News

As enterprises move toward containerization and microservices, traditional job schedulers are often left behind. However, many organizations still rely on tried-and-true tools like SOS Berlin’s ...
Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic ...
News about the open source IT system management solution NetEye and the open source IT service management solution EriZone provided by Würth Phoenix.
Now let’s continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then open the processing tree and select Edit mode On. Now select the filter and add ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
After 17 years in software development, mostly crafting UIs (do you know Google Web Tookit? Or Angular, since version 1? And now Vue.js? I do), occasionally diving into mobile apps, and even wearing ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
An overview of the joint Axelos and Atlassian paper on integrating ITIL® 4 into modern ITSM workflows. In partnership with AXELOS, Atlassian has created a practical guide to help IT teams embrace this ...
Building the Ansible Documentation Ansible, in its default format, embeds the documentation of each module inside the module code itself, at the beginning of the file, as can be seen for example in ...
If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...