资讯
News about the open source IT system management solution NetEye and the open source IT service management solution EriZone provided by Würth Phoenix.
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
After 17 years in software development, mostly crafting UIs (do you know Google Web Tookit? Or Angular, since version 1? And now Vue.js? I do), occasionally diving into mobile apps, and even wearing ...
If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you ...
An overview of the joint Axelos and Atlassian paper on integrating ITIL® 4 into modern ITSM workflows. In partnership with AXELOS, Atlassian has created a practical guide to help IT teams embrace this ...
If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
Now let’s continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then open the processing tree and select Edit mode On. Now select the filter and add ...
One of the most annoying aspects of using Sealed Secrets is their encryption design. They are tightly coupled to the namespace and name of the target Secret, meaning any changes to either require ...
Hi! Today I want to talk to you about a nice tool that I stumbled upon in recent weeks: n8n. In these days automation has become a key driver for efficiency and innovation. From streamlining ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果