Checkmk blog

Automatically detecting log4j vulnerabilities in your IT
The zero-day exploit Log4Shell endangers numerous servers in companies, being a critical vulnerability in the widely used Java library Log4j. Finding…
The hidden cost of false positive alerts
The hidden cost of false positive alerts
As explained in the previous article, most IT operations teams err on the side of caution when it comes to alerting. In other words, they are…
Dealing with false alerts in monitoring
Dealing with false alerts in monitoring
In statistics, we must always deal with two types of errors, typically referred to as ‘Type I’ and ‘Type II’. A Type I error is, in statisticians’…
Improve the communication of alerts with SIGNL4
Improve the communication of alerts with SIGNL4
There is a critical incident in production or IT. Several services have been impacted, business and customers are seriously affected. Luckily, with…
Monitoring OpenText solutions with Checkmk
Monitoring OpenText solutions with Checkmk
OpenText administration has always been a challenging and time-consuming task, and it often does not perform as well as it should, mostly because of a…
Setting up Checkmk as an alert source in iLert
Setting up Checkmk as an alert source in iLert
In this blogpost I will explain how to set up your Checkmk monitoring as an alert source in iLert and then take your first steps in iLert. For this I…
Improve your uptime with Checkmk and iLert
Improve your uptime with Checkmk and iLert
IT monitoring is primarily all about being able to reliably detect critical conditions in IT systems. However, this is only the first step, after…
A simple migration from Nagios to Checkmk
A simple migration from Nagios to Checkmk
There are many reasons for switching from Nagios to another monitoring tool. The IT consultants at tribe29 have already assisted several organizations…
Why you should replace Nagios right now
Why you should replace Nagios right now
When it was launched in 1999 under the name NetSaint, Nagios was the first open-source tool to unify a wide range of essential mechanisms for the…
Monitoring Elasticsearch with Checkmk
Monitoring Elasticsearch with Checkmk
Whether on your own machines or in the cloud: applications generate huge amounts of data – every day, every hour and every minute. We're no longer…
Agentless monitoring - it's not what you think
Agentless monitoring - it's not what you think
Agent vs. agentless monitoring is an interesting topic to debate, so in this article we're going to explore one of the grey areas of IT monitoring..