Installing Bitwarden
In this post we will see how we can simply deploy an open source password manager on the network for our company, house… The idea is to have a website where we centralize and have the passwords of any site protected.
In this post we will see how we can simply deploy an open source password manager on the network for our company, house… The idea is to have a website where we centralize and have the passwords of any site protected.
And Monday arrived! and with it, a podcast for YOU! And today an epic episode, Tap Discover, strip, Find out what's new in Windows Server 2022; Microsoft's latest server operating system. Press Play!
It's time to give Telegraf a little, I have a few posts pending that I think may be interesting, so if you think it's okay, Today we will see how to assemble the base, InfluxDB to store metrics, Chronograf as your native viewer; and, How could you not, Grafana, 'Cause we all know it's the best metrics visualizer and we'll do magic.
I think that today there are not many who do not know what a Honeypot is, and how good it can be for us to have it implemented in our infrastructures. The idea of these gadgets as we know is to alert and detect attacks or curious people on the network; Well, in this post, we will also see how to integrate it with Centreon.
A fundamental configuration in GLPI will usually be to integrate it with a directory service such as an organization's Active Directory. The idea will be to standardize, that users, clients, Suppliers, Technical… can use the same user they usually use on their computers.
Very good, I had to publish something about Moodle for years, So today we bring you a first post where we will see the installation part. Consequently, We will have our own learning platform, Usually aimed at training centres (colleges, universities, Academies…), Full-fledged e-learning!
Today in “A Podcast for IT” we have a talk about Centreon, We talk about what it is, What you can offer us, How it can be assembled, Things to keep in mind, What we can monitor, how… And above all, how we can exploit and grow the infrastructure monitoring layer.
Well, in case anyone remains unaware… Did you know that there is an excellent PowerShell technical book in Spanish?? If you have Windows machines in your work environment… You have no choice but to get to know this Swiss Army knife. And for me the best way to learn is with this type of technical books.
Something curious and that depending on the circumstances may come in handy may be to know the SLA of any service that we are currently monitoring in our Centreons. It can also be designed for when we monitor at the Business level, to give visibility into your availability.
And we continue with more strange things… today the first one of collecting Logs to the Ubiquiti Unifi environment, of our APs, Switches… for the second time we parse., we treat the Logs with Logstash and for dessert we store it in Elasticsearch, and the icing on the cake will be visualizing it with Grafana. All this to control in real time what happens in our communications infrastructure, who is trying to access the Wisfis…