sub-asset creation for advanced inventory management of PC componets (like...
Hello. My organization needs the ability to track the location of sub-components in PCs (PCI graphics cards, primarily) -- which for reasons I won't get into are occasionally transferred from one PC...
View ArticleAre you using Alert Central in Production?
Tell us what's up with using Alert Central in production. Are you there yet? What's stopping you? Missing features, that super annoying alerts bug that we're fixing, something else?
View ArticleWould You Put On a Real Thinking Cap?
According to @UberFacts, there's news spreading that scientists have created a "thinking cap" that allows you to learn faster. If you had an opportunity to put one on, would you give it a try?
View ArticleNPM - NOC View mode - combine all NOC views configured into one noc view
Hi All, I have been experimenting with the NOC view mode and demonstrated this to my colleagues. We have determined that our customers will benefit from the NOC view feature and an alternative way of...
View ArticleRenaming a user account in NPM
Is there an easy way (ensuring all view customisations also carry over) to rename a user in NPM? We're using v10.5, and a simply rename within a couple of the Db tables will have the user complaining...
View ArticleBest Practices for LEM Memory Allocation
One of the regular sets of issues we see on the Support Desk comes from memory problems on the LEM appliance. There's the minimum requirements for LEM (which you can check out here:...
View ArticleIs it possible to programmatically search NCM configs using SWIS API?
I would like to grep config archives using script since that provides me with far more flexibility. Any pointers in the right direction?
View ArticleRegarding error "ERROR: Cannot download Running config : Connection Refused by"
Hi all, Hope you are doing good. I Kaustubh Chavan using Solarwinds ( version for 7.0.2) for auto backup of network devices on daily basis but getting below error for few of the devices & else...
View ArticlePURGE DATA SOLARWINDS LEM
Hi Guysanyone know how i can purge growing data (logs) for maintenance the appliance??Regards
View ArticleHow do we programmatically discover the non-interface properties [in Orion]...
We are automating the hydration of assets in Orion, and after adding a node, we know how to discover the interfaces, but how do we programmatically discover the non-interface properties and enable them...
View ArticleAnnouncing General Availability of SolarWinds IP Address Manager 4.3 and User...
IPAM and UDT have combined like Voltron to form the new IP Control Bundle and as an IT "pro-", you may finally say goodbye to the painful and long IP Address Conflicts troubleshooting. Say goodbye to...
View ArticleFull Accounting of Thwack Points
It would be nice if we were able to see where all our Thwack Points have from.Currently we are only able to see points from polls and ideas. We are not able to see points from missions accounted for.
View ArticleIf...Then...Else statements for Alert Manager
I think it would make managing alerts much easier if we were able to build an if-then-else statement into the actions for an alert. My example...I create an alert for a particular set of criteria, but...
View ArticleHow often do you check your logs?
With all this focus on logging in Thwackworld, the question that begs to be answered is:How often do you check your logs
View ArticleFEATURE REQUEST - Backing-up .UCS files from F5 LTM
is there a way to back-up the .ucs archive files from F5 loadbalancers ? the templates to backup the configuration file is good but doesn't serve the purpose in case one has to build a F5 box from...
View ArticlethwackCamp 2014 - Fill up your IT Toy Box: Get on the Budget "Good" List
SESSION 1 -JOIN US ON THE MAIN THWACKCAMP PAGE FOR THE LIVE STREAM AND CHAT NOW. THE SESSION WILL START AT 9AM SHARP.Even the most proactive IT gurus end up with end-of-year asks to deliver new and...
View ArticleBlinding the All-Seeing Eye
When implementing a SIEM infrastructure, we’re very careful to inventory all of the possible vectors of attack for our critical systems, but how carefully do we consider the SIEM itself and its logging...
View Article