Bug Fixes for NetEye 4.22
We fixed a bug that was setting an incorrect target version during the upgrade. For NetEye 4.22 we updated the following package: neteye-upgrade-manager to version 0.12.24-1
Read MoreWe fixed a bug that was setting an incorrect target version during the upgrade. For NetEye 4.22 we updated the following package: neteye-upgrade-manager to version 0.12.24-1
Read MoreWe fixed a bug that caused an error when generating a resource report in SLM with a large number of panels. For NetEye 4.22 we updated the following packages: icingaweb2-module-slm,icingaweb2-module-slm-autosetup to version 4.19.0-1 grafana-panel-renderer to version 1.3.1-1 We fixed a problem that was preventing the generation of PDF pages For NetEye 4.23 we updated the…
Read MoreOn January 29th, I attended my first CTF (capture the flag) competition: the Insomni’hack teaser.Based on my skills, I decided to go for the challenge called Vault which consists of a web-based vault of five pages: a home page, one where you can see the key/value pair you entered after logging in, a page for…
Read MoreSynopsis High impact: Grafana security update Type/Severity Security Advisory: High impact Topic An update for grafana is now available for NetEye 4.22. NetEye Product Security has rated this update as having a security impact of High. Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability and give a detailed severity rating….
Read MoreThe Monitoring Plugins have been updated to version 2.3.1 and released in beta.Please have a look at the official documentation for the full list of improvements. Before running the update it is necessary to execute the following command to see if there are any previously modified files: rpm -qV monitoring-plugins Output example:S.5….T. d /usr/lib64/neteye/monitoring/plugins/check_time If…
Read MoreWe fixed a bug in NetEye 4.21 that caused the selected interface to be lost when navigating between pages. For NetEye 4.21 we updated the following packages: icingaweb2-module-ntopng, icingaweb2-module-ntopng-autosetup to version 1.5.4-1
Read MoreWe fixed a bug that caused the ES_CLUSTER_INITIAL_MASTER variable to be overwritten when a new Elastic-only node was added to the cluster. For NetEye 4.19 we updated the following packages: apm-server, apm-server-autosetup, apm-server-neteye-config, elasticsearch, elasticsearch-autosetup, elasticsearch-neteye-config, elasticsearch-xpack-license, filebeat, filebeat-autosetup, filebeat-neteye-config, kibana, kibana-autosetup, kibana-neteye-config, logstash, logstash-autosetup, logstash-neteye-config, logstash-neteye-config-autosetup to version 7.12.1_neteye3.30.3-1
Read MoreWith this bugfix, we fixed a problem in the availability contracts of the SLM module related to the monitoring filter of the customer role. For NetEye 4.19 we updated the following packages: icingaweb2-module-slm, icingaweb2-module-slm-autosetup to version 4.14.4-1
Read MoreWith this bugfix, we fixed the button to add an annotation to a panel in the ITOA module. For NetEye 4.19 we updated the following packages: grafana, grafana-autosetup, grafana-neteye-config to version 7.5.5_neteye3.13.1-1
Read MoreWith this bugfix, we fixed a problem in Telegraf package that caused the configuration file to be lost. For NetEye 4.19 we updated the following packages: telegraf, telegraf-autosetup to version 1.16.3_neteye2.6.3-1
Read MoreWith this bugfix, we fixed a problem in ntopng module that did not allow creating hosts pools. For NetEye 4.19 we updated the following packages: icingaweb2-module-ntopng, icingaweb2-module-ntopng-autosetup to version 1.5.1-2
Read MoreIn Würth Phoenix we usually organize a workshop with the Icinga2 team twice a year. These workshops are an opportunity for all participants to show the latest developments, propose new ideas and explore new solutions. They’re always very inspiring days with an incredible flow of ideas and a lot of code written. During this year’s…
Read MoreSynopsis Important impact: httpd security update Type/Severity Security Advisory: Important impact Topic An update for httpd is now available for NetEye 4.17. NetEye Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating. Description httpd is the Apache…
Read MoreWe fixed two security vulnerabilities related to the web interface.They were related to the cross-site request forgery attack and the clickjacking attack.Both are used to induce users to perform actions that they do not intend to perform by hiding the NetEye web interface under some eye-catching pages or with some malicious links sent for example…
Read MoreWe fixed a bug that prevented changes from propagating to the satellite via Smart Director. For NetEye 4.17 we updated the following packages: icinga2, icinga2-autosetup, icinga2-bin, icinga2-common, icinga2-debuginfo, icinga2-doc, icinga2-ido-mysql, icinga2-ido-pgsql, icinga2-neteye-config, icinga2-resources, icinga2-selinux to version 2.11.6_neteye1.32.1
Read More