This repository has been archived by the owner on Feb 14, 2023. It is now read-only.
v0.7.0
Notice:
cf-for-k8s does NOT support upgrades for alpha releases. We are in the process of defining the final configuration contract which will follow the semver versioning scheme once we ship 1.0 version.
- Please upgrade your
kapp
to v0.33.0
Highlights:
- Platform engineers can configure an external blobstore with cf-for-k8s
- App developers can expect their apps with Procfile to be correctly handled by the platform
- App developers can expect correct language detection order for their apps
- cf logs APP_NAME prints envoy proxy logs
In More Detail
PRs Merged
- Add documentation for configurable properties 373
- Allow blobstore to be configured 374
- bump cf-k8s-networking to include istio 1.6.4 changes 377
- Add validation test for external database 382
- Update metric-proxy to v1.0.0 391
- Renamed the file to better indicate its intention of being a warning … 392
- Skip minio installation if external blobstore is configured 393
- Add documentation on how to use external blobstores 394
- Fix network policies for eirini 396
- Add support for ingressgateway logs to show up in
cf logs
397 - Allow ingress to cf-api-server from eirini-events 399
- Updated the description of the log fields emitted by the ingress gateway 400
- added reference to envoy docs for
response_flag
401 - updated description for
upstream_transport_failure_reason
402 - Remove the unused update-gcp-dns hack script 403
- updated
start_time
description 404 - Validate external blobstore 405
- update logging to 0.3.0 410
- Add the Procfile buildpackage to all groups 411
- Fix links in docs/maintaining.md 414
- remove metric_proxy cert from values/20-secrets-config-values.yml 415
- Kapp rebase rules 416
- Reorder buildpacks 428
- Move Istio config and build scripts to cf-for-k8s 429
- Use Image Registry for Package Uploads and Secure Internal CF API Endpoints 430
- remove capi eirini cert config 432
- docs: add documentation on sidecar access logs 433
- remove HPA and fix istiod replicas to 1 435
- cf-for-k8s now uses the latest networking changes 437
- Replace namespace data values with internal functions 438
- Update the sample-cf-install-values.yml blobstore key 439
- updated the kubectl command to clarify that users should be using app… 441
- updated
duration
field description 442 - documenting upgrade-test results 443
- bump newest supported K8s version from 1.17 to 1.19 445
- add missing namespace labels, harmonize existing labels 446
- Bump to latest stable kpack (0.1.2) and latest capi-k8s-release which supports that kpack 448
- add additional authorities to cf_api_controllers UAA client 454
- Update Istio sidecar fluent-bit image 458
- Make cc log level configurable 461
- punctuation 463
- Allow Eirini to hit internal CF API endpoints 467
- fix markdown mistake in docs 468
- Rename allow-istio-control-plane network policy 475
- cluster requires network policy support 476
Issues Closed
- cf logs APP_NAME prints envoy proxy logs #387
- App developers can expect correct language detection order for their apps #407
- App Developers can expect their apps with Procfile + app language will be correctly detected #408
- cf_system_namespace, cf_workloads_namespace and cf_staging_namespace configuration properties are broken [#431](App Developers can expect their apps with Procfile + app language will be correctly detected #408)
- Pushing Docker apps broken #465
Configuration changes
cf_system_namespace
,cf_workloads_namespace
andcf_staging_namespace
removed from the configuration interface
Release Updates
We are only tracking published releases
Release | Old Version | New Version |
---|---|---|
Networking | 0.2.0 | 8aab2b2 |
CAPI | 7b4ecf6 | d84e4bf |
Logging | 0.2.1 | 0.4.0 |
Metrics | 0.2.0 | 1.0.0 |
UAA | v74.24.0 | v74.25.0 |
Kpack | -- | v0.1.2 |
Eirini | v1.8.0 | v1.9.0 |
kapp | 0.30.0 |
0.33.0 |
Scale Test Results
- Highlights: v0.7.0 has been scale tested to 1200 deployed applications. More details about the shape and configuration used to achieve that can be found here.
What we are working on next
- Continue to incorporate CATS tests into cf-for-k8s workflows.
- Continue scale test and work towards a scaling configuration interface
- Collaborate with Credhub team to integrate Quarks server-side password generation. With Quarks, Platform engineers will no longer be required to provide passwords (or run bosh-cli based script to generate passwords) and rely on Quarks to generate them in the K8s cluster. It is similar to the functionality available today in cf-deployment with Credhub integration.
- Identify and document app structural differences required by Paketo Buildpacks to detect and build the image.
- Image Management; improve the image provenance and management of system component images