"title"=>"March 14, 2024",
"summary"=>nil,
"content"=>"Apigee UI\n
Announcement
\nOn March 14, 2024 we released an updated version of the Apigee UI.
\nFixed
\nBug ID | \nDescription | \n
---|---|
320739232 | \nAn issue was fixed where an incorrect error message was displayed after an API proxy or shared flow was undeployed. | \n
Changed
\nThe following supported default parsers have changed. Each is listed by product name and log_type
value, if applicable.
- \n
- Akamai WAF (
AKAMAI_WAF
) \n - Alcatel Switch (
ALCATEL_SWITCH
) \n - Arcsight CEF (
ARCSIGHT_CEF
) \n - Auth0 (
AUTH_ZERO
) \n - AWS Cloudtrail (
AWS_CLOUDTRAIL
) \n - AWS Config (
AWS_CONFIG
) \n - AWS GuardDuty (
GUARDDUTY
) \n - Azure AD (
AZURE_AD
) \n - Azure AD Directory Audit (
AZURE_AD_AUDIT
) \n - Azure App Service (
AZURE_APP_SERVICE
) \n - Azure Key Vault logging (
AZURE_KEYVAULT_AUDIT
) \n - BIND (
BIND_DNS
) \n - Blue Coat Proxy (
BLUECOAT_WEBPROXY
) \n - Box (
BOX
) \n - Chrome Management (
N/A
) \n - Cisco AMP (
CISCO_AMP
) \n - Cisco Umbrella DNS (
UMBRELLA_DNS
) \n - Cisco VPN (
CISCO_VPN
) \n - Citrix Netscaler (
CITRIX_NETSCALER
) \n - Cloud Audit Logs (
N/A
) \n - Cloudflare (
CLOUDFLARE
) \n - Cofense (
COFENSE_TRIAGE
) \n - Corelight (
CORELIGHT
) \n - CrowdStrike Falcon (
CS_EDR
) \n - CSV Custom IOC (
CSV_CUSTOM_IOC
) \n - Custom Application Access Logs (
CUSTOM_APPLICATION_ACCESS
) \n - Cybergatekeeper NAC (
CYBERGATEKEEPER_NAC
) \n - Extreme Wireless (
EXTREME_WIRELESS
) \n - F5 ASM (
F5_ASM
) \n - F5 BIGIP LTM (
F5_BIGIP_LTM
) \n - Falco IDS (
FALCO_IDS
) \n - FireEye (
FIREEYE_ALERT
) \n - FireEye ETP (
FIREEYE_ETP
) \n - ForgeRock Identity Cloud (
FORGEROCK_IDENTITY_CLOUD
) \n - FortiGate (
FORTINET_FIREWALL
) \n - GCP_APP_ENGINE (
GCP_APP_ENGINE
) \n - HP Procurve Switch (
HP_PROCURVE
) \n - IAM Context (
N/A
) \n - IBM DB2 (
DB2_DB
) \n - IBM Mainframe Storage (
IBM_MAINFRAME_STORAGE
) \n - IBM Security Access Manager (
IBM_SAM
) \n - Illumio Core (
ILLUMIO_CORE
) \n - Imperva (
IMPERVA_WAF
) \n - Infoblox (
INFOBLOX
) \n - JAMF CMDB (
JAMF
) \n - KerioControl Firewall (
KERIOCONTROL
) \n - Microsoft Azure Activity (
AZURE_ACTIVITY
) \n - Microsoft Azure Resource (
AZURE_RESOURCE_LOGS
) \n - Microsoft Defender For Cloud (
MICROSOFT_DEFENDER_CLOUD_ALERTS
) \n - Microsoft Defender for Endpoint (
MICROSOFT_DEFENDER_ENDPOINT
) \n - Microsoft Exchange (
EXCHANGE_MAIL
) \n - Microsoft Graph Activity Logs (
MICROSOFT_GRAPH_ACTIVITY_LOGS
) \n - Microsoft Graph API Alerts (
MICROSOFT_GRAPH_ALERT
) \n - Microsoft IIS (
IIS
) \n - Microsoft System Center Endpoint Protection (
MICROSOFT_SCEP
) \n - Mobile Endpoint Security (
LOOKOUT_MOBILE_ENDPOINT_SECURITY
) \n - Mongo Database (
MONGO_DB
) \n - Netscout OCI (
NETSCOUT_OCI
) \n - Netskope (
NETSKOPE_ALERT
) \n - Netskope Web Proxy (
NETSKOPE_WEBPROXY
) \n - Network Policy Server (
MICROSOFT_NPS
) \n - Nutanix Prism (
NUTANIX_PRISM
) \n - Office 365 (
OFFICE_365
) \n - Okta (
OKTA
) \n - OpenCanary (
OPENCANARY
) \n - Ordr IoT (
ORDR_IOT
) \n - Palo Alto Cortex XDR Alerts (
CORTEX_XDR
) \n - Palo Alto Networks Firewall (
PAN_FIREWALL
) \n - Palo Alto Prisma Cloud (
PAN_PRISMA_CLOUD
) \n - PerimeterX Bot Protection (
PERIMETERX_BOT_PROTECTION
) \n - Phishlabs (
PHISHLABS
) \n - Proofpoint Sendmail Sentrion (
PROOFPOINT_SENDMAIL_SENTRION
) \n - Pulse Secure (
PULSE_SECURE_VPN
) \n - RH-ISAC (
RH_ISAC_IOC
) \n - SailPoint IAM (
SAILPOINT_IAM
) \n - Salesforce (
SALESFORCE
) \n - Sap Business Technology Platform (
SAP_BTP
) \n - Security Command Center Threat (
N/A
) \n - Sentinelone Alerts (
SENTINELONE_ALERT
) \n - Shibboleth IDP (
SHIBBOLETH_IDP
) \n - Sourcefire (
SOURCEFIRE_IDS
) \n - Splunk Attack Analyzer (
SPLUNK_ATTACK_ANALYZER
) \n - STIX Threat Intelligence (
STIX
) \n - Symantec CloudSOC CASB (
SYMANTEC_CASB
) \n - Symantec DLP (
SYMANTEC_DLP
) \n - Tanium Asset (
TANIUM_ASSET
) \n - Thinkst Canary (
THINKST_CANARY
) \n - Trend Micro Deep Security (
TRENDMICRO_DEEP_SECURITY
) \n - Vectra Detect (
VECTRA_DETECT
) \n - Vectra Stream (
VECTRA_STREAM
) \n - VeridiumID by Veridium (
VERIDIUM_ID
) \n - Wazuh (
WAZUH
) \n - Windows Defender ATP (
WINDOWS_DEFENDER_ATP
) \n - Windows DNS (
WINDOWS_DNS
) \n - Windows Event (
WINEVTLOG
) \n - Windows Event (XML) (
WINEVTLOG_XML
) \n - Windows Local Administrator Password Solution (
MICROSOFT_LAPS
) \n - wiz.io (
WIZ_IO
) \n - Workspace Activities (
WORKSPACE_ACTIVITY
) \n - XAMS by Xiting (
XITING_XAMS
) \n - Zscaler CASB (
ZSCALER_CASB
) \n - Zscaler DLP (
ZSCALER_DLP
) \n - Zscaler Internet Access Audit Logs (
ZSCALER_INTERNET_ACCESS
) \n
The following log types, without a default parser, were added. Each is listed by product name and log_type
value, if applicable.
- \n
- Aruba Switch (
ARUBA_SWITCH
) \n - Azure AD Password Protection (
AZURE_AD_PASSWORD_PROTECTION
) \n - Azure Front Door (
AZURE_FRONT_DOOR
) \n - Babelforce (
BABELFORCE
) \n - Cloudaware (
CLOUDAWARE
) \n - Coalition Control API (
COALITION
) \n - Crowdstrike Identity Protection Services (
CS_IDP
) \n - Cymulate (
CYMULATE
) \n - Dell ECS Enterprise Object Storage (
DELL_ECS
) \n - Google Cloud NGFW Enterprise (
GCP_NGFW_ENTERPRISE
) \n - Google Cloud Secure Web Proxy (
GCP_SWP
) \n - HaveIBeenPwned (
HIBP
) \n - HPE BladeSystem C7000 (
HPE_BLADESYSTEM_C7000
) \n - HP OpenView (
HP_OPENVIEW
) \n - IBM DS8000 Storage (
IBM_DS8000
) \n - IBM-i Operating System (
IBM_I
) \n - Multicom Switch (
MULTICOM_SWITCH
) \n - Nextthink Finder (
NEXTTHINK_FINDER
) \n - Palo Alto Cortex XDR Management Audit (
PAN_XDR_MGMT_AUDIT
) \n - PingIdentity Directory Server Logs (
PING_DIRECTORY
) \n - Prisma SD-WAN (
PRISMA_SD_WAN
) \n - Redhat Jboss (
REDHAT_JBOSS
) \n - SafeBreach (
SAFEBREACH
) \n - Scality Ring Audit (
SCALITY_RING_AUDIT
) \n - Sendsafely (
SENDSAFELY
) \n - Solace Pub Sub Cloud (
SOLACE_AUDIT
) \n - Sonicwall Secure Mobile Access (
SONICWALL_SMA
) \n - Sonrai Enterprise Cloud Security Solution (
SONRAI
) \n - Tenemos Journey Manager System Event Publisher (
TENEMOS_MANAGER_SYSTEMEVENT
) \n - TrueFort Platform (
TRUEFORT
) \n - Ubiquiti Accesspoint (
UBIQUITI_ACCESSPOINT
) \n - WithSecure Cloud Protection (
WITHSECURE_CLOUD
) \n - WithSecure Elements Connector (
WITHSECURE_ELEMENTS
) \n - YAMAHA ROUTER RTX1200 (
YAMAHA_ROUTER
) \n
For a list of supported log types and details about default parser changes, see Supported log types and default parsers.
\nCloud Composer\nIssue
\nIn Airflow 2.6.3 offered in Cloud Composer versions earlier than 2.6.2, task statuses can be deleted as a result of the #31179 Airflow issue. If you use Airflow 2.6.3, we recommend to upgrade to Cloud Composer version 2.6.2 or later where this issue is fixed.
\nCloud Data Fusion\nFixed
\nSalesforce plugin version 1.6.3 is available in Cloud Data Fusion versions 6.8.0 and later. The release includes the following changes:
\n\n- \n
- Fixed an issue in the Salesforce sink plugin causing an unsupported type
datetime
error for DateTime type fields in the input schema. In this version, the Salesforce sink plugin supports datetime and decimal logical types (PLUGIN-1749). \n - Fixed an issue in all Salesforce plugins causing a pipeline to fail when using an OAuth macro because the oAuth macro value didn't get passed to the plugin as intended. In this version, all Salesforce plugins support an OAuth macro (PLUGIN-1767). \n
- At the time of failure on the Salesforce sink side, if the Error handling property is set to the Fail on error option, the Salesforce job is aborted, which stops newer batches from being added to the job due to spark retry settings in CDAP (PLUGIN-1768). \n
- To make debugging easier, additional debug logs and batch results in logs are available. \n
Feature
\nDirect VPC egress now supports Cloud NAT with Public NAT IP addresses (in Preview).
\nCloud SQL for SQL Server\nAnnouncement
\nA new maintenance version rollout is currently underway for all supported SQL Server versions.
\n\nIf you have configured a maintenance window for your instance, then the updates will occur according to the timeframe that you set in the window. Otherwise, the updates will occur within the next few weeks. The new maintenance version is [SQL Server version].R20240216.01_RC00.
\n\nTo learn how to check your maintenance version, see Self-service maintenance. To find your maintenance window or to manage maintenance updates, see Find and set maintenance windows.
\nDataproc\nAnnouncement
\nNew Dataproc on Compute Engine subminor image versions:
\n\n- \n
- 2.0.95-debian10, 2.0.95-rocky8, 2.0.95-ubuntu18 \n
- 2.1.43-debian11, 2.1.43-rocky8, 2.1.43-ubuntu20, 2.1.43-ubuntu20-arm \n
- 2.2.9-debian12, 2.2.9-rocky9, 2.2.9-ubuntu22 \n
Announcement
\nNew Dataproc Serverless for Spark runtime versions:
\n\n- \n
- 1.1.54 \n
- 2.0.62 \n
- 2.1.41 \n
- 2.2.0-RC14 \n
Changed
\nAdded the bigframes
(BigQuery DataFrames) Python package in the Dataproc Serverless for Spark 2.1 runtime.
Changed
\nDesign an optimal storage strategy for your cloud workload: Added guidance about data transfer options.
\nGoogle Distributed Cloud Edge\nAnnouncement
\nThis is a patch release of Google Distributed Cloud Edge (version 1.6.1).
\nFeature
\nThe following new features have been introduced in this release of Distributed Cloud Edge:
\n\n- \n
Multi-rack deployments. Distributed Cloud Edge now supports aggregating the resources of multiple Distributed Cloud Edge Racks into a single zone. You can now create clusters that span nodes across multiple Distributed Cloud Edge Racks. A single multi-rack deployment supports one Distributed Cloud Edge Base Rack and up to 10 Distributed Cloud Edge Standalone Racks. For more information, see How Distributed Cloud Edge works.
\nDistributed Cloud Edge Base Rack. We are now shipping a new form factor of Distributed Cloud Edge Rack hardware, the Distributed Cloud Edge Base Rack. This form factor is a pair of existing Distributed Cloud Edge Standalone Rack hardware with the addition of four network switches that aggregate network traffic from up to 10 Distributed Cloud Edge Standalone Racks.
\nPrometheus integration. You can now use the Prometheus metrics solution to collect Distributed Cloud Edge metrics and workload metrics on local control plane clusters running in survivability mode. For more information, see Collect metrics with Prometheus.
\nNode labels. You can now assign unique labels to individual nodes when creating a node pool. For more information, see Create a node pool.
\n
Changed
\nThe following changes have been introduced in this release of Distributed Cloud Edge:
\n\n- \n
Cloud control plane clusters can no longer be created in subsequent releases of Distributed Cloud Edge. Distributed Cloud Edge version 1.6.1 is the last release of Distributed Cloud Edge in which you can create Cloud control plane clusters. Creation of cloud control plane clusters will be disabled in the next minor release of Distributed Cloud Edge. Existing cloud control plane clusters will continue to run workloads.
\nRelease channel requirement for specifying cluster software versions. If you want to specify a Distributed Cloud Edge software version when creating a cluster, you must now set the cluster's release channel to
NONE
. If you do not specify a release channel or explicitly set it toREGULAR
, the cluster automatically upgrades to the latest version of Distributed Cloud Edge software and specifying a software version is not possible. \n
Issue
\nThis release of Distributed Cloud Edge contains the following known issues:
\n\n- \n
Nodes can get stuck in
Ready,SchedulingDisabled
state after applying configuration changes. Applying or deleting theNodeSystemConfigUpdate
orSriovNetworkNodePolicy
resources can result in a node that's stuck in theReady, Scheduling Disabled
state after it reboots. To resolve this issue, see Troubleshoot Distributed Cloud Edge. \nDeleting clusters and node pools fails when a node is not ready. If a node in a cluster or node pool that you want to delete is in the
NotReady
state, the deletion can fail. Contact Google Support to remedy this condition. \nNodes using Symcloud Storage report the file system as read-only after reboot. When multiple nodes that use Symcloud Storage reboot at once in a cluster, they can incorrectly mark the file system as read-only. Contact Google Support to remedy this condition.
\n
Announcement
\nGoogle Distributed Cloud Edge management software has been updated.
\nGoogle Kubernetes Engine\nFixed
\nA previous version of the GKE logging agent that rolled out in GKE version 1.28.7-gke.1100000 contained a security vulnerability. This version has been immediately removed.
\nVPC Service Controls\nFeature
\nPreview stage support for the following integration:
\n\n- \n
- API keys \n
"author"=>nil,
"link"=>"https://cloud.google.com/release-notes#March_14_2024",
"published_date"=>Thu, 14 Mar 2024 07:00:00.000000000 UTC +00:00,
"image_url"=>nil,
"feed_url"=>"https://cloud.google.com/release-notes#March_14_2024",
"language"=>nil,
"active"=>true,
"ricc_source"=>"feedjira::v1",
"created_at"=>Sun, 31 Mar 2024 21:42:30.306193000 UTC +00:00,
"updated_at"=>Mon, 13 May 2024 18:39:50.683606000 UTC +00:00,
"newspaper"=>"GCP latest releases",
"macro_region"=>"Technology"}