Releases: cloudfoundry/cf-networking-release
0.17.0
This release reduces the Flannel subnet lease renewal interval to alleviate the effects of etcd failures. It also includes a manifest change. Take a look at the manifest change log for details.
We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.
Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Flannel
- Document risks and mitigations for container networking when etcd disappears and comes back with an empty data dir
- Flannel subnet range for a cell should be configurable
Scalability
- Policy server flakes when trying to add/delete several thousand policies
- As an operator I have metrics to help evaluate policy server performance
- As a space developer, I expect list policies to work when there are a lot of policies/apps
- Our docs include recommendations on scaling policy server instances and DB
- When policies are requested by ID, policy server does not query database for all policies
Chores
0.16.0
No big manifest changes in this release - key changes include a property to override the interface MTU, policy cleanup for deleted applications and spaces and CLI enhancements.
We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Manifest Changes
Policy Cleanup
CLI
- Update CATS and runtime-ci docker image to use
remove-access
- As a space developer I get a meaningful error message when I don't have network.write scope and try to configure a policy
Security
Documentation
Metrics
- As an operator I can set up an alert for when my cell has a Flannel watchdog error
- Investigate increased policy server response time on toque
- As an operator I have metrics to help evaluate policy server performance
Miscellaneous
0.15.0
This release includes significant manifest changes. Please take a look at the manifest changelog for details.
We do not recommend using cf-networking-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Manifest Changes
- Simplify / consolidate BOSH properties
- Rename netman to cf-networking for all container networking artifacts
Policy Cleanup
CLI
Chores
0.14.0
Netman is no more! The key change in this release is a rename from netman
to cf-networking
. This change is documented in the manifest changelog. At this point, there are no changes to manifest properties other than the release name.
We do not recommend using cf-networking-release
in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Manifest Changes
Performance
- Compare c2c networking latency vs. router latency
- As PM I would like a measure of latency to apply a single additional policy with a number of existing policies
- As PM I would like to know how the effect of having a large ASG config on adding a single policy
Troubleshooting
- CF CLI Plugin respects CF_TRACE environment variable
- As a space developer I get a meaningful error message when I don't have network.write scope and try to configure a policy
- Add a Troubleshooting page for CF networking
Chores
0.13.0
Key changes include support for self-service space developer configuration. A user can now request a network.write
scope to configure policies for spaces where they have Space Developer privileges.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Self-service for space developers
Scalability and performance
0.12.0
Key changes include configurable subnet ranges and masks, self service policy configuration and enhancements for reducing policy enforce time.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.
Verified with the following:
Significant Changes
Deployment Changes
- The subnet and mask for the overlay network is configurable
- As an operator I would like to support more than 254 cells with legacy networking features
Space Developer self-service policy configuration
- Space developers with network.write scope can create policies using the API for apps in spaces they own
- Space developers with network.write scope can delete policies for apps in spaces they own
UX changes
Performance and Scalability
- As an operator I don't expect iptables to be rewritten continuously when there are no policy changes
Miscellaneous Changes
0.11.0
Key changes include logging enhancements and UX changes to the DELETE and GET APIs.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.
Take a look at known issues for current limitations and known issues. Verified with the following:
Significant Changes
Deployment Changes
Logging
- When a c2c connection between containers is allowed, I see a log line in syslog at the destination
- As an operator I can get all logs related to netman by using a keyword
- Reduce log message noise due to missing policy_group_id
UX changes
0.10.0
Key changes include manifest changes related to policy server DB configuration, logging enhancements and testing related to data plane security.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.
Verified with the following:
Significant Changes
Manifest Changes
Logging
- Log levels for vxlan-policy-agent are reconfigurable at runtime
- Logging for c2c iptables is reconfigurable at runtime
- Log levels for policy-server are reconfigurable at runtime
Security
- Move flannel state dir to something under /var/vcap
- As an attacker my containers can reach local addresses on the host VM
- Redact tokens/passwords in policy server log messages
Miscellaneous
- netman-release has a NOTICE file with license information
- Containers can be created while policy server is down and receive traffic when the policy-server comes back up
- Masquerade rule should be written by something other than vxlan-policy-agent
- SPIKE: Containers can connect to an IP address on the host
0.9.0
Key changes include using BulkNetOut for Garden external networker, logging and security enhancements and validation of policy server high availability.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.
Verified with the following:
Follow the link above to get information about individual releases.
Significant Changes
Important fixes
Scalability and Performance
- BulkNetOut should be fast while using the external networker
- Handle a bulkNetOut call from Garden to the external networker
Security
- Internal components should not rely on external load-balancer & DNS in order to boot - fix UAA
- Internal components should not rely on external load-balancer & DNS in order to boot - fix CC
High Availability
Logging
- vxlan policy agent log level should be configurable via bosh spec property
- Cats & Dogs Backend App should log requests
- policy server log level should be configurable via bosh spec property
Application Security Groups
0.8.0
This release is the first release of netman that is validated against cf-deployment. Key changes include a fix for flannel watchdog not being stopped correctly and miscellaneous security fixes.
We do not recommend using netman-release in production yet, but give it a try and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.
Verified with the following:
- CF deployment
Follow the link to get information about individual releases.
Significant Changes
- Fixes flannel watchdog not being stopped correctly.