Go's os.Root feature, introduced in Go 1.24, is designed to improve filesystem security by restricting operations to a specific directory, making it much harder for attackers to exploit path...
Secure File Operations in Go with os.Root: Preventing Path Traversal
Go's os.Root feature, introduced in Go 1.24, is designed to improve filesystem security by restricting operations to a specific directory, making it much harder for attackers to exploit path...
Releasing Icinga Web Jira Integration v1.4.0
We are happy to announce the release of Icinga Web Jira Integration v1.4.0 today. You can find all issues related to this release on our roadmap. What’s It All About This release ensures the compatibility with Atlassian Jira 10.2 among other changes and fixes. Changes...
Using Icinga 2 on NixOS
I use NixOS by the way. And today I'm going to show you how to operate a simple Icinga setup using that operating system. I.e. a single node with checks and notifications. In contrast to Icinga Web 2 or Redis, NixOS provides an Icinga 2 package, but no module....
Two Factors, Double Security?
Introduction “Please enter the code we just sent you.” – most people have seen this message when logging into an online service. Two-Factor Authentication (2FA) is no longer reserved for banks or enterprises. It’s now common in email, social media, and shopping...
Releasing Icinga 2 v2.15.1, 2.14.7 and 2.13.13 and Icinga DB Web v1.2.3 and 1.1.4
Today, we are releasing security updates for Icinga 2 and Icinga DB Web fixing multiple security issues. Two of them allow authenticated API users to learn restricted information or crash Icinga 2. On Icinga 2, a third issue affecting the provided scripts allows a...
Nagios Alternatives: Why Icinga Is the Strongest Choice
Introduction Nagios has long been a trusted name in IT monitoring. Its plugin-based architecture and long-standing community have made it a stable choice for organizations of all sizes. However, IT infrastructures have changed dramatically in the last decade. With...
Enhanced Icinga 2 Container Images
As some of you might have already noticed, we recently gave our official Icinga 2 container image builds a complete overhaul. These new images are currently available only as snapshot builds but will replace the existing stable images with the next Icinga 2 v2.16.0...
How to check CPU usage on Linux
When your Linux system feels sluggish, one of the first things to investigate is the CPU usage. The CPU (Central Processing Unit) is the brain of your machine, and if it’s overloaded, everything else slows down. In this guide, you’ll learn different ways to Linux...
What is SNMP Trap: Real-Time Alerts for Network Monitoring
Why wait for the next poll? An SNMP trap is a real-time alert sent from a device to a monitoring system, without waiting for polling. Ever had a router die silently at 3 AM while your monitoring system was still polling away every 5 minutes? Yeah… not fun. That’s...
Icinga Experience: Insights from Real-World Icinga Deployments Across Industries
Introduction Modern IT environments are hybrid, distributed, and constantly growing. To keep them reliable, organizations rely on monitoring that scales, automates, and integrates seamlessly into existing workflows. We collected 24 Icinga customer stories from...
Upgrade your monitoring lists with icon images
Recently I was importing an Icinga configuration for testing purposes. Working with this configuration, I found that there were icon images assigned to the objects. Sadly, those didn’t display, because I didn’t have the icon set installed. So I thought of creating my...
Targeting hosts and services in Icinga 2 API requests
Today, we are going to take a look at the Icinga 2 API and the various ways targets can be specified for different actions, such as querying information or scheduling downtimes. This post focuses on the API request payloads themselves and assumes some familiarity with...
Subscribe to our Newsletter
A monthly digest of the latest Icinga news, releases, articles and community topics.







