From 90bd098a1c2d8106dbb55b01ed9954ae27578025 Mon Sep 17 00:00:00 2001 From: smitapaloalto <156162707+smitapaloalto@users.noreply.github.com> Date: Thu, 21 Nov 2024 11:27:27 +0530 Subject: [PATCH 1/7] Pascal-update2-RN-changes-part1 --- .../release-notes-33-02.adoc | 101 ++++++++++++++++++ 1 file changed, 101 insertions(+) create mode 100644 docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc diff --git a/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc new file mode 100644 index 0000000000..1e865da08b --- /dev/null +++ b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc @@ -0,0 +1,101 @@ +:toc: macro +== 33.01 Release Notes + +The following table outlines the release particulars: + +[cols="1,4"] +|=== +|Build +|TBD + +|Code name +|Pascal Update 2 + +|Release date +|Nov 24, 2024 + +|Type +|Minor release + +|SHA-256 +|TBD +|=== + +Review the https://docs.prismacloud.io/en/compute-edition/33/admin-guide/install/system-requirements[system requirements] to learn about the supported operating systems, hypervisors, runtimes, tools, and orchestrators. + +// You can download the release image from the Palo Alto Networks Customer Support Portal, or use a program or script (such as curl, wget) to download the release image directly from our CDN: + +// https://cdn.twistlock.com/releases/orvGojie/prisma_cloud_compute_edition_33_00_169.tar.gz[https://cdn.twistlock.com/releases/orvGojie/prisma_cloud_compute_edition_33_00_169.tar.gz] + +toc::[] + +=== Lifecycle Support Update + +Prisma Cloud officially guarantees backward compatibility with up to two previous major versions (n-2). + +Although the support lifecycle remains unchanged, starting from version 33.xx, Prisma Cloud will not restrict the usage of Defender versions or REST API calls from up to three major releases before the current version (upto n-3 major releases). + +For example, with the current version at 33.xx, API calls and Defenders from version 30.xx will be allowed. However, support and complete backward compatibility is guaranteed for the 32.xx and 31.xx releases. + +[#upgrade] +=== Upgrade from Previous Releases + +[#upgrade-defender] +==== Upgrade Defenders + +Starting with the `v33.00` release, the https://docs.prismacloud.io/en/compute-edition/33/admin-guide/upgrade/support-lifecycle[Defender versions supported (n, n-1, and n-2)] are `v33.00`, `v32.00`, and `v31.00` respectively. In addition, starting from release 33.00, Prisma Cloud will not restrict the usage of Defender versions or REST API calls from the n-3 version. So the current release will allow Defenders and REST API calls from release 30.xx also. Failure to upgrade Defenders below version `v30.00`, such as `v22.12`, will result in disconnection of the Defenders from the Console. + +However, to maintain full support, you must upgrade your Defenders to `v31.xx` or a higher release. + +To summarize, the level of support for the different versions of Defenders is as follows: + +* Defender versions 33.xx, 32.xx, and 31.xx have full support +* Defender versions 30.xx are functional (will be able to connect to version 33.xx Console) but support is not available for such Defenders +* Defender versions previous to 30.xx, such as 22.12, are neither supported nor functional (cannot connect to version 33.xx Console) + + +[#upgrade-console] +==== Upgrade the Prisma Cloud Console + +Starting with the `v33.00` release, the https://docs.prismacloud.io/en/compute-edition/33/admin-guide/upgrade/support-lifecycle[supported Console versions (n, n-1, and n-2)] are `v33.00`, `v32.00`, and `v31.00` respectively. + +NOTE: Defenders from the n-3 release will remain functional as described above. + +You can upgrade the Prisma Cloud console directly from any n-1 version to n. For example, with `v33.00` as n and `v32.00` as n-1, you can upgrade directly from `v32.05.124` to `v33.01.137`. + +NOTE: You have to upgrade any version of `v31.00` to `v32.00` before upgrading to `v33.00`. For example, you must upgrade from `v31.02.137` to `v32.07.123` before you upgrade to `v33.01.137`. + + +//[#cve-coverage-update] +//=== CVE Coverage Update + +[#enhancements] +=== Enhancements + + +//[#new-features-agentless-security] +// === New Features in Agentless Security + +// [#new-features-core] +// === New Features in Core + +// [#new-features-host-security] +// === New Features in Host Security + +// [#new-features-serverless] +// === New Features in Serverless + +// [#new-features-waas] +// === New Features in WAAS + +// [#api-changes] +// === API Changes and New APIs + + +// [#addressed-issues] +// === Addressed Issues + + +// [#deprecation-notices] +// === Deprecation Notices + From 220c0057f48afcb282b0c22a0c3acae2994382ae Mon Sep 17 00:00:00 2001 From: smitapaloalto <156162707+smitapaloalto@users.noreply.github.com> Date: Thu, 21 Nov 2024 11:32:08 +0530 Subject: [PATCH 2/7] Pascal-update2-RN-changes-part2 --- docs/en/compute-edition/33/rn/book.yml | 2 ++ docs/en/compute-edition/33/rn/book_point_release.yml | 6 +++--- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/docs/en/compute-edition/33/rn/book.yml b/docs/en/compute-edition/33/rn/book.yml index c907bc5f73..d37326b011 100644 --- a/docs/en/compute-edition/33/rn/book.yml +++ b/docs/en/compute-edition/33/rn/book.yml @@ -18,6 +18,8 @@ dir: release-information topics: - name: Prisma(TM) Cloud Compute Edition Release Information file: release-information.adoc + - name: 33.02 (Build 33.02.130) + file: release-notes-33-02.adoc - name: 33.01 (Build 33.01.137) file: release-notes-33-01.adoc - name: 33.00 (Build 33.00.169) diff --git a/docs/en/compute-edition/33/rn/book_point_release.yml b/docs/en/compute-edition/33/rn/book_point_release.yml index 621c90ec17..8bab5af687 100644 --- a/docs/en/compute-edition/33/rn/book_point_release.yml +++ b/docs/en/compute-edition/33/rn/book_point_release.yml @@ -2,7 +2,7 @@ kind: book title: Prisma Cloud Compute Edition Release Notes author: Prisma Cloud team -version: 33.01 +version: 33.02 ditamap: prisma-cloud-compute-edition-release-notes dita: techdocs/en_US/dita/prisma/prisma-cloud/33/prisma-cloud-compute-edition-release-notes --- @@ -12,8 +12,8 @@ dir: release-information topics: - name: Prisma(TM) Cloud Compute Edition Release Information file: release-information.adoc - - name: 33.01 (Build 33.01.TBD) - file: release-notes-33-01.adoc + - name: 33.02 (Build 33.02.130) + file: release-notes-33-02.adoc --- kind: chapter name: Get Help From 83f13bd8fb5a86d40bbb349d4292b258198ffcc1 Mon Sep 17 00:00:00 2001 From: Kamesh-PaloAlto <166385805+Kamesh-PaloAlto@users.noreply.github.com> Date: Thu, 21 Nov 2024 12:24:07 +0530 Subject: [PATCH 3/7] added enhancement & fixed issues sections --- .../release-information/known-issues-33.adoc | 10 ++ .../release-notes-33-02.adoc | 25 +++- .../rn/known-issues/known-fixed-issues.adoc | 11 ++ .../look-ahead-secure-the-runtime.adoc | 123 +++++++++--------- .../features-introduced-in-november-2024.adoc | 81 +++++++++++- 5 files changed, 186 insertions(+), 64 deletions(-) diff --git a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc index d64df08629..7d59bf975e 100644 --- a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc +++ b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc @@ -9,6 +9,16 @@ The following table lists the fixed issues for 33.xx releases. |*ISSUE ID* |*DESCRIPTION* +|*CWP-62296* + +tt:[Fixed in 33.02.130] + +| *Consistent Vulnerability Data for Red Hat-Sourced Packages* + +Certain vulnerabilities for Red Hat packages showed a Red Hat severity but CVSS scores from NVD. + +This mismatch is now resolved. The fix ensures that both the severity and CVSS score now align with Red Hat's data, eliminating inconsistencies. + |*CWP-62084* tt:[Fixed in 33.01.137] diff --git a/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc index 1e865da08b..bcd0e697e9 100644 --- a/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc +++ b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc @@ -6,7 +6,7 @@ The following table outlines the release particulars: [cols="1,4"] |=== |Build -|TBD +|33.02.130 |Code name |Pascal Update 2 @@ -18,7 +18,7 @@ The following table outlines the release particulars: |Minor release |SHA-256 -|TBD +|df7f48a231c7bea408cd6d5babd6bcf4b9e46a2159fd20a7baadb56849cd4657 |=== Review the https://docs.prismacloud.io/en/compute-edition/33/admin-guide/install/system-requirements[system requirements] to learn about the supported operating systems, hypervisors, runtimes, tools, and orchestrators. @@ -72,6 +72,27 @@ NOTE: You have to upgrade any version of `v31.00` to `v32.00` before upgrading t [#enhancements] === Enhancements +//CWP-32911 +==== Scanning Support for Red Hat UBI Micro-images + +Prisma Cloud now supports scanning of Red Hat UBI micro-images (versions 7, 8, and 9). + +//CWP-61504 +==== Improved Vulnerability Detection for non-RPM OpenShift Packages + +Vulnerability reports for OpenShift non-RPM container components now ensure consistent vulnerability matching across all OpenShift packages. This improvement reduces false positives by applying only relevant CVEs and excluding CVEs that have already been patched. + +//CWP-61508 +==== Improved Vulnerability Detection for Google Kubernetes Engine (GKE) Clusters + +Vulnerability detection for Google Kubernetes Engine (GKE) Clusters includes the following enhancements: + +* Integration with Google security bulletins + +* Aligning CVEs with specific GKE cluster types and versions + +* Expanded support for all GKE modes, including Autopilot + //[#new-features-agentless-security] // === New Features in Agentless Security diff --git a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc index 14d1ee01bb..21cb3a7c37 100644 --- a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc +++ b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc @@ -411,6 +411,17 @@ CVE-2024-3154 - Arbitrary Systemd Property Injection as Defender does not direct |*ISSUE ID* |*DESCRIPTION* +|*CWP-62296* + +tt:[Fixed in 33.02.130] + +| *Consistent Vulnerability Data for Red Hat-Sourced Packages* + +Certain vulnerabilities for Red Hat packages showed a Red Hat severity but CVSS scores from NVD. + +This mismatch is now resolved. The fix ensures that both the severity and CVSS score now align with Red Hat's data, eliminating inconsistencies. + + |*RLP-151431* tt:[Fixed in 24.11.1] diff --git a/docs/en/enterprise-edition/rn/look-ahead-planned-updates-prisma-cloud/look-ahead-secure-the-runtime.adoc b/docs/en/enterprise-edition/rn/look-ahead-planned-updates-prisma-cloud/look-ahead-secure-the-runtime.adoc index f7ca40b4c4..9b5216d66f 100644 --- a/docs/en/enterprise-edition/rn/look-ahead-planned-updates-prisma-cloud/look-ahead-secure-the-runtime.adoc +++ b/docs/en/enterprise-edition/rn/look-ahead-planned-updates-prisma-cloud/look-ahead-secure-the-runtime.adoc @@ -1,14 +1,16 @@ == Look Ahead—Planned Updates to Secure the Runtime -The following sections provide a preview of the planned updates for the `v33.02` release of Runtime Security. +Currently, there are no previews or announcements for updates. -*NOTE*: +//The following sections provide a preview of the planned updates for the `v33.02` release of Runtime Security. -The details and functionality listed below provide a preview of what is planned for the `v33.02` release. Both the updates and the actual release date are subject to change. +//*NOTE*: -*<> +//The details and functionality listed below provide a preview of what is planned for the `v33.02` release. Both the updates and the actual release date are subject to change. -*<> +//*<> + +//*<> //* <> //* <> @@ -18,75 +20,74 @@ The details and functionality listed below provide a preview of what is planned //* <> //* <> -=== Announcement +//=== Announcement //CWP-61660 //CWP-62319 -Prisma Cloud plans to use the following additional NAT IP addresses on the Google Cloud for the respective Prisma Cloud Enterprise Edition (SaaS) regions. - -The following table lists the regions and the additional reserved Ingress IP addresses. - -[cols="50%a,50%a"] -|=== -| *Region* | *Additional Ingress IP Addresses* - -| us-east1 | * 34.23.229.147 -* 34.74.93.165 -* 35.185.127.202 -| us-west1 | * 34.19.57.46 -* 34.83.186.93 -* 34.168.3.165 -| northamerica-northeast1 | * 34.118.176.160 -* 34.47.2.35 -| europe-west9 | * 34.163.241.103 -* 34.163.12.56 -| europe-west3 | * 35.198.174.6 -* 34.141.93.246 -* 34.141.89.174 -* 34.141.2.56 -* 35.198.185.51 -| europe-west2 | * 34.142.29.59 -* 34.89.33.47 -| australia-southeast1 | * 34.116.88.189 -* 35.189.14.189 -| asia-southeast1 | * 35.186.153.185 -* 34.87.100.14 -| asia-south1 | * 34.93.124.157 -* 34.47.154.73 -| asia-northeast1 | * 35.187.195.198 -* 34.85.99.145 -|=== -*NOTE*: - -No changes have been made at this time. These additional IP addresses will be activated with the upcoming release. - - -=== Enhancements -The following enhancements are planned. Detailed information will be available at release. - -[cols="50%a,50%a"] -|=== -| *Feature* | *Description* +//Prisma Cloud plans to use the following additional NAT IP addresses on the Google Cloud for the respective Prisma Cloud Enterprise Edition (SaaS) regions. + +//The following table lists the regions and the additional reserved Ingress IP addresses. + +//[cols="50%a,50%a"] +//|=== +//| *Region* | *Additional Ingress IP Addresses* + +//| us-east1 | * 34.23.229.147 +//* 34.74.93.165 +//* 35.185.127.202 +//| us-west1 | * 34.19.57.46 +//* 34.83.186.93 +//* 34.168.3.165 +//| northamerica-northeast1 | * 34.118.176.160 +//* 34.47.2.35 +//| europe-west9 | * 34.163.241.103 +//* 34.163.12.56 +//| europe-west3 | * 35.198.174.6 +//* 34.141.93.246 +//* 34.141.89.174 +//* 34.141.2.56 +//* 35.198.185.51 +//| europe-west2 | * 34.142.29.59 +//* 34.89.33.47 +//| australia-southeast1 | * 34.116.88.189 +//* 35.189.14.189 +//| asia-southeast1 | * 35.186.153.185 +//* 34.87.100.14 +//| asia-south1 | * 34.93.124.157 +//* 34.47.154.73 +//| asia-northeast1 | * 35.187.195.198 +//* 34.85.99.145 +//|=== +//*NOTE*: + +//No changes have been made at this time. These additional IP addresses will be activated with the upcoming release. + + +//=== Enhancements +//The following enhancements are planned. Detailed information will be available at release. + +//[cols="50%a,50%a"] +//|=== +//| *Feature* | *Description* //CWP-32911 // |Scanning Support for Red Hat UBI Micro-images // |In the upcoming release, Prisma Cloud will introduce support for scanning of Red Hat UBI micro-images (versions 7, 8, and 9). -|Improved Vulnerability Detection for non-RPM OpenShift Packages +//|Improved Vulnerability Detection for non-RPM OpenShift Packages //CWP-61504 -|In the upcoming release, vulnerability reporting for OpenShift non-RPM container components will be enhanced to ensure consistent vulnerability matching across all OpenShift packages. +//|In the upcoming release, vulnerability reporting for OpenShift non-RPM container components will be enhanced to ensure consistent vulnerability matching across all OpenShift packages. -This improvement will reduce false positives by applying only relevant CVEs and excluding CVEs that have already been patched. +//This improvement will reduce false positives by applying only relevant CVEs and excluding CVEs that have already been patched. //CWP-61508 -|Improved Vulnerability Detection for Google Kubernetes Engine (GKE) Clusters +//|Improved Vulnerability Detection for Google Kubernetes Engine (GKE) Clusters -|In the upcoming release, vulnerability detection for Google Kubernetes Engine (GKE) Clusters -will include the following enhancements: +//|In the upcoming release, vulnerability detection for Google Kubernetes Engine (GKE) Clusters will include the following enhancements: -* Integration with Google security bulletins +//* Integration with Google security bulletins -* Aligning CVEs with specific GKE cluster types and versions +//* Aligning CVEs with specific GKE cluster types and versions -* Expanded support for all GKE modes, including Autopilot +//* Expanded support for all GKE modes, including Autopilot -|=== +//|=== diff --git a/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc b/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc index 034ace41d4..346b946d6b 100644 --- a/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc +++ b/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc @@ -2,7 +2,7 @@ Learn what's new on Prisma® Cloud in November 2024. -//* <> +<> * <> //* <> * <> @@ -18,6 +18,45 @@ Learn what's new on Prisma® Cloud in November 2024. //Verify and add: RLP-151431, RLP-151095, RLP-149870 +[announcement] +=== Announcement +//CWP-61660 +//CWP-62319 +Prisma Cloud will use the following additional NAT IP addresses on the Google Cloud for the respective Prisma Cloud Enterprise Edition (SaaS) regions. + +The following table lists the regions and the additional reserved Ingress IP addresses. + +[cols="50%a,50%a"] +|=== +| *Region* | *Additional Ingress IP Addresses* + +| us-east1 | * 34.23.229.147 +* 34.74.93.165 +* 35.185.127.202 +| us-west1 | * 34.19.57.46 +* 34.83.186.93 +* 34.168.3.165 +| northamerica-northeast1 | * 34.118.176.160 +* 34.47.2.35 +| europe-west9 | * 34.163.241.103 +* 34.163.12.56 +| europe-west3 | * 35.198.174.6 +* 34.141.93.246 +* 34.141.89.174 +* 34.141.2.56 +* 35.198.185.51 +| europe-west2 | * 34.142.29.59 +* 34.89.33.47 +| australia-southeast1 | * 34.116.88.189 +* 35.189.14.189 +| asia-southeast1 | * 35.186.153.185 +* 34.87.100.14 +| asia-south1 | * 34.93.124.157 +* 34.47.154.73 +| asia-northeast1 | * 35.187.195.198 +* 34.85.99.145 +|=== + [#new-features] === New Features @@ -29,6 +68,46 @@ Learn what's new on Prisma® Cloud in November 2024. //removed Action Plans blurb since it's LGA in 11.1 +|*Scanning Support for Red Hat UBI Micro-images* +//CWP-32911 + +tt:[Secure the Runtime] + +tt:[33.02.130] + +|Prisma Cloud now supports scanning of Red Hat UBI micro-images (versions 7, 8, and 9). + + +|*Improved Vulnerability Detection for non-RPM OpenShift Packages* +//CWP-61504 + +tt:[Secure the Runtime] + +tt:[33.02.130] + +|Vulnerability reports for OpenShift non-RPM container components now ensure consistent vulnerability matching across all OpenShift packages. + +This improvement reduces false positives by applying only relevant CVEs and excluding CVEs that have already been patched. + + +|*Improved Vulnerability Detection for Google Kubernetes Engine (GKE) Clusters* +//CWP-61508 + +tt:[Secure the Runtime] + +tt:[33.02.130] + + +|Vulnerability detection for Google Kubernetes Engine (GKE) Clusters +includes the following enhancements: + +* Integration with Google security bulletins + +* Aligning CVEs with specific GKE cluster types and versions + +* Expanded support for all GKE modes, including Autopilot + + |*Refresh Option Available Post Cloud Account Onboarding* //RLP-149985 From bc818516072218f3fd01df3f6621827d4c2ce6b1 Mon Sep 17 00:00:00 2001 From: Kamesh-PaloAlto <166385805+Kamesh-PaloAlto@users.noreply.github.com> Date: Thu, 21 Nov 2024 15:59:56 +0530 Subject: [PATCH 4/7] added new fixed issue --- .../33/rn/release-information/known-issues-33.adoc | 13 +++++++++++++ .../rn/known-issues/known-fixed-issues.adoc | 12 ++++++++++++ .../features-introduced-in-november-2024.adoc | 4 ++-- 3 files changed, 27 insertions(+), 2 deletions(-) diff --git a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc index 7d59bf975e..30e2d7d391 100644 --- a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc +++ b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc @@ -9,10 +9,23 @@ The following table lists the fixed issues for 33.xx releases. |*ISSUE ID* |*DESCRIPTION* +|*CWP-35710* + +tt:[Fixed in 33.02.130] + +tt:[Not approved yet] + +| *Removing Namespaces After Resource Deletion* + +In some cases, namespaces remained visible even after all resources within them had been deleted. This led to incorrect vulnerability assessments as the namespaces were not properly removed from the results. This issue is now resolved. + + |*CWP-62296* tt:[Fixed in 33.02.130] +tt:[Not approved yet] + | *Consistent Vulnerability Data for Red Hat-Sourced Packages* Certain vulnerabilities for Red Hat packages showed a Red Hat severity but CVSS scores from NVD. diff --git a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc index 21cb3a7c37..f59a6b1534 100644 --- a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc +++ b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc @@ -411,10 +411,22 @@ CVE-2024-3154 - Arbitrary Systemd Property Injection as Defender does not direct |*ISSUE ID* |*DESCRIPTION* +|*CWP-35710* + +tt:[Fixed in 33.02.130] + +tt:[Not approved yet] + +| *Removing Namespaces After Resource Deletion* + +In some cases, namespaces remained visible even after all resources within them had been deleted. This led to incorrect vulnerability assessments as the namespaces were not properly removed from the results. This issue is now resolved. + |*CWP-62296* tt:[Fixed in 33.02.130] +tt:[Not approved yet] + | *Consistent Vulnerability Data for Red Hat-Sourced Packages* Certain vulnerabilities for Red Hat packages showed a Red Hat severity but CVSS scores from NVD. diff --git a/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc b/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc index 346b946d6b..8265c5ec01 100644 --- a/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc +++ b/docs/en/enterprise-edition/rn/prisma-cloud-release-info/features-introduced-in-2024/features-introduced-in-november-2024.adoc @@ -2,7 +2,7 @@ Learn what's new on Prisma® Cloud in November 2024. -<> +* <> * <> //* <> * <> @@ -18,7 +18,7 @@ Learn what's new on Prisma® Cloud in November 2024. //Verify and add: RLP-151431, RLP-151095, RLP-149870 -[announcement] +[#announcement] === Announcement //CWP-61660 //CWP-62319 From 0ffa9db746ee8d944a61ab8e819100cad87c656f Mon Sep 17 00:00:00 2001 From: Kamesh-PaloAlto <166385805+Kamesh-PaloAlto@users.noreply.github.com> Date: Thu, 21 Nov 2024 18:48:02 +0530 Subject: [PATCH 5/7] added one new fixed issue --- .../release-information/known-issues-33.adoc | 16 ++++++- .../release-notes-33-02.adoc | 42 ++++++++++++++++++- .../rn/known-issues/known-fixed-issues.adoc | 16 ++++++- 3 files changed, 69 insertions(+), 5 deletions(-) diff --git a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc index 30e2d7d391..0d004b3165 100644 --- a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc +++ b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc @@ -9,11 +9,23 @@ The following table lists the fixed issues for 33.xx releases. |*ISSUE ID* |*DESCRIPTION* +|*CWP-62313* + +tt:[Fixed in 33.02.130] + +tt:[Pending Approval] + +| *Removing Namespaces After Resource Deletion* + +The "Status" filter under *Prisma UI > Manage > Defenders > Cloud Security Agent* was displaying only the statuses present in the table, instead of all possible statuses. + +This issue has been resolved. The CSA status filter now shows a list of all available statuses: Connected, Disconnected, and Lost. This ensures users can filter the table by any status. + |*CWP-35710* tt:[Fixed in 33.02.130] -tt:[Not approved yet] +tt:[Pending Approval] | *Removing Namespaces After Resource Deletion* @@ -24,7 +36,7 @@ In some cases, namespaces remained visible even after all resources within them tt:[Fixed in 33.02.130] -tt:[Not approved yet] +tt:[Pending Approval] | *Consistent Vulnerability Data for Red Hat-Sourced Packages* diff --git a/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc index bcd0e697e9..d900d8e554 100644 --- a/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc +++ b/docs/en/compute-edition/33/rn/release-information/release-notes-33-02.adoc @@ -1,5 +1,5 @@ :toc: macro -== 33.01 Release Notes +== 33.02 Release Notes The following table outlines the release particulars: @@ -69,6 +69,46 @@ NOTE: You have to upgrade any version of `v31.00` to `v32.00` before upgrading t //[#cve-coverage-update] //=== CVE Coverage Update +[#announcement] +=== Announcement +//CWP-61660 +//CWP-62319 +Prisma Cloud will use the following additional NAT IP addresses on the Google Cloud for the respective Prisma Cloud Enterprise Edition (SaaS) regions. + +The following table lists the regions and the additional reserved Ingress IP addresses. + +[cols="50%a,50%a"] +|=== +| *Region* | *Additional Ingress IP Addresses* + +| us-east1 | * 34.23.229.147 +* 34.74.93.165 +* 35.185.127.202 +| us-west1 | * 34.19.57.46 +* 34.83.186.93 +* 34.168.3.165 +| northamerica-northeast1 | * 34.118.176.160 +* 34.47.2.35 +| europe-west9 | * 34.163.241.103 +* 34.163.12.56 +| europe-west3 | * 35.198.174.6 +* 34.141.93.246 +* 34.141.89.174 +* 34.141.2.56 +* 35.198.185.51 +| europe-west2 | * 34.142.29.59 +* 34.89.33.47 +| australia-southeast1 | * 34.116.88.189 +* 35.189.14.189 +| asia-southeast1 | * 35.186.153.185 +* 34.87.100.14 +| asia-south1 | * 34.93.124.157 +* 34.47.154.73 +| asia-northeast1 | * 35.187.195.198 +* 34.85.99.145 +|=== + + [#enhancements] === Enhancements diff --git a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc index f59a6b1534..dc1cdb4a51 100644 --- a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc +++ b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc @@ -411,11 +411,23 @@ CVE-2024-3154 - Arbitrary Systemd Property Injection as Defender does not direct |*ISSUE ID* |*DESCRIPTION* +|*CWP-62313* + +tt:[Fixed in 33.02.130] + +tt:[Pending Approval] + +| *Removing Namespaces After Resource Deletion* + +The "Status" filter under *Prisma UI > Manage > Defenders > Cloud Security Agent* was displaying only the statuses present in the table, instead of all possible statuses. + +This issue has been resolved. The CSA status filter now shows a list of all available statuses: Connected, Disconnected, and Lost. This ensures users can filter the table by any status. + |*CWP-35710* tt:[Fixed in 33.02.130] -tt:[Not approved yet] +tt:[Pending Approval] | *Removing Namespaces After Resource Deletion* @@ -425,7 +437,7 @@ In some cases, namespaces remained visible even after all resources within them tt:[Fixed in 33.02.130] -tt:[Not approved yet] +tt:[Pending Approval] | *Consistent Vulnerability Data for Red Hat-Sourced Packages* From d5b19a41e8c93a93dff108eea800af2a8e97fadd Mon Sep 17 00:00:00 2001 From: Kamesh-PaloAlto <166385805+Kamesh-PaloAlto@users.noreply.github.com> Date: Thu, 21 Nov 2024 18:55:30 +0530 Subject: [PATCH 6/7] edited heading --- .../33/rn/release-information/known-issues-33.adoc | 2 +- .../enterprise-edition/rn/known-issues/known-fixed-issues.adoc | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc index 0d004b3165..4bba1267eb 100644 --- a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc +++ b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc @@ -15,7 +15,7 @@ tt:[Fixed in 33.02.130] tt:[Pending Approval] -| *Removing Namespaces After Resource Deletion* +| *Improved Status Filter for Cloud Security Agent Page* The "Status" filter under *Prisma UI > Manage > Defenders > Cloud Security Agent* was displaying only the statuses present in the table, instead of all possible statuses. diff --git a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc index dc1cdb4a51..35e29be38c 100644 --- a/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc +++ b/docs/en/enterprise-edition/rn/known-issues/known-fixed-issues.adoc @@ -417,7 +417,7 @@ tt:[Fixed in 33.02.130] tt:[Pending Approval] -| *Removing Namespaces After Resource Deletion* +| *Improved Status Filter for Cloud Security Agent Page* The "Status" filter under *Prisma UI > Manage > Defenders > Cloud Security Agent* was displaying only the statuses present in the table, instead of all possible statuses. From 1d6258c8153b34ef30c1df200e5064693386d09b Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Sun, 24 Nov 2024 15:07:15 +0530 Subject: [PATCH 7/7] Update known-issues-33.adoc Received confirmation from Tal --- .../33/rn/release-information/known-issues-33.adoc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc index 4bba1267eb..31a19125c7 100644 --- a/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc +++ b/docs/en/compute-edition/33/rn/release-information/known-issues-33.adoc @@ -13,7 +13,7 @@ The following table lists the fixed issues for 33.xx releases. tt:[Fixed in 33.02.130] -tt:[Pending Approval] +//tt:[Pending Approval] | *Improved Status Filter for Cloud Security Agent Page* @@ -25,7 +25,7 @@ This issue has been resolved. The CSA status filter now shows a list of all avai tt:[Fixed in 33.02.130] -tt:[Pending Approval] +//tt:[Pending Approval] | *Removing Namespaces After Resource Deletion* @@ -36,7 +36,7 @@ In some cases, namespaces remained visible even after all resources within them tt:[Fixed in 33.02.130] -tt:[Pending Approval] +//tt:[Pending Approval] | *Consistent Vulnerability Data for Red Hat-Sourced Packages*