$q->delHost(new NagiosHost($host, $host, "")); $q->close(); } } } } if ($nagios) { if (Host_group_scan::in_host_group_scan($conn, $hgname, 2007)) { Host_group_scan::delete($conn, $hgname, 2007); } Host_group_scan::insert($conn, $hgname, 2007); $q = new NagiosAdm(); $q->addNagiosHostGroup(new NagiosHostGroup($hgname, $hosts, $sensors), $conn); $q->close(); } else { if (Host_group_scan::in_host_group_scan($conn, $hgname, 2007)) { Host_group_scan::delete($conn, $hgname, 2007); } } Host_group::update($conn, $hgname, $threshold_c, $threshold_a, $rrd_profile, $sensors, $hosts, $descr); $db->close($conn); Util::clean_json_cache_files("(policy|vulnmeter|hostgroup)"); } if (isset($_SESSION['_hostgroup'])) { unset($_SESSION['_hostgroup']); } if ($_SESSION["menu_sopc"] == "Host groups" && POST('withoutmenu') != "1") { ?> <p><?php echo gettext("Host group succesfully updated"); ?>
$hosts = $sensors = array(); if ($hgname != '') { ossim_valid($hgname, OSS_ALPHA, OSS_SPACE, OSS_PUNC, OSS_NULLABLE, OSS_SQL, 'illegal:' . _("Host Group Name")); if (ossim_error()) { die(ossim_error()); } if ($host_group_list = Host_group::get_list($conn, " AND g.name = '{$hgname}'")) { $host_group = $host_group_list[0]; $descr = $host_group->get_descr(); $threshold_c = $host_group->get_threshold_c(); $threshold_a = $host_group->get_threshold_a(); $obj_hosts = $host_group->get_hosts($conn); foreach ($obj_hosts as $host) { $hosts[] = $host->get_host_ip($conn); } $nagios = Host_group_scan::in_host_group_scan($conn, $hgname, 2007) ? "1" : ''; $rrd_profile = $host_group->get_rrd_profile(); if (!$rrd_profile) { $rrd_profile = "None"; } $tmp_sensors = $host_group->get_sensors($conn); foreach ($tmp_sensors as $sensor) { $sensors[] = $sensor->get_sensor_name(); } } } } if (GET('withoutmenu') != "1") { include "../hmenu.php"; } ?>