ID: 15619
Title: <tt>mk_postgres.py</tt>: Allow Declaring PG_BINARY_NAME in <tt>postgres.cfg</tt>
Component: Checks & agents
Level: 1
Class: New feature
Version: 2.3.0b1
Previously, <tt>mk_postgres.py</tt> always dynamically determine the path to the <tt>psql</tt>
binary. With this Werk, the user may skip this dynamic configuration. This is done by specifying the
binary path in <tt>postgres.cfg</tt> as follows:
C+:
PG_BINARY_PATH=C:\PostgreSQL\15\bin\psql.exe
DBUSER=user_xy
C-:
ID: 15267
Title: License verification: Incorrect error message when saving licensing credentials
Component: Setup
Level: 1
Class: Bug fix
Version: 2.3.0b1
This werk is relevant for users that use the Checkmk Cloud Edition and use the Online Verification modus to verify their license.
If the licensing credentials are configured under <tt>Setup > Maintenance > Licensing > Edit settings</tt> and the settings are saved, an error message will be shown.
The message claims that the last verification failed with the specific error "Verification failed (The Licensing ID or password you entered is incorrect.)". In this instance, the message is incorrect and the verification can be attempted regardless.
With this werk this has been fixed.
ID: 15268
Title: Incorrect edition provided by livestatus after update using Nagios core
Component: Site Management
Level: 1
Class: Bug fix
Version: 2.3.0b1
This werk is relevant to users operating Checkmk with Nagios core that are using the new "edition" livestatus column or the Checkmk Cloud Edition with Distributed Monitoring.
If such a system is updated to another edition, the livestatus information is not updated with it.
Since this information is used to determine compatibility between central and remote sites in Distributed Monitoring, sites can incorrectly be detected as incompatible.
With this werk, an update will update the livestatus information as well.
ID: 15679
Title: host_config: moving a host to a different folder only permitted if user has permission
Component: REST API
Level: 1
Class: Bug fix
Version: 2.3.0b1
This werk addresses an issue that allowed an api user to move a host from one
folder to another when the user didn't belong to the same contact group. The api
user now has to be part of the same contact group as the source folder, target
folder and the host in order to be able to move the host. Please update any client
scripts accordingly.
ID: 15853
Title: <tt>omd update</tt> reports <tt>etc/omd/allocated_ports</tt> as unwanted
Component: Site Management
Level: 1
Class: Bug fix
Version: 2.2.0p1
During an update from 2.2.0b6+ to 2.2.0, the following message was displayed:
C+:
* Unwanted etc/omd/allocated_ports (unchanged, removed by you)
C-:
This message can be safely ignored. When updating from 2.2.0 to 2.2.0p1+, Checkmk will report
C+:
* Obsolete etc/omd/allocated_ports
C-:
Afterwards, no further messages about this file will be displayed.
ID: 15858
Title: cifsmounts: Properly deal with spaces in CIFS mounts
Component: Checks & agents
Level: 1
Class: Bug fix
Version: 2.3.0b1
The plugin <i>"Health of CIFS Mounts Mounted on UNIX/ Linux"</i> did not properly deal with mount sources containing white spaces.
ID: 15850
Title: Agent plugin for monitoring Mailman 3 mailing lists
Component: Checks & agents
Level: 1
Class: New feature
Version: 2.3.0b1
Before this werk, Checkmk included the agent plugin <tt>mailman_lists</tt>, which monitored Mailman
2 mailing lists. As of this werk, Checkmk includes the plugins <tt>mailman2_lists</tt> and
<tt>mailman3_lists</tt>, which monitor Mailman 2/3 mailing lists. If the bakery is configured to
deploy the Mailman plugin, both plugins will be installed, since only one of them will be
operational, depending on the Mailman version installed on the target system.
ID: 15752
Title: azure_virtual_network_gateways: Fix crash in parsing Azure VNet gateway section
Component: Checks & agents
Level: 1
Class: Bug fix
Version: 2.3.0b1
If you are monitoring an Azure VNet gateway that has BGP enabled, but does not have any BGP
peering addresses, the section parsing crashed:
C+:
ValidationError (([ErrorWrapper(exc=ValidationError(model='BgpSettings', errors=[{'loc': ('bgpPeeringAddresses',), 'msg': 'field required', 'type': 'value_error.missing'}]), loc=('bgpSettings',))], <class 'cmk.base.plugins.agent_based.azure_virtual_network_gateways.VNetGWSettings'>))
C-:
ID: 15688
Title: Switch agent-receiver certificate
Component: Checks & agents
Level: 1
Class: New feature
Version: 2.3.0b1
Previous to this Werk the <tt>agent-receiver</tt> used its own certificate for TLS.
Since the CN was identical to the general site certificate the agent-receiver now uses this general certificate.
CN and signing CA stay the same, therefore all supported clients continue to work.
ID: 15617
Title: KUBE: Improve Validation of URLs
Component: Checks & agents
Level: 1
Class: Bug fix
Version: 2.3.0b1
With this Werk, the rule <tt>Kubernetes</tt> will validate URLs more stringently. Specifically, the
rules of RFC 3986 are applied. Some examples of URLs, which would previously be allowed:
LI: http://::1
LI: http://localhost!:8080
LI: http://:8080