Release Notes

F5 BIG-IP Next Cloud-Native Network Functions (CNFs) for OpenShift. CNF v1.3.3 is a maintenance release with the following bug fixes and known issues. This release contains no new features.

Bug Fixes

Bug ID 1753029-4

ICMP Monitor probes can flap when there is a slight delay in the response.

Affected Product(s)

BIG-IP Next (CNF)

Fixed In

1.3.3

Component

FSM

Symptoms

  • ICMP Connection flow timeout has been set at 1 second irrespective of the monitor timeout.
  • When the ICMP probes are sent to pool members, if there is a slight delay in the response, the connection flow may be cleared even before the response is received.
  • This condition causes the probe to fail and thereby marking the pool member as down.

Impact

Monitor probes fail causing the pool member to be marked down intermittently even when the actual pool member is healthy and alive.

Conditions

ICMP Connection flow timeout has been set to 1 second. If the ICMP response takes more than 1 second, the probes are marked as down.

Workaround

None

Fix Information

This issue is fixed by modifying the ICMP Connection flow timeout based on the ICMP monitor timeout.

Bug ID 1711109-2

Log throttling is non-deterministic.

Affected Product(s)

BIG-IP Next (CNF)

Fixed In

CNF 1.3.3

Component

FSM

Symptoms

Log throttling is non-deterministic, when large number of logs are being generated

Impact

May lose some logs when throttling is happening.

Conditions

  • Logs can be throttled, and users have no configuration mechanism to control this behavior.
  • When a pool member, which is common to all pools (For example, 8 pools) changes state, each of the TMM threads will produce logs. Thus, a large number of logs are generated within a one-second interval.
  • This results in mismatch condition of set/clear causing problem for alert monitoring.

Workaround

None

Fix Information

TMM allows a configuration variable sys db, which can be configured to the desired value. The newly introduced sys db variable is log.tmm.global.throttle.rate and the default value for this variable is 5.

Bug ID 1756313-2

TMM crashes with LTM monitor configured.

Affected Product(s)

BIG-IP Next (CNF)

Fixed In

1.3.3

Component

FSM

Symptoms

The TMM pod crashes periodically with the LTM monitor configured.

Impact

Traffic is disrupted as the TMM pod restarts.

Conditions

  • DNS, ICMP, or TCP LTM monitor is configured.
  • The VLAN used by the monitor traffic has a non-default value cmp-hash configured.

Workaround

Set the VLAN cmp-hash property value to default.

Fix Information

The TMM pod no longer crashes and traffic is not disrupted.

Bug ID 1756549-1

TMM Core dump while ACL logging for Hairpin connections.

Affected Product(s)

BIG-IP Next (CNF)

Fixed In

1.3.3

Component

AFM

Symptoms

TMM Core dump while ACL logging for Hairpin connections. Traffic is disrupted and the existing connections are dropped on the cored TMM pod.

Impact

Traffic is disrupted and the existing connections are dropped on the cored TMM pod.

Conditions

  • Dynamic-Pat NAT policy with Hairpin mode enabled.
  • Firewall policy with logging enabled and the Log profile has translation field logging enabled.
  • Both NAT and Firewall policy are attached to the secure context.
  • Hairpin connections matching the secure context.

Workaround

In the Global Context CR, apply a proper logging profile configured to log ACL action.

To apply the log profile, add the following to the values yaml file of F5BigContextGlobal CR.

apiVersion: k8s.f5net.com/v1
kind: F5BigContextGlobal
metadata:
  name: global-context
spec:
  firewall:
    defaultAction: "drop"
    defaultActionLog: false
  logProfile: "log-profile"

Fix Information

TMM pod no longer crashes while ACL logging for Hairpin connections and traffic is not disrupted.

Bug ID 1632313-2

The virtual servers are not configured when an FTP CR/Secure Context configuration contains zero rating iRule for scaled TMMs.

Affected Product(s)

BIG-IP Next (CNF)

Fixed In

1.3.3

Component

Ingress

Symptoms

  • F5 ingress sends partial configurations to the scaled up TMMs.
  • Virtual server configurations are missing in the scaled up TMMs for FTP CR or a Secure Context CR with zero-rating iRule CR.

Impact

  • The new TMMs are not configured properly as they miss virtual servers. This happens as partial configuration is being sent to the scaled up TMMs.
  • The bug has an impact on the data plane. Traffic meant for specific virtual servers will be impacted.

Conditions

  • FTP CR/Secure Context CR has been configured with iRule CR.
  • When the TMMs are scaled up.

Workaround

  • Delete all the virtual server profile CRs and virtual-server CR.
  • Re-apply them once again.

Fix Information

When a custom resource (CR) is deployed, F5ingress controllers cache the configurations meant for TMMs and use this cache to send full configuration to the newly scaled up TMMs. The cache was not being updated for FTP CR or Secure Context CRs with zero-rating iRule. The F5ingress controller has been fixed to update the cache correctly.

Known Issues

Bug ID 1757485

TCP Monitor properties are not taken into affect.

Affected Product(s):

BIG-IP NEXT (CNF)

Known Affected Versions:

1.3.3

Component

DNS

Symptoms

The TCP monitor operates with default values even after modifying or configuring the TCP Monitor timeout and interval values.

Impact

The monitor continues to use the default values even after changing the TCP interval and timeout settings.

Conditions

Changing the TCP monitor timeout and interval.

Workaround

The TCP monitor in DNSapp CRD uses the ICMP interval and timeout settings. If the ICMP monitor is not enabled, configure the ICMP interval and timeout to pass these attributes as TCP interval and timeout.

Fix Information

None.

Software upgrades

For assistance with software upgrades, refer to the Upgrading CNFs overview.

  • CNFs can be upgraded from v1.3.1 to v1.3.2. CNFs 1.3.2 version contains an updated version of the TMM pod. Hence, upgrading the F5ingress helm chart will update the TMM pod, allowing a smooth transition from version 1.3.1 to version 1.3.2.

    To upgrade from CNF v1.3.1 to v1.3.2, please follow the steps below.

    • Upgrade the f5ingress Pod using the newer version Helm chart of CNFs v1.3.2:

      helm upgrade <release> tar/<helm-chart>.tgz -n <namespace> -f <values>.yaml
      
    • In this example, the Helm chart new version of CNFs v1.3.2 is v150.480.0-0.1.52.

      helm upgrade f5ingress tar/f5ingress-v150.480.0-0.1.52.tgz -n cnf-gateway -f f5ingress_overrides.yaml
      

      Now, the CNF is upgraded from v1.3.1 to v1.3.2.

  • CNFs can be upgraded from v1.3.0 to v1.3.1. Refer to Upgrading CNFs from v1.3.0 to v1.3.1 section.

  • CNFs can be upgraded from v1.2.1 to v1.3.0. Refer to Upgrading CNFs from v1.2.1 to v1.3.0 section.

Next step

Continue to the Cluster Requirements guide to ensure the cluster has the required software components.