You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-apps/cf-networking.html.md.erb
+11-7
Original file line number
Diff line number
Diff line change
@@ -58,16 +58,16 @@ This topic describes how to configure the Container-to-Container Networking feat
58
58
## <aname="create-policies"></a> Create and Manage Networking Policies
59
59
60
60
This section describes how to create and modify Container-to-Container Networking policies using the Cloud Foundry Command Line Interface (cf CLI).
61
-
The cf CLI only supports configuring policies for apps within the same space.
62
-
To configure policies for apps in different orgs and spaces, use the [Policy Server External API](https://github.com/cloudfoundry/cf-networking-release/blob/develop/docs/API_v0.md).
61
+
62
+
<pclass="note"><strong>Strong</strong>: To configure policies for apps in different orgs and spaces, ensure you have cf CLI v6.42.0 or later.</p>
63
63
64
64
<%=vars.app_man_network%>
65
65
66
66
<pclass='note'><strong>Note:</strong> With the NSX-T integration, container networking policies and ASGs continue to work as normal. Advanced ASG logging is not supported with NSX-T.</p>
67
67
68
68
### <aname="prereq"></a> Prerequisites
69
69
70
-
* Ensure that you are using cf CLI v6.30 or higher:
70
+
* Ensure that you are using cf CLI v6.42 or later:
71
71
<preclass="terminal">
72
72
$ cf version
73
73
</pre>
@@ -112,13 +112,15 @@ To grant all Space Developers permissions to configure network policies, <%= va
112
112
113
113
To add a policy that allows direct network traffic from one app to another, run the following command:
Replace the placeholders in the above command as follows:
119
119
120
120
* `SOURCE_APP` is the name of the app that sends traffic.
121
121
* `DESTINATION_APP` is the name of the app that will receive traffic.
122
+
* `DESTINATION_SPACE_NAME` is the space of the destination app. The default is the targeted space.
123
+
* `DESTINATION_ORG_NAME` is the org of the destination app. The default is the targeted org.
122
124
* `PROTOCOL` is one of the following: `tcp` or `udp`.
123
125
* `RANGE` are the ports at which to connect to the destination app. The allowed range is from `1` to `65535`. You can specify a single port, such as `8080`, or a range of ports, such as `8080-8090`.
124
126
@@ -152,21 +154,23 @@ You can list all the policies in your space, or just the policies for which a si
152
154
$ cf network-policies --source frontend
153
155
Listing network policies in org my-org / space dev as admin...
154
156
155
-
source destination protocol ports
156
-
frontend backend tcp 8080
157
+
source destination protocol ports destination space destination org
Replace the placeholders in the above command to match an existing policy, as follows:
167
169
168
170
* `SOURCE_APP` is the name of the app that sends traffic.
169
171
* `DESTINATION_APP` is the name of the app that receives traffic.
172
+
* `DESTINATION_SPACE_NAME` is the space of the destination app. The default is the targeted space.
173
+
* `DESTINATION_ORG_NAME` is the org of the destination app. The default is the targeted org.
170
174
* `PROTOCOL` is either `tcp` or `udp`.
171
175
* `PORTS` are the ports connecting the apps. The allowed range is from `1` to `65535`. You can specify a single port, such as `8080`, or a range of ports, such as `8080-8090`.
0 commit comments