Ideas are at the core of Jira Product Discovery. They are the units of work in Jira Product Discovery projects. An idea can ...
Offloading data enrichment to satellite machines with Logstash not only streamlined our architecture but also brought ...
The main goal of B2B software is to help businesses run more efficiently. Poorly designed UX, however, can slow users down with confusing layouts, redundant steps, or hard-to-find features. UX design ...
In high-demand environments, efficiency isn’t just an advantage – it’s essential. One of the biggest hurdles we encountered was the overwhelming strain placed on NetEye’s (Elastic) master nodes during ...
With the introduction of Alyvix Tags in NetEye 4.38, we’ve given users the ability to filter test cases and reports based on their tags, making it easier to focus on the specific test cases that ...
Ever since they began using Grafana Dashboards in the NetEye monitoring system, my customers have asked again and again whether they can create PDF files of what they see on their Grafana Dashboards.
Now we are going to create a new dashboard to visualize the disk usage of our docker host machine. Click on the title of the new Graph and select Edit. Now create the new metrics with the parameters ...
We have resolved an issue where icinga2 would fail to write state changes to the IDO and execute notifications during shutdown.
In my previous blog post, we had a long discussion about how Icinga 2 manages its configuration in a Distributed Monitoring environment and how this can lead to unwanted disclosure of sensitive data, ...
In this blog post I’d like to show the remarkable improvement in one particular case using the ES|QL language. Suppose we want to detect the creation of a considerable number of files on a Windows ...
Kasseika Threat Actor has joined the club of Threat Actors that currently use Bring Your Own Vulnerable Driver (BYOVD) tactics to disable antivirus/EDR software before carrying out malicious ...