Release 6.3.44 is being rolled out to the first phase of regions as listed here.
Bug ID | Description |
---|---|
391140293 | Resolved scaling issue resulting in 503 errors Added |
N/A | Updates to security infrastructure and libraries. |
Bug ID | Description |
---|---|
399447688 | API proxy deployment could become stuck in PROGRESSING state. |
396571537 | Rotating Cassandra credentials in Kubernetes secrets fixed for Multi-region deployments. |
368155212 | Auto Cassandra secret rotation could fail when Enhanced per-environment proxy limits are enabled. |
384937220 | Fixed ApigeeRoute name collision on internal chaining gateway for Enhanced Proxy Limits. |
412324617 | Fixed issue where Runtime container could spin at 100% cpu limit. |
Improvements to the PublishMessage policy
The PublishMessage policy now supports two new elements:
The <UseMessageAsSource> element uses request or response message content as the source of data to be written to Pub/Sub. For more information, see <UseMessageAsSource>.
The <Attributes> element lets you specify string attributes (key/value pairs) to include with the request or response message that is written to Pub/Sub. For more information, see <Attributes>.
On May 2, 2025, we released an updated version of Apigee (1-15-0-apigee-3).
Starting with v1.14.2, third-party container images will be labeled with a version tag that matches the Apigee hybrid image tag. This affects the image tags returned by the apigee-pull-push
command line tool. For more information, see:
On May 2, 2025 we released an updated version of the Apigee hybrid software, 1.14.2.
Bug ID | Description |
---|---|
391923260 | Security fixes for apigee-udca . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-fluent-bit . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-hybrid-cassandra . This addresses the following vulnerability: |
N/A | Security fixes for apigee-hybrid-cassandra-client . This addresses the following vulnerability: |
N/A | Security fixes for apigee-mint-task-scheduler . This addresses the following vulnerability: |
N/A | Security fixes for apigee-open-telemetry-collector . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-operators . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-prometheus-adapter . This addresses the following vulnerability: |
N/A | Security fixes for apigee-redis . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-stackdriver-logging-agent . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-watcher . This addresses the following vulnerabilities: |
Auto extraction of JSON logs
Google SecOps supports Auto Extraction of JSON logs. The auto extraction feature lets you use raw log fields directly in search, detection rules, and Native Dashboards, with or without a parser. Public preview for this feature begins the week of May 5, 2025.
Google Cloud コンソールで、www.gstatic.com から JavaScript ソースを読み込めませんでした。
考えられる理由: