Remember the golden days of My Yahoo and iGoogle? Boxento is bringing that back - but better, open source, and completely in your control.
It's a self-hosted login dashboard, very configurable, and tries to be easy for newbies to use.
Beszel is a lightweight server monitoring platform that includes Docker statistics, historical data, and alert functions. It has a friendly web interface, simple configuration, and is ready to use out of the box. It supports automatic backup, multi-user, OAuth authentication, and API access.
Smaller and less resource-intensive than leading solutions. Easy setup, no need for public internet exposure. Configurable alerts for CPU, memory, disk, bandwidth, temperature, and status. Users manage their own systems. Admins can share systems across users. Supports many OAuth2 providers. Password auth can be disabled. Save and restore data from disk or S3-compatible storage.
Consists of a hub built on PocketBase that provides a dashboard for viewing and managing connected systems and an agent that runs on each system you want to monitor, creating a minimal SSH server to communicate system metrics to the hub.
Seems to be designed with system monitoring in mind, and as such isn't really that flexible.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and more. It includes network visibility, host visibility, intrusion detection honeypots, log management, and case management.
For network visibility, we offer signature based detection via Suricata, rich protocol metadata and file extraction using either Zeek or Suricata, full packet capture using either Stenographer or Suricata, and file analysis. For host visibility, we offer the Elastic Agent which provides data collection, live queries via osquery, and centralized management using Elastic Fleet. Intrusion detection honeypots based on OpenCanary can be added to your deployment for even more enterprise visibility. All of these logs flow into Elasticsearch and we’ve built our own user interfaces for alerts, dashboards, threat hunting, case management, and grid management.
It's a pretty heavy stack, but they're aiming for the enterprise environment so it has to be.
When and where can you see the northern and southern lights also known as the aurora? This page provides a prediction of the aurora’s visibility tonight and tomorrow night in the charts below. The animations further down show what the aurora’s been up to over the last 24 hours and estimates what the next 30 minutes will be like. The aurora’s colorful green, red, and purple light shifts gently and often changes shape like softly blowing curtains.
Tabler is fully responsive and compatible with all modern browsers. Thanks to its modern and user-friendly design you can create a fully functional interface that users will love! Choose the layouts and components you need and customize them to make your design consistent and eye-catching. Every component has been created with attention to detail to make your interface beautiful!
Uses the Liquid templating system.
Suricata IDS is a free intrusion detection/prevention system and network security monitoring engine. This is a list of awesome things that go with it.