Introducing Edgio Applications v7Find out what's new.
Edgio
Edgio

Upgrading to Edgio Applications Version 7

The Edgio Applications platform consists of the following products:
  • Edgio Performance improves your site’s performance and speeds up your development lifecycle.
  • Edgio Security provides robust, multi-layered Web Application and API Protection.
  • Edgio Sites provides optimal performance and development efficiency to your headless Jamstack applications.
Upgrading to Edgio Applications to version 7 involves the following steps:
  1. Layer0 (Version 4 and Earlier): Rename layer0.config.js and Edgio packages.
  2. Version 5 and Earlier: Upgrade Node.js to version 16.x and update your application to be compatible with Node.js 16.x.
  3. Create an Edgio account.
  4. Create an organization.
  5. Create a property.
  6. Define environments.
  7. Upgrade the Edgio CLI.
  8. Upgrade Edgio packages.
  9. Update your CDN-as-code configuration to reflect changes introduced in version 7.
  10. Image Optimization
  11. Real User Monitoring (RUM) Token
  12. Build your Edgio properties.
  13. Deploy to Edgio
  14. Configure your Firewall
  15. Update your DNS

Step 1: Rename layer0 Components

This section only applies to Edgio Applications 4 and earlier. Skip this step if you are using a later version.
Edgio Applications now uses Edgio branding for our CLI, packages, and a configuration file. Additionally, our service will no longer modify duplicate query string parameters.
Perform the following steps for each of your properties:
  1. Rename layer0.config.js to edgio.config.js.
    Edgio Applications version 5+ ignores the layer0.config.js configuration file.
  2. Rename all references to Edgio packages from @layer0 to @edgio.
    • package.json: In addition to renaming the Edgio packages, you should also set their version to ^7.0.0.
      For example, the following excerpt from a package.json file references several @layer0 packages:
      JSONpackage.json version 4 and earlier
      1...
      2 "dependencies": {
      3 "@layer0/rum": "4.18.1",
      4 },
      5 "devDependencies": {
      6 "@layer0/cli": "4.18.1",
      7 "@layer0/core": "4.18.1",
      8 "@layer0/devtools": "4.18.1",
      9...
      You should update all of these references as shown below.
      JSONpackage.json version 7
      1...
      2 "dependencies": {
      3 "@edgio/rum": "^7.0.0",
      4 },
      5 "devDependencies": {
      6 "@edgio/cli": "^7.0.0",
      7 "@edgio/core": "^7.0.0",
      8 "@edgio/devtools": "^7.0.0",
      9...
    There may be additional @layer0/* dependencies listed in your site’s package.json file that are not listed above. Update those dependencies to @edgio/*. After which, there should be no remaining @layer0/* references in the file.
    • Import Statements: Rename Edgio packages within each import statement from @layer0 to @edgio. You can find these import statements within various files, such as routes.ts, sw/service-worker.js, and your Next and Nuxt configuration files.
      For example, the following excerpt from a routes.ts file imports various @layer0 packages:
      JavaScriptroutes.ts version 4 and earlier
      1import {isProductionBuild} from '@layer0/core/environment';
      2import {Router} from '@layer0/core/router';
      3import {nextRoutes} from '@layer0/next';
      4...
      You should update all of these import statements as shown below.
      JavaScriptroutes.ts version 7
      1import {isProductionBuild} from '@edgio/core/environment';
      2import {Router} from '@edgio/core/router';
      3import {nextRoutes} from '@edgio/next';
      4...
    • edgio.config.js: If you are using an Edgio connector, then you should also rename the connector defined in the connector property.
      For example, you should update connector: '@layer0/next' to connector: '@edgio/next'.
    • Next app: Rename all Edgio references within your next.config.js from @layer0 to @edgio.
      For example, the following excerpt from a next.config.js file contains several @layer0 references:
      JavaScriptnext.config.js version 4 and earlier
      1const { withServiceWorker } = require('@layer0/next/sw')
      2const withLayer0 = require('@layer0/next/withLayer0')
      3module.exports = withLayer0(
      4...
      You should update all of these references as shown below.
      JavaScriptnext.config.js version 7
      1const withEdgio = require('@edgio/next/withEdgio')
      2module.exports = withEdgio(
      3...
      Version 7 no longer requires the withServiceWorker function to be explicitly defined within the next.config.js file and therefore it may be safely removed.
  3. Install the dependencies defined in the previous step.
    Bash
    1npm install
    This should generate an updated dependency tree in your package-lock.json or yarn.lock file. Be sure to commit these changes.
  4. Update all references to the Edgio CLI within your package.json scripts from 0 | layer0 to either edg or edgio.
  5. Exclude build artifacts from being tracked in version control by updating your .gitignore file to:
    Bash.gitignore
    1...
    2# Edgio generated build directory
    3.edgio

Step 2: Upgrade to Node.js 16.x

This section only applies to Edgio Applications version 5.x and earlier. If you are using version 6.x, proceed to the Create an Edgio account step.
Edgio Applications version 6+ runs your apps in Node.js v16. Therefore, we strongly recommend that you use Node.js v16.x when developing your web application.
Learn how to use nvm to install Node.js v16.x.
Once you are using Node.js v16, update your application code to be compatible with Node.js v16.
If package.json or .npmrc explicitly sets the Node.js engine version to 14.x, then you will need to update it to 16.x.
Additionally, check your CI/CD environment for Node.js version settings. If your workflow targets Node.js 14.x, then you will need to update your files and settings to target Node.js 16.x.

Step 3: Create an Edgio Account

Although you already have an existing account through app.layer0.co, you will need to sign up for a new account through edgio.app using the same email address, Google account, or Github account.

Step 4: Create an Organization

If the property being migrated belongs to a Layer0 team space, then you will need to recreate it within edgio.app.
  1. From the Edgio Console, click on the
    Menu
    icon next to your name and then click on Create an Organization.
    Space menu
  2. In the Organization Name option, assign a name to your organization (e.g., my-company) and then click Create an Organization.
    Add an Organization
  3. Invite the desired team members. Learn more.
If you are an enterprise customer, contact your account manager or our sales department at 1 (866) 200 - 5463 to upgrade your newly created organization.

Step 5: Create a Property

You now need to create your property within the Edgio Console.
  1. From the Edgio Console, determine where you will create a property.
    • Private Space: By default, the Edgio Console loads your private space. Access to a property created in your private space is restricted to your account. Proceed to the next step.
    • Organization: Load the desired organization by clicking the
      Menu
      icon that appears next to your name and then selecting the desired organization.
      Organization Selection
  2. Click + New Property.
  3. In the Property Name option, assign a unique name to this property.
  4. Add the hostname(s) (aka custom domains) through which your site will be delivered. These hostnames will be added to the production environment.
    1. From the Hostnames section, click + Add Hostname.
    2. Type the desired hostname (e.g., www.example.com).
    3. Repeat steps 1 and 2 as needed.
  5. Delete the default origin configuration (aka backend) by clicking the
    Delete
    icon that appears on the right-hand side of the Origin: web bar.
    Since you are taking advantage of CDN-as-code, you should define your origin configuration(s) within the edgio.config.js file instead of the Edgio Console. Information on how to define origin configurations is provided within the Update your CDN-as-code configuration step.
  6. Click Create Property.

Step 6: Define Environments

If the property being migrated uses multiple environments in version 6, then you should recreate those environments within your new property.
  1. Load the Environments page.
    1. From the Edgio Console, select the desired private space or organization.
    2. Select the desired property.
    3. From the left-hand pane, click Environments.
  2. Click + New Environment.
    environments
  3. In the Name option, specify a name for this environment. This name may consist of lowercase characters, numbers, dashes (-), and underscores (_).
  4. Determine deployment permissions through the Allow all organization members to deploy to this environment option.
    • Mark this option to allow all members of this organization to deploy to this environment.
    • Clear this option to restrict deployment to admins and the deploy token.
    limit environment
  5. Click Create.

Step 7: Upgrade the Edgio CLI

Install the latest version of our CLI.
By default, Edgio CLI v5.1+ collects usage and error reporting information to help improve our products. However, it omits personally identifiable information. Learn how to opt-out.
Bash
1npm install -g @edgio/cli

Step 8: Upgrade Edgio Packages

Update all Edgio packages to version 7 using the CLI.
Bash
1edgio use ^7.0.0
If you are upgrading from version 4 and earlier, then you should have already upgraded to version 7. In which case, the above step will indicate that your packages are up to date.

Step 9: Update your CDN-as-Code Configuration

Updating your CDN-as-code configuration to be compatible with version 7 involves:

edgio.config.js Settings

Update each property’s edgio.config.js as indicated below.
  • backends: The backends property has been replaced with the origins property.
    For example, we will assume that your backends property is configured as follows:
    JavaScriptedgio.config.js version 6 and earlier
    1backends: {
    2 origin: {
    3 // The domain name or IP address of the origin server
    4 domainOrIp: "origin.mysite.com",
    5
    6 // When provided, the following value will be sent as the host header when connecting to the origin.
    7 // If omitted, the host header from the browser will be forwarded to the origin.
    8 hostHeader: "www.mysite.com",
    9
    10 // Uncomment the following line if TLS is not set up properly on the origin domain and you want to ignore TLS errors
    11 // disableCheckCert: true,
    12
    13 // Overrides the default ports (80 for http and 443 for https) and instead use a specific port
    14 // when connecting to the origin
    15 // port: 1337,
    16 },
    17}
    The equivalent configuration in version 7 is shown below.
    JavaScriptedgio.config.js version 7
    1origins: [
    2 {
    3 // the key in backends
    4 name: 'origin',
    5
    6 // from hostHeader
    7 override_host_header: 'www.mysite.com',
    8
    9 // Version 7 introduces the ability to load balance across multiple origin hosts.
    10 // Previous versions only supported a single host per origin.
    11 hosts: [
    12 {
    13 scheme: 'https',
    14 location: [
    15 {
    16 // from domainOrIp
    17 hostname: 'origin.mysite.com',
    18
    19 // from port
    20 port: 443,
    21 },
    22 ],
    23 },
    24 ],
    25
    26 // In version 7, you may enable Server Name Indication (SNI) and define a SNI hint.
    27 // This configuration is essential when using multiple domains, since it allows us to
    28 // present to the browser a certificate with the correct name during the TLS handshake.
    29
    30 tls_verify: {
    31 use_sni: true,
    32 sni_hint_and_strict_san_check: 'www.mysite.com',
    33 },
    34
    35 // In version 7, the location of the shield (formerly referred to as the “global” PoP) is
    36 // configured in edgio.config.js instead of the Edgio Console
    37 // Previous versions only supported a single shield in a single region.
    38
    39 // If your Edgio cloud region is US East, use:
    40 shields: {us_east: 'DCD'},
    41
    42 // If your Edgio cloud region is US West, instead use:
    43 // shields: { us_west: 'SAC'},
    44
    45 // Uncomment the following lines to define a configuration equivalent to disableCheckCert: true
    46 // tls_verify: {
    47 // allow_self_signed_certs: true,
    48 // },
    49 },
    50];
  • includeNodeModules: If you previously set includeNodeModules: true, then you should define it within a serverless property:
    JavaScriptedgio.config.js version 7
    1serverless: {
    2 includeNodeModules: true,
    3},
  • includeFiles: If you previously set includeFiles, then you should define it within a serverless property:
    JavaScriptedgio.config.js version 6 and earlier
    1includeFiles: {
    2 'lang/**/*': true,
    3public/**/*: true
    4}
    JavaScriptedgio.config.js version 7
    1serverless: {
    2 include: ['lang/**/*', 'public/**/*'];
    3}
    Versions 6 and earlier supports mapping an input path to a different output path. Version 7 does not support this capability. For example, the following configuration is unsupported:
    JavaScriptedgio.config.js version 6 and earlier
    1includeFiles: {
    2 'lang/**/*': 'another/dir/in/layer0/lambda',
    3},

Routes

Edgio Applications version 7 introduces a new JSON syntax for defining the set of features that will be applied to a route.
For example, the following route sets a CDN caching policy:
JavaScriptedgio.config.js version 7
1new Router().get('/', {
2 caching: {
3 max_age: '1d', // cache for 1 day at the edge
4 },
5});
The equivalent route in version 6 and earlier is:
JavaScriptedgio.config.js version 6 and earlier
1new Router().get('/', ({cache}) => {
2 cache({edge: {maxAgeSeconds: 60 * 60 * 24}});
3});
In order to ease the transition to version 7, we provide limited support for legacy syntax. However, the following syntax is unsupported:
  • fallback(): The fallback() method, which is unsupported in version 7, executes when no other route is matched. If you are trying to proxy a request to a legacy origin, then you may do so by mapping the desired hostname to an origin configuration from within the Edgio Console.
    Deploying to Edgio automatically generates origin configurations from those defined within the edgio.config.js file. For this reason, we recommend that you map your hostnames to origins once you have deployed your property to Edgio. Learn more.
    You may also manually assign an origin configuration within a route through set_origin. If you want this route to act as a catch-all, then we recommend that you position it above your other routes.
    JavaScript
    1router.get('/', {
    2 origin: {
    3 set_origin: 'myorigin',
    4 },
    5});
  • catch(): The catch() method is used to handle errors, usually by displaying a static error page, redirecting the client to a different page, or retrying the request from a different origin. Each of these scenarios are handled differently in v7. See the Error Handling guide for more information.
  • destination(): The destination() method is unsupported in version 7 at this time. However, you may assign an origin to requests through set_origin and redirect requests through url_redirect. A future release will provide a streamlined version of traffic splitting through the Edgio Console.
  • ResponseWriter Methods: The following ResponseWriter methods are not fully supported in version 7:
    • updateResponseCookie
    • removeResponseCookie
    • addUpstreamResponseCookie
    • removeUpstreamResponseCookie
    • setUpstreamResponseHeader
    • updateUpstreamResponseHeader

Cache Key Customization

Customize the cache key through cache_key_rewrite instead of CustomCacheKey. Additionally, there are some subtle differences in our device classification implementation.
Method (Version 6 and Earlier)Variable (Version 7)
addIsBotUse %{wurfl_vcap_is_robot} instead. This variable returns true | false instead of 0 | 1.
addVendorUse %{wurfl_vcap_is_ios} and %{wurfl_vcap_is_android} instead. This variable returns true | false instead of apple | android | generic.
addBrowserUse %{wurfl_cap_mobile_browser} instead.
addDeviceUse %{wurfl_vcap_is_smartphone} and %{wurfl_cap_is_tablet} instead. These variables return true | false instead of 0 | 1.

Matching Behavior

Edgio Applications version 6 and earlier returns an immediate response upon encountering one of the following methods:
  • proxy
  • renderWithApp
  • serveStatic
  • dir
  • static
  • send
  • compute
  • redirect
  • appShell
  • serviceWorker
  • render
In version 7, all routes that match the request are executed. This may cause unexpected behavior when multiple routes provide conflicting instructions.
We will now examine how the following routes are handled by different versions of Edgio Applications.
JavaScriptroutes.js
1new Router()
2 .get(/, ({ proxy }) => proxy(‘web’))
3 .get(/:path*, ({ proxy }) => proxy(‘legacy’))
Version 6 and earlier will serve requests to / from the web origin. The second route will not take effect because the request satisfied the first proxy method. Version 7, on the other hand, matches both routes for requests to /. The first route sets the origin to web, while the second route immediately overrides the first route and sets the origin to legacy. As a result, all requests will be sent to the legacy origin.
Therefore, the origin in which routes are defined is important. We recommend placing routes with general criteria before routes with more detailed criteria.
For example, reversing the order of the routes ensures that requests to / are served from the web origin.
JavaScriptroutes.js
1new Router()
2 .get(/:path*, ({ proxy }) => proxy(‘legacy’))
3 .get(/, ({ proxy }) => proxy(‘web’))

Redirects

Edgio Applications version 6 and earlier allows you to set redirects by uploading a CSV file within the Edgio Console. This capability is unsupported in version 7. However, you may define redirects within your routes through the url_redirect feature.
JavaScriptroutes.js
1new Router()
2 .get('/home', {
3 // simple example with a static URL
4 url: {
5 url_redirect: {
6 destination: '/',
7 },
8 },
9 })
10 .get('/products/:id', {
11 // example with a path variable
12 url: {
13 url_redirect: {
14 syntax: 'path-to-regexp',
15 source: '/products/:id',
16 destination: '/p/:id',
17 },
18 },
19 });

Geolocation

Edgio Applications version 6 and earlier adds the following geo-location request headers to all requests sent to the origin:
  • x-0-geo-city
  • x-0-geo-country-code
  • x-0-geo-latitude
  • x-0-geo-longitude
  • x-0-geo-postal-code
In version 7, geolocation headers are not included by default. However, you may define them through HTTP variables as demonstrated below.
JavaScriptroutes.js
1new Router().match('/:path', {
2 headers: {
3 set_request_headers: {
4 'x-0-geo-country-code': '%{geo_country}',
5 'x-0-geo-city': '%{geo_city}',
6 'x-0-geo-latitude': '%{geo_latitude}',
7 'x-0-geo-longitude': '%{geo_longitude}',
8 'x-0-geo-postal-code': '%{geo_postal_code}',
9 },
10 },
11});

Device Classification

Edgio Applications version 6 and earlier adds the following device classification headers to all requests sent to the origin:
  • x-0-device
  • x-0-device-is-bot
  • x-0-vendor
  • x-0-browser
In version 7, device classification headers are not included by default. However, you may define them through HTTP variables as demonstrated below.
Header (Version 6 and Earlier)Variable (Version 7)
x-0-device-is-botUse %{wurfl_vcap_is_robot} instead. This variable returns true | false instead of 0 | 1.
x-0-vendorUse %{wurfl_vcap_is_ios} and %{wurfl_vcap_is_android} instead. These variables return true | false instead of apple | android | generic.
x-0-browserUse %{wurfl_cap_mobile_browser} instead.
x-0-deviceUse %{wurfl_vcap_is_smartphone} and %{wurfl_cap_is_tablet} instead. These variables return true | false instead of smartphone | tablet | mobile | desktop.
Example:
JavaScriptroutes.js
1new Router().match('/:path', {
2 headers: {
3 set_request_headers: {
4 'x-0-device-is-bot': '%{wurfl_vcap_is_robot}',
5 'x-0-geo-city': '%{geo_city}',
6 'x-0-geo-latitude': '%{geo_latitude}',
7 'x-0-geo-longitude': '%{geo_longitude}',
8 'x-0-geo-postal-code': '%{geo_postal_code}',
9 },
10 },
11});

Response Headers

Edgio Applications version 6 and adds the following headers with each response:
Header (Version 6 and Earlier)Header (Version 7)
x-0-caching-statusView additional information about the cache policy applied to the requested content through debug cache response headers. Information on how to enable debug cache response headers is provided below.
x-0-componentsNo equivalent header.
x-0-statusNo equivalent header.
x-0-tNo equivalent header.
x-0-versionx-edg-version
To enable debug cache response headers
  1. Add a route that enables debug cache response headers. A sample route is provided below.
    JavaScriptroutes.js
    1new Router().match('/:path', {
    2 headers: {
    3 debug_header: true,
    4 },
    5});
  2. Send the following header with each request: x-ec-debug:x-ec-cache,x-ec-cache-remote,x-ec-check-cacheable,x-ec-cache-key,x-ec-cache-state
    Learn more.

Step 10: Image Optimization

If you currently optimize images through opt.moovweb.net, then you should perform the following steps to update to the latest version:
  1. Enable the Optimize Images feature (optimize_images) for the desired set of images.
  2. Update all opt.moovweb.net URLs to point directly to the image. Apply the same set of query string parameters, with the exception of img, to each new URL.
    Example: Convert the following sample URL from:
    https://opt.moovweb.net?quality=30&width=100&img=https://edgio-community-examples-v7-image-optimization-live.glb.edgio.link/images/demo.jpg
    To this:
    https://edgio-community-examples-v7-image-optimization-live.glb.edgio.link/images/demo.jpg?quality=30&width=100
View:

Step 11: Real User Monitoring (RUM) Token

If you are tracking Core Web Vitals through RUM, then you will need to update the initEdgioRum script to use your version 7 token. Your version 7 token is provided on the Core Web Vitals page.
HTML
1<script defer>
2 function initEdgioRum() {
3 new Edgio.Metrics({
4 token: 'ab1234c5-d6ef-789a-12c0-bb48102c2023', //version 7 token
5 }).collect();
6 }
7</script>
8<script
9 src="https://rum.edgio.net/latest.js"
10 defer
11 onload="initEdgioRum()"></script>

Step 12: Build your Edgio Properties

Build each of your Edgio properties by running the following command in its root directory:
Bash
1edgio build
If you encounter a build issue as a result of upgrading Node.js, then you should perform one or more of the following troubleshooting steps:
  1. Check whether you have defined a different Node.js or npm version in either a npm config file (.npmrc) or within package.json. If so, update it to the correct version and then run edgio build to rebuild your Edgio property.
    Run node --version to check the Node.js version that you are currently using. This command should return 16.x.x (e.g., 16.18.0). Use this version information when updating .npmrc or package.json.
  2. Clear node_modules and rebundle your project by running the following command:
    Bash
    1npm ci
    Run edgio build to rebuild your Edgio property.
  3. Regenerate a new dependency tree by running the following command:
    Bash
    1npm i --package-lock-only
    Run edgio build to rebuild your Edgio property.

Step 13: Deploy to Edgio

Once you have successfully built your property, run the following command to deploy your property to Edgio:
Bash
1edgio deploy --property=<PROPERTY> --organization=<ORGANIZATION>
Key information:
  • Replace the following placeholders:
    • <PROPERTY>: Replace this placeholder with the name of the property created in step 5.
    • <ORGANIZATION>: Replace this placeholder with the name of the organization created in step 4. If you are deploying to a property in a private space, then you should omit this option (i.e., --organization or --team) from this command.
  • Upon running the above command:
    1. The Edgio CLI will require that you log in to the Edgio if it does not detect an active Edgio session.
    2. You will then need to authorize the CLI by granting it a token through which it may deploy your property to Edgio.
    3. The CLI will warn that you are overwriting a configuration defined within the Edgio Console. This is the expected behavior and you should press y to continue.
      Deploying a CDN-as-code configuration overwrites rules and origin configurations defined within the Edgio Console. In this case, the CLI detected changes that are not present in your edgio.config.js. Specifically, it detected new hostnames (aka custom domains). In the near future, you will be allowed to define those hostnames within your edgio.config.js. In the meantime, this error will only occur whenever the CLI detects new changes performed within the Edgio Console. Future deployments should not trigger this warning unless you make additional configuration changes within the Edgio Console.
  • The above syntax is only required for your first deployment. After which, you may deploy by running: edgio deploy

Step 14: Configure your Firewall

Edgio Applications version 7 uses a different set of IP blocks than previous versions. This means that you need to update your firewall to allow:
  • API Domain: You must allow traffic from the following domain: api.edgio.app. If you plan on deploying to a development or CI/CD environment, then you will also need to allow this domain for the firewall for those environments.
  • IP Blocks: You must allow traffic from Edgio IP blocks if you plan on using origin configuration(s) (aka backends).
View our IP blocks by clicking Instructions from the Origins page.
Learn more.

Step 15: Update your DNS

If you are an enterprise customer and have not already reached out to your account manager to upgrade your organization, please do so before serving traffic through Edgio Applications version 7. You may contact our sales department at 1 (866) 200 - 5463.
Once you are ready to serve traffic through Edgio, you will need to update the DNS for each of your hostname(s). Specifically, version 7 requires a CNAME record that points to a service domain that is either specific to your property’s:
Although version 6 supports both A and CNAME records, version 7 only supports CNAME records.

Migration Complete

Congratulations on successfully migrating Edgio to version 7!

Additional Considerations

Review the following changes and revise your configuration as needed:

Cache-manifest.js File

Version 7 no longer generates or uses the cache-manifest.js file. If you detect 404 Not Found requests for cache-manifest.js after upgrading to version 7, verify that:
  • You have upgraded the @edgio/prefetch library to version 7.
  • Your application no longer references the @layer0/prefetch library.

JWT Access Control End-of-Life

Edgio Applications version 6 does not support JWT access control. Previous versions allowed you to configure on a per route basis whether requests would be allowed or denied according to a JWT token.

Permalink Indexing

Edgio Applications version 5.1+ automatically adds the x-robots-tag: noindex, nofollow header all responses being served from edge links and permalinks. This prevents search engines from indexing those links. By default, this header will not be added to any responses served from a custom domain. Prior to version 5.1, the .noIndexPermalink() function was an opt-in solution to achieve the same effect.
As a result, the .noIndexPermalink() router function is now deprecated and serves no purpose. We recommend that you remove this function from your routes.[js|ts] file.
However, if you want to override this default behavior and allow search engines to index all permalinks, you can pass the option indexPermalink set to true to the Router constructor:
JavaScript
1new Router({indexPermalink: true});

GraphQL Caching End-of-Life

Edgio ended support for caching of GraphQL operations. If your Edgio router (routes.[js|ts]) contains usage of .graphqlOperation(...), you should remove it. Otherwise, your application will fail to build.

Duplicate Query String Parameters

Edgio Applications will no longer modify the request’s query string when it detects a duplicate query string parameter.
For example, we will examine how both versions of Edgio handle the following request:
https://sports.example.com/index.html?id=123&type=Sports&type=Basketball
Edgio Applications version 4 will modify the duplicate query string parameters as shown below.
https://sports.example.com/index.html?id=123&type=Sports%5B0%5D&type%5B1%5D=Basketball
Edgio Applications version 7, on the other hand, will not modify the query string as shown below.
https://sports.example.com/index.html?id=123&type=Sports&type=Basketball
Review your code to see whether it generates duplicate query string parameters. If it does, update it to handle multiple query string parameters with the same name.

Log Data

Edgio Applications version 7 introduces Real-Time Log Delivery (RTLD). RTLD allows you to define the set of data that will be logged and where log data will be sent (e.g., your web server, AWS S3, or Azure Block Blob). It consists of various modules that allow you to deliver log data for CDN, WAF, Rate Limiting, and Bot Manager. RTLD CDN is the module that replaces access logs (version 6). Access logs are mapped to RTLD CDN log fields below.
Key information:
  • RTLD CDN allows you to log request headers, response headers, and cookies. This makes it very flexible with regards to the set of data that can be logged.
  • A blank RTLD CDN (Version 7) cell indicates that, by default, the corresponding access log cannot be mapped to a RTLD CDN log field, a request header, a response header, or a cookie. However, you may still be able to log that data by setting a response header within your code and then logging that response header.
Access Logs (Version 6)RTLD CDN (Version 7)More Information
acreq_hdr_accept_encodingLog the Accept-Encoding request header.
asnclient_asn
beVersion 7 does not expose the backend configuration name.
bipThe proxy_ip log field returns an IP address that may identify an Origin Shield server or a web server associated with your origin configuration.
bkVersion 7 introduced Experimentation as a replacement for Traffic Splitting and A/B Testing. Log the cookie_x_edg_experiments cookie.
bldreq_hdr_x_edg_versionLog the x-edg-version request header. The first value reported by this response header is the deployment version.
botVersion 7 introduced sophisticated bot detection through Bot Manager Standard and Advanced. Manage log data for Bot Manager events through RTLD Bot.
brThe user_agent log field returns the client’s user agent. Define logic within your destination (e.g., Splunk) to translate this value to a browser name.
ccclient_country_code
ceresp_hdr_content_encodingLog the Content-Encoding response header.
ckhThe x-ec-cache-key debug cache header returns the cache key. Learn how to include this header in the response. After which, you may log this header.
clvAn approximation to this field may be achieved through the cache_status and proxy_type log fields.
codestatus_code
cscache_statusThe cache_status field does not indicate the reason why the response was not cached.
ctresp_content_typeLog the Content-Type response header.
cvVersion 7 does not expose the Edgio edge compiler version.
cyclient_city
doneVersion 7 does not return request completion status.
dsVersion 7 introduced Experimentation as a replacement for Traffic Splitting and A/B Testing. Experiment and bucket information is passed within the x-edg-experiments-info upstream request header. Expose this information by passing this info back to the client as a cookie or a response header and then logging that custom response header or cookie.
dvVersion 7 returns device type information through feature variables (i.e., %{wurfl_vcap_is_full_desktop}, %{wurfl_vcap_is_smartphone}, %{wurfl_cap_is_tablet}, and %{wurfl_cap_is_wireless_device}). Expose the device type by passing the desired feature variables as a cookie or a response header and then logging that custom response header or cookie.
eidresp_hdr_x_edg_versionLog the x-edg-version response header. The last value returned by this header is the environment ID.
erVersion 7 does not indicate when a custom response is sent as a result of the send method.
evresp_hdr_x_edg_versionLog the x-edg-version response header. The second value reported by this header is the environment version.
h2client_protocolValid values are: HTTP_1_0, HTTP_1_1, and HTTP_2_0
hhhost
hridExpose the request ID by passing the %{http_x_ec_uuid} feature variable as a cookie or a response header and then logging that custom response header or cookie.
icresp_x_ec_check_cacheableThe x-ec-check-cacheable debug cache header indicates cache eligibility. Learn how to include this header in the response. After which, you may log this header.
ipclient_ip
loclient_geo_longitude
lpVersion 7 does not indicate whether a page was served due to Incremental Static (Re)Generation.
ltclient_geo_latitude
metmethod
pcExpose the postal code by passing the %{geo_postal_code} feature variable as a response header or cookie and then logging that custom response header or cookie.
preresp_x_edg_pLog the x-edg-p response header.
prlVersion 7 has not yet introduced support for static prerendering.
prodVersion 7 does not indicate whether a request was directed to the production environment. However, the last value reported by the x-edg-version response header is the environment’s system-defined ID.
pshVersion 7 does not support HTTP/2 server push.
rfrreferer
riduuid
s_rqVersion 7 does not return the request’s file size. However, you may log the request payload size through the Content-Length request header. Learn how to log headers and cookies.
s_rsfile_size
scclient_region
secManage threat log data for v7 Security through RTLD WAF, RTLD Rate Limiting, and RTLD Bot.
shThe proxy_type log field returns MIDGRESS whenever we proxy requests within our network. In addition to Origin Shield requests, this may include peering requests.
sslschemeValid values are: http and https
stlcache_statusThe cache_status log field indicates cache status. The cache status codes that correspond to stale responses are TCP_EXPIRED_HIT and TCP_EXPIRED_MISS.
tVersion 7 reports time measurements through a variety of log fields (i.e., background_fill_wait_time, read_time, prewrite_time, write_time, and total_time) and the x-edg-t response header.
timestamptimestamp
uauser_agent
urlpath
uvLog the Vary response header sent to the client. However, this header does not affect how we split the cache in v7. Version 7 solely uses the cache key to determine how to split the cache.
vVersion 7 does not expose the Edgio version.
vnVersion 7 provides device information through a variety of feature variables, such as %{wurfl_vcap_is_android}, %{wurfl_vcap_is_ios}, and %{wurfl_cap_device_os}. Expose device information by passing the desired feature variables as a cookie or a response header and then logging that custom response header or cookie. Learn how to log headers and cookies.
wafEdgio passes security status through the waf_prod_action, waf_audit_alert, waf_prod_alert, and rl_alert log fields. Manage all other threat log data through RTLD WAF, RTLD Rate Limiting, and RTLD Bot.
wafvManage threat log data for v7 Security through RTLD WAF, RTLD Rate Limiting, and RTLD Bot.
xffreq_x_forwarded_forLog the x-forwarded-for request header.
xmrresp_x_edg_mrLog the x-edg-mr response header.
xmsresp_x_edg_statusLog the x-edg-status response header which returns status codes for the Cloud load balancer and the Cloud worker.
xmtresp_x_edg_tLog the x-edg-t response header.
xutVersion 7 does not support the x-0-user-t response header.
zipVersion 7 does not indicate whether the response was compressed. However, you may log the Content-Encoding response header. This header indicates the type of compression applied to the response payload. Learn how to log headers and cookies.