diff options
author | Thomas Guyot-Sionnest <dermoth@users.sourceforge.net> | 2007-10-25 21:06:08 (GMT) |
---|---|---|
committer | Thomas Guyot-Sionnest <dermoth@users.sourceforge.net> | 2007-10-25 21:06:08 (GMT) |
commit | 2acc26005c5395a96304e7a9e348b2e87f9e45c6 (patch) | |
tree | 86a26267db080bf6aec8f7ba98a3f91bac13e0a9 /NEWS | |
parent | cf0dee616af1f417daa76e746dfaa50947009fac (diff) | |
download | monitoring-plugins-2acc26005c5395a96304e7a9e348b2e87f9e45c6.tar.gz |
check_ntp now return UNKNOWN instead of WARNING if jitter is
unavailable. If no offset threshold is specified and
the offset is unavailable, will return UNKNOWN as well.
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@1811 f882894a-f735-0410-b71e-b25c423dba1c
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 5 |
1 files changed, 5 insertions, 0 deletions
@@ -4,6 +4,11 @@ This file documents the major additions and syntax changes between releases. | |||
4 | Fix check_http regression in 1.4.10 where following redirects to | 4 | Fix check_http regression in 1.4.10 where following redirects to |
5 | relative URLs on virtual hosts failed if both "-H" and "-I" were used | 5 | relative URLs on virtual hosts failed if both "-H" and "-I" were used |
6 | Add stratum thresholds support to check_ntp (feature request #1703823) | 6 | Add stratum thresholds support to check_ntp (feature request #1703823) |
7 | check_ntp now return UNKNOWN instead of WARNING if jitter is unavailable (jitter=-1.000000) | ||
8 | as long as the thresholds range inculde -1. If no offset threshold is specified | ||
9 | and the offset is unavailable, will return UNKNOWN as well. | ||
10 | NOTE: If jitter thresholds are specified integers it will return CRITICAL if jitter | ||
11 | is "-1" as the default range starts at 0. See Examples in --help output. | ||
7 | 12 | ||
8 | 1.4.10 28th September 2007 | 13 | 1.4.10 28th September 2007 |
9 | Fix check_http buffer overflow vulnerability when following HTTP redirects | 14 | Fix check_http buffer overflow vulnerability when following HTTP redirects |