How can we help?

2025-W14 Release - April 5th, 2025

Follow

General Release

Updates for All Auvik Partners

  • Immediate Action Required: End of Support for Ubuntu 20.04 Collectors

    • Ubuntu 20.04 LTS (Long Term Standard Support) reaches the end of standard support on May 31, 2025, and will no longer receive security updates from Canonical. To maintain the security and stability of your network, Auvik will no longer support its Ubuntu 20.04 collector.

      Auvik will offer a grace period until July 28, 2025, to provide time for clients to make this transition.After July 28, 2025, Auvik collectors running Ubuntu 20.04 (version 20.04 of the OVA or Bash Script) will no longer connect to the Auvik platform, and any functionality the Auvik collector performs will stop reporting to Auvik.
      To avoid service disruption, please upgrade your collector(s) to Ubuntu 22.04 as soon as possible.

      Upgrade instructions: Ubuntu 20.04 to Ubuntu 22.04
      Need help? Contact Auvik Support

      If you’ve already upgraded—thank you!

Auvik Network Management (12)
  • Improved
    • CPU and Memory Utilization Alerting on Servers (Alerts 2.0) - CPU and memory utilization alerts are available for servers monitored with the endpoint agent in Alerts 2.0. You can use the CPU and Memory Utilization triggers for devices.
    • Synthetic VPN Tunnel Naming - To improve visibility and consistency across discovered VPN tunnels, Auvik now automatically generates synthetic names for tunnels where a phase 1 or phase 2 name is not derived via SNMP or other methods. The synthetic name is derived from the source and destination IPs in the format: sourceIP_destinationIP. This ensures that all tunnels are uniquely and clearly identifiable in the UI, even when devices don’t expose friendly or consistent tunnel identifiers. The feature is fully backwards-compatible and does not affect tunnel operation—only how unnamed tunnels are displayed in Auvik.

       

  • Fixed
    • Fixed issue with data collection on US1 - Some customers on US1 noticed incomplete or bad identifications that could result in failed backups. The issue has been resolved and future precautions will be put in place for prevention.

    • Fixed issue with Cloud Ping Check on US3 - There were tenant configurations that led to a memory leak that resulted in false triggers of internet connection checks. Error handling and monitoring are being put in place to prevent future issues.

    • Incorrect Interface Matching for VPN Tunnels - Resolved an issue where VPN tunnel endpoints were not matching to the correct interfaces in multi-interface devices.

    • Phase2 Tunnel Direction Mislabeling - Corrected a bug where phase2 tunnels were sometimes shown with incorrect directionality due to misinterpreted SA entries.

    • VPN Parsing Crash on Unsupported Configs - Fixed a crash when parsing VPN configurations with missing or malformed phase entries on certain Fortinet devices.

    • Tunnel Redundancy Misclassification - Addressed a case where tunnels with redundant peers were incorrectly deduplicated or hidden in the UI.

  • Devices
    • Identifications

      • (17) L2 and L3 Switch(es)

        • Vendor(s): Huawei, Meraki, H3C, Moxa, Alcatel-Lucent, TRENDnet, Phoenix Contact, Net-star, Teracom Telematica, FS, Signmax, Ruijie Networks

      • (3) Access Point(s)

        • Vendor(s): Huawei, Kentrox

      • (2) Router(s)

        • Vendor(s): Vendor(s): Cisco, BinTec

      • (5) Printer(s)

          • Vendor(s): Xerox, Sharp, Océ Technologies

New and Updated Knowledge Base Articles (10)
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request