Skip to content

Releases: cloudfoundry/cf-networking-release

1.1.0

16 Jun 22:29
Compare
Choose a tag to compare

This release adds the ability for operators to configure their deployment to enable self-service app to app policy creation for all space developers.

When enabled, network.write does not need to be explicitly granted to individual space developers in order for them to be able to create policies between apps in spaces for which they have the SpaceDeveloper role.

Space developers now have a configurable quota for the maximum number of policies they can create for any given app as a source. The quota defaults to 50 but does not apply to users with network.admin.

Give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

  • An optional parameter has been added to allow all space developers to create policies (default false).
    If this property is not set, a space developer must have network.write to create policies.
    • cf_networking.enable_space_developer_self_service
  • An optional parameter has benn added to configure the maximum number of policies a space
    developer can write for a given source app. Defaults to 50 if it is not set. Does not apply to
    users with network.admin:
    • cf_networking.max_policies_per_app_source

Significant Changes

Space Developer Self-Service

Logging

Windows Compatibility

1.0.0

08 Jun 00:03
Compare
Choose a tag to compare

CF networking features are now generally available! This release doesn't include any major changes, just some metrics and logging enhancements and miscellaneous chores.

Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

New Properties

  • The following optional parameters have been added to override the timeout values for
    database connections and DNS health checks for the silk controller and policy server:

    • cf_networking.silk_controller.connect_timeout_seconds
    • cf_networking.policy_server.connect_timeout_seconds
  • This optional property has been added to override the metron port on the silk controller:

    • cf_networking.silk_controller.metron_port
  • This optional property has been added to override the health check port on the silk controller:

    • cf_networking.silk_controller.health_check_port

Removed Properties

  • The following properties have been removed from the silk-controller job,
    but still must be set on the silk-daemon job.
    • cf_networking.silk_daemon.ca_cert
    • cf_networking.silk_daemon.client_cert
    • cf_networking.silk_daemon.client_key

Significant Changes

Metrics

Logging

Stability

Chores

0.25.0

26 May 00:20
Compare
Choose a tag to compare
0.25.0 Pre-release
Pre-release

Primary changes include stability related fixes and changes to policy enforcement to make container networking policy independent of ASG configuration.

We also tested and documented how to detect problems with overlapping overlay network and underlay network ranges.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

The optional parameter cf_networking.lease_poll_interval_seconds has been added to allow operators to override the default polling interval between silk-daemon and silk-controller.

Changed Properties

The value for cf_networking.garden_external_networker.cni_config_dir now defaults to /var/vcap/jobs/silk-cni/config/cni We recommend that you remove any overrides for this property, unless you are intending to use a 3rd party CNI plugin.

Other Changes

Since silk is now deployed by default, there is no more silk.yml ops file. Deploying with flannel is no longer supported.

Significant Changes

iptables

Stability

BOSH Links

Miscellaneous

0.24.0

13 May 01:15
Compare
Choose a tag to compare
0.24.0 Pre-release
Pre-release

This release allows operators to configure the UDP port used for the VXLAN devices and makes it possible to change the IP address range allocated for the container network.

In addition, it adds further improvements to the control scripts for all BOSH jobs and introduces basic uptime monitoring for the silk-daemon.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

New Properties

  • The host port for receiving VXLAN packets is now configurable as cf_networking.vtep_port for flannel and silk. Overriding this value is optional.

Significant Changes

BOSH configuration

BOSH job control scripts

Silk metrics

Other

0.23.0

08 May 17:12
Compare
Choose a tag to compare
0.23.0 Pre-release
Pre-release

This release improves the interaction between monit and silk-daemon. It also includes improvements to iptables configuration and logging.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

None

Significant Changes

iptables

Policy Server

Bug fixes

0.22.0

02 May 18:39
Compare
Choose a tag to compare
0.22.0 Pre-release
Pre-release

This release introduces a beta version of a new container networking fabric called "silk" and contains significant changes to job and property names. In order to deploy silk you must upgrade to Diego release v1.15.0 or higher.

Silk is a replacement for flannel, which uses a central controller node backed by a SQL database. Etcd is no longer required by CF Networking Release when running Silk.

There are several manifest changes required to enable Silk, and we highly recommend reading the manifest changelog to understand the changes.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

Too many to list here - please take a look at the manifest changelog

Significant Changes

Silk Controller and daemon

Acceptance Tests

Policy Server

0.21.0

21 Apr 16:51
Compare
Choose a tag to compare
0.21.0 Pre-release
Pre-release

Fixes compatibility issues with BOSH stemcell version 3363.19. If you are deploying cf-networking-release you must upgrade to this release or a subsequent release to use this and future stemcells.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Significant Changes

Manifest Changes

Changed Properties

  • The value for cf_networking.garden_external_networker.cni_plugin_dir now defaults to /var/vcap/packages/silk-cni/bin
    We recommend that you remove any overrides for this property, unless you are intending to use a 3rd party CNI plugin.

Stemcell Compatibility

Silk Controller and daemon

0.20.0

12 Apr 21:51
Compare
Choose a tag to compare
0.20.0 Pre-release
Pre-release

No major changes in this release. Most commits are feature work to support a new daemon and controller to set up container networking.

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Significant Changes

CNI

Application Security Groups

Chores

Documentation

0.19.0

31 Mar 23:23
Compare
Choose a tag to compare
0.19.0 Pre-release
Pre-release

The first release to include a new layer-3 only CNI plugin. Highlights include:

  • Silk CNI plugin to replace Flannel CNI plugin
  • NetIn and NetOut rules are configured through CNI
  • Networking features to enable BOSH DNS for CF apps

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

Changed Properties

  • The value for cf_networking.garden_external_networker.cni_plugin_dir must be updated to /var/vcap/packages/silk/bin if you are not swapping out CNI with your own plugin. (There is no default currently, but we plan to add one in the next release)
  • The property for global ASG logging has changed from cf_networking.garden_external_networker.iptables_asg_logging
    to cf_networking.iptables_asg_logging.

Removed Properties

  • cf_networking.flannel_watchdog.no_bridge is now removed.

New Properties

A new property has been added to support an upcoming feature. Users can specify DNS servers and access will be automatically allowed for link-local DNS servers:

  • cf_networking.dns_servers

The new feature will require garden-runc-release versions >=1.4.0.

Significant Changes

New CNI plugin

NetIn/NetOut Changes

BOSH DNS support

Logging enhancements

Chores

0.18.0

14 Mar 23:03
Compare
Choose a tag to compare
0.18.0 Pre-release
Pre-release

Lots of good stuff in this release. Highlights include:

  • Logging for c2c iptables can be enabled through a BOSH property
  • Container networking scales to 20K application instances with 3 policies per application.
  • Initial support for logging ASG iptables through a BOSH property. ASG logs will be prefixed with OK_ or DENY_.
  • If you are running Diego release v1.10.1 you must upgrade to this release

We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues.

Verified with the following:

New Manifest Properties

  • cf_networking.rep_listen_addr_admin enables our drain scripts to wait for the Diego rep to exit.
    It should always be the same value as diego.rep.listen_addr_admin. It defaults to 127.0.0.1:1800.
  • cf_networking.garden_external_networker.iptables_asg_logging globally enables iptables logging for
    all ASGs, including logging of denied packets. Defaults to false.
  • cf_networking.vxlan_policy_agent.iptables_c2c_logging enables iptables logging for
    container-to-container traffic. It defaults to false. Note: this is already
    configurable at runtime.
  • cf_networking.plugin.health_check_port allows BOSH to better health-check the flanneld process
    required for connectivity.

Removed Manifest Properties

  • cf_networking.policy_server.database.connection_string was deprecated in v0.10.0 and is now removed.

Significant Changes

Scalability

Upgrades

Manifest Changes

Security

Chores

Stability

Logging

Internal integration