Skip to content

Commit 2e7a02a

Browse files
committed
Merge branch 'release-v1.14.0' into 'master'
Release v1.14.0 See merge request automation-sdk/f5-cloud-failover!329
2 parents 2d6da09 + a4cbfbe commit 2e7a02a

28 files changed

Lines changed: 623 additions & 321 deletions

.gitlab-ci.yml

Lines changed: 49 additions & 128 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# f5-cloud-failover
1+
# F5 BIG-IP Cloud Failover extension for AWS, Azure, and GCP
22
[![Releases](https://img.shields.io/github/release/f5networks/f5-cloud-failover-extension.svg)](https://github.com/f5networks/f5-cloud-failover-extension/releases)
33
[![Issues](https://img.shields.io/github/issues/f5networks/f5-cloud-failover-extension.svg)](https://github.com/f5networks/f5-cloud-failover-extension/issues)
44

@@ -8,7 +8,7 @@
88

99
## Introduction
1010

11-
The F5 Cloud Failover Extension (CF) is an iControl LX extension that provides L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). Cloud Failover uses a declarative model, meaning you provide a JSON declaration using a single REST API call. The declaration represents the configuration that Cloud Failover is responsible for creating on a BIG-IP system.
11+
The F5 BIG-IP Cloud Failover Extension (CFE) for AWS, Azure, and GCP is an iControl LX extension that provides L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). Cloud Failover uses a declarative model, meaning you provide a JSON declaration using a single REST API call. The declaration represents the configuration that Cloud Failover is responsible for creating on a BIG-IP system.
1212

1313
### How does it work?
1414

contributing/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ This is the top-level documentation which provides notes and information about c
88
---
99
## Overview
1010

11-
The purpose of the F5 Cloud Failover (CF) iControl LX extension is to provide L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). This requires moving/updating certain cloud resources during a failover event, as described below.
11+
The purpose of the F5 BIG-IP Cloud Failover (CF) iControl LX extension is to provide L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). This requires moving/updating certain cloud resources during a failover event, as described below.
1212

1313
- Failover IP(s) - Move Azure IP configuration(s) between NICs, update AWS EIP/private IP associations, and move GCP alias IP(s) between instances to point to a virtual address on the active BIG-IP device.
1414
- Failover Route(s) - Update Azure user-defined Routes (UDR), AWS route tables, and GCP forwarding rule targets to point to a self IP address of the active BIG-IP device.

deployment-tool

38.5 KB
Loading

docs/index.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
F5 Cloud Failover
2-
=================
1+
F5 BIG-IP Cloud Failover
2+
========================
33

4-
Welcome to the F5 Cloud Failover Extension User Guide.
4+
Welcome to the F5 BIG-IP Cloud Failover Extension User Guide.
55

66
Use the following links, the navigation on the left, and/or the Next and Previous buttons to explore the documentation.
77

docs/revision-history.rst

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,12 @@ Document Revision History
1111
- Description
1212
- Date
1313

14+
* - 2.2.6
15+
- Improved performance of Azure failover provider.
16+
- Fixed issue with logging of proxy server settings.
17+
- Updated the documentation for Cloud Failover Extension v1.14.0 with the following changes: |br| • Updated documentation in :ref:`isolated-env`, :ref:`aws`, :ref:`aws-same-az`, :ref:`gcp`, and :ref:`azure`.
18+
- 02-17-23
19+
1420
* - 2.2.5
1521
- Fixed issue where failover does not correctly check traffic group status in recovery mode.
1622
- 7-26-22
@@ -80,7 +86,7 @@ Document Revision History
8086
- 01-23-20
8187

8288
* - 1.0
83-
- Documentation for the initial release of F5 Cloud Failover Extension
89+
- Documentation for the initial release of F5 BIG-IP Cloud Failover Extension
8490
- 11-22-19
8591

8692

docs/userguide/aws-same-az.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -410,8 +410,8 @@ Alternatively, for *Actions* that **do** allow resource level permissions, but t
410410

411411
.. _aws-same-az-define-objects:
412412

413-
Define AWS Network Infrastructure Objects
414-
-----------------------------------------
413+
Define AWS Infrastructure Objects
414+
---------------------------------
415415

416416
Define or Tag your cloud resources with the keys and values that you configure in your CFE declaration.
417417

@@ -460,8 +460,8 @@ Tag the Network Interfaces in AWS:
460460

461461
.. _aws-same-az-define-storage:
462462

463-
Define the Storage Account in AWS
464-
`````````````````````````````````
463+
Define Remote Storage for State File in AWS
464+
```````````````````````````````````````````
465465

466466
.. sidebar:: :fonticon:`fa fa-info-circle fa-lg` Version Notice:
467467

docs/userguide/aws.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -150,11 +150,11 @@ In order to successfully implement CFE in AWS, you need an AWS Identity and Acce
150150

151151
|
152152

153-
2. Assign an IAM role to each instance by navigating to **EC2 > Instances > Instance > Actions > Instance Settings > Attach/Replace IAM Role**.
153+
2. Assign an IAM role to each instance by navigating to **Actions > Security > Modify IAM Role**.
154154

155155
For example:
156156

157-
.. image:: ../images/aws/AWSIAMRoleAssignedToInstance.png
157+
.. image:: ../images/aws/AWSIAMRoleAssignedToInstance2.png
158158

159159
|
160160

@@ -402,8 +402,8 @@ Alternatively, for *Actions* that **do** allow resource level permissions, but t
402402

403403
.. _aws-define-objects:
404404

405-
Define AWS Network Infrastructure Objects
406-
-----------------------------------------
405+
Define AWS Infrastructure Objects
406+
---------------------------------
407407

408408
Define or Tag your cloud resources with the keys and values that you configure in your CFE declaration.
409409

@@ -440,8 +440,8 @@ Tag the Network Interfaces in AWS:
440440

441441
.. _aws-define-storage:
442442

443-
Define the Storage Account in AWS
444-
`````````````````````````````````
443+
Define Remote Storage for State File in AWS
444+
```````````````````````````````````````````
445445
.. sidebar:: :fonticon:`fa fa-info-circle fa-lg` Version Notice:
446446

447447
- The property ``scopingName`` is available in Cloud Failover Extension v1.7.0 and later.

docs/userguide/azure.rst

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,8 @@ Create and assign a Managed Service Identity (MSI)
9999
In order to successfully implement CFE in Azure, you need a system-assigned or user-managed identity with sufficient access. Your Managed Service Identity (MSI) should be limited to the resource groups that contain the BIG-IP instances, VNET, route tables, etc. that will be updated. Read more about managed identities |managed-identity|.
100100
To create and assign a Managed Service Identity (MSI) you must have a role of `User Access Administrator` or `Contributor access`. The following example shows a system-assigned MSI.
101101

102+
.. IMPORTANT:: CFE supports only one Managed Service Identity assigned to each Azure Virtual Machine instance; failover will not work correctly when multiple identities are assigned. You must create a single identity with all of the permissions required by CFE, as well as any other necessary permissions. You can create a managed identity manually or using the F5 access template. See https://github.com/F5Networks/f5-azure-arm-templates-v2/tree/main/examples/modules/access for more information.
103+
102104
#. Enable MSI for each VM: go to **Virtual Machine > Identity > System assigned** and set the status to ``On``.
103105

104106
For example:
@@ -156,14 +158,15 @@ Below is an example Azure role definition with permissions required by CFE.
156158
- This example provides the minimum permissions required and serves as an illustration. You are responsible for following the provider's IAM best practices.
157159
- Certain resources such as the virtual network are commonly deployed in a separate resource group; ensure the correct scopes are applied to all applicable resource groups.
158160
- Certain resources such as route tables may be deployed in a separate subscription, ensure the assignable scopes applies to all relevant subscriptions.
161+
- CFE supports only one Managed Service Identity assigned to each Azure Virtual Machine instance; failover will not function when multiple identities are assigned. You must create a single identity with all of the permissions listed above, as well as any other required permissions. You can create a managed identity manually, or by using the F5 access template. See https://github.com/F5Networks/f5-azure-arm-templates-v2/tree/main/examples/modules/access for more information.
159162

160163
|
161164

162165

163166
.. _azure-define-objects:
164167

165-
Define your Azure Network Infrastructure Objects
166-
------------------------------------------------
168+
Define your Azure Infrastructure Objects
169+
----------------------------------------
167170

168171
Define or Tag your cloud resources with the keys and values that you configure in your CFE declaration.
169172

@@ -193,7 +196,7 @@ Add a storage account in Azure to your resource group for Cloud Failover to use.
193196
|
194197

195198

196-
Alternatively, if you are using the Discovery via Tag option, tag the S3 bucket with your custom key:values in the `externalStorage.scopingTags` section of the CFE declaration.
199+
Alternatively, if you are using the Discovery via Tag option, tag the Azure Storage Account with your custom key:values in the `externalStorage.scopingTags` section of the CFE declaration.
197200

198201
.. code-block:: json
199202

0 commit comments

Comments
 (0)