You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Release-Note-Summary: New action for L7 DDoS auto mitigation
32
+
33
+
34
+
Release-Note-Detail: L7 DDoS now supports JavaScript Challenge as one of the mitigation options in addition to blocking. This option provides flexibility for customers, to choose an action of their choice to mitigate volumetric DDoS attacks
35
+
36
+
37
+
#### Description
38
+
Today DoS mitigation object can only block suspicious sources. We should add support for additional actions:
39
+
40
+
41
+
- JS Challenge
42
+
- Captcha
43
+
- Allow (for internal use to cover allow few deny all use case)
44
+
45
+
46
+
Phase 1:
47
+
48
+
49
+
JS Challenge
50
+
51
+
52
+
- Schema
53
+
1. Update EnableDDoSDetectionSetting configuration to support Action property. Two supported actions in this phase will be Blocked (default) and JS Challenge.
54
+
2. Add JSChallenge action to L7AclAction enum.
55
+
3. Hide Cookie Expiration property as from now on we plan to use Session cookie for JS Challenge.
56
+
57
+
58
+
- Akar:
59
+
1. If JS Challenge action is selected
60
+
- Never create FastAcl even if we block by IP.
61
+
- Create L7Acl rule with JS Challenge action.
62
+
- Update JS Challenge configuration on vhost level.
63
+
64
+
65
+
- Hello
66
+
1. Propagate JS Challenge configuration from vhost to Depot
| ~""feature-status::ready-to-ship"" | Indicates Feature ready from software perspective and Solution Engg, and Tech Writers team working on finalizing the things |
97
+
| Closed | Indicates Feature Shipped |
98
+
99
+
100
+
</details>
101
+
102
+
103
+
_____________________________
104
+
105
+
106
+
##### End to End Feature Owner - @user2
107
+
108
+
109
+
110
+
111
+
#### Release Notes Info
112
+
Release-Note-Summary: Introducing Detailed Events in the Synthetic Monitoring Service.
113
+
114
+
115
+
Release-Note-Detail: Users can triage issues faster and dive deeper into critical events with `Detailed Events` in synthetic HTTP and DNS monitors in the `Events` table.
116
+
117
+
118
+
119
+
120
+
#### TOI/Wiki
121
+
* Provide the links to TOI/Wiki here
122
+
123
+
124
+
125
+
126
+
127
+
#### Demo Recordings
128
+
* Provide the link(s) here
129
+
130
+
131
+
_____________________________
132
+
133
+
134
+
## Description
135
+
Synthetic monitoring customers want the ability to the view the verbose output/response of the synthetic monitor checks they are running against their endpoints to understand what issues and outages their end users are facing when using their applications.
136
+
137
+
138
+
This would be a minor enhancement to the existing events design that exists in the service today.
139
+
140
+
141
+
_____________________________
142
+
143
+
144
+
## Tasks
145
+
Format:
146
+
147
+
148
+
Status ==> ~""status::todo"" (or) ~""status::doing"" (or) ~""status::fixed"" (or) ~""status::blocked""
149
+
150
+
151
+
""Due Date"" ==> DD-MON-YYYY
152
+
153
+
154
+
#### Design
155
+
Some areas may be NA for some features. Feature owner to add feature specific areas, if any.
156
+
157
+
158
+
| Type | Summary | Owner(s) | Approver(s) | Document Link |
| Security Review | Security Review of the Architecture/Design before Implementation begins | | Security Architecture Team | [Please open a Security Review ticket](https://gitlab.com/nextgen/nextgen.io/secops/-/issues/new?issuable_template=security_review_request#) |
168
+
169
+
170
+
171
+
#### Implementation
172
+
173
+
174
+
| Type / Component | Summary | Owner(s) | Due Date | Status | Comments |
| Security Review | Security Review after code complete | | Security Architecture Team | | Please update the Security Review ticket
181
+
182
+
183
+
184
+
185
+
_____________________________
186
+
187
+
188
+
189
+
190
+
CC: @dev1 @dev2 @dev3
191
+
192
+
193
+
**DO NOT EDIT THE SECTIONS BELOW.**
194
+
195
+
196
+
---
197
+
198
+
199
+
### Request for Security Review
200
+
201
+
202
+
- [ ] Security Reivew of Architecture complete @smith.joan
203
+
- [ ] Security Review after Code Complete @smith.joan
204
+
205
+
206
+
### Security Review Status
207
+
208
+
209
+
- [ ] Reviewed and Approved Architecture
210
+
- [ ] Reviewed and Approved Architecture with Conditions
211
+
- [ ] Reviewed and Approved Code Complete
212
+
- [ ] Reviewed and Approved Code Complete with Conditions
213
+
- [ ] Request for more Information","Eng-QTR::CY24Q1,Jan-16-2024-Release,Release-Note-Required::Feature,gov/service-onboarding,pm-area/next-genxc-beacon,specifications"
214
+
"#### Release Notes Info
215
+
-----------
216
+
Release-Note-Summary: Fixed Access Issues for Tenants with Tenant Access Policy set
217
+
218
+
219
+
Release-Note-Detail: Resolved issue with Incorrect client IP extraction resulting in failure of Tenant access.
220
+
221
+
222
+
-----------
223
+
224
+
225
+
- **Environment:** prod
226
+
- **Tenant:**
227
+
- **Namespace:**
228
+
- **Site:**
229
+
- **Site Software Version:**
230
+
- **Time of problem:**
231
+
- **Relevant Objects:**
232
+
233
+
234
+
---
235
+
236
+
237
+
**Detailed Description/Screenshots:**
238
+
239
+
240
+
During production Sep-12 upgrade window, we switched traffic from rainbow to rainbowprime. After that BigCo start to see 403 on their tenant access.
We have added custom CNAME for those tenant below to switch their traffic back to rainbow, after that BigCo confirmed it is working fine.
253
+
254
+
255
+
```plaintext
256
+
257
+
258
+
prd-tenant.console.ves
259
+
dev-tenant.console.ves
260
+
dev-uci.console.ves
261
+
prd-uci.console.ves
262
+
aoins.console.ves
263
+
blueshore.console.ves
264
+
fnni.console.ves
265
+
next-genxc-ops.console.ves
266
+
next-genxc-ops-stg.console.ves
267
+
next-gen-silverline.console.ves
268
+
```
269
+
270
+
271
+
Please check how tenant access policy will work under rainbowprime
272
+
273
+
274
+
\#### Release Notes Info
275
+
276
+
277
+
Release-Note-Summary: Start to support tenant access policy on new console endpoint
278
+
279
+
280
+
Release-Note-Detail: In Sep release we switched NextGenXC console to a new endpoint, since tenant access policy is not supported, some customer are staying on the old endpoint. From this release new console endpoint start to support tenant access policy.","2024-Jan,Eng-QTR::CY24Q1,Hardening,Jan-16-2024-Release,READY-FOR-TEST,Release-Note-Required::Issue-GC-RE,area/eng/be/saas,customer::bigco,env::prod,feature-status::in-test,pm-area/next-genxc-platform,priority::high,product/owner/saas::joan-smith,technical"
281
+
"Row 41 in https://next-gen.sharepoint.com/:x:/r/sites/NextGenXC/_layouts/15/Doc.aspx?sourcedoc=%7BF329AB0E-4FSF-5420-9AZE-04BF6FA2C51%7D&file=XC%20Issues%20BigCo%20Master%20Tracker%20v1.0.xlsx&action=default&mobileredirect=true
282
+
283
+
284
+
Node software Changelog include OS version updates and a brief reason for the version bump to help educate customers inform on their version upgrade decision planning.","2024-Jan,Eng-QTR::CY24Q1,Hardening,Jan-16-2024-Release,Release-Note-Required::NO,area/eng/sre,ce-process,customer::bigco,feature-status::in-engg-backlog,pm-area/next-genxc-platform,priority::high,product/owner/saas::joan-smith,program/ce-stability"
285
+
"env: Demo1
286
+
287
+
288
+
The change made to replace padding with grid gap seems to have caused issues in dashboard report emails
0 commit comments