# November 2023

## What's new

### [<mark style="color:blue;">**Proxy Protocol Support for Application and Network Load Balancers**</mark>](https://docs.ionos.com/sections-test/guides/network-services/application-load-balancer/how-tos/create-target-groups#create-a-target-group)

{% hint style="success" %}
**November 28**

[<mark style="color:blue;">Application Load Balancers (ALB)</mark>](https://docs.ionos.com/sections-test/guides/network-services/application-load-balancer/how-tos/setup-alb#set-up-http-rules) and [<mark style="color:blue;">Network Load Balancers (NLB)</mark>](https://docs.ionos.com/sections-test/guides/network-services/network-load-balancer/configure-nlb#create-a-target) now support **Proxy Protocol** versions to send additional connection information, such as the source and destination. The **Targets** associated with your ALB and NLB can now be configured to accept incoming traffic using the **Proxy Protocol**.
{% endhint %}

### [<mark style="color:blue;">**Advisory on Escalation of Privilege for Some Intel Processors (CVE-2023-23583)**</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-23583)

{% hint style="success" %}
**November 23**

Information on security advisory for CVE-2023-23583, also known as **Escalation of privilege for some Intel processors** vulnerability, is available on the documentation portal. This vulnerability is based on an unexpected behavior for some Intel(R) processors that may allow an authenticated user to potentially enable escalation of privilege and information disclosure or denial of service via local access.
{% endhint %}

### [<mark style="color:blue;">**Logging Service General Availability**</mark>](https://docs.ionos.com/sections-test/guides/observability/logging-service)

{% hint style="success" %}
**November 15**

Logging Service is now in the General Availability (GA) phase. You can create logging pipeline instances on the available locations to gather logs from multiple sources. You may also programmatically manage your logging pipelines via the API. To learn more about what changed during the transition from the [<mark style="color:blue;">Early Access (EA)</mark>](https://docs.ionos.com/cloud/support/general-information/glossary-of-terms#early-access-ea) phase to the GA phase, see [<mark style="color:blue;">FAQ</mark>](https://docs.ionos.com/sections-test/guides/observability/logging-service/logging-service-faqs#what-changed-in-the-product-during-its-transition-from-early-access-to-general-availability).
{% endhint %}

## Documentation updates

### [<mark style="color:blue;">**Cross Connect**</mark>](https://docs.ionos.com/sections-test/guides/network-services/cross-connect)

{% hint style="success" %}
**November 13**

**Cross Connect** is now available as an [<mark style="color:blue;">**Early Access (EA)**</mark>](https://docs.ionos.com/cloud/support/general-information/glossary-of-terms#early-access-ea) feature on a restricted early access basis. To access this feature, please contact your sales representative or [<mark style="color:blue;">customer support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information). With the enhanced feature, you can connect multiple [<mark style="color:blue;">Virtual Data Centers (VDCs)</mark>](https://docs.ionos.com/cloud/support/general-information/glossary-of-terms#virtual-data-center-vdc) seamlessly in the same region and under the same contract. Connections can be established via a private LAN only, thus enabling consistent and reliable data transfer and ensuring seamless connections, reduced latency, and minimized addressing discrepancies. Cross Connects are flexible, meaning you can easily modify the existing setup by effortlessly adding or deleting existing data centers or modifying the associated data centers.
{% endhint %}

### [<mark style="color:blue;">**Advisory on AMD Disclosed Vulnerability (CVE-2023-20569)**</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-20569)

{% hint style="success" %}
**November 1**

Information on security advisory for CVE-2023-20569, also known as **Return Form Procedure (RET) Speculation** or **Inception** is available on the documentation portal. This vulnerability is reported by AMD as a sensitive information disclosure due to speculative side-channel attacks.
{% endhint %}
