Skip to content

Upgrading the Docker NGINX- or Envoy-based image

These instructions describe the steps to upgrade the running Docker NGINX- or Envoy-based image 4.x to the version 4.10.

Using credentials of already existing Wallarm node

We do not recommend using the already existing Wallarm node of the previous version. Please follow these instructions to create a new filtering node of the version 4.10 and deploy it as the Docker container.

To upgrade the end‑of‑life node (3.6 or lower), please use the different instructions.


  • Docker installed on your host system

  • Access to to download the Docker image. Please ensure the access is not blocked by a firewall

  • Access to the account with the Administrator role in Wallarm Console in the US Cloud or EU Cloud

  • Access to if working with US Wallarm Cloud or to if working with EU Wallarm Cloud. Please ensure the access is not blocked by a firewall

  • Access to the IP addresses below for downloading updates to attack detection rules and API specifications, as well as retrieving precise IPs for your allowlisted, denylisted, or graylisted countries, regions, or data centers

Step 1: Download the updated filtering node image

docker pull wallarm/node:4.10.9-1
docker pull wallarm/envoy:4.8.0-1

Step 2: Review recent architectural updates (for NGINX-based Docker image)

The latest update has introduced architectural changes that may impact users, especially those mounting custom configuration files during container initiation due to alterations in the paths of certain files. Please familiarize yourself with these changes to ensure proper configuration and usage of the new image.

Step 3: Stop the running container


Step 4: Run the container using the new image

  1. Proceed to Wallarm Console → Nodes and create Wallarm node.

    Creation of a Wallarm node

  2. Copy the generated token.

  3. Run the updated image using the copied token and making necessary adjustments to the paths for the mounted files if required by the recent changes to the image.

    There are two options for running the container using the updated image:

Step 5: Test the filtering node operation

  1. Send the request with test Path Traversal attack to a protected resource address:

    curl http://localhost/etc/passwd
  2. Open Wallarm Console → Attacks section in the US Cloud or EU Cloud and make sure the attack is displayed in the list.
    Attacks in the interface

Step 6: Delete the filtering node of the previous version

If the deployed image of the version 4.10 operates correctly, you can delete the filtering node of the previous version in Wallarm Console → Nodes.