Blog Entries

20. 09. 2019 Angelo Rosace Uncategorized

Selenium Flakiness and How to Tackle It

A piece of code can’t be considered good if it doesn’t work properly. One of the questions that arises from the previous sentence is, “So how can I know that my code is actually doing what it’s supposed to be doing?” The quick and easy answer is: Tests. But how can you decide which types…

Read More
19. 09. 2019 NetEye Blog Admin Uncategorized

NetEye @ the Security Summit 2019

Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection. Visit us at the Security Summit edition in Verona to hear from our team how to best identifying, gathering, monitoring and reporting security-related events in your software environment with NetEye.

Read More
17. 09. 2019 Angelo Rosace NetEye

How To: Using the Elastic Watcher Feature to React to Failed Login Attempts (Part 2)

Our continued development of the Tornado event processing module has led to a new set of functionalities and capabilities. Among these is the possibility of altering host and service statuses as the result of a certain event. Let’s look at a typical use case for this feature. Suppose you want to trigger a webhook that…

Read More
16. 09. 2019 NetEye Blog Admin NetEye

The Icinga Camp in Milan – See the agenda

The Icinga Camp is powering up for the first time in Italy. Most of the renowned names in IT monitoring projects, as well numerous Open Source experts will strive for software innovation at this unique event. So give your experience a boost! Last places are available, so register now to see these inspiring approaches and…

Read More
03. 09. 2019 Massimo Giaimo Information Security Operations Center, NetEye, Security

NetEye SIEM: The Attacker’s Point of View

In our ethical hacking activities there are three different phases in which we clash with the themes of SIEM: PLANNING – The phase prior to the activity where we define the scope of engagement, be it for a Vulnerability Assessment, a Penetration Test or simulating a real attack CHALLENGE – The activity, corresponding to Vulnerability…

Read More
03. 09. 2019 Luca Franzoi NetEye, NetEye Updates

Security Fix for NetEye 3.17

A vulnerability has been detected on the Nagios web interface. Attackers may exploit this vulnerability to gain access to sensitive information or crash the affected application, denying service to legitimate users. To guarantee the security of your system, we recommend applying last released patch: neteye-3.12.1-3.5.1p8.nagios.1.x86_64.rpm . Update your system using following commands: yum clean all…

Read More
23. 08. 2019 Valentina Da Rold NetEye, NetEye Updates

Bug Fixes for NetEye 4.7

Fixed monitoring module and PDF report rendering in case of special chars. Fix Grafana setup in order to correctly manage Elasticsearch queries. For NetEye 4.7 we updated: icingaweb2 to version: 2.6.2_neteye1.41.1-3 icingaweb2-module-neteye to version: 1.26.1-1 icingaweb2-module-analytics to version: 1.11.0-1 neteye-setup to version: 1.20.0-2 searchguard-plugin-common to version: 0.9.0-1

Read More
22. 08. 2019 Luca Buonocunto ITIL, NetEye ITOA

Understand Data If You Want to Visualize Data

Have you ever thought that the New York Times on an average Sunday contains more information than a Renaissance-era person had access to in his entire lifetime? (Richard Saul Wurman – Information Anxiety) This is what we mean by information overload, and it is especially true when dealing with IT. Performing sophisticated data analysis no…

Read More
13. 08. 2019 Francesco Cina NetEye, NetEye Updates

Bug Fixes for NetEye 4.7

Set correct permission to the Tornado email collector so it can receive emails from non root users. For NetEye 4.7 we updated: tornado to version 0.15.1-1

Read More
09. 08. 2019 Andrea Avancini Log Management, NetEye

Automatic Load Test of Rsyslog, Logstash, and Elasticsearch

At Würth Phoenix we take testing very seriously. NetEye 4 is a sophisticated product that operates in complex and business-critical environments, so it requires lots of tests before being released. One challenging part of the testing phase is load testing, where the functionalities of a system are subject to predetermined levels of load. NetEye customers…

Read More
09. 08. 2019 Michele Santuari NetEye, NetEye Updates

Bug Fixes for NetEye 4.7

Allow overriding the Elasticsearch quorum (e.g., minimum_master_nodes). Documentation can be found in User Guide -> Log Manager -> Elasticsearch Clusters. For NetEye 4.7 we updated: icingaweb2-module-logmanager to version: 0.26.3-1 elasticsearch-neteye-config to version: 1.7.4-1

Read More
08. 08. 2019 Andrea Detassis NetEye, NetEye Updates

Bug Fixes for NetEye 4.7

Fix Elasticsearch bind configuration using private Node IP, fix typo in Elasticsearch configuration link name. For NetEye 4.7 we updated: elasticsearch-neteye-config to version: 1.7.3-1 neteye-setup to version: 1.19.3-1

Read More
07. 08. 2019 Luca Buonocunto ITIL

A Roadmap to Continuous Improvement

To ensure quality in your environment you need to constantly improve. Continuous improvement is measuring key quality and other process indices in all areas, and taking actions to improve them. These indices could include process outputs, customer satisfaction scores, design errors, warranty returns, or any of a number of other measures used to characterize a…

Read More
07. 08. 2019 Valentina Da Rold NetEye, NetEye Updates

Bug Fixes for NetEye 4.7

Update userguide where the logmanager no-agent deployment procedure is described. Fix packages order in the packages.ini file in order to correctly restart all the needed services also in cluster environment. For NetEye 4.7 we updated: icingaweb2-module-logmanager to version 0.26.2-1 neteye-setup to version 1.19.2-1

Read More
05. 08. 2019 Alessandro Romboli Asset Management, NetEye

Monitoring a Cisco Wireless Controller

Scenario Cisco WLC is widely used by many Enterprise Companies to manage their wireless networks due to its efficiency and advanced features. Its management web console has a wealth of configuration parameters, but it doesn’t offer a clear overview on what’s happening across the wireless network. Fortunately, a lot of real time information is available…

Read More

Archive