[//]: # (werk v2)
# Check Point plug-ins: increase detection sensitivity
key | value
---------- | ---
date | 2024-08-08T13:12:02+00:00
version | 2.4.0b1
class | fix
edition | cre
component | checks
level | 1
compatible | yes
Some Check Point devices have not been discovered as expected.
We now additionally consider all devices where the system object
identifier points to Check Points enterprise SNMP tree
_".1.3.6.1.4.1.2620"_.
[//]: # (werk v2)
# Check Point plug-ins: increase detection sensitivity
key | value
---------- | ---
date | 2024-08-08T13:12:02+00:00
version | 2.4.0b1
class | fix
edition | cre
component | checks
level | 1
compatible | yes
Some Check Point devices have not been discovered as expected.
We now additionally consider all devices where the system object
identifier points to Check Points enterprise SNMP tree
_".1.3.6.1.4.1.2620"_.
[//]: # (werk v2)
# Automatically sync user visuals to remote sites
key | value
---------- | ---
date | 2024-07-25T13:45:53+00:00
version | 2.4.0b1
class | fix
edition | cre
component | multisite
level | 1
compatible | yes
When adjusting visuals (views, dashboards) the updated visuals are currently
not synced to remote sites until the first activate changes is triggered.
With no pending changes available this was not possible to be done.
Now visuals get automatically synced to remote sites just like user reports and
passwords.
[//]: # (werk v2)
# azure: Handle Azure API rate limit
key | value
---------- | ---
compatible | yes
version | 2.4.0b1
date | 2024-08-07T08:56:46+00:00
level | 1
class | fix
component | checks
edition | cre
After the changes in Azure API rate limits, the Azure agent requests to the API
were getting throttled for the big Azure environments.
This fix introduces handling for throttled requests. If the rate limit is reached,
the agent will repeat the request after 5 s. If it fails again, the agent will repeat the request
after another 10 s.
Additionally, the default limits for 'Lower levels for remaining API reads' in
the 'Azure Agent Info' monitoring rule are removed.
[//]: # (werk v2)
# Don't log unparsable SNMP traps per default
key | value
---------- | ---
date | 2024-08-08T09:11:31+00:00
version | 2.4.0b1
class | fix
edition | cre
component | ec
level | 1
compatible | yes
When an SNMP trap arrives at the event console which can't be parsed for
various reasons (unknown SNMP engine ID, some deserialization error, ...),
we previously logged a full Python backtrace to the EC log. This could lead
to the incorrect conclusion that there is something wrong with the EC
itself, which is not what has actually happened: Actually, some device was
probably misconfigured and/or misbehaving. To avoid such log spam, such a
trap is now silently dropped at the standard "informational" log level, and
more details can be logged at higher levels when needed.
[//]: # (werk v2)
# brocade_fcport: fix operating speed conversion
key | value
---------- | ---
date | 2024-07-09T09:22:21+00:00
version | 2.4.0b1
class | fix
edition | cre
component | checks
level | 1
compatible | yes
This werk affects anyone monitoring Brocade fibre channel ports
by comparing current or average throughput to certain absolute or percentage levels
via the _Brocade FibreChannel ports_ rule.
In the plugin the current operating speed of the interface,
read from the SNMP interface data,
was not properly converted to GByte/s,
the unit of measurement displayed in the interface.
This resulted in an erroneous comparison of values and the related service states.
[//]: # (werk v2)
# Custom graphs: Visibility toggle had no effect
key | value
---------- | ---
date | 2024-08-06T08:29:16+00:00
version | 2.4.0b1
class | fix
edition | cee
component | multisite
level | 1
compatible | yes
The visibility toggle to enable or disable elements of custom graphs had no effect.
[//]: # (werk v2)
# Disable automation user login via HTTP parameters
key | value
---------- | ---
date | 2024-08-05T12:56:10+00:00
version | 2.4.0b1
class | feature
edition | cre
component | wato
level | 1
compatible | no
As announced with Werk #16223 authentication via the `_username`/`_secret` parameters for automation users is disabled by default now.
It can be enabled via the configuration option *Enable automation user authentication via HTTP parameters*.
Please note that this option will be removed with Checkmk 2.5. We highly recommend to switch to Basic Authentication.
[//]: # (werk v2)
# jenkins_version: New check for version of the queried Jenkins instance
key | value
---------- | ---
date | 2024-04-03T14:04:34+00:00
version | 2.4.0b1
class | feature
edition | cre
component | checks
level | 1
compatible | yes
A new check has been added which checks the version of the queried Jenkins instance.
The version is obtained through HTTP headers in the response of existing checks against Jenkins.
No additional configuration is required, besides the initial configuration of the Jenkins integration.
The version of the Jenkins instance will be compared against publically available release information.
In case an update is available the state will change to _warning_.
[//]: # (werk v2)
# agent_netapp_ontap: KeyError: 'rpm' and KeyError: 'temperature'
key | value
---------- | ---
date | 2024-08-01T14:51:58+00:00
version | 2.4.0b1
class | fix
edition | cre
component | checks
level | 1
compatible | yes
This change affects users, which monitor NetApp via Ontap REST API. Previously,
the special agent could crash with the following error:
```
File "/omd/sites/nyccheckmk2/lib/python3/cmk/special_agents/agent_netapp_ontap.py", line 28, in write_section
for element in generator:
File "/omd/sites/nyccheckmk2/lib/python3/cmk/special_agents/agent_netapp_ontap.py", line 471, in fetch_fans
rpm=fan["rpm"],
~~^^^^^^^
KeyError: 'rpm'CRIT
```
This would occur, if either a fan or temperature sensor had an error, and thus
did not report any rpm/temperature value. This has been fixed.