Every build has a story to tell — Tamperproof provenance for your code and CI/CD pipeline

Quickstart here: https://timestamp.codenotary.com

The combination of our free, lightning-fast, and always-on timestamp service and the easy to use CLI tool, gets you started in a minute.

What means trusted timestamping

Trusted timestamping is the process of securely keeping track of the creation and modification time of a document.

Security here means that no one-not even the owner of the document should be able to change it once it has been recorded provided that the timestamp's integrity is never compromised.

A huge percentage of the world’s most valuable data is processed on IBM mainframes. Mainframes are designed with reliability and security in mind since day one. Many libraries on mainframes should only be changed through a trusted pipeline. Tampering central and highly critical programs on a mainframe infrastructure of an organization would be a strike at the heart. Attacks like Sunburst showed that cyber-criminals act opportunistic and are able to create huge damage by tampering software. Hackers won’t stop at system frontiers but instead, look for a weak spot. Sometimes even mainframes get in their focus although known for being…

Ransomware is one of the most effective types of malware at the moment. It is blocking access by encrypting the victim’s data and demands a ransom payment to decrypt it.

The number of ransomware attacks has grown immensely and some ransomware crypto worms even became famous in mainstream media like WannaCry or CryptoLocker. Ransomware has the potential to take down businesses, destroying months of work, or even cost lives for example if a hospital is being crippled. A fast and reliable backup solution is the best tool against ransomware attacks.

Unfortunately, backups can be encrypted too. Once created we don’t…

When developing web-based software that has a shiny web UI, a set of APIs, and is written in Go, you’re typically using the excellent gRPC standard to ensure maximum flexibility and performance.

Imagine the application is composed of various modules, each implemented as a different executable, each responsible for a different task. All modules work together to compose the web application. A simple reverse proxy stands in front of the modules, choosing the correct one based on the URL prefix.

A different port is used for the gRPC interface. A simple setup, as you can see in this picture


Snakes like pythons are one of the worst enemies of gophers, never the less gophers should know how to handle them.

In this blog, you will learn how to transform relational data into a key-value schema that will fit in immudb with python. Once the records are written into immudb they are immutable, auditable and secure.

First we have to import ImmudbClient from immudb-py and pandas for processing the example .csv data. We can connect to immudb now using the IP address of immudb.

If you don’t have immudb installed check out immudb and start it up in just some…


Immu-py implements a grpc immudb client. A minimalist API is exposed for applications while cryptographic verifications and state update protocol implementation are fully implemented by this client. Latest validated immudb state may be kept in the local filesystem when using default rootService, please read immudb research paper for details of how immutability is ensured by immudb.


immu-py assumes there is an existing instance of the immudb server up and running. Running immudb is quite simple, please refer to the following link for downloading and running it: https://immudb.io/docs/quickstart.html


Install the package using pip:

pip install git+https://github.com/codenotary/immu-py.git

Then import the client as…

Our Log Compliance extension has been adopted at lightning speed by our customers and it’s being used to full-text-search in ESXi and vCSA events, tasks and of course syslog data or as charts within our dashboards (including alerting).

Existing customers can simply contact us through the typical channels like chat or email.

If you want to try the Log Analyzer extension for the first time, simply download the current release on this website.


The Log Compliance extension consists of multiple components that are seemlessly integrated.

That combination allows an unique set of functionalities:

  • full-text search within any data type (Tasks…

immudb is lightweight, high-speed immutable database for systems and applications.

With immudb you can track changes in sensitive data in your transactional databases and then record those changes indelibly in a the tamperproof immudb database.

This allows you to keep an indelible history of, say, your debit/credit transactions.

At Opvizor we already use immudb to enable immutable log management for VMware vSphere.

immudb is open source under the Apache v2.0 License, and can be found here (there is also a more comprehensive documentation):


Traditional transaction logs are hard to scale, and are not immutable. …

After a long period of adding new features, bug fixing and testing we’re excited to announce the Performance Analyzer 6.6.2 release.
Before we get into more bugfixing and improvement details, we want to highlight some new extensions.

VMware vSphere 7, Dell EMC PowerMax support and all new VMware Log Analysis.

Especially our extension for vSphere Tasks, Events and Syslog analysis (ESXi and vCSA) that supports analysis dashboards as well as realtime full-text search has been awaited eagerly.

Where to get the new version?

Existing customers can find the latest patch in our customer portal and everyone who likes to evaluate Performance Analyzer can simply click Download…

William Lam’s great deployment script triggered the idea of setting up a vSphere 7 and Kubernetes (VCF 4) environment completely nested on top of our development vSphere environment.

While the deployment itself worked very well to deploy the nested vSphere 7 environment, you need to fulfill some important requirements before you can enable the Kubernetes part (VMware Cloud Foundation 4 — VCF).

This blog post is going to cover these requirements as well as some tips and tricks to work with your fresh VCF 4 environment, the Workload Management and the Tanzu Kubernetes Grid (TKG) cluster.

Automated Deployment


William proposes the following…

Dennis Zimmer

Fullstack Monitoring, Analytics, Security: VMware, Docker, Kubernetes, Applications

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store