecco Service Management

New Year’s Resolutions List

We’re at the end of the year again and it’s time to draw up the famous list of good resolutions for the coming year. I’m talking about good and working resolutions, the ones relating to good non-working resolutions is always very difficult to respect. I could challenge many of you to state for the record…

Read More
05. 01. 2023 Mattia Codato Bug Fixes, NetEye

Bug Fixes for NetEye 4.27

We fixed the default configuration paths used to send SMS messages. For NetEye 4.27 we updated the following packages:

Read More
04. 01. 2023 Mirko Morandini Asset Management, Unified Monitoring

Using GLPI with the Metabase Open Source BI Tool for Visualizing Rich Reports and Dashboards

Asset management/CMDB tools play (or should play!) a central role in IT operations and management, gathering data from hardware assets on contracts, software licenses, network configurations, tickets and many more. The key task is to keep all this data consistent and up to date. Rigor in manual data insertion and the careful integration of automation…

Read More
02. 01. 2023 Beatrice Dall'Omo Red Team, SEC4U

Focus on the noPac Attack

In December 2021 Microsoft revealed two vulnerabilities concerning an Active Directory Domain Services privilege elevation, classified as CVE-2021-42278 and CVE-2021-42287. By combining the two exploits in the so-called noPac attack, a malicious actor could perform a privilege escalation by impersonating the Domain Administrator after starting out as a standard user. This would lead to a…

Read More
31. 12. 2022 Fabrizio Dovesi Service Management

Data-driven Models – the Ultimate Fighter against a Company’s Complexity 👊 – Use Case Part 2 of 2

Guidelines on Data-driven models for managing data complexity and designing robust systems that might be consider both a single-source-of-truth and a single-point-of-contact. Use case scenario about a real Managed Service Provider ITSM with Atlassian Cloud products As mentioned in my previous post (Part 1 of 2), data-driven models help companies in managing data complexity and…

Read More
31. 12. 2022 Charles Callaway Documentation

Making Your Own Video (Tutorials), Part 11: Recording Day

So you read the advice I wrote in parts 1-9, you think to yourself “Oh why not, I’ll try to make a video”, and you then plan everything out: where to film, what to say, how to dress, the equipment you need, etc. You’ll pick or reserve a room somewhere in your office building (we’re…

Read More
30. 12. 2022 Davide Gallo Contribution, NetEye, Service Management

Start Using systemd Timers instead of cron/anacron

systemd timers are a way to schedule tasks in Linux systems using the systemd initialization system. They provide finer granularity for scheduling tasks than the traditional crontab, and also ensure that the task will be executed when the system is running in the future, even if the expected execution time was missed due to the…

Read More
29. 12. 2022 Rocco Pezzani NetEye

Finding Subtle Changes in your NetEye 4 Monitoring during Critical Activities

Rules and standards are important. In a world based on collaboration, following a well defined behavior is key for avoiding errors based on some sort of misunderstanding. This is also true for the world of information technology: someone releases software that is incomplete by design, and then leaves the completion of it to the people…

Read More
28. 12. 2022 Giuseppe Di Garbo NetEye

Monitoring Automation in Director

Director is one of the most important modules in NetEye 4 because it’s used for managing, automating and deploying the configurations of all monitored objects. In all our projects we use automation in Director: through the Import and Synchronization rules we can automate many operations such as the import and synchronization of hosts, service checks,…

Read More
27. 12. 2022 Damiano Chini Development, Log Management, Log-SIEM, NetEye

Adding Settings to Beats Agents’ Templates Based on the Index Name

With the introduction of the Composable Index Templates in Elastic, we at NetEye had to redesign the way index settings and mappings are applied to the indices generated by El Proxy. In this post I’ll explain: The solution explained in the remainder of the post was designed for El Proxy, but it may apply also…

Read More
23. 12. 2022 Valentina Da Rold Development, ITOA, NetEye

Configuring ClickHouse as an Additional Data Source in Grafana

As mentioned in my colleague Mattia’s blog, NetEye 4.27 comes with a ClickHouse database pre-installed.If you follow that post, you will be able to customize NetEye in order to save data inside a ClickHouse database. Your data is now ready to be visualized on a dashboard, and you can accomplish this by configuring the ClickHouse…

Read More
22. 12. 2022 Andrea Mariani ITOA, NetEye

Exporting Grafana Graphs to CSV

Some time ago, a customer asked me if it was possible to export the data used by NetEye 4 Performance Graphs to CSV format. In particular, the performance graphs that are displayed within Icinga 2’s web interface currently have no option to export their data. After some research, I found that the only way to…

Read More
22. 12. 2022 Charles Callaway Documentation

Making Your Own Video (Tutorials), Part 11: Animation Redux

After my last post on the advantages and disadvantages of the animation style of video, I hope you did your homework! I certainly did, and you can see the results of my first animated video that conveys some basic information on the need for cybersecurity both in English and in Italian. Probably like you, I…

Read More
21. 12. 2022 Mirko Ioris Blue Team, SEC4U

Meet the SOC Weekly Reports, a New Way to Inform Customers

One of the most comprehensive services offered by Wuerth-Phoenix’s Cyber Security team is the Security Operation Center (SOC). An SOC is capable of monitoring an IT environment, scanning all messages sent within the internal network, and all operations performed on corporate devices. Through the use of detection rules, the SOC is able to identify anomalies…

Read More

Archive