Module: check_mk
Branch: master
Commit: 1cb127801176f34fda3b46bd701213b4b94ed29c
URL: http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=1cb127801176f3…
Author: Tom Baerwinkel <tb(a)mathias-kettner.de>
Date: Wed Mar 6 15:14:41 2019 +0100
7064 cpu.threads: now returns the percentage of threads used
The check cpu.threads is now able to return the percentage of threads
used on linux systems. To use this feature the check_mk_agent has to
be updated. Levels for the thread usage can be defined in WATO.
Change-Id: I7238a0e78b8434e17c0ce927205e1ae31cead9ec
---
.werks/7064 | 12 ++++++
agents/check_mk_agent.linux | 3 ++
checks/cpu | 48 ++++++++++++++++------
cmk/gui/plugins/metrics/check_mk.py | 12 ++++++
cmk/gui/plugins/wato/check_parameters/threads.py | 36 ++++++++++++----
pnp-templates/check_mk-cpu.threads.php | 44 --------------------
.../generictests/datasets/cpu_1_regression.py | 37 +++++++++++++++++
.../generictests/datasets/cpu_2_regression.py | 36 ++++++++++++++++
8 files changed, 163 insertions(+), 65 deletions(-)
Diff: http://git.mathias-kettner.de/git/?p=check_mk.git;a=commitdiff;h=1cb1278011…
Module: check_mk
Branch: master
Commit: cc3fe3ffed83f114d24ab1001ba6782c932b3514
URL: http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=cc3fe3ffed83f1…
Author: Tom Baerwinkel <tb(a)mathias-kettner.de>
Date: Wed Mar 6 08:41:05 2019 +0100
Allow "null" rules in ClusterRoles in the k8s client
In some OpenShift installations several ClusterRoles with a value
of "null" for the rules are created. This is not allowed by the
official Kubernetes API, but we have to handle it here to be
able to monitor such installations.
CMK-1738
Change-Id: I275769560c0fa968cfd8f3fa9fd2235ecfdda4bc
---
.../0020-kubernetes-allow-empty-rules-in-clusterrole.dif | 11 +++++++++++
.../cmk/special_agents/test_agent_kubernetes.py | 14 ++++++++++++++
2 files changed, 25 insertions(+)
diff --git a/omd/packages/python-modules/patches/0020-kubernetes-allow-empty-rules-in-clusterrole.dif b/omd/packages/python-modules/patches/0020-kubernetes-allow-empty-rules-in-clusterrole.dif
new file mode 100644
index 0000000..cc74786
--- /dev/null
+++ b/omd/packages/python-modules/patches/0020-kubernetes-allow-empty-rules-in-clusterrole.dif
@@ -0,0 +1,11 @@
+--- dest/kubernetes-8.0.0.orig/kubernetes/client/models/v1_cluster_role.py
++++ dest/kubernetes-8.0.0/kubernetes/client/models/v1_cluster_role.py
+@@ -181,7 +181,7 @@ class V1ClusterRole(object):
+ :type: list[V1PolicyRule]
+ """
+ if rules is None:
+- raise ValueError("Invalid value for `rules`, must not be `None`")
++ rules = []
+
+ self._rules = rules
+
diff --git a/tests/integration/cmk/special_agents/test_agent_kubernetes.py b/tests/integration/cmk/special_agents/test_agent_kubernetes.py
new file mode 100644
index 0000000..84ebdd6
--- /dev/null
+++ b/tests/integration/cmk/special_agents/test_agent_kubernetes.py
@@ -0,0 +1,14 @@
+import pytest
+
+from kubernetes.client.models import V1ClusterRole
+
+
+def test_v1_clusterrole_without_rules():
+ try:
+ role = V1ClusterRole(rules=None)
+ except ValueError:
+ pytest.fail(
+ "It must be possible to instantiate a V1ClusterRole without explicit roles. "
+ "This is assured by patch 0020-kubernetes-allow-empty-rules-in-clusterrole.dif.")
+
+ assert role.rules == []
Module: check_mk
Branch: master
Commit: 92f10789f01a236053d47a2ebf71945d44769e1a
URL: http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=92f10789f01a23…
Author: Simon Betz <si(a)mathias-kettner.de>
Date: Tue Mar 5 14:16:04 2019 +0100
7115 FIX stormshield.include: Fixed possible performance losses
Change-Id: I6a365d85632aafb7e87d2baef70b6a7d05f6c15a
---
.werks/7115 | 20 ++++++++++++++++++++
checks/stormshield.include | 5 ++---
2 files changed, 22 insertions(+), 3 deletions(-)
diff --git a/.werks/7115 b/.werks/7115
new file mode 100644
index 0000000..a1fd940
--- /dev/null
+++ b/.werks/7115
@@ -0,0 +1,20 @@
+Title: stormshield.include: Fixed possible performance losses
+Level: 1
+Component: checks
+Compatible: compat
+Edition: cre
+Version: 1.6.0i1
+Date: 1551791544
+Class: fix
+
+SNMP scan functions have the task to filter out SNMP hosts
+for which it's not worth trying to discover related services.
+
+In order to achieve this every scan function tries
+to find out the right device type by reference to
+SNMP SysObjID and/or SNMP SysDescr.
+
+The stormshield scan functions were not restrictive enough and
+the result was that for every SNMP host the SNMP table
+below .1.3.6.1.4.1.11256 was requested. This might led to
+losses during service discovery of all SNMP devices.
diff --git a/checks/stormshield.include b/checks/stormshield.include
index 7e2dd48..6b2e4c9 100644
--- a/checks/stormshield.include
+++ b/checks/stormshield.include
@@ -24,8 +24,7 @@
# to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
# Boston, MA 02110-1301 USA.
-# example output
-
def stormshield_scan_function(oid):
- return oid('.1.3.6.1.4.1.11256.1.0.1.0')
+ return (oid(".1.3.6.1.2.1.1.2.0").startswith('.1.3.6.1.4.1.8072') and
+ oid('.1.3.6.1.4.1.11256.1.0.1.0'))
Module: check_mk
Branch: master
Commit: 9fb3780d7fa001d76d5e82ff115d6ffd06d1cb46
URL: http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=9fb3780d7fa001…
Author: Alex Zurhake <az(a)mathias-kettner.de>
Date: Wed Mar 6 11:07:02 2019 +0100
7155 Ended Support for SLES 11 in version 1.6
Since SLES 11 are using a OpenSSL version before 1.0.0 we decided to end the support for SLES 11 for our next release. Many Python packages, that are used in Check_MK are dependent on newer OpenSSL versions. An old OpenSSL version is not only a security risk but also a threat for compatibility and stability.
Change-Id: I4bbd323c99ceaa78e389f34980df8c727a858611
---
.werks/7155 | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/.werks/7155 b/.werks/7155
new file mode 100644
index 0000000..941285e
--- /dev/null
+++ b/.werks/7155
@@ -0,0 +1,10 @@
+Title: Ended Support for SLES 11 in version 1.6
+Level: 1
+Component: distros
+Compatible: compat
+Edition: cre
+Version: 1.6.0i1
+Date: 1551866384
+Class: feature
+
+Since SLES 11 are using a OpenSSL version before 1.0.0 we decided to end the support for SLES 11 for our next release. Many Python packages, that are used in Check_MK are dependent on newer OpenSSL versions. An old OpenSSL version is not only a security risk but also a threat for compatibility and stability.