Comparison
This article compares Pigsty with similar products and projects, highlighting feature differences.
This article compares Pigsty with similar products and projects, highlighting feature differences.
Infrastructure module architecture, components, and functionality in Pigsty.
How Pigsty’s monitoring system is architected and how monitored targets are automatically managed.
Pigsty includes a self-signed CA PKI infrastructure for issuing SSL certificates and encrypting network traffic.
Pigsty provides standard security practices with an out-of-the-box role and permission model.
Complete list of monitoring metrics provided by the Pigsty INFRA module