Checkmk blog

How to monitor servers with broken TLS in Checkmk 2.3
With Checkmk 2.3.0 we bumped the version of OpenSSL from 1.1 to 3.0. This means much stricter defaults regarding security relevant ciphers, handshake…
These operating systems are supported by Checkmk
These operating systems are supported by Checkmk
More reliability in planning future updates of Checkmk was a major reason why we introduced a policy with Checkmk 2.0 regarding which operating…
Deploy and run Checkmk in your Azure or AWS tenant
Deploy and run Checkmk in your Azure or AWS tenant
Starting today, the Cloud Edition is available on the AWS and Azure Marketplaces as an AMI and Virtual Machine, respectively. These pre-configured and…
Checkmk 2.2: Monitoring for Cloud and Hybrid IT
Checkmk 2.2: Monitoring for Cloud and Hybrid IT
With Checkmk 2.2, we not only extend Checkmk as a platform for hybrid IT monitoring, but also introduce a new product edition, Checkmk Cloud Edition.…
This is the Checkmk Cloud Edition
This is the Checkmk Cloud Edition
The Checkmk Editions family is growing – say hello to its newest member, the Checkmk Cloud Edition. The Cloud Edition is a state-of-the-art monitoring…
Monitoring Oracle Solaris with Checkmk
Monitoring Oracle Solaris with Checkmk
With Checkmk you can reliably monitor all Unix derivatives and Unix-like systems
Raw vs. Enterprise: When is it advisable to switch?
Raw vs. Enterprise: When is it advisable to switch?
This blog shows the most important differences between the Checkmk Raw Edition and the Checkmk Enterprise Edition and helps you to decide whether it…
Secure your monitoring: Security best practices for Checkmk
Secure your monitoring: Security best practices for Checkmk
Read how to configure your monitoring to be as secure as possible. You can implement most of the points in a few simple steps.
Checkmk 2.1 hybrid IT infrastructure monitoring at its best
Checkmk 2.1 hybrid IT infrastructure monitoring at its best
The best for both worlds: With the all new Checkmk 2.1, we are laying the foundation for hybrid IT infrastructure monitoring at its best. It brings…
Distributed Monitoring: Connecting remote sites in Checkmk
Distributed Monitoring: Connecting remote sites in Checkmk
Distributed monitoring with Checkmk consists of a central site and at least one remote site. The structure of such a distributed monitoring,…
Deploying Checkmk in Kubernetes
Deploying Checkmk in Kubernetes
Setting up Checkmk in Kubernetes is easy with the recent introduction of the Checkmk container registry and the sample manifests for deployment.…
Making Checkmk available in your language
Making Checkmk available in your language
Throughout the years, we’ve seen Checkmk being used in various locations across the globe. With this popularity comes people bringing in a diversity…
Checkmk 2.0 development: the making of the new UX
Checkmk 2.0 development: the making of the new UX
Last March we released the new Checkmk Version 2.0, which set a new record for the number of improvements implemented in a major release. Log in to…
Checkmk 2.0: A faster IT monitoring, with a new look
Checkmk 2.0: A faster IT monitoring, with a new look
The wait is over – Checkmk 2.0 is the latest full version of our IT monitoring solution. For this release we have not only added numerous functions,…
Checkmk 2.0: Modern, intuitive and individual – the new UX
Checkmk 2.0: Modern, intuitive and individual – the new UX
One of our main goals with Checkmk 2.0 is to improve usability both for new users and experts. To achieve this, we have not only completely redesigned…
Checkmk 2.0: Cloud and Containers – monitoring of modern IT
Checkmk 2.0: Cloud and Containers – monitoring of modern IT
Last year we released the first version of the Prometheus integration in Checkmk as a part of Feature Pack 2 for Checkmk 1.6 (1.6.0p12). Prometheus is…
Checkmk 2.0: Deeper insights for your network monitoring
Checkmk 2.0: Deeper insights for your network monitoring
From Checkmk 2.0 onwards, it will be possible to gain deeper insights into your network thanks to the deep integration of ntop's network flow…
Checkmk 2.0: New APIs for automation and extensibility
Checkmk 2.0: New APIs for automation and extensibility
With Checkmk 2.0, we are also pushing the automation of Checkmk further and at the same time making it easier to develop your own plug-ins for…
Checkmk 2.0: The Core gets more power under the hood
Checkmk 2.0: The Core gets more power under the hood
In this blog post, we present the various innovations in Checkmk 2.0, which above all significantly improve the performance of the monitoring. For…
Checkmk 2.0: Powerful monitoring of your IT infrastructure
Checkmk 2.0: Powerful monitoring of your IT infrastructure
With Checkmk 2.0, we are also expanding the range what can be monitored with Checkmk off-the-shelf - be it by means of new plug-ins or the expansion…
Migrating check plug-ins to Checkmk 2.0
Migrating check plug-ins to Checkmk 2.0
There are now nearly 2,000 official check plug-ins available as extensions for IT monitoring with Checkmk. However, the Check API is the same as it…
Announcing Checkmk 2.0 and its Innovation Release
Announcing Checkmk 2.0 and its Innovation Release
For many months our development team has been pushing to deliver the next full version of our IT monitoring solution. In doing so, we have reworked…
Forecasting metrics - A look into the future
Forecasting metrics - A look into the future
Do I have enough filesystem space left for the coming months? How will the CPU load on my server develop in the future? As soon as you have a proper…
Feature Pack 2 is out and comes with Prometheus-integration
Feature Pack 2 is out and comes with Prometheus-integration
On the way to the finalization of Checkmk 2.0 we are proud to be able to present the next intermediate step: the Feature Pack 2. With the Feature…
Our new release planning: The first feature pack is born
Our new release planning: The first feature pack is born
After having announced our new plan for publishing Checkmk releases we can now deliver our first Feature Pack as part of the patch release 1.6.09p.
Monitoring your network: Four rules to rule them all
Monitoring your network: Four rules to rule them all
Introduction on how to easily setup a holistic network and switch port monitoring without having to spend hours configuring your monitoring.