Skip to content

Releases: cloudfoundry/cf-networking-release

1.11.0

1.10.0

1.9.0

15 Dec 23:52
Compare
Choose a tag to compare

1.8.0

28 Sep 20:21
Compare
Choose a tag to compare

1.7.0

22 Sep 23:16
Compare
Choose a tag to compare

Lots of small enhancements in this release - support for rootless mode, setting max open/idle connections on Silk controller and support for BBR on mySQL.

Give us feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

  • An optional parameter has been added to turn on bosh backup and restore.
    By default, this property is set to false and backup and restore is turned off.
    • release_level_backup
  • An optional parameter has been added to configure the max number of
    open and idle connections to the silk-controller database.
    • cf_networking.silk_controller.max_open_connections
    • cf_networking.silk_controller.max_idle_connections

Significant Changes

CLI

BBR

Rootless Mode

Enhancements

1.6.0

26 Aug 00:06
Compare
Choose a tag to compare

The primary change in this release is a change in the default directories for CNI plugins integrating into Cloud Foundry.

Give us feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

Changed Properties

  • The value for cf_networking.garden_external_networker.cni_plugin_dir now defaults to /var/vcap/packages/cni/bin
  • The value for cf_networking.garden_external_networker.cni_config_dir now defaults to /var/vcap/jobs/cni/config/cni

Significant Changes

Policies for Tasks

Debugging Enhancements

CNI

1.5.0

21 Aug 18:01
Compare
Choose a tag to compare

This release includes initial support for BBR. Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

Links Enabled
The policy-server now provides database connection info via a link which the new policy-server-internal job consumes:

  • cf_networking.policy_server.database.type
  • cf_networking.policy_server.database.username
  • cf_networking.policy_server.database.password
  • cf_networking.policy_server.database.port
  • cf_networking.policy_server.database.name
  • cf_networking.policy_server.database.host

New Properties

  • REQUIRED: A new job policy-server-internal has been added. This job requires the following properties:
    • cf_networking.policy_server_internal.ca_cert
    • cf_networking.policy_server_internal.server_cert
    • cf_networking.policy_server_internal.server_key
      There are additional optional paramaters that can be set and are viewable in the spec file
  • An optional parameter has been added to configure the path to the iptables kernel log for
    the iptables_logger.
    • cf_networking.iptables_logger.kernel_log_file

Removed Properties

  • The policy-server job has removed the following properties:
    • cf_networking.policy_server.internal_listen_port
    • cf_networking.policy_server.ca_cert
    • cf_networking.policy_server.server_cert
    • cf_networking.policy_server.server_key

Changed Properties

  • The consul.agent.services.policy-server property for the consul_agent job on the api instance group
    should be renamed to consul.agent.services.policy-server-internal.

Significant Changes

CLI Changes

BBR Changes

Chores

1.4.0

08 Aug 18:31
Compare
Choose a tag to compare

CF networking policies now support port ranges in addition to a single port in policy configuration. In addition, the silk controller provides a link for the silk daemon to configure the overlay network for cf-networking.

Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

Links Enabled
The silk-controller job now provides two properties via links which the silk-daemon job consumes:

  • cf_networking.network
  • cf_networking.subnet_prefix_length
    ** This means you are able to remove the properties (listed above) from the silk-daemon job. **

If your deployment contains more than a single instance group that has the silk-controller job,
then you will need to explicitly name the cf_network link. For more information,
see the documentation.

New Properties

  • An optional parameter has been added to configure the port of the metron agent for
    the iptables_logger. This port will be used to forward metrics. Previously, no such
    port existed.
    • cf_networking.iptables_logger.metron_port

Significant Changes

Port Ranges

Optimizations

Logging Enhancemetns

Chores

1.3.0

27 Jul 17:30
Compare
Choose a tag to compare

Try out our new feature for augmented traffic logging with org, space and app information! Instructions are here. This release also lays the groundwork for supporting port ranges in policy configuration. Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

  • An optional parameter has been added to configure the rate of logs by
    iptables for accepted UDP packets. Before, logging was done per UDP
    connection. Now, the rate defaults to 100 packets per second.
    • cf_networking.iptables_accepted_udp_logs_per_sec is the maximum number of
      accepted udp packets logged by iptables per second, it should be
      configured on the silk-cni job for ASGs or on the vxlan-policy-agent
      job for C2C.

Significant Changes

Traffic logging enhancements

Port Ranges

Github Issues

Miscellaneous

1.2.0

10 Jul 17:29
Compare
Choose a tag to compare

CF networking is officially part of cf-deployment! You do not need a separate ops-file to include cf-networking in your deployment. This release also adds new capabilities for bandwidth limiting and logging enhancements for ASGs and container networking.

Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

  • Optional parameters have been added to the silk-cni job to limit the
    bandwidth in and out of containers.
    • cf_networking.rate is the rate in Kbps at which traffic can leave and
      enter a container.
    • cf_networking.burst is the burst in Kb at which traffic can leave and
      enter a container.
    • Both of these parameters must be set in order to limit bandwidth. If
      neither one is set, then bandwidth is not limited.
    • The burst must high enough to support the given rate. If burst is not
      high enough, then creating containers will fail.
  • An optional parameter has been added to configure the rate of logs by
    iptables for denied packets. Before, this rate was hardcoded to 2 packets
    per minute. Now, the rate defaults to 1 packet per second.
    • cf_networking.iptables_denied_logs_per_sec is the maximum number of
      denied packets logged by iptables per second, it should be configured on
      the silk-cni job.

Significant Changes

Port Ranges

Logging

Bandwidth Limiting

Deployment Changes

Documentation

Bug Fixes