Motadata AIOps Release Version 8.0.11

Release Date: November 21, 2024

What’s New?

Introducing Auto Refresh feature for Topology

With this release, Motadata AIOps adds auto-refresh feature to the Topology view. Active Topology screen will now update periodically to display the updated Object and Instance severity to the user.

Monitoring Support for Cisco Meraki

This release introduces monitoring support for Cisco Meraki under the new ‘SDN’ category in the discovery module. Out-of-the-box monitoring templates with key KPIs are also available, enabling users to monitor various Meraki components easily.

Auto-Generated Topology for Cisco SD-WAN

This update introduces automatic Cisco SD-WAN topology generation, enabling users to visualize the relationships of Cisco SD-WAN environments. The system now auto-generates WAN topology maps, providing a clear view of connections among Cisco SD-WAN components for easier monitoring and troubleshooting.

Runbooks can now be executed from NCM Explorer

With this release, users will be able to execute NCM specific Runbooks right from the NCM explorer. Runbooks can be executed for individual device(s) and in bulk as well. Along with that, users can now assign a category to Runbook. This will ensure only relevant Runbooks are being displayed when assigning a Runbook to Monitor or Profile.

Result By Option now has a Search Feature

With this release, a Search feature has been integrated to the Result By option making it easier to find Tags when creating a widget or a custom report.

OOTB Agentless Remote Log Collection Profile for VMWare vCenter

Motadata AIOps now enables agentless log collection for VMware vCenter Logs using out-of-the-box (OOTB) log collection profile. The profile will streamline the log collection process by making it easier to gather logs from various sources.

Context of Metric Value Deviation in Email Notifications

With this release, email notifications for triggered baseline alerts will consist a value indicating the deviation of metric from its auto calculated baseline value.

Bringing Agent Support to IBM-AIX

This release brings the agent support for IBM-AIX devices. This will help user in collecting Log along with enhanced monitoring support.

Enhanced Custom Availability Report

The custom Availability report will now comprise individual monitor statistics along with their cumulative statistics. This will enhance user convenience by presenting all the data in a single report.

OOTB Custom Script to Generate Reports with Filters

With this release, Motadata AIOps brings an out-of-the-box Custom Script that will allow users a Monitor, Group, and Tag selection option when generating a custom report.

Monitor IP Details now Available through API

With this release, users will be able to fetch monitor IP details using the API. This will enhance user convenience.

Bug Fixes

Inconsistent Display of Data and Misalignment of Charts in Metric Explorer Resolved

Resolved an issue in Metric Explorer where charts were misaligned and improper data was being reflected. The Metric Explorer now displays all information as expected.

Topology Performance Restored

For some users, Topology scanner was taking an elongated time period to generate topology of devices. Topology scanner is now generating topology within expected time.

Relevant Devices in NCM Explorer Displayed

The issue where devices not assigned to a particular group mapped with the user were also being displayed on NCM Explorer is now resolved. NCM explorer is now displaying relevant devices to users.

Map View Widget Not Displaying Cumulative Data

The issue where the Map widget was not displaying cumulative data for the map line is now resolved. The Map widget is now displaying cumulative data as expected.

Security Fixes

Security Vulnerabilities Addressed

The following security vulnerabilities have been addressed:

  1. OpenSSL Multiple Vulnerabilities [CVE-ID : CVE-2024-9143]
  2. Use of JavaScript Library with Known Vulnerability [CVE-ID: CWE-937] (Use of a Broken or Risky Cryptographic Algorithm)
  3. Missing Important Security Headers [CVE-ID: N/A]