SolarWinds Observability Self-Hosted 2024.2 release notes
Release date: June 4, 2024
Here's what's new in SolarWinds Observability Self-Hosted 2024.2. You can find the applicable system requirements here.
To view release notes, system requirements, and product guide PDFs for supported versions of SolarWinds Observability Self-Hosted, see SolarWinds Observability Self-Hosted previous versions. To view release notes for multiple versions
SolarWinds Observability Self-Hosted runs on the SolarWinds Platform (self-hosted). SolarWinds Observability Self-Hosted release notes include the updates from the SolarWinds Platform (self-hosted).
Attention 2024.2 customers
Starting with 2024.2, SolarWinds Information Service (SWIS) will officially move to TCP 17774 by default and will stop listening on port TCP 17778. Please ensure all firewalls have been updated accordingly prior to upgrading.
New features and improvements in SolarWinds Platform
Maps improvements
In Intelligent Maps, users can:
- Define custom topology links based on the status of child entities
- Hide manually created links
- Track wireless heat maps history
- Draw curved lines
Users can import Network Atlas maps to Intelligent Maps. See Import maps.
Additional updates
- Administrators can configure a mandatory notice to be displayed and acknowledged before users log in.
- When users log in to the web console, a toast message with the date and time of the previous successful login is displayed in the top right.
- Improved stability, installation, and upgrade experience.
- Improved performance of the SolarWinds Observability Self-Hosted.
- Various security and compliance improvements.
- Stability improvements for agents and pollers.
- SNMP v3 traps with the authentication method SHA-256 or SHA-512 are supported.
New features and improvements in SolarWinds Observability Self-Hosted Essentials
The following features are exclusive to customers with a SolarWinds Observability Self-Hosted license.
Cloud monitoring support for Azure SQL databases
SolarWinds Observability Self-Hosted now supports cloud monitoring for Azure SQL databases. Discover, poll, and drill down into the details of Azure SQL DB instances within the context of other SolarWinds Observability Self-Hosted-monitored entities and devices.
Cloud monitoring support for Azure load balancers
SolarWinds Observability Self-Hosted now supports discovering, polling, and monitoring Azure load balancers. Monitor the status, main attributes, health scores, and metrics for Azure load balancer instances.
Updated cloud dashboards
Dashboards for cloud entities, including Network and Storage dashboards for Azure and the summary dashboard for AWS have been updated with modern and refreshed UI elements that better organize and summarize your monitored cloud entities.
Flexible sizing of High Availability Pools for Additional Polling Engines
For Additional Polling Engines (APE), you can now define High Availability (HA) pools greater than two via the API. This allows a single or multiple APEs to serve as the fail-over for multiple APEs.
SolarWinds recommends configuring a ratio of one backup polling engine to four active polling engines. With this configuration, you can decrease the server footprint to run SolarWinds Observability Self-Hosted and lower administrative and Windows licensing costs. See Set up High Availability pools with multiple active and standby servers.
DHCP/DNS wizard improvement
The DHCP/DNS wizard has a new interface for scope splitting along with additional UX improvements.
Increased visibility for tag actions
Tag actions can be viewed as a list in the Add an action wizard without hovering your cursor over the action.
Support for Aruba wireless access points
Add Aruba Central wireless access points for monitoring and use the following insights to secure efficient wireless network management:
- Wireless network strength: keep track of the overall count of access points deployed in your network, monitor the number of connected users, or detect and manage unauthorized access points by evaluating the signal strength.
Support for Aruba Silver Peak SD-WAN
Add Aruba SD-WAN orchestrator nodes for monitoring and pair the Aruba orchestrator with edge nodes. Monitor the inventory, such as orchestrators, sites, or edge routers, SLA classes/profiles, interfaces, tunnels, applications/SLA paths. Observe the SD-WAN performance by monitoring SLA, such as jitter, latency, or packet loss. See Monitor SD-WAN for Aruba orchestrators.
Aruba SD-WAN monitoring uses API-based polling. See API-based monitoring for Aruba SD-WAN devices for details.
Additional updates
- Topology calculation process was updated to improve performance.
- You can poll VeloCloud traffic interface data using a private MIB.
New features and improvements in SolarWinds Observability Self-Hosted Advanced
Customers with a SolarWinds Observability Self-Hosted Advanced license receive all Essentials updates, plus the following features exclusive to Advanced customers.
Support for new devices in the vulnerability and risk dashboard
The following device types are now supported in the vulnerability and risk dashboard:
-
PaloAlto
-
Fortinet
-
HPE-Aruba
Specify the SSH encryption algorithms used for a device type in the device template
You can use the device template to specify what SSH encryption algorithms NCM uses when communicating with a device. The encryption algorithms that you specify must be supported by the devices that use the device template, and they must be supported by NCM.
For information about supported algorithms, see Supported algorithms and ciphers for SSH communications. For information about specifying the SSH algorithm in a device template, see NCM device template commands.
Credentials for each polling engine
To write to network share or to specify a custom location for saving certain things (such as downloaded configs or NCM job results), you must give NCM write access to the network share or custom location. You can now specify different credentials for each polling engine. You might want to do this because:
-
No single set of credentials is valid for all polling engines to access the location (for example, the polling engines are in different domains).
-
You can specify local credentials for each polling engine. As a result, when you specify various custom locations, you can specify any custom location that the polling engine's local credentials have access to.
CPE match data feed URL
The CPE match data feed URL is now specified on the Firmware Vulnerability Settings page. In previous versions, this URL was specified in Advanced Configuration settings.
The CPE match data feed provides the product or platform applicability statement to CPE URI matching based on the CPEs in the official CPE dictionary. This is the same information displayed on the NIST website when you expand the matches for a match criteria.
New features and improvements in SolarWinds Observability Self-Hosted Enterprise Scale
The following features are exclusive to customers with a SolarWinds Observability Self-Hosted Enterprise license.
Reports management enhancement
EOC can now query reports from remote instances and filter them by site and custom properties.
Fixed CVEs
At SolarWinds, we prioritize the swift resolution of CVEs to ensure the security and integrity of our software. In this release, we have successfully addressed the following CVEs.
SolarWinds CVEs
SolarWinds would like to thank our Security Researchers below for reporting on the issue in a responsible manner and working with our security, product, and engineering teams to fix the vulnerability.
| CVE-ID | Vulnerability Title | Description | Severity | Credit |
|---|---|---|---|---|
| CVE-2024-28996 | SolarWinds Platform SWQL Injection Vulnerability | The SolarWinds Platform was determined to be affected by a SWQL Injection Vulnerability. Attack Complexity is high for this vulnerability. | 7.5 High | Nils Putnins from NATO |
| CVE-2024-28999 | SolarWinds Platform Race Condition Vulnerability | The SolarWinds Platform was determined to be affected by a Race Condition Vulnerability affecting the web console. | 6.4 Medium | ElHussain Fathy (0xSphinx) |
| CVE-2024-29004 | SolarWinds Platform Stored XSS Vulnerability | The SolarWinds Platform was determined to be affected by a stored cross-site scripting vulnerability affecting the web console. High-privileged user credentials are needed, and user interaction is required to exploit this vulnerability. | 7.1 High | Jakub Brzozowski, Kamil Falkiewicz, Szymon Jacek with STM Cyber |
Third-party CVEs
| CVE-ID | Vulnerability title | Description | Severity |
|---|---|---|---|
| CVE-2021-4321 | Authenticated XSS Vulnerability | A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component. | 5.4 Medium |
| CVE-2023-0215 | Denial of Service Vulnerability | The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected. | 7.5 High |
| CVE-2022-0778 | Denial of Service Vulnerability | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc). | 7.5 High |
| CVE-2021-23840 | Denial of Service Vulnerability | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). | 7.5 High |
| CVE-2023-0286 | Denial of Service Vulnerability | There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network. | 7.4 High |
| CVE-2021-3712 | Denial of Service Vulnerability | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y). | 7.4 High |
| CVE-2018-0732 | Denial of Service Vulnerability | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | 7.5 High |
| CVE-2020-1971 | Denial of Service Vulnerability | The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w). | 5.9 Medium |
| CVE-2019-1559 | Denial of Service Vulnerability | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). | 5.9 Medium |
| CVE-2018-0737 | Side Channel Attack Vulnerability | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | 5.9 Medium |
| CVE-2017-3736 | Sensitive Data Disclosure Vulnerability | There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. | 6.5 Medium |
Fixed customer issues
| Case number | Description | Platform product |
|---|---|---|
| 413124, 00583729, 00917555, 01509843, 01590830 | On the Manage Nodes page, all nodes are displayed when nodes are grouped by Maintenance Window, even for users connecting to the SolarWinds Platform server from a different time zone. |
Platform |
| 01570284, 01589174 | On the modern Manage Nodes page, custom properties can be successfully imported. |
Platform |
| 01558137, 01573518, 01583277, 01585187, 01585743 | Installing an additional polling engine no longer fails if the SolarWinds Administration Service (SWA) was updated on the main polling engine, resulting in the message |
Platform |
| 00347151, 00583729, 00609433, 00808352, 01086612, 01351960, 01445837 | Scheduled maintenance mode times are displayed correctly when multiple nodes are selected and when the nodes and the SolarWinds Platform server are in different time zones. |
Platform |
| 00971087, 01337532, 01522899, 01526029, 01526147, 01550288, 01570302 | A memory leak in the |
Platform |
| 01560597, 01562147, 01565729, 01567347, 01571619, 01571639, 01558789, 01566874, 01561654, 01560265, 01573988, 01571865, 01572094, 01580802, 01564082 | Object icons on the Active Alerts page are displayed correctly. |
Platform |
| 01559327, 01556253, 01562533 | The check to determine whether time settings across agents are synchronized was removed from the Deployment Health check in the SolarWinds Platform Web Console. In the stand-alone Active Diagnostics application, the check no longer indicates problems when there are none. |
Platform |
| 01051176, 01221567, 01314256, 01546461, 01563438, 01560376, 01564113, 01564143, 01568945, 01576335, 01564113 | The test to identify mismatches between the SWIS URI System Identifier and the system identifiers in URIs no longer fails. The test has been added back to Active Diagnostics. |
Platform |
| 01521004, 01567098 | On the Collect new diagnostics page, the search results display the correct nodes, and pagination works correctly. |
Platform |
| 01550125 | Remote installation of an agent no longer fails on non-English computers running a Linux-based operating system. |
Platform |
| 01559272, 01561292, 01563910, 01566566, 01550711, 01560088 | Intelligent Maps no longer display black objects instead of icons. |
Platform |
| 01550299 | Intelligent Maps display all icons correctly when they are selected from the Icon property panel. |
Platform |
| 01562091 | Hovering over interfaces on an Intelligent Map no longer causes an error to be displayed, similar to:
|
Platform |
| 01533680, 01552117 | Job engine clear messages are no longer sent between polling engines, which could cause polling to stop. |
Platform |
| 01455555, 01423586 | The Linux agent no longer uses the wrong path to search for certificates, which prevented the agent service from starting. |
Platform |
| 01502617, 01544348 | A query that lead to deadlocks in the SolarWinds Platform database has been tuned. |
Platform |
| 00894876, 00952370, 01316477, 01542041 | When a user logs out of the SolarWinds Platform Web Console, the resulting login dialog populates the Username field based on the credentials of the user who logged out, rather than always |
Platform |
| 01488421 | Node availability data is no longer displayed incorrectly if a node enters fast poll from the |
Platform |
| 01507890 | On the configuration dialog for the Send a GET or POST Request to a Web Server alert action, you can enter user names and passwords of up to 150 characters when you choose Basic or NTLM authentication. The previous limit was 50 characters. |
Platform |
| 01510957 | On the Add SMTP Server dialog, you can enter a host name with a segment that starts with a number. |
Platform |
| 01494432 | A view in the SolarWinds Platform database has been tuned to improve performance when retrieving application availability data and to prevent high database CPU usage. |
Platform |
| 00158062, 00334434, 01459950 | Reports that contain a SWQL query are displayed correctly when they are sent through the report scheduler as an HTML email. |
Platform |
| 01507494 | Special characters, such as the German umlaut, are displayed correctly in the user interface. |
Platform |
| 01423540, 01499591, 01508573 | Database maintenance performance has been improved to run more quickly. |
Platform |
| 01330047, 01395989, 01469949, 01511737 | The speed and accuracy of topology calculation to show connections on network maps has been improved. |
Platform |
| 01462551, 01399856 | During provisioning, the AIX agent no longer queries its DNS server to resolve its IP address in order to send this information to the SolarWinds Platform. |
Platform |
| 00655331, 01492460 | Searches based on a custom property value work correctly when the custom property name is SiteID. |
Platform |
| 01496061 | If any metrics are missing from a PerfStack project, the PerfStack Widget displays the available metrics instead of the Load PerfStack Project button. |
Platform |
| 01430167, 01497213 | In a deployment with High Availability configured, the Deployment Health tab no longer shows invalid issues on standby servers because of SWIS connection failures. |
Platform |
| 00637986, 00640711, 01504141 | Having special characters in a report name no longer causes the report scheduler to fail. |
Platform |
| 01253523, 01468220, 01495488 | The next poll and next rediscovery times for volume polling are shown in the time zone of the server, not in the UTC time zone. |
Platform |
| 01453924 | When multiple alert actions are triggered simultaneously, the AlertDetailsUrl and AlertObjectID macros return the correct values. |
Platform |
| 01250912, 01384999, 01493532 | The Power Control Unit (PCU) status is displayed on Node Details page after an upgrade. |
Platform |
| 01311212 | The software version and other information about PCU/UPS devices is updated with the latest polled values. |
Platform |
| 01196102 | When you run the Discovery Wizard with a set of more than 35 nodes, statistics for PCUs are not lost. |
Platform |
| 00787337, 01266827 | Assigning UPS devices to a Universal Device Poller (UnDP) in bulk is successful, data is polled from UPS devices, and UPS inventory reports are displayed correctly. |
Platform |
| 01155223, 01424647 | Polling of UPS devices without Battery Temperature no longer results in UPS and Battery Status being reported as unknown. |
Platform |
| 00384424, 00483466, 00565220, 01482010 | Custom reports and charts with custom time periods no longer incorrectly add "UTC" to the title, even though the time is shown in the server's local time zone. |
Platform |
| 01459302 | Network Discovery using Seed Router on some newer devices no longer fails with the error |
Platform |
| 01477323 | An issue that resulted in the incorrect notification |
Platform |
| 01002109, 01231236, 01140657, 01198400, 01353300, 01428595 | An issue was fixed that caused alert actions to fail with errors such as:
|
Platform |
| 01405094 | Hovering over a location on a map no longer produces unexpected results, such as the pop-up appearing in the wrong location or staying open after the mouse moves. |
Platform |
| 01415696 | Applying account limitations no longer slows down operations with the Orion.Group entity, causing performance issues in widgets, such as active alerts or maps. |
Platform |
| 01373197 | The issue with inconsistent SNMP information is resolved by updated OIDs. |
Platform |
| 00909898, 01119224, 01385636 | Operations on custom properties no longer cause deadlocks, which were leading to issues such as the inability to delete a custom property or to edit multiple nodes at the same time. |
Platform |
| 01359275, 01389703 | Duplicating a dashboard from the Manage Dashboards page no longer assigns the same ID, which was causing upgrades to fail. |
Platform |
| 01352738 | When a Group Member alert is triggered, macros in the alert notification are parsed correctly. The notification no longer shows the macro instead of the resulting text. |
Platform |
| 01227054, 01335583 | When you create a report, the Resource Preview pane includes orange column width indicators, and Custom is selected as the default column width setting. |
Platform |
| 01228625, 01242391, 01468064 | The installer no longer fails while attempting to upgrade the Oracle ODBC driver. |
Platform |
| N/A | If you use Windows Agents with disabled automatic update of Agents and upgrade your deployment to the latest version, Agents no longer stop polling CPU, memory, and disks. |
Platform |
| N/A | The Map It feature is displayed correctly when you hold the Alt key on an Intelligent Map. |
Platform |
| 01539957, 01579210 | The timeout limit for the Verify MessageBus connection test on the Deployment Health page has been increased. This change prevents tests that should succeed from failing with the message |
Platform |
| 01559991, 01564082, 01571168, 01571561, 01580158, 01580981, 01600664, 01608819 | When a node is added to an existing Network Atlas map that is already displayed, the node's status is shown correctly instead of always being shown as Unknown. |
Platform |
| 01624138 | *The SecObs Bussiness Layer in the SolarWinds Platform no longer uses the Microsoft Distributed Transaction Coordinator (MSDTC) service, which could lead to the following error:
|
Platform |
| 01567667, 01567696, 01583341, 01590138, 01602301 | *When Microsoft Visual C++ (MSVC) 14 is installed on an agent, the installation is accurately detected. |
Platform |
| 01572326, 01573594 | *The Search For option in the Add/Edit Groups wizard works correctly and can be used to locate objects to add to the group. |
Platform |
| 01495450, 01568838, 01590138 | *When an agent service gets into a status of 5, the SolarWinds Platform attempts to redeploy it. (This status indicates that a dependent prerequisite 'Core Polling Agent Plugin' failed to be installed.) |
Platform |
| 01487914 | *If you click the Submit button multiple times after editing a node, the operation no longer fails with an error. |
Platform |
| 01610271, 01610891, 01613582 | *In certain environments, upgrades no longer fail because the Configuration Wizard cannot create a table due to legacy time series driver structures in the database. |
Platform |
| 01438762, 01551951, 01570476 | The Shared Credentials Database is no longer limited to two credentials. | ETS |
| 01584063 | The failover functionality on Windows Server 2022 works correctly. |
IPAM |
| 01555171, 01611265, 01574171 | *When you run the Configuration Wizard using an existing Windows or Azure Active Directory account, the Infoblox Server credential test no longer fails with the following message:
|
IPAM |
| 00837847, 01457151, 01253910 | Changes were made to prevent database performance issues in large environments. |
LA |
| 01375289 | If SQL Server stops a SQL process, LA database maintenance logs the issue and continues running instead of waiting indefinitely on the process. |
LA |
| 01498395, 01505412, 01509365, 01522260, 01527757, 01534554, 01535156, 01544402, 01583022 | When devices include duplicate data, inventory jobs no longer fail with the message |
NCM |
| 01496355, 01535319, 01535948, 01541480, 01543568, 01544631, 01564617, 01565311, 01571856, 01579695 | Additional ciphers are supported for collecting data via SSH. This fixes the connectivity issues with certain versions of the FortiGate software. For the list of supported ciphers, see Supported algorithms and ciphers. If NCM still cannot connect to Fortigate devices after the upgrade, complete the additional steps in this article. |
NCM |
| 01501426 | Having duplicate names for the same node ID no longer causes an upgrade to fail. |
NCM |
| 01466545 | When you display shadowed ACL rules, line numbers are no longer broken across multiple lines, making them difficult to read. |
NCM |
| 01477163 | Upgrades no longer fail with the message |
NCM |
| 01423580 | Config change approval requests are no longer deleted because of account limitations. |
NCM |
| 01376614, 01430014, 01497551 | If the CVE field on the Firmware Vulnerabilities Settings page contains the CPE match data feed URL instead, a message is displayed and the settings cannot be saved. |
NCM |
| 01490187, 01398440 | The Collector service no longer reports errors related to SwitchStack UNIQUE KEY constraints, similar to:
|
NPM |
| 01526717, 01572246 | Interface traffic for VeloCloud Networks is polled correctly. The common MIB2 ifHCxxoctets counters do not work consistently for VeloCloud Edge devices when the device is configured as an HA (high availability) pair and its current state is StandBy. To overcome this issue, SolarWinds implemented a custom VeloCloud interface traffic data SNMP poller for getting OutTotalBytes/InTotalBytes counters from a private VeloCloud MIB. |
NPM |
| 01565234 | When retrieving information about Meraki SD-WAN tunnels, all VPN statuses for an organization are retrieved, even when there are more than 300. |
NPM |
| 01560284, 01574209, 01579279 | A new MAC property for Device Studio Node Details pollers allows specification of the data source (OID) for MAC address collection. With this change, custom node detail pollers that were created in 2023.4 or earlier work correctly, and you can set the MAC data source for them. |
NPM |
| N/A | Empty DNS field in the
|
NPM |
| 01553385 | In Centralized Settings, the new setting
Use this setting to temporarily stop requests if the NetPath_Networks table is filled during BGP polling and you see errors such as:
|
NPM |
| N/A | The Wireless Heat Map editor displays the owner information correctly. |
NPM |
| 01507418 | Wireless heat map generation no longer fails when some access points return invalid data. The heat map generates, but problematic access points are ignored. |
NPM |
| 01532793 | The performance of SD-WAN charts on the SD-WAN Orchestrator Details view has been improved. |
NPM |
| 01502197 | If a custom property has a NULL value for some nodes and an empty string for other nodes, polling with a Universal Device Poller (UnDP) and then sorting by the custom property no longer returns an error message. |
NPM |
| 01509390, 01559294 | When you edit a group, saving the Add & Remove SolarWinds Platform Objects page without making any changes no longer removes any existing objects. |
NPM |
| 01478476 | Detection of L3 Next Hop connections for VPN tunnels has been improved. Previously, having a full L3 Interface-to-Interface connection required that both nodes reported valid Next Hop addresses for each other. Now, only one node needs to report the connection. This default behavior can be changed with the advanced configuration option |
NPM |
| 00465823, 01472478 | A server without an IP address does not cause the List of Virtual Servers widget to display an exception. |
NPM |
| 01492998 | SolarWinds IP address and port pollers no longer return misleading results for Meraki appliance models that have a fallback cellular uplink. |
NPM |
| 01443956 | Queries associated with the Duplex Mismatch alert have been tuned to improve the performance of the SolarWinds Platform Web Console. |
NPM |
| 01040126, 01155575 | If one IP address has more than RemoteSystemName in LLDP data, inaccurate connections are no longer reported in the topology table. |
NPM |
| 01564091, 01573720 | *VeloCloud VPN Tunnel statistics are calculated correctly, regardless of the statistics collection interval and the poll interval settings. |
NPM |
| 01509390 | *When two NetPath services on different probes have the same name, logs no longer contain the message |
NPM |
| 01562749 | *Palo Alto Prisma SD-WAN Uplinks and Tunnels are polled via API requests, and widgets display the appropriate Uplink and Tunnel data. |
NPM |
| 01569428 | In previous versions, even though a user had the right to manage nodes and could add new devices or edit existing ones, the user was not able to add an interface through the NetFlow Events resource. Now, users with Node Management rights are able to add interfaces. Admin rights are no longer required for this task. |
NTA |
| 01524107 | During on-demand DNS resolution, when an option to resolve IP addresses is disabled and then reenabled after maintenance, IP addresses are resolved and the Domains and Resources widgets display the correct information. |
NTA |
| 01440937, 01512489 | Creating and managing an application with a large port range is handled properly in NTA. |
NTA |
| 01356742 | Netflow PDU is marked as malformed when octets or packets have a negative value, fewer octets than packets are reported, and maximum transition unit (MTU) is larger than 64. These types of invalid data are detected and discarded. |
NTA |
| 01567985 | When you enable the High Receive Percent Utilization with Top Talkers out-of-the-box alert or High Transmit Percent Utilization with Top Talkers out-of-the-box alert and configure an alert action to send a PDF, the PDF file is generated correctly and it no longer contains an error similar to:
|
NTA |
| 01499729 | An API poller that includes a null value no longer causes sent requests to fail with the message |
SAM |
| 01379396, 01592659 | When Windows Update Monitoring fails to connect to a remote server, the correct message is displayed instead of a message saying that initial polling is in progress. |
SAM |
| 01512043 | An API poller can be removed using the SWIS SDK. The Delete command no longer returns an error. |
SAM |
| 01478170 | Running Asset Inventory on a node with the Linux agent installed no longer fails with errors such as the following:
|
SAM |
| 01414931 | When an Exchange user's password includes a special character, AppInsight for Exchange displays the correct data for Custom PowerShell Monitor components, rather than showing them in an unknown state. |
SAM |
| 00596630, 01436136 | A VM in an Azure account is polled correctly, and the status is not shown as unknown. |
SAM |
| 01406764 | A SolarWinds query to retrieve component statuses was tuned to run more quickly. |
SAM |
| N/A | The performance of the Last 10 Events widget has been improved. |
SAM |
| N/A | Non-admin users have access to the new Azure dashboard. |
SAM |
| 01568798 | When a custom property with the entity type Application is initially saved without any values, the custom property can be used for filtering on the Manage Application Monitors page. |
SAM |
| 01572092 | When you add a node and enter WMI credentials without specifying the domain, Windows update polling is successful and the Windows Update Information widget no longer contains an error message. |
SAM |
| 01585116 | *When an AppInsight for SQL application is created using the SWIS verb |
SAM |
| 01510807, 01542783, 01596899, 01605745 | *When the job ID and the account ID do not match, adding a cloud account no longer fails with messages such as the following:
|
SAM |
| 01568798 | *When custom properties with the entity type Application are initially saved without any values, after editing an application, the edited application is displayed as expected on the Manage Application Monitors page. |
SAM |
| 01572092 | When you add a node and enter WMI credentials without specifying the domain, Windows update polling is successful and the Windows Update Information widget no longer contains an error message. |
SCM |
| 01478170 | Running Asset Inventory on a node with the Linux agent installed no longer fails with errors such as the following:
|
SCM |
| N/A | Ports that are administratively shut down are not imported if this option is deselected in the discovery. |
UDT |
| 01392778, 01400254 | The MAC addresses of devices connected to Fortiswitches are displayed correctly. |
UDT |
| 01550095 | The version of OpenJDK shipped with the product has been upgraded to 11.0.22. |
VMAN |
| 01283241, 01505280, 01526330 | Nutanix Hardware Health polling works in large environments. |
VMAN |
| 01456785, 01524861, 01544639 | Free nodes are no longer included in license consumption when adding a new virtual environment. |
VMAN |
| 01406647 | VMAN polling now collects reboot values for hosts during the sample collection (every 10 minutes), which enables the Host Rebooted alert to work correctly. |
VMAN |
| 01335396 | The Node Details widget for aVMware ESX server shows the correct number of CPUs. |
VMAN |
| 01283241 | Nutanix Controller VM (CVM) credentials can be added to Nutanix Clusters. |
VMAN |
| N/A | The Save new credentials button is disabled during credentials validation, so you do not run the same verification multiple times. |
VMAN |
| N/A | *The Node Details widget on the Node Details page displays the correct value for Number of Cores instead of N/A. In previous versions, the Number of Cores field was labeled No of CPUs. |
VMAN |
| 01470768, 01487037, 01497412, 01498672, 01500547, 01501808, 01502346, 01504377, 01505255, 01519189, 01519623, 01525710, 01525762, 01526225, 01534998, 01540646, 01541028, 01546443, 01591264 | Database maintenance no longer fails with the following message:
|
VNQM |
| 01583266 | Polling Cisco CallManagers with attached gateways does not increase CPU usage or produce an error. |
VNQM |
| 01517771, 01542771, 01561622, 01562558 | The Business Layer on an additional polling engine no longer fails to start with the following message:
|
VNQM |
| 01589368 | The VNQM business layer on an additional polling engine no longer times out when receiving license information from the main polling engine in environments with many nodes. |
VNQM |
| 01485538, 01528554 | CDR data is processed when columns contain Cisco-specific call termination cause calls, and an error is no longer displayed, similar to:
Also, the VoIP Call Details resource is rendered correctly on the Call Details page, and the VoIP Search page opens without errors. |
VNQM |
| 01542771, 01561622, 01562558, | An issue that could cause menu failures or prevent IP SLA from loading has been fixed. |
VNQM |
| 01327448, 01469467, 01491596, 01496347, 01503660 | VNQM no longer displays invalid messages saying that the license limit is exceeded. This was caused by attempts to verify licenses before they were loaded. |
VNQM |
| 01498215 | The Last Polled field on the Call Manager page now displays the time in the time zone of the server, not in the UTC time zone. |
VNQM |
| 01475848, 01487847 | Juniper RPM operations are polled and the status changes correctly. |
VNQM |
| 01456474 | When an Avaya call manager has a large number of phones, gateways, and other attachments (for example, over 1,000), polling is completed during one polling cycle. |
VNQM |
| 01250622 | Integration with third-party FTP server software has been improved. VNQM can download call manager data from FTP servers such as FileZilla and others. |
VNQM |
| 01561273 | IP SLA UDP Jitter operations are no longer deleted from VNQM if it is created with an external node as a target. |
VNQM |
| 01603121 | *The Network Service Assurance Operations with Issues widget displays data correctly, rather than displaying this message:
|
VNQM |
| 01560713, 01573179, 01589368 | *VNQM no longer generates a large number of Out of Memory exceptions when working with the job engine. |
VNQM |
| 01584394, 01589368, 01592893 | *In large environments, timeouts no longer occur frequently during discovery operations. |
VNQM |
| 01238012, 01596373, 01593165, 01597616 | *In large environments, SQL deadlocks no longer occur frequently when the VoipCdrs table is accessed. |
VNQM |
*This fix was added after the RC release.
Installation or upgrade
For new SolarWinds Platform deployments, download the installation file from the product page on https://www.solarwinds.com or from the Customer Portal. For more information, see Get the installer.
To activate your product in an existing SolarWinds Platform deployment, use the License Manager.
For upgrades, go to Settings > My Deployment to initiate the upgrade. The SolarWinds Installer upgrades your entire deployment (all SolarWinds Platform products and any scalability engines).
For more information, see the SolarWinds Platform Product Installation and Upgrade Guide.
For supported upgrade paths, see Upgrade an existing deployment.
Known issues
Errors in the IP SLA business layer log file
When trying to poll and save new types of operations not previously collected, errors appear in the IPSLA business layer log file.
Resolution or workaround: Restart the SolarWinds Orion Module Engine service and the SolarWinds Job Engine v2 service.
Date range is one day behind on Wait Time resources
The date on Wait Time Trends resources is one day behind for environments where the DPA server and SolarWinds Platform server are in different time zones. The affected resources are:
-
All Instances with the Highest Wait Times
-
Instances with the Highest Wait Times
-
Greatest Downward Wait Time Trends
-
Greatest Upward Wait Time Trends
Resolution or workaround: Set the DPA and SolarWinds Platform servers to the same time zone.
DPAIM stops working after failover
If you have High Availability configured, the DPA Integration Module stops working when a failover occurs after you re-integrate with a previously integrated DPA server.
Resolution or workaround: Re-integrate the DPA server.
Last updated: June 20, 2024
SNMPv3 traps are not received when the authentication method is changed
When you change the authentication method for SNMPv3 credentials while the trap service is running, you receive the following error message:
2024-06-04 06:38:33,311 [50] ERROR SolarWinds.Orion.LogMgmt.TrapServiceImplementation.TrapPacketProcessor - Bad trap packet received from Node with IP xxx.xx.x.x. Error description : User authentication failed (signature of incoming packet could not be verified with the local user credentials).
Resolution or workaround: Restart the trap service.
Aruba EdgeConnect Orchestrator REST API endpoint changes
In Orchestrator version 9.3, all Aruba EdgeConnect Orchestrator REST API endpoint definitions have changed. These API endpoint changes are not backward compatible with Orchestrator versions earlier than 9.3.
Aruba EdgeConnect was formerly Silver Peak.
Resolution or workaround: Before upgrading to 9.3, code review every Orchestrator REST API and update all endpoint definitions. This includes reviewing the following items that may consume the APIs:
- Custom scripts
- Third-party tools
- Applications including internal applications
For information about the endpoint changes, see Rest API Table for 9.3 Endpoints.
Incorrect error message for Linux script component
In the Linux CPU Monitoring Perl application details, the error message for Linux Script Component via SNMP is incorrect.
Resolution or workaround: There is no workaround at the moment. SolarWinds is working on resolving this issue in a future version.
Incompatible Mongodb components
Components that gather stats from mongodb return an error.
Resolution or workaround: In the template, change perl ${SCRIPT} /usr/bin/mongo test to perl ${SCRIPT} /usr/bin/mongosh test.
Incorrect PerfStack memory used units
The AvgMemoryUsed chart incorrectly shows units as bytes (B) instead of gigabytes (GB).
Resolution or workaround: There is no workaround at the moment. SolarWinds is working on resolving this issue in a future version.
No processes in Real Time Process Explorer
The process monitor does not show any processes in the Real Time Process Explorer when using Red Hat Enterprise Linux 9 via SNMP.
Resolution or workaround: There is no workaround at the moment. SolarWinds is working on resolving this issue in a future version.
Incorrect error message for Nagios LInux File & Directory Count script
In the Nagios Linux File & Director Count Script Details View summary, the wrong error message is displayed when components are in a down status.
Resolution or workaround: There is no workaround at the moment. SolarWinds is working on resolving this issue in a future version.
Installed updates interval not shown
The Multiple Statistic Chart shows code instead of the installed updates interval.
Resolution or workaround: There is no workaround at the moment. SolarWinds is working on resolving this issue in a future version.
Errors in the IP SLA business layer log file
When trying to poll and save new types of operations not previously collected, errors appear in the IPSLA business layer log file.
Resolution or workaround: Restart the SolarWinds Orion Module Engine service and the SolarWinds Job Engine v2 service.
Last updated: July 11, 2024
NTA application traffic for Cisco ASR/ISR devices is displayed as Unrecognized
After upgrading to SolarWinds Platform 2024.2, NTA application traffic for Cisco ASR/ISR devices is displayed as Unrecognized in the Top 10 Applications widget.
Resolution or workaround:
In Advanced Settings, change the setting PacketParserSettingsIsSourceIdMatchRequired to false. For more information, see NTA application traffic for Cisco ASR/ISR devices shows as "Unrecognized" after upgrading to SolarWinds Platform 2024.1 and above.
Importing wireless heatmaps in EOC is not supported
The import feature on the fusion map management page of the SolarWinds Platform that enables users to import Network Atlas wireless heatmaps is not available in the EOC environment. By design, the EOC environment lacks the NPM feature required to support this function.
Resolution or workaround: None
End of life
| Version | EoL announcement | EoE effective date | EoL effective date |
|---|---|---|---|
| 2022.4 | June 4, 2024: End-of-Life (EoL) announcement – Customers on SolarWinds Observability Self-Hosted version 2022.4 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | July 4, 2024: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.4 or earlier will no longer actively be supported by SolarWinds. | July 4, 2025: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Observability Self-Hosted version 2022.4. |
| 2022.3 | February 6, 2024: End-of-Life (EoL) announcement – Customers on SolarWinds Observability Self-Hosted version 2022.3 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | March 7, 2024: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.3 or earlier will no longer actively be supported by SolarWinds. | March 7, 2025: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Observability Self-Hosted version 2022.3. |
| 2022.2 | November 1, 2023: End-of-Life (EoL) announcement – Customers on SolarWinds Observability Self-Hosted version 2022.2 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | December 1, 2023: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.2 or earlier will no longer actively be supported by SolarWinds. | December 1, 2024: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Observability Self-Hosted version 2022.2. |
See the End of Life Policy for information about SolarWinds product life cycle phases. To see EoL dates for earlier SolarWinds Observability Self-Hosted versions, see SolarWinds Observability Self-Hosted release history.
End of support
This version of SolarWinds Observability Self-Hosted no longer supports the following platforms and features.
Port 17778
SWIS REST Endpoint on port 17778 is deprecated as of 2023.1 and will be replaced with port 17774 in a future release. SolarWinds recommends that you start migrating SWIS REST Endpoint to port 17774.
If you are using DPAIM, make sure you are running DPA 2024.2 or later to switch to port 17774. Earlier DPA versions cannot send data to DPAIM on port 17774. See Specify the port DPA uses... for more information.
Starting with 2024.2, you can enable the port in Advanced Configuration by clearing the DisableSwisRestEndpointOnPort17778 option. See Enable/disable the SWIS endpoint port.
Deprecation notice
The following platforms and features are still supported in the current release. However, they will be unsupported in a future release. Plan on upgrading deprecated platforms, and avoid using deprecated features.
MAPI User Experience Monitor
MAPI User Experience Monitor, a component monitor that can be added to an application template, is deprecated as of 2024.2. It is still available and supported in the current release, but will be removed in a future release. Deprecation is an indication that you should avoid expanded use of this feature and formulate a plan to discontinue using the feature.
Network Atlas
Network Atlas is deprecated as of Orion Platform 2020.2. It is still available and supported in the current release, but will be removed in a future release. Deprecation is an indication that you should avoid expanded use of this feature and formulate a plan to discontinue using the feature. SolarWinds recommends that you start using Intelligent Maps in the SolarWinds Platform Web Console to display maps of physical and logical relationships between entities monitored by the SolarWinds Platform products you have installed.
Starting with 2024.2, you can import Network Atlas maps to Intelligent Maps. See Import maps.
Legal notices
© 2024 SolarWinds Worldwide, LLC. All rights reserved.
This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.