Stop spending more time configuring your monitoring solution than actually monitoring your network.
CloudRadar's simple UX, preconfigured checks and default alerts are designed to get your monitoring running in minutes. No matter if you replace your previous tool or set up a new monitoring.
Be the first to find out about any issues — without the usual setup hassle.
Balanced rules and notification channels will get you started instantly. So if anything goes wrong, you can rely on getting alerted.
Need to receive alerts by email or Slack during the day, but prefer SMS overnight? Or adjust thresholds for disk fill warnings? Your graphical rule editor makes it a walk in the park.
Get a good night's sleep knowing you'll be notified wherever you (or your team members, or your customers) prefer.
No more worries about being the only person who knows how to use your monitoring tool.
CloudRadar was designed for anyone on your team to be able to intuitively manage, spot issues, and take action.
It just worked exactly as expected and promised from the very first second on.
Finally, a monitoring solution that's really easy and affordable. It took me only 20 minutes to connect all my servers to monitor bandwidth and availability.
The setup speed is phenomenal - I integrated 6 servers within 20 minutes.
Cloudradar can monitor any device (server, host, computer, IP-camera, router, switch, etc.) which has an IP address (v4 or v6) or an FQDN which resolves to an IP-address.
CloudRadar monitors hosts available through the public internet from different geographical locations. Agentless monitoring can be performed inside protected intranets behind a firewall too by installing the check-executer – called frontman – on-premise.
Checks are based on
A failed check is repeated two times on the original location and then forwarded to two neighbor locations and executed there three times. A check must be executed nine times to be considered as failed.
TCP Port checks provide options for
HTTP checks provide options for
To get the full insights into the operating system the installation of an agent is required.
The agent is available for
The agent monitors
For any data gathered by a script or third-party software, custom checks can be created.
For almost every measurement rules can be created. If a raw or processed value is below or above a threshold an event (alert or warning) is created. To avoid repetitive and error-prone creation of rules for each host, rules can be created for
Conditions can be based on
The rule creation is made comfortable and user-friendly by wizards which are launched from the measurement the rule should be based on. Depending on the context only applicable options are shown to avoid an overloaded UI.
Each account starts with a basic set of useful rules covering common use-cases.
For all or just specific hosts, status pages can be created. They are accessible without authentication under the neutral URL https://serverstate.info/
The status pages are available as
A public json-based REST-API is available for easy integration into third-party tools and scripts.
Through the Web-UI tokens for the bearer authentication is managed. An unlimited number of tokens can be created to fully control and revoke access.
Tokens can be limited to read operations.
The API does not support all features available through the Web-UI yet, but basic functions for managing hosts and fetching events are available. See all API features.
Events (alerts or warning) are sent to recipients via the following media
Besides events, a recipient can subscribe to
A recipient can filter which events to receive (message routing) based on
Conditions can be based on
The rule creation is made comfortable and user-friendly by wizards which are launched from the measurement the rule should be based on. Depending on the context only applicable options are shown to avoid an overloaded UI.
Each account starts with a basic set of useful rules covering common use-cases.
The initial creator of the account can invite people to join the team. An invitation email is sent and the team is joined by clicking on the link. A password must be set.
Teammates can have one of the following roles
All activity of the teammates is recorded in an audit log allowing members to follow up who has made what when.