Based on our record, Wazuh should be more popular than Icinga. It has been mentiond 49 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Two manually updated svg maps on nagvis that integrate with our icinga checks, one for the transport system nodes and one for the routers. Source: 12 months ago
Might be a bit of an overkill if you just want to check the certificates, but I'm using Icinga (formerly known as Nagios) to keep track of all of the systems - including webpage certificates. Source: about 2 years ago
Some of it can be migrated rather easily to Icinga https://icinga.com/. Icinga forked from Nagios many years ago, they rewrote the engine and have done a nice WebUI. It is able to support e.g. Business branches using "satellites" that act as proxy to the main server/ server cluster. I was one of the two guys doing the setup for a company with multiple branch offices/ factories and during the time I was there it... Source: over 2 years ago
Personally I run https://icinga.com/ (to all my services, including Plex) and it polls every 5sec and after 5 fails in a row it sends me an email. Source: over 2 years ago
Fast forward 12 years and I have Icinga2 collectors in each datacenter using check_by_ssh to run check_systemd, all front-ended by Thruk. The TIG stack is something on my list of things to look into at some point, but with Dynatrace available to do all the fancy application monitoring, there's no rush. Source: over 2 years ago
I use Wazuh instead. Greenbone CE is severely limited and requires payment for anything beyond the very basic. Super simple installation more features. Source: 5 months ago
Monitoring & Active Measures - Exporting firewall events to an external time-series database like I describe above is good to see who is touching your firewall or accessing your web site. Using an Intrusion Detection System / Intrusion Prevention System (IDS/IPS) such as open-source Suricata, which is a free package on pfSense, and deploying file system integrity monitoring, such as the open-source Wazuh on the... Source: 6 months ago
Wazuh: An open source security monitoring platform that integrates with popular tools like Elasticsearch and Kibana to provide comprehensive security event analysis and response capabilities. - Source: dev.to / 12 months ago
On another note, as mentioned in my response to the question of this post, we are working on a complete rework of the Vulnerability Detection engine. This rework will provide a sanitized CVEs feed from wazuh.com and a completely new scanner engine. It will also include a new UI for global queries. Source: 12 months ago
Nessus essentials (https://www.tenable.com/products/nessus/nessus-essentials) might do the trick. It can help to check what kind of services you are running are vulnerable to exploits. Also, the general recommendation here would be not to use default ports for all the services you are exposing. Also, you can check something like Wazuh - https://wazuh.com/. Source: almost 1 year ago
Zabbix - Track, record, alert and visualize performance and availability of IT resources
Nagios - Complete monitoring and alerting for servers, switches, applications, and services
Fortinet FortiAnalyzer - Fortinet FortiAnalyzer is a powerful product for Security Fabric Analytics and Automation.
Datadog - See metrics from all of your apps, tools & services in one place with Datadog's cloud monitoring as a service solution. Try it for free.
Beats - Beats is the platform for single-purpose data shippers that is installed as lightweight agents and send data to machines to Logstash or Elasticsearch.
LibreNMS - A fully featured network monitoring system that provides a wealth of features and device support.