What's Covered Supported Tech Monitoring Response Times ← Pricing & Services Get Support
Active Monitoring — 24/7

Your infrastructure,
always on.
Our team,
always watching.

Building your infrastructure is only the beginning. What keeps it running, secure, and performing is ongoing expert attention — and that's exactly what our support service delivers.

24/7
Monitoring Coverage
1h
Critical Incident SLA
100%
Open Source Stack
Infrastructure Monitor
Live
Web Server (nginx)
Healthy
99.98%
Database (PostgreSQL)
Healthy
99.99%
Mail Server
Healthy
99.95%
VPN Gateway
Healthy
100%
Backup Job
Completed
02:14 ago
SSL Certificate
Valid
84 days
What's Included

More than just fixing things
when they break.

Reactive support is table stakes. Our support service is proactive — we catch issues before they become incidents, and we keep your environment hardened, current, and documented.

24/7 Uptime Monitoring

Every service, port, and endpoint watched around the clock. Alerts fire before your users notice anything.

Security Patching & Hardening

OS and package updates applied on a tested schedule. Ongoing hardening keeps your attack surface minimal.

Incident Response

When something goes wrong, you reach a real engineer — the same one who built your stack — not a helpdesk queue.

Backup Verification

Backups are tested regularly. A backup you've never restored is not a backup — we make sure yours actually work.

Log Review & Anomaly Detection

Regular log analysis via Wazuh SIEM surfaces unusual patterns, failed auth attempts, and configuration drift early.

Support Coverage Matrix Active
Monitoring
Uptime checks
Port monitoring
SSL expiry alerts
Disk / CPU / RAM
Backup job status
Security
OS security patches
Wazuh SIEM alerts
Firewall rule review
Failed login alerts
CVE tracking
Maintenance
Package updates
Config management
Log rotation
Performance tuning
Certificate renewal
Reporting
Monthly health report
Incident summaries
Uptime statistics
Patch changelog
Compliance notes
Supported Technologies

If it runs on Linux, we support it.

Our team covers the full open-source infrastructure stack — from the OS to the application layer.

Linux Distributions
Ubuntu LTS Debian RHEL Rocky Linux AlmaLinux CentOS Stream Fedora Server SUSE / openSUSE
Web & App Servers
Nginx Apache Caddy Node.js PHP-FPM Gunicorn Traefik HAProxy
Databases
PostgreSQL MySQL MariaDB MongoDB Redis SQLite InfluxDB
Containers & Orchestration
Docker Docker Compose Kubernetes K3s Podman Proxmox KVM / QEMU
Security & Networking
Wazuh SIEM WireGuard OpenVPN iptables / nftables Fail2Ban CrowdSec OpenVAS Bind9 / Unbound
Open Source Applications
Nextcloud Odoo ERP SuiteCRM Moodle Gitea Vaultwarden Jitsi Meet n8n
Network Services

Your network, built right
from the ground up.

Whether you are starting from scratch or optimising an existing setup, we design, assess, and engineer network solutions around your exact requirements — not a generic template.

Network Design

We architect networks from the ground up — IP addressing schemes, VLAN segmentation, routing topology, and firewall zoning — built for reliability, security, and future growth.

VLAN Segmentation IP Planning Routing Design Firewall Zones SD-WAN Redundancy

Network Enhancement

We identify bottlenecks, misconfigurations, and single points of failure in your existing network, then implement targeted improvements to boost throughput, resilience, and security posture.

Throughput Tuning QoS / Traffic Shaping Link Aggregation Failover Setup Latency Reduction

Network Assessment

A structured audit of your current infrastructure — topology mapping, security gap analysis, compliance checks, and a prioritised remediation report you can act on immediately.

Topology Mapping Security Audit Vulnerability Scan Compliance Check Remediation Report

Tailored Solutions

No two organisations have the same needs. We listen first, then engineer a solution around your team size, budget, compliance requirements, and growth plans — open-source by default, proprietary when it makes sense.

Custom Architecture Multi-site Connectivity VPN / Zero Trust Cloud Hybrid On-premise
How It Works

From alert to resolution — fast.

A clear, consistent process for every incident. No ambiguity, no finger-pointing, no ticket queues.

01

Detect

Prometheus, Wazuh, or uptime checks fire an alert the moment a threshold is crossed or an anomaly is detected.

02

Triage

Our team reviews the alert, assesses severity, and determines the impact scope within minutes.

03

Resolve

The engineer who knows your stack takes action — SSH access, log review, rollback, or escalation as needed.

04

Report

You receive a plain-language incident summary — what happened, what was done, and how to prevent recurrence.

Monitoring Coverage

Everything that matters,
watched continuously.

Our monitoring stack is built on Prometheus, Grafana, Loki, and Wazuh — open-source tools that give us full visibility without any vendor dependency.

System Health

CPU utilisation
Memory pressure
Disk usage & I/O
Load average
Swap usage
Process uptime

Network & Connectivity

Port availability
HTTP/S response codes
Latency & packet loss
DNS resolution
SSL certificate expiry
VPN tunnel status

Security Events

Failed SSH login attempts
Privilege escalation
Firewall rule violations
File integrity changes
Rootkit indicators
Vulnerability CVEs

Backup & Data Integrity

Backup job completion
Backup size anomalies
Restore test results
Retention policy compliance
Off-site sync status
Database consistency
Maintenance Schedule

Proactive care on
a predictable cadence.

Daily

Automated Checks

Backup verification, uptime confirmation, and security alert review every 24 hours.

Weekly

Log & Security Review

Manual log analysis, Wazuh report review, failed authentication audit, and minor config drift correction.

Monthly

Patching & Health Report

OS and application security patches applied in a maintenance window. Full health report delivered to you.

Quarterly

Architecture & Compliance Review

Full infrastructure review, backup restore test, vulnerability scan, and POPIA/GDPR compliance check.

Our Commitment

You will never be surprised by your own infrastructure.

Most infrastructure incidents are not sudden failures — they are slow-moving problems that were visible in logs and metrics weeks before they caused an outage. Our job is to read those signals and act before you ever feel the impact.

Every maintenance action we take is logged, timestamped, and summarised in plain language so you always know the current state of your environment — whether you're technical or not.

Your infrastructure documentation is kept up to date as part of the support contract. When your team grows, new engineers can onboard against real, current documentation — not outdated notes.

Support is not a break-fix service. It is a continuous engineering relationship. We know your stack because we built it — and we keep knowing it because we maintain it every week.
Response Times & SLA

Know exactly what to expect
before you need us.

Every support plan comes with clearly defined response times — no vague "best effort" commitments.

Basic Plan — $79 / month
Basic Support
Critical (site down) 8 hours
High (service degraded) 24 hours
Medium (non-urgent) 48 hours
Support channel Email
Coverage hours Business hours
24/7 automated monitoring
Monthly security patches
Monthly health report
Up to 2 servers
Enterprise Plan — Custom pricing
Enterprise Support
Critical (site down) 1 hour
High (service degraded) 2 hours
Medium (non-urgent) 8 hours
Support channel Dedicated line
Coverage hours 24/7
Everything in Pro
Dedicated architect
Quarterly compliance audit
Unlimited servers
Ready to get started?

Let's protect your infrastructure.

Book a free 30-minute consultation. We'll review your current setup and recommend the right support plan — no commitment required.