Server monitoring has never been easier

Set up your entire server and network monitoring in less than 30 min.

Start free trial
Try risk-free for 15 days. No credit card required.
CloudRadar IT Infrastructure Monitoring

Keeping SysAdmins and Service Providers safe across the globe

monitoring checks performed
93,000,000,000

Monitoring checks
performed

monitoring checks performed
103,248

Issues & downtimes
detected

monitoring checks performed
64

Active
countries



8 global data centers
8

Global
data centers

Network and server monitoring for your entire infrastructure

CPU/disk monitoring? no problem. Push alerting? included. Complex setup? nope. Check it out - you might love it.

Set up your monitoring in minutes

Stop spending more time configuring your monitoring solution than actually monitoring your network.

CloudRadar's simple UX, preconfigured checks and default alerts are designed to get your monitoring running in minutes. No matter if you replace your previous tool or set up a new monitoring.

Server Monitoring Features and metrics
Network Monitoring alerts fast

Receive fail-proof alerts, fast

Be the first to find out about any issues — without the usual setup hassle.

Balanced rules and notification channels will get you started instantly. So if anything goes wrong, CloudRadar will be in your inbox in less than a minute.

Customize easily to your own needs

Need to receive alerts by email and Slack during the day, but prefer SMS overnight? Or adjust thresholds for disk fill warnings? Your graphical rule editor makes it a walk in the park.

Get a good night's sleep knowing you'll be notified wherever you (or your team members, or your customers) prefer.

Customize Monitoring rules
Team Monitoring Features

Even your team will love it

No more worries about being the only person who knows how to use your monitoring tool.

CloudRadar was designed for anyone on your team to be able to intuitively manage, spot issues, and take action.

Read what our customers say...

Monitoring software user

It just worked exactly as expected and promised from the very first second on.

Sebastian Graef
Owner
Monitoring Consultant
Monitoring Software user

Finally, a monitoring solution that's really easy and affordable. It took me only 20 minutes to connect all my servers to monitor bandwidth and availability.

Mike Slodowski
Owner & IT Lead
Magnusbox
Monitoring Software user

The setup speed is phenomenal - I integrated 6 servers within 20 minutes.

Brinsley van der Vent
Head of IT
Pixelfaerie

Set up your monitoring in less than 20 minutes


Start My Free Trial
Try risk-free for 15 days. No credit card required.

All features overview

Cloudradar can monitor any device (server, host, computer, IP-camera, router, switch, etc.) which has an IP address (v4 or v6) or an FQDN which resolves to an IP-address.

  • Even hosts not accessible via the public internet can be monitored using either an agent or a local check-executer (see below).
  • Along with the basic information, users can enter a description and tags for a host. Tags are a powerful mechanism to create host groups and many filter options for the dashboard and the messaging.
  • A guide helps inexperienced users to create a host properly and fast. Common use-cases are suggested and forms adapt dynamically.
  • Hosts can be removed or re-added to the dashboard. While in maintenance, all alerts for a host can be muted.
  • Public hosts will be assigned automatically to the nearest monitoring location, based on the time zone of the account.
  • Hosts can be assigned to any location manually.
  • Multi-location monitoring in case of failures is enabled by default and cannot be turned off.

CloudRadar monitors hosts available through the public internet from different geographical locations. Agentless monitoring can be performed inside protected intranets behind a firewall too by installing the check-executer – called frontman – on-premise.

Checks are based on

  • ICMP echo requests (ping)
  • TCP Port checks
  • HTTP Requests (HEAD, GET, POST)
  • SNMP (v1,v2,v3)

A failed check (except SNMP) is repeated two times on the original location and then forwarded to two neighbor locations and executed there three times. A check must be executed nine times to be considered as failed.

TCP Port checks provide options for

  • Check if a TCP port is open
  • Check if an open port answers with the expected protocol
  • Specifying a custom timeout (coming soon)
  • a check pre-flight prior to the regular execution to warn customers about configuration errors and checks which will immediately fail after adding (prevents misconfigurations).

HTTP checks provide options for

  • ignoring SSL errors
  • specifying a timeout
  • searching for a pattern (control keyword) inside the HTML source code or inside the rendered HTML (no JS execution)
  • specifying custom headers, for example, HTTP basic auth
  • specifying an expected HTTP status code
  • allow or disallow to follow redirects
  • a check pre-flight to warn customers about check errors and checks which will immediately fail after adding, displaying HTTP status codes and other errors immediately (prevents misconfigurations)

SNMP checks provide options for

  • specifying the SNMP community or v3 credentials
  • selecting pre-configured checks which cover most common needs
  • read out the most basic data (location, vendor, description, contact)
  • discover all ports of a device (switch/router) and monitor their bandwidth utilization.
  • monitor failures on each discovered ports (dropped, discarded packets)
  • specifying an arbitrary OID (coming soon)

To get the full insights into the operating system the installation of an agent is required.

The agent is available for

  • Microsoft Windows (>= Windows 7), signed MSI package, supports unattended installations
  • CentOS, Redhat, and derivates, RPM package, and yum-repository
  • SuSE Linux, generic RPM packages are suitable, no repository provided.
  • Debian- and Ubuntu Linux, DEB package, and Debian-repository, supporting x86, AMD64, and ARM architectures
  • Mac OSX
  • Plesk extension providing full integration into the Web-UI
  • Synology package providing full integration into the Web-UI
  • QNAP package, configuration, and installation through SSH
  • Binary Packages (tar.gz) for any other Linux, supporting x86, AMD64, and ARM architectures

The agent monitors

  • the utilization of the CPU (detailing iowait, user-, and system-load, idle), the sum of all CPUs and detailed metric of each CPU or core.
  • the utilization of the memory with a detailed breakdown on cached, buffered, available and paged memory.
  • the fill level of disks (mount points), discovered automatically, custom filters to in- or exclude disks and mount points can be set.
  • the bandwidth usage of network cards, discovered automatically, custom filters for in- or excluding devices can be set.
  • processes; the agent reports all processes and their states
  • services which are automatically discovered through the Windows Service Manager or Linux SystemD. All discovered services and their states are reported.
  • TCP and UDP ports opened by the OS
  • processes causing a high load. So-called CPU utilization snapshots are taken. If the load hits a limit the most CPU consuming processes are recorded. The thresholds can be fine-tuned.
  • hardware inventory, detailing the PCI cards, attached displays, mounted memory modules, attached USB devices, model and serial number of the mainboard, CPU model
  • S.M.A.R.T disk health
  • Temperatures reported by the sensors of the mainboard.
  • For an easy configuration, the agent supports three presets for the most common use-cases
  • heartbeat only, for customers just wanting to be alerted if a host is down
  • minimalistic, for virtual machines, reporting just CPU, memory, and disk fill levels
  • full, supporting all features mentioned above

For any data gathered by a script or third-party software, custom checks can be created.

  • Via any HTTP client, e.g. curl, PowerShell, Python, measurement data can be submitted as JSON payload.
  • An expected update interval can be assigned to custom checks to be warned if the sender stops sending.
  • Graphs and a 30-day history are built automatically for any numeric values.
  • A handy custom-check-sender binary is provided, useful for Windows users not having curl installed by default (coming soon).
  • All measurements are displayed tabular and all numeric values are displayed also as graphs providing a 30-days history.
  • Relevant metrics are grouped into pre-defined graphs for a quick overview of CPU- and memory utilization, disk fill levels, and bandwidth usage

For almost every measurement rules can be created. If a raw or processed value is below or above a threshold an event (alert or warning) is created. To avoid repetitive and error-prone creation of rules for each host, rules can be created for

  • a single host identified by its UUID
  • hosts identified by names supporting wildcards
  • hosts identified by IP-address or FQDN supporting wildcards
  • hosts having a specific tag

Conditions can be based on

  • last, average, min, max of up to 10 measurements
  • wildcard matches for processes and services

The rule creation is made comfortable and user-friendly by wizards which are launched from the measurement the rule should be based on. Depending on the context only applicable options are shown to avoid an overloaded UI.

Each account starts with a basic set of useful rules covering common use-cases.

For all or just specific hosts, status pages can be created. They are accessible without authentication under the neutral URL https://serverstate.info/

  • A status page can be customized through a wizard supporting
  • a custom header and footer with limited usage of HTML (WYSIWYG editor)
  • a custom logo (image upload)
  • number of days the history should cover
  • which events to include (alerts and/or warnings)
  • the hosts or hosts identified by tags the status page should cover

The status pages are available as

  • full page, supporting auto refresh and dark theme
  • HTML embed code, for usage inside an iframe, renders a small overview
  • Image embed code renders a small overview (badge) as an image.

A public json-based REST-API is available for easy integration into third-party tools and scripts.

Through the Web-UI tokens for the bearer authentication is managed. An unlimited number of tokens can be created to fully control and revoke access.

Tokens can be limited to read operations.

The API does not support all features available through the Web-UI yet, but basic functions for managing hosts and fetching events are available. See all API features.

Events (alerts or warning) are sent to recipients via the following media

  • Email
  • Slack
  • Telegram
  • PushOver
  • SMS
  • Phone Calls (text to speech)
  • WhatsApp
  • Web Hooks

Besides events, a recipient can subscribe to

  • reminders for unresolved issues with a custom reminder interval per recipient
  • a short daily summary of the issues of the last 24 hours dispatched on midnight
  • detailed daily, weekly or monthly reports
  • comments on issues made by teammates

A recipient can filter which events to receive (message routing) based on

  • The hostname(s) of the affected host, supporting wildcards
  • Host tags, IP-address or FQDN of the affected host, supporting wildcards
  • The event message, supporting wildcards
  • all filter options can be combined by a logical AND or OR.For almost every measurement rules can be created. If a raw or processed value is below or above a threshold an event (alert or warning) is created. To avoid repetitive and error-prone creation of rules for each host, rules can be created for
  • a single host identified by its UUID
  • hosts identified by names supporting wildcards
  • hosts identified by IP-address or FQDN supporting wildcards
  • hosts having a specific tag

Conditions can be based on

  • last, average, min, max of up to 10 measurements
  • wildcard matches for processes and services

The rule creation is made comfortable and user-friendly by wizards which are launched from the measurement the rule should be based on. Depending on the context only applicable options are shown to avoid an overloaded UI.

Each account starts with a basic set of useful rules covering common use-cases.

The initial creator of the account can invite people to join the team. An invitation email is sent and the team is joined by clicking on the link. A password must be set.

Teammates can have one of the following roles

  • Admin, with read-write access to everything
  • Member, with read-write access to everything except the team management.
  • Guest, read-only, not allowed to any configuration, limited to the dashboard and the measurements. A guest can be limited to host-group.

All activity of the teammates is recorded in an audit log allowing members to follow up who has made what when.