Blog Entries

13. 10. 2025 Tobias Goller Log-SIEM, Unified Monitoring

Elastic Defend: Experiences

Around this time last year, I wrote a blog post about improving cybersecurity with Elastic Defend. Now, one year later, we’ve gained a lot of practical experience with it, which I’d like to share. Elastic Defend is an EDR (Endpoint Detection and Response). Unlike a traditional antivirus solution that relies on signature patterns that need…

Read More
10. 10. 2025 Attilio Broglio Icinga Web 2, NetEye, Unified Monitoring

Massive Clean-up of the Icinga custom_var (Services)

During one of my last sessions with a customer I had to deal with a very particular use case, where I couldn’t use the solution presented in my previous blog post (https://www.neteye-blog.com/2025/08/massive-update-of-the-icinga-custom_var-host-services/). In this new scenario, the customer wanted to clean up a custom_var linked to a service, whose value, inherited from the host, had…

Read More
08. 10. 2025 Damiano Chini Bug Fixes, NetEye

NetEye 4 – Security Advisory (Elastic Stack)

Important: Elastic Stack security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the elasticsearch and kibana packages is now available for NetEye 4. Security Fix for NetEye 4.44 CVEs The CVEs include three XSS vulnerabilities and two Broken Access Control vulnerabilities. For a detailed overview of the…

Read More
06. 10. 2025 Beatrice Dall'Omo Red Team, SEC4U

Vulnerability Trends & Metrics: Monthly Company Report

Effective Vulnerability Management doesn’t end with detection, it ends with action. And to take the right action, you need clear, accurate, and timely reports. In today’s fast-moving threat landscape, reporting is not just a formality, it’s a critical bridge between scan data and strategic security decisions. This article explores the role of reporting within the…

Read More
03. 10. 2025 Daniel Degasperi Blue Team, Log-SIEM, SEC4U

From Noisy Detections to Precision: Moving from KQL to ESQL in Elastic Security

Introduction In modern SOC environments, detection rules are the cornerstone of identifying malicious activity. However, the effectiveness of a rule depends not only on what it looks for but also on how precisely it defines suspicious behavior. Many analysts have experienced the pain of rules that are “noisy” – generating countless false positives (FPs) that…

Read More
01. 10. 2025 Fabrizio Dovesi Atlassian, Service Management

Project Managers Are rAIsing the Bar: Redefining the Rules of the AI Game

Insights into how project managers perceive AI reshaping the project management. At the Threshold of a New Project Management Era Over a decade ago, when I first read about how AI could reshape jobs, my main question was how it would affect the role I held then: Project Manager. Years later, after experimenting with the…

Read More
01. 10. 2025 Oscar Zambotti Downloads / Release Notes, NetEye, Unified Monitoring

NetEye 4.44 Release Notes

Welcome to version 4.44 of our NetEye v4 Unified Monitoring Platform. As you log in, you’ll be greeted by a crisp view of Lago di Braies, where summer’s warmth yields to autumn. The larches are turning brilliant shades of yellow and burnt orange, forming a vivid contrast with the deep green of the pines and…

Read More
30. 09. 2025 Paolo Seghetti NetEye, Unified Monitoring

Business Process Automation on NetEye

In NetEye, ‘business processes’ is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into a single screen, creating customized dashboards and generating notifications at the process level, rather than…

Read More
30. 09. 2025 Damiano Chini APM, Development, NetEye, Unified Monitoring

Segregating APM Data in Elastic: A Practical Guide to a Not-So-Obvious Challenge

If you’ve worked with Elastic APM, you’re probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in complex network zones? Let’s walk through a real-world scenario and how we tackled it. The…

Read More
30. 09. 2025 Marco Berlanda Development, DevOps, Kubernetes

A GitOps Path from Code to OpenShift Cluster

A modern web app isn’t one single big monolith: it’s made of quite a lot of pieces! For instance, we relied on a setup such as this one for a recent one we are developing: That’s a lot of moving parts. You could glue them together with scripts, sticky notes, and caffeine… but then most…

Read More
30. 09. 2025 Luigi Miazzo DevOps, Kubernetes, Uncategorized

Envisioning Satellite-Distributed Management with Kubernetes and Argo CD for NetEye.cloud

As our company’s NetEye cloud solution NetEye.cloud expands, we’re deploying compute nodes not only in our own data centers but, on customer premises across the globe – connected through satellite links. This hybrid, geo-distributed model creates a very tough challenge: How can we manage configuration across hundreds of remote machines reliably, and at scale? Why…

Read More
30. 09. 2025 Gabriele Bocchi Automation, Development, DevOps

How to Set Up Safe, Automatic Dependency Updates in Your Projects

Dependencies (frameworks, modules, plugins, etc.) are the lifeblood of modern software libraries. But managing them manually is a burden. By automating dependency updates (in a controlled, smart way), you can stay ahead of security issues, reduce technical debt, and make upgrades less painful. Below I’ll walk you through why automatic updates matter, what to watch…

Read More
29. 09. 2025 Giuseppe Di Garbo Atlassian, Service Management

Streamlining Service Request Management with ITIL4 and Jira Service Management

Introduction In every IT team, service requests are the everyday heartbeat of operations. From resetting a password, granting access to a tool, setting up new equipment, or answering a simple “how do I?” question, these are routine, predictable tasks. But if handled poorly, they can quickly lead to frustration, inefficiency, and higher costs. Service Request…

Read More
29. 09. 2025 Valentina Da Rold Atlassian, Development

Syncing Entra ID Groups and Members to Jira CMDB via Atlassian SCIM API: Key Lessons Learned

In a recent project, I was tasked with enabling the synchronization of Entra ID (formerly Azure AD) security groups and their members into an ITSM CMDB hosted on Jira. The objective was to ensure accurate visibility of group-to-user relationships, leveraging Atlassian’s SCIM 2.0 API capabilities. While the goal sounds straightforward – syncing groups and users…

Read More
29. 09. 2025 Oscar Zambotti Front-end, Vue

Summoning Orval: Binding Backend and Frontend by Magic

When building modern web applications, type safety and API consistency are essential. Instead of manually writing API clients and models (and risking drift between backend and frontend), you can automate the process using OpenAPI and Orval. In this post, we’ll focus on how to generate TypeScript functions and interfaces using Orval, starting from an openapi.json…

Read More

Archive