Agent and Gateway data retention policy

  • Effective Date: March 2022
  • Announcement Date: October 2021

As of the effective date:

On loss of network connectivity, the agent and gateway retention policy is to retain alert data for the last 24 hours and metric data for the last one hour, instead of the previous policy of three days of alert data and four hours of metric data.

Agent Linux version support

Fedora Linux v30.x

  • Effective Date: March 2022
  • Announcement Date: June 2021

As of the effective date:

Fedora Linux versions 30.x and below are not supported for monitoring and management functionality.

Agent updates for Fedora Linux v30.x and below is stopped. These versions are already past end-of-life support from the vendor.

Oracle Linux v5.x

  • Effective Date: March 2022
  • Announcement Date: June 2021

As of the effective date:

Oracle Linux versions 5.x and below are not supported for monitoring and management functionality.

Agent updates for Oracle Linux 5.x and below is stopped. These versions are already past end-of-life support from the vendor.

Red Hat Linux v5.x

  • Effective Date: March 2022
  • Announcement Date: June 2021

As of the effective date:

Red Hat Linux versions 5.x and below are not supported for monitoring and management functionality.

Agent updates for Red Hat Linux v5.x and below is stopped. These versions are already past end-of-life support from the vendor

SLES Linux v11.3

  • Effective Date: March 2022
  • Announcement Date: June 2021

As of the effective date:

SUSE Linux Enterprise Server (SLES) versions 11.3 and below are not supported for monitoring and management functionality.

Agent updates for SLES Linux v11.3 and below is stopped. These versions are already past end-of-life support from the vendor.

Java-based player

  • Effective Date: March 2022
  • Announcement Date: December 2021

As of the effective date:

The Legacy Java-based player for audit recording is no longer available. To enable the player to play explicitly on the desktop, contact support.

Trusted root certificates

  • Effective Date: March 2022
  • Announcement Date: May 2020

As of the effective date:

Servers must have trusted SSL/TLS root certificates from standard certificate authorities (CA) installed.

Trusted certificates are validated done through OpsRamp agents. Agent connections are validated to ensure that a managed server has trusted root certificates.

By default, servers with standard OS installations should have trusted root certificates installed. This change should be transparent to your servers.