VeeamON 2024 - Use Code "COMMUNITY10" for 10% Off!
Can I ask if anyone has managed to get the Group auditing working?
I must have missed this post, really good. I’m also really glad the 1st, 2nd and last month idea has been picked up :)
@dloseke it works on Windows too. The above example was running on the VBR server.
Check out this video series I put together
I’m all about terminals so here is a list of interesting ones.Tabby terminal is well worth a look:https://tabby.sh/There is also:https://cmder.app/https://hyper.is/For Mac users:https://www.warp.dev/
I’m working POST now; the tools will support JSON and YAML data formats. Here’s an example of starting a job:
v0.3.0 is out; it now supports the Enterprise Manager API.Remember to give it a star on GitHub if you like this project!
Quick update, I have moved the installation to Pypi, so you can easily install it via:pip install veeam-easy-connectMFA has been tested and working on Azure and AWS, I assume it will work with GCP, but that will be tested soon (unless someone else wants to).I’m having some problems with getting AWS SSO working, but I’ll get there.
I’ve been working on the AWS SSO over the weekend, should be added soon.I’ve also changed the way you select the api you want so you know do the following:vec = VeeamEasyConnect(“username”, “password”)vec.vbr().login(“192.168.0.123”)I’ve also added some convience methods including the ability to send a request directly after logging in (get, put & post)vec.get(“https://path_to_the_resource”)
Thanks for sharing! I’m a fan of Python as well. This serves as a great example on how to authenticate against both Veeam Backup & Replication and Veeam Backup Enterprise Manager RESTful APIs. I read through the code and wanted to share a few thoughts: - I recommend renaming your auth functions so it’s more clear which API you’re logging into. While I recognize the different ports specified in the URLs, it could cause confusion for others. - I recommend against disabling SSL/TLS verification by default. While it’s typically acceptable in lab environments, disabling this check enables a man-in-the-middle attacks to take place. This doesn’t mean you must change from a self-signed certificate but the Python requests library does support thumbprint verification which allows even self-signed certs to be trusted and verified. Keep on coding and sharing! Thanks again! Chris I actually made some changes today as I realised that some of the endpoint are different both in
Nice share Ed and really good analysis @Chris.Arceneaux Python is a worth-know language code for cybersecurity :) Funny you said that I’m slowly working my way through TryHackMe and it comes in very useful.
Thanks a bunch, makes all those weekends worth it! You’ll see a login link on the top right. You can also update the site names and add additional sites when logged in.
To get to the more advanced version which includes access to the back-end settings, RvTools modelling and the ability to save workloads, simply login using the password ‘veeam’. If you have any questions let me know, I wrote the tool.
Already have an account? Login
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.