Operations | Monitoring | ITSM | DevOps | Cloud

Integrating Prometheus Metrics into Icinga Using check_prometheus

This article explains how to integrate metrics from Prometheus into Icinga checks using the check_prometheus plugin. There can be multiple reasons why this could be desired: Maybe you have different teams with their own monitoring systems, and you need to bridge the gap, or you want to perform queries that are just better expressed in Prometheus than in plain Icinga check plugins. The latter can be the case if you want to aggregate data from multiple sources or you want to take historic data into account.

Testing Icinga in a Homelab Setup With Nextcloud

If you want to get started with Icinga but don’t have a data center lying around, no worries. Icinga is a lightweight monitoring tool that works for both large infrastructures and small home labs. When I first explored Icinga during my first year as an apprentice, it was also my first real contact with monitoring tools. After completing the Icinga Fundamentals training, I wanted to experiment with hosts and services, but what should I monitor?

Monitor One Icinga 2 Cluster From Another

Icinga is designed to be a highly dynamic monitoring software that can monitor your setup, regardless of its architecture. While most setups are hierarchical and fit well into the master, satellites, and agents scheme with different zones, it is sometimes impractical or impossible to create one large Icinga 2 cluster. Imagine that you are responsible for only some hosts within another organization.

Explaining Icinga Director for Practitioners Webinar Recording

Starting from a clean installation, we will guide you through the complete setup process and create a first monitoring configuration together. You will learn how to navigate the Icinga Director interface, discover its main features, and see how automation can simplify your daily work through data imports and synchronization rules. You'll learn: Resources: Some more questions from the FAQ section, we want to answer.

Drowning in Alert Fatigue? How to Regain Control of Your Monitoring

If you’ve ever muted your phone during a maintenance window, only to miss a real outage an hour later, you’re not alone. Sysadmins on Reddit and beyond often describe feeling like they’re drowning in alerts: So many notifications that the important ones lose their meaning. This is alert fatigue, sometimes called notification fatigue or incident noise, and it’s one of the most common challenges in modern, growing IT operations.

How to Fix Cyclic Inheritance Errors in Icinga Director during Object Configuration

Icinga Director is a powerful tool that greatly simplifies the configuration, management, and deployment of monitoring objects in Icinga. It provides a user-friendly interface and automation features that make complex setups easier to maintain. Occasionally, though, you may unintentionally introduce a cyclic inheritance while configuring templates. A typical case occurs when a template imports another template that eventually imports the original one again.

Ipl-html: Introducing new Form Element Decorators

Decorators have always been a powerful concept in Icinga Web’s form system — letting developers control how form elements are displayed without hardcoding markup everywhere. But until recently, the decorator system had its limits. The new implementation of form element decorators completely reimagines this approach, offering cleaner logic and better flexibility. In this article, we’ll explore what’s new, why it’s better, and how to use it effectively in your own forms.

Icinga Notifications v0.2.0 Release

Some of you might have already heard about this at OSMC, or you may have received a release notification from GitHub already: our Icinga Notifications project made a step forward and we are happy to announce that version 0.2.0 is now available for you to try out. It addresses feedback that we have received for the previous versions with the most important changes highlighted below.

Two Factors, Double Security?

“Please enter the code we just sent you.” – most people have seen this message when logging into an online service. Two-Factor Authentication (2FA) is no longer reserved for banks or enterprises. It’s now common in email, social media, and shopping accounts. The idea is simple: in addition to a password, you need a second factor so that attackers can’t break in with just one piece of information. But what methods are actually used – and how secure are they really?