Date   

Re: SSL termination for private domains

Carlo Alberto Ferraris
 

Our current policy to our users is SNI by default, i.e. unless they explicitly require non-SNI TLS termination they get SNI termination. We went with this because browser support seems good[1] and because there are "easy" (albeit manual) workarounds (request a non-SNI VIP, use a CDN).

Granted, even with SNI TLS termination in gorouter we should still be able to perform TLS termination somewhere else for the few cases in which no SNI is really a requirement - but for this it's enough to not change the HTTP listener behavior.

[1]: http://caniuse.com/#feat=sni


Re: SSL termination for private domains

Shannon Coen
 

Thank you all for your responses.

A follow up question: for the gorouter to host certs for multiple domains,
it seems only natural that it would do this via SNI. Is client support for
SNI ubiquitous among apps running on your CF deployments? Would it be
reasonable to require client SNI support for TLS termination at gorouter?

Thanks again.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Wed, Sep 21, 2016 at 5:52 AM, James Leavers <james(a)cloudhelix.io> wrote:

It sounds like we are in a similar situation to Carlo, i.e.


- We have an external pair of LBs
- These are used for SSL termination
- We upload SSL certificates to the LBs for various domains, which
point to the same VIP


If something became available that would easily allow app developers /
users to upload their own certificates, I too would happily move SSL
termination from the LBs to gorouter, as it would mean one less automation
workflow for us :-)


On 21 September 2016 at 02:04:48, Shannon Coen (scoen(a)pivotal.io) wrote:

Carlo, Mike, others,

Do you store certs in the LB config itself, or federate/offload TLS
termination to some secure store? I'm thinking about storing user-provided
certs in the Routing API and offering them to routers/LBs from there. Would
we instead have to send the certs to some other proprietary system from
where the router/LB would have to pull from?

I've heard a few requests for integrating with systems that store the
certs so that the routers don't have access to the keys.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 5:44 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

Mike,
thanks for keeping the ball rolling!
For the TLS termination part we are currently using a setup very similar
to the one described by Mike. We sit behind a bunch of SLBs that handle
termination for us. The main difference is that we're moving out of the
"one VIP per cert" model Mike describes to "one SNI VIP for all certs" - a
choice we made exactly to keep options open when it comes to automating
this process.
The biggest pain comes from the fact that the SLB in our organization is
handled by a different team and that therefore every cert add/update/delete
operation requires a manual operation spanning three teams (application
team, our team, SLB team); in the worst cases such operations can take
days. We may be different in this from other CF operators, but this
situation happens fairly frequently.
To put it simply, if CF (gorouter or a different component) had a way to
dynamically apply certificates specified by the users (and operators) we
would gladly switch away from our current setup.
We were also considering (idea stage, nothing really planned yet) using
either nginx or a custom-built TLS terminator for this very purpose (the
main reason we're considering something custom built is because it's
somewhat hard to get session ticket key rotation right with nginx when you
have multiple servers) - but if something functionally equivalent were to
appear upstream we would definitely prefer it.

I hope everything makes sense, if not I'll gladly answer any question you
may have.

Thanks for looking into this!

Carlo


Re: SSL termination for private domains

Shannon Coen
 

On Tue, Sep 20, 2016 at 10:00 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

While we're talking about TLS, but this is only partially related, it
would be awesome if we were to implement (or some hooks were provided to be
able to complete) either the http or tls ACME challenges. That would be the
ultimate dream. :D
Wasn't familiar with ACME until I just googled it. Do you mean some
mechanism for automated generation of certs?


Re: Do we connect to the CF when we setup using pcfdev

Praveen sadineni
 

Hello Stephen,

I am using Windows 10 and I have opened a issue in Github.


Re: SSL termination for private domains

James Leavers
 

It sounds like we are in a similar situation to Carlo, i.e.


- We have an external pair of LBs
- These are used for SSL termination
- We upload SSL certificates to the LBs for various domains, which point
to the same VIP


If something became available that would easily allow app developers /
users to upload their own certificates, I too would happily move SSL
termination from the LBs to gorouter, as it would mean one less automation
workflow for us :-)

On 21 September 2016 at 02:04:48, Shannon Coen (scoen(a)pivotal.io) wrote:

Carlo, Mike, others,

Do you store certs in the LB config itself, or federate/offload TLS
termination to some secure store? I'm thinking about storing user-provided
certs in the Routing API and offering them to routers/LBs from there. Would
we instead have to send the certs to some other proprietary system from
where the router/LB would have to pull from?

I've heard a few requests for integrating with systems that store the certs
so that the routers don't have access to the keys.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 5:44 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

Mike,
thanks for keeping the ball rolling!
For the TLS termination part we are currently using a setup very similar
to the one described by Mike. We sit behind a bunch of SLBs that handle
termination for us. The main difference is that we're moving out of the
"one VIP per cert" model Mike describes to "one SNI VIP for all certs" - a
choice we made exactly to keep options open when it comes to automating
this process.
The biggest pain comes from the fact that the SLB in our organization is
handled by a different team and that therefore every cert add/update/delete
operation requires a manual operation spanning three teams (application
team, our team, SLB team); in the worst cases such operations can take
days. We may be different in this from other CF operators, but this
situation happens fairly frequently.
To put it simply, if CF (gorouter or a different component) had a way to
dynamically apply certificates specified by the users (and operators) we
would gladly switch away from our current setup.
We were also considering (idea stage, nothing really planned yet) using
either nginx or a custom-built TLS terminator for this very purpose (the
main reason we're considering something custom built is because it's
somewhat hard to get session ticket key rotation right with nginx when you
have multiple servers) - but if something functionally equivalent were to
appear upstream we would definitely prefer it.

I hope everything makes sense, if not I'll gladly answer any question you
may have.

Thanks for looking into this!

Carlo


Re: SSL termination for private domains

Anthony
 

+1 to user provided certs for private domains. Today, we use multiple vips with diff certs or our main vip with a cert that has multiple SANs.

Our goal is for cf operators to really be out of the way for app specific concerns and we view the certs and private domains (vanity dns names) as an application concern.

Having this ability provides immense value to us.

Regards,
Anthony

On Sep 20, 2016, at 8:03 PM, Shannon Coen <scoen(a)pivotal.io> wrote:

Carlo, Mike, others,

Do you store certs in the LB config itself, or federate/offload TLS termination to some secure store? I'm thinking about storing user-provided certs in the Routing API and offering them to routers/LBs from there. Would we instead have to send the certs to some other proprietary system from where the router/LB would have to pull from?

I've heard a few requests for integrating with systems that store the certs so that the routers don't have access to the keys.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 5:44 PM, Carlo Alberto Ferraris <carlo.ferraris(a)rakuten.com> wrote:
Mike,
thanks for keeping the ball rolling!
For the TLS termination part we are currently using a setup very similar to the one described by Mike. We sit behind a bunch of SLBs that handle termination for us. The main difference is that we're moving out of the "one VIP per cert" model Mike describes to "one SNI VIP for all certs" - a choice we made exactly to keep options open when it comes to automating this process.
The biggest pain comes from the fact that the SLB in our organization is handled by a different team and that therefore every cert add/update/delete operation requires a manual operation spanning three teams (application team, our team, SLB team); in the worst cases such operations can take days. We may be different in this from other CF operators, but this situation happens fairly frequently.
To put it simply, if CF (gorouter or a different component) had a way to dynamically apply certificates specified by the users (and operators) we would gladly switch away from our current setup.
We were also considering (idea stage, nothing really planned yet) using either nginx or a custom-built TLS terminator for this very purpose (the main reason we're considering something custom built is because it's somewhat hard to get session ticket key rotation right with nginx when you have multiple servers) - but if something functionally equivalent were to appear upstream we would definitely prefer it.

I hope everything makes sense, if not I'll gladly answer any question you may have.

Thanks for looking into this!

Carlo


Re: Announcing Volume Services for Cloud Foundry

Julz Friedman
 

This is ridiculously cool - nice work Persils!

On Wed, 21 Sep 2016 at 02:50, Shannon Coen <scoen(a)pivotal.io> wrote:

Persistence!

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 4:28 PM, Kayode Odeyemi <dreyemi(a)gmail.com> wrote:

Thank you very much.

So much awesomeness.

On Wed, Sep 21, 2016 at 12:00 AM, Shawn Nielsen <sknielse(a)gmail.com>
wrote:

Thanks to all who helped contribute and make this happen! This is
fantastic news.

On Tue, Sep 20, 2016 at 3:56 PM, Mike Youngstrom <youngm(a)gmail.com>
wrote:

This is great! Something many of my customers have been wanting for a
long time. Now to figure out how to integrate it with our NetApp NFS.

Mike

On Tue, Sep 20, 2016 at 3:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes
are distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in
the links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's
talk detailing the types of Shared Volume Services available, and their
usecases.

If you're interested in rolling out a volume service, please be in
touch. You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or
email me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal


--
Odeyemi 'Kayode O.
http://ng.linkedin.com/in/kayodeodeyemi. t: @charyorde


Re: SSL termination for private domains

Carlo Alberto Ferraris
 

While we're talking about TLS, but this is only partially related, it would be awesome if we were to implement (or some hooks were provided to be able to complete) either the http or tls ACME challenges. That would be the ultimate dream. :D


Re: SSL termination for private domains

Carlo Alberto Ferraris
 

We don't have the requirement to use an external secure store, but for that custom terminator component we were thinking to use an external secure store (Vault or something along those lines) to make sure that the the private keys and session ticket keys never hit persistent storage.


Re: SSL termination for private domains

Shannon Coen
 

Carlo, Mike, others,

Do you store certs in the LB config itself, or federate/offload TLS
termination to some secure store? I'm thinking about storing user-provided
certs in the Routing API and offering them to routers/LBs from there. Would
we instead have to send the certs to some other proprietary system from
where the router/LB would have to pull from?

I've heard a few requests for integrating with systems that store the certs
so that the routers don't have access to the keys.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 5:44 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

Mike,
thanks for keeping the ball rolling!
For the TLS termination part we are currently using a setup very similar
to the one described by Mike. We sit behind a bunch of SLBs that handle
termination for us. The main difference is that we're moving out of the
"one VIP per cert" model Mike describes to "one SNI VIP for all certs" - a
choice we made exactly to keep options open when it comes to automating
this process.
The biggest pain comes from the fact that the SLB in our organization is
handled by a different team and that therefore every cert add/update/delete
operation requires a manual operation spanning three teams (application
team, our team, SLB team); in the worst cases such operations can take
days. We may be different in this from other CF operators, but this
situation happens fairly frequently.
To put it simply, if CF (gorouter or a different component) had a way to
dynamically apply certificates specified by the users (and operators) we
would gladly switch away from our current setup.
We were also considering (idea stage, nothing really planned yet) using
either nginx or a custom-built TLS terminator for this very purpose (the
main reason we're considering something custom built is because it's
somewhat hard to get session ticket key rotation right with nginx when you
have multiple servers) - but if something functionally equivalent were to
appear upstream we would definitely prefer it.

I hope everything makes sense, if not I'll gladly answer any question you
may have.

Thanks for looking into this!

Carlo


Re: Announcing Volume Services for Cloud Foundry

Shannon Coen
 

Persistence!

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 4:28 PM, Kayode Odeyemi <dreyemi(a)gmail.com> wrote:

Thank you very much.

So much awesomeness.

On Wed, Sep 21, 2016 at 12:00 AM, Shawn Nielsen <sknielse(a)gmail.com>
wrote:

Thanks to all who helped contribute and make this happen! This is
fantastic news.

On Tue, Sep 20, 2016 at 3:56 PM, Mike Youngstrom <youngm(a)gmail.com>
wrote:

This is great! Something many of my customers have been wanting for a
long time. Now to figure out how to integrate it with our NetApp NFS.

Mike

On Tue, Sep 20, 2016 at 3:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes
are distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in
the links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in
touch. You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or
email me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal


--
Odeyemi 'Kayode O.
http://ng.linkedin.com/in/kayodeodeyemi. t: @charyorde


Re: SSL termination for private domains

Carlo Alberto Ferraris
 

Mike,
thanks for keeping the ball rolling!
For the TLS termination part we are currently using a setup very similar to the one described by Mike. We sit behind a bunch of SLBs that handle termination for us. The main difference is that we're moving out of the "one VIP per cert" model Mike describes to "one SNI VIP for all certs" - a choice we made exactly to keep options open when it comes to automating this process.
The biggest pain comes from the fact that the SLB in our organization is handled by a different team and that therefore every cert add/update/delete operation requires a manual operation spanning three teams (application team, our team, SLB team); in the worst cases such operations can take days. We may be different in this from other CF operators, but this situation happens fairly frequently.
To put it simply, if CF (gorouter or a different component) had a way to dynamically apply certificates specified by the users (and operators) we would gladly switch away from our current setup.
We were also considering (idea stage, nothing really planned yet) using either nginx or a custom-built TLS terminator for this very purpose (the main reason we're considering something custom built is because it's somewhat hard to get session ticket key rotation right with nginx when you have multiple servers) - but if something functionally equivalent were to appear upstream we would definitely prefer it.

I hope everything makes sense, if not I'll gladly answer any question you may have.

Thanks for looking into this!

Carlo


Re: Announcing Volume Services for Cloud Foundry

Paul Bakare
 

Thank you very much.

So much awesomeness.

On Wed, Sep 21, 2016 at 12:00 AM, Shawn Nielsen <sknielse(a)gmail.com> wrote:

Thanks to all who helped contribute and make this happen! This is
fantastic news.

On Tue, Sep 20, 2016 at 3:56 PM, Mike Youngstrom <youngm(a)gmail.com> wrote:

This is great! Something many of my customers have been wanting for a
long time. Now to figure out how to integrate it with our NetApp NFS.

Mike

On Tue, Sep 20, 2016 at 3:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes
are distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in
the links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in
touch. You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email
me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal

--
Odeyemi 'Kayode O.
http://ng.linkedin.com/in/kayodeodeyemi. t: @charyorde


Re: SSL termination for private domains

Mike Youngstrom <youngm@...>
 

An extension point would be more useful than something that only worked on
the gorouters.

Another thing that mitigates our need for this feature is that most all of
our organization's applications (CF deployed or not) use one of 2 main
wildcard domains. Use of domains outside these 2 are rare.

We built a custom iteration with our DNS solution and CF that looks for new
CF routes using one of those 2 domains and automatically add a dns entry
(if not already taken) pointing to shared VIPs on our FLB that have a
matching wildcard cert already configured. That allows us to add those 2
domains as CF shared domains that anyone can create routes for. Even
though the domains are not dedicated to CF.

I suppose that would be another reason why this isn't currently a major
pain point for my users.

Mike

On Tue, Sep 20, 2016 at 3:54 PM, Shannon Coen <scoen(a)pivotal.io> wrote:

Mike,

What if the way the gorouters were configured with user-provided certs was
a point of extension that could also be used to configure your FLB?

How often do you have to manage certs on your LB? Is this of low value?

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 12:43 PM, Mike Youngstrom <youngm(a)gmail.com>
wrote:

For us we handle all ssl termination in our FLB (Frontend Load
Balancer). If a customer adds a custom domain then my team needs to add a
vip and associated cert for that domain. This is something I don't think
CF could do for us because we are using our FLB. So, FWIW this isn't a
feature we would use since we use or FLB to manage this instead.

Mike

On Mon, Sep 19, 2016 at 11:25 PM, Shannon Coen <scoen(a)pivotal.io> wrote:

Some time ago I sketched out an epic to add support for multiple certs
to gorouter, configured via BOSH manifest property, but these stories have
languished in the icebox while we've addressed more urgent work.

I would like to hear from the community whether an operator managed
feature would be of value, as it would be relatively cheap.

I have also heard requests for user self-service management of certs for
private domains, as Carlo described. This would be a much more complex
feature to deliver, but I can certainly see the value.

Tell me about the pain of managing TLS certificates. How are you dealing
with this today? Which of these approaches would be more helpful in
enabling your developers? Which of these features would you be more
disappointed to hear would not be delivered?

Thank you!

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Mon, Sep 19, 2016 at 6:11 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

I have a question about the SSL termination epic[1], whose goal IIUC is
to provide the ability for operators to have multiple TLS certificates: it
seems only shared domains are being considered (because the stories talk
about *operators* setting up multiple certs); are there no plans for
private domains? Put otherwise: are there plans for allowing *users* to
provide the cert for a domain they registered in their org?

[1] https://www.pivotaltracker.com/epic/show/2135866

(I originally posted the question on slack but got no reply, so
crossposting here)


Re: Announcing Volume Services for Cloud Foundry

Shawn Nielsen
 

Thanks to all who helped contribute and make this happen! This is
fantastic news.

On Tue, Sep 20, 2016 at 3:56 PM, Mike Youngstrom <youngm(a)gmail.com> wrote:

This is great! Something many of my customers have been wanting for a
long time. Now to figure out how to integrate it with our NetApp NFS.

Mike

On Tue, Sep 20, 2016 at 3:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes
are distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in
the links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in touch.
You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email
me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal


Re: Announcing Volume Services for Cloud Foundry

Mike Youngstrom <youngm@...>
 

This is great! Something many of my customers have been wanting for a long
time. Now to figure out how to integrate it with our NetApp NFS.

Mike

On Tue, Sep 20, 2016 at 3:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes are
distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in the
links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in touch.
You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email
me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal


Re: SSL termination for private domains

Shannon Coen
 

Mike,

What if the way the gorouters were configured with user-provided certs was
a point of extension that could also be used to configure your FLB?

How often do you have to manage certs on your LB? Is this of low value?

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Tue, Sep 20, 2016 at 12:43 PM, Mike Youngstrom <youngm(a)gmail.com> wrote:

For us we handle all ssl termination in our FLB (Frontend Load Balancer).
If a customer adds a custom domain then my team needs to add a vip and
associated cert for that domain. This is something I don't think CF could
do for us because we are using our FLB. So, FWIW this isn't a feature we
would use since we use or FLB to manage this instead.

Mike

On Mon, Sep 19, 2016 at 11:25 PM, Shannon Coen <scoen(a)pivotal.io> wrote:

Some time ago I sketched out an epic to add support for multiple certs to
gorouter, configured via BOSH manifest property, but these stories have
languished in the icebox while we've addressed more urgent work.

I would like to hear from the community whether an operator managed
feature would be of value, as it would be relatively cheap.

I have also heard requests for user self-service management of certs for
private domains, as Carlo described. This would be a much more complex
feature to deliver, but I can certainly see the value.

Tell me about the pain of managing TLS certificates. How are you dealing
with this today? Which of these approaches would be more helpful in
enabling your developers? Which of these features would you be more
disappointed to hear would not be delivered?

Thank you!

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Mon, Sep 19, 2016 at 6:11 PM, Carlo Alberto Ferraris <
carlo.ferraris(a)rakuten.com> wrote:

I have a question about the SSL termination epic[1], whose goal IIUC is
to provide the ability for operators to have multiple TLS certificates: it
seems only shared domains are being considered (because the stories talk
about *operators* setting up multiple certs); are there no plans for
private domains? Put otherwise: are there plans for allowing *users* to
provide the cert for a domain they registered in their org?

[1] https://www.pivotaltracker.com/epic/show/2135866

(I originally posted the question on slack but got no reply, so
crossposting here)


Re: Announcing Volume Services for Cloud Foundry

Chip Childers <cchilders@...>
 

+1 ... this is awesome to see released!

On Tue, Sep 20, 2016 at 5:33 PM Amit Gupta <agupta(a)pivotal.io> wrote:

Sweet!!!

On Tue, Sep 20, 2016 at 2:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes
are distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in
the links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in touch.
You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email
me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Re: Announcing Volume Services for Cloud Foundry

Amit Kumar Gupta
 

Sweet!!!

On Tue, Sep 20, 2016 at 2:31 PM, Ted Young <tyoung(a)pivotal.io> wrote:

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones
with network-based interfaces, such as a SQL database. With Volume
Services, brokers can now attach data services which have a
filesystem-based interface.

Currently, we have platform support for Shared Volumes. Shared Volumes are
distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in the
links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in touch.
You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email
me directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal


Announcing Volume Services for Cloud Foundry

Ted Young
 

As of cf-242
<http://bosh.io/releases/github.com/cloudfoundry/cf-release?version=242>
and Service Broker API v2.10, Cloud Foundry now ships with support for *Volume
Services*: filesystem-based data services. The v2.10 API is a release
candidate, and will be considered GA unless a bug in the implementation is
fond. An experimental version of the API was added in v2.9.

Until recently, the only data services that have been allowed are ones with
network-based interfaces, such as a SQL database. With Volume Services,
brokers can now attach data services which have a filesystem-based
interface.

Currently, we have platform support for Shared Volumes. Shared Volumes are
distributed filesystems, such as NFS-based systems, which allow all
instances of an application to share the same mounted volume simultaneously
and access it concurrently.

This feature adds two new concepts to CF: *Volume Mounts* for Service
Brokers and *Volume Drivers* for Diego Cells. Details can be found in the
links below.

*Documentation:* https://bit.ly/cf-volume-services
*CF Summit Talk:* https://www.youtube.com/watch?v=ajNoPi1uMjQ

If you're going to CF Summit Europe, be sure to check out Julian's talk
detailing the types of Shared Volume Services available, and their usecases.

If you're interested in rolling out a volume service, please be in touch.
You can ask questions here, on the OSS #persi
<https://cloudfoundry.slack.com/archives/persi> slack channel, or email me
directly at tyoung(a)pivotal.io.

Cheers,

Ted Young
Persistence Project Lead, Pivotal