30.02 Update 2 Release Notes
Table of Contents
Self.Hosted 30.xx
Expand all | Collapse all
30.02 Update 2 Release Notes
The following table outlines the release particulars:
Build | 30.02.123 |
Code name | Maxwell, 30.02 Update 2 |
Release date | June 25, 2023 |
Type | Maintenance Release |
SHA-256 | 960acb059e2ebe90aacf92e00b2080258dc820c35dfcc0339322ab305a82670a |
Review the system requirements to learn about the supported operating systems, hypervisors, runtimes, tools, and orchestrators.
CVE Coverage Update
- Fixed CVE-2023-2253 (Severity: high) || Package: github.com/docker/distributionUpgrade to at least the 2.8.2-beta.1 version of the package if you are running v2.8.x release. If you use the code from the main branch, update at least to the commit after f55a6552b006a381d9167e328808565dd2bf77dc.
New Features in Agentless Security
Encrypted volumes support in GCP with hub mode
This feature adds the capability to scan encrypted volumes in GCP with agentless scanning when using hub mode.
New Features in Core
Container Runtime Types in Defender Deployment
When installing a Defender using twistcli, pass the `--container-runtime flag with docker, cri-o, or containerd to match the runtime in your environment.

Windows Server 2016
Reinstating the support for Defenders on Windows 2016. For details on the extended support from Microsoft, see the Microsoft documentation.
Added new NAT gateway IP addresses
Prisma Cloud is adding new NAT IP addresses for the Compute SaaS Console Region in GCP. The egress IPs for connections from The Compute SaaS Console to the internet in us-east 1 (South Carolina) are: 34.139.64.150 and 34.139.249.192.
Make sure to add these IP addresses to your allow list.
These IP addresses will be added to the documentation.
Added Support for Managed Identities in Azure
Added support for Azure Managed Identities to authenticate any Azure resources that support AD authentication without adding keys in Prisma Console.
To use this authentication method, add an Azure role with required permissions to scan the resources under
Manage > Cloud accounts
.New Features in Host Security
Support custom compliance checks
Added support for custom compliance checks on clusters running containerd runtime.
Change in the format of runtime events information used in notification webhooks
Replaced the aggregated and rest macros with the following macros:
- aggregatedAlerts: Returns the aggregated audit events in JSON format. It represents the same data as the old aggregated macro, but in JSON format instead of text.
- dropped: Returns the number of alerts that were dropped after the aggregation buffer has reached its limit. This change fixes an issue where some of the aggregated alerts were missing fields like ContainerID, Namespace, and User.
The aggregated and rest macros are still available but are being deprecated after the two upcoming releases following our deprecation notice policy.
For existing settings of alert providers, you must edit the alert structure and use the new macros.
API Changes and New APIs
Add Backward Compatibility to api/v1/cloud/discovery/entities
The
api/vVERSION/cloud/discovery/entities
API endpoint is now available as a supported and backward compatible route to view the cloud discovered entities.Monitor the status of an OnDemand and Regular registry scan
The new API endpoint
api/vVERSION/registry/progress
is available to view the progress of onDemand and regular ongoing registry scans. Set the request parameter onDemand
to true to view progress of an ongoing on-demand scan. By default, onDemand
is set to false and shows the progress of a regular scan.Breaking Changes in API
Defender APIs modified to support the containerd runtime
The following APIs have been enhanced to include support for the containerd runtime in addition to the existing Docker and CRI-O runtimes:
The cri boolean parameter (in the common.DaemonSetOptions schema) in the above endpoints has been replaced by the common.ContainerRuntime schema in the 30.02 release.
Old (30.01 and earlier releases)
Example request schema showing
cri
set to a boolean value true
for Docker and CRI-O:{ "consoleAddr":"171.23.0.1", "namespace":"twistlock", "orchestration":"kubernetes", "selinux":false, "cri":true, "privileged":false, "serviceAccounts":true, "istio":false, "collectPodLabels":false, "proxy":null, "taskName":null, "gkeAutopilot":false }
New (in release 30.02)
From 30.02, you can set the following values for container runtime:
- containerd
- crio
- docker
Example request schema showing
cri
is replaced with containerRuntime
:{ "consoleAddr":"171.23.0.1", "namespace":"twistlock", "orchestration":"kubernetes", "selinux":false, "containerRuntime":"containerd", "privileged":false, "serviceAccounts":true, "istio":false, "collectPodLabels":false, "proxy":null, "taskName":null, "gkeAutopilot":false }
You must update existing scripts that use either of the two endpoints when you upgrade to 30.02 or a future release.
Deprecation Notice
- The ability to create CNNS policies that Defenders use to limit traffic from containers and hosts is being deprecated. The configuration settings on the Console (Compute > Defend > CNNS) and the corresponding APIs for CNNS will be removed in the next major release. Radar has a container and a host view, where you can view the network topology for your containerized apps and hosts respectively, and this will continue to be available.
List of deprecated API endpoints:
- Following our deprecation policy, the aggregated and rest macros will be deprecated. For the existing webhook alerts, you can edit the custom JSON body and replace #aggregated macro with #aggregatedAlerts and #rest macro with #dropped.
Addressed Issues
- Fixed an issue with the Defenders and agentless scans detecting an incorrect Kubernetes version. The Kubernetes version in the scan results on Prisma Console now matches the Kubernetes version that is installed on the host.
- Fixed a certificate error during the serverless scan in GCP when TLS proxy is enabled. This was addressed by adding support for global proxy in GCP client.
- Addressed incorrect "Fix status" of the CVEs that originated from National Vulnerability Database (NVD). With this update, the "Fix status" for such CVEs remains empty when there is no fix available in the NVD, instead of calculating a wrong fix status.