We fixed a bug in the host and service search configuration with custom fields that generated an error if only one of the two fields was filled in.
SIEM – Log Management
We have resolved a bug that caused one of our custom Elasticsearch procedures to fail. This script enabled users to modify index templates and indexes that were in a yellow state within single-node instances, an issue arising from an unmet shard replica policy. For more information, please consult our User Guide.
We updated the following packages:
icingaweb2-module-neteye to version 1.156.1-1
elastic-agent, elastic-agent-autosetup, elastic-agent-neteye-config, filebeat, filebeat-autosetup, filebeat-neteye-config, logstash, logstash-neteye-config, logstash-autosetup, logstash-neteye-config-autosetup, kibana, kibana-autosetup, kibana-neteye-config, elasticsearch, elasticsearch-autosetup, elasticsearch-neteye-config, elasticsearch-xpack-license to version 8.15.2_neteye3.66.8-1
Fix support for Alyvix Nodes with older versions We solved an issue that could cause Test Cases to be not shown in the Alyvix UI if the Alyvix Nodes supported only API version 3 (i.e. Alyvix Service version <= 2.5). Read More
Fix for Broken Links in the Icinga Web 2 Business Process Module We have resolved an issue that caused broken links within the Business Process module. In certain cases, links pointing to monitoring objects were generated incorrectly, resulting in users Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
Passive Checks Stuck in Pending During Director Deployments A race condition during Director deployments caused some passive checks to remain in a pending state instead of updating properly. This behavior has now been corrected. With the fix in place, passive Read More
Important: Icinga2 security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the icinga2 packages is now available for NetEye 4. Security Fix for NetEye 4.44 2.15.1_neteye1.61.3-1 CVEs CVE-2025-61907: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N CVE-2025-61908: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVE-2025-61909: Read More