We have released op5 Monitor 7.2.0. This is a release which includes everything from Monitor 7.1.0 to 7.1.9 as well as some new features and bug fixes.
- Added a security feature allowing users to set login credentials on the first visit after installing op5 Monitor. The previous default username and password has been removed, resulting in a more secure environment and better flexibility.
- Fixed an issue preventing the NagVis map from loading in Internet Explorer 11.
- Fixed an issue where long texts could break the widget layout on the Tactical overview (TAC).
- Removed a feature that forced Internet Explorer to use IE 8 compatible mode. The removal av this feature results in better responsiveness and more modern layout in Internet Explorer 11.
- Fixed an issue where the regex -e option in check_by_snmp_disk_io could result in an error message.
- Made the logserver/db installation less noisy.
- Some changes in preparation for adding support of Red Hat / CentOS 7.
- On new installs, members of the group “limited_view” are now allowed to see Nagvis widgets.
- Fixed a Cross Site Request Forgery (CSRF) vulnerability in Nacoma. This vulnerability could allow remote code execution if users with sufficient privileges are logged in to Monitor while visiting a maliciously crafted page in the same web browser. Thanks to John Page aka hyp3rlinx for finding and responsibly disclosing this vulnerability.
For a complete list of improvements, see our issue tracking system.
A list of known issues is available in our issue tracker.
How to upgrade
Click the update notification in the op5 Monitor web interface, use yum update on the command line or download the latest tarball for offline installation.