SolarWinds Observability Self-Hosted 2025.1 release notes
Release date: February 11, 2025
Here's what's new in SolarWinds Observability Self-Hosted 2025.1.
SolarWinds Observability Self-Hosted runs on the SolarWinds Platform (self-hosted). SolarWinds Observability Self-Hosted release notes include the updates from the SolarWinds Platform (self-hosted).
Learn more
- See the release notes aggregator to view release notes for multiple versions
and multiple SolarWinds Platform products on a single page. - See SolarWinds Observability Self-Hosted 2025.1 system requirements to learn about prerequisites for running and installing SolarWinds Observability Self-Hosted 2025.1.
- See the SolarWinds Observability Self-Hosted 2025.1 Administrator Guide to learn how to work with SolarWinds Observability Self-Hosted.
Attention 2025.1 customers
Depending on your settings, newly supported cloud entities might be automatically monitored after the upgrade which can increase license consumption. To prevent unintentional license consumption for newly supported cloud entities, review and adjust your configuration before you upgrade. For details, see Edit cloud account properties.
After upgrading, you can identify licenses used to monitor the cloud infrastructure by downloading and importing the Cloud License Details Report from THWACK.
New features and improvements in SolarWinds Platform
Modern dashboard improvements
-
Actions Menu: Access actionable items from a new menu. The menu contains items for easier interaction with dashboards.
-
NOC Mode: Use the Network Operations Center (NOC) views to see a single page view of critical statistics to fit on TV screens or mobile devices. Multiple subviews rotate automatically, each subview as a separate screen.
-
Dark Theme for NOC views: Display Network Operations Center views in the dark mode.
-
Pagination in Table widgets: Configure the number of items per page for queries that return a long list of items. See Customize pagination and scrolling.
Intelligent Maps improvements
-
Edit destination when clicking on an object.
-
New default setting page.
-
Improved handling of nested maps in the conversion tool.
WinRM support for polling Windows nodes
Windows servers now support both the modern WinRM protocol and the older WMI (DCOM) protocol. By default, a WinRM connection is attempted first. If that is not possible, the connection falls back to WMI (DCOM). You can choose which protocol to use. See Configure WinRM polling.
Alerting improvements
-
A new widget with a table view of all items affecting an entity status was added to the Active Alert Details view.
-
When editing an alert, the Trigger conditions page displays both all objects and immediate triggers when you click Show list.
-
When editing an alert action, credentials are offered. Only Administrators can create and assign credentials. See Required permissions for setting up alert actions.
Reporting improvements
-
An option to ignore certificate errors when exporting reports into Excel/CSV was added.
-
An option to use regional settings for reports exported in PDF was added.
See Troubleshoot reports.
DoDIN improvements
-
The mandatory notice on the login page is displayed for users who log in using CAC (MFA).
-
The logout notification was extended to advise users to close the browser.
Other improvements
-
Configure the SNMP version to be automatically selected in your wizards. By default, SNMPv3 is preselected for fresh installs. For upgrades, the default version is SNMPv2. See Set the default SNMP version for wizards.
-
Support for customizing the locale for pdf reports.
-
Support for Windows 2025 both as a platform to install products on and for monitoring.
-
Added peak memory usage (percent) for both Windows and Linux servers.
-
Support for changing the calculation of physical memory volume utilization on Linux nodes polled via SolarWinds Platform Agents was added. See this article for details.
New features and improvements in SolarWinds Observability Self-Hosted Essentials
Monitor Google Compute Engines
Discover and monitor your Google Compute Engines (GCEs). SolarWinds Observability Self-Hosted uses GCP API to retrieve data, such as status, performance metrics, and more, at specified intervals. See Configure Google Cloud Platform for monitoring.
Added support for monitoring Azure entities
Discover and monitor your Azure App Service and Azure Blob Storage entities.
Azure App Services: On the updated Azure Summary and Compute tab, check out the added details page to monitor the platform for building, deploying, and scaling web apps, mobile app backends, and REST APIs.
Azure Blob Storage: On the updated Azure Summary and Storage tab, check out the added details page to monitor the scalable object storage service for storing and managing large amounts of unstructured data, such as text, binary data, documents, and media files SolarWinds Observability Self-Hosted uses GCP API to retrieve data, such as status, performance metrics, and more, at specified intervals.
Added support for monitoring AWS entities
AWS Cloud Entities
Get visibility into the AWS database services, including service statuses and key metrics. Discover and monitor the following relational databases as new AWS Cloud Entities:
- Amazon RDS for MySQL
- Amazon RDS for AuroraMySQL
- Amazon RDS for PostgreSQL
- Amazon RDS for Aurora PostgreS
- Amazon RDS for Oracle
AWS Elastic Load Balancers
Monitor relevant properties and metrics of your AWS load balancers to see their health status, processed traffic, and more.
Other Improvements
-
Support for configuring High Availability with pools larger than two members in the SolarWinds Platform Web Console.
-
Permission checks for testing the connection to ServiceNow.
-
Security enhancements to prevent exposing the SNMP community string. Only elevated accounts can view this string in the clear.
Last updated: December 12, 2024
Enhanced SNMP polling for Aruba devices
Monitor the following metrics for your Aruba switches:
-
Hardware health
-
Layer 2 metrics, such as MAC address table utilization, CDP/LLDP topology, Spanning Tree Protocol (STP) status, VLAN configuration and usage
-
Layer 3 metrics, such as routing table utilization and ARP table utilization.
Enhanced SNMP polling for Fortinet devices
Monitor the following metrics for your Fortinet switches:
-
Hardware health
-
Layer 2 metrics, such as MAC address table utilization, CDP/LLDP topology, and VLAN configuration and usage
-
Layer 3 metrics, such as ARP table utilization.
Support for monitoring Ruckus SmartZone and Extreme Networks wireless access points
Using API, you can monitor the following aspects for your Ruckus SmartZone and Extreme Networks wireless networks:
-
Wireless network strength: total number of access points, the total number of users, or rogue access point signal strength
-
Wireless network utilization: CPU and memory utilization, availability and response time
-
Wireless network traffic: total bytes sent and received by access points and total bytes sent and received by clients
See Monitor Ruckus SmartZone wireless infrastructure and Monitor Extreme Networks Cloud IQ wireless infrastructure.
API-only polling for SD-WAN vendors
See API polling for details about vendor-specific polling and polling limits.
API-only polling for VeloCloud SD-WAN edges
In earlier releases, VeloCloud SD-WAN edge devices were polled via a combination of SNMP and API. In 2025.1, you can poll VeloCloud edge devices as API-only nodes. See SNMP or API-based monitoring for VeloCloud devices.
Improved API-only polling for Prisma SD-WAN
API-only polling now supports polling Interfaces and CPU & memory.
Performance improvements
Increased performance and speed when assigning application templates directly to groups, especially for groups with a large amount of nodes.
New features and improvements in SolarWinds Observability Self-Hosted Advanced
Last updated: February 11, 2025
NTA Endpoint Traffic alert
The new, out-of-the-box NTA Endpoint Traffic alert is triggered when a single endpoint transfers more than 5 GB of data in last 60 minutes in any monitored segment of your network.
New features and improvements in SolarWinds Observability Self-Hosted Enterprise Scale
Improved Polling Scalability
For SolarWinds Observability Self-Hosted Enterprise, polling scalability has been increased:
-
For SNMPv2, the number of supported elements was increased from 72,000 to 100,000 elements per polling engine.
-
For SNMPv3, the number of supported elements was increased from 60,000 to 72,000 elements per polling engine.
- For WMI/WinRM, a polling engine can poll up to 20,000 elements (nodes, volumes, interfaces) with a maximum of 2,000 nodes.
The scalability improvements only pertain to SolarWinds Observability Self-Hosted, Enterprise tier. Module and NAM customers will see improved resource utilization and better product stability.
Scalability limits are valid for default polling frequencies. Supported elements include nodes, interfaces, and volumes.
Modern dashboard improvements
-
Actions Menu: Access actionable items from a new menu. The menu contains items for easier interaction with dashboards.
-
NOC Mode: Use the Network Operations Center (NOC) views to see a single page view of critical statistics to fit on TV screens or mobile devices. Multiple subviews rotate automatically, each subview as a separate screen.
-
Dark Theme for NOC views: Display Network Operations Center views in the dark mode.
Intelligent Maps improvements
-
Edit destination URL when clicking on an object in a map widget.
-
New default setting page.
-
Improved handling of nested maps in the conversion tool.
Fixed CVEs
At SolarWinds, we prioritize the swift resolution of CVEs to ensure the security and integrity of our software. In this release, we have successfully addressed the following CVEs.
SolarWinds CVEs
SolarWinds would like to thank our Security Researchers below for reporting on the issue in a responsible manner and working with our security, product, and engineering teams to fix the vulnerability.
CVE-ID | Vulnerability Title | Description | Severity | Credit |
---|---|---|---|---|
CVE-2024-52612 | SolarWinds Platform Reflected Cross-Site Scripting Vulnerability | The SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable. | 6.8 High | Anonymous |
CVE-2024-52606 | SolarWinds Platform Server-Side Request Forgery Vulnerability | The SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request. | 3.5 Low | Anonymous working with Trend Micro Zero Day Initiative |
CVE-2024-52611 | SolarWinds Platform Information Disclosure Vulnerability | The SolarWinds Platform is vulnerable to an information disclosure vulnerability through an error message. While the data does not provide anything sensitive, the information could assist an attacker in other malicious actions. | 3.5 Low | Vicky Malekar, Ravi Khanchani and Techsa SolarWinds Team. |
Third-party CVEs
CVE-ID | Vulnerability title | Description | Severity |
---|---|---|---|
CVE-2024-6119 | OpenSSL Denial of Service Vulnerability | Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. | 7.5 High |
CVE-2024-5535 | OpenSSL Buffer Overread Information Disclosure Vulnerability | Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a "no overlap" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available. | 9.1 Critical |
Fixed customer issues
Case number | Description | Platform product |
---|---|---|
01775614, 01797044 | If the National Institute of Standards and Technology (NIST) does not include data about a device type in the Common Platform Enumeration (CPE) Dictionary, the missing data no longer prevents SolarWinds Observability Self-Hosted from identifying firmware vulnerabilities that affect the device. |
Platform |
01733199 | Searching and filtering on the All Active Alerts page works as expected. |
Platform |
01614539, 01760243 | The percent usage (disk, volume, memory) of monitored components no longer shows values over 100%. |
Platform |
01613397 | When the delayed trigger condition is used, false positive alerts are no longer triggered after the Alerting Engine service is restarted. |
Platform |
01724267 | When a dashboard has a limitation defined, the Intelligent Map widget displays the entities as expected. |
Platform |
01726459 | After you edit an anomaly-based alert, the Anomaly-based alerts Details page no longer fails to open, and previously selected entities and entity type are displayed as expected. |
Platform |
01496748 | The Management resource for Node Details and Volume Details widgets no longer disregards custom LP translations. |
Platform |
01680302 | Configuring alert actions no longer requires different permission levels for setting up credentials. |
Platform |
01707822 | Intelligent Map highlights the traffic value that exceeds a configured threshold. |
Platform |
01613861 | The SNMP fast status poll no longer incorrectly updates the PercentLoss value. |
Platform |
01716485 | The out-of-the-box alert Node not polled in last 10 minutes works as expected and the column |
Platform |
01682272, 01749347 | If a polling engine is upgraded to 2024.4 or later but agents remain on older version, CPU data is not missing for agent-monitored Windows servers. |
Platform |
01720933 | Device details for Westermo devices show the correct vendor information. |
Platform |
01688372, 01760260, 01797443 | The zoom function in the Intelligent Map works as expected. |
Platform |
01678985 | When you configure an alert to send an email where the variable |
Platform |
01680938 | Members of Windows Group Account can change the Hardware Health Sensor temperature units. |
Platform |
01692359, 01716314 | Exporting the |
Platform |
01504511 | Account limitations no longer break the Active Alert Details page for global alerts. |
Platform |
01581882 | Database types are no longer mismatched and causing performance issues. |
Platform |
01598650 | When the polling method changes, CPU and memory pollers are automatically imported into the database as expected. |
Platform |
01541887 | When you select the WMI protocol as the preferred polling method, SolarWinds Platform no longer tests all SNMP credentials against WMI nodes, causing network discovery to take longer than expected. |
Platform |
01440622, 01573956, 01781557 | When adding Nodes with SNMPv3 with an MD5/AES256 configuration, the Test connection no longer fails with an error |
Platform |
01560929 | When installing scalability engines, the Configuration Wizard no longer fails with the following error related to the existence of Rabbit MQ service: |
Platform |
01528599 | Details for value and custom property in Modern Dashboards no longer overlap. |
Platform |
00850506, 00711183, 01122007, 01541102, 01498410, 01512730 | List Resources on Agent node show the interface selections as expected. |
Platform |
01527588, 01537151 | The Active Diagnostics test no longer calculates the memory size incorrectly for the 64-bit SQL server. |
Platform |
01794548, 01488531, 01582664, 01683005, 01521268, 01735702, 01708561, 01764686, 01788262 | When you uninstall an additional polling engine, RabbitMQ queues are deleted as expected. |
Platform |
01330824, 01742235 | Existing Intelligent Maps created without a container are available in the Entity Library, and they can be updated, saved, and added to other maps. |
Platform |
00086954, 00636209, 01438471, 01732632 | The date and time are formatted correctly in custom reports. |
Platform |
01269370 | The Set of objects filter in the Add Alert Wizard works as expected. |
Platform |
01089240, 01639273 | When you have groups over entities with the status of |
Platform |
01785463, 01785499, 01786391, 01787163, 01787867, 01790533, 01791274, 01799572 | When you open the Deployment Health tab from an additional web server, health checks run correctly. |
Platform |
01787803, 01797738 | WMI job issues that caused JobEngine to use too much CPU and memory in environments with heavy WMI polling were addressed by configuring WMI polling jobs to run outside of in-process workers by default. |
Platform |
01791756, 01800049 | Upgrading the SolarWinds Platform log database no longer fails with an error similar to the following if the database is contained:
|
Platform |
01761260 | Using a date format other than MM/DD/YYYY no longer prevents the discovery of a Power Control Unit (PCU). |
Platform |
01803929 | When a subgroup is added to a map, the All Groups widget and Manage Groups page no longer display the subgroup as both a root level group and a subgroup. |
Platform |
01790612, 01795074 | The Incident Number column on the All Active Alerts page displays the number of currently active incidents associated with an alert. It no longer includes incidents that occurred in the past and are no longer active. |
Platform |
01788280 | When you select the $Name variable under Map name format, you can save the map definition. |
Platform |
01778801 | Information that should not be available to a user because of limitations is no longer exposed in certain situations, such as a failed service initialization on an unstable database connection. |
Platform |
01783597, 01787060 | Duplicate device types for FortinetFortiManager Orchestrator devices in the SolarWinds Platform database are removed. This situation no longer causes upgrades to fail with the following message:
|
Platform |
01798044, 01802014 | When creating an Azure SQL instance with Azure AD, the Configuration Wizard no longer fails with an error Services configuration failed: Status(StatusCode="Unavailable". Detail="Error starting gRPC call. HttpRequestException: An error occurred while sending the request. WebException: Unable to connect to the remote server SocketException: No connection could be made because the target machine actively refused it". DebugException="System.Net.Http.HttpRequestException: An error occurred while sending the request.") |
Platform |
01570173 | The custom Trap rule action Change the status of an interface changes the status as expected when the trap is received. |
Platform |
01591806, 01761103 | When the certificate store contains more than one SWI-Orion-Agent certificate that can be used by the Job Engine to encrypt WCF communications, the Job Engine no longer fails with the following error:
|
Platform |
01790326 | When a device with a removable disk (floppy or compact disk) is polled and no disk is inserted, a warning is not logged. In addition, the Volume Space Used, Volume Space Used, and Volume Space Available are shown as |
Platform |
01735730, 01761103, 01848027 | When the Job Engine starts, it ensures that multiple SWI-Agent-JobEngineService certificate do not exist. If multiple certificates exist, they are deleted and a new self-signed certificate is generated. Multiple certificates can cause issues such as metrics not being collected. |
Platform |
01237858, 01353411, 01738302 | A condition that caused the following exception no longer occurs: Exception Info: System.NullReferenceException at SolarWinds.Orion.Feature.Client.NonBlockingFeatureClient.RefreshCacheOnTimer() at SolarWinds.Orion.Feature.Client.NonBlockingFeatureClient.<.ctor>b__8_0(System.Object) at System.Threading.TimerQueueTimer.CallCallbackInContext(System.Object) at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean) at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean) at System.Threading.TimerQueueTimer.CallCallback() at System.Threading.TimerQueueTimer.Fire() at System.Threading.TimerQueue.FireNextTimers() at System.Threading.TimerQueue.AppDomainTimerCallback(Int32) |
Platform |
01799539, 01800546 | Forwarding a significant number of syslog and trap messages per second with spoofing no longer results in some messages not being sent, high CPU and RAM usage, and errors such as the following in logs:
|
Platform |
01787586 | If the language for the browser is changed, reports with a relative time period selected (for example, Last Week) show data from the correct date range whether you view them in the browser or export the report to a PDF document. |
Platform |
01599016, 01790390 | Locking issues that could result in macros not being parsed correctly or other alert failures have been resolved. |
Platform |
01729405, 01756161 | The Event log no longer includes erroneous audit event messages saying that a user changed an account. |
Platform |
01783820, 01790058 | Running the SolarWinds Platform installer for versions 2024.3 and earlier no longer returns the error |
Platform |
01777747 | The Node Details widget is no longer blank when the node category is null. |
Platform |
01800472 | Exporting a modern dashboard no longer fails with the following message:
|
Platform |
01807543 | When you edit an Intelligent Map, the points connect to the correct locations. |
Platform |
00742942, 00771373, 00827562, 00833592, 00834704, 01468796 | If a map is added to a group and a user account has a limitation associated with that group, the user is no longer prevented from viewing the map or from seeing it in the list of available maps. |
Platform |
01072152, 01801035 | When a custom property has a value of Unknown, adding a limitation that uses the custom property no longer fails. |
Platform |
N/A | For subscription licenses, the License Details page shows the correct number of days left in the subscription. |
Platform |
01191261 | When upgrading ETS, the Configuration Wizard no longer fails due to a duplicate |
ETS |
01429311 | The SolarWinds Diagnostic tool no longer continuously increases the size of the |
ETS |
01721500, 01601029, 01804058, 01697585 | The Default database and archive maintenance job purges the Config Archive folder as expected and the log file no longer shows 0 files deleted. |
NCM |
01724337 | When the option |
NCM |
01545714 | The performance of impersonation was improved to avoid long loading times for users with large profiles. |
NCM |
01466545 | The SRD calculation no longer takes into account |
NCM |
01617751 | VLANs Ports polling no longer fails due to a broken SNMP VLAN context on a node. |
NPM |
01735821 | When you add the Search for Nodes widget, and select Status from the Search by drop-down, the search no longer fails. |
NPM |
01731322, 01780800 | After adding Aruba Orchestrator and Edge devices, the Job Engine service process memory usage is stable, and the |
NPM |
01768169 | When the response from a Juniper Mist device does not include a MAC address, polling the device no longer fails and the device is not shown as down. |
NPM |
01680938 | Members of Windows Group Account can change the Hardware Health Sensor temperature units. |
NPM |
01716096 | After the migration to Timeseries, the |
NPM |
01769027 | When the settings InterfacesCorrelationEventsRequestRetrievedFields and InterfacesRequestRetrievedFieldsPalo are empty, API polling no longer fails for Alto Prisma SD-WAN devices, resulting in missing VPN connection data. |
NPM |
01782259 | When the response from an Extreme Networks Wireless Access Point does not include an IP address, polling no longer fails. |
NPM |
01796593, 01801205 | The SWIP query to retrieve SD-WAN orchestrator statistics no longer causes SQL Server performance issues, including rapid growth of the tempdb table. |
NPM |
01775055, 01804555 | When an Aruba API node has multiple interfaces with duplicate ifIndexes, the interfaces are discovered successfully, and logs no longer include messages such as:
|
NPM |
01716764 | The Aruba EdgeConnect REST Walker no longer fails with an error similar to the following:
|
NPM |
01756058, 00574258 | When processing v9 NetFlow from Fortigate devices, NTA no longer displays an error:
|
NTA |
01731778, 01743857 | Unmanaged interfaces no longer cause large amounts of |
NTA |
01722723 | NTA logs no longer cause high CPU utilization due to a high number of incoming PDU warning messages. |
NTA |
01589460 | When upgrading NTA, interfaces are no longer labeled as deleted. |
NTA |
01757688 | When the Autonomous System resource attempts to display information about Juniper MX480 devices, it no longer fails with the message |
NTA |
01747772 | When a JMX node is added, the connection is established and the list of mBeams is displayed in the wizard. |
SAM |
01729626 | The Cortex REST API server is limiting TLS renegotiation attempts as expected. |
SAM |
01741532, 01776895, 01586566, 01766039, 01764695 | The aggregation type
|
SAM |
01685172 | The |
SAM |
01759430, 01610968 | All parameters for AWS VPN connections are displayed as expected. |
SAM |
01607301 | The password variable in a connection string for the PostgreSQL template is resolved as expected. |
SAM |
00756917, 01728509 | API Pollers no longer trigger false positive error messages about licensing. |
SAM |
01571710 | The Performance Analysis (PerfStack) dashboard no longer displays incorrect units on charts for SAM applications. |
SAM |
01520956, 01680171, 01641172, 01415252, 01680163 | Azure polling no longer fails with an error |
SAM |
01759430, 01542783, 01520956 | The account automonitoring job no longer tries to find instances in regions the account does not have access to. |
SAM |
01764202, 01498206, 01426384, 01683804, 01782904 | SAM made improvements to prevent slow performance in deployments with a large number of containers. |
SAM |
01543988, 01768078, 01396463, 01747772, 01627565 | JMX Monitor on Linux no longer returns an error |
SAM |
01083778, 01431098 | Assignment of bulk templates no longer causes duplicates. |
SAM |
01812855 | Monitoring a large number of cloud accounts no longer causes high CPU utilization on the main polling engine. |
SAM |
01801281 | After an upgrade, all AppInsight for SQL statistics are retained and any custom retention settings do not revert to their default values. |
SAM |
01748116, 01756640 | Attempts to poll Azure load balancers for Azure US Government accounts no longer fail with the following error:
|
SAM |
01776286 | Performance has been improved to reduce timeout errors and slow response times when adding nodes to groups. |
SAM |
01756640 | When more than one entity has the same Resource Name, the Compute Entities resource on the Azure Overview tab and the Virtual Machines resource on the Azure Compute tab display data correctly. |
SAM |
01672477 | The maintenance of CDR files no longer prevents VNQM from starting. |
VNQM |
01437946 | When you want to check credentials by certificate, VNQM checks AXL credentials by domain name as expected. |
VNQM |
01551769, 01719151, 01727623, 01749013 | The IP SLA Operation Details page no longer times out if there are many operations. |
VNQM |
01718011 | Job Engines on different polling engines no longer interact. |
VNQM |
01561273 | Operation frequency validation works as expected. |
VNQM |
01293700 | In large deployments with the main polling engine alongside multiple additional polling engines, artificial limitations no longer slow down parallel processing of IP SLA jobs. |
VNQM |
01737754 | Large values in the destSpan_value no longer result in call data being dropped and errors such as the following appearing in the IPSLA business layer logs:
|
VNQM |
01742151 | When you are monitoring a gateway, the Calls by Region widget in the VoIP Summary View no longer displays an error message. |
|
N/A | *The issue where JobEngine failed on start due to an unhandled exception related to |
Platform |
*This fix was added after the RC release.
Installation or upgrade
For new SolarWinds Platform deployments, download the installation file from the product page on https://www.solarwinds.com or from the Customer Portal. For more information, see Get the installer.
To activate your product in an existing SolarWinds Platform deployment, use the License Manager.
For upgrades, go to Settings > My Deployment to initiate the upgrade. The SolarWinds Installer upgrades your entire deployment (all SolarWinds Platform products and any scalability engines).
For more information, see the SolarWinds Platform Product Installation and Upgrade Guide.
For supported upgrade paths, see Upgrade an existing deployment.
End of life
Integration with the SolarWinds Platform requires a supported version of the platform.
Version | EoL announcement | EoE effective date | EoL effective date |
---|---|---|---|
2023.1 | February 11, 2025: End-of-Life (EoL) announcement - Customers on SolarWinds Observability Self-Hosted version 2023.1 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | March 13, 2025: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2023.1 or earlier will no longer actively be supported by SolarWinds. | March 13, 2026: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2023.1 or earlier will no longer actively be supported by SolarWinds. |
2022.4 | June 4, 2024: End-of-Life (EoL) announcement - Customers on SolarWinds Observability Self-Hosted version 2022.4 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | July 4, 2024: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.4 or earlier will no longer actively be supported by SolarWinds. | July 4, 2025: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.4 or earlier will no longer actively be supported by SolarWinds. |
2022.3 | February 6, 2024: End-of-Life (EoL) announcement - Customers on SolarWinds Observability Self-Hosted version 2022.3 or earlier should begin transitioning to the latest version of SolarWinds Observability Self-Hosted. | March 7, 2024: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.3 or earlier will no longer actively be supported by SolarWinds. | March 7, 2025: End-of-Engineering (EoE) - Service releases, bug fixes, workarounds, and service packs for SolarWinds Observability Self-Hosted version 2022.3 or earlier will no longer actively be supported by SolarWinds. |
See the End of Life Policy for information about SolarWinds product life cycle phases. To see EoL dates for earlier SolarWinds Observability Self-Hosted versions, see SolarWinds Observability Self-Hosted release history.
End of support
This version of SolarWinds Observability Self-Hosted no longer supports the following platforms and features.
Centos 6, Red Hat Enterprise Linux 6 and 7, SuSE Linux Enterprise Server 11, Ubuntu 14.04
These operating systems reached End of Life and are no longer supported by SolarWinds Platform Agents.
Deprecation notice
The following platforms and features are still supported in the current release. However, they will be unsupported in a future release. Plan on upgrading deprecated platforms, and avoid using deprecated features.
Network Atlas
Network Atlas is deprecated as of Orion Platform 2020.2. It is still available and supported in the current release, but will be removed in a future release. Deprecation is an indication that you should avoid expanded use of this feature and formulate a plan to discontinue using the feature. SolarWinds recommends that you start using Intelligent Maps in the SolarWinds Platform Web Console to display maps of physical and logical relationships between entities monitored by the SolarWinds Platform products you have installed.
Starting with 2024.2, you can import Network Atlas maps to Intelligent Maps. See Import maps.
Legal notices
© 2025 SolarWinds Worldwide, LLC. All rights reserved.
This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.