Native Node Artifact Versions and Changelog¶
This document lists available versions of the Native Wallarm Node 0.14.x+ in various form factors, helping you track releases and plan upgrades.
All-in-one installer¶
The all-in-one installer for the Native Node is used for connectors.
History of all-in-one installer updates simultaneously applies to it's x86_64 and ARM64 versions.
0.20.0 (2025-11-25)¶
- Introduced support for OpenAPI 3.1 in the API Specification Enforcement feature — you can now upload specifications in version 3.1 format to compare traffic against them, identify mismatches, and mitigate related security risks
-
Added Prometheus metrics support for the Postanalytics wstore component. The metrics are available by default at
http://localhost:9001using thetcp4(IPv4-only) protocolYou can change the default metrics host, port, and protocol by setting the following environment variables when deploying the Node:
WALLARM_WSTORE__METRICS__LISTEN_ADDRESS— defines the host and portWALLARM_WSTORE__METRICS__PROTOCOL— defines the protocol
-
Added Prometheus metrics support for API Specification Enforcement service operation (based on the built-in API Firewall service). API Firewall metrics are included as part of the
go-nodePrometheus metrics - Removed support for the deprecated
http_inspector.real_ip_headerconfiguration parameter - Improved Node initialization logs — added detailed information about component type, supported versions, error source, API endpoint, and Node UUID to simplify troubleshooting during the initialization stage
- Fixed the CVE-2025-58188 vulnerability
-
Bug fixes:
- Fixed an issue where the Aggregation/wcli container could enter a crash loop due to an out-of-memory (OOM) condition
- Fixed an issue where the Node raised an error when a JWT token was sent in the
Authorization: Bearerheader - Fixed invalid type error when editing automatically created rules for attacks detected in gRPC responses
- Fixed a race condition in out-of-band connectors, resolving the
FlowIsMissingRequest,FlowIsMissingResponse, and occasional duplicate ID errors - Fixed the issue where the
verdictfield ingo-nodeaccess logs was occasionally missing, incorrectly formatted, and not JSON-compatible
0.19.0 (2025-10-07)¶
- Added support for blocking attackers by API sessions
- Added multitenancy support
-
Changed the default wstore binding to IPv4 (
tcp4), it now listens only on IPv4 instead of dual‑stackIf your configuration uses
localhostfor wstore, update it to127.0.0.1.
* Introduced protocol selection (tcp, tcp4, tcp6) using theWALLARM_WSTORE__SERVICE__PROTOCOLenvironment variable, which can be set in/opt/wallarm/env.listThe default value is
"tcp4".
* Relaxed content-type validation in API Specification Enforcement: requests with image MIME types (image/png,image/jpeg,image/gif,image/webp,image/avif,image/heic,image/heif,image/bmp,image/tiff,image/svg+xml) are no longer rejected
* Bumped Go version to 1.24
* Bug fixes:- Fixed an issue where the
go-nodeprocess could segfault in production environments - Fixed an issue where response context parameters configured in API Sessions were not uploaded to the Wallarm Cloud
- Fixed an issue with incorrect
remote_addrparsing
- Fixed an issue where the
0.18.0 (2025-09-17)¶
- Added support for the Azure API Management connector
- Added support for the Apigee API Management connector
- Updated Go version to 1.25
http_inspector.workers: autonow respects Kubernetescgrouplimits- Optimized mesh balancing logic for scale-up and scale-down events
-
Bug fixes:
- Fixed issue where the
go-nodeprocess did not terminate correctly when stopped too early - Fixed issue where the
go-nodeprocess ignored failures of metrics/health-check/mesh listeners - Fixed issue where
http_inspectorworkers silently ignored ACL errors, addressing the most common source of these errors
- Fixed issue where the
0.17.1 (2025-08-15)¶
- Fixed the stuffed credentials export to the Cloud
- Improved GraphQL parser
-
Optimized the internal channel between the Node and wstore to increase throughput
This prevents potential data loss when the Node ingests traffic faster than it can export it to postanalytics.
* Fixed an issue where serialized requests without a source IP address failed to be exported to postanalytics
* Bug fixes and internal improvements
0.16.3 (2025-08-05)¶
- Added support for the Akamai connector
- Fixed a silent failure when upgrading with the
--preserveflag set totrue
0.16.1 (2025-08-01)¶
-
Introduced the
drop_on_overloadparameter to control dropping excess input under high loadEnabled (
true) by default.
* Added new Prometheus metrics:-
wallarm_gonode_application_infowith the general Native Node instance information, e.g.: -
wallarm_gonode_http_inspector_balancer_workers wallarm_gonode_http_inspector_debug_container_lennow includesaggregate="sum"fortype="channel:in"wallarm_gonode_http_inspector_errors_totalnow includes a newtype="FlowTimeouts"- Improved stability in the internal
http_inspectormodule
-
0.16.0 (2025-07-23)¶
- Added support for file upload restriction policy via mitigation controls
- Added support for unrestricted resource consumption mitigation by API Abuse Prevention
- Added support for the MuleSoft Flex Gateway connector
- Introduced the
input_filtersconfiguration section, allowing to define which requests should be inspected or bypassed by the Node - Fixed memory leak
- In rules, the separator used in xml_tag values that combine a URI, namespace, and tag name has been changed from
:to| - Fixed blocking issue with denylisted origins and Wallarm Console UI-configured mode
- Internal improvements
0.15.1 (2025-07-08)¶
- Added support for mitigation control-based GraphQL API Protection
- Introduced the
proxy_headersconfiguration to configure trusted networks and extract real client IP and host headers - Added the
metrics.namespaceconfiguration option to customize the prefix of Prometheus metrics exposed by thego-nodebinary -
Fixed the
--preservescript flag behavior to correctly retain the existingnode.yamlandenv.listfiles during upgradePreviously, these files could be overwritten, resulting in loss of configuration.
* Addedconnector.per_connection_limitsto controlkeep-aliveconnection limits
* Minor internal file structure change
* Fixed wstore ports binding: now bound to127.0.0.1instead of0.0.0.0
* Fixed the CVE-2025-22874 vulnerability
* Fixed the CVE-2025-47273 vulnerability
0.14.1 (2025-05-07)¶
- Added support for enumeration mitigation controls
- Added support for DoS protection mitigation control
- Added support for the IBM API Connect connector
- Fixed the CVE-2024-56406, CVE-2025-31115 vulnerabilities
-
Added support for external health check endpoint in the
connector-servermodeThis is controlled by the new
connector.external_health_checkconfiguration section.
* Fixed a recurring intermittent bug that could cause occasional corruption of request and response bodies
* Fixed incorrect display of Native Node versions in Wallarm Console → Nodes
0.14.0 (2025-04-16)¶
- Wallarm Node now uses wstore, a Wallarm-developed service, instead of Tarantool for local postanalytics processing
-
The collectd service, previously installed on all filtering nodes, has been removed along with its related plugins
Metrics are now collected and sent using Wallarm's built-in mechanisms, reducing dependencies on external tools.
Helm chart¶
The Helm chart for the Native Node is used for self-hosted node deployments with the connectors.
0.20.0 (2025-11-25)¶
- Introduced support for OpenAPI 3.1 in the API Specification Enforcement feature — you can now upload specifications in version 3.1 format to compare traffic against them, identify mismatches, and mitigate related security risks
-
Added Prometheus metrics support for the Postanalytics wstore component. The metrics are available by default at
http://localhost:9001using thetcp4(IPv4-only) protocolYou can change the default metrics host, port, and protocol by setting the following in
values.yaml:config.aggregation.metrics.listenAddress— defines the host and portconfig.aggregation.metrics.protocol— defines the protocol
-
Added Prometheus metrics support for API Specification Enforcement service operation (based on the built-in API Firewall service). API Firewall metrics are included as part of the
go-nodePrometheus metrics - Improved Node initialization logs — added detailed information about component type, supported versions, error source, API endpoint, and Node UUID to simplify troubleshooting during the initialization stage
- Switched to native HTTP readiness and liveness probes for the wstore component
- Fixed the CVE-2025-58188 vulnerability
-
Bug fixes:
- Fixed an issue where the Aggregation/wcli container could enter a crash loop due to an out-of-memory (OOM) condition
- Fixed the issue where the Node raised an error when a JWT token was sent in the
Authorization: Bearerheader - Fixed invalid type error when editing automatically created rules for attacks detected in gRPC responses
- Fixed a race condition in out-of-band connectors, resolving the
FlowIsMissingRequest,FlowIsMissingResponse, and occasional duplicate ID errors - Fixed the issue where the
verdictfield ingo-nodeaccess logs was occasionally missing, incorrectly formatted, and not JSON-compatible
0.19.0 (2025-10-07)¶
- Added support for blocking attackers by API sessions
- Added multitenancy support
- Changed the default wstore binding to IPv4 (
tcp4), it now listens only on IPv4 instead of dual‑stack -
Introduced the protocol selection (tcp, tcp4, tcp6) configuration parameter:
config.aggregation.serviceProtocolThe default value is
"tcp4".
* Changed the default value of config.aggregation.serviceAddress to0.0.0.0:3313This allows IPv4 traffic only. If you are using a custom value, make sure it matches the selected
config.aggregation.serviceProtocol.
* Relaxed content-type validation in API Specification Enforcement: requests with image MIME types (image/png,image/jpeg,image/gif,image/webp,image/avif,image/heic,image/heif,image/bmp,image/tiff,image/svg+xml) are no longer rejected
* Bumped Go version to 1.24
* Set the default value forconfig.connector.per_connection_limits.max_durationto 1m (1 minute)
* Bug fixes:- Fixed an issue where the
go-nodeprocess could segfault in production environments - Fixed an issue where response context parameters configured in API Sessions were not uploaded to the Wallarm Cloud
- Fixed an issue with incorrect remote_addr parsing
- Fixed an issue where processing affinity was not applied correctly in the Native Node Helm chart
- Fixed an issue where the
0.18.0 (2025-09-17)¶
- Added support for the Azure API Management connector
- Added support for the Apigee API Management connector
- Updated Go version to 1.25
http_inspector.workers: autonow respects Kubernetescgrouplimits- Optimized mesh balancing logic for scale-up and scale-down events
-
Bug fixes:
- Fixed issue where the
go-nodeprocess did not terminate correctly when stopped too early - Fixed issue where the
go-nodeprocess ignored failures of metrics/health-check/mesh listeners - Fixed issue where
http_inspectorworkers silently ignored ACL errors, addressing the most common source of these errors
- Fixed issue where the
0.17.1 (2025-08-15)¶
- Introduced the
proxy_headersconfiguration to configure trusted networks and extract real client IP and host headers - Fixed the stuffed credentials export to the Cloud
- Improved GraphQL parser
-
Optimized the internal channel between the Node and wstore to increase throughput
This prevents potential data loss when the Node ingests traffic faster than it can export it to postanalytics.
* Fixed an issue where serialized requests without a source IP address failed to be exported to postanalytics
* Bug fixes and internal improvements
0.16.3 (2025-08-05)¶
- Added support for the Akamai connector
- Bug fixes
0.16.1 (2025-08-01)¶
- Introduced the
input_filtersconfiguration section, allowing to define which requests should be inspected or bypassed by the Node -
Introduced the
drop_on_overloadparameter to control dropping excess input under high loadEnabled (
true) by default.
* Added new Prometheus metrics:-
wallarm_gonode_application_infowith the general Native Node instance information, e.g.: -
wallarm_gonode_http_inspector_balancer_workers wallarm_gonode_http_inspector_debug_container_lennow includesaggregate="sum"fortype="channel:in"wallarm_gonode_http_inspector_errors_totalnow includes a newtype="FlowTimeouts"- Deprecated the Wallarm Connector for Istio that relied on a Lua plugin
We recommend using the gRPC-based external processing filter for Istio instead.
* For the deprecated Istio connector, the following improvements were made to ensure compatibility in existing deployments:- Fixed mesh balancing logic for messages
- Added the
disable_meshparameter to process all connector traffic on the Node without mesh balancing (falseby default - mesh balancing is enabled) - Added support for the
drop_on_overloadparameter - Improved stability in the internal
http_inspectormodule
-
0.16.0 (2025-07-23)¶
- Added support for file upload restriction policy via mitigation controls
- Added support for unrestricted resource consumption mitigation by API Abuse Prevention
- Added support for the MuleSoft Flex Gateway connector
- Fixed memory leak
- In rules, the separator used in xml_tag values that combine a URI, namespace, and tag name has been changed from
:to| - Fixed blocking issue with denylisted origins and Wallarm Console UI-configured mode
- Internal improvements
0.15.1 (2025-07-08)¶
- Added support for mitigation control-based GraphQL API Protection
- Added support for the
config.aggregation.serviceAddressparameter to customize the address and port for incoming wstore connections - Minor internal file structure change
- Fixed the CVE-2025-22874 vulnerability
- Fixed the CVE-2025-47273 vulnerability
0.14.1 (2025-05-07)¶
- Added support for the IBM API Connect connector
- Fixed the CVE-2025-22871 vulnerability
- Fixed handling of
clusterIP: Nonein Helm chart headless service - Fixed a recurring intermittent bug that could cause occasional corruption of request and response bodies
- Fixed incorrect display of Native Node versions in Wallarm Console → Nodes
0.14.0 (2025-04-16)¶
- Wallarm Node now uses wstore, a Wallarm-developed service, instead of Tarantool for local postanalytics processing
-
All
tarantoolreferences invalues.yaml(including container names and parameter keys) have been renamed towstoreIf you override these parameters in your configuration, update their names accordingly.
* The collectd service, previously installed on all filtering nodes, has been removed along with its related pluginsMetrics are now collected and sent using Wallarm's built-in mechanisms, reducing dependencies on external tools.
* Renamed thecontainerlabel totypein all Prometheus metrics matching*_container_*to prevent conflicts with Kubernetes system labels
Docker image¶
The Docker image for the Native Node is used for self-hosted node deployment with the connectors.
0.20.0 (2025-11-25)¶
- Introduced support for OpenAPI 3.1 in the API Specification Enforcement feature — you can now upload specifications in version 3.1 format to compare traffic against them, identify mismatches, and mitigate related security risks
-
Added Prometheus metrics support for the Postanalytics wstore component. The metrics are available by default at
http://localhost:9001using thetcp4(IPv4-only) protocolYou can change the default metrics host, port, and protocol by setting the following environment variables when deploying the Node:
WALLARM_WSTORE__METRICS__LISTEN_ADDRESS— defines the host and portWALLARM_WSTORE__METRICS__PROTOCOL— defines the protocol
-
Added Prometheus metrics support for API Specification Enforcement service operation (based on the built-in API Firewall service). API Firewall metrics are included as part of the
go-nodePrometheus metrics - Removed support for the deprecated
http_inspector.real_ip_headerconfiguration parameter - Improved Node initialization logs — added detailed information about component type, supported versions, error source, API endpoint, and Node UUID to simplify troubleshooting during the initialization stage
- Fixed the CVE-2025-58188 vulnerability
-
Bug fixes:
- Fixed an issue where the Aggregation/wcli container could enter a crash loop due to an out-of-memory (OOM) condition
- Fixed an issue where the Node raised an error when a JWT token was sent in the
Authorization: Bearerheader - Fixed invalid type error when editing automatically created rules for attacks detected in gRPC responses
- Fixed a race condition in out-of-band connectors, resolving the
FlowIsMissingRequest,FlowIsMissingResponse, and occasional duplicate ID errors - Fixed the issue where the
verdictfield ingo-nodeaccess logs was occasionally missing, incorrectly formatted, and not JSON-compatible
0.19.0 (2025-10-07)¶
- Added support for blocking attackers by API sessions
- Added multitenancy support
-
Changed the default wstore binding to IPv4 (
tcp4), it now listens only on IPv4 instead of dual‑stackIf your configuration uses
localhostfor wstore, update it to127.0.0.1.
* Introduced protocol selection (tcp, tcp4, tcp6) via theWALLARM_WSTORE__SERVICE__PROTOCOLenvironment variableThe default value is
"tcp4".
* Relaxed content-type validation in API Specification Enforcement: requests with image MIME types (image/png,image/jpeg,image/gif,image/webp,image/avif,image/heic,image/heif,image/bmp,image/tiff,image/svg+xml) are no longer rejected
* Bumped Go version to 1.24
* Bug fixes:- Fixed an issue where the
go-nodeprocess could segfault in production environments - Fixed an issue where response context parameters configured in API Sessions were not uploaded to the Wallarm Cloud
- Fixed an issue with incorrect remote_addr parsing
- Fixed an issue where the
0.18.0 (2025-09-17)¶
- Added support for the Azure API Management connector
- Added support for the Apigee API Management connector
- Updated Go version to 1.25
http_inspector.workers: autonow respects Kubernetescgrouplimits- Optimized mesh balancing logic for scale-up and scale-down events
-
Bug fixes:
- Fixed issue where the
go-nodeprocess did not terminate correctly when stopped too early - Fixed issue where the
go-nodeprocess ignored failures of metrics/health-check/mesh listeners - Fixed issue where
http_inspectorworkers silently ignored ACL errors, addressing the most common source of these errors
- Fixed issue where the
0.17.1 (2025-08-15)¶
- Fixed the stuffed credentials export to the Cloud
- Improved GraphQL parser
-
Optimized the internal channel between the Node and wstore to increase throughput
This prevents potential data loss when the Node ingests traffic faster than it can export it to postanalytics.
* Fixed an issue where serialized requests without a source IP address failed to be exported to postanalytics
* Bug fixes and internal improvements
0.16.3 (2025-08-05)¶
- Added support for the Akamai connector
- Fixed a silent failure when upgrading with the
--preserveflag set totrue
0.16.1 (2025-08-01)¶
-
Introduced the
drop_on_overloadparameter to control dropping excess input under high loadEnabled (
true) by default.
* Added new Prometheus metrics:-
wallarm_gonode_application_infowith the general Native Node instance information, e.g.: -
wallarm_gonode_http_inspector_balancer_workers wallarm_gonode_http_inspector_debug_container_lennow includesaggregate="sum"fortype="channel:in"wallarm_gonode_http_inspector_errors_totalnow includes a newtype="FlowTimeouts"- Improved stability in the internal
http_inspectormodule
-
0.16.0 (2025-07-23)¶
- Added support for file upload restriction policy via mitigation controls
- Added support for unrestricted resource consumption mitigation by API Abuse Prevention
- Added support for the MuleSoft Flex Gateway connector
- Introduced the
input_filtersconfiguration section, allowing to define which requests should be inspected or bypassed by the Node - Fixed memory leak
- In rules, the separator used in xml_tag values that combine a URI, namespace, and tag name has been changed from
:to| - Fixed blocking issue with denylisted origins and Wallarm Console UI-configured mode
- Internal improvements
0.15.1 (2025-07-08)¶
- Added support for mitigation control-based GraphQL API Protection
- Introduced the
proxy_headersconfiguration to configure trusted networks and extract real client IP and host headers - Added the
metrics.namespaceconfiguration option to customize the prefix of Prometheus metrics exposed by thego-nodebinary - Added
connector.per_connection_limitsto controlkeep-aliveconnection limits - Minor internal file structure change
- Fixed wstore ports binding: now bound to
127.0.0.1instead of0.0.0.0 - Fixed the CVE-2025-22874 vulnerability
- Fixed the CVE-2025-47273 vulnerability
0.14.1 (2025-05-07)¶
- Added support for the IBM API Connect connector
- Fixed the CVE-2025-22871 vulnerability
-
Added support for external health check endpoint
This is controlled by the new
connector.external_health_checkconfiguration section.
* Fixed a recurring intermittent bug that could cause occasional corruption of request and response bodies
* Fixed incorrect display of Native Node versions in Wallarm Console → Nodes
0.14.0 (2025-04-16)¶
- Wallarm Node now uses wstore, a Wallarm-developed service, instead of Tarantool for local postanalytics processing
-
The collectd service, previously installed on all filtering nodes, has been removed along with its related plugins
Metrics are now collected and sent using Wallarm's built-in mechanisms, reducing dependencies on external tools.
Amazon Machine Image (AMI)¶
0.14.0 (2025-05-07)¶
- Initial release