Re: cflinuxfs2 (CF root FS) BOSH release rename
Stephen Levine
Hi All,
toggle quoted message
Show quoted text
Quick follow-up to this. To ease the transition, we're going to continue updating the current cflinuxfs2 BOSH release[1] until May 19, 2017. After May 19, 2017, only the new BOSH release[2] will be updated. Please make sure to update the release name in your deployment manifest ("cflinuxfs2-rootfs" -> "cflinuxfs2") when you switch to the new release. [1] https://github.com/cloudfoundry/cflinuxfs2-rootfs-release [2] https://github.com/cloudfoundry/cflinuxfs2-release Thanks, Stephen (CF Buildpacks PM) On Wed, Mar 29, 2017 at 2:46 PM, Stephen Levine <slevine(a)pivotal.io> wrote:
Hi All, |
|
CVE-2017-4972: Blind SQL Injection in UAA
Molly Crowther
CF devs,
Please see the following public link for information about a high CVE in UAA. https://www.cloudfoundry.org/cve-2017-4972/ Friendly reminder that you can subscribe to new Cloud Foundry security issues at: https://www.cloudfoundry.org/category/security/feed/ Please let me know if you have any questions or concerns. Thanks, Molly Crowther Cloud Foundry Foundation Security Team |
|
[IMPORTANT] Reminder - EOL for Legacy DEA Backend on May 22, 2017
Dieu Cao <dcao@...>
Hello All,
I'm excited to send this email as a reminder that EOL for the Legacy DEA Backend is May 22, 2017, just over a month away, finally closing out a great chapter for Cloud Foundry. You can find the previous notice of this here [1] and here [2]. Documentation on how to migrate to Diego can be found here [3]. The EOL phase for the DEAs out will entail: (1) moving the DEAs to the Cloud Foundry Attic (meaning the DEAs will no longer be supported, no longer be patched for any reason, and no longer accept any contributions), (2) removing distribution of the DEAs from cf-release, (3) shutting down all CI pipelines related to the DEAs, (4) removing all code paths and technical debt in the Cloud Controller associated with running Cloud Foundry on multiple backends. Additionally, the Runtime OG team's support efforts have not required much in the last several months, and the team is standing down for now. Thanks! Dieu Cao CF Runtime PMC Lead [1] https://lists.cloudfoundry.org/archives/list/cf-dev(a)lists.cloudfoundry.org/thread/PFXSJMKSQ6UNR2I5U5Q2H2QTXTCAEIJR/#PFXSJMKSQ6UNR2I5U5Q2H2QTXTCAEIJR [2] https://lists.cloudfoundry.org/archives/list/cf-dev(a)lists.cloudfoundry.org/message/GMXXJTTM2Q6SIRGVXSQH4TPLHTVHKNNG/ [3] https://docs.cloudfoundry.org/running/apps-enable-diego.html |
|
Re: cf create-service-auth-token for mongo db returns create-service-auth-token only works up to CF API version 2.46.0. Your target is 2.79.0.
Lin, Lynn <Lynn.X.Lin@...>
Alex ,
Could you please provide the details about this failure under github issue https://github.com/cloudfoundry-community/mongodb-bosh-release/issues ? We can help take a look Thanks Lynn |
|
Re: proposal: unik & cloud foundry
I really, really like this Unikernel approach, and the proxy idea for CF is very clever. It would remove a lot of adoption roadblocks from the security perspective, since you are now dealing with fully hardware-protected instances.
I think my main concern is that in essence, you are now booting micro-VMs, not containers, so the artifact is now openly exposed and protected only by whatever security group the IaaS can provide. This can be appreciated in the video of the talk when the IPs for each running app instance can be clearly observed. So they can't take advantage of constructs like Cell NATing, ASGs or Isolation Segments, AppArmor, Seccomp, etc. At least not apparently. Could unik-spawned AIs live in overlay space with Netman? that would work nicely with the new networking model. If policy can be applied to the AI and enforced by the CNI-based SDN layer, then it would be a nice adaptation. On a similar note, we now shift the scheduling responsibility from Diego to the IaaS essentially. And albeit the images are very small, are all IaaS capable of handling the speed and the transient nature of AIs constantly scaling up and down? Can all IaaSs achieve the 250K instance capacity that we know Diego with Garden can? -- Ramiro Salas | @ramirosalas | Ecosystem Engineering @ Pivotal |
|
Re: proposal: unik & cloud foundry
Chip Childers <cchilders@...>
We can do it at summit if we want to wait that long. Is that the path that
you'd like Idit? If so, I can get a place scheduled for an open community discussion around it. On Thu, Apr 13, 2017 at 11:39 AM Idit Levine <idit.levine(a)gmail.com> wrote: Sounds good. I reply to the BOSH comment and it should defiantly be partChip Childers CTO, Cloud Foundry Foundation 1.267.250.0815 |
|
Re: Micro Cloud Foundry
Takeshi Morikawa
Micro cloud foundry is for older version of Cloud Foundry
toggle quoted message
Show quoted text
Please try the following https://pivotal.io/pcf-dev or https://github.com/cloudfoundry/bosh-lite/blob/master/README.md#install-bosh-lite 2017-04-18 16:06 GMT+09:00 MuthuIQSSNet <muthukrishnan.m(a)iqss.net>: Hi, |
|
FINAL REMINDER: CF CAB call THIS week Wednesday April 19th @ 8a PDT (UTC -7)
Michael Maximilien
FYI...
toggle quoted message
Show quoted text
Final reminder of the CAB call this Wednesday @ 8a PDT (UTC -7). Zoom in for CFF updates, project highlights, and talks by: David Dabeti (CF-deployment), Dmitriy Kalinin (Turbulence BOSH release), and Dr. Nic Williams on migrating releases to BOSH v2. Talk soon. Cheers, dr.max ibm cloud labs sillicon valley, ca usa maximilien.org Sent from my iPhone Begin forwarded message: From: "Michael Maximilien" <maxim(a)us.ibm.com> |
|
Micro Cloud Foundry
MuthuIQSSNet <muthukrishnan.m@...>
Hi,
I am also impressed on Cloud Foundry and to move next level, most of the tutorial pointing to download Micro Cloud Foundry but the page seems not available. Cloud you please send me the link to download micro cloud foundry site and in addition, if anything wanted to learn along with this, please send me those also. Thanks Muthu |
|
Re: Unify bootstrap scripts
David McClure
Are you familiar with bbl (bosh-bootloader)?
https://github.com/cloudfoundry/bosh-bootloader This is a command line utility for standing up a CloudFoundry or Concourse installation on an IAAS. This CLI is currently under heavy development, and The team developing it has an epic called "bbl aws terraform": https://www.pivotaltracker.com/epic/show/3132527 See also, the #bbl-users channel in Slack http://slack.cloudfoundry.org/ On Sun, Apr 16, 2017 at 7:50 AM, Leandro David Cacciagioni < leandro.21.2008(a)gmail.com> wrote: I would like to know if there is any plan to unify the bootstrap scripts? |
|
Unify bootstrap scripts
Leandro David Cacciagioni
I would like to know if there is any plan to unify the bootstrap scripts? I
personally feel that the one for aws is not so good specially when deleting deployments. I think it could be quite easy replaceable with terraform, which can easily unify the way of deployment on all the officially supported clouds (same for BOSH). Please let me know if there is any plan to do this I would like to help. Thanks, Leandro.- |
|
Re: Proposal for named service bindings
Peter Dotchev <dotchev@...>
Hi Zach,
toggle quoted message
Show quoted text
I am glad you find this idea useful too. Let me know if you need further input. Happy Easter! Peter On Sat, Apr 15, 2017 at 2:55 AM Zach Robinson <zrobinson(a)pivotal.io> wrote:
Hey Peter, |
|
Re: Proposal for named service bindings
Mike Youngstrom <youngm@...>
Excellent. Thanks Zack!
toggle quoted message
Show quoted text
Mike On Fri, Apr 14, 2017 at 5:54 PM, Zach Robinson <zrobinson(a)pivotal.io> wrote:
Hey Peter, |
|
Re: Proposal for named service bindings
Zach Robinson
Hey Peter,
I like the use-case that this proposal allows developers to set their expected service name at development time. I think this is a nice explicit contract and is also portable between Foundations, where services may have different names. I prefer that we find a way to keep VCAP_SERVICES backwards compatible and that we keep binding names optional. I will try drop a doc off on this thread in a couple days with a proposal based on yours and with some cli stuff vetted by the cli team. Then we can look at getting work prioritized -Zach CAPI Project Lead |
|
Re: Loggregator Message Reliability Rates in CF253
We have identified a fix for this issue and have released a fix in Loggregator 84. See the github issue linked this thread for more details.
|
|
NOTICE: Default version of Ruby in the Ruby buildpack will change to 2.4.x after 2017-05-14
Stephen Levine
Hi All,
The default version of Ruby in the Ruby buildpack will change from the latest 2.3.x version (currently 2.3.4) to the latest 2.4.x version (currently 2.4.1) in the first release of the Ruby buildpack after May 14, 2017. If you would like to continue using Ruby 2.3.x, please specify that version line in your Gemfile. For more information, refer to the buildpack documentation: http://docs.cloudfoundry.org/buildpacks/ruby/ Thanks, Stephen Levine Core CF Buildpacks PM |
|
NOTICE: Default version of Go in the Go buildpack will change to 1.8.x after 2017-05-14
Stephen Levine
Hi All,
The default version of Go in the Go buildpack will change from the latest 1.7.x version (currently 1.7.5) to the latest 1.8.x version (currently 1.8.1) in the first release of the Go buildpack after May 14, 2017. If you would like to continue using Go 1.7.x, please set the $GOVERSION environment variable in your app, or use your choice of Go dependency management utility to lock your version of Go to 1.7.5. For more information, refer to the buildpack documentation: http://docs.cloudfoundry.org/buildpacks/go/ Thanks, Stephen Levine Core CF Buildpacks PM |
|
Re: cf create-service-auth-token for mongo db returns create-service-auth-token only works up to CF API version 2.46.0. Your target is 2.79.0.
Alex Irazabal
I tried it but got stuck here:
Deploying --------- Director task 108 Deprecation: Ignoring cloud config. Manifest contains 'networks' section. Started preparing deployment > Preparing deployment. Done (00:00:00) it just sits there...not sure what is failing on. Started preparing package compilation > Finding packages to compile |
|
FYI: updates to CF-Extensions process and proposal template
Michael Maximilien
FYI...
The process (2 pages) and proposal template (1 page) have had a few updates since I released them earlier this year. Changes are based on your feedback and Chip more recently. Thank you. Please peruse for correctness and add additional comments there. Process: https://docs.google.com/document/d/1KaYuqNbPrr23d3OsAhi0NTwBNy-LRZK-FbN3LfBgqjw Template: https://docs.google.com/document/d/1cpyBmds7WYNLKO1qkjhCdS8bNSJjWH5MqTE-h1UCQkQ Lots coming in CF-Extensions this year and please know that I am always happy to chat with anyone with a CF-related OSS project that they would like to consider submitting. Best, dr.max ibm cloud labs sillicon valley, ca usa maximilien.org Sent from my iPhone |
|
Re: cf create-service-auth-token for mongo db returns create-service-auth-token only works up to CF API version 2.46.0. Your target is 2.79.0.
Lin, Lynn <Lynn.X.Lin@...>
If you only want to use mongodb service ,maybe you can have a try this one https://github.com/cloudfoundry-community/mongodb-bosh-release :)
|
|