News

Using the S3 functionality provided by OpenShift Data Foundation, combined with the s3-proxy from Oxyno-Zeta, offers a practical and flexible solution for managing temporary file uploads. It allows ...
Fix monitoring object creation during deployment We fixed a bug that caused a monitoring object to be lost if it was created while a Diretor deployment was in progress. List of updated packages To ...
News about the open source IT system management solution NetEye and the open source IT service management solution EriZone provided by Würth Phoenix.
Previously, database updates would fail if the GLPI DRBD resource was active on a node other than the primary, due to an inability to locate the necessary database configuration within the ...
Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic ...
If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you ...
Welcome to version 4.42 of our NetEye v4 Unified Monitoring Platform. Summer has arrived on the Seiser Alm, and with it, clear views of two of South Tyrol’s most iconic peaks: Langkofel (Sassolungo) ...
In the world of Dynamics 365 and Power Platform administration, ensuring users have timely access to environments is a common challenge. The standard synchronization process between Azure Entra ...
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, ...
Fix for icinga2 check processing We fixed a race-condition in icinga2, where a lock was not held long enough, causing threads to overwrite local state when processing two simultaneous check results ...
Customer experience is a crucial factor for the success of any IT support team. Often, agents manage tickets without a clear understanding of the customer’s emotional state, making it difficult to ...
This article gives an overview and offers a practical tips to detecting some suspicious activities in Microsoft SQL Server, from configuring audit policies to leveraging Elastic for effective ...