Operations | Monitoring | ITSM | DevOps | Cloud

Icinga DB Web Automation

Icinga DB Web Automation allows you to automate monitoring tasks and integrate them directly into your systems and workflows. It is possible to issue command actions without a browser. To do so, a form needs to be submitted by a tool such as cUrl. Every request you send follows the same permission rules and access restrictions defined in the web interface, so security and user roles still apply. Want to target specific hosts or services? Simply add filter parameters to the URL.

A Guide to Agentic Orchestration

A lot of IT organizations (I daresay most IT organizations) aren’t short on bots; they’re short on direction. You've got GenAI copilots here, virtual assistants there, and workflow bots running in many different tools. Maybe one automates diagnostics while another resets passwords. But none of them talk. None of them collaborate. None of them understand what the others are doing. That’s not automation; that’s entropy.

How to Automate Password Resets with Resolve #itautomation #ai #aiautomation #agenticai

Tired of password reset tickets? Meet RITA — Resolve’s AI IT agent. Understands natural language Verifies identity Resets passwords instantly No tickets. No delays. This is Zero Ticket IT in action. Watch Resolve’s Derek Pascarella show how it works.

Can External Data Predict System Failures?

Something critical just went down. Again. So you troubleshoot and find out everything's clean - logs, metrics, nothing seems out of the ordinary. You didn't think to look out the window, right? Let's rewind a couple of hours. The temperature spiked 15 degrees outside, the humidity was at 90% and a storm came out of nowhere. Meanwhile, your edge device is sitting in a box on a pole somewhere; it never stood a chance.

AI in IT: Great! Now What the Hell Do You Do with It?

The demand for organizations to minimize downtime, swiftly address issues, and proactively manage the infrastructure has never been greater. But how can teams be expected to meet that challenge with legacy tools and approaches? Enter Zero Ticket IT, a transformative approach where AI-driven automation eliminates traditional ticket bottlenecks, empowering IT teams to focus on innovation and strategy. But how do you know if your team is truly ready for this transformative leap?

Introduction to Puppet Security Compliance Enforcement

Take enterprise compliance to the next level with Puppet Security Compliance Enforcement. This video demonstrates how to shift from reactive to proactive compliance, automating security standards across Puppet Enterprise and Puppet Core environments. Discover how to implement CIS benchmarks with ease, achieve consistent compliance, and reduce risk across your Linux and Windows infrastructure with tailored configurations.

EMEA Rundeck by PagerDuty Meetup - July 2025

Join us for an informal 1-hour virtual event where the open-source Rundeck by PagerDuty community comes together to share automation stories and use cases. Whether you're new to Rundeck or looking to elevate your automation game, this meetup is packed with valuable takeaways for everyone! Host: Martin Van Son, Automation Specialist & Strategic Solution Advisor at PagerDuty New OSS Dashboards & Enterprise ROI Plugin + Creating Rundeck Plugins with Claude Code.

AMER Rundeck by PagerDuty Meetup - July 2025

Join us for an informal 1-hour virtual event where the open-source Rundeck by PagerDuty community comes together to share automation stories and use cases. Whether you're new to Rundeck or looking to elevate your automation game, this meetup is packed with valuable takeaways for everyone! Host: Forrest Evans (Director, Product Management at PagerDuty) Rundeck by PagerDuty: A Swiss Army Knife of Automation.

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

The rate at which vulnerabilities are being exploited is on the rise. The VulnCheck company, which specializes in vulnerability intelligence, found that in Q1 2025, 28.3% of vulnerabilities were exploited within 1 day of CVE disclosure. Keeping your systems up to date is more important than ever. The reality is that many security teams are running scans and then exporting to giant spreadsheets, which are “tossed over the wall” to the Operations team with little context.