You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The F5 Cloud Failover Extension (CF) is an iControl LX extension that provides L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). Cloud Failover uses a declarative model, meaning you provide a JSON declaration using a single REST API call. The declaration represents the configuration that Cloud Failover is responsible for creating on a BIG-IP system.
11
+
The F5 BIG-IP Cloud Failover Extension (CFE) for AWS, Azure, and GCP is an iControl LX extension that provides L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). Cloud Failover uses a declarative model, meaning you provide a JSON declaration using a single REST API call. The declaration represents the configuration that Cloud Failover is responsible for creating on a BIG-IP system.
Copy file name to clipboardExpand all lines: contributing/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ This is the top-level documentation which provides notes and information about c
8
8
---
9
9
## Overview
10
10
11
-
The purpose of the F5 Cloud Failover (CF) iControl LX extension is to provide L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). This requires moving/updating certain cloud resources during a failover event, as described below.
11
+
The purpose of the F5 BIG-IP Cloud Failover (CF) iControl LX extension is to provide L3 failover functionality in cloud environments, effectively replacing Gratuitous ARP (GARP). This requires moving/updating certain cloud resources during a failover event, as described below.
12
12
13
13
- Failover IP(s) - Move Azure IP configuration(s) between NICs, update AWS EIP/private IP associations, and move GCP alias IP(s) between instances to point to a virtual address on the active BIG-IP device.
14
14
- Failover Route(s) - Update Azure user-defined Routes (UDR), AWS route tables, and GCP forwarding rule targets to point to a self IP address of the active BIG-IP device.
Copy file name to clipboardExpand all lines: docs/revision-history.rst
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,12 @@ Document Revision History
11
11
- Description
12
12
- Date
13
13
14
+
* - 2.2.6
15
+
- Improved performance of Azure failover provider.
16
+
- Fixed issue with logging of proxy server settings.
17
+
- Updated the documentation for Cloud Failover Extension v1.14.0 with the following changes: |br| • Updated documentation in :ref:`isolated-env`, :ref:`aws`, :ref:`aws-same-az`, :ref:`gcp`, and :ref:`azure`.
18
+
- 02-17-23
19
+
14
20
* - 2.2.5
15
21
- Fixed issue where failover does not correctly check traffic group status in recovery mode.
16
22
- 7-26-22
@@ -80,7 +86,7 @@ Document Revision History
80
86
- 01-23-20
81
87
82
88
* - 1.0
83
-
- Documentation for the initial release of F5 Cloud Failover Extension
89
+
- Documentation for the initial release of F5 BIG-IP Cloud Failover Extension
Copy file name to clipboardExpand all lines: docs/userguide/azure.rst
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,6 +99,8 @@ Create and assign a Managed Service Identity (MSI)
99
99
In order to successfully implement CFE in Azure, you need a system-assigned or user-managed identity with sufficient access. Your Managed Service Identity (MSI) should be limited to the resource groups that contain the BIG-IP instances, VNET, route tables, etc. that will be updated. Read more about managed identities |managed-identity|.
100
100
To create and assign a Managed Service Identity (MSI) you must have a role of `User Access Administrator` or `Contributor access`. The following example shows a system-assigned MSI.
101
101
102
+
.. IMPORTANT:: CFE supports only one Managed Service Identity assigned to each Azure Virtual Machine instance; failover will not work correctly when multiple identities are assigned. You must create a single identity with all of the permissions required by CFE, as well as any other necessary permissions. You can create a managed identity manually or using the F5 access template. See https://github.com/F5Networks/f5-azure-arm-templates-v2/tree/main/examples/modules/access for more information.
103
+
102
104
#. Enable MSI for each VM: go to **Virtual Machine > Identity > System assigned** and set the status to ``On``.
103
105
104
106
For example:
@@ -156,14 +158,15 @@ Below is an example Azure role definition with permissions required by CFE.
156
158
- This example provides the minimum permissions required and serves as an illustration. You are responsible for following the provider's IAM best practices.
157
159
- Certain resources such as the virtual network are commonly deployed in a separate resource group; ensure the correct scopes are applied to all applicable resource groups.
158
160
- Certain resources such as route tables may be deployed in a separate subscription, ensure the assignable scopes applies to all relevant subscriptions.
161
+
- CFE supports only one Managed Service Identity assigned to each Azure Virtual Machine instance; failover will not function when multiple identities are assigned. You must create a single identity with all of the permissions listed above, as well as any other required permissions. You can create a managed identity manually, or by using the F5 access template. See https://github.com/F5Networks/f5-azure-arm-templates-v2/tree/main/examples/modules/access for more information.
159
162
160
163
|
161
164
162
165
163
166
.. _azure-define-objects:
164
167
165
-
Define your Azure Network Infrastructure Objects
166
-
------------------------------------------------
168
+
Define your Azure Infrastructure Objects
169
+
----------------------------------------
167
170
168
171
Define or Tag your cloud resources with the keys and values that you configure in your CFE declaration.
169
172
@@ -193,7 +196,7 @@ Add a storage account in Azure to your resource group for Cloud Failover to use.
193
196
|
194
197
195
198
196
-
Alternatively, if you are using the Discovery via Tag option, tag the S3 bucket with your custom key:values in the `externalStorage.scopingTags` section of the CFE declaration.
199
+
Alternatively, if you are using the Discovery via Tag option, tag the Azure Storage Account with your custom key:values in the `externalStorage.scopingTags` section of the CFE declaration.
0 commit comments