You log in to your monitoring server, open a dashboard, and wait. The page hangs, fans spin, and someone mumbles about Jetty again. This is where most engineers meet Checkmk Jetty—an invisible but essential piece handling how Checkmk serves its web interface and APIs.
Checkmk is the well-known monitoring system built for serious infrastructure. Jetty is the embedded web server it ships with. The combination works because Jetty is lightweight, Java-based, and designed for responsive, concurrent HTTP handling. Checkmk relies on it to expose monitoring data, configuration pages, and automation endpoints safely and fast.
In practice, think of Checkmk Jetty as the bridge between your browser or automation tool and the Checkmk core. Every login, metrics query, and webhook flows through Jetty. If it misbehaves, user sessions fail or dashboards lag. When tuned correctly, it becomes invisible—in the best way.
Tuning usually starts with configuration. Jetty’s thread pool dictates how many concurrent connections it can handle. For large installations, bump the maximum threads based on your server’s CPU count, but avoid setting it beyond what the JVM can sustain. SSL termination can live in Jetty or behind a reverse proxy like Nginx or HAProxy, depending on your compliance posture. Many teams running Checkmk inside regulated environments prefer using Jetty’s own HTTPS stack tied to enterprise certificates managed via AWS ACM or Azure Key Vault.
Authentication and identity mapping often cause the most friction. Jetty integrates cleanly with SAML and OIDC providers such as Okta or Keycloak. That means single sign-on across your monitoring stack. Set proper role-based access control in Checkmk itself so Jetty’s session layer doesn’t hold excessive privileges.