What is a cmk file
If you are aware of any additional file formats that use the CMK extension, please let us know. The best way to open an CMK file is to simply double-click it and let the default assoisated application open the file. If you are unable to open the file this way, it may be because you do not have the correct application associated with the extension to view or edit the CMK file.
If Cmk is equal to Cm, the machine is set to produce exactly in the middle of the tolerance range see Fig. Control limits are an important aspect of statistical process control. They have nothing to do with tolerance limits, because they are designed to call your attention when the process changes its behaviour.
An important principle is that control limits are used along with the mean value on the control graph to control the process, unlike tolerance limits, which are used along with individual measurements to determine whether a given part meets specifications or not.
The function of control limits is to centre the process on the target value, which is usually the same as the middle of the tolerance width, and to show where the limit of a stable process lies. This means, in principle, that you have no reason to react until the control chart signals certain behaviour. A commonly used control graph is the XR graph, where the position and spread of the process are monitored with the help of sub groups and control limits.
If a point falls outside a control limit on the X graph, the position of the process has changed see Fig. These are the factors that are generally regarded as causing variation in capability measurements:. Centring value for target value. This is the distance from the target value T to the mean value of the machine or process spread the hump on the normal distribution curve , expressed as a percentage of the tolerance width see Fig.
Normal distribution curve. Also called the bell curve because of its shape, this is the pattern in which measurement readings are distributed in most cases as a result of random variations about the mean value the highest point on the hump, see Fig.
Note that most of the readings are grouped near the hump; the farther out toward the edges, the fewer the readings. In other words it is not very likely that you will find any components at all giving widely deviant readings when making normal spot-check measurements. So it is not enough that the components you happen to measure are all within the tolerances. It takes measurements of a large number of components to determine the size and shape of the bell curve, and that can be time-consuming.
But the standard deviation offers you a shortcut! Read about the standard deviation ». Machine capability Machine capability is measured in Cm and Cmk; it is a snapshot picture that shows how well a machine is performing right now in relation to the tolerance limits. Figure 6 shows some examples. Process capability Process capability is a long-term study, measured in Cp and Cpk, that shows how well a process is performing in relation to the tolerance limits while the study is in progress, as well as indicating likely performance in the immediate future.
You could say that process capability is the sum of a index of machine capabilities measured over a period of time see Fig. When measuring process capability, you must include everything that affects the process, i.
Read more about The six factors ». A visit to any site or page from our web site via these links is done entirely at your own risk. Legal notice: You may not, under any circumstances, resell or reproduce any information for commercial use without the express prior written consent of File-Extensions. Scripts to automatically harvest results are strictly prohibited due to performance reasons and will result in your IP being banned from this website.
Enter any file extension without dot e. What is cmk file? How to open cmk files? These are intended for your own changes or extensions to the software. Checkmk could attempt to execute these files as a part of the software. Likewise, in a distributed monitoring the data will also be duplicated to all remote sites.
As just shown in the above table, the local directory with its numerous subdirectories is intended for your own extensions. With the practical tree command you can quickly get an overview of the structure of local.
The -L 3 option restricts the depth to All of the directories in the lowest level are actively integrated in the software. Here it applies that in the case of identical names the file in local always has priority. The procedure is simple:. Regarding point 3 above, if it is not known exactly which service to which the change applies, simply restart the complete site with omd restart.
All log files of the relevant components can be found there:. Alternatively it is possible to also customize the the log levels on the command line in configuration files. The files are each called global. Specify the entries if they are not already present, which is the case, if a Factory setting has not yet been changed. Here there are eight gradations 0 to 7 ranging from 0 for Emergency to 7 which stands for Debug. The amount of logged data increases inversely as the count decreases.
The lowest log level is 50 Critical while the most data will be logged at 10 which corresponds to the highest Debug. This file is used for Livestatus Proxy logging. The possible values here correspond to those for User Interface logging.
Important : Log files can quickly become very large if a high level has been set. It is generally advisable to use such settings for a 'temporary' customization, as an aid in problem identification for example. Along with the omd command , which serves for starting and stopping sites, for the basic configuration of components, and for starting a software update , cmk is the most important command. With this a configuration for a monitoring core can be created, checks executed manually, a service discovery performed, and much more.
The command includes a built-in, very detailed online help, that can be called up with --help option:. As you can see in the command above, we have called help with the option -h instead of --help. Because what is true for the command itself is also true for its options: The less there is to type, the faster it goes.
Not for all options, but for those that are often needed, there is therefore a short form in addition to the long form. If in doubt, you can always consult the command help. A longer look in the command help is a good idea in any case, as we will not present all options in the User guide.
By entering an option, you start the command cmk in a certain mode. Here follows the overview of the options we will present in this chapter, but also in other parts of the manual:. Executing checks on host myserver Runs the discovery check on the host, which checks for new and disappeared services and for new host labels. By default, this command is executed in a Checkmk site every 5 minutes via cronjob.
You can display the cronjobs with crontab -l. Showing a check plug-in manual page here of plug-in df. Deletes the DNS cache and re-creates it. For details on the DNS cache, see the article on hosts.
By default, this command is executed in a Checkmk site once a day via cronjob. Pulling an SNMP walk from host myswitch. Creating support diagnostics dump. In some modes, further, specific options are available to you, e.
Prompts cmk to produce a detailed dump of its current activity 'verbose'. The information is read from cache files, even if they are out of date. The agent is only contacted if no cache file exists. Works like --cache , however it will interrupt with if a cache file is absent or not current.
Thus in any situation you can suppress an access to the agent. If an error occurs, this option ensures that it will no longer be intercepted, rather the original Python exception will be displayed in full. This can be important information for the developer, by showing the exact program location in which the error is located.
It will also be very helpful with locating errors in self-written check plug-ins. If when invoking cmk an error is encountered which should be reported to support or feedback, repeat the request with the added --debug option, and attach the Python trace to your e-mail. In the following section we will show how the commands can be used. The examples are mostly shown in an abbreviated form.
An important task for the cmk is the generation of a configuration file that is readable for the core, and which contains all of the configured hosts, services, contacts, contact groups, time periods, etc. For Nagios as well as for the CMC, it is fundamental that the number of hosts, services and other objects always remains static during the operation, and that this number can only be altered through the generation of a new configuration, followed by a reloading of the core.
With Nagios a restart of the core is also needed. The CMC has a very efficient function for the reloading of its configuration during active processing. The Setup keeps a record of such changes and highlights them in the GUI as to activating changes.
The following commands serve this function:. Generates a new configuration for the core and restarts the core analogous to omd restart core. This is the method provided for Nagios. Generates the configuration for the core and loads this without a restart of the active processing analogous to omd reload core. This is the recommended variant with the CMC.
Attention: With Nagios as the core this option still functions, but it can lead to memory holes and other instabilities. Apart from that, this option does in any case not perform a genuine reload, rather it internally stops and restarts the process, as it were. For diagnostic purposes, this outputs the configuration to be generated on the standard output, without altering the actual configuration file. To summarize: If you want to customize a Checkmk configuration and activate the changes, in Nagios you will subsequently require:.
With this you can allow all automatically detected, and also manually configured services, to be immediately checked, without needing to bother yourself with the monitoring core or the GUI. To do this, enter cmk --check followed by the name of a host configured in the monitoring. Since the --check option is the default option of cmk , you can also omit it.