summaryrefslogtreecommitdiffstats
path: root/NEWS
diff options
context:
space:
mode:
authorThomas Guyot-Sionnest <dermoth@users.sourceforge.net>2007-10-25 21:06:08 (GMT)
committerThomas Guyot-Sionnest <dermoth@users.sourceforge.net>2007-10-25 21:06:08 (GMT)
commit2acc26005c5395a96304e7a9e348b2e87f9e45c6 (patch)
tree86a26267db080bf6aec8f7ba98a3f91bac13e0a9 /NEWS
parentcf0dee616af1f417daa76e746dfaa50947009fac (diff)
downloadmonitoring-plugins-2acc26005c5395a96304e7a9e348b2e87f9e45c6.tar.gz
check_ntp now return UNKNOWN instead of WARNING if jitter is
unavailable. If no offset threshold is specified and the offset is unavailable, will return UNKNOWN as well. git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@1811 f882894a-f735-0410-b71e-b25c423dba1c
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS5
1 files changed, 5 insertions, 0 deletions
diff --git a/NEWS b/NEWS
index 361443b..99739a7 100644
--- a/NEWS
+++ b/NEWS
@@ -4,6 +4,11 @@ This file documents the major additions and syntax changes between releases.
4 Fix check_http regression in 1.4.10 where following redirects to 4 Fix check_http regression in 1.4.10 where following redirects to
5 relative URLs on virtual hosts failed if both "-H" and "-I" were used 5 relative URLs on virtual hosts failed if both "-H" and "-I" were used
6 Add stratum thresholds support to check_ntp (feature request #1703823) 6 Add stratum thresholds support to check_ntp (feature request #1703823)
7 check_ntp now return UNKNOWN instead of WARNING if jitter is unavailable (jitter=-1.000000)
8 as long as the thresholds range inculde -1. If no offset threshold is specified
9 and the offset is unavailable, will return UNKNOWN as well.
10 NOTE: If jitter thresholds are specified integers it will return CRITICAL if jitter
11 is "-1" as the default range starts at 0. See Examples in --help output.
7 12
81.4.10 28th September 2007 131.4.10 28th September 2007
9 Fix check_http buffer overflow vulnerability when following HTTP redirects 14 Fix check_http buffer overflow vulnerability when following HTTP redirects