Some Words about Logstash Filters and Dates

Posted by on Nov 25, 2016 in Log Auditing, NetEye | 0 comments


Some time ago I published an article about how to store the NetEye SMS Protocol log into an ELK environment. Now, after using it some times, I discovered that it was not completely correct as the time/date functions for the Logstash filters are a bit more complicated. In particular, it was that the date was written in the SMS protocol file in this way:

June 29th 2016, 10:30:22 CEST 2016

And we used this Logstash date filter to convert it:

date {
          locale = "en"
          match  = [ "sms_timestamp_text", "EEE MMM dd HH:mm:ss" ]

Now it seemed that it would work, but after some time (some days until the start of the next month) we discovered that the date in the first days of the month would look like:

Read More

Research & Development – Insights (Part 1)

Posted by on Nov 23, 2016 in Development, NetEye | 0 comments

Research and Development Insights

The Research and Development team (short R&D) is the largest team in the Würth Phoenix System Integration business unit. Our responsibility is to develop, maintain and deliver high quality software to our customers. We also provide second level support in cooperation with our Service & Support team.

In past, the SI department was one of the fastest growing departments in the company. This rapid growth had also an impact on our team, forcing us to face new challenges in various areas. The most notable were workload distribution, issue prioritization, time efficiency, knowledge transfer and as a direct result continuously integrating new colleagues.

To keep delivery times low and product quality as well as the motivation of our members high, a decision had to be made, and the idea of the Agile Transformation was born.

Read More

Are you wasting many hours by executing repeating tasks?

Posted by on Nov 21, 2016 in NetEye, Real User Experience Monitoring | 0 comments

Hand simple tasks over to Alyvix. In this way, you will be able to save precious working hours and in turn, to invest your precious time in more important activities.

Automation of repeating tasks with Alyvix

Alyvix has been designed to simulate real user inputs or actions, to check if an application runs correctly and to register its performance values in order to compare past and actual application performance values. Through such comparisons, it is possible to detect application performance degradations (for example after an update).

Since such simulations turned out to be a good thing, it came to my mind to use Alyvix also to execute repeated tasks, which otherwise an employee had to do. Do you know what I mean? Let me explain it through a real life example:

Read More

Preview EriZone 3.6: Activity Sequence Management

Posted by on Nov 16, 2016 in EriZone & OTRS | 0 comments

With EriZone 3.6, which will be released at the end of this year, new features regarding the Activity Management will be introduced.
Activity tickets created in the context of Access Management can now be linked to each other to create a sequence. After that, the order of fulfillment of these activity tickets will respect the created sequence.
When an Access Management Activity is defined, it is possible to set it as available for sequence (prioritized), and/or to define on which other prioritized activity it depends. Afterwards, when the activity tickets concerning the Access Management are created, they will be automatically linked as defined.

Read More

How to use anomaly detection to create smarter alerts

Posted by on Nov 11, 2016 in Network Traffic Monitoring, Real User Experience Monitoring | 0 comments

Alarms and monitoring go hand in hand. Whenever an algorithm or threshold is used to decide whether the current value of a registered KPI should rise an alarm or not the result can be a hit, a correct reject, a miss or a false alarm.


The standard way to rise alarms is studying standard traffic – which should not rise alarms – and deciding on a static threshold based on the historic standard traffic (For example see Figure 1) and experience. Everything below the threshold is than considered as standard traffic and everything above rises an alarm. This kind of threshold-based alarm creation is robust to many outliers and might be sufficient if the mean of the standard traffic does not change dynamically (in that case the threshold needs to be adapted dynamically, too). Signals might contain also anomalies that are quite useful for problem detection that look very different from classic (more or less extreme) outliers. For example a change in the distribution or similar (see Figure 2, red area on the right) can be a first sign of instability and taking an immediate counter-action can prevent the anomaly turning into a real problem.


For this reason the study of alternative more sophisticated alerting mechanisms is a useful addition to current common practice.

Read More

Communicate with your NetEye through SOAP

Posted by on Nov 10, 2016 in NetEye | 0 comments

SOAP Interface

In the current version of our NetEye API we introduced a new way to interact with your NetEye through a SOAP interface. It gives you the possibility to communicate with third-party applications or with applications developed by yourself over a web interface. It uses simple XML-based messages sent via HTTP. But first some general details about SOAP.

Read More

Network traffic recording for higher IT security

Posted by on Oct 26, 2016 in NetEye, Network Traffic Monitoring | 0 comments


“Nine out of ten companies in Germany are targeted by hacker attacks” [1]

Nowadays, in the era of digitalization, keywords as IT security, and especially data security, are representing specific importance for modern companies. Through increasing networking and digitalization, infrastructures are more vulnerable than ever.

Just to provide you some numbers: There are one million cyber-attacks a day just on the Deutsche Telekom network [2], 6,000 at Volkswagen [3]. And even structures as hospitals are not safe from such attacks. [4]

This concerns all sectors – sensitive data is stolen to obtain ransom.
Companies therefore have to tighten up on security.

IDS no longer suffices

Read More

NetEye & EriZone User Group: the impressions

Posted by on Oct 25, 2016 in EriZone & OTRS, NetEye, Real User Experience Monitoring | 0 comments

The future is NOW – The strategic impact on the IT Management in the Big Data and Cloud era.

The eighth edition of our NetEye & EriZone User Group was held last Thursday – 20 October in Trento. The event dedicated to our customers is a proven model that provides a sharing platform to actively participate in the definition of our solutions’ new evolution phase.

Read More

Congratulations to the winners of the NetCla Challenge

Posted by on Oct 5, 2016 in NetEye, Network Traffic Monitoring, Real User Experience Monitoring | 0 comments

More than 100 Teams were competing, more than 25 sent in a solution, the best reaching a Macro-F1 scorse higher 0.88.

Last Friday, after six long weeks, the time had finally come. During ECML-PKDD conference at Riva del Garda the best of the competing approaches have been described and discussed. The participants had the possibility to get answers directly from the organizers and last but not least Iryna Haponchyk – leader of the winning team – was awarded 1000 Euro for the solution with the highest macro-F1 score, or better for having created a model capable of producing such a score. Here you can see the beaming winner during the discovery callenge prize

Iryna explained her team trained a standard multi-class linear SVM classifier, having preliminarily enriched the presented attribute set with features generated using a random forest and features encoding the notion of interdependency between the examples that go close to each other in time.

Read More

NetEye & EriZone User Group – 20th October 2016

Posted by on Oct 3, 2016 in EriZone & OTRS, NetEye, Real User Experience Monitoring | 0 comments


The future is now! 

The strategic impact on the IT Management in the Big Data and Cloud era
Cantine Ferrari, Trento, Thursday October 20th, 14:00 – 18:00

Discover the recent IT System & Service management innovations at the next NetEye & EriZone UserGroup, the unique event dedicated to our customers to identify emerging challenges in the ITSM and to participate in the definition of our solutions’ new evolution phase.

You will get in touch with the reality of the future that allows outlining the strategic impact on the management of Big Data, IoT, Cloud and SmartCity.

Read More

Why does my local network latency increase during working hours?

Posted by on Sep 22, 2016 in Capacity Management, NetEye, Network Traffic Monitoring, Real User Experience Monitoring | 0 comments

Sometimes you get a higher network latency during certain periods of the day.

Network section of a datacenter (1 Gigabit Ethernet) with normal, constant latency throughout the day

Network section of a datacenter (1 Gigabit Ethernet) with normal, constant latency throughout the day. Please consider that the typical latency for 1 Gigabit Ethernet connections is minor than 5ms.


Network section of a datacenter (1 Gigabit Ethernet) with increased latency during working hours

Network section of a datacenter (1 Gigabit Ethernet) with increased latency during working hours. Please consider that the typical latency for 1 Gigabit Ethernet connections is minor than 5ms.

Read More

Customer TouchPoint il 27 settembre a Bolzano

Posted by on Sep 15, 2016 in EriZone & OTRS, NetEye | 0 comments


Nuovi approcci e tecnologie per rendere più efficace il servizio alla clientela

Quali sono i veri driver di innovazione e cambiamento strategico in ambito di IT Service Management e Cloud Services? Il business break Customer TouchPoint vi offre un‘occasione unica per scoprire come aziende rinomate traggono un reale vantaggio in termini di organizzazione e qualità di servizio nella gestione delle richieste di assistenza clienti.

Read More

Continuously rising demand for the NetEye Shutdown Management solution

Posted by on Sep 15, 2016 in NetEye | 0 comments

Shutdown Management NetEye

More and more companies trust in the NetEye Shutdown Management solution.

Businesses from different branches (financial, chemical, public, industrial, commercial) already implemented our manufacturer-independent solution.

One main advantage of the NetEye Shutdown Management is the flexible integration of the shutdown policies for devices that are already inserted in the NetEye monitoring. Moreover, it is possible to create complex shutdown procedures by using the Business Process module.  You can for example launch the shutdown procedure by monitoring the remaining UPS time and the fuel status of the current generator.

Read More