What’s New?
Introducing Auto Refresh feature for Topology
With this release, Motadata AIOps adds auto-refresh feature to the Topology view. Active Topology screen will now update periodically to display the updated Object and Instance severity to the user.
Monitoring Support for Cisco Meraki
This release introduces monitoring support for Cisco Meraki under the new ‘SDN’ category in the discovery module. Out-of-the-box monitoring templates with key KPIs are also available, enabling users to monitor various Meraki components easily.
Auto-Generated Topology for Cisco SD-WAN
This update introduces automatic Cisco SD-WAN topology generation, enabling users to visualize the relationships of Cisco SD-WAN environments. The system now auto-generates WAN topology maps, providing a clear view of connections among Cisco SD-WAN components for easier monitoring and troubleshooting.
Runbooks can now be executed from NCM Explorer
With this release, users will be able to execute NCM specific Runbooks right from the NCM explorer. Runbooks can be executed for individual device(s) and in bulk as well. Along with that, users can now assign a category to Runbook. This will ensure only relevant Runbooks are being displayed when assigning a Runbook to Monitor or Profile.
Result By Option now has a Search Feature
With this release, a Search feature has been integrated to the Result By option making it easier to find Tags when creating a widget or a custom report.
OOTB Agentless Remote Log Collection Profile for VMWare vCenter
Motadata AIOps now enables agentless log collection for VMware vCenter Logs using out-of-the-box (OOTB) log collection profile. The profile will streamline the log collection process by making it easier to gather logs from various sources.
Context of Metric Value Deviation in Email Notifications
With this release, email notifications for triggered baseline alerts will consist a value indicating the deviation of metric from its auto calculated baseline value.
Bringing Agent Support to IBM-AIX
This release brings the agent support for IBM-AIX devices. This will help user in collecting Log along with enhanced monitoring support.
Enhanced Custom Availability Report
The custom Availability report will now comprise individual monitor statistics along with their cumulative statistics. This will enhance user convenience by presenting all the data in a single report.
OOTB Custom Script to Generate Reports with Filters
With this release, Motadata AIOps brings an out-of-the-box Custom Script that will allow users a Monitor, Group, and Tag selection option when generating a custom report.
Unable to Fetch Monitor IP through API now Fixed
Some users were facing an issue where they were not able to fetch the Monitor IP details through API. The bug is now resolved, and the API is fetching all monitor details as expected.
Monitor IP Details now Available through API
With this release, users will be able to fetch monitor IP details using the API. This will enhance user convenience.
Bug Fixes
Inconsistent Display of Data and Misalignment of Charts in Metric Explorer Resolved
Resolved an issue in Metric Explorer where charts were misaligned and improper data was being reflected. The Metric Explorer now displays all information as expected.
Topology Performance Restored
For some users, Topology scanner was taking an elongated time period to generate topology of devices. Topology scanner is now generating topology within expected time.
Relevant Devices in NCM Explorer Displayed
The issue where devices not assigned to a particular group mapped with the user were also being displayed on NCM Explorer is now resolved. NCM explorer is now displaying relevant devices to users.
Map View Widget Not Displaying Cumulative Data
The issue where the Map widget was not displaying cumulative data for the map line is now resolved. The Map widget is now displaying cumulative data as expected.
Security Fixes
Security Vulnerabilities Addressed
The following security vulnerabilities have been addressed:
- OpenSSL Multiple Vulnerabilities [CVE-ID : CVE-2024-9143]
- Use of JavaScript Library with Known Vulnerability [CVE-ID: CWE-937] (Use of a Broken or Risky Cryptographic Algorithm)
- Missing Important Security Headers [CVE-ID: N/A]