[Release] Checkmk stable release 2.1.0p28

Dear friends of Checkmk,

the new stable release 2.1.0p28 of Checkmk is ready for download.

This maintenance release ships with 35 changes affecting all editions of Checkmk,
2 Enterprise Edition specific changes and 0 Managed Services Edition specific changes.

Support periods can be found here: Checkmk versions

Changes in all Checkmk Editions:

Agent bakery:

  • 15734 FIX: Unix agents: Fix asynchronous plugin execution via xinetd and ssh…
  • 15467 FIX: sap_hana: Enable clustering of active and passive nodes…

BI:

  • 14197 FIX: BI sample configuration: fixed missing filesystems due to incorrectly used placeholder

Checks & agents:

  • 15535 IPMI sensors: Do not discover single absent sensors…
  • 15536 IPMI sensors: consider sensor state as reported by freeipmi…
  • 15735 FIX: check_traceroute: Fix checking of routers specified by domain name…
  • 15736 FIX: check_traceroute: Report correct number of hops
  • 15737 FIX: docker_node_info: Fix sporadic UNKN if host is monitored by multiple sites…
  • 15739 FIX: fortisandbox_disk_usage: Fix KeyError: ‘disk_used’…
  • 15738 FIX: ucs_c_rack_server_util_cpu: Take user-configured parameters into account…
  • 15266 FIX: Check plugin logwatch_ec: Improve detection of missing log files…
  • 15264 FIX: Check plugins logwatch, logwatch_ec: Notify about unreadable log file
  • 14198 FIX: Cluster configuration: Fixed risk of missing services if a cluster resources switches between nodes
  • 15540 FIX: Fix discovery for distributed setups with a remote 2.1.0p27 site…
  • 14199 FIX: Rule evaluation: Fixed unnecessary reloading of host labels
  • 14955 FIX: Windows agent plugin hyperv_vms_guestinfos uses UTF-8
  • 15469 FIX: aws_elb: Fix crash in AWS/ELB Statistics…
  • 15472 FIX: check_mail_loop, check_mail: Fix argument parsing
  • 13269 FIX: check_mail_loop: AssertionError when using PasswordStore
  • 15538 FIX: win_printers: Do not discover offline printers

Configuration generation:

  • 14200 Improved performance for some automation and command line calls…
  • 15747 FIX: Fix macro replacement in special agents

Dynamic host configuration:

  • 15608 FIX: Show explanation message instead of KeyError: ‘extensions’…

Livestatus:

  • 15256 FIX: Fixed handling of unknown time periods when using the Nagios core…

REST API:

  • 15191 SEC: Livestatus command injection in RestAPI…
  • 13982 SEC: Reading host_config’s will now honour contact groups…
  • 13985 FIX: ‘debug’ setting will no longer try to load a non existing JavaScript file
  • 15746 FIX: ‘mk_inventory’ column can now be returned from ‘host’ endpoints
  • 13984 FIX: When creating a folder, it is no longer necessary to specify a name…

Setup:

  • 15484 FIX: Fix encoding of special characters in “Move to other folder”
  • 15728 FIX: mk_oracle: revert werk 15210…
    NOTE: Please refer to the migration notes!

Setup, site management:

  • 13753 FIX: Support Diagnostics: Collect dump only from local site…

User interface:

  • 15487 FIX: Fix indentation of tree of folders snapin
  • 15483 FIX: Fix missing metric history values on edit…
  • 15490 FIX: Show exceeded query limit warning also on automatic page reload

Changes in the Checkmk Enterprise Edition:

Metrics system:

  • 15489 FIX: Fix error message if limit for combined graphs is exceeded…

Site management:

  • 15611 FIX: Migrate Locked by during site renamings…

Changes in the Checkmk Managed Services Edition:

NO CHANGES

You can download Checkmk from our download page: Download Checkmk for free | Checkmk

List of all changes: Werks

Please mail bug reports and qualified feedback to feedback@checkmk.com.
We greatly thank you for using Checkmk and wish you a successful monitoring,

Your Checkmk Team

1 Like

points to a 404 error site - has the werk been removed?

No, we haven’t released the Werk yet.
We usually try to be very specific in the Security Werks, so in case of high or critical rated vulnerabilities we hold back that info shortly before or after the release. Unfortunately the builds for 2.0 and 2.2 are not finished yet. But they are coming soon, then the Werk will be published. (This process is not used very often so it is not perfect)

FYI the CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H 8.3 (High) and the CVE is/will be CVE-2023-31208. We have found that internally and we know of no exploitation.