Aviatrix Controller and Gateway Software Release Notes

Important Notices for Upgrading to Aviatrix Release 7.1

Aviatrix strongly recommends you perform the tasks in the operations checklist including a dry run upgrade before upgrading your deployment of the Aviatrix network platform. Taking the time to perform dry runs and backing up your Aviatrix Platform configuration reduces the potential for issues during the upgrade and allows you to easily restore your configuration if there are issues after the upgrade.

Correct any issues you find during your preparation before proceeding with an Aviatrix upgrade. For more information, see Upgrading the Aviatrix Platform and Troubleshooting your Controller and Gateway Upgrade.

If you cannot resolve all issues after following the preparation and dry run procedures, please open a ticket with Aviatrix Support.

This page provides release specific information including some upgrade limitations, known issues and corrected issues. For information about new and enhanced features, behavior changes, and deprecations, see What’s New.

Upgrade Options

This release version is available as an upgrade option only if you have already upgraded to the following:

  • 7.1.3956 or 7.1.4101 (older Linux OS)

  • 7.1.3958, 7.1.4105, or 7.1.4139 (newer Linux OS)

See the Aviatrix Upgrade documentation for more information.

Upgrade on Aviatrix Edge Platform

On the Aviatrix Edge Platform, after you have upgraded the image to the latest Aviatrix base image with the newer Linux OS, you cannot roll back to a previous image based on the older Linux OS.

Disable Deprecated Controller-Logging Configurations

You cannot upgrade from any Controller 7.0 version to any Controller 7.1 or 7.2 version until you have disabled the deprecated logging configurations. See Disable Deprecated Controller-Logging Configurations for details.

Do Not Apply Existing Patches to Newly Upgraded Controllers

The Controller and Gateway images shipped with the 7.1.3958 release track (newer Linux OS) include all previously released software patches. Therefore, you do not need to reapply the old software patches to Controllers and Gateways updated to this release. If any new software patches are released in the future, and if they apply to the new Controller and Gateway images, the documentation associated with that release will clearly identify the patches and provide instructions.

Migrate Egress FQDN Filtering to Distributed Cloud Firewall

As of Controller 7.1.1710, Distributed Cloud Firewall (DCF) with WebGroups, configured in CoPilot, is the recommended method for configuring and implementing Egress Security.

Aviatrix strongly recommends migrating from Egress FQDN Filtering (Legacy) to Distributed Cloud Firewall to enforce Egress network security policy.

7.1.4183 Release Notes

Release Date: 15 October 2024

Release Notes updated 31 October 2024

Corrected Issues in Aviatrix Release 7.1.4183

Issue Description

AVX-52626

There was an issue when modifying the remote subnet CIDR range of an existing Site2Cloud (S2C) connection using Terraform provider version 3.1.4 with Aviatrix Controller versions 7.1.3696 and 7.0.2239. Instead of updating the remote subnet CIDR range as specified in the Terraform configuration, the change was incorrectly applied to the local subnet CIDR range.

AVX-53986

Fixed an issue where the Aviatrix Controller was using excessive memory when managing large numbers of access accounts. Customers managing large numbers of access accounts should see improved Controller stability and performance after upgrading.

AVX-54732

Fixed an issue where Aviatrix Edge Platform (AEP) Gateway upgrade status displayed incorrectly.

After a successful image upgrade, the Controller showed an empty upgrade status and the CoPilot interface displayed the status as “unknown”. This was only a display issue with no impact on Gateway functionality.

AVX-55012

After upgrading to version 7.1, certain Source Network Address Translation (SNAT) IP addresses were not properly advertised to connected networks when manual connection summaries were configured. This has been corrected. Outbound traffic using the affected SNAT IP addresses now connects properly.

This issue only affected BGP over IPSec connections between Transit Gateways and on-premises devices.

AVX-55434

Resolved an issue where attaching a virtual network with both IPv4 and IPv6 address spaces could cause invalid routes to be added to the network, losing management connectivity. Data traffic was not affected. The workaround was to avoid attaching virtual networks with IPv6 enabled.

AVX-56022

After a Spoke Gateway reboot, including from a resize or upgrade, the default route (0.0.0.0/0) advertised by this Gateway was removed from other connected VNet route tables. This resulted in loss of expected network connectivity between VNets.

AVX-56032

Fixed an issue where Security Group Orchestration was not functioning as expected in some Azure environments. If you were running multiple instances in the same Azure virtual network, Distributed Cloud Firewall (DCF) connectivity rules configured between instances might not have been applied correctly.

AVX-56466

Resolved an issue affecting Azure Transit Gateways (with FireNet, VNG, or BGP over LAN enabled) where upgrading to 7.1.4139 resulted in additional routes being added to the Gateways’ secondary network interfaces.

AVX-56779

Fixed an issue where restore from backup fails during controller image upgrades.

AVX-56921

Resolved an issue where, during Azure service outages, resource handling incorrectly deleted all Azure resources from its database. This could cause brief interruptions in expected network traffic.

Known Issues in Aviatrix Release 7.1.4183

Issue Description

AVX-45480

Distributed Cloud Firewall rules are not properly applied to non-encrypted (non-TLS), non-web (non-HTTP) traffic when processed by Gateways with High Performance Encryption (HPE) enabled.To address this issue, you can configure Distributed Cloud Firewall rules for non-TLS/non-HTTP traffic with higher priority to ensure proper handling. After updating, review and adjust security policies as needed to ensure desired traffic handling.

AVX-51456

Destination network address translation (DNAT) rules cannot be configured on Aviatrix Gateways using Terraform provider version 3.1.4. When setting up DNAT rules on standalone Gateways with policy-based tunnels configured, an error message indicates the interface for the connection cannot be found.

To work around this issue, configure DNAT rules through the Aviatrix CoPilot interface at Cloud Fabric > Gateways. See Enabling Gateway DNAT Settings.

AVX-53179

When the "Ensure TLS" setting on a Distributed Cloud Firewall rule is enabled, non-encrypted HTTP traffic is incorrectly passed to the next rule instead of being dropped. This occurs even when all other rule criteria are matched. The issue specifically affects HTTP traffic on port 80.If you want to verify that the Ensure TLS feature is performing as you expect, you can do the following:

  • Disable the Ensure TLS option on the DCF rule.

  • Wait awhile and then check traffic logs to see if non-TLS traffic matches the rule.

  • Re-enable Ensure TLS or configure a new DCF Rule, as needed.

AVX-55015

An issue can occur in handling Site2Cloud Mapped NAT connections when the local CIDR is set to 0.0.0.0/0. When a user edits or deletes a connection mapped to this CIDR, the corresponding IP table rule is not properly removed. This can cause incorrect routing behavior.

AVX-56811

After restoring a Controller configuration, restarting Gateways that were offline could fail re-attestation.

To address this issue, ensure that all Gateways are up before restoring a Controller configuration.

7.1.4139 Release Notes

Release Date: 14 August 2024

Release Notes updated 16 September 2024

Corrected Issues in Aviatrix Release 7.1.4139

Issue Description

AVX-55256

Running packet capture results in an error, preventing generation of packet captures for troubleshooting.

AVX-55290

If custom DNS/NTP entries are configured in the Cloud Service Provider DHCP options, and these DNS/NTP destinations are not reachable on the local VPC/VNet, then traffic to those destinations might be blocked.

AVX-55499

Software Rollback of a gateway upgrade from 7.1.4105 (newer operating system) to 7.1.3956 or 7.1.4101 (older operating system) causes gateway PKI service to go down. This results in lost communication between the gateway and Aviatrix Controller.

7.1.4105 Release Notes

Release Date: 18 July 2024

Release Notes updated on 09 August 2024

Corrected Issues in Aviatrix Release 7.1.4105

Issue Description

AVX-37706

(GCP) An issue that could cause gateway image upgrades to fail if Aviatrix Gateways were configured as Router Appliance spokes in the GCP Network Connectivity Center (NCC) is resolved.

AVX-37982

Clearing the bell notifications no longer results in the error, “Command to execute is too long”.

AVX-42518

An issue where adding and deleting a large number of stateful firewalls increased memory usage to more than 80% has been resolved.

AVX-48386

(OCI Gov) An issue where gateway creation in OCI Gov failed, has been resolved.

AVX-48707

(AWS) AWS has released configurable timeouts for security group connection tracking. Previously, the default timeouts were too long and in some routing topologies that could lead to packet drops.

With this release, the timeout value will be set to an appropriate value on the gateway’s interfaces.

This feature is only supported for AWS Nitro-based instance types, and when resizing between two Nitro instance sizes.

The new default setting does not apply when resizing from t2 instance types to Nitro instance types.

AVX-48764

Product telemetry corrected for intra tunnels count. No workarounds or corrective actions needed by customer.

AVX-48903

An issue is resolved where an upgrade can fail when you upgrade an image for a non-HPE (High Performance Encryption) Transit Gateway that has a Site2Cloud GRE connection and Jumbo Frame.

AVX-48917

Resolved an issue where traffic from the Spoke CIDR was incorrectly routed to FireNet, despite exclusion of the Spoke CIDR from the Inspection Policy.

AVX-50194

(GCP) Resolved an issue with FireNet BGP over LAN on GCP by correcting the routing for the firewall_rtb table, ensuring proper mapping of routes to interfaces.

AVX-50752

Product telemetry corrected in private mode implementations. No workarounds or corrective actions needed by customer.

AVX-50897

An issue is resolved where the Controller did not restore the peered tunnels that were deleted during the resizing process. This issue was the result of errors returned by the Cloud Service Provider (CSP) when resizing a High Performance Encryption (HPE) Gateway.

AVX-50941

(Azure) When a new Azure HPE gateway is provisioned, the Controller now creates a gateway route table with the name <vnet_name>-avx-gw-public associated with the gateway subnet. If there are subnets without any route tables associated, an optional public route table with name <vnet_name>-avx-public is also created. These route tables will be deleted when the gateway is torn down.

AVX-51027

The VPC Tracker Overlap Detection tool in Aviatrix CoPilot now works correctly with Edge devices.

AVX-51147

An issue is resolved that could cause Site2Cloud connection disruptions. External Site2Cloud connections (such as those with CloudN or standalone gateways with legacy route-based Site2Cloud connections) could have tunnel interfaces with overlapping Site2Cloud IPs.

New tunnel IPs are now validated prior to assignment to ensure they do not overlap with existing Site2Cloud connections.

AVX-51314

(Azure) Resolved an issue where Azure VNets that were created out-of-band (OOB) were not populating on the Controller when creating a Gateway. This was due to changes in the Azure API.

AVX-51407

An issue was resolved that caused disruptions in Site2Cloud tunnel configurations. Specifically, the local IP address was incorrectly changed to the standby gateway IP after upgrading the image on the standby gateway. This behavior occurred in environments using Site2Cloud configurations with single IP HA and public IP as the gateway identifier.

AVX-51703

Previously, an extra route table was created when a gateway without High Performance Encryption (HPE) was initially deployed. This route table had no function and was creating issues during the deletion of the gateway.

This issue has been resolved and the extra route table is no longer created during the deployment of a non-HPE gateway.

AVX-52360

Disabling Controller Security Group Management after a Controller image upgrade no longer causes a dependency violation error.

AVX-52640

Resolved an issue where Security Group Orchestration incorrectly counted existing user security groups. This led to the creation of new groups, exceeding the Security Group mapping limit of 5. Exceeding the limit posed a potential risk of gateway outage due to insufficient security rules for gateway communication with the Controller.

AVX-52808

The eth1 interface no longer goes down after upgrade to Controller 7.0.

AVX-53450

Corrected an issue that, during migration, sometimes resulted in receiving an email about an exception in export_tf. This did not affect the actual migration, which completed successfully.

AVX-54729

Resolved an issue where deploying Layer 7 Distributed Cloud Firewall rules to a gateway will slowly leak memory.

Known Issues in Aviatrix Release 7.1.4105

Issue Description

AVX-54874

(Azure) The message "Agent status: Not ready" might display in the Azure portal when viewing the Aviatrix Controller. This occurs because the Controller does not have the Azure VM agent running. This behavior is by design and does not affect the Controller’s functionality or performance. No action is required from users; this message can be safely ignored.

AVX-55256

Running packet capture results in an error, preventing generation of packet captures for troubleshooting. If you encounter this issue, please contact Aviatrix Support for assistance.

AVX-55290

If custom DNS/NTP entries are configured in the Cloud Service Provider DHCP options, and those DNS/NTP destinations are not reachable on the local VPC/VNet, then traffic to those destinations might be blocked. If you encounter this issue, please contact Aviatrix Support for assistance.

AVX-55499

Software rollback of a gateway upgrade from 7.1.4105 (newer operating system) to 7.1.3956 or 7.1.4101 (older operating system) causes gateway PKI service to go down. This results in lost communication between the gateway and Aviatrix Controller. If you need to rollback a gateway upgrade from 7.1.4105 to 7.1.3956 or 7.1.4101, contact Aviatrix Support for assistance.

This issue does not apply to 7.1.3958.

7.1.4101 Release Notes

Release Date: 22 July 2024

Release Notes updated on 09 August 2024

Corrected Issues in Aviatrix Release 7.1.4101

Issue Description

AVX-51314

(Azure) Resolved an issue where Azure VNets that were created out-of-band (OOB) were not populating on the Controller when creating a Gateway. This was due to changes in the Azure API.

AVX-54470

(Azure) Resolved an issue where all Security Group rules were not removed when disabling Access Security from Aviatrix Controller. Security Group rules still showed up in the Network Security Group list for the Controller in the Azure Portal (Console).

AVX-54729

Resolved an issue where deploying Layer 7 Distributed Cloud Firewall rules to a gateway will slowly leak memory.

Known Issues in Aviatrix Release 7.1.4101

Issue Description

AVX-50897

When resizing a High Performance Encryption (HPE) Gateway, if the resizing operation fails due to errors returned by the Cloud Service Provider (CSP), the Controller does not restore the peered tunnels that were deleted during the resizing process.

Reach out to Aviatrix Support for assistance if you run into this issue.

AVX-54480

(Azure) Manually aborting an Azure migration might not remove the new Controller instance. If that happens, delete the new Controller instance manually.

AVX-54886

(Azure) After migrating to the new 7.1.3958 or 7.1.4105 Controller releases, the storage disk IOPS setting is not retained from the old 7.1.3956 or 7.1.4101 Controllers.

AVX-55499

Software rollback of a gateway upgrade from 7.1.4105 (newer operating system) to 7.1.3956 or 7.1.4101 (older operating system) causes gateway PKI service to go down. This results in lost communication between the gateway and Aviatrix Controller. If you need to rollback a gateway upgrade from 7.1.4105 to 7.1.3956 or 7.1.4101, contact Aviatrix Support for assistance.

This issue does not apply to 7.1.3958.

7.1.3958 Release Notes

Release Date: 06 June 2024

Corrected Issues in Aviatrix Release 7.1.3958

Issue Description

AVX-38433

If you see error messages like “MemoryUsageLimitExceeded” or “RequestLimitExceeded” when you try to access the Controller, this could be caused by high memory usage. You can verify memory usage from Aviatrix Copilot on the Monitor > Performance tab.

To resolve this issue, please contact Aviatrix Support.

AVX-45386

On a gateway with multiple mapped Site2Cloud connections and with Forward Traffic to Transit Gateway enabled, after a successful gateway image upgrade, some of the Site2Cloud connections might not work.

To resolve this issue, go to CoPilot > Networking > Connectivity > External Connections (S2C), select a connection and click Settings. Disable, and then re-enable, “Forward Traffic to Transit Gateway” for each impacted Site2Cloud connection.

AVX-53623

7.1.3958 fixes an issue where, if you were on a version of the Aviatrix Controller older than 7.0 and attempted to launch a gateway on OCI, the gateway launch would fail due to a bug in OCI.

Known Issues in Aviatrix Release 7.1.3958

Issue Description

AVX-37706

(GCP) if an Aviatrix Gateway is configured as a Router Appliance spoke in the GCP Network Connectivity Center (NCC), gateway image upgrades might fail.

To resolve this issue, temporarily disassociate the gateway from the GCP NCC, run the image upgrade, and then re-associate the gateway.

AVX-37913

(AWS) Controllers with a large number of onboarded AWS access accounts can experience high memory usage. The system will detect this situation and restart affected services if memory usage is too high.

Contact Aviatrix Support if you need more information.

AVX-47065

(Azure) An Azure gateway instance might display the message “agent status is not ready” after the gateway image is updated. This is cosmetic only and does not have any effect on the functionality of the Aviatrix gateway.

AVX-48386

(OCI) The new Aviatrix base image is not available on OCI Gov in the current Controller release.

AVX-50897

When resizing a High Performance Encryption (HPE) Gateway, if the resizing operation fails due to errors returned by the Cloud Service Provider (CSP), the Controller does not restore the peered tunnels that were deleted during the resizing process.

Reach out to Aviatrix Support for assistance if you run into this issue.

AVX-52048

(AWS) Auto-migration does not inherit volume values for IOPS on the new gp3 volume. If the volume IOPS settings on the old Controller were modified, those changes might not be retained after the migration. The modified settings might need to be re-created for the new gp3 volume after migration.

AVX-52360

After Controller image upgrade, disabling Controller Security Group Management might cause a dependency violation error. If this happens, delete the old Controller, and then retry disabling Security Group Management.

AVX-52587

Changes to the certificate domain fail on gateways.

To resolve this issue, configure the same certificate domain name again or repeat the configuration steps, and the second time the gateways should properly update.

AVX-53025

On Controller’s Settings > Maintenance page, the kernel version is missing for newly launched Edge Gateways on Aviatrix Edge Platform.

AVX-53027

On Aviatrix Edge Platform, after you have upgraded the image to the latest Aviatrix base image, you cannot roll back to the previous image.

AVX-53450

During migration, you might receive an email about an exception in export_tf. This does not affect the actual migration, which will complete successfully.

7.1.3956 Release Notes

Release Date: 28 May 2024

Known Issues in Aviatrix Release 7.1.3956

Issue Description

AVX-50897

When resizing a High Performance Encryption (HPE) Gateway, if the resizing operation fails due to errors returned by the Cloud Service Provider (CSP), the Controller does not restore the peered tunnels that were deleted during the resizing process.

Reach out to Aviatrix Support for assistance if you run into this issue.

AVX-52048

(AWS) Auto-migration does not inherit volume values for IOPS on the new gp3 volume. If the volume IOPS settings on the old Controller were modified, those changes might not be retained after the migration. The modified settings might need to be re-created for the new gp3 volume after migration.

AVX-52095

If your Controller is running release 7.1.3956 or earlier, you will not be able to upgrade directly to 7.2 or later releases, when they become available. You will need to upgrade to release 7.1.3958 or a later 7.1 release before proceeding to any 7.2 releases.

AVX-52360

After Controller image upgrade, disabling Controller Security Group Management might cause a dependency violation error. If this happens, delete the old Controller, and then retry disabling Security Group Management.

AVX-52587

Changes to the certificate domain fail on gateways.

To resolve this issue, configure the same certificate domain name again or repeat the configuration steps. The gateways should be properly updated the second time.

AVX-52360

After Controller image upgrade, disabling Controller Security Group Management might cause a dependency violation error. If this happens, delete the old Controller, and then retry disabling Security Group Management.

AVX-53030

When doing a dry run prior to doing a gateway software upgrade to 7.1.3956, the dry run might report errors. This could happen because of backend dependencies. Please wait 15 minutes and attempt the dry run again.

AVX-53116

If you detach an IAM role from the Controller instance in the AWS Console, but do not update the Onboarded Account on the Controller, the Controller is not aware of the change made in AWS Console and still maintains the IAM role association with the Onboarded Account. This will result in a failed dry run.

You must reattach an IAM role to the Controller in your cloud service provider (CSP) account.

AVX-53583

The Certificate Domain (required for China region) is not updated for Edge Gateways, so the Edge Gateway cannot connect to the Controller. To resolve this issue, restore the Certificate Domain to its previous value. You can reset this in Controller by going to Onboarding and scrolling to Enter Certificate Domain.

7.1.3176 Release Notes

Release Date: 26 Feb 2024

Corrected Issues in Aviatrix Release 7.1.3176

Issue Description

AVX-50895

Customers using an Aviatrix Controller to orchestrate AWS Transit Gateways (TGWs), can encounter a software defect wherein the Aviatrix software might raise a false positive warning about duplicated CIDRs which could impact route propagation.

This issue occurs when you have two or more AWS TGWs and have TGW peering between them. The false positive warning can be raised on unrelated VPCs. If there are duplicated CIDRs in any TGW attachments in peered TGWs, routing propagation could be impacted.

Known Issues in Aviatrix Release 7.1.3176

Issue Description

AVX-47437

The traceroute for an Edge Gateway may display an incorrect value for the Edge Gateway Interface.

AVX-48456

When you use network segmentation on an Edge site with multiple gateways using VLAN, you must use the same VLAN value for all gateways. A bug is preventing the addition of new gateways to an existing network segmentation even when the VLAN value matches the VLANs of the other gateways.

To add a new gateway to an existing network segmentation:

  1. Remove the network segmentation association from all gateways.

  2. Make sure the new gateway has a VLAN identical with the rest of the gateways.

  3. Re-associate all the gateways in the network segmentation.

AVX-49015

If you change your Jumbo Frame configuration for Edge Gateways, that configuration change is not propagated to existing VLAN sub-interfaces.

If you experience this issue and need to change your Jumbo Frame configuration, make the configuration change and then delete and recreate all existing VLAN sub-interfaces.

AVX-49375

When you try to create a GCP Palo Alto firewall instance using a certain version of a Palo Alto image, the instance creation fails. The affected versions are versions of the Palo Alto Networks Next-Generation Firewall BUNDLE that contain the letter “h,” such as “8.1.25-h1.”

If you experience this issue, choose a Palo Alto Networks image version that does not contain the letter “h.” New Check Point and FortiGate Fortinet instance deployments are unaffected.

AVX-50076

The Aviatrix Controller now only displays the metrics for the last hour, in Dashboard > Controller Metrics or Gateway Metrics. For detailed Gateway metrics, please use Aviatrix CoPilot.

AVX-50897

When resizing a High Performance Encryption (HPE) Gateway, if the resizing operation fails due to errors returned by the Cloud Service Provider (CSP), the Controller does not restore the peered tunnels that were deleted during the resizing process.

Reach out to Aviatrix Support for assistance if you run into this issue.

7.1.3006 Release Notes

Release Date: 10 Jan 2024

Corrected Issues in Aviatrix Release 7.1.3006

Issue Description

AVX-26567

A FireNet Egress FQDN gateway was dropping traffic.

AVX-36054

A gateway created in a newer Controller software version might have been rolled back to an older software version if:

  • A gateway with the same name existed in an older Controller version.

  • That gateway was deleted before upgrading to the present Controller version.

AVX-36996

(Azure) After an Azure FireNet FQDN Egress gateway image upgrade, the gateway goes into the “config_fail” state. To resolve this issue, try restarting the gateway. If the gateway state does not change, please contact Aviatrix Support.

AVX-38843

In a Site2Cloud connection with a single IP HA Gateway, the standby gateway continuously sent out an IPsec connection requests to a remote peer even though the connection would never get established. This issue created a stale state in the CSP underlay, which may have caused IPsec tunnel flaps between the active gateway and remote peer.

This issue has been resolved by blocking the HA gateway from sending IPsec connection requests to remote peers for these Site2Cloud connections.

AVX-39477

When you tried to do an image upgrade or a software rollback for a BGP-enabled gateway on which you applied the “remove-unnecessary-packages-from-gateway” software patch, the operation may have failed.

AVX-39662

(GCP) Upgrading a GCP Transit Gateway with BGPoLAN and Firenet features enabled might have resulted in the loss of direct connectivity to the on-site firewall appliance.

AVX-41223

At the early stage of the gateway initialization, if you configured SSM agents to patch your Ubuntu servers automatically, the gateway initialization process may have failed.

AVX-41361

If a domain name used in an Egress FQDN tag had a long DNS record, attaching that FQDN tag to a gateway could fail. The error given was “command hostname_filter failed due to exception errors invalid IPNetwork.” An email notification was sent.

AVX-41555

When a Controller was in Private Mode and you opened the Firewall page and tried to select a subnet, nothing appeared in the dropdown menu.

AVX-41680

If a Gateway Transit-Spoke attachment was deployed before version 6.2.1742 and one of the Transit Gateway tunnels went down, then the connected Spoke Gateway CIDRs would be removed from the Transit Gateway’s routing tables, causing a traffic outage.

AVX-41693

Linux auditd logs filled the disk space of some instances.

AVX-42269

(GCP) In GCP, if the gateway deployment fails due to CSP (Cloud Service Provider) errors, the rollback fails due to the configuration being in an inconsistent state.

AVX-42706

FortiGate Firewalls failed to launch due to using an incorrect template on the Controller.

AVX-42789

Increased the length of time before an attempt to Encrypt Existing Gateways times out. This improvement helps avoid an encryption failure you would receive if the encryption timed out too soon. The warning message for that encryption failure was: Encryption failed. Waiter SnapshotCompleted failed: Max attempts exceeded.

AVX-43028

On a newly registered CloudN, users could not create attachments to multiple transits from a single CloudN Gateway.

AVX-43362

Aviatrix’s Single AZ HA (Availability Zone High Availability HA) feature would restart a gateway if it found that the gateway had gone down. Due to a timing issue between the process handling the feature and detecting the gateway state, it was possible for the gateway to go into a repeated stop-and-start loop. Disabling the Single AZ HA feature would break the loop.

AVX-43663

There was a memory leak in a firewall monitoring task. The memory leak was proportional to the number of firewalls in the network.

AVX-44022

In Distributed Cloud Firewall, rules inserted by Terraform or by API call were incorrectly evaluated in order of entry instead of order of priority. This issue only affected accounts that used the preview features WebGroups or decrypted IDS.

Note that with this fix, the rules may be rearranged as they are reordered by priority. This correction may change the behavior in your account.

Action required: To determine whether your configuration is affected, please check the ordering of the rules in your Terraform definition or API call. If they are not ordered by priority, reorder them by priority and check affected traffic and expected behavior.

AVX-44023

When running Aviatrix Edge on a Dell R450 device, when you configured a Transit Gateway attachment with HPE (High Performance Encryption) mode, you could not set the tunnel count to more than two.

AVX-44255

When you tried to do a dry run for a Controller software version upgrade with more than one version in the pending list for upgrading and chose “latest” as the default version for the upgrade, the Controller incorrectly ran the dry run for the last version to upgrade to instead of the next upgrade version. For example, if you ran a dry run for 6.9 > 7.0 > 7.1, the Controller ran the dry run for 7.1 instead of 7.0.

AVX-44526

VPN NAT for gateway traffic did not work as expected due to a NAT-related misconfiguration in the iptable rules.

Action required: If you experience a VPN NAT issue after upgrading to this software version, disable and reenable your UserVPN NAT configuration.

AVX-44673

When you changed the tunnel count for an existing Spoke-Transit HPE (High-Performance Encryption) peering, some tunnels may not have come up.

AVX-44812

Deployments with a Utility license were unable to view some license details.

AVX-44974

(Azure) When Transit Gateways had Active-Standby enabled and the Active Transit Gateway was down, the attached Azure Native Spoke VNet route tables failed to switchover routes.

AVX-45598

(AWS) When you added a UserVPN Load Balancer to the UserVPN User Accelerator in the Aviatrix Controller before the Load Balancer state became active in the Cloud Service Provider, the Controller might have throw an exception: “command vpn_user_xlr failed due to exception errors 'HealthState'<p></p>. An email notification with exception reason and trace log was sent to exceptions@aviatrix.com for troubleshooting.

AVX-45782

In some of the previous releases, a Controller backup did not save configurations for logging, such as Remote Syslog, Datadog agent, Netflow Agent, and Cloudwatch agent. Due to this issue, if you restored from a backup that was created in a prior release, these log configurations would not be restored.

AVX-45853

A Controller web page loading issue occurred when you tried to edit any FQDN tag other than the first one in the row table.

AVX-45873

When you used a link local address as an IPSec peer address, a Controller upgrade to release 6.8.1148 would drop traffic.

AVX-45897

On the Site2Cloud Details page in the Controller, the message “Authentication Type: null” was displayed for Site2Cloud connections even though there was a PSK authentication. Now, the page correctly displays “Authentication Type: psk” where PSK is the Authentication Type.

AVX-46098

When an Egress Filtering Gateway had a base Stateful Firewall policy of DENY, the gateway added the DROP rule from the base policy instead of letting the packets flow to the egress filter. The Egress Filtering Gateway should not have the DROP rule from the Stateful Firewall base policy. Instead, the packets should be allowed to flow to the egress filter.

AVX-46462

An HPE gateway resize could fail if the gateway had a peering with a gateway from release 6.7.1148 or earlier, as the new peering had additional fields in the structure.

AVX-46788

The Controller would not disable the Access Security feature during a Controller restore if the feature was not enabled in the backup configuration.

AVX-47027

(OCI Gov) OCI Gov gateways failed to launch.

AVX-47234

Previously, the S2C RX Balancing feature was supported only on AWS C5 and C5n gateway sizes. S2C RX Balancing now supports AWS C6in instances. Now, you can upgrade your gateway instance size to C6in and enable S2C RX Balancing.

AVX-47361

(AWS) A rare race condition caused the AWS TGW (AWS Transit Gateway) data migration in the Controller database to fail during a gateway upgrade. This issue caused a problem with route programming.

AVX-47486

(AWS) Starting with software release 7.0.1307, AWS Gateways enabled tags in the instance metadata service. As a result, the tag keys used on the instance had to match this pattern: ([0-9a-zA-Z\\-_+=,.@:]{1,255}), and could not be a reserved name ('.', ‘..', '_index').

Image upgrades and new gateway creations would fail if tag keys in the instance metadata did not manage the requirements above.

AVX-47764

(AWS) When a VPC was attached to an AWS Transit Gateway (TGW), if you deleted one of the Spoke VPC Advertised CIDRs, the routes in associated Transit Gateways were not correctly updated.

AVX-47795

An issue with reading the Controller time zone caused the Controller to send false alerts about an expired PKI agent certificate on gateways.

AVX-48007

(Azure) When a VNet is created with intra-VPC resources enabled, any Aviatrix resources created (NSG or ASG), had a tag with the key “Aviatrix-Created-Resource Value.” Now, Aviatrix-created NSGs or ASGs have tags with the key “Aviatrix-Created-Resource.”

Action required: For NSG/ASGs created before this software release, you must fix the tag manually in your Azure account.

AVX-48193

When a Transit Gateway had a Stateful Firewall policy configured that uses tags, creating or deleting BGP connections on the Transit Gateway could fail. The BGP connection change may have appeared to have completed successfully, but the updated configuration was not applied on the gateway.

AVX-48337

(AWS) The Controller was sending too many API requests to AWS to query route tables. AWS could respond with duplicate route table information.

AVX-48457

(AWS) AWS Gateways with tags that did not match new AWS requirements caused metadata service to fail to turn on.

AVX-48931

When you detached and reattached a CloudN attachment to an Aviatrix Transit Gateway that had any Stateful Firewall rules that used Stateful Firewall Tags, the BGP configuration incorrectly remained on the gateways.

AVX-49236

(OCI) After an OCI gateway image upgrade, several routing tables within several VCNs were missing the default route, 0.0.0.0/0.

Known Issues in Aviatrix Release 7.1.3006

Issue Description

AVX-45386

On a gateway with multiple mapped Site2Cloud connections with Forward Traffic to Transit Gateway enabled, after a successful gateway image upgrade, some of these connections may not work. To resolve this issue, go to Controller > Site2Cloud > Setup and disable and re-enable "Forward Traffic to Transit Gateway" for each impacted Site2Cloud connection.

AVX-47437

The traceroute for an Edge Gateway may display an incorrect value for the Edge Gateway Interface.

AVX-48456

When you use network segmentation on an Edge site with multiple gateways using VLAN, you must use the same VLAN value for all gateways. A bug is preventing the addition of new gateways to an existing network segmentation even when the VLAN value matches the VLANs of the other gateways.

To add a new gateway to an existing network segmentation: . Remove the network segmentation association from all gateways. . Make sure the new gateway has a VLAN identical with the rest of the gateways. . Re-associate all the gateways in the network segmentation.

AVX-49015

If you change your Jumbo Frame configuration for Edge Gateways, that configuration change is not propagated to existing VLAN sub-interfaces.

If you experience this issue and need to change your Jumbo Frame configuration, make the configuration change and then delete and recreate all existing VLAN sub-interfaces.

AVX-49375

When you try to create a GCP Palo Alto firewall instance using a certain version of a Palo Alto image, the instance creation fails. The affected versions are versions of the Palo Alto Networks Next-Generation Firewall BUNDLE that contain the letter “h,” such as “8.1.25-h1.”

If you experience this issue, choose a Palo Alto Networks image version that does not contain the letter “h.” New Check Point and FortiGate Fortinet instance deployments are unaffected.

AVX-50076

The Aviatrix Controller now only displays the metrics for the last hour, in Dashboard > Controller Metrics or Gateway Metrics. For detailed Gateway metrics, please use Aviatrix CoPilot.

AVX-50897

When resizing a High Performance Encryption (HPE) Gateway, if the resizing operation fails due to errors returned by the Cloud Service Provider (CSP), the Controller does not restore the peered tunnels that were deleted during the resizing process.

Reach out to Aviatrix Support for assistance if you run into this issue.

7.1.2131 Release Notes

Release Date: 29 August 2023

Important Notices in Aviatrix Release 7.1.2131

AVX-43682 - Disable Deprecated Controller-Logging Configurations

If you have logging configurations enabled in Controller for the following external log servers, the out-of-the box logging services for these external log servers were deprecated in previous Controller releases and are removed in Controller 7.1.1307:

  • Elastic Filebeat

  • Splunk Enterprise/Cloud

  • Sumo Logic

You cannot upgrade to Controller 7.1.1307 until you have disabled these deprecated logging configurations.

To disable the deprecated logging configurations:

  • Depending on your environment, you may want to enable your log forwarding under rsyslog and verify the functionality is working before disabling the deprecated logging configurations. For information about using rsyslog as the logging mechanism to forward Aviatrix platform logs to your external log server, see Aviatrix Controller Logging.

  • Disable the deprecated logging configurations for Elastic Filebeat/Splunk Enterprise or Cloud/Sumo Logic, as applicable, in the Controller > Settings > Logging page. Locate the applicable external log server’s respective option and switch its toggle from Enabled to Disabled.

Issues Corrected in Aviatrix Release 7.1.2131

Issue Description

AVX-39662

(GCP) Upgrading a GCP Transit Gateway with BGPoLAN and Firenet features enabled might have resulted in the loss of direct connectivity to firewall appliance management.

AVX-43013

A previous method for adding new metrics to interface RRD files caused unnecessary delay and decreased performance. Resolved this issue so that the new metrics are available without the extra expense of time and performance. You must upgrade to software version 7.0.2004 or 7.1.2131 or later to access the new metrics.

AVX-43547

On a newly registered CloudN, users could not create attachments to multiple transits from a single CloudN Gateway.

AVX-43545

When you updated the credentials of your cloud access accounts, the Aviatrix Controller could no longer get the latest status of the resources (for example, instances or VPCs) in your Cloud Service Providers: AWS, Azure, or GCP.

AVX-43549

Removing the Egress FQDN tag from a gateway could result in the uninstalling of the hostname filtering service (avx-hostname-filter). Adding the tag back didn’t reinstall the service and the feature did not work.

AVX-43550

A Stateful Firewall rule allowing reverse-path traffic flows was temporarily removed during a software upgrade.

AVX-43863

(GCP) A tag issue prevented the Global VPC feature for Spoke Gateways from being enabled or disabled properly.

AVX-44022

In Distributed Cloud Firewalling, rules inserted by Terraform or by API call were incorrectly evaluated in order of entry instead of order of priority. This issue only affected accounts that used the preview features WebGroups or decrypted IDS.

Note that with this fix, the rules may be rearranged as they are reordered by priority. This correction may change the behavior in your account.

Action required: To determine whether your configuration is affected, please check the ordering of the rules in your Terraform definition or API call. If they are not ordered by priority, reorder them by priority and check affected traffic and expected behavior.

AVX-44298

Bootstrap configuration for a firewall took longer than expected, causing traffic loss from the Transit Gateway.

Use the following two attributes in Terraform to provide sufficient time for the firewalls to be configured via Bootstrap so that the configuration is applied to the firewalls. Note that the specific values for these attributes

  • number_of_retries - (Optional) Number of retries for save or synchronize. (Set to at least 1, default is 0)

  • retry_interval - (Optional) Retry interval in seconds for save or synchronize. Example: 900. Default value: 300. Recommended: 900.

AVX-45566

VPN NAT for gateway traffic didn’t work as expected because one of the NAT-related chains is missing in the iptables.

Action required: Upgrade your gateway image.

AVX-45569

Linux auditd logs filled the disk space of some instances.

AVX-45571

(Azure) After an Azure FireNet-enabled gateway image upgrade, the gateway went into the “config_fail” state.

AVX-45630

(GCP and AWS) There was a connectivity issue between workloads behind Aviatrix Gateways within GCP and workloads in GCP VPCs and AWS gateways. GCP has a default MTU of 1460, while AWS has a default MTU of 1500.

AVX-48199

(GCP) Controllers that manage GCP resources may run into errors when a new Controller instance is started (via Controller High Availability or Controller Migration) or when a new GCP account is onboarded.

Known Issues in Aviatrix Release 7.1.2131

Issue Description

AVX-44987

After multiple Controller migrations and upgrades, the Spire Nodes page (Controller > Troubleshoot > Diagnostics > mTLS > Spire Nodes) may have duplicate gateway entries. To re-attest a gateway with duplicate entries, select the gateway and click Re-Attest.

AVX-45156

On an AEP Dell device, when you configure a Transit Gateway attachment with HPE (High Performance Encryption) mode, you could not set the tunnel count to more than 2.

If you have a higher bandwidth/performance requirement which requires more tunnels, please contact Aviatrix Support for help.

AVX-45682

A rare issue with a gateway software upgrade may cause the BGP neighbor status to go down. To resolve this issue, restart the gateway.

AVX-45684

This issue occurs when you try to do a dry run for a Controller software version upgrade with more than one version in the pending list for upgrading. When you choose “latest” as the default version for the upgrade, the Controller incorrectly runs the dry run for the last version to upgrade to instead of the next upgrade version. For example, if you are running a dry run for 6.8 > 6.9 > 7.0 > 7.1, the Controller ran the dry run for 7.1 instead of 6.9.

To resolve this issue, when you do a dry run, make sure to manually enter the next upgrade version instead of leaving the default, “latest.” For example, when you upgrade from 6.8 > 6.9 > 7.0 > 7.1, enter “6.9” as the version for the dry run.

AVX-45685

If an Egress FQDN gateway has an HA (High Availability) pair added, the HA gateway will not have Egress Control enabled. To enable Egress Control on both gateways, temporarily remove the Egress FQDN Filter tag from the primary gateway and then re-add it.

To avoid this issue, create the HA gateway before assigning an Egress FQDN Filter tag.

7.1.1906 Release Notes

Release Date: 11 July 2023

Issues Corrected in Aviatrix Release 7.1.1906

Issue Description

AVX-43137

If your Aviatrix Controller image was from 2022 or newer, a dependency caused an upgrade failure to 7.0.1724 or 7.1.1187.

7.1.1710 Release Notes

Release Date: 11 May 2023

Important Notices in Aviatrix Release 7.1.1710

Disable Deprecated Controller-Logging Configurations

If you have logging configurations enabled in Controller for the following external log servers, the out-of-the box logging services for these external log servers were deprecated in previous Controller releases and are removed in Controller 7.1 versions - that is, any Controller version that begins with 7.1:

  • Elastic Filebeat

  • Splunk Enterprise/Cloud

  • Sumo Logic

You cannot upgrade from any Controller 7.0 version to any Controller 7.1 version until you have disabled these deprecated logging configurations.

To disable the deprecated logging configurations:

  • Depending on your environment, you may want to enable your log forwarding under rsyslog and verify the functionality is working before disabling the deprecated logging configurations. For information about using rsyslog as the logging mechanism to forward Aviatrix platform logs to your external log server, see Aviatrix Controller Logging.

  • Disable the deprecated logging configurations for Elastic Filebeat/Splunk Enterprise or Cloud/Sumo Logic, as applicable, in the Controller > Settings > Logging page. Locate the applicable external log server’s respective option and switch its toggle from Enabled to Disabled.

Issues Corrected in Aviatrix Release 7.1.1710

Issue Description

AVX-1470

During Panorama vendor integration, a configuration using the same template or template stack on both primary and HA (High Availability) gateways was blocked, as there would have been a routing issue.

AVX-21689

(GCP) When two VPN gateways without ELBs (External Load Balancers) were deployed in two different regions in GCP, after adding VPN user to the first VPN GW, you could not add a VPN user to the second gateway.

AVX-25209

The Aviatrix rsyslog may have unexpectedly stopped forwarding logging packets to remote server(s).

AVX-26234

With inter-region HPE (High-Performance Encryption) transit peering between gateways, application traffic across the regions was failing. Packets were not getting clamped to TCP MSS 1370 for inter-region vs intra-region traffic.

AVX-27704

When a gateway had too many routes, the CoPilot Cloud Routes page did not display anything.

AVX-30518

After enabling CoPilot Security Group management, an error occurred: you could not enable copilot security group management. Rest API enable_copilot_sg POST failed, and then Controller was unable to initialize Aviatrix Gateways.

AVX-32351

During Packet Capture, if you clicked Download multiple times, you received an error message: “Failed to open file.” Now, you can download successfully even if you click Download multiple times.

AVX-32730

You could not modify a UserVPN LDAP configuration and upload CA certificate when more than one VPN Gateway was deployed behind a load-balancer.

AVX-32904

If the Edge node could not access the Aviatrix release server because of a firewall setting or because the Management was over a private network, enabling the FIPS caused the Edge gateway to fail. The gateway could not be recovered.

AVX-32921

Some VPN user traffic to certain destinations was dropped on the VPN Gateway. This issue could occur when the VPN Gateway was rebooted and old VPN profile rules were not cleaned up from the system iptables.

AVX-33510

(GCP) All GCP gateways reached 100% CPU Utilization at the same time.

AVX-33814

When a Controller account had too many Site2Cloud connections, Multicloud Transit Segmentation pages failed to load.

AVX-33917

If you had set a custom NetFlow certificate domain when in Private Mode, NetFlow and Syslog data could not be sent to Aviatrix CoPilot.

AVX-34163

When your Controller was deployed in Private Mode, enabling NetFlow on a gateway failed. The iptables rules associated with NetFlow would not be installed, and the gateway configuration failed.

AVX-34401

After the Controller was updated to the 6.7.1376 software version with the AVX-25632 bug fix, you could not attach a CloudN as a Gateway (CaaG) to an Azure Transit Gateway.

AVX-34487

A gateway upgrade may have failed if the gateway could not reach the Internet and install the Linux sysstat package.

AVX-34540

When you configured NAT and NetFlow on a gateway and rebooted it, the NAT rules were accidentally removed.

AVX-34823

(AWS and Azure) In AWS accounts in the Controller that were onboarded using a key and secret instead of IAM Roles, an error occurred when you tried to bring up an Azure gateway.

AVX-34845

Removed a file from managed CloudN or the CaaG device during an upgrade to improve security.

AVX-34872

On a newly-deployed Controller or gateways, if multiple syslog profiles were configured, data was only forwarded on the most recently saved profile.

AVX-35096

(Azure) An API error may have caused the Controller to become unresponsive.

AVX-35549

(Azure, US East region) A default route advertised from on-prem was not written to the VNet route table.

AVX-35646

Previously, the gateway name reported in logs generated by the HTTP/HTTPS FQDN enforcer was “NA.” Now, the gateway name is correctly reported for newly created gateways.

AVX-35728

If an incorrect passphrase was entered when attempting to enable SSH access to your Controller, a bug was causing all the keys for on-prem managed CloudN or CaaG devices to be removed.

AVX-35844

(AWS) When you had a Transit Gateway attached to an AWS TGW and many Site2Cloud connections, the TGW list and plan page loaded slowly.

AVX-35958

The primary and HA gateway shared the same remote IP configuration.

AVX-36147

Configuring customized SNAT policies on a Spoke Gateway via Terraform failed.

AVX-36249

In Private Mode, when the Controller’s proxy was set up, gateway diagnostics and an upgrade dry run would incorrectly show a status failure.

AVX-36387

(AWS) You received a gateway error message, “Missing account or VPC,” when you tried to bring up a gateway.

AVX-36546

FlightPath may have incorrectly shown Spoke and Transit Gateway routes as inactive if the Controller and Gateways were using the following software versions: 7.0.1373, 7.0.1383, 6.9.308, or 6.8.1483.

AVX-36794

If a Spoke Gateway has multiple Custom Mapped or Mapped Site2Cloud connections, Forward Traffic to Transit configuration enabled, and the same virtual destination CIDRs are configured in other Site2Cloud connections, a failover in one connection will cause TCP sessions belonging to the other connections to drop.

AVX-36893

A Controller restore may have failed if the Controller had some dangled files.

AVX-36913

(GCP) GCP gateways may have experienced CPU spikes every 10 minutes.

AVX-36971

A gateway instance could shut down as you used the Monitor Gateway Subnet feature.

AVX-37020

(Azure) Upgrading certain older Azure gateways was unsuccessful because they did not have the “gw_subnet_cidr” attribute.

AVX-37066

Under certain conditions, when you tried to download Egress FQDN logs or stats, the download failed and you received an error message: "…​ 'utf-8' codec can’t decode byte …​"

VX-37120

Editing the Stateful Firewall policy for a gateway could fail when a large amount of rules were added to the policy.

AVX-37394

(Azure) An Azure FireNet route table would fill up and not allow any more gateways after you attached more than 400 non-HPE Spoke Gateways.

AVX-37801

(Azure) Deleting an Azure Spoke Gateway incorrectly deleted user-created RFC1918 routes in the VNet route table.

AVX-38158

(Alibaba Cloud) With CoPilot Security Group management enabled, when you brought up gateways in Alibaba Cloud, they would be missing Security Group rules on CoPilot. This issue meant there would be no visibility of NetFlow and syslog data from the gateways.

AVX-38161

If a Spoke Gateway has multiple Custom Mapped or Mapped Site2Cloud connections, Forward Traffic to Transit configuration enabled, and the same virtual destination CIDRs are configured in other Site2Cloud connections, a failover in one connection will cause TCP sessions belonging to the other connections to drop.

AVX-38409

A gateway credential could be doubly encrypted.

AVX-38469

Unnecessary or irrelevant threat rules for gateways were not successfully deleted.

AVX-38471

If the quagga bgp Debian packages were not installed properly, the Aviatrix Controller would try to reinstall the package instead of failing the gateway configuration.

AVX-38682

(GCP) When you selected the CheckPoint BYOL image as the third-party firewall option, the CheckPoint PAYG image came up instead.

AVX-38954

A Controller bug could lead to gateway crashes and traffic disruption.

AVX-38965

When a gateway was deployed in Private Mode with NetFlow enabled, and you disabled NetFlow and rebooted it, NetFlow could not be reenabled.

AVX-39037

If you added policy rules to Distributed Firewalling, additional and unnecessary code could always run, even if the rules were deleted.

AVX-39040

Gateways reconnecting to the Controller could cause a resource leak on the gateway.

AVX-39050

This fix applies to gateways deployed in Private Mode with NetFlow enabled and NAT rules configured. When you rebooted this type of gateway, NAT rules were sometimes cleared from the IP tables. This clearing could affect data traffic.

AVX-39358

When you updated the CIDR range for a VPN gateway with NAT enabled, the gateway may have stopped forwarding traffic.

Known Issues in Aviatrix Release 7.1.1710

Issue

Description

AVX-21547

Spokes using the Global VPC Routing for GCP feature cannot be connected to FireNet transit gateways.

AVX-25000

(AWS) A Private Mode gateway may not have Internet access, in which case it cannot directly upload a gateway tracelog to the S3 bucket. Instead, when you need to upload a gateway tracelog to an S3 bucket, upload the gateway tracelog to the Controller. Then, your Controller uploads the gateway tracelog to the S3 bucket.

AVX-30776

(Azure) Avoid upgrading your Azure gateway image on gateways with “unmanaged disks” when the Companion Gateway version is “aviatrix-companion-gateway-v8” or an earlier Companion Gateway version.

Azure and Aviatrix have prepared some special images with unmanaged disk support so you can upgrade a gateway image with an unmanaged disk. These are the Companion Gateway versions you can safely upgrade with an unmanaged disk:

  • Controller version 6.7 - aviatrix-companion-gateway-v10u

  • Controller version 6.8, 6.9 - aviatrix-companion-gateway-v13u

  • Controller version 7.0, 7.1 - aviatrix-companion-gateway-v14u

AVX-34997

If you deploy your Aviatrix Controller using proxy configuration and Private mode, the SMTP port does not open. In this situation, because Aviatrix accounts do not have an SMTP relay, your Controller will email Aviatrix Support about the error using port 443 via API.

AVX-35077

(Azure) If the Azure Spoke Gateways were down and a Transit Gateway propagated to an Azure Spoke Gateway with the default route, the Spoke VNet could not program default routes in the route table.

AVX-35613

When the Controller’s timezone was set to any other time zone than UTC (Coordinated Universal Time), a software upgrade became stuck at 99% progress.

AVX-36138

Gateway initialization, including Cloud Gateway creation, Cloud Gateway Image Upgrade, or Cloud Gateway Software Rollback fails if you complete both of the operations below (regardless of order):

  • Changing the Controller time zone to those ahead of UTC/GMT. For example, for Australia/Sydney (AEST), the offset UTC is UTC+11:00.

  • PKI re-bootstrap (including Certificate Domain Update and Gateway CA Certificate Upload)

  • If you’ve already completed the actions above, try your gateway initialization again after X hours where X is the time zone difference between your Controller and the UTC/GMT. For example, if you change the Controller time zone to Australia/Sydney (AEST) and then upload the Gateway CA Certificate at 09:00, you need to wait until 20:00 (09:00 plus the 11:00-hour offset) to successfully create/replace/rollback any cloud gateway.

AVX-36492

When single-IP HA (High Availability) is enabled on Aviatrix Gateways and the HA gateway goes up, a bug may cause the security group to not be added to the gateway. To resolve this issue, manually add the security group to the HA gateway.

AVX-37895

(Azure) Gateway deployment in Azure can fail if the Network Security Group (NSG) is not applied on the Controller’s Network Interface Card (NIC). If this happens, use one of two methods to resolve the issue:

  • Disable and reenable the Controller Security Group management. This requires a disruption in traffic.

  • In Azure, locate the NSG, which uses the format AVX-SG-<Pubic -IP>, and attach this NSG manually to the Controller’s NIC. This method does not require disruption in traffic.

AVX-43180

If your Controller is using an outdated image, a software upgrade may fail. If your Controller software upgrade fails, please contact the Aviatrix Support team for assistance.

Deprecated Features in Aviatrix Release 7.1.1710

AVX-31334 - The Transitive Peering feature is deprecated. This feature’s functionality will be replaced by Aviatrix Multicloud Transit. Aviatrix recommends deleting Transitive Peerings from your account, and then upgrading your Controller.

The Sumo Logic logging integration, Logstash logging integration, and Splunk logging integrations are deprecated and removed in this release. Instead, use rsyslog to integrate with external logging systems.

AVX-36220 - The Change Timezone button in the Controller will be removed. This button will be removed because it caused discrepancies in log timestamping. The Controller always operates in UTC (Coordinated Universal Time). If this feature was enabled and a new time zone selected, trace logs would no longer be associated with the UTC time zone, which added complexity to troubleshooting. Other timezone-related functions like scheduling were also affected during the timezone change period.

A banner will be added in your Controller to notify you about this upcoming change. This change has no functional impact on the Controller or gateways. No action is required.

Note: Log exporting from the Controller will have timestamps with the UTC timezone. You can edit or convert time zone data through your log collector.