We use cookies to ensure that we give you the best experience on our website.  Visit our Privacy Policy to learn more. If you continue to use this site, we will assume that you are okay with it.

Your choices regarding cookies on this site.
Your preferences have been updated.
In order for the changes to take effect completely please clear your browser cookies and cache. Then reload the page.

Monitoring tool functionality

Checkmk is a comprehensive solution for IT Monitoring of applications, servers, and networks.
Checkmk is available as a Raw Edition, which is 100% open-source, and as an Enterprise Edition with a newly developed, high performance core, many additional enterprise features and professional support.

checkmk features

State-based monitoring

State-based monitoring
  • Monitor everything using 1800+ included 'smart plugins' to collect data from all kinds of hard- and software
  • Quickly identify problems in your IT environment through a differentiated 'state' (OK, WARN, CRIT) of each monitored component or system - drill down with one click
  • Benefit from regularly updated plugins. Your software and hardware contantly changes, so you need plugins which are maintained
  • Use both a powerful agent-based monitoring and an agentless monitoring via HTTP, SNMP or by connecting directly to the APIs of many applications

Log- and event-based monitoring

Log- and event-based monitoring
  • Monitor logs for the analysis of error messages via syslog, SNMP-traps and other arbitrary log files
  • Forward events to trigger scripts or generate notifications
  • Summarize equal entries to one single event (e.g. several failed logons) to stay on top of your events
  • Filter incoming messages to only see important events. No more manual filtering and information overload

Graphing and analytics

Graphing and analytics
  • Analyze time-series metrics over long time horizons with interactive HTML5 graphs
  • Leverage graphic maps and diagrams with live-monitoring data to get a better view on the heath of your IT
  • Compare metrics across multiple graphs at one glance
  • Integrate data from a wide range of data sources and formats for metrics (JSON, XML, SNMP data etc.)
  • Store metrics in disk-space-efficient long-term storage
  • Alternatively use exporters for Graphite / InfluxDB
  • Sample in real-time with measurement intervals of 1 sec

Customizable GUI

Customizable GUI
  • Use a web interface for visualizations and operations
  • Customize dashboards and views to your specific needs
  • Differentiate dashboards and views among users or user groups, e.g. vSphere specific views for VMware admins
  • Bookmark views so that key views are only a click away
  • Customize the side menu e.g. monitoring admins need various statistics while network admins might only need reporting
  • Use the German or English versions of the GUI
  • Adapt the GUI towards your corporate identity within a few clicks


  • Review the history of states in one click over any desirable timeframe with computation of availability in real time
  • Deaverage availability data. Exclude non-monitored times, change the resolution, ignore short intervals
  • Get notified before you break your SLA contracts by monitoring the compliance of your complex SLAs. Even if the SLA definition contains only working hours
  • Generate PDF reports with your corporate identity containing all the views you build - ad-hoc or automated at regular intervals

Business Intelligence

Business Intelligence
  • Monitor business processes by mapping dependencies of your application into a single view
  • See the availability and performance of complex systems at a glance
  • Aggregate various services and hosts into a single state
  • Review historical states of an aggregation to understand root causes for degraded performances in the past
  • Deliver more reliable services to customers through a completely transparent view, which is easy to understand
  • Configure all possible setups such as HA with two or more nodes, HPC etc. with maximum and unique freedom
  • Simulate worst case scenarios in real time. See the impact of failing components before they become real

Hardware and software inventory

Hardware and software inventory
  • Identify the inventory of all hard- and software installed on devices and systems
  • Monitor changes in hard- and software - use this unique feature to control the access to your hardware and servers and never miss installing a security update again
  • Benefit from integration of regularly updated dynamic parameters such as disk space utilization that are updated via monitoring data
  • Interface to standard off-the-shelf Configuration Management Databases (CMDB) (e.g. i-doit interface from Sep. 2018)

Notifications and alert handler

Notifications and alert handler
  • Notify the responsible team quickly e.g. notify only the storage admins for a failing disk, but not the email admins
  • Notify via email, SMS and 3rd party tools such as Slack, PagerDuty and VictorOps - use your established tools for handling incidents
  • Leverage comprehensive, rule-based notifications to fulfill complex custom requirements regarding time periods, service levels etc.
  • Configure additional alerts or cancel an alert for specific cases. Escalate problems if they are not handled in time
  • Handle alerts centrally also in distributed environments
  • Automatically trigger actions as reaction to detected problems (alert handler) e.g. via scripts

Rule-based configuration, auto-discovery and agent deployment

Rule-based configuration, auto-discovery and agent deployment
  • Use the modern rule-based 1-to-N configuration, which remains intuitive even in complex environments, resulting in lower configuration effort than comparable products
  • Monitor with less effort thanks to automatic detection & configuration of the components. You don't need to configure 'this is a firewall' - all relevant components, their metrics and thresholds will be suggested
  • Centrally automate agent updating ('agent backery')
  • Configure everything in a web interface. No skills in YAML, JSON or other serialization language are needed
  • Feed the monitoring directly via a HTTP-API with already existing information from Configurable Management Databases (CMDB). If you already have automation tools (Ansible, i-doit CMDB etc.) you should use them
  • Use your existing role-based access controls (LDAP, AD) with a fine-grained permission model for users and groups

High-performace core

High-performace core
  • Benefit from Checkmk's own high-performace code 'CMC' (the 'core' is the heart of every monitoring system - it queries the plugins, collects their results, provides states to the GUI etc.)
  • Monitor thousands of services on one single monitoring server. No need to maintain and synchronize several monitoring instances in a single data center
  • Scale across hundreds of sites and millions of devices. Checkmk can support a world-wide distributed setup - hardly any other monitoring system can scale as well
  • Leverage highly efficient monitoring agents with minimal CPU, RAM and storage utilization. No need for DLLs, libraries etc. - runs even on the smallest servers
  • Benefit from a highly secure design incl. the option to encrypt communication between agents and servers
  • Activate changes in fractions of a second, allowing frequent configuration changes, e.g. for container monitoring

Nagios alternative – Nagios compatibility for easy migration

Nagios alternative – Nagios compatibility for easy migration
  • Can use Nagios as the monitoring core (or use Checkmk’s own high performance micro core — CMC)
  • Checkmk Microcore supports existing Nagios checks
  • BUT: no need to live with any of the Nagios deficiencies — the Checkmk Enterprise Edition works 100% stand-alone

What do you like about Checkmk?

See what our users have to say