DPA 2021.3 Release Notes
Release date: August 31, 2021
These release notes describe the new features, improvements, and fixed issues in Database Performance Analyzer 2021.3. They also provide information about upgrades and describe workarounds for known issues.
If you are looking for previous release notes for Database Performance Analyzer, see Previous Version documentation.
New features and improvements in DPA
DPA 2021.3 offers new features and improvements compared to previous releases of DPA.
Secure by design
As part of our commitment to being Secure by Design and providing a more resilient platform, the DPA 2021.3 release has implemented the new Secure Software Development Build Environment.
Alert information on the DPA home page
The DPA home page shows you which monitored instances currently have triggered alerts. The icon in the Alert column indicates the highest level of the currently triggered alerts. For example, indicates that one or more alerts are triggered at the High level.
After an alert is triggered, you can acknowledge it to indicate that the appropriate people are aware of the issue and it is being addressed. Acknowledging an alert prevents DPA from sending further notifications for that triggered alert.
DPA automatically records when the alert was acknowledged and the account that acknowledged it. You can also add notes that other users can read. In addition to preventing further notifications, acknowledging an alert can provide an audit trail, help DBAs focus on alerts that still require attention, and prevent multiple people from working on the same issue.
If you acknowledge an alert in error, or if the situation changes, you can unacknowledge the alert. When an alert is unacknowledged, DPA begins sending notifications again based on the specified notification policy.
For more information, see Acknowledge or unacknowledge a DPA alert.
Current alert status page
The alert status page has been redesigned to help you quickly find information about currently triggered alerts and broken alerts.
To find an alert, use the Search box to search for an alert name or database instance name. Or apply one or more filters, including status, instance name, alert type or name, and custom properties.
Change the sort order by selecting an option from the drop-down menu:
Hover over the icon to see who acknowledged the alert, when, and any comments.
Hover over the Status changed value to see when the alert was last evaluated.
Click the vertical ellipsis () on the alert row to perform additional actions, such as displaying details or acknowledging the alert.
Alert details page
The Alert details page has been redesigned to provide additional information about the alert's current status, definition, and history. You can acknowledge or unacknowledge the alert from the Current status details section.
The History section lists the dates and times when the alert status changed or when the alert was acknowledged or unacknowledged. Expand the Filters pane on the left to filter items in the History ssection.
New alerting log file
The following log file is available to help investigate issues with alerts:
It is available with other logs in the
installDir/iwc/tomcat/logs/ directory. It includes information about each triggered alert.
User interface for creating custom properties
In addition to the physical properties of a database instance (such as database vendor, version, and IP address), custom properties allow you to associate business or organizational attributes to monitored database instances. For example, you could use custom properties to specify the location of a monitored database instance or the DBAs responsible for an instance.
You can include custom properties as variables in email templates for alert notifications. Receivers of email alert notifications can set up rules to prioritize, forward, or otherwise process incoming notifications based on the custom property values in the emails.
In previous versions, custom properties could be created only through the DPA REST API. DPA 2021.3 includes a user interface for creating and editing custom properties. For more information, see Create and manage custom properties.
Baselines are available again for resource metrics on the Resources tab in DPA. Baselines can be used to compare values from a specific period to historical norms.
Baselines are not available for metrics collected for the VM Option.
Click the Baselines toggle switch in the upper-right corner of the Resources tab to show or hide baselines. When you show baselines, a shaded area indicates the historic values between the 10th and 90th percentiles.
Option to manually create the monitoring user when registering with a wizard
When you register the following types of database instances with a wizard, you can choose to manually create the DPA monitoring user before running the wizard:
- Self-managed Oracle
- Self-managed SQL Server
- Self-managed Sybase
- Amazon RDS for Oracle
- Amazon RDS for SQL Server
When users choose this option, they are not required to enter the credentials of a privileged user into the DPA interface, and the DPA monitoring user is not assigned an elevated role (such as the
sysadmin role for SQL Server databases). SolarWinds provides scripts to ensure that the monitoring user has the required privileges.
The original wizards, which require privileged user credentials to create or configure the monitoring user, are still available.
DPA 2021.1 gave users the option to create the DPA monitoring user manually when they registered instances using the API or mass registration.
CyberArk Credential Vault integration
Customers who use CyberArk for secure credential management can now use the CyberArk Credential Vault to store the credentials needed to access or connect to monitored database instances, VM Option VMware servers, SMTP email servers, the DPA repository database, and AD/LDAP servers.
For more information, see Configure DPA to use credentials stored in CyberArk.
Cloud SQL for PostgreSQL support
DPA supports monitoring PostgreSQL database instances in the Google Cloud Platform (GCP).
Users can specify SSL authentication for Oracle, SQL Server, and Sybase database instances. Users can specify this option in the registration wizard, the Update DB Instance Connection Wizard, mass registration, and the API.
Driver used to connect to SQL Server database instances
Previous versions of DPA used the jTDS driver to connect to SQL Server database instances. DPA 2021.3 now uses the Microsoft JDBC driver by default. The MS JDBC driver provides better support for SSL and NTLM2.
When you register a new SQL Server database instance, DPA uses the MS JDBC driver. SQL Server instances that were registered previously will continue to use the jTDS driver by default.
If you want an existing registered instance to start using the MS JDBC driver, update the instance properties and select Microsoft JDBC Driver on the Update Monitored Database Instance Connection Information panel.
After a successful connection with the MS JDBC driver, you cannot switch back to the jTDS driver.
Maximum amount data stored for Find SQL
In previous versions, DPA stored a maximum of 30 days of Find SQL data. In DPA 2021.3, the default value is still 30 days but you can increase this value to a maximum of 90 days. The number of days of historical data stored determines the time period you can specify when you search for a SQL statement.
To change the default value, edit the advanced option
CLEAN_DAYS_OF_FIND_SQL_DATA. Be aware that larger values require more disk space and could affect performance. If you lower this value, historical data beyond the updated retention period is removed by the nightly cleanup job.
New customer installation
Before you upgrade!
In DPA 2021.3 includes changes to the columns in the
CON_ALERT_HISTORY table. When you upgrade from DPA 2021.1 or earlier, the upgrader migrates data from the old table structure to the new table structure, starting with the newest entries and going to the oldest.
The migration process is limited to one hour. If you have a large amount of alert history data, the migration process might not finish within this time limit and the oldest alert history records could be lost. To prevent this, back up your alert history data before the upgrade and then migrate it to the new table structure after the upgrade. See Migrate all alert history records before upgrading from DPA 2021.1 or earlier to DPA 2021.3 or later for instructions.
How to upgrade
If you are upgrading from an earlier version, use the following resources to plan and implement your upgrade:
- Use the DPA Installation and Upgrade Guide to help you plan and execute your upgrade.
- When you are ready, download the upgrade package from the SolarWinds Customer Portal.
Fixed issues in DPA 2021.3
DPA 2021.3 fixes the following issues.
Entering multiple connection properties in the JDBC URL field (either in the Registration Wizard or the Update DB Instance Connection Wizard) does not prevent PDA from monitoring a PostgreSQL database instance.
Using the default encryption scheme with certain types of passwords no longer prevents monitoring from starting.
When Oracle database instances are registered using the TNS descriptor and the descriptor is on a single line in the
If you include a database instance in an alert and then change the display name of the database instance, the alert continues to work for that instance, and the instance name is updated on the Alert Status tab.
The download process for large diagnostic files has been improved.
Query advisors are available even when the database has very little wait time.
DPA does not stop monitoring a PostgreSQL instance if querying the
DPA has improved its evaluation of database names to avoid an error when All DBs is selected as the Evaluation Option for a SQL Server Backup Frequency alert.
In-product information about viewing query details has been updated.
Administrative and custom alerts, live plans, and the DB Query tool work as expected on SQL Server instances monitored using Windows Authentication.
|00769971, 00770728, 00771998||
When the shift to daylight savings time occurs, bars on some DPA bar charts are no longer displayed as thin lines instead of bars.
DPA's ability to detect various MariaDB distribution types has been improved.
In previous versions, DPA displayed a warning message if the amount of heap memory allocated to DPA was insufficient to monitor all registered instances. DPA now displays this message based on the number of actively monitored instances, not the number of registered instances.
When a SQL Server database is taken offline or removed, it is now automatically excluded from DPA alerts and resource metrics that track whether all databases have been backed up.
When you register a SQL Server instance without giving the
The DPA Resources tab no longer opens slowly when the virtual machine hosting the database instance includes a large number of disks. In addition, the readability of resource metric line charts has been improved.
|A SQL Server database instance cannot be registered using TLS 1.0|
During registration, SQL Server might return the following error in the registration wizard:
This is accompanied by the following error in the wizard log:
This happens because the server is not patched to a version that supports newer TLS 1.2 or 1.3, which DPA requires for secure communication. This requirement is inherited from the JDK shipped with DPA, which disables TLS 1.0 and 1.1 by default. This occurs in JDK 11.0.11 and later.
|Resolution or Workaround:||
To resolve this issue, patch SQL Server to a newer Service Release or Cumulative Update that contains support for TLS 1.2 or later. See this Microsoft KB article for information about each SQL Server version.
If you cannot apply the resolution, you can use the following as a workaround and continue using TLS 1.0. (This workaround is not recommended because it reduces security.)
|The DPA Options page does not open|
If the file containing the DPA SQL authentication password is misconfigured, the DPA Options page does not open. This file can become misconfigured when password protection for DPA features that allow custom SQL is configured, and a password containing '<' or '>' characters was not enclosed with CDATA when it was entered.
|Resolution or Workaround:||
|Creating the repository user when creating a MySQL 8.0 repository database|
For MySQL 8.0, the default authentication plug-in has changed from
|Resolution or Workaround||
|Creating the monitoring user when registering a MySQL 8.0 database instance|
For MySQL 8.0, the default authentication plug-in has changed from
|Resolution or Workaround||
|Validation of the LDAP/AD server host name fails because it doesn't match the subject of the certificate|
Java validates that the host name of the LDAP server matches the LDAP certificate by checking the subjectAlternativeName's dNSName fields of the certificate. If the validation fails, you will see the following error when you are configuring DPA to use AD/LDAP:
|Resolution or Workaround||Follow the instructions in this article to resolve the issue.|
|Adding a distributed AG to a server prevents DPA from monitoring non-distributed AGs on the server|
If DPA is monitoring non-distributed SQL Server Availability Groups (AGs) on a server and you add a distributed AG to the server, DPA stops monitoring the non-distributed AGs.
|Resolution or Workaround||Do not add a distributed AG to the server.|
|Microsoft reports incorrect metric values for SQL Server on Linux|
When you monitor a SQL Server 2017 database instance that runs on a Linux server:
When you monitor a SQL Server 2019 database instance that runs on a Linux server:
Microsoft reports these values.
|Resolution or Workaround||Disregard the values that are incorrect on your version of SQL Server. You can also disable the collection of a metric that shows incorrect data.|
|Monitoring a database instance in the Oracle Public Cloud|
|Issue||When DPA is monitoring a database instance in the Oracle Public Cloud, it sometimes reports incorrect values.|
|Resolution or Workaround||DPA does not support monitoring database instances deployed in the Oracle Public Cloud. Use DPA to monitor supported database instance types.|
|DPA fails to reconnect after losing its connection to a SQL Server instance|
When DPA loses its connection to a monitored SQL Server instance (for example, when the DPA server is rebooted), and Windows authentication is used, DPA is sometimes unable to reconnect to the instance. This can happen if DPA attempts to connect before SQL Server has been able to connect to Active Directory. DPA interprets the rejected connection attempt as possibly occurring because the credentials were incorrect. To avoid being locked out of the account, DPA does not keep trying to reconnect. Messages such as the following appear in the logs:
|Resolution or Workaround||When the monitored instance is fully initialized, manually restart monitoring. On the DPA home page, click the Action drop-down menu for the instance and select Start Monitor.|
|Monitoring fails when a SQL Server AG is registered through the listener|
When a SQL Server Availability Group (AG) is registered for monitoring through the listener, duplicate files collected through polling are not handled correctly in some situations, which can cause monitoring to fail. Errors such as the following can appear in the logs:
|Resolution or Workaround||If possible, register each instance separately instead of registering the listener. If that is not possible, then disable IO stats polling by setting the advanced option
|VM Host Disk metrics load slowly due to missing indexes on tables that store these metrics|
Loading the Host Disk metrics on the Resources page may take a long time when the host has a large number of disks. On new DPA installations, indexes to avoid this issue are created in the DPA repository. But for DPA upgrades, these indexes must be created manually.
|Resolution or Workaround||
|Repository growth due to missing indexes on tables storing the plans|
DPA cleanup jobs might not run properly on tables storing the historical plans, causing the repository to grow. On new DPA installations, indexes to avoid this issue are created in the DPA repository. But for DPA upgrades, these indexes must be created manually.
|Resolution or Workaround||
End of life
|Version||EoL Announcement||EoE Effective Date||EoL Effective Date|
August 26, 2021 End-of-Life (EoL) announcement - Customers on DPA version 2019.4 or earlier should begin transitioning to the latest version of DPA.
|November 24, 2021 End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for DPA version 2019.4 or earlier will no longer actively be supported by SolarWinds.||November 24, 2022 End-of-Life (EoL) - SolarWinds will no longer provide technical support for DPA version 2019.4 or earlier.|
August 26, 2021 End-of-Life (EoL) announcement - Customers on DPA version 12.1 or earlier should begin transitioning to the latest version of DPA.
|November 24, 2021 End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for DPA version 12.1 or earlier will no longer actively be supported by SolarWinds.||November 24, 2022 End-of-Life (EoL) - SolarWinds will no longer provide technical support for DPA version 12.1 or earlier.|
June 4, 2020 End-of-Life (EoL) announcement - Customers on DPA version 12.0 or earlier should begin transitioning to the latest version of DPA.
|September 2, 2020 End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for DPA version 12.0 or earlier will no longer actively be supported by SolarWinds.||September 2, 2021 End-of-Life (EoL) - SolarWinds will no longer provide technical support for DPA version 12.0 or earlier.|
June 4, 2020 End-of-Life (EoL) announcement - Customers on DPA version 11.1 or earlier should begin transitioning to the latest version of DPA.
|September 2, 2020 End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for DPA version 11.1 or earlier will no longer actively be supported by SolarWinds.||September 2, 2021 End-of-Life (EoL) - SolarWinds will no longer provide technical support for DPA version 11.1 or earlier.|
See the End of Life Policy for information about SolarWinds product lifecycle phases. For supported versions and EoL announcements for all SolarWinds products, see Currently supported software versions.
End of support
This version of Database Performance Analyzer no longer supports the following platforms and features.
|Monitored database types||Support for monitoring Db2 9.7 database instances is removed in DPA 2021.3.|
This version of Database Performance Analyzer deprecates the following platforms and features.
Deprecated platforms and features are still supported in the current release. However, they will be unsupported in a future release. Plan on upgrading deprecated platforms, and avoid using deprecated features.
|Database-specific mass registration spreadsheets||Mass registration spreadsheets specific type of database, such as Oracle or SQL Server, are still included in DPA 2021.3, but they will be removed in an upcoming release. When they are removed, mass registrations for any type of database will use the spreadsheet for all database types.|
|Repository database||Support for using Oracle 11.2 as the DPA repository database is deprecated. Oracle 11.2 is still supported as a repository database in the DPA 2021.3 release, but support will be removed in an upcoming release.|
|DPA server OS||Support for installing DPA on a server with a Windows Server 2012 R2 operating system is still supported in DPA 2021.3, but support will be removed in an upcoming release.|
© 2021 SolarWinds Worldwide, LLC. All rights reserved.
This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.