Reduce Alert Noise by 70% — See Intelligent On-Call in Action Book a demo


Checkmk Integration with ITOC360

Checkmk gives your operations team precise visibility into hosts, services, and network devices. But when a CRITICAL alert fires at 3 AM, a notification script that silently logs to a file or sends a single email does not guarantee a human response. Engineers miss alerts, SLAs slip, and downtime extends.

ITOC360 connects directly to Checkmk as a native notification script. When your defined thresholds trigger, ITOC360 identifies the current on-call engineer from your schedule and reaches them via their preferred channel. If there is no acknowledgment, escalation begins automatically.

How ITOC360 Connects to Checkmk

80% of outages are avoidable. Checkmk identifies the issue; ITOC360 ensures a human response matches that detection speed.

Notification via preferred channel

Voice call, SMS, or email delivered the moment Checkmk fires a PROBLEM notification.

Native script integration

Functions as a standard Checkmk notification script. No changes to your existing hosts, services, or threshold configuration.

Severity-aware routing

Checkmk WARNING maps to Medium, CRITICAL maps to Critical. Escalation policies respond accordingly.

Automatic resolution

When Checkmk sends a RECOVERY notification, ITOC360 closes the active alert automatically.

Why Checkmk Alerts Get Missed Outside Business Hours

Checkmk is exceptional at detecting infrastructure problems. The gap appears after detection: the alert is dispatched via the configured notification method and the process stops. If the engineer is asleep, offline, or has notifications silenced, the PROBLEM continues until someone manually checks the dashboard.

ITOC360 closes this gap. When Checkmk triggers the notification script, ITOC360 looks up who is on-call at that exact moment and actively reaches them. If the first responder does not acknowledge within your configured timeout, the system escalates to the next level automatically. Your existing Checkmk configuration remains completely unchanged.

Checkmk Detection Meeting Active Escalation

Checkmk identifies the issue, but passive channels cannot guarantee a human response. ITOC360 bridges that gap, notifying the right expert via their preferred channel and escalating until someone responds.

How Do Teams Typically Set This Up?

Common questions about integrating Checkmk with ITOC360.

How does ITOC360 connect to Checkmk?

Via a custom notification script (itoc360.sh) placed in your Checkmk notification scripts directory. The script sends a POST request to the ITOC360 API with the alert payload. You add it as a notification rule in Checkmk Setup and provide your ITOC360 token as a parameter.

Do I need to change my existing Checkmk notification rules?

No. You add ITOC360 as an additional notification rule. Existing rules for email or other methods continue operating in parallel.

Can I route different host groups to different on-call teams?

Yes. Create separate notification rules in Checkmk scoped to specific host groups or services, each pointing to a different escalation policy in ITOC360.

What severity levels does the integration support?

OK maps to LOW, WARNING to MEDIUM, and CRITICAL to CRITICAL. UNKNOWN defaults to MEDIUM. These priorities drive which escalation policy levels are triggered.

Is postmortem reporting available?

Yes. ITOC360 records the full incident timeline: when Checkmk fired the alert, when the first notification was sent, and when an engineer acknowledged the incident.

How it works

1
MONITORING SOURCES
Zabbix
Prometheus
Datadog
AWS CloudWatch
AppDynamics
AWS Budget
AWS GuardDuty
Azure DevOps
Azure Log Alerts
Azure Metric Alerts
Azure Sentinel
CrowdStrike
Dynatrace
Google Cloud Monitor
Google SCC
Grafana
ManageEngine OpManager
New Relic
PRTG Network Monitor
Site24x7
Custom Webhook
Zabbix
Prometheus
Datadog
AWS CloudWatch
AppDynamics
AWS Budget
AWS GuardDuty
Azure DevOps
Azure Log Alerts
Azure Metric Alerts
Azure Sentinel
CrowdStrike
Dynatrace
Google Cloud Monitor
Google SCC
Grafana
ManageEngine OpManager
New Relic
PRTG Network Monitor
Site24x7
Custom Webhook
Growing Integration Library
2
ITOC360 CORE
Alert Ingestion & Deduplication
Noise Reduction / Grouping
4
NOTIFICATION LAYER
SMS
Voice Call
E-mail
3
ROUTING ENGINE
On-call Schedule
Escalation Policy
Rotations
5
RESPONDER ACTIONS
Acknowledge
Assign
Resolve
6
POST-INCIDENT
Timeline Report

Knowledge Base

Ready to Orchestrate Your Incident Response?

Why Traditional On-Call Fails.

Alert storms, manual processes, missed incidents, and no clear ownership cause long MTTR and burned-out engineers. Your on-call engineers should only wake up when it truly matters.

We Orchestrate the Entire Flow.

We don't just notify people. ITOC360 orchestrates the entire incident response flow automated, structured, and predictable with intelligent alert correlation, automated escalation policies, and full traceability.

Built for Modern Ops Teams.

Ideal for DevOps, SRE, NOC teams, MSPs, and enterprises where uptime matters. Use ITOC360 to cut alert noise, reduce missed incidents, improve SLA compliance, and shorten resolution time.