Unsupported product PATROL for Web Transaction and its documentation are no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.
The following new features are introduced in version 9.0.30 of the KM.
RFE ID: QM001879939
A new button has been added to the Web Capture screen to play the transactions from the Web recorder. You can use this option to validate a transaction file before adding it to the configuration. For information about how to use the Playback option, see Web Transaction Capture screen field descriptions.
Two new options, Add selected transactions for monitoring and Modify default configuration monitoring settings, are introduced in the Options menu of the Web Capture utility.
The Add selected transactions for monitoring option has been added to the Web Capture utility to deploy the web transaction files locally on the PATROL Agent that is running the TrueSight policy. This option enables you to connect to the TrueSight server and select the policies on which you want to deploy the Web Transaction files. You can also choose the transaction files that you want to distribute to the selected policies and the respective PATROL Agents.
The Modify default configuration monitoring settings option allows you to modify the default configuration settings of the transaction file.
For information about how to use this option, see Web Transaction Capture screen field descriptions.
A new parameter, Content match
has been introduced to alert users if the content match results in a positive or negative match in the configured Web URL page content. This parameter is available in the WTX_Transaction
application class.
The following features have been changed in version 9.0.30 of the KM.
The Availability
parameter now reports only the availability status of the monitored Web URL. However, it does not alert the users about the content match results. These alerts are reported by the Content match
parameter.
To address the security vulnerability CVE-2014-3566, commonly known as Poodle, Oracle has disabled Secure Socket Layer (SSL) v3.0 by default in Java SE Development Kit 8, Update 31 (JDK 8u31) onwards.
BMC recommends that you do not use SSLv3. If you have an absolute requirement to use SSLv3, use the following options:
From the <JRE_HOME>/lib/security/java.security
file, remove SSLv3 from the jdk.tls.disabledAlgorithms
property or dynamically set the Security property to true before the JSSE is initialized.
For more information, see the following Oracle documentation: