[Nagiosplug-checkins] SF.net SVN: nagiosplug: [1841] nagiosplug/branches/dermoth_ntp_rework/NEWS
dermoth at users.sourceforge.net
dermoth at users.sourceforge.net
Tue Dec 4 13:17:50 CET 2007
Revision: 1841
http://nagiosplug.svn.sourceforge.net/nagiosplug/?rev=1841&view=rev
Author: dermoth
Date: 2007-12-04 04:17:50 -0800 (Tue, 04 Dec 2007)
Log Message:
-----------
Fix the news :)
Modified Paths:
--------------
nagiosplug/branches/dermoth_ntp_rework/NEWS
Modified: nagiosplug/branches/dermoth_ntp_rework/NEWS
===================================================================
--- nagiosplug/branches/dermoth_ntp_rework/NEWS 2007-12-04 12:08:34 UTC (rev 1840)
+++ nagiosplug/branches/dermoth_ntp_rework/NEWS 2007-12-04 12:17:50 UTC (rev 1841)
@@ -7,9 +7,11 @@
check_ntp now return UNKNOWN instead of WARNING if jitter is unavailable (jitter=-1.000000)
as long as the thresholds range inculde -1. If no offset threshold is specified
and the offset is unavailable, will return UNKNOWN as well.
- NOTE: If jitter thresholds are specified integers it will return CRITICAL if jitter
+ NOTE: If jitter thresholds are specified as integers it will return CRITICAL if jitter
is "-1" as the default range starts at 0. See Examples in --help output.
- YADDA YADDA YADDA... stratum thresholds support to check_ntp_peer (feature request #1703823)
+ Merge two new checks that deprecates check_ntp: check_ntp_peer and check_ntp_time.
+ You should read the --help output so see which one is suitable for you. check_ntp_peer
+ implement stratum thresholds support (feature request #1703823).
1.4.10 28th September 2007
Fix check_http buffer overflow vulnerability when following HTTP redirects
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the Commits
mailing list