Nagios Conference 2013 - Michael Medin - NSClient++ Whats NewNagios
Michael Medin's presentation on NSClient++ Whats New.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
OSMC 2013 | Making monitoring simple? by Michael MedinNETWAYS
In diesem Vortrag wird der neue vereinfachte Monitoring Agent NSClient++ vorgestellt. Mit der kommenden 0.4.2 Release von NSClient++ wird es nun endlich ein neues Check Subsystem geben, welches nicht nur auf aktuellen Windows-Systemen laufen, sondern dabei auch noch sehr schnell sein wird. Der Vortrag zeigt die neue vereinfachte Syntax sowie das Real-Time-Monitoring über alle Kommandos von NSClient++ hinweg. Ergänzend wird es Updates an der Linuxfront und dem agentenlosen Monitoring geben.
Review unknown code with static analysis php ce 2018Damien Seguy
Code quality is not just for christmas, it is a daily part of the job. So, what do you do when you're handed with a five feet long pole a million lines of code that must be vetted ? You call static analysis to the rescue. During one hour, we'll be reviewing totally unknown code code : no name, no usage, not a clue. We'll apply a wide range of tools, reaching for anything that helps us understand the code and form an opinion on it. Can we break this mystery and learn how everyone else is looking at our code ?
Nagios Conference 2013 - Michael Medin - NSClient++ Whats NewNagios
Michael Medin's presentation on NSClient++ Whats New.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
OSMC 2013 | Making monitoring simple? by Michael MedinNETWAYS
In diesem Vortrag wird der neue vereinfachte Monitoring Agent NSClient++ vorgestellt. Mit der kommenden 0.4.2 Release von NSClient++ wird es nun endlich ein neues Check Subsystem geben, welches nicht nur auf aktuellen Windows-Systemen laufen, sondern dabei auch noch sehr schnell sein wird. Der Vortrag zeigt die neue vereinfachte Syntax sowie das Real-Time-Monitoring über alle Kommandos von NSClient++ hinweg. Ergänzend wird es Updates an der Linuxfront und dem agentenlosen Monitoring geben.
Review unknown code with static analysis php ce 2018Damien Seguy
Code quality is not just for christmas, it is a daily part of the job. So, what do you do when you're handed with a five feet long pole a million lines of code that must be vetted ? You call static analysis to the rescue. During one hour, we'll be reviewing totally unknown code code : no name, no usage, not a clue. We'll apply a wide range of tools, reaching for anything that helps us understand the code and form an opinion on it. Can we break this mystery and learn how everyone else is looking at our code ?
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelJakub "Kuba" Sendor
From the moment of the threat detection, first response throughout the analysis, and the final resolution, we make sure that we can catch as many incidents as possible and properly sanitize the environment so that the potential problems are cut short. All this in an automated and orchestrated fashion, eliminating the manual repetition as much as possible thanks to the in-house built tools like AIR (Automated Incident Response), OSXCollector (Mac OS X forensics collection) and ElastAlert (alerting out of Elasticsearch). We also complement the pipeline with some available open source tools, like osquery and other proprietary threat detection technologies. This adds up to a balanced ecosystem that helps us leverage the current assets, learn about the potential problems quickly and respond to them in a timely fashion.
Solo PHP. Niente trucchi e niente inganno (ne Javascript ne Web). Ci imbarcheremo nell’odissea che porta un programmatore a pensare di poter scrivere videogiochi con PHP e SDL. Disegnare sullo schermo, gestire gli input, fare il play di audio e gestire il mixer.
PHPDay GrUSP edition 2022
The vital element in all of this is your people. After all, Success is Simply Human. We will explore the benefits of high levels of employee engagement, and the impact of poor employee engagement. Most importantly, we will discuss simple measures you can take, along with tools and services you can deploy, to greatly improve this most crucial point – employee engagement
The past and present of L&D, the new navigation signs, what remains true for L&D professionals, and questions to ponder. Presentation from Drive Performance event at ANCILE headquarters, October 2016
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelJakub "Kuba" Sendor
From the moment of the threat detection, first response throughout the analysis, and the final resolution, we make sure that we can catch as many incidents as possible and properly sanitize the environment so that the potential problems are cut short. All this in an automated and orchestrated fashion, eliminating the manual repetition as much as possible thanks to the in-house built tools like AIR (Automated Incident Response), OSXCollector (Mac OS X forensics collection) and ElastAlert (alerting out of Elasticsearch). We also complement the pipeline with some available open source tools, like osquery and other proprietary threat detection technologies. This adds up to a balanced ecosystem that helps us leverage the current assets, learn about the potential problems quickly and respond to them in a timely fashion.
Solo PHP. Niente trucchi e niente inganno (ne Javascript ne Web). Ci imbarcheremo nell’odissea che porta un programmatore a pensare di poter scrivere videogiochi con PHP e SDL. Disegnare sullo schermo, gestire gli input, fare il play di audio e gestire il mixer.
PHPDay GrUSP edition 2022
The vital element in all of this is your people. After all, Success is Simply Human. We will explore the benefits of high levels of employee engagement, and the impact of poor employee engagement. Most importantly, we will discuss simple measures you can take, along with tools and services you can deploy, to greatly improve this most crucial point – employee engagement
The past and present of L&D, the new navigation signs, what remains true for L&D professionals, and questions to ponder. Presentation from Drive Performance event at ANCILE headquarters, October 2016
Michael introduced new and upcoming features of NSClient++ such as real-time log file analytic as well as real-time system monitoring. He also introduced the new remote agent-less monitoring features as well as protocol enhancements and distributed setups.
University of Virginia
cs4414: Operating Systems
http://rust-class.org
What happened with Apple's SSL implementation
How to make sure this doesn't happen to you!
Sharing data
ARCs in Rust
Scheduling
For embedded notes, see:
Description of the API concept for engineering and how it can be useful. Particularly how it should be used with respect to genomics data. Finally, an analogy of the API concept in synthetic biology and how evolution allows encapsulation.
Teaching Your Machine To Find FraudstersIan Barber
The slides from my talk at PHP Tek 11.
When dealing with money online, fraud is an ongoing problem for both
consumers and sellers. Researchers have been developing statistical
and machine learning techniques to detect shady sellers on auction
sites, spot fraudulent payments on e-commerce systems and catch click
fraud on adverts. While there is no silver bullet, you will learn to
flag suspicious activity and help protect your site from scammers
using PHP and a little help from some other technologies.
10 Rules for Safer Code [Odoo Experience 2016]Olivier Dony
In this talk, we will cover the top 10 development mistakes that lead to security issues. Olivier Dony will go through all the security issues we have had over the past 3 years and give tips on how to avoid the traps for safer Odoo code.
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
From ATT&CKcon 3.0
By Haylee Mills, Splunk
Having ATT&CK to identify threats, prioritize data sources, and improve security posture has been a huge step forward for our industry, but how do we actualize those insights for better detection and alerting? By shifting to observations of behavior over one-to-one direct alerts, noisy datasets become valuable treasure troves with ATT&CK metadata. Additionally, we can begin to look at detection and threat hunting on behavior instead of users or systems. In this presentation, Haylee will discuss the shift in mindset and the nuts and bolts of detections that leverage this metadata in Splunk, but the concept can be applied with custom tools to any valuable security dataset.
Hunting for malicious modules in npm - NodeSummitAdam Baldwin
Ever since the threat of an npm worm became public we've been thinking about how to detect malicious modules in our ecosystem and how to provide security teams auditing modules with tooling and intel to make informed decisions about module risk. We've built a system to analyze modules based on their installation behavior. This talk will discuss the results of this endeavor and share the interesting findings from this new and previously unexplored dataset and try to answer the question if a npm worm is lurking in the shadows.
Mind your language(s), A Discussion about Languages and SecurityAdaCore
Following several studies conducted by the French Network and Information Security Agency (ANSSI), this presentation discusses the question of the intrinsic security characteristics of programming languages. Through illustrations and discussions, it advocates for a different vision of well-known mechanisms and is intended to provide some food for thoughts regarding languages and development tools.
Há mais de uma década que os ataques às aplicações web (webapp) são constantes, sendo muitos deles bem sucedidos. Como consequência disso, as webapp são conhecidas pela falta de segurança de software, deixando os dados por elas acedidos desprotegidos. Tal, deve-se à falta de construção de código seguro, ou seja, ao desenvolvimento de webapp com implementação de código seguro.A classe de vulnerabilidades mais explorada nestas aplicações é a de validação de inputs (input validation vulnerabilities), permitindo aos atacantes introduzirem inputs maliciosos (ex., em formulários da webapp) que não são sanitizados e/ou validados pela webapp e que serão parâmetros de funções susceptíveis de serem exploradas por ataques. A injecção de SQL (SQLI) e o XSS refletido são as duas vulnerabilidades mais conhecidas e mais exploradas, desta classe de vulnerabilidades.
Details on how we capture application data in our access and error logs, as well as how to generate quick reports and graphs from these logs.
This talk was presented at O'Reilly's Velocity Online Conference on October 26, 2011.
Similar to NSClient++ whats new for 0.3.9 users (20)
The technology of tomorrows integration plattformMichael Medin
A more technical appendix for the integration platform of tomorrow presentation we did at radar I2I. This is from the Integration Stockholm meetup. It details how the next generation enterprise integration platform is being built at many of our customers.
A presentation I held at Radar Groups I2I conference about how to build the next generation enterprise integration platform: The executive summary is: Simplicity
Automated monitoring with NSClient++ and IcingaMichael Medin
A brief guide on how to create scripts to automate configuration management in Icinga from NSClient++. Not only will we setup the host when NSClient++ is installed we will also setup relevant service monitoring as well depending on what is running on the machine.
Continuous delivery from the trenches Redhat Forum EditionMichael Medin
How we approached CI/CD in an enterprise settings from within. The talk describe the process on which we focused instead of tools. This is the same as the others but widescreen...
A presentation form Integration Stockholm where we shared our collected thoughts on how to implement Continuous Delivery in mainly Enterprise organisations. What has worked for us and what did not work and how to approach CI/CD and succeed...
Continuous Delivery is easy in development projects and modern organisation who delivery services but how is it with all the enterprise customers? How do get continuous delivery when we work with "customized COTS"?
Slides from a Oracle SOA Suite 12c training I did for r2m.
The goal was to prepare for the 1z0-434 certification.
This is part 1 of 3 (co-workers will do other parts, but I will link them as they happen in over the next few weeks).
The labs and demo can be found here: https://github.com/mickem/soa-12c-assignments
What happens when a SOA success meets the cloud for the first time? And how to avoid the inevitable...
A presentation I did at radars i2i (Integrate 2 Innovate) conference in Stockholm.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
16. Level Source … …
Error Word … …
Error Excel … …
Info Word … …
Warning Excel … …
Error App1 … …
Warning App1 … …
Error App3 … …
filter=”source=’App1’ or source=’App3’”
17. Level Source … …
Error Word … …
Error Excel … …
Info Word … …
Warning Excel … …
Error App1 … …
Warning App1 … …
Error App3 … …
filter=”source=’App1’ or source=’App3’
or level=’error’”
18. Level Source … …
Error Word … …
Error Excel … …
Info Word … …
Warning Excel … …
Error App1 … …
Warning App1 … …
Error App3 … …
filter=”source=’App1’ or source=’App3’
or level=’error’ or level=’warning’”
19. Level Source … …
Error Word … …
Error Excel … …
Info Word … …
Warning Excel … …
Error App1 … …
Warning App1 … …
Error App3 … …
filter=”(source=’App1’ or source=’App3’
or level=’error’ or level=’warning’) and
source!=’Excel’”
20. Level Source … …
Error Word … …
Error Excel … …
Info Word … …
Warning Excel … …
Error App1 … …
Warning App1 … …
Error App3 … …
filter=”(source = ’App1’ or source =
’App3’or level = ’error’ or level =
’warning’) and source != ’Excel’”
filter=”(source in (’App1’,’App3’) or
level in (’error’,’warning’)) and source
!= ’Excel’”
21. filter = (id NOT IN ('3', '4', '6', '11', '16', '23', '24', '27', '29', '36', '46', '47',
'50', '56', '134', '142', '219', '267', '270', '1006', '1009', '1014', '1030', '1035',
'1036', '1055', '1058', '1071', '1073', '1085', '1102', '1110', '1111', '1112', '1131',
'1291', '1500', '3095', '5719', '5722', '5783', '5788', '5789', '6008', '7000', '7001',
'7003', '7005', '7009', '7011', '7022', '7023', '7024', '7026', '7030', '7031', '7034',
'7038', '7041', '9015', '9018', '9026', '9028', '10009', '10010', '10016', '10149',
'12294', '15300', '15301', '24679', '36887', '36888', '40960', '40961', '45056') AND
level IN ('error', 'warning')) OR (id IN ('3') AND source NOT IN ('FilterManager') AND
level IN ('error', 'warning')) OR (id IN ('4') AND source NOT IN ('q57','L2ND') AND level
IN ('error', 'warning')) OR (id IN ('6') AND source NOT IN ('Security-Kerberos') AND
level IN ('error', 'warning')) OR (id IN ('11') AND source NOT IN ('Kerberos-Key-
Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('16') AND source NOT
IN ('WindowsUpdateClient') AND level IN ('error', 'warning')) OR (id IN ('23') AND source
NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('24') AND source NOT IN
('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('27') AND source NOT IN
('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('29') AND source NOT IN
('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('36')
AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('46')
AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('47')
AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('50')
AND source NOT IN ('TermDD','Time-Service') AND level IN ('error', 'warning')) OR (id IN
('56') AND source NOT IN ('TermDD') AND level IN ('error', 'warning')) OR (id IN ('134')
AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('142')
AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('219')
AND source NOT IN ('Kernel-pnp') AND level IN ('error', 'warning')) OR (id IN ('267') AND
source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('270') AND
source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('1006')
AND source NOT IN ('DNS Client Events','GroupPolicy') AND level IN ('error', 'warning'))
OR (id IN ('1009') AND source NOT IN ('picadm') AND level IN ('error', 'warning')) OR (id
IN ('1014') AND source NOT IN ('DNS Client Events') AND level IN ('error', 'warning')) OR
(id IN ('1030') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR
(id IN ('1035') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level
IN ('error', 'warning')) OR (id IN ('1036') AND source NOT IN ('TerminalServices-
RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1055') AND
source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1058') AND
source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1071') AND
source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error',
'warning')) OR (id IN ('1073') AND source NOT IN ('USER32') AND level IN ('error',
'warning')) OR (id IN ('1085') AND source NOT IN ('GroupPolicy') AND level IN ('error',
'warning')) OR (id IN ('1102') AND source NOT IN ('SNMP') AND level IN ('error',
'warning')) OR (id IN ('1110') AND source NOT IN ('GroupPolicy') AND level IN ('error',
'warning')) OR (id IN ('1111') AND source NOT IN ('Server Agents') AND level IN ('error',
'warning')) OR (id IN ('1112') AND source NOT IN ('GroupPolicy') AND level IN ('error',
'warning')) OR (id IN ('1131') AND source NOT IN ('TerminalServices-
RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1291') AND
source NOT IN ('NIC-agents') AND level IN ('error', 'warning')) OR (id IN ('1500') AND
source NOT IN ('SNMP') AND level IN ('error', 'warning')) OR (id IN ('3095') AND source
NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5719') AND source NOT
IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5722') AND source NOT IN
('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5783') AND source NOT IN
('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5788') AND source NOT IN
('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5789') AND source NOT IN
('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('6008') AND source NOT IN
('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('7000') AND source NOT IN
('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7001') AND
source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN
('7003') AND source NOT IN ('service control manager') AND level IN ('error', 'warning'))
OR (id IN ('7005') AND source NOT IN ('service control manager') AND level IN ('error',
'warning')) OR (id IN ('7009') AND source NOT IN ('service control manager') AND level IN
('error', 'warning')) OR (id IN ('7011') AND source NOT IN ('service control manager')
AND level IN ('error', 'warning')) OR (id IN ('7022') AND source NOT IN ('service control
manager') AND level IN ('error', 'warning')) OR (id IN ('7023') AND source NOT IN (
('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7024') AND
source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN
('7026') AND source NOT IN ('service control manager') AND level IN ('error', 'warning'))
OR (id IN ('7030') AND source NOT IN ('service control manager') AND level IN ('error',
'warning')) OR (id IN ('7031') AND source NOT IN ('service control manager') AND strings
not like 'citrix' AND level IN ('error', 'warning')) OR (id IN ('7034') AND source NOT IN
('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7038') AND
source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN
('7041') AND source NOT IN ('service control manager') AND level IN ('error', 'warning'))
OR (id IN ('9015') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR
(id IN ('9018') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id
IN ('9026') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN
('9028') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN
('10009') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id
IN ('10010') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR
(id IN ('10016') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning'))
OR (id IN ('10149') AND source NOT IN ('WindowsRemoteManagement') AND level IN ('error',
'warning')) OR (id IN ('12294') AND source NOT IN ('Directory-Services-SAM') AND level IN
('error', 'warning')) OR (id IN ('15300') AND source NOT IN ('HTTPEVENT') AND level IN
('error', 'warning')) OR (id IN ('15301') AND source NOT IN ('HTTPEVENT') AND level IN
('error', 'warning')) OR (id IN ('24679') AND source NOT IN ('Cissesrv') AND level IN
('error', 'warning')) OR (id IN ('36887') AND source NOT IN ('Schannel') AND level IN
('error', 'warning')) OR (id IN ('36888') AND source NOT IN ('Schannel') AND level IN
('error', 'warning')) OR (id IN ('40960') AND source NOT IN ('LSASRV') AND level IN
('error', 'warning')) OR (id IN ('40961') AND source NOT IN ('LSASRV') AND level IN
('error', 'warning')) OR (id IN ('45056') AND source NOT IN ('LSASRV') AND level IN
('error', 'warning'))
22. Numbers, constants etc
Key Safe Key Description
= eq Equals
!= ne Not equals
> gt Greater than
< lt Less than
>= ge Greater or equal than
<= le Less or equal than
in ( <LIST OF VALUES>) In a given list
not in (…) Not in a given list
23. Strings
Key Safe Key Description
= eq Equals
!= ne Not equals
> gt Greater than
< lt Less than
>= ge Greater or equal than
<= le Less or equal than
in ( <LIST OF VALUES>) In a given list
not in (…) Not in a given list
like Substring matching
regexp Regular expression
not like Opposite of like
not regexp Opposite of regexp