Skip to content

Releases: cloudfoundry/cf-networking-release

1.13.0

18 Apr 23:24
Compare
Choose a tag to compare

This release has the following new features:

  • Multi-homing

  • CORS support

  • Initial support for CNI plugin chaining

  • Tested with silk-release v0.3.0

Significant Changes

Manifest Changes

New Properties

  • An optional parameter has been added to the garden-cni job to
    specify search domains. These domains will be configured in containers' /etc/resolv.conf.
    • cf_networking.search_domains
  • An optional parameter has been added to the silk-daemon job to configure which network
    container traffic should be sent over based on network interface name. This property is
    not recommended for use and is temporary. If empty, the default network is used.
    • cf_networking.silk_daemon.temporary_vxlan_interface
  • An optional parameter has been added to the silk-daemon job to configure which network
    container traffic should be sent over based on bosh network name. If empty, the default
    gateway network is used.
    • cf_networking.silk_daemon.vxlan_network
  • An optional parameter has been added to list domains from which Cross-Origin
    requests will be accepted.
    • cf_networking.policy_server.allowed_cors_domains

Multiple Interfaces

DNS Features

CORS

CNI

Tests

Chores

1.12.0

1.11.0

1.10.0

1.9.0

15 Dec 23:52
Compare
Choose a tag to compare

1.8.0

28 Sep 20:21
Compare
Choose a tag to compare

1.7.0

22 Sep 23:16
Compare
Choose a tag to compare

Lots of small enhancements in this release - support for rootless mode, setting max open/idle connections on Silk controller and support for BBR on mySQL.

Give us feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

New Properties

  • An optional parameter has been added to turn on bosh backup and restore.
    By default, this property is set to false and backup and restore is turned off.
    • release_level_backup
  • An optional parameter has been added to configure the max number of
    open and idle connections to the silk-controller database.
    • cf_networking.silk_controller.max_open_connections
    • cf_networking.silk_controller.max_idle_connections

Significant Changes

CLI

BBR

Rootless Mode

Enhancements

1.6.0

26 Aug 00:06
Compare
Choose a tag to compare

The primary change in this release is a change in the default directories for CNI plugins integrating into Cloud Foundry.

Give us feedback in the #container-networking channel on cloudfoundry.slack.com. Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

Changed Properties

  • The value for cf_networking.garden_external_networker.cni_plugin_dir now defaults to /var/vcap/packages/cni/bin
  • The value for cf_networking.garden_external_networker.cni_config_dir now defaults to /var/vcap/jobs/cni/config/cni

Significant Changes

Policies for Tasks

Debugging Enhancements

CNI

1.5.0

21 Aug 18:01
Compare
Choose a tag to compare

This release includes initial support for BBR. Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues.

Verified with the following:

Manifest Changes

Links Enabled
The policy-server now provides database connection info via a link which the new policy-server-internal job consumes:

  • cf_networking.policy_server.database.type
  • cf_networking.policy_server.database.username
  • cf_networking.policy_server.database.password
  • cf_networking.policy_server.database.port
  • cf_networking.policy_server.database.name
  • cf_networking.policy_server.database.host

New Properties

  • REQUIRED: A new job policy-server-internal has been added. This job requires the following properties:
    • cf_networking.policy_server_internal.ca_cert
    • cf_networking.policy_server_internal.server_cert
    • cf_networking.policy_server_internal.server_key
      There are additional optional paramaters that can be set and are viewable in the spec file
  • An optional parameter has been added to configure the path to the iptables kernel log for
    the iptables_logger.
    • cf_networking.iptables_logger.kernel_log_file

Removed Properties

  • The policy-server job has removed the following properties:
    • cf_networking.policy_server.internal_listen_port
    • cf_networking.policy_server.ca_cert
    • cf_networking.policy_server.server_cert
    • cf_networking.policy_server.server_key

Changed Properties

  • The consul.agent.services.policy-server property for the consul_agent job on the api instance group
    should be renamed to consul.agent.services.policy-server-internal.

Significant Changes

CLI Changes

BBR Changes

Chores

1.4.0

08 Aug 18:31
Compare
Choose a tag to compare

CF networking policies now support port ranges in addition to a single port in policy configuration. In addition, the silk controller provides a link for the silk daemon to configure the overlay network for cf-networking.

Try it out and give us your feedback in the #container-networking channel on cloudfoundry.slack.com.

Take a look at known issues for current limitations and known issues. Verified with the following:

Manifest Changes

Links Enabled
The silk-controller job now provides two properties via links which the silk-daemon job consumes:

  • cf_networking.network
  • cf_networking.subnet_prefix_length
    ** This means you are able to remove the properties (listed above) from the silk-daemon job. **

If your deployment contains more than a single instance group that has the silk-controller job,
then you will need to explicitly name the cf_network link. For more information,
see the documentation.

New Properties

  • An optional parameter has been added to configure the port of the metron agent for
    the iptables_logger. This port will be used to forward metrics. Previously, no such
    port existed.
    • cf_networking.iptables_logger.metron_port

Significant Changes

Port Ranges

Optimizations

Logging Enhancemetns

Chores