Release notes¶
These release notes provide product information and system requirements for the F5® Virtual Network Functions Manager (VNFM) support for version 4.0.0. This release contains fixes for known issues and new/changed functionality.
Contents¶
- F5® BIG-IQ® Centralized Management®
- F5® BIG-IP® Virtual Edition (VE):
- OpenStack Release Notes:
- Vmware Release Notes:
Platform support requirements¶
This section provides system requirements for VNFM and additional platform components.
VNF Manager¶
F5 VNF Manager version 4.0.0 requires the following system requirements:
Platform name | Platform ID | System Requirements |
---|---|---|
F5 VNF Manager | All versions |
|
VNFM Sizing guidelines¶
The following table includes some guidelines and insights for determining VNF Manager sizing.
VNFM Component | Sizing guideline |
---|---|
Tenants | Define a maximum of 1000 tenants in a VNF Manager |
Users | Currently, no limit to the number of users you can define in the system; however, the maximum, concurrent users interacting with VNFM is 200. |
Blueprints | Allocate 50GB of storage to the VNF Manager. Currently, no limit to the number of blueprints, as the average blueprint storage requires less than 1M of disk space and database space. |
Plugins | Plugins are stored in the VNF Manager hard drive. Typically, plugins can consume approximately 5M to 20M of storage. |
Deployments | A single VNFM can maintain up to 500K of deployed nodes. Typical deployment size consumes 10K maximum of disk size and very few entries in the database |
Workflows | A VNFM can operate up to 100 concurrent workflows; a default limit enforced by the system. However, you can modify this threshold. |
Secrets | No limit to the number of secrets. |
Agents | A maximum of 2000 agents deployed per a single VNFM. |
UI/CLI/API requests/second | Although the REST API performance varies depending on multiple factors, typically VNF Manager can support a maximum of 10 requests/second. |
Events | The system can process a maximum of 100 events/second. |
Logs, events, and metrics | Define enough storage to store the logs, events, and metrics sent from the hosts, configuring log rotation to minimize the amount of storage space required. |
Additional platforms¶
The following table provides system requirements for the additional components.
Platform name | Platform ID | System Requirements |
---|---|---|
F5® BIG-IP® Application Services 3 Extension (AS3) | 3.39.0-7 LTS | F5® BIG-IP® Application Services 3 Extension (AS3) version 3.39.0-7 (LTS) documentation |
F5® BIG-IP® Declarative Onboarding | 1.34.0-5 | F5® BIG-IP® Declarative Onboarding (DO) version 1.34-05 (LTS) documentation |
F5® BIG-IP® Telemetry Streaming | 1.31.0-2 (or latest) | F5® BIG-IP® Telemetry Streaming v1.31.0-2 (or latest) documentation |
CentOS-7-x86_64-GenericCloud-1503 | GenericCloud-1503 |
Important If using OpenStack 16 (Trains), you must use a CentOS 7.X image with Python 3 installed. |
Virtual Infrastructure Manager (VIM) compatibility¶
F5 VNF Manager and VIM compatibility matrix:
VNF Manager ID | VIM Platform ID | VIM System Requirements |
---|---|---|
F5 VNF Manager 1.1.X | OpenStack Newton Version 10 | Environment requirements |
F5 VNF Manager 1.2.0 | VMware vSphere ESXi Version 6.5 | Requirements and patch notices |
F5 VNF Manager 1.2.1 | VMware vSphere ESXi Version 6.5 OpenStack Newton Version 10 |
See previous links for requirements information. |
F5 VNF Manager 1.3.0 | OpenStack Newton Version 10 and Queens Version 13 VMware vSphere ESXi Version 6.5 |
Newton Version 10 Environment requirements Queens Version 13 Environment requirements vSphere ESXi Version 6.5 Requirements and patch notices |
F5 VNF Manager 1.3.1 | OpenStack Newton Version 10 and Queens Version 13 VMware vSphere ESXi Version 6.5 |
See previous links for compatible platform requirements. |
F5 VNF Manager 1.4.0 | OpenStack Newton Version 10 and Queens Version 13 VMware vSphere ESXi Version 6.5 |
See the previous links for compatible other platform requirements. |
F5 VNF Manager 2.0.0 - 2.0.2 | OpenStack Newton Version 10 and Queens Version 13 VMware vSphere ESXi Version 6.5 |
See the previous links for other compatible platform requirements. |
F5 VNF Manager 4.0.0 | OpenStack Version 16.2 and Version 13 VMware vSphere ESXi Version 6.5-7.0.3 |
See OpenStack 16.2 Release Notes, VMware vSphere ESXi Version 7.0.3 Release Notes, and the previous links for other compatible platform requirements. |
Note
To verify supported versions of OpenStack compatibility for all versions of VNFM, F5 used Red Hat infrastructures; however, F5 is confident that VNFM is compatible with supported versions of OpenStack in other infrastructures.
Open source components¶
F5 VNF Manager is built with the following open-source components.
Component | Description |
---|---|
Nginx | Nginx is a high-performing Web server. In F5 VNF Manager, it serves two purposes:
File server The file server served by Nginx, while tied to Nginx by default, is not logically bound to it. Although currently it is accessed
directly frequently (via disk rather than via network), we will be working towards having it decoupled
from the management environment so that it can be deployed anywhere. The file server served by Nginx, is available at
The directories that are stored in snapshots include:
Note: The |
Gunicorn and Flask | Gunicorn is a Web server gateway interface HTTP server. Flask is a Web framework. Together, Gunicorn and Flask provide the F5 VNFM REST service. The REST service is written using Flask, and Gunicorn is the server. Nginx, is the proxy to that server. The F5 VNFM’s REST service is the integrator of all parts of the F5 VNFM environment. |
PostgreSQL | PostgreSQL is an object-relational database that can handle workloads ranging from small single-machine applications to large Internet-facing applications. In F5 VNF Manager, PostgreSQL serves two purposes:
Recommended system requirements include:
These recommended specifications consider the average use of 1000-2000 workflows per hour and certified for 1 million deployments. To increase this scaling volume, increase your hardware specification; for example, the equivalent AWS instance is r5.large. |
Logstash | Logstash is a data handler. It can push/pull messages using inputs, and apply filters and output to different outputs. Logstash is used by F5 VNFM to pull log and event messages from RabbitMQ and index them in PostGresSQL. |
RabbitMQ | RabbitMQ is a queue-based messaging platform. RabbitMQ is used by F5 VNFM as a message queue for different purposes:
Recommended system requirements include:
These recommended specifications consider the average use of 1000-2000 workflows per hour and certified for 1 million deployments. To increase this scaling volume, increase your hardware specification; for example, the equivalent AWS instance is c5.large. |
Pika | Pika is a pure-Python implementation of the AMQP 0-9-1 protocol. The VNF management worker and the host agents are using pika to communicate with RabbitMQ. Management worker (or agent) Both the
Note: All agents (the management worker, and agents deployed on application hosts) are using the same implementation. |
Features¶
Feature Name | Description |
---|---|
Install/Uninstall | Installs the target deployment, lifecycle operations, and starts all instances. Uninstalls target deployment, frees resources allocated during install, performs uninstall lifecycle operations, stops/deletes deployments and additional blueprints created during install. |
Scale out | Adds and installs BIG-IP Virtual Editions (VEs) and VNF instances on demand as your network needs resources based on configurable parameters. |
Scale in | Removes and uninstalls BIG-IP Virtual Editions on demand as your network reduces its need for resources based on configurable parameters. |
Heal VEs and layers | Creates a new copy of any BIG-IP VEs, layers, and related objects on demand as your network reports dysfunctional instances. |
Purge VEs and layers | Uninstalls and removes dysfunctional VEs, VNF layer instance(s), and related objects, which you start manually after heal layer workflow runs and problem investigation is complete. |
Upgrade | Initiates the upgrade process and sets new software reference data. Disables VEs with lower revision numbers. Scaled and healed VEs are installed using the new software reference data. |
Update NSD | Updates AS3 declaration pushed to the VE as a part of NSD definition. |
High Availability (HA) | The three-cluster VNFM HA solution in VNFM 2.0.0 and later no longer works as designed. For a workaround solution, see the Backup and Restore Guide. |
REST API | Provides all VNFM functionality using a REST-based API. |
What’s new¶
The following table describes new/changed functionality added in VNF Manager version 4.0.0.
Feature | Description |
---|---|
Bug fixes | This release contains several fixes for existing issues. |
F5 BIG-IQ 8.2 and 8.3 | Support for the F5 BIG-IQ v8.2 and v8.3 license manager, which REQUIRES a policy-compliant password. See knowledge article K49507549 for complete details. |
RedHat OpenStack 16.2 | Support for Redhat OpenStack v16 VIM. |
External database PREVIEW ONLY | You will see configuration elements for writing to an external PostgreSQL database hosted on a Centos VM. This new feature is PREVIEW ONLY and may not work as expected. |
User documentation¶
You can find the user documentation on: https://clouddocs.f5.com/cloud/nfv/latest/
.
Security Vulnerabilities¶
The following list provides known common vulnerabilities and exposures (CVEs) shipped with the VNF Manager 4.0.0 release.
To view recent F5 BIG-IP and F5 BIG-IQ security advisories, visit the MyF5 Document Center, enter “CVE” in the search field, filter your results by Product, and then select the Security Advisory option in the Content Type filter. For the latest list of known and fixed vulnerabilities, sort the CVE results by Date.
Important
The following libraries listed in the Known CVEs are NOT accessible directly from F5 VNF Manager. You must run the Gi-LAN plugin and launch a blueprint, to access these libraries. Therefore, a bad actor must write a blueprint and launch that blueprint in the VNF Manager in order to exploit these libraries. F5 recommends that you always deploy the VNF Manager on a secure management network, which is NOT accessible externally.
Known CVEs¶
The following system libraries contain known security vulnerabilities shipped with the latest version of VNF Manager:
pip-20.3.4-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2021-3572 | Medium | A security issue in pip version 21.1 and older. Maliciously formatted tags with potential use for hijacking a commit-based PIN. Using the fact that all of unicode’s whitespace characters were allowed as separators, which Git allows as a part of a tag name. It is possible to force a different revision to install, if an attacker accesses the repository. Upgrade to version pip version 21.1 (see full details). |
pipenv-2021.5.29-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2022-21668 | High | Flaw in pipenv versions 2018.10.9 - 2021.11.23 parsing of requirements.txt files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, causing pipenv users to
install the requirements file (using pipenv install -r requirements.txt ) and therefore download dependencies from a package index server controlled by an attacker. By embedding malicious code in packages served from
a malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on victims’ systems. Upgrade to pipenv version v2022.1.8 (see full details). |
safety-1.8.5-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2020-5252 | Medium | The command-line safety version 1.0-1.8.7 package for Python has a potential security issue. There are two Python characteristics that allow malicious code to poison-pill command-line Safety package detection routines by disguising, or obfuscating other malicious or non-secure packages. Upgrade to safety version 1.9.0 (see full details). |
async-1.0.0.js
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2021-43138 | High | In Async versions < 2.6.3 and 3.x - 3.2.1, a malicious user can obtain privileges using the mapValues() method (lib/internal/iterator.js createObjectIterator ) prototype pollution.
Upgrade to Async version 2.6.4 or 3.2.2 (see full details). |
dparse-0.5.0.tar.gz, dparse-0.5.1.py3-none-any.whl, dparse-0.5.1
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2022-39280 | High | dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. If parsing index server URLs with dparse, then you are vulnerable. Apply version dparse-0.5.2 to patch this vulnerability. Upgrade to dparse-0.5.2 as soon as possible. If unable to upgrade, AVOID passing index server URLs in the source file that you want to parse (see full details). |
WS-2022-0316 | High | dparse versions prior to 0.5.2 contain a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). If parsing index server URLs with dparse, then you are vulnerable (see full details). |
py-1.11.0-py2.py3-none-any-whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2022-42969 | High | The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand
argument is mishandled (see full details). |
certifi-2021.10.8-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2022-23491 | High | Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates, while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from “TrustCor” from the root store. These are in the process of being removed from Mozilla’s trust store (see full details). |
setuptools-44.1.1-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2022-40897 | High | Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py (see full details). |
Werkzeug-1.0.1-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2023-25577 | High | Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug’s multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data (see full details). |
Flask-1.1.4-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2023-30861 | High | Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches Set-Cookie headers, it may send one client’s session cookie to other clients. The severity depends on the application’s use of the session and the proxy’s behavior regarding cookies (see full details). |
requests-2.27.1-py2.py3-none-any.whl
Vulnerability Code | Severity | Description |
---|---|---|
CVE-2023-32681 | Medium | Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint (see full details). |
Known issues¶
The following table lists known issues in the designated version release:
Platform name | Description |
---|---|
F5 VNF Manager Version 4.0.0 |
|
BIG-IP Virtual Edition | |
BIG-IQ 8.2 and 8.3 | 8.2 Issues list and 8.3 Issues list |
CentOS-7-GenericCloud-1503 | Issues list |
OpenStack | Issues list for v16.2 and Issues list for v13 |
VMware vSphere ESXi 6.5-7.0.3 | Issues list |
Fixed issues¶
The following table lists issues that were fixed in the designated version release:
Platform name | Fixed in version | Description |
---|---|---|
F5 VNF Manager | 4.0.0 |
|
BIG-IP Virtual Edition | 14.1.4.6, 15.1.5.1, or 16.1.2 |
|
BIG-IQ | 8.2. and 8.3 | 8.2 Issues list and 8.3 Issues list |
CentOS-7-x86_64 | GenericCloud-1503 | Issues list |
OpenStack | 16.2 and 13.0 | Issues list for v16.2 and Issues list for v13 |
VMware vSphere ESXi | 6.5-7.0.3 | Issues list |
Installation overview¶
To install F5 VNF Manager, point your browser to the F5 Downloads site and download locally, either a qcow2 file (OpenStack) or an OVA file (vSphere).
Additionally, you will need the following F5 product license keys:
Platform name | Product license |
---|---|
BIG-IQ 8.2 or 8.3 Virtual Edition | F5-BIQ-VE-LIC-MGR-LIC |
BIG-IP-15.1.5.1 or 16.1.2 Virtual Edition | F5-BIG-MSP-LOADV12-LIC |
CentOS-7-x86_64-GenericCloud-1503 | NA |
Upgrade overview¶
Currently, you cannot perform an in-place upgrade. Upgrading your VNF Manager requires you to completely shutdown, uninstall, and remove the VNF Manager image you want to replace with the latest version.
For the complete F5 NFV Solutions and VNF Manager software upgrade policy, consult this K35549824 article. For BIG-IP VE upgrade procedures, visit BIG-IP VE upgrade guide.
What’s Next?