Checkmk Cloud
Enjoy the ease of a hassle-free setup and maintenance-free operations with Checkmk Cloud. Get seamless visibility from cloud to edge and experience the convenience of an out-of-the-box SaaS monitoring solution.
Hybrid and cloud monitoring
Take advantage of centralized monitoring for both cloud and on-premises assets. Optimized for small to mid-sized hybrid infrastructures.
Easy & quick onboarding
Set up your monitoring in minutes. Bring visibility into your infrastructure and applications quickly and effortlessly.
No maintenance required
Experience an always up-to-date monitoring solution with the latest features and security patches.
Monitoring for any cloud environment
Track hundreds of system and infrastructure parameters to ensure your cloud services and workloads are running efficiently. With Checkmk, monitoring your servers, applications, containers and databases becomes effortless.
- Intelligent monitoring: Keep a close eye on all your cloud services and infrastructure.
- Reliable performance: Maintain the health and reliability of your cloud workloads effortlessly and ensure your cloud resources are performing at their best.
- Auto-detection: Automatically identify cloud components and stay informed about any changes in your environment.
- In-depth visibility: Monitor resource usage at both the OS and application levels with detailed cloud monitoring.
Versatile server monitoring
Gain a comprehensive overview of your servers’ health and performance, from data centers to the cloud. Checkmk supports all server types, offering insights into critical components such as CPU, memory, disks, system services, processes, network interfaces, and file systems. Quickly identify and resolve any performance or availability issues.
- Wide compatibility: Native agents for Windows, Linux, and many other operating systems.
- Ready for any server type: Monitoring for web, mail, database servers, and more.
- Instant insights: Out-of-the-box dashboards for Linux, Windows, and cloud servers providing key metrics.
Automation built-in
Automate your entire monitoring process with Checkmk’s powerful features, taking manual work off your shoulders:
- Extensive REST API: Automate monitoring tasks with a robust API.
- Auto-discovery: Automatically detect hosts and their services.
- Host lifecycle management: Ensure up-to-date monitoring of dynamic environments with minimal effort.
- Central agent management: Easily distribute, install and auto-update monitoring agents.
- Cloud workload registration: Auto-register cloud workloads in your monitoring, adding and removing cloud objects in real time.
Effortless IT monitoring
Experience the convenience of a monitoring solution with numerous features that lighten your workload and save you time.
- Smart and granular alerting: Leverage built-in metric thresholds to automatically generate alerts and customize them to suit your needs.
- Avoid notification overload: Notify granularly and in real-time only the responsible teams via email, Slack, or MS Teams, or automatically generate tickets in ITSM systems, like ServiceNow and Jira.
- Automated reporting: Create meaningful reports containing pre-built or custom views – either on demand, or automated at regular intervals.
- Visualize your IT: Achieve full visibility into the state of your IT with modern, customizable dashboards, complete with graphic maps and diagrams with live monitoring data.
- Security built-in: Checkmk includes security features such as TLS and AES-256 encryption, central user access and permission management via SAML, and is developed by an ISO27001 certified vendor.
Focus on monitoring, not maintenance
Experience the advantages of a hosted monitoring solution without the hassle of maintenance.
- Seamless onboarding: Start monitoring immediately with intuitive onboarding and pre-configured settings, offering instant insights into your cloud and hybrid IT infrastructures.
- Always up-to-date: Enjoy the latest features, security patches, and automatic backups with Checkmk Cloud.
- High Availability: Benefit from a reliable, out-of-the-box monitoring solution hosted on AWS in Europe and North America.
- Optimal performance: Effortlessly scale with minimal latency thanks to regional hosting.
Coming soon
Monitor devices and environments that can only be monitored via SNMP
Support SSO via Microsoft EntraID (formerly known as Azure AD)
Monitor systems that are accessible only via APIs and are not reachable from the internet
Giving users the possibility to host their Checkmk site in the US or in the EU. All site specific data will remain in that region
Checkmk Cloud Beta & Security FAQs
We plan on running the Beta until we commercially release the SaaS version of Checkmk Cloud later this year. There are no plans to limit access during this time, and access will remain free of charge. However, we will pause sites every 14 days with the option to manually reactivate it at any time. If your site has been paused, you will see a prompt to reactivate it the next time you log in. There are no limits to how often you can do this.
Yes, the beta is limited to 5k services.
No, any configuration or monitoring data created during the beta will be deleted at the end of the beta program.
No, we do not plan on offering a migration of configuration or monitoring data once Checkmk Cloud launches.
You can use the Checkmk Cloud Beta to monitor any systems in your infrastructure, but we strongly discourage relying on the beta for any production or critical workflows, since we provide system availability on a best effort basis.
Please note that Network Device Monitoring, including SNMP-based monitoring, is not available in this beta version of our product.
However, we recognize the importance of these features and are actively working on them. They are on our roadmap for the public release, and we are committed to providing these capabilities soon. Thank you for your understanding and patience as we continue to enhance our product.
Please note that monitoring virtualization platforms (e.g. vSphere, Proxmox, etc.), storage solutions, and other systems that are not accessible from outside your network and are being monitored via a special agent is not included in this beta version of Checkmk Cloud SaaS.
However, we understand the importance of these features and are actively working on them. They are on our roadmap for the public release, and we are committed to providing these capabilities soon. Thank you for your understanding and patience as we enhance our product.
We provide system availability on a best effort basis. This means that while we strive to maintain the highest possible uptime, we do not guarantee continuous and uninterrupted service.
We are planning on launching Checkmk Cloud later this year.
Tenants are separated at multiple levels. We ensure that tenants cannot communicate with each other by using network policies that explicitly forbid such traffic. Furthermore, tenant data is stored on separate volumes that are dedicated to the tenant and bound only to their Checkmk site.
Network traffic between any two points is encrypted with TLS certificates, both externally and internally within our network. We require TLS 1.2 and recommend TLS 1.3 at all times. Data at rest is encrypted using the industry standard AES-256 encryption algorithm.
We are using the principle of least privilege for all our internal access needs, with a focus on limiting any access to the production environment. Access to all our systems is automatically logged within their respective environment and the log data is also shipped to a designated account that only Auditors and Security Engineers can access. Client logs are kept separate from our application logs, within the region, where they can only be accessed with consent from the client during an investigation.
Yes, we conduct regular pen tests of our infrastructure and our management application.
We use AWS Cognito to manage identities centrally. The passwords are only stored in Cognito, and we use an authentication app in front of Cognito to host a nicer frontend. The authentication app has been reviewed by security engineers to not log any sensitive information.
Currently, 12-Chars length with at least one instance of upper case letter, lower case letter, number, special symbol, each. For special characters we allow any valid UTF-8 character, even emoji. We plan to show a password strength meter and check the Have I been Pwned database if the password is known in a breach.