ID: 0930
Title: WATO snapshots: disabled upload of legacy snaphots and snapshots with invalid checksums
Component: WATO
Level: 2
Class: New Feature
Version: 1.2.5i3
The upload of insecure snapshots has been disabled per default, because those
snapshots represent a security risk if their content were modified willingly or unwillingly.
Insecure snapshots are all legacy snapshots and snapshots of the newer type, but with an invalid checksum.
You can re-enable the upload of insecure snapshots via the new global setting<br>
<tt>Configuration GUI (WATO) -> Allow upload of insecure WATO snapshots</tt>
ID: 0929
Title: windows agent: now able to include and execute additional local and plugin scripts as different user
Component: Checks & Agents
Level: 2
Class: New Feature
Version: 1.2.5i3
In the <tt>[local]</tt> and <tt>[plugin]</tt> sections the new option <tt>include</tt> has been introduced.
With this option you can configure additional local and plugin directories, which should get parsed.
You can also configure the the scripts in the given directories should be executed as a different user.
<br><br>
Example configuration:<br>
F+:check_mk.ini
[plugin]
# The scripts in the following folder are executed as user \\ab
include \\ab = C:\users\ab\plugins
# The scripts in the following folder are executed without any changes to the user permission
include - = C:\scripts\plugin
F-:
<b>Important:</b> Keep in mind that the agent needs the permission to run
scripts as other user. Internally it uses the windows command <tt>runas /User:</tt>
which prompts for a password if the windows agent has no permission to change to this user.
ID: 0928
Title: runas: new plugin script to include and execute mrpe, local and plugin scripts as different user
Component: Checks & Agents
Level: 2
Class: New Feature
Version: 1.2.5i3
With the new plugin <tt>runas</tt> you can configure additional include files and
directories for mrpe, local and plugin scripts. You can also change the user context
of each of these scripts. It allows non-root users to add additional scripts which might
get executed with reduced permission.
This check is configured with the configuration file <tt>runas.cfg</tt>.
In a default installation this file is located within the Check_MK config directory under <tt>/etc/check_mk/runas.cfg</tt>.
The <tt>runas.cfg</tt> configuration syntax is as follow
[Script type] [User context] [File / Directory ]
The <tt>Script type</tt> can be set to <tt>mrpe</tt>, <tt>local</tt> and <tt>plugin</tt>.
The <tt>User context</tt> represents the user. If you do not want to change the context set this field to <tt>-</tt>
Depending on the script type the third value points to a file or directory.
The mrpe type requires a target file which contains the mrpe commands.
Local and plugins types require are target folder, which contains the executable local and plugin scripts.<br>
Here is an example configuration:
F+:/etc/check_mk/runas.cfg
mrpe ab /home/ab/mrpe_commands.cfg
mrpe lm /home/lm/mrpe_commands.cfg
mrpe - /root/mrpe/extra_commands.cfg
plugin ab /var/ab/plugins
local ab /var/ab/local
F-:
<b>Note:</b>You need to set up the local and plugin scripts in different folders, because the line
<tt>plugin ab /var/ab/plugins</tt> indicates that all executable files within this folder are treated as plugins.
ID: 0165
Title: ups checks now supports also GE devices (Thanks to Andy Taylor)
Component: Checks & Agents
Level: 1
Class: New Feature
Version: 1.2.5i3
Thanks to a patch from Andy Taylor, our ups checks now supporting devcies from GE.
ID: 0927
Title: windows agent: now able to evaluate logfiles written in unicode (2 bytes per character)
Component: Checks & Agents
Level: 2
Class: New Feature
Version: 1.2.5i3
The windows agent was unable to process logfiles which were written as unicode. Those files
had binary zeros every other byte, rendering the normal "readline" logfile processing useless.<br>
The agent can now read unicode files correctly, convert each line to a multibyte representation
(most of the time it is only a single byte) and apply the configured logfile patterns accordingly.
ID: 0164
Title: symantec_av_progstate,symantec_av_quarantine, symantec_av_updates: New checks for Symantec Anti Virus on Linux
Component: Checks & Agents
Level: 1
Class: New Feature
Version: 1.2.5i3
ID: 0163
Title: kaspersky_av_quarantine,kaspersky_av_tasks,kaspersky_av_updates: New checks for kaspersky anti virus on linux
Component: Checks & Agents
Level: 1
Class: New Feature
Version: 1.2.5i3
ID: 0926
Title: windows agent: local / plugin scripts now get the REMOTE_HOST as environment variable
Component: Checks & Agents
Level: 1
Class: New Feature
Version: 1.2.5i3