Slurpit logo
  • Product
    • Netpicker
    • Netbox Plugin
    • CVEasy
  • Use Cases
  • Company
    • About us
    • Partners
  • Pricing
  • Resources
    • Blog
    • Knowledge base
    • Training videos
    • Workshops
  • Contact
    • Contact us
    • Discord
    • Slack
    • Ticket support
  • Get Started

Entering privileged mode for backups in Netpicker

by Otto Coster | Apr 10, 2025 | Backups, FAQ, Knowledge Base

To allow Netpicker to perform backups on platforms that require elevated privileges, you must configure the kibbitzer container appropriately. This involves setting the SHENV_PRIVILEGED_PLATFORMS environment variable and storing the necessary credentials in...

Using custom TextFSM templates

by Otto Coster | Apr 7, 2025 | Knowledge Base, Netpicker, Network automation

First, place your TextFSM index and templates in a directory on the host machine. Then, edit the x-api section in docker-compose.override.yml by  Adding a new environment variable NET_TEXTFSM Adding a new volume mapping example:x-api:...

Reset default admin password

by Otto Coster | Apr 7, 2025 | Knowledge Base, Netpicker

To reset the default admin password to 12345678 in Netpicker, you can execute the following command on the Netpicker host machine: docker exec -ti db sh -c “echo update \”user\” set...

Using multiple tenants in Netpicker (multi-tenancy)

by Otto Coster | Feb 5, 2025 | Knowledge Base, Netpicker

In Netpicker, you can set up multiple tenants to isolate your devices and administer them in separate workspaces. Each tenant has its own devices and users can be given access to a specific tenant. Use cases for multi-tenancy can be for example: Departments inside...

Adding CVEasy verified CVE rules to Netpicker

by Otto Coster | Feb 4, 2025 | CVE, Knowledge Base, Security

First, clone the git repository with the Netpicker Policies and rules using the git clone command that can be found on the Netpicker Policies page: This should give you a local copy of the repository (in this example in the folder default-rules). Next, navigate to...
« Older Entries
Next Entries »
White Logo
Download here
Or take our online course
Company
About Netpicker
Product
Use Cases
Pricing
Privacy Policy
End User License Agreement
Latest News
Supported vendors

Currently we support 150+ vendors, is your vendor not included in our list then just let us know and we will add it for you. The strategy is to use the Opensource Community for our communication to the network devices. This fulfils with our strategy to help growing...

Using the Netpicker AI assistant with Google Gemini

Create a Gemini API key on https://aistudio.google.com/ Go to ‘Get API key’Copy your API key and enter the API details in the Netpicker AI assistant: API Endpoint: https://generativelanguage.googleapis.com/v1beta/openai/chat/completions Model: gemini-2.5-flash Refer...

Using the Netpicker AI assistant with a local LLM

Download LM Studio from https://lmstudio.ai/ Download your favourite coding model (in the screenshot below I’m using qwen/qwen3-4b-2507) Go to Developer and load your model Copy the ‘Reachable at’ URL and add /v1/chat/completions, for...

Network Vulnerabilities: How to Automatically Detect and Remediate Risk

Today's networks are more distributed than a few years ago. Both remote teams and applications running on a cloud service, in addition to third-party applications provide a breadth of attack surface. The security team is now tasked with detect risks before the threat...

Resources
Knowledge base
Book a Demo
Discord
LinkedIn
Ticket support
Contact us
©2025 NetPicker. All Rights Reserved.





Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}