<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:apigee-x-release-notes</id>
  <title>Apigee X - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/apigee-x-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2026-04-06T00:00:00-07:00</updated>

  <entry>
    <title>April 06, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#April_06_2026</id>
    <updated>2026-04-06T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#April_06_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>On April 6th, 2026, we released an updated version of Apigee.</p>
<p>This change introduces the new <code>apigee.coreServiceAgent</code> IAM role for
Apigee. <strong>Effective immediately, use <code>apigee.coreServiceAgent</code> instead of the
<code>apigee.serviceAgent</code> role.</strong></p>
<p>For information on the new role, see
<a href="https://docs.cloud.google.com/iam/docs/roles-permissions/apigee#apigee.coreServiceAgent"><code>apigee.coreServiceAgent</code></a>.</p>
<h3>Fixed</h3>
<p><strong>Correction to <a href="#April_02_2026">April 2, 2026 release note: Deployment disruption for Apigee Drupal Portal via Google Cloud Marketplace</a></strong></p>
<p>For the deployment disruption announced on April 2, the announcement noted that deployment and management functionality using Google Cloud Deployment Manager would definitely be unavailable during the transition. This statement is incorrect. The functionality <em>might</em> be unavailable.</p>
<p>See the <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#495305258">Known issue</a> for more information.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 02, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#April_02_2026</id>
    <updated>2026-04-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#April_02_2026"/>
    <content type="html"><![CDATA[<h3>Breaking</h3>
<p><strong>Deployment disruption for Apigee Drupal Portal via Google Cloud Marketplace</strong></p>
<p>Google Cloud Deployment Manager was deprecated as of March 31, 2026. We are currently transitioning the Apigee Drupal Portal Marketplace solution to use Infrastructure Manager. During this transition period, some deployment and management functionalities are unavailable.</p>
<p><strong>Impact:</strong></p>
<ul>
<li><strong>New Deployments:</strong> Starting April 1, 2026, attempting to deploy a new Apigee Drupal Portal instance using the "Deploy" button on the Google Cloud Marketplace will fail.</li>
<li><strong>Existing Deployments:</strong> Your underlying resources (such as VMs and Cloud SQL databases) are unaffected and will continue to run normally. However, you can no longer use Deployment Manager-based features to manage the deployment via the Marketplace UI or the <code>gcloud deployment-manager</code> tool.</li>
</ul>
<p><strong>Workaround &amp; Resolution:</strong>
Any configuration changes or management tasks must be performed directly on the individual Google Cloud resources (Compute Engine, Cloud SQL, etc.) rather than through the Marketplace UI.</p>
<p>We are actively working to release the updated Infrastructure Manager-based solution.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 31, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#March_31_2026</id>
    <updated>2026-03-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#March_31_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>General Availability (GA) launch of Model Context Protocol (MCP) in Apigee</strong></p>
<p>With this release, Model Context Protocol (MCP) in Apigee is <a href="https://docs.cloud.google.com/products#product-launch-stages">generally available</a>, enabling you to expose your Apigee APIs as MCP tools to agentic applications.</p>
<p>Any MCP client that supports remote MCP endpoints over HTTP/S can access these tools. Because the endpoints are managed, you don't need to install or manage local MCP servers, remote MCP servers, or additional infrastructure to enable agentic applications to access your services.</p>
<p>MCP in Apigee is available for Subscription, Pay-as-you-go, and Evaluation organizations, including organizations with Data Residency and VPC Service Controls enabled.</p>
<p>For more information on using MCP in Apigee, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-mcp/apigee-mcp-overview">MCP in Apigee overview</a>.</p>
<h3>Change</h3>
<p><strong>Updated MCP server target endpoint for MCP Discovery Proxies</strong></p>
<p>With the GA launch of Model Context Protocol (MCP) in Apigee, the structure of the MCP server target endpoint for MCP Discover Proxies has changed to <code>ORG_NAME.mcp.apigee.internal</code>.</p>
<p>Private preview customers using the previous format (<code>mcp.apigee.internal</code>) are encouraged to update their proxies to reflect the new structure.  Existing endpoints using the old format will continue to work, but new endpoints will use the new structure.</p>
<h3>Announcement</h3>
<p>On March 31st, 2026, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p><strong>Enhanced OAS server URL path handling for MCP in Apigee</strong></p>
<p>With this feature enhancement, your OpenAPI specification (OAS) configurations behave exactly
 as defined in the OAS standard, automatically combining the <code>server.url</code> base path value with individual operation paths.</p>
<p>For example, a server URL of<code>https://example.com/api/v1</code> paired with a path of <code>/users</code> will now correctly route to <code>https://example.com/api/v1/users</code> without additional manual intervention.</p>
<p>If you previously prepended base paths to your OAS paths entries, remove the path segment from your <code>servers.url</code> field to prevent
duplication.  For example, change <code>https://example.com/api/v1</code> to <code>https://example.com</code>.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/apigee-mcp/apigee-mcp-quickstart#create-an-openapi-3.0.x-specification-describing-your-api-operations">Create an OpenAPI 3.0 specification</a>.</p>
<h3>Issue</h3>
<p><strong>Known Issue 496552286: Deployment fails for MCP Discovery Proxies in regions with capacity limitations.</strong></p>
<p>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues">Apigee known issues</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 26, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#March_26_2026</id>
    <updated>2026-03-26T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#March_26_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On March 26th, 2026, we released an updated version of Apigee (1-17-0-apigee-6).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>495897297, 495909767</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33210">CVE-2026-33210</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">2026-33186</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 19, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#March_19_2026</id>
    <updated>2026-03-19T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#March_19_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On March 19th, 2026, we began maintenance updates of Apigee instances <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance-windows">configured for maintenance windows</a>.</p>
<p>If you set a preferred window for maintenance for your instance, and your instance version is
below <strong>1-16-0-apigee-6</strong>, your instance will be updated to <strong>1-16-0-apigee-6</strong> within the
next seven to 21 days. A notification containing the expected date of upgrade will be sent within the next two business days.</p>
<aside class="note">Note: Instances that meet either of the following two criteria will <b>not</b> be updated:
<ul>
<li>Your instance has a DNS misconfiguration, as described in <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues">Known Issue 445936920</a>.</li>
<li>Your instance uses an Apigee Java Library that has been removed, as described in <a href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025">Apigee release notes dated October 16, 2025</a>.</li>
</ul></aside>
<p>For more information on participating in scheduled maintenance windows, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance">Maintenance overview</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/system-administration/maintenance-windows">Manage Apigee instance maintenance windows</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 17, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#March_17_2026</id>
    <updated>2026-03-17T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#March_17_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On March 17th, 2026, we released an updated version of Apigee (1-17-0-apigee-5).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>March 10, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#March_10_2026</id>
    <updated>2026-03-10T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#March_10_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On March 10th, 2026, we released an updated version of Apigee (1-17-0-apigee-4).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>483769763, 481735779</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24051">CVE-2026-24051</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25765 ">CVE-2026-25765 </a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 24, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#February_24_2026</id>
    <updated>2026-02-24T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#February_24_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On February 24th, 2026, we released an updated version of Apigee (1-17-0-apigee-3).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>470375542</strong></td>
<td>Fixed a memory leak which could result in a spike in 503 responses with <code>no_healthy_upstream</code> messages.</td>
</tr>
<tr>
<td><strong>480997525</strong></td>
<td>Applied a fix for proxy calls failing with <code>The URI contains illegal characters</code> error after Netty upgrade.</td>
</tr>
<tr>
<td><strong>485595627</strong></td>
<td>Fixed an issue resulting in TLS handshake errors.</td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>481735779, 457138941, 471232237</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li></ul></p></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 13, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#February_13_2026</id>
    <updated>2026-02-13T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#February_13_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On February 13, 2026, we published a security bulletin for Apigee.</p>
<h3>Security</h3>
<p>A vulnerability was identified in the Apigee platform (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13292">CVE-2025-13292</a>) that could have allowed a malicious actor with administrative or developer-level permissions in their own Apigee environment to elevate privileges and access cross-tenant data.</p>
<p><strong>Security bulletin published: <a href="https://docs.cloud.google.com/apigee/docs/security-bulletins/security-bulletins#gcp-2026-010">GCP-2026-010</a></strong></p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 10, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#February_10_2026</id>
    <updated>2026-02-10T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#February_10_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<aside class="note"><strong>Note:</strong><span> This release was rolled back to address an issue. See the entry for <a href="https://docs.cloud.google.com/apigee/docs/release-notes#February_24_2026">February 24th, 2026</a> for the updated version number and payload.</span></aside>
<p>On February 10, 2026, we released an updated version of Apigee (1-17-0-apigee-2).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<aside class="note"><strong>Note:</strong><span>  This note is incorrect - these security fixes, including the removal of support for the <code>TLS_RSA</code> cipher suites, were rolled back. See the entry for <a href="https://docs.cloud.google.com/apigee/docs/release-notes#February_24_2026">February 24th, 2026</a> for the updated version number and payload.</span></aside>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>481735779, 457138941, 471232237</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities: <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li></ul></p></td>
</tr>
<tr>
<td><strong>470375542</strong></td>
<td>Fixed a memory leak which could result in a spike in 503 responses with <code>no_healthy_upstream</code> messages.</td>
</tr>
<tr>
<td><strong>480997525</strong></td>
<td>Applied a fix for proxy calls failing with <code>The URI contains illegal characters</code> error after Netty upgrade.</td>
</tr>
<tr>
<td><strong>485543125</strong></td>
<td>Apigee no longer supports the following <code>TLS_RSA</code> cipher suites:<ul><li><code>TLS_RSA_WITH_AES_256_GCM_SHA384</code></li><li><code>TLS_RSA_WITH_AES_128_GCM_SHA256</code></li><li><code>TLS_RSA_WITH_AES_256_CBC_SHA256</code></li><li><code>TLS_RSA_WITH_AES_128_CBC_SHA256</code></li><li><code>TLS_RSA_WITH_AES_256_CBC_SHA</code></li><li><code>TLS_RSA_WITH_AES_128_CBC_SHA</code></li></ul></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>February 06, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#February_06_2026</id>
    <updated>2026-02-06T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#February_06_2026"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>477294854, 477297075, 477297324, 470988850, 471662549</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<p>On February 6th, 2026, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>February 02, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#February_02_2026</id>
    <updated>2026-02-02T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#February_02_2026"/>
    <content type="html"><![CDATA[<h3>Issue</h3>
<p><strong>Known Issue:</strong> <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#480997525">480997525 - Proxy calls fail with <code>The URI contains illegal characters</code> error after Netty upgrade</a></p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 21, 2026</title>
    <id>tag:google.com,2016:apigee-x-release-notes#January_21_2026</id>
    <updated>2026-01-21T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#January_21_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On January 21st, 2026, we released an updated version of Apigee (1-17-0-apigee-1).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>433999957</strong></td>
<td><strong>Implemented full TLS validation when fetching JWKS from remote URIs</strong></td>
</tr>
<tr>
<td><strong>467762922</strong></td>
<td><strong>Quota enforcement logic for Server-Sent Events (SSE) updated</strong> <p>Quotas for SSE are now calculated strictly for events containing explicit token counts. The quota enforcement logic skips SSE that lack token usage metadata.</p></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong></td>
</tr>
</tbody>
</table>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>471001896, 469829527, 470953822, 462478248, 474415498</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161">CVE-2025-68161</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-67735">CVE-2025-67735</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872</a></li></ul></p></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 29, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#December_29_2025</id>
    <updated>2025-12-29T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#December_29_2025"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>The Apigee Extension Processor provisioning API is available</strong></p>
<p>Apigee Extension Processor customers can now use the Extension Processor provisioning API to create traffic extensions.
For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/service-extensions/extension-processor-quickstart#create-traffic-ext">Get started with the Apigee Extension Processor</a></p>
<h3>Announcement</h3>
<p>On December 29th, 2025, we released an updated version of Apigee.</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>December 23, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#December_23_2025</id>
    <updated>2025-12-23T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#December_23_2025"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><b>New Apigee policies for LLM Token Management are now Generally Available (GA)</b></p>
<p>Two new Apigee policies for managing Large Language Model (LLM) workloads are now Generally Available (GA). These policies provide fine-grained control and rate-limiting for AI application traffic as follows:</p>
<ul>
<li><b>LLMTokenQuota policy</b>
<ul>
<li>This policy monitors and enforces limits on <b>LLM response token usage</b> to control overall LLM expenditure and resource allocation.</li>
<li>It can be configured with <code>&lt;CountOnly&gt;</code> (placed in the response flow to track tokens consumed) or <code>&lt;EnforceOnly&gt;</code> (placed in the request flow to block calls if the quota is exceeded).</li>
<li>If the quota is reached, Apigee returns an <code>HTTP 429</code> (Too Many Requests) status code.</li>
<li>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/llm-token-quota-policy">LLMTokenQuota Policy</a>.</li>
</ul>
</li>
<li><b>PromptTokenLimit policy</b>
<ul>
<li>This policy provides a token-based rate-limiting mechanism analogous to the SpikeArrest policy, specifically for the tokens consumed by the user's prompt message.</li>
<li>It calculates the prompt's token count using the widely adopted <code>o200k_base</code> encoding technique.</li>
<li>If the configured token rate limit is exceeded, the incoming request is blocked, returning an <code>HTTP 429</code> (Too Many Requests) status code.</li>
<li>For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/prompt-token-limit-policy">PromptTokenLimit policy</a>.</li>
</ul>
</li>
</ul>
<p><b>Related documents:</b></p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-ai-token-policies">Get started with Apigee AI token policies</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/rate-limiting">Rate-limiting</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/comparing-quota-and-spike-arrest-policies">Comparing rate-limiting policies</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/publish/create-api-products">Managing API products</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/llm-token-quota-policy">LLMTokenQuota policy</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/prompt-token-limit-policy">PromptTokenLimit policy</a></li>
</ul>
<h3>Announcement</h3>
<p>On December 23, 2025, we released an updated version of Apigee.</p>
<aside class="note"><b>Note:</b> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</aside>
]]>
    </content>
  </entry>

  <entry>
    <title>December 10, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#December_10_2025</id>
    <updated>2025-12-10T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#December_10_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On December 10th, 2025, we released an updated version of Apigee (1-16-0-apigee-6).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>458417250</strong></td>
<td><strong>Multiple authorization headers</strong> <p>Fixed issue where adding multiple authorization headers would cause Apigee to return a <code>500</code> error.</p></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>December 04, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#December_04_2025</id>
    <updated>2025-12-04T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#December_04_2025"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Mask KVM values</strong></p>
<p>You can now turn on key value map (KVM) masking to mask values with asterisks (*****).
For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/cache/key-value-maps#aboutmasking">About KVM masking</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>November 17, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#November_17_2025</id>
    <updated>2025-11-17T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#November_17_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On November 17, 2025, we released an updated version of Apigee (1-16-0-apigee-5).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Feature</h3>
<p><strong>Secure and validate documents using WS-Security with X.509 certificates</strong><br/><br/>You can now secure and validate SOAP documents using WS-Security with X.509 certificates using crypto object methods. See <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/javascript-object-model#cryptoobjectreference-cryptowsSecRsaSign">Secure SOAP documents using WS-Security with X.509 certificates</a> and <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/javascript-object-model#cryptoobjectreference-cryptowsSecRsaValidate">Validate SOAP documents using WS-Security with X.509 certificates</a>.</p>
<h3>Change</h3>
<p><strong>New field available in the Apigee Organization API</strong></p>
<p>With this release, a new field is added to the <a href="https://docs.cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations#Organization">Apigee Organization API</a>.  The new <code>caCertificates</code> (plural) field returns the value of the original CA certificate field and can hold additional values. The original <code>caCertificate</code> (singular) field is deprecated.</p>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>454672970</strong></td>
<td><strong>Added strict input validation to the <code>SetIntegrationRequest</code> policy</strong></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>October 31, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_31_2025</id>
    <updated>2025-10-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_31_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On October 31, 2025, we released an updated version of Apigee (1-16-0-apigee-4).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>452621774, 452381632, 441266643, 448498138</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53864">CVE-2025-53864</a><p>Updated Nimbus JWT library from 9.37.2 to 9.37.4, which introduced changes in behavior including changes to error string verbiage.</p></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8916">CVE-2025-8916</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115">CVE-2025-5115</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53864">CVE-2024-40094</a></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>448647917</strong></td>
<td><strong>Fixed a issue where non-SSL connections through a forward proxy could be improperly shared.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security, infrastructure, and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>October 29, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_29_2025</id>
    <updated>2025-10-29T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_29_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On October 29, 2025, we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>Support for API-product scoped quotas</strong></p>
<p>You can now set quotas at the API product level to limit the number of requests
all API proxies in the API product can process within a specified time frame.
See
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/quota-policy#configuring-the-quota-policy-to-use-api-product-quota-settings">Configuring the quota policy to use API product quota settings</a>
for information and instructions.</p>
<p>NOTE: API product-scoped quotas are not supported in Apigee hybrid
  at this time.</p>
<h3>Feature</h3>
<p><strong>Enhanced Validation for API products</strong></p>
<p>Heightened validation logic for creating and updating API products is now available. Apigee now explicitly verifies proxy and environment resources against your organization when creating and updating API products.</p>
<p>Please ensure that all referenced resources exist and are correctly associated with your organization to avoid validation errors.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 27, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_27_2025</id>
    <updated>2025-10-27T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_27_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On October 27, 2025, we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>Introduction of the <code>target.evaluated.url</code> flow variable</strong></p>
<p>This release includes a new flow variable, <code>target.evaluated.url</code>,
which should be used instead of the <code>target.url</code> flow variable in
cases when the URL is dynamically constructed based on user input.</p>
<p>For more information, see the
<a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/variables-reference#target">target flow variables</a>
documentation.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 16, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_16_2025</id>
    <updated>2025-10-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_16_2025"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>440419558, 433759657</strong></td>
<td><strong>Security fix for Apigee infrastructure.</strong> <p>This addresses the following vulnerabilities:<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868</a></li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48924">CVE-2025-48924</a></li><aside class="note"><b>Note</b>: This fix updates a Java library that is included in Apigee.  Reliance on Java libraries that are included with Apigee is not supported. Those libraries are for Apigee product functionality only, and there's no guarantee that a library will be available from release to release. For more information, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/java-callout-policy#Restrictions">Restrictions</a>.</aside></ul></p></td>
</tr>
<tr>
<td><strong>443902061</strong></td>
<td><strong>Security fix for Apigee infrastructure</strong> <p>This addresses the following vulnerability:<ul><li>CVE-2025-13292<p>Fixed an issue with improper access control that resulted in cross-tenant analytics modification and access to log data.</p></li></ul></p></td>
</tr>
</tbody>
</table>
<h3>Fixed</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>442501403</strong></td>
<td><strong>Fixed an issue that caused incorrect target latency metrics in Apigee Analytics when a TargetEndpoint is configured with a &lt;LoadBalancer&gt;.</strong></td>
</tr>
<tr>
<td><strong>437999897</strong></td>
<td><strong>Reduced the log level for failed geo IP lookups to address excessive log messages for private IP addresses.</strong></td>
</tr>
<tr>
<td><strong>436323210</strong></td>
<td><strong>Fixed ingress cert keys to allow both <code>tls.key</code>/<code>key</code> and <code>tls.crt</code>/<code>cert</code>.</strong></td>
</tr>
<tr>
<td><strong>438192028</strong></td>
<td><strong>Updated the geolocation database to mitigate stale IP-to-location mappings.</strong></td>
</tr>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<p>On October 16, 2025, we released an updated version of Apigee (1-16-0-apigee-3).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>October 14, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_14_2025</id>
    <updated>2025-10-14T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_14_2025"/>
    <content type="html"><![CDATA[<h3>Deprecated</h3>
<p><strong>Removal of deprecated Gemini Code Assist <code>@Apigee</code> tool.</strong></p>
<p>The Gemini Code Assist <code>@Apigee</code> tool is shut down as of October 14, 2025.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/deprecations/apigee-tool">Gemini Code Assist @Apigee tool deprecation</a> for information.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 09, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_09_2025</id>
    <updated>2025-10-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_09_2025"/>
    <content type="html"><![CDATA[<h3>Deprecated</h3>
<p><strong>Deprecation of the Gemini Code Assist <code>@Apigee</code> tool.</strong></p>
<p>The Gemini Code Assist <code>@Apigee</code> tool is deprecated and will be shut down as of October 14, 2025.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/deprecations/apigee-tool">Gemini Code Assist @Apigee tool deprecation</a> for information.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>October 07, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#October_07_2025</id>
    <updated>2025-10-07T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#October_07_2025"/>
    <content type="html"><![CDATA[<h3>Breaking</h3>
<p><strong>Previously unreported customer DNS misconfigurations now result in DNS errors</strong></p>
<p>Apigee removed the automatic DNS fallback functionality that was in 1-16-0-apigee-2. This removal surfaces customer DNS misconfigurations that previously did not show as DNS errors.</p>
<p>See <a href="https://docs.cloud.google.com/apigee/docs/release/known-issues#445936920">Known Issue 445936920</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 12, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#September_12_2025</id>
    <updated>2025-09-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#September_12_2025"/>
    <content type="html"><![CDATA[<h3>Security</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Security fix for <code>apigee-runtime</code>.</strong></td>
</tr>
</tbody>
</table>
<h3>Announcement</h3>
<p>On September 12, 2025, we released an updated version of Apigee (1-16-0-apigee-2).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
]]>
    </content>
  </entry>

  <entry>
    <title>September 11, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#September_11_2025</id>
    <updated>2025-09-11T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#September_11_2025"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p><strong>API hub navigation update</strong></p>
<p>The <strong>API hub</strong> section is now moved to the top level of the Apigee left navigation menu. This change improves discoverability and access to the API hub features.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>September 09, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#September_09_2025</id>
    <updated>2025-09-09T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#September_09_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On September 9, 2025, we released an updated version of Apigee (1-16-0-apigee-1).</p>
<aside class="note"><strong>Note:</strong><span> Rollouts of this release began today and may take four or more business days to be completed across all Google Cloud zones. Your instances may not have the features and fixes available until the rollout is complete.</span></aside>
<h3>Change</h3>
<table>
<thead>
<tr>
<th>Bug ID</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>N/A</strong></td>
<td><strong>Updates to security infrastructure and libraries.</strong></td>
</tr>
</tbody>
</table>
]]>
    </content>
  </entry>

  <entry>
    <title>September 04, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#September_04_2025</id>
    <updated>2025-09-04T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#September_04_2025"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>On September 4, 2025, we released an updated version of Apigee.</p>
<h3>Feature</h3>
<p><strong>Apigee policies for LLM/GenAI workloads are Generally Available (GA)</strong></p>
<p>Four new Apigee policies supporting LLM/GenAI workloads are now <a href="https://cloud.google.com/products#product-launch-stages">GA</a>:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/semantic-cache-lookup-policy">SemanticCacheLookup policy</a> </li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/semantic-cache-populate-policy">SemanticCachePopulate policy</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/sanitize-user-prompt-policy">SanitizeUserPrompt</a></li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/reference/policies/sanitize-user-prompt-policy">SanitizeModelResponse</a> </li>
</ul>
<p>The Apigee semantic caching policies enable intelligent response reuse based on semantic similarity. Using these policies in your Apigee API proxies can minimize redundant backend API calls, reduce latency, and lower operational costs. With this release, the semantic caching policies support URL templating, enabling the use of variables for AI model endpoint values.</p>
<p>The Model Armor policies protect your AI applications by sanitizing user prompts to and responses from large language models (LLMs). Using these policies in your Apigee API proxies can mitigate the risks associated with LLM usage by leveraging Model Armor to detect prompt injection, prevent jailbreak attacks, apply responsible AI filters, filter malicious URLs, and protect sensitive data.</p>
<p>For more information on using these policies in your Apigee API proxies, see:</p>
<ul>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-semantic-caching-policies">Get started with semantic caching policies</a> </li>
<li><a href="https://docs.cloud.google.com/apigee/docs/api-platform/tutorials/using-model-armor-policies">Get started with Apigee Model Armor policies</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>September 03, 2025</title>
    <id>tag:google.com,2016:apigee-x-release-notes#September_03_2025</id>
    <updated>2025-09-03T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/apigee/docs/release/release-notes#September_03_2025"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Apigee Server-Sent Events (SSE) and EventFlows are supported for use with the Apigee Extension Processor.</strong> </p>
<p>The Apigee SSE feature enables continuous response streaming from server-sent event (SSE) endpoints to clients in real time. To learn more about this feature, see <a href="https://docs.cloud.google.com/apigee/docs/api-platform/develop/server-sent-events">Streaming server-sent events</a>.</p>
<p>The Apigee Extension Processor is a <a href="https://docs.cloud.google.com/service-extensions/docs/overview#integration-lb">traffic extension</a>  that lets you use Cloud Load Balancing to send callouts from the data processing path of the application load balancer to the Apigee Extension Processor.  To learn more, see the <a href="https://docs.cloud.google.com/apigee/docs/api-platform/service-extensions/extension-processor-overview">Apigee Extension Processor overview</a>.</p>
<h3>Announcement</h3>
<p>On September 3, 2025, we released an updated version of Apigee.</p>
]]>
    </content>
  </entry>

</feed>
