Skip to content

Controller / UI Release: 23.09 - September 30, 2023

Features

  • Cloud Provider
    • Additional Region support in OCI
  • Policy
    • ICMP Forwarding policy in GCP
  • Usability
    • Pagination across all Objects and Profiles
    • Azure Resource Group creation in Service VPC (VNet) workflow
  • Integrations
    • Audit and System Log alerting to Splunk and MS Teams
    • Gateway metrics forwarding to Datadog
  • Miscellaneous
    • Performance improvements
    • Operational improvements
    • Bug fixes and stability improvements

Enhancements

  • Enhancement: Adds support for additional Regions in OCI: Amsterdam, Germany, London, France (Paris, Marseille)
  • Enhancement: Adds support for changing the default OCI Region. This is the region that is used by the Controller to initially communicate with OCI. The current defined default OCI Region is San Jose, but this can now be changed to any supported Region. Please contact Valtix Support to request this to be changed.
  • Enhancement: Provides a Clear button to Traffic Summary Logs and Security Events page to clear out the search and perform a full refresh of the Logs/Events
  • Enhancement: Adds support for ICMP-based Forwarding policy for Egress/East-West Gateways deployed in GCP=
  • Enhancement: Adds support for pagination across all Objects and Profiles
  • Enhancement: Adds support for sending Audit and System Logs to Splunk. This introduces an update to the Alert Profile by adding Splunk as a new destination.
  • Enhancement: Adds support for sending Audit and System Logs to Microsoft Teams. This introduces an update to the Alert Profile by adding MicrosoftTeams as a new destination.
  • Enhancement: Adds support for sending Gateway metrics to 3rd-party SIEMs. This introduces a new Metrics Forwarding Profile that can be configured and assigned to Gateways in order for Gateway metrics to be sent to the SIEM. The first implementation supports Datadog as a SIEM. Support for other SIEMs will follow in future releases.
  • Enhancement: Adds support for creating an Azure Resource Group (RG) as part of the Service VPC (VNet) creation. The RG is required such that all resources orchestrated by the Controller will be associated within the specified (or newly created) RG.

Fixes

  • Fix: Fixes an issue where changing a Gateway setting that would be applied immediately could trigger an unnecessary blue/green Gateway replacement due to a perceived change to use public IPs setting
  • Fix: Fixes an issue where attempting to change a Gateway in AWS from an invalid cross-account CMEK to a valid same-account CMEK would fail
  • Fix: Fixes various issues with the time range selector in Investigate views when viewing Traffic Summary Logs, Security Events, System Logs and Audit Logs
  • Fix: Fixes an issue where active links from Policy Rule Set to Gateway page to various resource pages associated with the Policy Rule Set were not working properly
  • Fix: Fixes an issue with Terraform Export for Valtix Alert Rule Profile was not exporting the severity argument
  • Fix: Updates the default instance type for an Azure Gateway to be AZURE_D2S_V5
  • Fix: Fixes various workflow issues when configuring security and non-secure proxies. These fixes require the user to explicitly specify the desired ports rather than the solution automatically selecting common ports.
  • Fix: Fixes an issue to improve the workflow for proxy configuration by validating that a Decryption Profile is specified when a user configures a security proxy. The Decryption Profile is required for the Gateway to issue the proper certificate.
  • Fix: Fixes an issue where a JSON error message would occur when creating a Gateway using the UI workflow
  • Fix: Fixes various UI-related behaviors to improve usability
  • Fix: Fixes an issue where a Gateway deployment would take longer than expected
  • Fix: Fixes a corner case where the Controller could instantiate more Gateway instances than necessary based on the user configuration for min/max instances setting
  • Fix: Changes the System Log message severity for disable Gateway action from High to Info
  • Fix: Fixes an issue where deploying Gateways in Azure without public IPs would fail
  • Fix: Enhances various error messages for clarity and to reduce ambiguity