[Nagiosplug-checkins] SF.net SVN: nagiosplug: [1841] nagiosplug/branches/dermoth_ntp_rework/NEWS

dermoth at users.sourceforge.net dermoth at users.sourceforge.net
Tue Dec 4 13:17:50 CET 2007


Revision: 1841
          http://nagiosplug.svn.sourceforge.net/nagiosplug/?rev=1841&view=rev
Author:   dermoth
Date:     2007-12-04 04:17:50 -0800 (Tue, 04 Dec 2007)

Log Message:
-----------
Fix the news :)

Modified Paths:
--------------
    nagiosplug/branches/dermoth_ntp_rework/NEWS

Modified: nagiosplug/branches/dermoth_ntp_rework/NEWS
===================================================================
--- nagiosplug/branches/dermoth_ntp_rework/NEWS	2007-12-04 12:08:34 UTC (rev 1840)
+++ nagiosplug/branches/dermoth_ntp_rework/NEWS	2007-12-04 12:17:50 UTC (rev 1841)
@@ -7,9 +7,11 @@
 	check_ntp now return UNKNOWN instead of WARNING if jitter is unavailable (jitter=-1.000000)
 	  as long as the thresholds range inculde -1. If no offset threshold is specified
 	  and the offset is unavailable, will return UNKNOWN as well.
-	  NOTE: If jitter thresholds are specified integers it will return CRITICAL if jitter
+	  NOTE: If jitter thresholds are specified as integers it will return CRITICAL if jitter
 	  is "-1" as the default range starts at 0. See Examples in --help output.
-	YADDA YADDA YADDA... stratum thresholds support to check_ntp_peer (feature request #1703823)
+  Merge two new checks that deprecates check_ntp: check_ntp_peer and check_ntp_time.
+	  You should read the --help output so see which one is suitable for you. check_ntp_peer
+	  implement stratum thresholds support (feature request #1703823).
 
 1.4.10 28th September 2007
 	Fix check_http buffer overflow vulnerability when following HTTP redirects


This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.




More information about the Commits mailing list