Cloud WAF

Security Cloud WAF
 
24 January 2024, 21:46 UTC

We are investigating elevated errors to our Cloud WAF.

 
24 January 2024, 22:54 UTC

Our engineers are continuing to investigate in reported errors experienced when deploying updates to Cloud WAF configurations.

We have confirmed that there is no impact to existing Cloud WAF configurations and customers are still protected by their current WAF services. Our network availability and all other services are unaffected.

 
25 January 2024, 00:45 UTC

Our engineers have identified the contributing factor and are applying a fix to Cloud WAF configurations.

 
25 January 2024, 00:52 UTC

Engineering has deployed a fix and have confirmed a gradual recovery to Cloud WAF configurations. We will continue to monitor until we’ve confirmed that customer experience has been fully restored.

Our network availability and all other services are unaffected.


 
25 January 2024, 16:53 UTC

This event has been resolved.

10 January 2024, 18:20 UTC
Security Cloud WAF
 
10 January 2024, 18:20 UTC

We are currently investigating elevated errors to our Cloud WAF dashboard.


 
10 January 2024, 19:14 UTC

Our engineers have identified the contributing factor and are applying a fix to Cloud WAF. 

 
10 January 2024, 22:41 UTC

Engineering has confirmed the impact to Cloud WAF has been mitigated.

 
10 January 2024, 22:51 UTC

Engineering has confirmed that Cloud WAF has been fully restored. Customers may have experienced inability to access Cloud WAF instances from 17:05 to 21:30 UTC.

This incident is resolved

Security Agents and Module Cloud WAF Next-Gen WAF (NGWAF) Agent Downloads Rule and IP List updates Rule Processing
 
05 January 2024, 18:22 UTC

Our engineers have identified the contributing factor and are applying a fix to NGWAF@edge and Cloud WAF services.

All other locations and services are unaffected.

 
05 January 2024, 19:28 UTC

Engineering has confirmed the impact to Agents and Module, NGWAF@Edge, Cloud WAF has been mitigated.

 
05 January 2024, 19:40 UTC

Engineering has confirmed that Agents and Module, NGWAF@Edge, Cloud WAF has been fully restored. Customers may have experienced NGWAF agents not receiving updates from 17:58 to 18:42 UTC.

This incident is resolved.


23 March 2023, 20:00 UTC
Security Cloud WAF Next-Gen WAF (NGWAF)
 
23 March 2023, 20:00 UTC
Fastly will be performing scheduled maintenance on the Fastly Next-Gen WAF, including Signal Sciences Platform, Cloud WAF, & Edge WAF. This maintenance is scheduled for Mar 23 at 1:00 pm PDT (8:00 PM UTC) to Mar 23 3:00 pm PDT (10:00 PM UTC). No customer impact is expected.

Throughout the maintenance window, status updates will be available at the Fastly status page.
 
23 March 2023, 22:00 UTC

The scheduled maintenance has been completed.

Security Cloud WAF
 
28 February 2023, 17:10 UTC

[update from Customer Incident Response]

We have updated this original message from "degraded performance" to "available" and "informational" as our investigations later confirmed this status update to be a false alarm.


[original message]


We're investigating elevated errors in Cloud WAF.

All other locations and services are unaffected

 
28 February 2023, 17:37 UTC

Fastly engineers have confirmed after further investigation that this was a false alarm and there are currently no elevated errors on Cloud WAF services.

We apologize for any confusion this status post may have caused.

31 October 2022, 20:07 UTC
Security Agents and Module Security Console & API Cloud WAF Fastly WAF (Legacy) Next-Gen WAF (NGWAF) Agent Downloads Data Services Dashboard Data Rule and IP List updates Rate Limiting and Alerts Rule Processing Requests Signals Dashboard
 
31 October 2022, 21:51 UTC

We are continuing to investigate and monitor this issue as an isolated incident, please continue to send and monitor ticket updates via email (securitysupport@fastly.com) while we investigate.

 
31 October 2022, 23:47 UTC

Issue has been isolated and determined to be impacting customers whom have enabled SSO and have not accepted the invite sent from the console. Logging in directly from SSO will prevent customers from viewing, updating and interacting with tickets in the console. Fastly advises customers to accept the invite send from the console to resolve their issues with ticket logging and interactions.

Security Agents and Module Security Console & API Cloud WAF Fastly WAF (Legacy) Next-Gen WAF (NGWAF) Agent Downloads Data Services Dashboard Data Rule and IP List updates Rate Limiting and Alerts Rule Processing Requests Signals Dashboard
 
28 October 2022, 19:49 UTC

Fastly is aware of an expected critical vulnerability the OpenSSL project is expected to disclose in the near future. We are studying the currently available information surrounding this vulnerability and do not currently believe that Signal Sciences is vulnerable. We will continue to monitor as additional information is released and will provide our customers with more information as available.

 
01 November 2022, 16:50 UTC

Fastly has reviewed the initial notification from OpenSSL regarding CVE-2022-3786 and CVE-2022-3602. We have analyzed the versions of OpenSSL in use at Fastly, and verified that we do not use OpenSSL 3.x. Fastly and customer usage of Fastly services are not vulnerable to CVE-2022-3786 or CVE-2022-3602.