[FEEDBACK REQUESTED] Brokers MAY receive update request with no parameters or plan change
Lozev, Georgi
Hello CF Broker authors,
As part of the efforts to improve the workflows and the user experience related to services in Cloud Foundry the following proposal was born [1].
The idea is to add the name of the service instance in CF as part of the context information passed to the brokers on provision and update requests. This will allow broker authors to do things like displaying dashboards with more useful information than the service instance guid.
We have a suspicion that sending an update request with no parameters or plan change may break some existing brokers and we’d like to get some early feedback on that.
Could you please elaborate if you are a broker author and think this might be a breaking change for you?
You could reach the Services API Team by replying to this email or in our Slack channel [2].
BR, Georgi & Niki on behalf of SAPI Team
[1] https://github.com/openservicebrokerapi/servicebroker/pull/544 [2] https://cloudfoundry.slack.com/messages/C5WH3RDLZ
|
|
High Availability in Cloud Foundry
#cf
s.yousouf@...
Hi all,
I am conducting a research whether we can ensure that application instances run in different availability zones (AZs) to guarantee their high availability.
Generally, how do you guarantee HA for your applications and the apps of customers? According to the description of the Diego Auction (https://docs.cloudfoundry.org/concepts/diego/diego-auction.html), first priority is to choose Diego cells with correct software stack and sufficient resources; distribution over different AZs is a second priority. Therefore an app might be running in only one AZ.
Also, how can we detect in which AZs the applications are running? We checked the output of CC REST APIs v2 and v3 and of cf tool but didn’t find anything useful there.
Going one step further, can we do more than only detect such cases in our CF installations and warn users? Is there tooling or APIs to rebalance the instances without restarting or pausing the apps?
Thanks in advance, Shenol
|
|
Re: [cf-bosh] BOSH PMC refactoring part 2 – moving CPIs out of incubation
Dr Nic Williams <drnicwilliams@...>
Thanks Marco
From: cf-bosh@... <cf-bosh@...> on behalf of Marco Voelz <marco.voelz@...>
Sent: Thursday, August 23, 2018 7:17:33 PM To: cf-bosh@... Cc: Discussions about Cloud Foundry projects and the system overall. Subject: [cf-bosh] BOSH PMC refactoring part 2 – moving CPIs out of incubation Dear friends of BOSH,
The BOSH project management committee (PMC) proposes to promote the most mature and widely used CPIs from incubation to full project status. Specifically, we want to promote these CPIs
Promoting the projects has some impact on their users, depending on how you consume the CPIs
Please reach out to by replying to this mail or contacting me personally if you have questions, concerns, or comments.
Warm regards
Marco
PS: cross-posted on cf-developers for greater reach and potential experiences about previous promotions from incubator to full project.
|
|
BOSH PMC refactoring part 2 – moving CPIs out of incubation
Marco Voelz
Dear friends of BOSH,
The BOSH project management committee (PMC) proposes to promote the most mature and widely used CPIs from incubation to full project status. Specifically, we want to promote these CPIs
Promoting the projects has some impact on their users, depending on how you consume the CPIs
Please reach out to by replying to this mail or contacting me personally if you have questions, concerns, or comments.
Warm regards
Marco
PS: cross-posted on cf-developers for greater reach and potential experiences about previous promotions from incubator to full project.
|
|
Re: UAA required configuration
#cf
williamnguyen167@...
Thank you for your reply.
I have fixed this problem by adding encryption into uaa.yml Still having another exception but uncommment the SAML key configuration will solve it.
|
|
Notice: [Cloud Controller] capi-release is removing debian_nfs_server
Charles Hansen <chansen@...>
Hi all, capi-release is removing the debian_nfs_server job and package. It was deprecated in January 2016 and replaced with webdav. We still support connecting to nfs, but we no longer provide an nfs server. To follow the full extent of this work, you can see the tracker story here: Please feel free to reach out on slack if you have any questions: Thanks, - CAPI team
|
|
Re: CFCR?
Hi Mike, Use this mailing list or go directly to the Slack #cfcr channel. https://cloudfoundry.slack.com/messages/C5SF37P8X Sincerely, Alex Slynko
|
|
Re: CFCR?
Chip Childers <cchilders@...>
This should work! Or if it's more BOSH related, the cf-bosh@... list might be better.
On Wed, Aug 22, 2018 at 3:39 PM Mike Lloyd <mike@...> wrote:
--
Chip Childers CTO, Cloud Foundry Foundation 1.267.250.0815
|
|
CFCR?
mike@...
Hey folks,
Where is the best place to post topics/questions about CFCR? Would that be here or is there another mailing list specific to CFCR?
Respectfully,
Mike Lloyd t: @mxplusc g: @mxplusb
|
|
Re: UAA required configuration
#cf
Dr Nic Williams <drnicwilliams@...>
Try adding this encryption: section https://github.com/starkandwayne/quick-uaa-deployment-cf/blob/master/src/uaa.yml#L8
From: 30051024040n behalf of
I'm trying to build UAA on localhost (Window 10 Home)Sent: Wednesday, August 22, 2018 6:02 pm To: cf-dev@... Subject: [cf-dev] UAA required configuration #cf After running command "$ ./gradlew run" And finished (I think so) execute at 97% I running command: "$ curl -H "Accept: application/json" localhost:8080/uaa/login {
"timestamp":"2012-03-28T18:25:49+0100",
"commit_id":"111274e",
"prompts":{"username":["text","Username"],
"password":["password","Password"]
}
}"Server return "FAILURE" Take a look at log file The exception threw as: "Invalid bean definition with name 'activeKeyService' defined in class path resource [spring/login-ui.xml]: Could not resolve placeholder 'encryption.active_key_label' in value "${encryption.active_key_label}"; nested exception is java.lang.IllegalArgumentException: Could not resolve placeholder 'encryption.active_key_label' in value "${encryption.active_key_label}" How can I fix this problem?
|
|
UAA required configuration
#cf
williamnguyen167@...
I'm trying to build UAA on localhost (Window 10 Home)
After running command "$ ./gradlew run" And finished (I think so) execute at 97% I running command: "$ curl -H "Accept: application/json" localhost:8080/uaa/login {
"timestamp":"2012-03-28T18:25:49+0100",
"commit_id":"111274e",
"prompts":{"username":["text","Username"],
"password":["password","Password"]
}
}"Server return "FAILURE" Take a look at log file The exception threw as: "Invalid bean definition with name 'activeKeyService' defined in class path resource [spring/login-ui.xml]: Could not resolve placeholder 'encryption.active_key_label' in value "${encryption.active_key_label}"; nested exception is java.lang.IllegalArgumentException: Could not resolve placeholder 'encryption.active_key_label' in value "${encryption.active_key_label}" How can I fix this problem?
|
|
Re: Polyglot Service Discovery is Generally Available
Mike Youngstrom <youngm@...>
Wahoo!!!!
On Tue, Aug 21, 2018 at 5:32 PM Preethi Varambally <pvarambally@...> wrote:
|
|
Re: Polyglot Service Discovery is Generally Available
Zach Robinson
Congrats CF Networking Team!
On Tue, Aug 21, 2018 at 4:34 PM Preethi Varambally <pvarambally@...> wrote:
|
|
Polyglot Service Discovery is Generally Available
Preethi Varambally
Hello All, Polyglot Service Discovery is now Generally Available in cf-deployment version 3.4.0. Here is the feature narrative that we had shared previously and contains the latest updates. We made an enhancement to this feature to allow you to configure custom internal domains. Optionally you can still continue to use 'apps.internal' if you wish to. You can find instructions for this on our Github page. Please reach out to us if you have any questions. Thanks, CF Networking Team
|
|
Re: Service Instance Sharing is now GA
Zach Robinson
Awesome feature. Congrats Services API Team!
On Tue, Aug 21, 2018 at 3:17 AM Sam Gunaratne <rgunaratne@...> wrote:
|
|
Service Instance Sharing is now GA
Sam Gunaratne
Hello CF Devs, We are happy to announce that Service Instance Sharing is now Generally Available starting from CF Deployment 3.4.0 (CAPI Release 1.66.0). Sharing a service instance between spaces allows apps in different spaces to share databases, messaging queues, and other types of services. This eliminates the need for development teams to use service keys and user-provided services to bind their apps to the same service instance that was provisioned using the cf create-service command. Sharing service instances improves security, auditing, and provides a more intuitive user experience. This functionality is turned off by default but can be enabled in CF using a feature flag. You can read more here: https://docs.cloudfoundry.org/devguide/services/sharing-instances.html We would like to thank for your feedback during the experimental phase. Thanks, Services API Team
|
|
Re: REQUEST for REVIEW - Proposed Scope for CF-Deployment v4.0
Marco Voelz
Dear Josh,
Thanks for starting this process for cf-deployment 4.0!
Announcing coming changes and also changes that didn't make it in 4.0 addresses some of the concerns I raised about cf-deployment 3.0 [1] and hopefully the next major releases will go a bit smoother. It is also great that you specifically mention where you got the team's sign-off to enable/disable certain things.
Warm regards Marco
From: cf-dev@... <cf-dev@...> on behalf of Josh Collins <jcollins@...>
Sent: Friday, August 17, 2018 8:49:28 PM To: cf-dev@... Subject: [cf-dev] REQUEST for REVIEW - Proposed Scope for CF-Deployment v4.0 Hello Fellow Cloud-Foundrians,
-- Based on the feedback generated during the cf-deployment v3.0 retro and observations of the impact of 3.0 on the CF development community CI's, I'd like to share and gather feedback on proposed scope of the next major release of cf-deployment.
As per the action item generated in the 3.0 retro, I've created a Google Doc which describes the high-level changes under proposal.
Anyone with the link above can review and comment.
Please feel free to review and provide feedback in the document as soon as you're able.
We'll be locking the scope the middle of next week (Wednesday August 22nd).
For those interested in following, here's the v4.0 epic in our backlog.
Lastly, if you've got breaking changes that you'd like Release Integration to consider in the future please bring them to my and the team's attention:
Thanks very much for reading to the end and Happy Friday!
Josh Collins
PM - Release Integration
Josh Collins
PM - CF R&D Release Integration
|
|
REQUEST for REVIEW - Proposed Scope for CF-Deployment v4.0
Josh Collins
Hello Fellow Cloud-Foundrians, -- Based on the feedback generated during the cf-deployment v3.0 retro and observations of the impact of 3.0 on the CF development community CI's, I'd like to share and gather feedback on proposed scope of the next major release of cf-deployment. As per the action item generated in the 3.0 retro, I've created a Google Doc which describes the high-level changes under proposal. Anyone with the link above can review and comment. Please feel free to review and provide feedback in the document as soon as you're able. We'll be locking the scope the middle of next week (Wednesday August 22nd). For those interested in following, here's the v4.0 epic in our backlog. Lastly, if you've got breaking changes that you'd like Release Integration to consider in the future please bring them to my and the team's attention: Thanks very much for reading to the end and Happy Friday! Josh Collins PM - Release Integration Josh Collins PM - CF R&D Release Integration
|
|
NOTICE: [go-buildpack] Default Go version will change from 1.8.x to 1.10.x after 2018-09-17
Scott Sisil
The default version of Go will be updated to 1.10.x in the first release after 2018-09-17. Per the Go release website, Go versions that are two releases behind the latest major release are not supported[1]. Therefore we are giving users a 30 day notice before we change the default version of Go to the latest major version 1.10.x and remove Go versions 1.6.x and 1.7.x as they are no longer supported. If you are using 1.6.x and 1.7.x, please make plans to migrate your applications to 1.10.x in the next 30 days. [1] https://golang.org/doc/devel/release.html
CF Buildpacks PM
|
|
Re: Proposal: Improving Security for HTTP Ingress to CFAR Application Containers
Eric Malm <emalm@...>
On Thu, Aug 16, 2018 at 9:16 PM, Mike Youngstrom <youngm@...> wrote:
Huh, something weird has been going on with the permissions on that document: this is the third time now that I've had to change them back to allowing global comments. If for some reason that reverts back to a more restricted mode (on this proposal document or any others I've posted here) please let me know via an access request or via email or Slack and I'll correct it again.
Sure, thanks for the extra feedback, and for hanging in there! Best, Eric
|
|