The Monitoring Plugins have been updated to version 2.3.1 and released in beta. Please have a look at the official documentation for the full list of improvements.
Before running the update it is necessary to execute the following command to see if there are any previously modified files:
rpm -qV monitoring-plugins
Output example: S.5….T. d /usr/lib64/neteye/monitoring/plugins/check_time
If the previous command shows modified files as in the example (if the number 5 is present in the first part of the output) then it is necessary to contact our service desk before proceeding with the update.
For NetEye 4.22 we updated the following packages:
monitoring-plugins, monitoring-plugins, monitoring-plugins-setuid to version 2.3.1_neteye1.2.0-1
Fix support for Alyvix Nodes with older versions We solved an issue that could cause Test Cases to be not shown in the Alyvix UI if the Alyvix Nodes supported only API version 3 (i.e. Alyvix Service version <= 2.5). Read More
Fix for Broken Links in the Icinga Web 2 Business Process Module We have resolved an issue that caused broken links within the Business Process module. In certain cases, links pointing to monitoring objects were generated incorrectly, resulting in users Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
Important: Icinga2 security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the icinga2 packages is now available for NetEye 4. Security Fix for NetEye 4.44 2.15.1_neteye1.61.3-1 CVEs CVE-2025-61907: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N CVE-2025-61908: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVE-2025-61909: Read More