Recommendations for a safe node upgrade process¶
This document describes recommendations and associated risks for a safe update of Wallarm filtering node up to 2.18.
Carefully plan and monitor the filtering node update process. Estimated release dates for new versions of Wallarm nodes are published in the Wallarm node versioning policy.
If your infrastructure has multiple Wallarm nodes installed, update them gradually. After updating the first node, monitor the node modules operation within a day and gradually update other Wallarm nodes if the first node operates correctly.
For the model with separated development and production environments, update the filtering node gradually. First, apply and test new version in non-production environments, then in production environments. Detailed recommendations are described in the instructions for configuring Wallarm nodes for separated environments.
Before updating the filtering node, set the node filtration mode to
monitoring. If all modules work correctly and there is no abnormal number of new false positives in the
monitoringmode for a day, then put the filtering node in the
Update NGINX to the latest version available before applying Wallarm node updates. If your infrastructure needs to use a specific version of NGINX, please contact the Wallarm technical support to build the API Security module for a custom version of NGINX.
Below are the risks that may occur when updating the filtering node. To reduce the impact of the risks, please follow the appropriate guidelines when updating.
A new minor version of the filtering node may contain the following changes:
Support for new installation options
Dropped support for unclaimed installation options
New filtering node featuress
Optimization of work of the filtering node
The configuration of the previous version is automatically applied to the new version and does not require additional changes. When updating the cloud image, you should manually transfer the configuration files to the new version. Most of the new features are configured via the directives in configuration files.
Before upgrading, please check the set of changes and consider a possible configuration change when planning the upgrade.
Set of changes in Wallarm node 2.18
Changes in supported installation platforms
- Added Ubuntu 20.04 LTS (focal) support
New filtering node featuress
- New variable
wallarm_attack_type_listin the extended Wallarm node logging format. Attack types detected in the request are saved in this variable in text format.
[More details on the variable
- New method for setting up the blocking page and error code returned in the response to the blocked request. Now, to return different responses to requests originated from different devices and applications, you can use the variable as the value of the directives
[Detailed instructions on setting up the response via the variable →]
- New filtering node statistics parameter
startid. This parameter stores the randomly-generated unique ID of the filtering node.
[The full list of available statistics parameters →]
- Support of new Wallarm Ingress controller annotation
nginx.ingress.kubernetes.io/wallarm-acl-block-page. This annotation is used to set up the response to the request originated from a blocked IP address.
[Example of response configuration via
- Decreased memory amount allocated for the postanalytics service in deployed Wallarm node cloud image by default.
In previous Wallarm node versions, the default memory amount allocated for Tarantool was 75% of the total instance memory. In the filtering node version 2.18, 40% of the total instance memory is allocated for Tarantool.
New false positives¶
We improve the traffic analysis with each new version of the filtering node. This means that the number of false positives decreases with each new version. However, each protected application has its own specificities, so we recommend analyzing the work of the new version of the filtering node in the
monitoring mode before enabling the blocking mode (
To analyze the number of new false positives after the update:
Deploy the new version of the filtering node in the
monitoringmode and send the traffic to the filtering node.
After some time, open the Wallarm Console → Events section and analyze the number of requests that are mistakenly recognized as attacks.
If you find abnormal growth in the number of false positives, please contact the Wallarm technical support.
Increased amount of used resources¶
Usage of some new filtering node features may cause changes in the amount of used resources. Information about changes in the amount of used resources is highlighted in the What is new section.
Also, it is recommended to monitor the filtering node operation: if you find significant differences in the actual amount of used resources and in the amount specified in the documentation, please contact the Wallarm technical support.
The Wallarm node update process depends on the platform and installation forms. Please select the installation form and follow the appropriate instructions: