Save the date – 1st October – Italian NetEye & EriZone User Group
If you are an Italian NetEye or EriZone customer, don’t miss the opportunity to participate in the NetEye & EriZone User Group, which will take place on Thursday 1 October from 10.30 to 17:30 at the Tenuta Preella Lamberti in Cavaion Veronese (VR).
The day will begin with the IT service and systems management solutions use cases presented by some customers. The lunch will follow accompanied by the local wine tasting.
In the afternoon, we will introduce the new features released with the latest versions of NetEye and EriZone. We will conclude with a workshop during which all participants will identify the future areas of improvement for the development of the solutions.
If you are an Italian NetEye or EriZone customer, you can already subscribe to the User Group by sending an email to the following address usergroup@wuerth-phoenix.com
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More
Choosing the right backup solution is critical for system administrators and IT professionals. The upcoming NetEye 4.41 version will bring an update to MariaDB, moving from version 10.3 to 10.11. This makes it especially timely to explore the opportunities offered Read More
In NetEye environments we use Tornado to collect events, elaborate on them, and send notifications based on them from a lot of sources (syslog, email, SNMP traps and so on). In this article I'd like to suggest a different use Read More