Icinga takes open source monitoring to the next level


Icinga is an enterprise grade open source monitoring system which keeps watch over networks and any conceivable network resource, notifies the user of errors and recoveries and generates performance data for reporting. Scalable and extensible, Icinga can monitor complex, large environments across dispersed locations.

Icinga is a fork of Nagios and is backward compatible. So, Nagios configurations, plugins and addons can all be used with Icinga. Though Icinga retains all the existing features of its predecessor, it builds on them to add many long awaited patches and features requested by the user community.

Icinga in a Nutshell

  • 100% Free & Open Source
  • Web 2.0 new web interface
  • MySQL, PostgreSQL & Oracle
  • Distributed systems monitoring
  • Mobile UI for smart phones
  • Continuous development
  • Nagios backward compatible

Happy Icinga Users


Continuous Development
Icinga is a constant work in progress. Check out what team Icinga has in store for the next version. All are welcome to contribute to Icinga in any way they can.

—–>  Roadmap <——

A Preview to Icinga Web 2

As we tinker away at Icinga Web 2, we’re finding it harder to keep it secret. So we thought: Why not show you what we have cooking under the hood?

Effortless Dashboards

When logging into Icinga Web 2 the first port of call will be your dashboard. These can be configured to show as [...]

Icinga 2 0.0.9 – Introducing Configuration Apply Rules

This release introduces a cool new feature for your Icinga 2 configuration: You can now use a rule based apply logic to assign services to hosts (and notifications, downtimes, dependencies to services, that is). The conditions for assigning (and ignoring for exclusion) are capable of accessing all object attributes, not only host or host group [...]

Icinga 1.11.1, 1.10.4, 1.9.6 bugfix releases

While we’ve released 1.11.0 including a fix for buffer overflow detected and fixed by Tim Landscheidt (Wikimedia), there’s now a CVE number for that: CVE-2014-2386. Therefore we’re releasing 1.10.4 and 1.9.6 containing this security fix amongst a bunch of other backported fixes. Older release branches <1.9.x require an update to the latest and greatest.

Changelogs: [...]