OpenNMS On the Horizon – September 16th, 2019 – Poller and Thresholding, UI Fixes, Provisioning, Startup, and More!
It’s time for OpenNMS On the Horizon!
In the last week or so we worked on poller and thresholding updates, more UI fixes, provisioning, startup fixes and enhancements, and more!
Github Project Updates
Internals, APIs, and Documentation
Chandra backported support for refreshing include-url when a reload event is sent to Pollerd.
Patrick did more work on the classification rules reordering backend.
Jeff added collection and graph support for Netscaler vServer.
Matt worked on performance improvements to thresholding.
Jesse did more work on making it so unit and integration tests run a subset based on changes, rather than the full suite.
Chandra fixed an initialization issue in ScriptPolicy when interacting with the node object.
Christian fixed a deadlock issue in vmwarereqtool
I increased the default heap size in Horizon 25 to 2GB.
Chandra fixed a bug in inconsistent ipHostName handling when (re-)provisioning a host.
Ronny updated the default notifd configuration to use default auto-acknowledgment.
Chandra worked on fixing WS-Man under JDK11.
Matt added a Karaf command-line tool for managing thresholding persistent state.
Jesse fixed an issue with wiring and Newts.
Ronny fixed an issue with an incorrect PID file when spawning OpenNMS.
Jesse worked on migrating the resourcecli tool to Karaf shell commands.
Ronny added a healthcheck script to the Minion and Sentinel containers.
Ronny fixed some issues with running as non-root in the OpenNMS containers.
Web, ReST, and UI
I did more work on supporting “order by” in Helm (and OpenNMS.js) entity queries.
Christian fixed an issue in the scheduled outage editor when using special characters in outage names.
Patrick fixed a bug in cache-control and session cookie headers.
Christian fixed a bug in deleting in the scheduled outage ReST API.
Matt fixed an issue in the scan reports ReST API.
I fixed a problem in OpenNMS.js with processing parameters with multiple values.
FYI: Mattermost Chat Security Update
If you are using the Mattermost desktop client to connect to chat.opennms.com, make sure you have updated to the latest version. They have released a security update for a remote code execution exploit.