Rule Processing

31 January 2024, 18:09 UTC
Security Agents and Module Console and API Agent Downloads Rule and IP List updates Rule Processing Requests
 
31 January 2024, 18:09 UTC

We are currently investigating elevated errors to our Request stats in our NGWAF Dashboard services.

 
31 January 2024, 18:36 UTC

Our engineers have identified the contributing factor and are applying a fix to Requests stats in our NGWAF Dashboard services.

 
31 January 2024, 19:17 UTC

Engineering has confirmed the impact to NGWAF Requests dashboard services has been mitigated.

 
01 February 2024, 21:10 UTC

Our engineers have observed a recurrence of this issue and identified the contributing factor. They are currently applying a fix to Requests stats in our NGWAF Dashboard services.

 
01 February 2024, 22:21 UTC

Update: Agents appeared offline within the service dashboard from 21:25 UTC to 21:50 UTC (~25 minutes), however our investigations confirmed that they were still operational.

  • Engineering has confirmed the impact to our NGWAF Agent and Module services have been mitigated.

Engineers are continuing to apply mitigations for Request services within our dashboard.

Our network availability and all other services are unaffected by this incident.

 
01 February 2024, 23:42 UTC

Engineering has confirmed the impact to NGWAF Request dashboard services has been mitigated, we will resolve this status post after a period of monitoring.

 
02 February 2024, 01:50 UTC

This event has been resolved.

Security Agents and Module Cloud WAF NGWAF@Edge Agent Downloads Rule and IP List updates Rule Processing
 
05 January 2024, 18:22 UTC

Our engineers have identified the contributing factor and are applying a fix to NGWAF@edge and Cloud WAF services.

All other locations and services are unaffected.

 
05 January 2024, 19:28 UTC

Engineering has confirmed the impact to Agents and Module, NGWAF@Edge, Cloud WAF has been mitigated.

 
05 January 2024, 19:40 UTC

Engineering has confirmed that Agents and Module, NGWAF@Edge, Cloud WAF has been fully restored. Customers may have experienced NGWAF agents not receiving updates from 17:58 to 18:42 UTC.

This incident is resolved.


Security Agents and Module Agent Downloads Rule and IP List updates Rule Processing
 
18 December 2023, 23:01 UTC

On the 18th of December 2023 at 05:00 UTC, Fastly engineers inadvertently launched an incomplete agent release for our NGWAF services. We ask that any customer who deployed release version 4.49.1, to rollback to the previous version 4.49.0. 

There is no impact to customer services as a result of this inadvertent release. Our network availability and all other services are unaffected. 

13 June 2023, 17:09 UTC
Security Agents and Module Rule and IP List updates Rule Processing
 
13 June 2023, 17:09 UTC

Fastly is currently experiencing issues with NGWAF GeoIP country identification. Customers may experience instances in which NGWAF  labels requests with an incorrect region. For further information, please contact support@fastly.com.

 
13 June 2023, 17:30 UTC

This issue has been identified and a fix is being implemented. 

 
13 June 2023, 18:01 UTC

A fix has been implemented and we are monitoring the results.

 
13 June 2023, 18:23 UTC

This incident has been resolved.

Security Agents and Module Agent Downloads Rule and IP List updates Rule Processing
 
24 January 2023, 01:23 UTC

Our teams have detected an issue that impacts Signal Sciences data collectors beginning at 00:53 UTC. Agents may appear offline in dashboard/API, agents will not receive rule updates; rate limit rules, templated rules and sites alerts will not take new traffic into account; new traffic will not appear in the dashboard/API. Customers may experience delays in data available in the Signal Sciences console.

 
24 January 2023, 01:32 UTC

This issue has been identified and a fix is being implemented. 

 
24 January 2023, 01:40 UTC

A fix has been implemented and we are monitoring the results.

 
24 January 2023, 01:50 UTC

This incident has been resolved.

Security Agents and Module Rule Processing
 
16 January 2023, 18:10 UTC

Our teams have detected an issue that is currently impacting Signal Sciences updated rule sets for rules with one hour interval. Alerts configured to look back one hour, as well as system alerts, may not be available.

 
16 January 2023, 23:23 UTC

A fix has been implemented and we are monitoring the results.

31 October 2022, 20:07 UTC
Security Agents and Module Console and API Cloud WAF NGWAF@Edge Fastly WAF (Legacy) Agent Downloads Data Services Dashboard Data Rule and IP List updates MOWD Rule Processing Rate Limiting and Alerts Requests Signals Dashboard
 
31 October 2022, 21:51 UTC

We are continuing to investigate and monitor this issue as an isolated incident, please continue to send and monitor ticket updates via email (securitysupport@fastly.com) while we investigate.

 
31 October 2022, 23:47 UTC

Issue has been isolated and determined to be impacting customers whom have enabled SSO and have not accepted the invite sent from the console. Logging in directly from SSO will prevent customers from viewing, updating and interacting with tickets in the console. Fastly advises customers to accept the invite send from the console to resolve their issues with ticket logging and interactions.

Security Agents and Module Console and API Cloud WAF NGWAF@Edge Fastly WAF (Legacy) Agent Downloads Data Services Dashboard Data Rule and IP List updates MOWD Rule Processing Rate Limiting and Alerts Requests Signals Dashboard
 
28 October 2022, 19:49 UTC

Fastly is aware of an expected critical vulnerability the OpenSSL project is expected to disclose in the near future. We are studying the currently available information surrounding this vulnerability and do not currently believe that Signal Sciences is vulnerable. We will continue to monitor as additional information is released and will provide our customers with more information as available.

 
01 November 2022, 16:50 UTC

Fastly has reviewed the initial notification from OpenSSL regarding CVE-2022-3786 and CVE-2022-3602. We have analyzed the versions of OpenSSL in use at Fastly, and verified that we do not use OpenSSL 3.x. Fastly and customer usage of Fastly services are not vulnerable to CVE-2022-3786 or CVE-2022-3602.