Blog Entries

30. 09. 2025 Gabriele Bocchi Automation, Development, DevOps

How to Set Up Safe, Automatic Dependency Updates in Your Projects

Dependencies (frameworks, modules, plugins, etc.) are the lifeblood of modern software libraries. But managing them manually is a burden. By automating dependency updates (in a controlled, smart way), you can stay ahead of security issues, reduce technical debt, and make upgrades less painful. Below I’ll walk you through why automatic updates matter, what to watch…

Read More
29. 09. 2025 Giuseppe Di Garbo Atlassian, Service Management

Streamlining Service Request Management with ITIL4 and Jira Service Management

Introduction In every IT team, service requests are the everyday heartbeat of operations. From resetting a password, granting access to a tool, setting up new equipment, or answering a simple “how do I?” question, these are routine, predictable tasks. But if handled poorly, they can quickly lead to frustration, inefficiency, and higher costs. Service Request…

Read More
29. 09. 2025 Valentina Da Rold Atlassian, Development

Syncing Entra ID Groups and Members to Jira CMDB via Atlassian SCIM API: Key Lessons Learned

In a recent project, I was tasked with enabling the synchronization of Entra ID (formerly Azure AD) security groups and their members into an ITSM CMDB hosted on Jira. The objective was to ensure accurate visibility of group-to-user relationships, leveraging Atlassian’s SCIM 2.0 API capabilities. While the goal sounds straightforward – syncing groups and users…

Read More
29. 09. 2025 Oscar Zambotti Front-end, Vue

Summoning Orval: Binding Backend and Frontend by Magic

When building modern web applications, type safety and API consistency are essential. Instead of manually writing API clients and models (and risking drift between backend and frontend), you can automate the process using OpenAPI and Orval. In this post, we’ll focus on how to generate TypeScript functions and interfaces using Orval, starting from an openapi.json…

Read More
29. 09. 2025 Mirko Morandini Asset Management, GLPI, Knowledge Management, Service Management

Getting the M(u)st out of GLPI

TLTR1: Did you pick all the sweet grapes that grew in your vineyard? They’re sweet, but they degrade faster than you think. Now, to give them long-lasting value, get the must out of it and put a lot of knowledge, time and effort to create a high-value wine! TLTR2: Do you have an automatically fed…

Read More
29. 09. 2025 Davide Spano Azure, Microsoft

Secure Access to Applications with Azure

One overarching goal in the IT industry is to enable authorized users to securely access company resources. The implementation that fulfills this general requirement will depend on several factors, some of which will become clear as the topic unfolds. This article gives a logical and historical overview of what Secure Access is, the use cases…

Read More
29. 09. 2025 Antonio Cerullo Microsoft

Migration from Windows 10 to Windows 11 for Enterprise Clients

Introduction With the End of Support (EOS) date for Windows 10 approaching (it’s set in fact for October 14, 2025), companies must urgently plan their transition to Windows 11, as Windows 10 will no longer receive security updates after that date. This means non-updated devices will be exposed to vulnerabilities and thus be non-compliant with…

Read More
26. 09. 2025 Simone Ragonesi AI, Artificial Intelligence, Offensive Security, Red Team

The Evolving Security Landscape of MCP

Introduction: What is MCP? The Model Context Protocol is an emerging open standard that defines how large language models and AI agents interact with external tools, services, and data sources. Instead of every AI provider building its own proprietary “tool calling” system, MCP provides a common protocol (typically over JSON-RPC) to expose capabilities such as…

Read More
25. 09. 2025 Mattia Codato CTF Writeups, Development, Events

Preparing for WP CTF 2025

Summer is over, autumn is here – and so is the most anticipated event of the year for cybersecurity students: WP CTF 2025. Every year, the WP CTF draws cybersecurity students hungry to learn, compete, and put their skills to the test. Our marketing team has been working for months to organize an incredible event,…

Read More
23. 09. 2025 Luigi Miazzo Bug Fixes, NetEye

Bug Fixes for NetEye 4.43

Satellite config creation in HA mode using zone names with whitespaces We’ve addressed an issue where running the neteye satellite config create for a satellite configured in HA mode having whitespaces in the Zone name prevented the procedure to successfully execute. List of updated packages To solve the issues mentioned above, the following packages have…

Read More
23. 09. 2025 Csaba Remenar NetEye

Minimizing Downtime: NetEye MariaDB Database Rebuild with Containers and Logical Backup

Familiar with the feeling when a critical system’s backup and recovery time is measured in hours? Operations teams rely heavily on the availability of monitoring data, so scheduling long periods of downtime is simply not an option. We recently faced this exact challenge: we had to schedule a multi-hour downtime because our MariaDB database had…

Read More
19. 09. 2025 Matteo Cipolletta NetEye

Native Monitoring of the Logstash Dead Letter Queue

When working with Logstash in production, one of the often-overlooked areas is the Dead Letter Queue (DLQ). This queue stores events that Logstash cannot process, usually due to parsing errors, mapping conflicts, or pipeline misconfigurations. While the DLQ is useful for troubleshooting, leaving it unmonitored can be dangerous: if it grows unnoticed, critical data might…

Read More
19. 09. 2025 Alessandro Taufer Development, DevOps

How to Debug Your Kernel Calls

Unexpected reboots, who doesn’t love them? A few weeks ago, we faced a problem that any platform engineer dreads: one of our nodes rebooted unexpectedly. The cause? The iDRAC watchdog forcefully terminated it. But what led iDRAC to decide it was time to shut down the node? A preliminary investigation concluded that there wasn’t any…

Read More
16. 09. 2025 Davide Sbetti DevOps, Kubernetes

Monitoring DBs through PMM: a Migration to OpenShift

Hi 😀 Today I’d like to explore with you a migration that we performed to a service that’s used internally to monitor the performance of various DBs, gathering data that’s especially useful for troubleshooting. This tool is the Percona Monitoring and Management (PMM) platform, which combines agents or direct access to various supported DBMS (MySQL,…

Read More
15. 09. 2025 Reinhold Trocker Log Management, Log-SIEM

Want to Manage a Large Elastic Agent Fleet?

Managing a large fleet of Elastic Agents efficiently requires careful planning and proactive strategies to ensure stability, scalability, and security. As a technical consultant, I’d like to present some key considerations to help organizations avoid common pitfalls and streamline their operations. 1. Avoid Trust Issues One of the most critical aspects of managing an extensive…

Read More

Archive