Motadata AIOps Release Version 8.0.10

Release Date: October 24, 2024

What’s New?

AIOps Support for RHEL 9.4

With this update, users now have AIOps support for Red Hat Enterprise Linux (RHEL) version 9.4, enabling enhanced monitoring and management capabilities for systems running on this platform.

Monitoring Support for Cisco Catalyst SD-WAN

This release introduces monitoring support for Cisco Catalyst SD-WAN under the new ‘SDN’ category in the discovery module. Out-of-the-box monitoring templates with specific counters are also available, enabling users to monitor various SD-WAN components easily.

Bubble Chart Support for Log and Flow Groups in Map Widget

Users can now visualize log and flow data volumes across different locations using a bubble chart in the map widget. Each bubble represents a country, with its size indicating the data volume, larger bubbles for higher volumes and smaller ones for lower volumes, providing a clear comparison of data distribution across regions.

Detailed Information of Ping Runbook in Action History

Users can now view detailed information of ping runbooks in the ‘Action History’ tab on the Monitor screen. Additionally, users can access this information in the ‘Last Run Result’ column of the Runbook screen, providing better visibility into past executions and their outcomes.

API Support for Querying Metrics and Availability Counters

Users can now query historical data of monitors using APIs, retrieving both timeseries data for individual counters or aggregated data for multiple counters, depending on the API endpoint used. This enhancement offers increased flexibility for analyzing past performance and availability trends, allowing users to tailor their queries to suit specific use cases.

Refer API documentation to take a deep-dive into the same.

Updated Flow Data Retention Periods

The default data retention period for raw flow data has been reduced from 7 days to 2 days. Additionally, the maximum retention period for flow data has been updated from 365 days to 7 days. This change optimizes data storage and management for more efficient system performance.

CPU/Memory Data Retrieval via SSH Plugin for Cisco ISR Routers

CPU and Memory details for Cisco ISR routers can now be retrieved using the SSH plugin. This new addition enables the product to fetch accurate performance metrics, providing enhanced visibility into the health and performance of these devices.

Routing Protocol Data Retrieval Enabled for Juniper Routers

Routing protocol details for Juniper routers are now available in the product. This new addition allows users to retrieve routing protocol data through the SSH plugin, providing enhanced visibility into routing information for better network management.

Comprehensive Performance Trend Reports for Monitor Groups

Users can now access detailed performance trend reports over time for each monitor individually within a group. This new feature provides valuable insights into long-term performance metrics, allowing for more effective analysis and monitoring.

Bug Fixes

Issue with Inconsistent Topology Generation Resolved

The issue where the topology was not being generated consistently, with some switches missing or not appearing on the left panel, has been resolved. The topology scheduler now creates the topology properly, ensuring all switches are displayed as expected.

Accurate Access Point Client Count Displayed

The client count for access points on the Monitor screen is now accurately displayed, ensuring accurate client data visibility for better monitoring and management.

Interface Monitor Template Loader Issue Resolved

The issue of the loader continuously running on the interface screen for the monitor template has been resolved, ensuring smooth and uninterrupted usage.

Security Fixes

Security Vulnerabilities Addressed

This release includes the following vulnerability fixes:

  1. TLS ROBOT Vulnerability (CVE-ID: N/A)
  2. urllib3 Python Library < 1.26.19, < 2.2.2 Vulnerability (CVE-ID: CVE-2024-37891)
  3. ICMP redirection enabled (linux-icmp-redirect) (CVE-ID: N/A)
  4. SSH Weak Message Authentication Code Algorithms (ssh-weak-message-authentication-code-algorithms) (CVE-ID: N/A)
  5. TLS/SSL Timing Side-Channel Attacks (Lucky Thirteen Attack)(CVE-ID: CVE-2013-0169)